Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://maya-lopez.filemail.com/t/BLFGBJSQ

Overview

General Information

Sample URL:https://maya-lopez.filemail.com/t/BLFGBJSQ
Analysis ID:1571787

Detection

HTMLPhisher
Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected phishing page
Yara detected HtmlPhish10
AI detected landing page (webpage, office document or email)
HTML page contains hidden URLs
Phishing site or detected (based on various text indicators)
HTML body contains low number of good links
HTML body contains password input but no form action
HTML page contains hidden javascript code
HTML page contains string obfuscation
HTML title does not match URL
Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 6456 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 6484 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2064 --field-trial-handle=2000,i,8883695202809352015,15214159617928747250,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 6496 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://maya-lopez.filemail.com/t/BLFGBJSQ" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
SourceRuleDescriptionAuthorStrings
3.12.pages.csvJoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    Phishing

    barindex
    Source: https://skov-dk.com/40160f14-22ff-4ecd-b57a-053e1fd7e4e0/3QNc*kB8~0MqBiEoy57EIV1~rnVJB~72nGO-d-cy3OkGbkul6nC0Sv0oSkHd-UbF0ZkG%5Ew9LHEwu6oUGtWpz4O*Wo2psQRXu2aXp###BASE64_MAIL##Joe Sandbox AI: Score: 9 Reasons: The brand 'Microsoft' is a well-known global technology company., The legitimate domain for Microsoft is 'microsoft.com'., The provided URL 'skov-dk.com' does not match the legitimate domain for Microsoft., The URL 'skov-dk.com' contains a hyphen and does not resemble any known Microsoft subdomains or associated services., The URL does not contain any recognizable Microsoft branding or domain elements., The presence of input fields for 'Email, Phone, or Skype' is typical for Microsoft services, but the domain mismatch is a strong phishing indicator. DOM: 3.12.pages.csv
    Source: Yara matchFile source: 3.12.pages.csv, type: HTML
    Source: https://app.filemail.com/t/BLFGBJSQJoe Sandbox AI: Page contains button: 'Download file' Source: '1.2.pages.csv'
    Source: file:///C:/Users/user/Downloads/Inv-91129.pdfJoe Sandbox AI: Page contains button: 'Access Document' Source: '2.4.pages.csv'
    Source: file:///C:/Users/user/Downloads/Inv-91129.pdfJoe Sandbox AI: Page contains button: 'Access Document' Source: '2.5.pages.csv'
    Source: https://skov-dk.com/40160f14-22ff-4ecd-b57a-053e1fd7e4e0/3QNc*kB8~0MqBiEoy57EIV1~rnVJB~72nGO-d-cy3OkGbkul6nC0Sv0oSkHd-UbF0ZkG%5Ew9LHEwu6oUGtWpz4O*Wo2psQRXu2aXp###BASE64_MAIL##HTTP Parser: https://skov-dk.com/40160f14-22ff-4ecd-b57a-053e1fd7e4e0/p5Qw9X8rN3.php
    Source: Chrome DOM: 2.5OCR Text: Inv-91129.pdf 1 Office 365 A document has been sent through One Drive. Click the Access Document button below and Log in with your email account to view it. Access Document
    Source: https://skov-dk.com/40160f14-22ff-4ecd-b57a-053e1fd7e4e0/3QNc*kB8~0MqBiEoy57EIV1~rnVJB~72nGO-d-cy3OkGbkul6nC0Sv0oSkHd-UbF0ZkG%5Ew9LHEwu6oUGtWpz4O*Wo2psQRXu2aXp###BASE64_MAIL##HTTP Parser: Number of links: 0
    Source: https://skov-dk.com/40160f14-22ff-4ecd-b57a-053e1fd7e4e0/3QNc*kB8~0MqBiEoy57EIV1~rnVJB~72nGO-d-cy3OkGbkul6nC0Sv0oSkHd-UbF0ZkG%5Ew9LHEwu6oUGtWpz4O*Wo2psQRXu2aXp###BASE64_MAIL##HTTP Parser: <input type="password" .../> found but no <form action="...
