Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://anviict.com/?qvtvxymb

Overview

General Information

Sample URL:https://anviict.com/?qvtvxymb
Analysis ID:1531088

Detection

HTMLPhisher
Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected phishing page
Yara detected HtmlPhish54
Phishing site detected (based on favicon image match)
Phishing site detected (based on image similarity)
Detected hidden input values containing email addresses (often used in phishing pages)
HTML body contains low number of good links
HTML page contains hidden javascript code
HTML page contains obfuscated script src
Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 6908 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 6344 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 --field-trial-handle=1920,i,17125057666218610495,14990238067885767562,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 1488 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://anviict.com/?qvtvxymb" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
SourceRuleDescriptionAuthorStrings
1.2.pages.csvJoeSecurity_HtmlPhish_54Yara detected HtmlPhish_54Joe Security
    2.3.pages.csvJoeSecurity_HtmlPhish_54Yara detected HtmlPhish_54Joe Security
      2.5.pages.csvJoeSecurity_HtmlPhish_54Yara detected HtmlPhish_54Joe Security
        2.7.pages.csvJoeSecurity_HtmlPhish_54Yara detected HtmlPhish_54Joe Security
          No Sigma rule has matched
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          Phishing

          barindex
          Source: https://jvdplumbing.com/?9l0l8wrrt=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&sso_reload=trueLLM: Score: 9 Reasons: The brand 'Microsoft' is a well-known global technology company., The URL 'jvdplumbing.com' does not match the legitimate domain 'microsoft.com'., The domain 'jvdplumbing.com' appears unrelated to Microsoft and suggests a different business focus, likely plumbing services., The presence of a Microsoft email in the input fields does not validate the legitimacy of the domain., The URL does not contain any elements that suggest a legitimate association with Microsoft., The domain name does not include any common Microsoft-related terms or subdomains. DOM: 2.7.pages.csv
          Source: https://jvdplumbing.com/adfs/ls/?client-request-id=ee0e9392-e34a-20f8-becd-338667c899c0&wa=wsignin1.0&wtrealm=urn%3Afederation%3AMicrosoftOnline&wctx=LoginOptions%3D3%26estsredirect%3D2%26estsrequest%3DrQQIARAAjZE_bBJhAMXv4-jZYm2xLi7G5mIcqgd3HHfckTR6B1hooRAKCjWGwP2Bgzs-et8dFRtWdXBodNLRybSLcTIYTQcH06RJEweTJiaNLk2HRp06CnFx0ze8vOkl7_fmcCbARK_QfxSiRk7Rus5QijZKf8me8fmfPps6Wfx-Ovthj31Y__R8ZwtcbjhOB0WDQeg6JoStANR1Q9ECCrSCcL0afAvAPgBHAGx5Ijwr8GFGCIkRLsyLAssLAZVjdU7kQ5RAVyNUWImwVC0cqVGMWosoHC2oDMcfeKazkus0QiODtvFA--WZ0KFtVToQOS_wSlxxuURZWo9LsrxQXu01ZEpMIz3XktMrubodQi0kKalysyOn5CKbNvm1UA0ly22xhNI5dYmBq2qjl0GpRbGbcNcUZ6nG29WUzfZcgRXqwhb-X3ze4MRwtAXbuzgBO1rbUL_hFxqaacKblqHYEEHdGWHZ94JDLzj2TtJ4dHzc58cuYrPYqRe8HBsCZvmrN748-bz8ivx5_tG1S9juWDDuOlpJWg7KEq2v9FK38p1kLls0C8ZaLKE30roUo7N8s9ruxDPzYpTZJMAmQQyIiXHcj5F4LMccEeAHAR6fwQYT_3pr_yw4mAz7CMWsGhaamdsgDbXiwJbWJqMb5H0LVRRllLpV09UQGb1LDvvJe_1-f-ccdjr1fvvd14_bg5Pk8fT1eNfW7ohaRs6vxJr5rrhQlmrFrpO97WQKea6Zpt0CzxQsE5XK86_92KEf-w01&cbcxt=&username=hello%40microsoft.com&mkt=&lc=&pullStatus=0LLM: Score: 9 Reasons: The brand 'Microsoft' is a well-known global technology company., The legitimate domain for Microsoft is 'microsoft.com'., The provided URL 'jvdplumbing.com' does not match the legitimate domain for Microsoft., The URL 'jvdplumbing.com' appears unrelated to Microsoft and suggests a different business focus, likely plumbing services., Presence of a password input field on an unrelated domain is suspicious and indicative of phishing. DOM: 4.9.pages.csv
          Source: Yara matchFile source: 1.2.pages.csv, type: HTML
          Source: Yara matchFile source: 2.3.pages.csv, type: HTML
          Source: Yara matchFile source: 2.5.pages.csv, type: HTML
          Source: Yara matchFile source: 2.7.pages.csv, type: HTML
          Source: https://jvdplumbing.com/?9l0l8wrrt=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&sso_reload=trueMatcher: Template: microsoft matched with high similarity
          Source: https://jvdplumbing.com/?9l0l8wrrt=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&sso_reload=trueMatcher: Found strong image similarity, brand: MICROSOFT
          Source: https://jvdplumbing.com/adfs/ls/?client-request-id=ee0e9392-e34a-20f8-becd-338667c899c0&wa=wsignin1.0&wtrealm=urn%3Afederation%3AMicrosoftOnline&wctx=LoginOptions%3D3%26estsredirect%3D2%26estsrequest%3DrQQIARAAjZE_bBJhAMXv4-jZYm2xLi7G5mIcqgd3HHfckTR6B1hooRAKCjWGwP2Bgzs-et8dFRtWdXBodNLRybSLcTIYTQcH06RJEweTJiaNLk2HRp06CnFx0ze8vOkl7_fmcCbARK_QfxSiRk7Rus5QijZKf8me8fmfPps6Wfx-Ovthj31Y__R8ZwtcbjhOB0WDQeg6JoStANR1Q9ECCrSCcL0afAvAPgBHAGx5Ijwr8GFGCIkRLsyLAssLAZVjdU7kQ5RAVyNUWImwVC0cqVGMWosoHC2oDMcfeKazkus0QiODtvFA--WZ0KFtVToQOS_wSlxxuURZWo9LsrxQXu01ZEpMIz3XktMrubodQi0kKalysyOn5CKbNvm1UA0ly22xhNI5dYmBq2qjl0GpRbGbcNcUZ6nG29WUzfZcgRXqwhb-X3ze4MRwtAXbuzgBO1rbUL_hFxqaacKblqHYEEHdGWHZ94JDLzj2TtJ4dHzc58cuYrPYqRe8HBsCZvmrN748-bz8ivx5_tG1S9juWDDuOlpJWg7KEq2v9FK38p1kLls0C8ZaLKE30roUo7N8s9ruxDPzYpTZJMAmQQyIiXHcj5F4LMccEeAHAR6fwQYT_3pr_yw4mAz7CMWsGhaamdsgDbXiwJbWJqMb5H0LVRRllLpV09UQGb1LDvvJe_1-f-ccdjr1fvvd14_bg5Pk8fT1eNfW7ohaRs6vxJr5rrhQlmrFrpO97WQKea6Zpt0CzxQsE5XK86_92KEf-w01&cbcxt=&username=hello%40microsoft.com&mkt=&lc=&pullStatus=0HTTP Parser: hello@microsoft.com
          Source: https://jvdplumbing.com/?9l0l8wrrt=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&sso_reload=trueHTTP Parser: Number of links: 0
          Source: https://jvdplumbing.com/adfs/ls/?client-request-id=ee0e9392-e34a-20f8-becd-338667c899c0&wa=wsignin1.0&wtrealm=urn%3Afederation%3AMicrosoftOnline&wctx=LoginOptions%3D3%26estsredirect%3D2%26estsrequest%3DrQQIARAAjZE_bBJhAMXv4-jZYm2xLi7G5mIcqgd3HHfckTR6B1hooRAKCjWGwP2Bgzs-et8dFRtWdXBodNLRybSLcTIYTQcH06RJEweTJiaNLk2HRp06CnFx0ze8vOkl7_fmcCbARK_QfxSiRk7Rus5QijZKf8me8fmfPps6Wfx-Ovthj31Y__R8ZwtcbjhOB0WDQeg6JoStANR1Q9ECCrSCcL0afAvAPgBHAGx5Ijwr8GFGCIkRLsyLAssLAZVjdU7kQ5RAVyNUWImwVC0cqVGMWosoHC2oDMcfeKazkus0QiODtvFA--WZ0KFtVToQOS_wSlxxuURZWo9LsrxQXu01ZEpMIz3XktMrubodQi0kKalysyOn5CKbNvm1UA0ly22xhNI5dYmBq2qjl0GpRbGbcNcUZ6nG29WUzfZcgRXqwhb-X3ze4MRwtAXbuzgBO1rbUL_hFxqaacKblqHYEEHdGWHZ94JDLzj2TtJ4dHzc58cuYrPYqRe8HBsCZvmrN748-bz8ivx5_tG1S9juWDDuOlpJWg7KEq2v9FK38p1kLls0C8ZaLKE30roUo7N8s9ruxDPzYpTZJMAmQQyIiXHcj5F4LMccEeAHAR6fwQYT_3pr_yw4mAz7CMWsGhaamdsgDbXiwJbWJqMb5H0LVRRllLpV09UQGb1LDvvJe_1-f-ccdjr1fvvd14_bg5Pk8fT1eNfW7ohaRs6vxJr5rrhQlmrFrpO97WQKea6Zpt0CzxQsE5XK86_92KEf-w01&cbcxt=&username=hello%40microsoft.com&mkt=&lc=&pullSt...HTTP Parser: Number of links: 0
          Source: https://anviict.com/?qvtvxymb=8d718709d3a0b0d16ecdfb792886aae2431354c527e9e1bc279fc89714d8d2d24fbbe7c63247e4c04be4f244cd2a3f681e2782a1fb66a29257cd4aa2511ff71fHTTP Parser: Base64 decoded: {"version":3,"sources":["/cfsetup_build/src/orchestrator/turnstile/templates/turnstile.scss","%3Cinput%20css%20SREF6k%3E"],"names":[],"mappings":"AAmCA,gBACI,GACI,uBClCN,CACF,CDqCA,kBACI,GACI,mBCnCN,CACF,CDsCA,iBACI,MAEI,cCrCN,CDwCE,IACI,mBCtCN,CACF,CDyCA...
          Source: https://jvdplumbing.com/?9l0l8wrrt=aHR0cHM6Ly9sb2dpbi5taWNyb3NvZnRvbmxpbmUuY29tL2NvbW1vbi9vYXV0aDIvYXV0aG9yaXplP2NsaWVudF9pZD0wMDAwMDAwMi0wMDAwLTBmZjEtY2UwMC0wMDAwMDAwMDAwMDAmcmVkaXJlY3RfdXJpPWh0dHBzJTNhJTJmJTJmb3V0bG9vay5vZmZpY2UuY29tJTJmb3dhJTJmJnJHTTP Parser: Script src: data:text/javascript;base64,ZnVuY3Rpb24gYygpe2lmKCFkb2N1bWVudC5xdWVyeVNlbGVjdG9yKCIuYiIpIHx8ICFkb2N1bWVudC5xdWVyeVNlbGVjdG9yKCIuZyIpKXtkb2N1bWVudC5oZWFkLmFwcGVuZENoaWxkKE9iamVjdC5hc3NpZ24oZG9jdW1lbnQuY3JlYXRlRWxlbWVudCgiZGl2Iikse2NsYXNzTGlzdDpbImIiXX
          Source: https://jvdplumbing.com/?9l0l8wrrt=aHR0cHM6Ly9sb2dpbi5taWNyb3NvZnRvbmxpbmUuY29tL2NvbW1vbi9vYXV0aDIvYXV0aG9yaXplP2NsaWVudF9pZD0wMDAwMDAwMi0wMDAwLTBmZjEtY2UwMC0wMDAwMDAwMDAwMDAmcmVkaXJlY3RfdXJpPWh0dHBzJTNhJTJmJTJmb3V0bG9vay5vZmZpY2UuY29tJTJmb3dhJTJmJnJHTTP Parser: Script src: data:text/javascript;base64,ZnVuY3Rpb24gYygpe2lmKCFkb2N1bWVudC5xdWVyeVNlbGVjdG9yKCIuYiIpIHx8ICFkb2N1bWVudC5xdWVyeVNlbGVjdG9yKCIuZyIpKXtkb2N1bWVudC5oZWFkLmFwcGVuZENoaWxkKE9iamVjdC5hc3NpZ24oZG9jdW1lbnQuY3JlYXRlRWxlbWVudCgiZGl2Iikse2NsYXNzTGlzdDpbImIiXX
          Source: https://jvdplumbing.com/?9l0l8wrrt=aHR0cHM6Ly9sb2dpbi5taWNyb3NvZnRvbmxpbmUuY29tL2NvbW1vbi9vYXV0aDIvYXV0aG9yaXplP2NsaWVudF9pZD0wMDAwMDAwMi0wMDAwLTBmZjEtY2UwMC0wMDAwMDAwMDAwMDAmcmVkaXJlY3RfdXJpPWh0dHBzJTNhJTJmJTJmb3V0bG9vay5vZmZpY2UuY29tJTJmb3dhJTJmJnJHTTP Parser: Script src: data:text/javascript;base64,ZnVuY3Rpb24gYygpe2lmKCFkb2N1bWVudC5xdWVyeVNlbGVjdG9yKCIuYiIpIHx8ICFkb2N1bWVudC5xdWVyeVNlbGVjdG9yKCIuZyIpKXtkb2N1bWVudC5oZWFkLmFwcGVuZENoaWxkKE9iamVjdC5hc3NpZ24oZG9jdW1lbnQuY3JlYXRlRWxlbWVudCgiZGl2Iikse2NsYXNzTGlzdDpbImIiXX
          Source: https://jvdplumbing.com/?9l0l8wrrt=aHR0cHM6Ly9sb2dpbi5taWNyb3NvZnRvbmxpbmUuY29tL2NvbW1vbi9vYXV0aDIvYXV0aG9yaXplP2NsaWVudF9pZD0wMDAwMDAwMi0wMDAwLTBmZjEtY2UwMC0wMDAwMDAwMDAwMDAmcmVkaXJlY3RfdXJpPWh0dHBzJTNhJTJmJTJmb3V0bG9vay5vZmZpY2UuY29tJTJmb3dhJTJmJnJHTTP Parser: Script src: data:text/javascript;base64,ZnVuY3Rpb24gYygpe2lmKCFkb2N1bWVudC5xdWVyeVNlbGVjdG9yKCIuYiIpIHx8ICFkb2N1bWVudC5xdWVyeVNlbGVjdG9yKCIuZyIpKXtkb2N1bWVudC5oZWFkLmFwcGVuZENoaWxkKE9iamVjdC5hc3NpZ24oZG9jdW1lbnQuY3JlYXRlRWxlbWVudCgiZGl2Iikse2NsYXNzTGlzdDpbImIiXX
          Source: https://jvdplumbing.com/adfs/ls/?client-request-id=ee0e9392-e34a-20f8-becd-338667c899c0&wa=wsignin1.0&wtrealm=urn%3Afederation%3AMicrosoftOnline&wctx=LoginOptions%3D3%26estsredirect%3D2%26estsrequest%3DrQQIARAAjZE_bBJhAMXv4-jZYm2xLi7G5mIcqgd3HHfckTR6HTTP Parser: Script src: data:text/javascript;base64,ZnVuY3Rpb24gYygpe2lmKCFkb2N1bWVudC5xdWVyeVNlbGVjdG9yKCIuYiIpIHx8ICFkb2N1bWVudC5xdWVyeVNlbGVjdG9yKCIuZyIpKXtkb2N1bWVudC5oZWFkLmFwcGVuZENoaWxkKE9iamVjdC5hc3NpZ24oZG9jdW1lbnQuY3JlYXRlRWxlbWVudCgiZGl2Iikse2NsYXNzTGlzdDpbImIiXX
          Source: https://jvdplumbing.com/?9l0l8wrrt=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&sso_reload=trueHTTP Parser: Iframe src: https://outlook.office365.com/owa/prefetch.aspx
          Source: https://jvdplumbing.com/?9l0l8wrrt=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&sso_reload=trueHTTP Parser: Iframe src: https://outlook.office365.com/owa/prefetch.aspx
          Source: https://jvdplumbing.com/?9l0l8wrrt=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&sso_reload=trueHTTP Parser: Iframe src: https://outlook.office365.com/owa/prefetch.aspx
          Source: https://jvdplumbing.com/?9l0l8wrrt=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&sso_reload=trueHTTP Parser: <input type="password" .../> found
          Source: https://jvdplumbing.com/adfs/ls/?client-request-id=ee0e9392-e34a-20f8-becd-338667c899c0&wa=wsignin1.0&wtrealm=urn%3Afederation%3AMicrosoftOnline&wctx=LoginOptions%3D3%26estsredirect%3D2%26estsrequest%3DrQQIARAAjZE_bBJhAMXv4-jZYm2xLi7G5mIcqgd3HHfckTR6B1hooRAKCjWGwP2Bgzs-et8dFRtWdXBodNLRybSLcTIYTQcH06RJEweTJiaNLk2HRp06CnFx0ze8vOkl7_fmcCbARK_QfxSiRk7Rus5QijZKf8me8fmfPps6Wfx-Ovthj31Y__R8ZwtcbjhOB0WDQeg6JoStANR1Q9ECCrSCcL0afAvAPgBHAGx5Ijwr8GFGCIkRLsyLAssLAZVjdU7kQ5RAVyNUWImwVC0cqVGMWosoHC2oDMcfeKazkus0QiODtvFA--WZ0KFtVToQOS_wSlxxuURZWo9LsrxQXu01ZEpMIz3XktMrubodQi0kKalysyOn5CKbNvm1UA0ly22xhNI5dYmBq2qjl0GpRbGbcNcUZ6nG29WUzfZcgRXqwhb-X3ze4MRwtAXbuzgBO1rbUL_hFxqaacKblqHYEEHdGWHZ94JDLzj2TtJ4dHzc58cuYrPYqRe8HBsCZvmrN748-bz8ivx5_tG1S9juWDDuOlpJWg7KEq2v9FK38p1kLls0C8ZaLKE30roUo7N8s9ruxDPzYpTZJMAmQQyIiXHcj5F4LMccEeAHAR6fwQYT_3pr_yw4mAz7CMWsGhaamdsgDbXiwJbWJqMb5H0LVRRllLpV09UQGb1LDvvJe_1-f-ccdjr1fvvd14_bg5Pk8fT1eNfW7ohaRs6vxJr5rrhQlmrFrpO97WQKea6Zpt0CzxQsE5XK86_92KEf-w01&cbcxt=&username=hello%40microsoft.com&mkt=&lc=&pullSt...HTTP Parser: <input type="password" .../> found
          Source: https://anviict.com/?qvtvxymb=8d718709d3a0b0d16ecdfb792886aae2431354c527e9e1bc279fc89714d8d2d24fbbe7c63247e4c04be4f244cd2a3f681e2782a1fb66a29257cd4aa2511ff71fHTTP Parser: No favicon
          Source: https://jvdplumbing.com/?9l0l8wrrt=aHR0cHM6Ly9sb2dpbi5taWNyb3NvZnRvbmxpbmUuY29tL2NvbW1vbi9vYXV0aDIvYXV0aG9yaXplP2NsaWVudF9pZD0wMDAwMDAwMi0wMDAwLTBmZjEtY2UwMC0wMDAwMDAwMDAwMDAmcmVkaXJlY3RfdXJpPWh0dHBzJTNhJTJmJTJmb3V0bG9vay5vZmZpY2UuY29tJTJmb3dhJTJmJnJlc291cmNlPTAwMDAwMDAyLTAwMDAtMGZmMS1jZTAwLTAwMDAwMDAwMDAwMCZyZXNwb25zZV9tb2RlPWZvcm1fcG9zdCZyZXNwb25zZV90eXBlPWNvZGUraWRfdG9rZW4mc2NvcGU9b3BlbmlkJm1zYWZlZD0xJm1zYXJlZGlyPTEmY2xpZW50LXJlcXVlc3QtaWQ9ZWUwZTkzOTItZTM0YS0yMGY4LWJlY2QtMzM4NjY3Yzg5OWMwJnByb3RlY3RlZHRva2VuPXRydWUmY2xhaW1zPSU3YiUyMmlkX3Rva2VuJTIyJTNhJTdiJTIyeG1zX2NjJTIyJTNhJTdiJTIydmFsdWVzJTIyJTNhJTViJTIyQ1AxJTIyJTVkJTdkJTdkJTdkJm5vbmNlPTYzODY0MTgyOTc1NDY5ODM2OC5kNTNmNTk2Mi04MGE3LTRjNzMtYjQ3Yi0xZGI3YzUwOGQxNTYmc3RhdGU9RGN1NUVZQXdEQUJCR1laeWhCLTlMc2ZQa0JMU1BncjJza3NBY0lZanBCSUJVM0xsNnEyYnNIWW45WHNMUGRLMW9aZGh5TXNJSjl2RXVxY3RLYjZyYUlyM3l1ODM4Zzg=HTTP Parser: No favicon
          Source: https://jvdplumbing.com/?9l0l8wrrt=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&sso_reload=trueHTTP Parser: No favicon