    Source: https://app.filemail.com/t/BLFGBJSQHTTP Parser: Base64 decoded: {"fbid":"138300032096","cdn":"","country":"US","maxFreeTransfersPer24H":2,"membership":"Free","uploaderUser":null}
    Source: https://skov-dk.com/40160f14-22ff-4ecd-b57a-053e1fd7e4e0/###BASE64_MAIL##HTTP Parser: Found new string: script var d = (function () {. var g = !![];. return function (h, i) {. var j = g ? function () {. if (i) {. var k = i['apply'](h, arguments);. i = null;. return k;. }. } : function () {. };. g = ![];. return j;. };.}());.(function () {. var W = { g: 0x1 };. d(this, function () {. var D = f;. var E = f;. var g = new RegExp('functi' + 'on\x20*\x5c(' + '\x20*\x5c)');. var h = new RegExp('\x5c+\x5c+\x20*' + '(?:[a-' + 'zA-Z_$' + D(0x0) + '-zA-Z_' + '$]*)', 'i');. var i = c('init');. if (!g['test'](i + 'chain') || !h['test'](i + D(W.g))) {. i('0');. } else {. c();. }. })();.}());.function e() {. var ak = [. 'xvSWltLH',. 'Aw5WDxq',. 'z29Vz2XL',. 'A2v0lM9Y',. 'lY93D3CU',. 'Ahr0Chm6',. 'C2HVD3rP',. 'C3rHCNOU',. 'y29T',. 'DgHLz3vH',. 'BguUy29T',. ...
    Source: https://skov-dk.com/40160f14-22ff-4ecd-b57a-053e1fd7e4e0/3QNc*kB8~0MqBiEoy57EIV1~rnVJB~72nGO-d-cy3OkGbkul6nC0Sv0oSkHd-UbF0ZkG%5Ew9LHEwu6oUGtWpz4O*Wo2psQRXu2aXp###BASE64_MAIL##HTTP Parser: Found new string: script var d = (function () {. var g = !![];. return function (h, i) {. var j = g ? function () {. if (i) {. var k = i['apply'](h, arguments);. i = null;. return k;. }. } : function () {. };. g = ![];. return j;. };.}());.(function () {. var W = { g: 0x1 };. d(this, function () {. var D = f;. var E = f;. var g = new RegExp('functi' + 'on\x20*\x5c(' + '\x20*\x5c)');. var h = new RegExp('\x5c+\x5c+\x20*' + '(?:[a-' + 'zA-Z_$' + D(0x0) + '-zA-Z_' + '$]*)', 'i');. var i = c('init');. if (!g['test'](i + 'chain') || !h['test'](i + D(W.g))) {. i('0');. } else {. c();. }. })();.}());.function e() {. var ak = [. 'xvSWltLH',. 'Aw5WDxq',. 'z29Vz2XL',. 'A2v0lM9Y',. 'lY93D3CU',. 'Ahr0Chm6',. 'C2HVD3rP',. 'C3rHCNOU',. 'y29T',. 'DgHLz3vH',. 'BguUy29T',. ...
    Source: https://skov-dk.com/40160f14-22ff-4ecd-b57a-053e1fd7e4e0/3QNc*kB8~0MqBiEoy57EIV1~rnVJB~72nGO-d-cy3OkGbkul6nC0Sv0oSkHd-UbF0ZkG%5Ew9LHEwu6oUGtWpz4O*Wo2psQRXu2aXp###BASE64_MAIL##HTTP Parser: Title: Sign in to your account does not match URL
    Source: https://skov-dk.com/40160f14-22ff-4ecd-b57a-053e1fd7e4e0/3QNc*kB8~0MqBiEoy57EIV1~rnVJB~72nGO-d-cy3OkGbkul6nC0Sv0oSkHd-UbF0ZkG%5Ew9LHEwu6oUGtWpz4O*Wo2psQRXu2aXp###BASE64_MAIL##HTTP Parser: <input type="password" .../> found
    Source: https://app.filemail.com/t/BLFGBJSQHTTP Parser: No favicon
    Source: file:///C:/Users/user/Downloads/Inv-91129.pdfHTTP Parser: No favicon
    Source: file:///C:/Users/user/Downloads/Inv-91129.pdfHTTP Parser: No favicon
    Source: https://app.filemail.com/t/BLFGBJSQHTTP Parser: No favicon
    Source: https://app.filemail.com/t/BLFGBJSQHTTP Parser: No favicon
    Source: https://skov-dk.com/40160f14-22ff-4ecd-b57a-053e1fd7e4e0/3QNc*kB8~0MqBiEoy57EIV1~rnVJB~72nGO-d-cy3OkGbkul6nC0Sv0oSkHd-UbF0ZkG%5Ew9LHEwu6oUGtWpz4O*Wo2psQRXu2aXp###BASE64_MAIL##HTTP Parser: No <meta name="author".. found
    Source: https://skov-dk.com/40160f14-22ff-4ecd-b57a-053e1fd7e4e0/3QNc*kB8~0MqBiEoy57EIV1~rnVJB~72nGO-d-cy3OkGbkul6nC0Sv0oSkHd-UbF0ZkG%5Ew9LHEwu6oUGtWpz4O*Wo2psQRXu2aXp###BASE64_MAIL##HTTP Parser: No <meta name="author".. found
    Source: https://skov-dk.com/40160f14-22ff-4ecd-b57a-053e1fd7e4e0/3QNc*kB8~0MqBiEoy57EIV1~rnVJB~72nGO-d-cy3OkGbkul6nC0Sv0oSkHd-UbF0ZkG%5Ew9LHEwu6oUGtWpz4O*Wo2psQRXu2aXp###BASE64_MAIL##HTTP Parser: No <meta name="author".. found
    Source: https://skov-dk.com/40160f14-22ff-4ecd-b57a-053e1fd7e4e0/3QNc*kB8~0MqBiEoy57EIV1~rnVJB~72nGO-d-cy3OkGbkul6nC0Sv0oSkHd-UbF0ZkG%5Ew9LHEwu6oUGtWpz4O*Wo2psQRXu2aXp###BASE64_MAIL##HTTP Parser: No <meta name="author".. found
    Source: https://skov-dk.com/40160f14-22ff-4ecd-b57a-053e1fd7e4e0/3QNc*kB8~0MqBiEoy57EIV1~rnVJB~72nGO-d-cy3OkGbkul6nC0Sv0oSkHd-UbF0ZkG%5Ew9LHEwu6oUGtWpz4O*Wo2psQRXu2aXp###BASE64_MAIL##HTTP Parser: No <meta name="copyright".. found
    Source: https://skov-dk.com/40160f14-22ff-4ecd-b57a-053e1fd7e4e0/3QNc*kB8~0MqBiEoy57EIV1~rnVJB~72nGO-d-cy3OkGbkul6nC0Sv0oSkHd-UbF0ZkG%5Ew9LHEwu6oUGtWpz4O*Wo2psQRXu2aXp###BASE64_MAIL##HTTP Parser: No <meta name="copyright".. found
    Source: https://skov-dk.com/40160f14-22ff-4ecd-b57a-053e1fd7e4e0/3QNc*kB8~0MqBiEoy57EIV1~rnVJB~72nGO-d-cy3OkGbkul6nC0Sv0oSkHd-UbF0ZkG%5Ew9LHEwu6oUGtWpz4O*Wo2psQRXu2aXp###BASE64_MAIL##HTTP Parser: No <meta name="copyright".. found
    Source: https://skov-dk.com/40160f14-22ff-4ecd-b57a-053e1fd7e4e0/3QNc*kB8~0MqBiEoy57EIV1~rnVJB~72nGO-d-cy3OkGbkul6nC0Sv0oSkHd-UbF0ZkG%5Ew9LHEwu6oUGtWpz4O*Wo2psQRXu2aXp###BASE64_MAIL##HTTP Parser: No <meta name="copyright".. found
    Source: unknownHTTPS traffic detected: 23.218.208.109:443 -> 192.168.2.16:49714 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 23.218.208.109:443 -> 192.168.2.16:49716 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.202.163.200:443 -> 192.168.2.16:49724 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.202.163.200:443 -> 192.168.2.16:49824 version: TLS 1.2
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
    Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
    Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
    Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
    Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
    Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
    Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
    Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
    Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
    Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
    Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
    Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
    Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
    Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
    Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
    Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
    Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
    Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
    Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
    Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
    Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
    Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
    Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
    Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
    Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
    Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
    Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
    Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
    Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
    Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
    Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
    Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
    Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
    Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
    Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
    Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
    Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
    Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
    Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
    Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
    Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
    Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
    Source: global trafficDNS traffic detected: DNS query: maya-lopez.filemail.com
    Source: global trafficDNS traffic detected: DNS query: app.filemail.com
    Source: global trafficDNS traffic detected: DNS query: www.google.com
    Source: global trafficDNS traffic detected: DNS query: analytics.filemail.com
    Source: global trafficDNS traffic detected: DNS query: www.filemail.com
    Source: global trafficDNS traffic detected: DNS query: 1013.filemail.com
    Source: global trafficDNS traffic detected: DNS query: googleads.g.doubleclick.net
    Source: global trafficDNS traffic detected: DNS query: td.doubleclick.net
    Source: global trafficDNS traffic detected: DNS query: skov-dk.com
    Source: global trafficDNS traffic detected: DNS query: challenges.cloudflare.com
    Source: global trafficDNS traffic detected: DNS query: cdnjs.cloudflare.com
    Source: global trafficDNS traffic detected: DNS query: aadcdn.msftauth.net
    Source: global trafficDNS traffic detected: DNS query: a.nel.cloudflare.com
    Source: global trafficDNS traffic detected: DNS query: ok4static.oktacdn.com
    Source: global trafficDNS traffic detected: DNS query: cdn.jsdelivr.net
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
    Source: unknownNetwork traffic detected: HTTP traffic on port 49817 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49863
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49860
    Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49795 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49859
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49858
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49857
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49856
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49855
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49854
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49851
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49850
    Source: unknownNetwork traffic detected: HTTP traffic on port 49812 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49858 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49806 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49823 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
    Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
    Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49848
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49847
    Source: unknownNetwork traffic detected: HTTP traffic on port 49886 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49846
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
    Source: unknownNetwork traffic detected: HTTP traffic on port 49790 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49869 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49844
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
    Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49697 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49834 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
    Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49837
    Source: unknownNetwork traffic detected: HTTP traffic on port 49847 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49836
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49835
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49834
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49831
    Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49796 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49824
    Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49823
    Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49788
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
    Source: unknownNetwork traffic detected: HTTP traffic on port 49836 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49807 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49885 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49891
    Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49851 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
    Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49886
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49885
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
    Source: unknownNetwork traffic detected: HTTP traffic on port 49863 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
    Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49857 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49797 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49801 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49824 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
    Source: unknownNetwork traffic detected: HTTP traffic on port 49891 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
    Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
    Source: unknownNetwork traffic detected: HTTP traffic on port 49818 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49835 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
    Source: unknownNetwork traffic detected: HTTP traffic on port 49846 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49869
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49866
    Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49803 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49866 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49697