          Source: https://jvdplumbing.com/?9l0l8wrrt=aHR0cHM6Ly9sb2dpbi5taWNyb3NvZnRvbmxpbmUuY29tL2NvbW1vbi9vYXV0aDIvYXV0aG9yaXplP2NsaWVudF9pZD0wMDAwMDAwMi0wMDAwLTBmZjEtY2UwMC0wMDAwMDAwMDAwMDAmcmVkaXJlY3RfdXJpPWh0dHBzJTNhJTJmJTJmb3V0bG9vay5vZmZpY2UuY29tJTJmb3dhJTJmJnJlc291cmNlPTAwMDAwMDAyLTAwMDAtMGZmMS1jZTAwLTAwMDAwMDAwMDAwMCZyZXNwb25zZV9tb2RlPWZvcm1fcG9zdCZyZXNwb25zZV90eXBlPWNvZGUraWRfdG9rZW4mc2NvcGU9b3BlbmlkJm1zYWZlZD0xJm1zYXJlZGlyPTEmY2xpZW50LXJlcXVlc3QtaWQ9ZWUwZTkzOTItZTM0YS0yMGY4LWJlY2QtMzM4NjY3Yzg5OWMwJnByb3RlY3RlZHRva2VuPXRydWUmY2xhaW1zPSU3YiUyMmlkX3Rva2VuJTIyJTNhJTdiJTIyeG1zX2NjJTIyJTNhJTdiJTIydmFsdWVzJTIyJTNhJTViJTIyQ1AxJTIyJTVkJTdkJTdkJTdkJm5vbmNlPTYzODY0MTgyOTc1NDY5ODM2OC5kNTNmNTk2Mi04MGE3LTRjNzMtYjQ3Yi0xZGI3YzUwOGQxNTYmc3RhdGU9RGN1NUVZQXdEQUJCR1laeWhCLTlMc2ZQa0JMU1BncjJza3NBY0lZanBCSUJVM0xsNnEyYnNIWW45WHNMUGRLMW9aZGh5TXNJSjl2RXVxY3RLYjZyYUlyM3l1ODM4Zzg=&sso_reload=trueHTTP Parser: No favicon
          Source: https://jvdplumbing.com/?9l0l8wrrt=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&sso_reload=trueHTTP Parser: No favicon
          Source: https://jvdplumbing.com/adfs/ls/?client-request-id=ee0e9392-e34a-20f8-becd-338667c899c0&wa=wsignin1.0&wtrealm=urn%3Afederation%3AMicrosoftOnline&wctx=LoginOptions%3D3%26estsredirect%3D2%26estsrequest%3DrQQIARAAjZE_bBJhAMXv4-jZYm2xLi7G5mIcqgd3HHfckTR6B1hooRAKCjWGwP2Bgzs-et8dFRtWdXBodNLRybSLcTIYTQcH06RJEweTJiaNLk2HRp06CnFx0ze8vOkl7_fmcCbARK_QfxSiRk7Rus5QijZKf8me8fmfPps6Wfx-Ovthj31Y__R8ZwtcbjhOB0WDQeg6JoStANR1Q9ECCrSCcL0afAvAPgBHAGx5Ijwr8GFGCIkRLsyLAssLAZVjdU7kQ5RAVyNUWImwVC0cqVGMWosoHC2oDMcfeKazkus0QiODtvFA--WZ0KFtVToQOS_wSlxxuURZWo9LsrxQXu01ZEpMIz3XktMrubodQi0kKalysyOn5CKbNvm1UA0ly22xhNI5dYmBq2qjl0GpRbGbcNcUZ6nG29WUzfZcgRXqwhb-X3ze4MRwtAXbuzgBO1rbUL_hFxqaacKblqHYEEHdGWHZ94JDLzj2TtJ4dHzc58cuYrPYqRe8HBsCZvmrN748-bz8ivx5_tG1S9juWDDuOlpJWg7KEq2v9FK38p1kLls0C8ZaLKE30roUo7N8s9ruxDPzYpTZJMAmQQyIiXHcj5F4LMccEeAHAR6fwQYT_3pr_yw4mAz7CMWsGhaamdsgDbXiwJbWJqMb5H0LVRRllLpV09UQGb1LDvvJe_1-f-ccdjr1fvvd14_bg5Pk8fT1eNfW7ohaRs6vxJr5rrhQlmrFrpO97WQKea6Zpt0CzxQsE5XK86_92KEf-w01&cbcxt=&username=hello%40microsoft.com&mkt=&lc=&pullSt...HTTP Parser: No favicon
          Source: https://jvdplumbing.com/?9l0l8wrrt=aHR0cHM6Ly9sb2dpbi5taWNyb3NvZnRvbmxpbmUuY29tL2NvbW1vbi9vYXV0aDIvYXV0aG9yaXplP2NsaWVudF9pZD0wMDAwMDAwMi0wMDAwLTBmZjEtY2UwMC0wMDAwMDAwMDAwMDAmcmVkaXJlY3RfdXJpPWh0dHBzJTNhJTJmJTJmb3V0bG9vay5vZmZpY2UuY29tJTJmb3dhJTJmJnJlc291cmNlPTAwMDAwMDAyLTAwMDAtMGZmMS1jZTAwLTAwMDAwMDAwMDAwMCZyZXNwb25zZV9tb2RlPWZvcm1fcG9zdCZyZXNwb25zZV90eXBlPWNvZGUraWRfdG9rZW4mc2NvcGU9b3BlbmlkJm1zYWZlZD0xJm1zYXJlZGlyPTEmY2xpZW50LXJlcXVlc3QtaWQ9ZWUwZTkzOTItZTM0YS0yMGY4LWJlY2QtMzM4NjY3Yzg5OWMwJnByb3RlY3RlZHRva2VuPXRydWUmY2xhaW1zPSU3YiUyMmlkX3Rva2VuJTIyJTNhJTdiJTIyeG1zX2NjJTIyJTNhJTdiJTIydmFsdWVzJTIyJTNhJTViJTIyQ1AxJTIyJTVkJTdkJTdkJTdkJm5vbmNlPTYzODY0MTgyOTc1NDY5ODM2OC5kNTNmNTk2Mi04MGE3LTRjNzMtYjQ3Yi0xZGI3YzUwOGQxNTYmc3RhdGU9RGN1NUVZQXdEQUJCR1laeWhCLTlMc2ZQa0JMU1BncjJza3NBY0lZanBCSUJVM0xsNnEyYnNIWW45WHNMUGRLMW9aZGh5TXNJSjl2RXVxY3RLYjZyYUlyM3l1ODM4Zzg=&sso_reload=trueHTTP Parser: No <meta name="author".. found
          Source: https://jvdplumbing.com/?9l0l8wrrt=aHR0cHM6Ly9sb2dpbi5taWNyb3NvZnRvbmxpbmUuY29tL2NvbW1vbi9vYXV0aDIvYXV0aG9yaXplP2NsaWVudF9pZD0wMDAwMDAwMi0wMDAwLTBmZjEtY2UwMC0wMDAwMDAwMDAwMDAmcmVkaXJlY3RfdXJpPWh0dHBzJTNhJTJmJTJmb3V0bG9vay5vZmZpY2UuY29tJTJmb3dhJTJmJnJlc291cmNlPTAwMDAwMDAyLTAwMDAtMGZmMS1jZTAwLTAwMDAwMDAwMDAwMCZyZXNwb25zZV9tb2RlPWZvcm1fcG9zdCZyZXNwb25zZV90eXBlPWNvZGUraWRfdG9rZW4mc2NvcGU9b3BlbmlkJm1zYWZlZD0xJm1zYXJlZGlyPTEmY2xpZW50LXJlcXVlc3QtaWQ9ZWUwZTkzOTItZTM0YS0yMGY4LWJlY2QtMzM4NjY3Yzg5OWMwJnByb3RlY3RlZHRva2VuPXRydWUmY2xhaW1zPSU3YiUyMmlkX3Rva2VuJTIyJTNhJTdiJTIyeG1zX2NjJTIyJTNhJTdiJTIydmFsdWVzJTIyJTNhJTViJTIyQ1AxJTIyJTVkJTdkJTdkJTdkJm5vbmNlPTYzODY0MTgyOTc1NDY5ODM2OC5kNTNmNTk2Mi04MGE3LTRjNzMtYjQ3Yi0xZGI3YzUwOGQxNTYmc3RhdGU9RGN1NUVZQXdEQUJCR1laeWhCLTlMc2ZQa0JMU1BncjJza3NBY0lZanBCSUJVM0xsNnEyYnNIWW45WHNMUGRLMW9aZGh5TXNJSjl2RXVxY3RLYjZyYUlyM3l1ODM4Zzg=&sso_reload=trueHTTP Parser: No <meta name="author".. found
          Source: https://jvdplumbing.com/?9l0l8wrrt=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&sso_reload=trueHTTP Parser: No <meta name="author".. found
          Source: https://jvdplumbing.com/adfs/ls/?client-request-id=ee0e9392-e34a-20f8-becd-338667c899c0&wa=wsignin1.0&wtrealm=urn%3Afederation%3AMicrosoftOnline&wctx=LoginOptions%3D3%26estsredirect%3D2%26estsrequest%3DrQQIARAAjZE_bBJhAMXv4-jZYm2xLi7G5mIcqgd3HHfckTR6B1hooRAKCjWGwP2Bgzs-et8dFRtWdXBodNLRybSLcTIYTQcH06RJEweTJiaNLk2HRp06CnFx0ze8vOkl7_fmcCbARK_QfxSiRk7Rus5QijZKf8me8fmfPps6Wfx-Ovthj31Y__R8ZwtcbjhOB0WDQeg6JoStANR1Q9ECCrSCcL0afAvAPgBHAGx5Ijwr8GFGCIkRLsyLAssLAZVjdU7kQ5RAVyNUWImwVC0cqVGMWosoHC2oDMcfeKazkus0QiODtvFA--WZ0KFtVToQOS_wSlxxuURZWo9LsrxQXu01ZEpMIz3XktMrubodQi0kKalysyOn5CKbNvm1UA0ly22xhNI5dYmBq2qjl0GpRbGbcNcUZ6nG29WUzfZcgRXqwhb-X3ze4MRwtAXbuzgBO1rbUL_hFxqaacKblqHYEEHdGWHZ94JDLzj2TtJ4dHzc58cuYrPYqRe8HBsCZvmrN748-bz8ivx5_tG1S9juWDDuOlpJWg7KEq2v9FK38p1kLls0C8ZaLKE30roUo7N8s9ruxDPzYpTZJMAmQQyIiXHcj5F4LMccEeAHAR6fwQYT_3pr_yw4mAz7CMWsGhaamdsgDbXiwJbWJqMb5H0LVRRllLpV09UQGb1LDvvJe_1-f-ccdjr1fvvd14_bg5Pk8fT1eNfW7ohaRs6vxJr5rrhQlmrFrpO97WQKea6Zpt0CzxQsE5XK86_92KEf-w01&cbcxt=&username=hello%40microsoft.com&mkt=&lc=&pullStHTTP Parser: No <meta name="author".. found
          Source: https://jvdplumbing.com/?9l0l8wrrt=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&sso_reload=trueHTTP Parser: No <meta name="copyright".. found
          Source: https://jvdplumbing.com/?9l0l8wrrt=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&sso_reload=trueHTTP Parser: No <meta name="copyright".. found
          Source: https://jvdplumbing.com/?9l0l8wrrt=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&sso_reload=trueHTTP Parser: No <meta name="copyright".. found
          Source: https://jvdplumbing.com/adfs/ls/?client-request-id=ee0e9392-e34a-20f8-becd-338667c899c0&wa=wsignin1.0&wtrealm=urn%3Afederation%3AMicrosoftOnline&wctx=LoginOptions%3D3%26estsredirect%3D2%26estsrequest%3DrQQIARAAjZE_bBJhAMXv4-jZYm2xLi7G5mIcqgd3HHfckTR6B1hooRAKCjWGwP2Bgzs-et8dFRtWdXBodNLRybSLcTIYTQcH06RJEweTJiaNLk2HRp06CnFx0ze8vOkl7_fmcCbARK_QfxSiRk7Rus5QijZKf8me8fmfPps6Wfx-Ovthj31Y__R8ZwtcbjhOB0WDQeg6JoStANR1Q9ECCrSCcL0afAvAPgBHAGx5Ijwr8GFGCIkRLsyLAssLAZVjdU7kQ5RAVyNUWImwVC0cqVGMWosoHC2oDMcfeKazkus0QiODtvFA--WZ0KFtVToQOS_wSlxxuURZWo9LsrxQXu01ZEpMIz3XktMrubodQi0kKalysyOn5CKbNvm1UA0ly22xhNI5dYmBq2qjl0GpRbGbcNcUZ6nG29WUzfZcgRXqwhb-X3ze4MRwtAXbuzgBO1rbUL_hFxqaacKblqHYEEHdGWHZ94JDLzj2TtJ4dHzc58cuYrPYqRe8HBsCZvmrN748-bz8ivx5_tG1S9juWDDuOlpJWg7KEq2v9FK38p1kLls0C8ZaLKE30roUo7N8s9ruxDPzYpTZJMAmQQyIiXHcj5F4LMccEeAHAR6fwQYT_3pr_yw4mAz7CMWsGhaamdsgDbXiwJbWJqMb5H0LVRRllLpV09UQGb1LDvvJe_1-f-ccdjr1fvvd14_bg5Pk8fT1eNfW7ohaRs6vxJr5rrhQlmrFrpO97WQKea6Zpt0CzxQsE5XK86_92KEf-w01&cbcxt=&username=hello%40microsoft.com&mkt=&lc=&pullSt...HTTP Parser: No <meta name="copyright".. found
          Source: unknownHTTPS traffic detected: 95.100.63.156:443 -> 192.168.2.16:49717 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 95.100.63.156:443 -> 192.168.2.16:49721 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.16:49732 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.16:49801 version: TLS 1.2
          Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
          Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
          Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
          Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
          Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
          Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
          Source: unknownTCP traffic detected without corresponding DNS query: 95.100.63.156
          Source: unknownTCP traffic detected without corresponding DNS query: 95.100.63.156
          Source: unknownTCP traffic detected without corresponding DNS query: 95.100.63.156
          Source: unknownTCP traffic detected without corresponding DNS query: 95.100.63.156
          Source: unknownTCP traffic detected without corresponding DNS query: 95.100.63.156
          Source: unknownTCP traffic detected without corresponding DNS query: 95.100.63.156
          Source: unknownTCP traffic detected without corresponding DNS query: 95.100.63.156
          Source: unknownTCP traffic detected without corresponding DNS query: 95.100.63.156
          Source: unknownTCP traffic detected without corresponding DNS query: 95.100.63.156
          Source: unknownTCP traffic detected without corresponding DNS query: 95.100.63.156
          Source: unknownTCP traffic detected without corresponding DNS query: 95.100.63.156
          Source: unknownTCP traffic detected without corresponding DNS query: 95.100.63.156
          Source: unknownTCP traffic detected without corresponding DNS query: 95.100.63.156
          Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
          Source: unknownTCP traffic detected without corresponding DNS query: 95.100.63.156
          Source: unknownTCP traffic detected without corresponding DNS query: 95.100.63.156
          Source: unknownTCP traffic detected without corresponding DNS query: 95.100.63.156
          Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
          Source: unknownTCP traffic detected without corresponding DNS query: 95.100.63.156
          Source: unknownTCP traffic detected without corresponding DNS query: 95.100.63.156
          Source: unknownTCP traffic detected without corresponding DNS query: 95.100.63.156
          Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
          Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
          Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
          Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
          Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
          Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
          Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
          Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
          Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
          Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
          Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficDNS traffic detected: DNS query: anviict.com
          Source: global trafficDNS traffic detected: DNS query: challenges.cloudflare.com
          Source: global trafficDNS traffic detected: DNS query: www.google.com
          Source: global trafficDNS traffic detected: DNS query: jvdplumbing.com
          Source: global trafficDNS traffic detected: DNS query: aadcdn.msftauth.net
          Source: global trafficDNS traffic detected: DNS query: outlook.office365.com
          Source: global trafficDNS traffic detected: DNS query: r4.res.office365.com
          Source: global trafficDNS traffic detected: DNS query: dc.services.visualstudio.com
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
          Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
          Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
          Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
          Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
          Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
          Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
          Source: unknownNetwork traffic detected: HTTP traffic on port 49790 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
          Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49787 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
          Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
          Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
          Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
          Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49797
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49794
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49793
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49792
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49791
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49790
          Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
          Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49788
          Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49787
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49786
          Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
          Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49791 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
          Source: unknownNetwork traffic detected: HTTP traffic on port 49788 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49794 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49804
          Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49801
          Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
          Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
          Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
          Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
          Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49797 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49801 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
          Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
          Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
          Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
          Source: unknownNetwork traffic detected: HTTP traffic on port 49786 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49804 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
          Source: unknownNetwork traffic detected: HTTP traffic on port 49792 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
          Source: unknownHTTPS traffic detected: 95.100.63.156:443 -> 192.168.2.16:49717 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 95.100.63.156:443 -> 192.168.2.16:49721 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.16:49732 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.16:49801 version: TLS 1.2
          Source: classification engineClassification label: mal64.phis.win@20/6@24/90
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
          Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 --field-trial-handle=1920,i,17125057666218610495,14990238067885767562,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
          Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://anviict.com/?qvtvxymb"
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 --field-trial-handle=1920,i,17125057666218610495,14990238067885767562,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire Infrastructure1
          Drive-by Compromise
          Windows Management Instrumentation1
          Registry Run Keys / Startup Folder
          1
          Process Injection
          1
          Masquerading
          OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
          Registry Run Keys / Startup Folder
          1
          Process Injection
          LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
          Non-Application Layer Protocol
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
          Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          NameIPActiveMaliciousAntivirus DetectionReputation
          ooc-g2.tm-4.office.com
          52.98.152.242
          truefalse
            unknown
            challenges.cloudflare.com
            104.18.94.41
            truefalse
              unknown
              s-part-0017.t-0009.t-msedge.net
              13.107.246.45
              truefalse
                unknown
                sni1gl.wpc.omegacdn.net
                152.199.21.175
                truefalse
                  unknown
                  anviict.com
                  87.120.125.203
                  truefalse
                    unknown
                    www.google.com
                    142.250.185.196
                    truefalse
                      unknown
                      jvdplumbing.com
                      87.120.125.203
                      truetrue
                        unknown
                        r4.res.office365.com
                        unknown
                        unknownfalse
                          unknown
                          aadcdn.msftauth.net
                          unknown
                          unknownfalse
                            unknown
                            dc.services.visualstudio.com
                            unknown
                            unknownfalse
                              unknown
                              outlook.office365.com
                              unknown
                              unknownfalse
                                unknown
                                NameMaliciousAntivirus DetectionReputation
                                https://anviict.com/?qvtvxymb=8d718709d3a0b0d16ecdfb792886aae2431354c527e9e1bc279fc89714d8d2d24fbbe7c63247e4c04be4f244cd2a3f681e2782a1fb66a29257cd4aa2511ff71ffalse
                                  unknown
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  152.199.19.161
                                  unknownUnited States
                                  15133EDGECASTUSfalse
                                  1.1.1.1
                                  unknownAustralia
                                  13335CLOUDFLARENETUSfalse
                                  13.107.246.45
                                  s-part-0017.t-0009.t-msedge.netUnited States
                                  8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                  20.50.88.241
                                  unknownUnited States
                                  8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                  20.50.88.242
                                  unknownUnited States
                                  8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                  104.18.94.41
                                  challenges.cloudflare.comUnited States
                                  13335CLOUDFLARENETUSfalse
                                  173.194.76.84
                                  unknownUnited States
                                  15169GOOGLEUSfalse
                                  216.58.206.78
                                  unknownUnited States
                                  15169GOOGLEUSfalse
                                  104.18.95.41
                                  unknownUnited States
                                  13335CLOUDFLARENETUSfalse
                                  40.126.32.72
                                  unknownUnited States
                                  8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                  87.120.125.203
                                  anviict.comBulgaria
                                  25206UNACS-AS-BG8000BurgasBGtrue
                                  142.250.185.170
                                  unknownUnited States
                                  15169GOOGLEUSfalse
                                  239.255.255.250
                                  unknownReserved
                                  unknownunknownfalse
                                  142.250.185.196
                                  www.google.comUnited States
                                  15169GOOGLEUSfalse
                                  142.250.185.131
                                  unknownUnited States
                                  15169GOOGLEUSfalse
                                  52.98.152.242
                                  ooc-g2.tm-4.office.comUnited States
                                  8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                  23.10.249.72
                                  unknownUnited States