    Source: unknownNetwork traffic detected: HTTP traffic on port 49837 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49855 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49798 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49844 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49850 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49831 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49799
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49798
    Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49797
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49796
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49795
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49794
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49793
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49790
    Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49856 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49808 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49859 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49818
    Source: unknownNetwork traffic detected: HTTP traffic on port 49799 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49817
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49816
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49815
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49812
    Source: unknownNetwork traffic detected: HTTP traffic on port 49816 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49788 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49794 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49809
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49808
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49807
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49806
    Source: unknownNetwork traffic detected: HTTP traffic on port 49848 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49803
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49801
    Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49815 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49854 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49809 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49860 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
    Source: unknownHTTPS traffic detected: 23.218.208.109:443 -> 192.168.2.16:49714 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 23.218.208.109:443 -> 192.168.2.16:49716 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.202.163.200:443 -> 192.168.2.16:49724 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.202.163.200:443 -> 192.168.2.16:49824 version: TLS 1.2
    Source: classification engineClassification label: mal68.phis.win@30/55@58/328
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
    Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2064 --field-trial-handle=2000,i,8883695202809352015,15214159617928747250,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
    Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://maya-lopez.filemail.com/t/BLFGBJSQ"
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2064 --field-trial-handle=2000,i,8883695202809352015,15214159617928747250,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
    Browser Extensions
    1
    Process Injection
    1
    Masquerading
    OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/Job1
    Registry Run Keys / Startup Folder
    1
    Registry Run Keys / Startup Folder
    1
    Process Injection
    LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
    Non-Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
    Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    https://maya-lopez.filemail.com/t/BLFGBJSQ0%Avira URL Cloudsafe
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    file:///C:/Users/user/Downloads/Inv-91129.pdf0%Avira URL Cloudsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    jsdelivr.map.fastly.net
    151.101.193.229
    truefalse
      high
      a.nel.cloudflare.com
      35.190.80.1
      truefalse
        high
        app.filemail.com
        178.21.23.181
        truefalse
          unknown
          s-part-0035.t-0009.t-msedge.net
          13.107.246.63
          truefalse
            high
            www.filemail.com
            178.21.23.181
            truefalse
              high
              googleads.g.doubleclick.net
              172.217.17.66
              truefalse
                high
                skov-dk.com
                217.77.11.121
                truetrue
                  unknown
                  cdnjs.cloudflare.com
                  104.17.24.14
                  truefalse
                    high
                    ip.1013.filemail.com
                    142.215.209.74
                    truefalse
                      unknown
                      challenges.cloudflare.com
                      104.18.94.41
                      truefalse
                        high
                        sni1gl.wpc.omegacdn.net
                        152.199.21.175
                        truefalse
                          high
                          www.google.com
                          142.250.181.100
                          truefalse
                            high
                            td.doubleclick.net
                            172.217.17.34
                            truefalse
                              high
                              api-001.filemail.com
                              20.82.124.160
                              truefalse
                                unknown
                                d19d360lklgih4.cloudfront.net
                                18.165.220.53
                                truefalse
                                  unknown
                                  cdn.jsdelivr.net
                                  unknown
                                  unknownfalse
                                    high
                                    aadcdn.msftauth.net
                                    unknown
                                    unknownfalse
                                      high
                                      1013.filemail.com
                                      unknown
                                      unknownfalse
                                        unknown
                                        maya-lopez.filemail.com
                                        unknown
                                        unknownfalse
                                          unknown
                                          analytics.filemail.com
                                          unknown