                                  20940AKAMAI-ASN1EUfalse
                                  172.217.16.195
                                  unknownUnited States
                                  15169GOOGLEUSfalse
                                  IP
                                  192.168.2.16
                                  Joe Sandbox version:41.0.0 Charoite
                                  Analysis ID:1531088
                                  Start date and time:2024-10-10 20:48:42 +02:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:defaultwindowsinteractivecookbook.jbs
                                  Sample URL:https://anviict.com/?qvtvxymb
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:11
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • EGA enabled
                                  Analysis Mode:stream
                                  Analysis stop reason:Timeout
                                  Detection:MAL
                                  Classification:mal64.phis.win@20/6@24/90
                                  • Exclude process from analysis (whitelisted): SgrmBroker.exe, svchost.exe
                                  • Excluded IPs from analysis (whitelisted): 172.217.16.195, 216.58.206.78, 173.194.76.84, 34.104.35.123
                                  • Excluded domains from analysis (whitelisted): fs.microsoft.com, clients2.google.com, accounts.google.com, edgedl.me.gvt1.com, clientservices.googleapis.com, clients.l.google.com
                                  • Not all processes where analyzed, report is missing behavior information
                                  • VT rate limit hit for: https://anviict.com/?qvtvxymb
                                  InputOutput
                                  URL: https://anviict.com/?qvtvxymb=8d718709d3a0b0d16ecdfb792886aae2431354c527e9e1bc279fc89714d8d2d24fbbe7c63247e4c04be4f244cd2a3f681e2782a1fb66a29257cd4aa2511ff71f Model: jbxai
                                  {
                                  "brands":["Cloudflare"],
                                  "text":"Just a moment..... Please stand by,
                                   while we are checking if the site connection is secure",
                                  "contains_trigger_text":false,
                                  "trigger_text":"",
                                  "prominent_button_name":"unknown",
                                  "text_input_field_labels":"unknown",
                                  "pdf_icon_visible":false,
                                  "has_visible_captcha":false,
                                  "has_urgent_text":false,
                                  "has_visible_qrcode":false}
                                  URL: https://anviict.com/?qvtvxymb=8d718709d3a0b0d16ecdfb792886aae2431354c527e9e1bc279fc89714d8d2d24fbbe7c63247e4c04be4f244cd2a3f681e2782a1fb66a29257cd4aa2511ff71f Model: jbxai
                                  {
                                  "brands":[],
                                  "text":"Just a moment..... Please stand by,
                                   while we are checking if the site connection is secure. We need to review the security of your connection before proceeding.",
                                  "contains_trigger_text":true,
                                  "trigger_text":"We need to review the security of your connection before proceeding.",
                                  "prominent_button_name":"unknown",
                                  "text_input_field_labels":"unknown",
                                  "pdf_icon_visible":false,
                                  "has_visible_captcha":false,
                                  "has_urgent_text":false,
                                  "has_visible_qrcode":false}
                                  URL: https://jvdplumbing.com/?9l0l8wrrt=aHR0cHM6Ly9sb2dpbi5taWNyb3NvZnRvbmxpbmUuY29tL2NvbW1vbi9vYXV0aDIvYXV0aG9yaXplP2NsaWVudF9pZD0wMDAwMDAwMi0wMDAwLTBmZjEtY2UwMC0wMDAwMDAwMDAwMDAmcmVkaXJlY3RfdXJpPWh0dHBzJTNhJTJmJTJmb3V0bG9vay5vZmZpY2UuY29tJTJmb3dhJTJmJnJlc291 Model: jbxai
                                  {
                                  "brands":["Microsoft"],
                                  "text":"Outlook",
                                  "contains_trigger_text":false,
                                  "trigger_text":"",
                                  "prominent_button_name":"Next",
                                  "text_input_field_labels":["Sign-in options"],
                                  "pdf_icon_visible":false,
                                  "has_visible_captcha":false,
                                  "has_urgent_text":false,
                                  "has_visible_qrcode":false}
                                  URL: https://jvdplumbing.com/?9l0l8wrrt=aHR0cHM6Ly9sb2dpbi5taWNyb3NvZnRvbmxpbmUuY29tL2NvbW1vbi9vYXV0aDIvYXV0aG9yaXplP2NsaWVudF9pZD0wMDAwMDAwMi0wMDAwLTBmZjEtY2UwMC0wMDAwMDAwMDAwMDAmcmVkaXJlY3RfdXJpPWh0dHBzJTNhJTJmJTJmb3V0bG9vay5vZmZpY2UuY29tJTJmb3dhJTJmJnJlc291 Model: jbxai
                                  {
                                  "brands":["Microsoft"],
                                  "text":"Outlook",
                                  "contains_trigger_text":false,
                                  "trigger_text":"",
                                  "prominent_button_name":"Next",
                                  "text_input_field_labels":["Sign-in options"],
                                  "pdf_icon_visible":false,
                                  "has_visible_captcha":false,
                                  "has_urgent_text":false,
                                  "has_visible_qrcode":false}
                                  URL: https://jvdplumbing.com/?9l0l8wrrt=aHR0cHM6Ly9sb2dpbi5taWNyb3NvZnRvbmxpbmUuY29tL2NvbW1vbi9vYXV0aDIvYXV0aG9yaXplP2NsaWVudF9pZD0wMDAwMDAwMi0wMDAwLTBmZjEtY2UwMC0wMDAwMDAwMDAwMDAmcmVkaXJlY3RfdXJpPWh0dHBzJTNhJTJmJTJmb3V0bG9vay5vZmZpY2UuY29tJTJmb3dhJTJmJnJlc291 Model: jbxai
                                  {
                                  "brands":["Microsoft"],
                                  "text":"Outlook",
                                  "contains_trigger_text":true,
                                  "trigger_text":"Sign in",
                                  "prominent_button_name":"Next",
                                  "text_input_field_labels":["hello",
                                  "No account? Create one!",
                                  "Can't access your account?"],
                                  "pdf_icon_visible":false,
                                  "has_visible_captcha":false,
                                  "has_urgent_text":false,
                                  "has_visible_qrcode":false}
                                  URL: https://jvdplumbing.com/?9l0l8wrrt=aHR0cHM6Ly9sb2dpbi5taWNyb3NvZnRvbmxpbmUuY29tL2NvbW1vbi9vYXV0aDIvYXV0aG9yaXplP2NsaWVudF9pZD0wMDAwMDAwMi0wMDAwLTBmZjEtY2UwMC0wMDAwMDAwMDAwMDAmcmVkaXJlY3RfdXJpPWh0dHBzJTNhJTJmJTJmb3V0bG9vay5vZmZpY2UuY29tJTJmb3dhJTJmJnJlc291 Model: jbxai
                                  {
                                  "brands":["Microsoft"],
                                  "text":"Microsoft Sign in to continue to Outlook hello@microsoft.com No account? Create one!",
                                  "contains_trigger_text":true,
                                  "trigger_text":"Sign in",
                                  "prominent_button_name":"Next",
                                  "text_input_field_labels":["hello@microsoft.com",
                                  "No account? Create one!",
                                  "Can't access your account?"],
                                  "pdf_icon_visible":false,
                                  "has_visible_captcha":false,
                                  "has_urgent_text":false,
                                  "has_visible_qrcode":false}
                                  URL: https://jvdplumbing.com/?9l0l8wrrt=aHR0cHM6Ly9sb2dpbi5taWNyb3NvZnRvbmxpbmUuY29tL2NvbW1vbi9vYXV0aDIvYXV0aG9yaXplP2NsaWVudF9pZD0wMDAwMDAwMi0wMDAwLTBmZjEtY2UwMC0wMDAwMDAwMDAwMDAmcmVkaXJlY3RfdXJpPWh0dHBzJTNhJTJmJTJmb3V0bG9vay5vZmZpY2UuY29tJTJmb3dhJTJmJnJlc291 Model: jbxai
                                  {
                                  "phishing_score":9,
                                  "brands":"Microsoft",
                                  "legit_domain":"microsoft.com",
                                  "classification":"wellknown",
                                  "reasons":["The brand 'Microsoft' is a well-known global technology company.",
                                  "The URL 'jvdplumbing.com' does not match the legitimate domain 'microsoft.com'.",
                                  "The domain 'jvdplumbing.com' appears unrelated to Microsoft and suggests a different business focus,
                                   likely plumbing services.",
                                  "The presence of a Microsoft email in the input fields does not validate the legitimacy of the domain.",
                                  "The URL does not contain any elements that suggest a legitimate association with Microsoft.",
                                  "The domain name does not include any common Microsoft-related terms or subdomains."],
                                  "brand_matches":[false],
                                  "url_match":false,
                                  "brand_input":"Microsoft",
                                  "input_fields":"hello@microsoft.com"}
                                  URL: https://jvdplumbing.com/adfs/ls/?client-request-id=ee0e9392-e34a-20f8-becd-338667c899c0&wa=wsignin1.0&wtrealm=urn%3Afederation%3AMicrosoftOnline&wctx=LoginOptions%3D3%26estsredirect%3D2%26estsrequest%3DrQQIARAAjZE_bBJhAMXv4-jZYm2xLi7G5mIcqgd3HHfckTR6B1hoo Model: jbxai
                                  {
                                  "brands":["Microsoft"],
                                  "text":"Microsoft",
                                  "contains_trigger_text":false,
                                  "trigger_text":"",
                                  "prominent_button_name":"Password",
                                  "text_input_field_labels":["Password"],
                                  "pdf_icon_visible":false,
                                  "has_visible_captcha":false,
                                  "has_urgent_text":false,
                                  "has_visible_qrcode":false}
                                  URL: https://jvdplumbing.com/adfs/ls/?client-request-id=ee0e9392-e34a-20f8-becd-338667c899c0&wa=wsignin1.0&wtrealm=urn%3Afederation%3AMicrosoftOnline&wctx=LoginOptions%3D3%26estsredirect%3D2%26estsrequest%3DrQQIARAAjZE_bBJhAMXv4-jZYm2xLi7G5mIcqgd3HHfckTR6B1hoo Model: jbxai
                                  {
                                  "phishing_score":9,
                                  "brands":"Microsoft",
                                  "legit_domain":"microsoft.com",
                                  "classification":"wellknown",
                                  "reasons":["The brand 'Microsoft' is a well-known global technology company.",
                                  "The legitimate domain for Microsoft is 'microsoft.com'.",
                                  "The provided URL 'jvdplumbing.com' does not match the legitimate domain for Microsoft.",
                                  "The URL 'jvdplumbing.com' appears unrelated to Microsoft and suggests a different business focus,
                                   likely plumbing services.",
                                  "Presence of a password input field on an unrelated domain is suspicious and indicative of phishing."],
                                  "brand_matches":[false],
                                  "url_match":false,
                                  "brand_input":"Microsoft",
                                  "input_fields":"Password"}
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 10 17:49:16 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                  Category:dropped
                                  Size (bytes):2673
                                  Entropy (8bit):3.9914073034011155
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:A09BC676B0B8E577888226374F7B96B1
                                  SHA1:218603C7523C4677239F9772FE59B68D92FF4035
                                  SHA-256:79186EF6DBE96FBB9989DD7EEBCE907D8F5CB005388828B36C3F6DC809AA69F2
                                  SHA-512:6F4D4F8F502FF20E6B3CFE16DD1790664E9C7594A13CCD9D5020EFD4E0D9BFAF81758912FEC1DBAFBA481287B003E57A22F813A1A2F9CEC91ABFA1CC4520DF90
                                  Malicious:false
                                  Reputation:unknown