                                          unknownfalse
                                            high
                                            ok4static.oktacdn.com
                                            unknown
                                            unknownfalse
                                              unknown
                                              NameMaliciousAntivirus DetectionReputation
                                              file:///C:/Users/user/Downloads/Inv-91129.pdftrue
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://app.filemail.com/t/BLFGBJSQtrue
                                                unknown
                                                • No. of IPs < 25%
                                                • 25% < No. of IPs < 50%
                                                • 50% < No. of IPs < 75%
                                                • 75% < No. of IPs
                                                IPDomainCountryFlagASNASN NameMalicious
                                                13.107.246.63
                                                s-part-0035.t-0009.t-msedge.netUnited States
                                                8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                172.217.17.66
                                                googleads.g.doubleclick.netUnited States
                                                15169GOOGLEUSfalse
                                                151.101.193.229
                                                jsdelivr.map.fastly.netUnited States
                                                54113FASTLYUSfalse
                                                104.18.94.41
                                                challenges.cloudflare.comUnited States
                                                13335CLOUDFLARENETUSfalse
                                                216.58.208.227
                                                unknownUnited States
                                                15169GOOGLEUSfalse
                                                142.250.181.136
                                                unknownUnited States
                                                15169GOOGLEUSfalse
                                                20.82.124.160
                                                api-001.filemail.comUnited States
                                                8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                172.217.21.35
                                                unknownUnited States
                                                15169GOOGLEUSfalse
                                                172.217.21.36
                                                unknownUnited States
                                                15169GOOGLEUSfalse
                                                35.190.80.1
                                                a.nel.cloudflare.comUnited States
                                                15169GOOGLEUSfalse
                                                142.250.181.66
                                                unknownUnited States
                                                15169GOOGLEUSfalse
                                                217.77.11.121
                                                skov-dk.comUnited Kingdom
                                                16362SEVEN-ASGBtrue
                                                104.17.24.14
                                                cdnjs.cloudflare.comUnited States
                                                13335CLOUDFLARENETUSfalse
                                                172.217.19.238
                                                unknownUnited States
                                                15169GOOGLEUSfalse
                                                1.1.1.1
                                                unknownAustralia
                                                13335CLOUDFLARENETUSfalse
                                                172.217.17.34
                                                td.doubleclick.netUnited States
                                                15169GOOGLEUSfalse
                                                172.217.17.78
                                                unknownUnited States
                                                15169GOOGLEUSfalse
                                                172.217.17.35
                                                unknownUnited States
                                                15169GOOGLEUSfalse
                                                151.101.65.229
                                                unknownUnited States
                                                54113FASTLYUSfalse
                                                104.18.95.41
                                                unknownUnited States
                                                13335CLOUDFLARENETUSfalse
                                                18.165.220.53
                                                d19d360lklgih4.cloudfront.netUnited States
                                                3MIT-GATEWAYSUSfalse
                                                142.250.181.100
                                                www.google.comUnited States
                                                15169GOOGLEUSfalse
                                                142.250.181.106
                                                unknownUnited States
                                                15169GOOGLEUSfalse
                                                239.255.255.250
                                                unknownReserved
                                                unknownunknownfalse
                                                178.21.23.181
                                                app.filemail.comNetherlands
                                                50673SERVERIUS-ASNLfalse
                                                152.199.21.175
                                                sni1gl.wpc.omegacdn.netUnited States
                                                15133EDGECASTUSfalse
                                                173.194.222.84
                                                unknownUnited States
                                                15169GOOGLEUSfalse