                                  Preview:L..................F.@.. ...$+.,....3..E...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IJY......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VJY'.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VJY'.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VJY'............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VJY)............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............G.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 10 17:49:16 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                  Category:dropped
                                  Size (bytes):2675
                                  Entropy (8bit):4.007491193010706
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:2C914B55683DCC42DAA352693E03A30D
                                  SHA1:F6408CC38DEA764A3DDBCFCAD4FB9274A8377E4A
                                  SHA-256:5E0930EB75BBF89859A7D4926B0CE65F8845196EA3FA8AE6CA7319943F143E26
                                  SHA-512:6ED0FB0510CF66394B9457502A6467B176C73A1EA21AEF9FD4216A4A1967DABAB0724495BC2F7469FEB90C4B041B83E015DDFE95549BE1086BF080EB8B4BDD5A
                                  Malicious:false
                                  Reputation:unknown
                                  Preview:L..................F.@.. ...$+.,........E...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IJY......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VJY'.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VJY'.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VJY'............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VJY)............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............G.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                  Category:dropped
                                  Size (bytes):2689
                                  Entropy (8bit):4.01331689724129
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:B4A30FA5F69E79484409FCD9BD3A8131
                                  SHA1:7E19B9DB8C79486CF9C3E0FCDC6384020879E7E3
                                  SHA-256:3E11F14336F84D8E6EC7790617949E4AB6230F7D14515B7363785B5867DA0F55
                                  SHA-512:E8AB7A2879C9BF153C6229C79D2F0DCD96F6B6E8B8F19325A57EEA69C65AC6F5C0A505BA396FF8C201B74B3D2E5A72280751C00E81615AA896EF151C51F49D6E
                                  Malicious:false
                                  Reputation:unknown
                                  Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IJY......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VJY'.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VJY'.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VJY'............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............G.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 10 17:49:16 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                  Category:dropped
                                  Size (bytes):2677
                                  Entropy (8bit):4.003350033453788
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:A31A1D9D17A9BFC4F3A7116DA9A6A16C
                                  SHA1:A7B08167B896177169B7D38B6E1723E087D98991
                                  SHA-256:F7528F8ED1E5C07E6A611883150E2B37A45CDF9807138D099635A58F0520B949
                                  SHA-512:239F315A1F7CF3E95B16BDD956938CCCC05CCFC9B2854CB167B91263D5F6619E913F20522553ABFA34940588A4477C2C1D3DB5D4C17E856693FDCFCCBEF884B6
                                  Malicious:false
                                  Reputation:unknown
                                  Preview:L..................F.@.. ...$+.,.....h..E...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IJY......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VJY'.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VJY'.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VJY'............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VJY)............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............G.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 10 17:49:16 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                  Category:dropped
                                  Size (bytes):2677
                                  Entropy (8bit):3.992545935253548
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:CA8138B0762868DFC7A91EAAF0609A31
                                  SHA1:ED83F9913F71A618EF28E3506F685ED464A777D1
                                  SHA-256:458163AEDF2EE350A24C44ACB61F1CD033E3A0AE217B014C031ABB442B2A7318
                                  SHA-512:D5C00659BB0CBA35EDC90ACDDE64FF0609A84A20EC5A6F6FF361E7D594E02473F1E572DF21F0A8864AD41C80AAD444B2D271DB6E312E529FBFE52280BD0FE7CB
                                  Malicious:false
                                  Reputation:unknown
                                  Preview:L..................F.@.. ...$+.,........E...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IJY......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VJY'.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VJY'.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VJY'............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VJY)............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............G.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 10 17:49:16 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                  Category:dropped
                                  Size (bytes):2679
                                  Entropy (8bit):4.002550124378184
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:41F2C87B1405E7DD54931FA103711C10
                                  SHA1:8FD9EC474E70832D9197F2EF7D740939B14038D3
                                  SHA-256:FC98141A7C9601D4550C146B5C6B0D5458894C995A2DC831FE1ED9CE3A64C877
                                  SHA-512:3841BD1094D40F2399D1DF71450AE31106BF22687896A12948094E25EF6E685B86EFB2FD019DDA538F9DB20385A475C4D94304D934A34EC18DC5439FA9A00906
                                  Malicious:false
                                  Reputation:unknown
                                  Preview:L..................F.@.. ...$+.,.....@..E...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IJY......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VJY'.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VJY'.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VJY'............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VJY)............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............G.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                  No static file info