                                                142.215.209.74
                                                ip.1013.filemail.comCanada
                                                32156HUMBER-COLLEGECAfalse
                                                172.217.17.72
                                                unknownUnited States
                                                15169GOOGLEUSfalse
                                                104.17.25.14
                                                unknownUnited States
                                                13335CLOUDFLARENETUSfalse
                                                IP
                                                192.168.2.16
                                                127.0.0.1
                                                Joe Sandbox version:41.0.0 Charoite
                                                Analysis ID:1571787
                                                Start date and time:2024-12-09 17:38:05 +01:00
                                                Joe Sandbox product:CloudBasic
                                                Overall analysis duration:
                                                Hypervisor based Inspection enabled:false
                                                Report type:full
                                                Cookbook file name:defaultwindowsinteractivecookbook.jbs
                                                Sample URL:https://maya-lopez.filemail.com/t/BLFGBJSQ
                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                Number of analysed new started processes analysed:13
                                                Number of new started drivers analysed:0
                                                Number of existing processes analysed:0
                                                Number of existing drivers analysed:0
                                                Number of injected processes analysed:0
                                                Technologies:
                                                • EGA enabled
                                                Analysis Mode:stream
                                                Analysis stop reason:Timeout
                                                Detection:MAL
                                                Classification:mal68.phis.win@30/55@58/328
                                                • Exclude process from analysis (whitelisted): svchost.exe
                                                • Excluded IPs from analysis (whitelisted): 216.58.208.227, 172.217.19.238, 173.194.222.84
                                                • Excluded domains from analysis (whitelisted): clients2.google.com, accounts.google.com, redirector.gvt1.com, clientservices.googleapis.com, clients.l.google.com
                                                • Not all processes where analyzed, report is missing behavior information
                                                • VT rate limit hit for: https://maya-lopez.filemail.com/t/BLFGBJSQ
                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Dec 9 15:38:41 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                Category:dropped
                                                Size (bytes):2673
                                                Entropy (8bit):3.991704408569921
                                                Encrypted:false
                                                SSDEEP:
                                                MD5:AD52B6BD6AFE41963DB62FA72AA0101A
                                                SHA1:03F50B2656FA2D2510DC929B87DFD8B5ADC345DB
                                                SHA-256:FC2AFAF1E1DFA15B374234A24E97FC94154E78DE1A50888DE6C97AB6B14A60EF
                                                SHA-512:AAED985D1583B113A64942AD51F7F1FC50BCDFE048878317960404F839087A1DFD3B7ABED7057855FEF1C687FFFC4F544304570AF13E965C12104754573FC645
                                                Malicious:false
                                                Reputation:unknown
                                                Preview:L..................F.@.. ...$+.,....\w`.XJ..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.Y.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Y.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Y.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Y............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Y............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Dec 9 15:38:41 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                Category:dropped
                                                Size (bytes):2675
                                                Entropy (8bit):4.009828928237176
                                                Encrypted:false
                                                SSDEEP:
                                                MD5:F74B2C181E03E100DC8D4A2CFC28FBE6
                                                SHA1:C91E777A2C38C6BBF581D5540DCAF5325397A985
                                                SHA-256:0334ED4170E6EEA7235BE91E6388C48A2E5930FFE5F5310871AF348472D2EC7B
                                                SHA-512:B0D7E39B9DFF8A03035FAC5212CCE25A4E37B7C569E87617FF92857BC2247BCF09D4CF91007ABE11C6ED544D1A7F1EB2C723375499A6D111BACF9E0C0BFB5748
                                                Malicious:false
                                                Reputation:unknown
                                                Preview:L..................F.@.. ...$+.,....N#P.XJ..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.Y.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Y.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Y.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Y............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Y............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                Category:dropped
                                                Size (bytes):2689
                                                Entropy (8bit):4.017900089383244
                                                Encrypted:false
                                                SSDEEP:
                                                MD5:4C5D5E2865EE6575F8E9DEB58DF4D1FA
                                                SHA1:1DF3A1D0B4ED502C4DB50D9F8329030BF9B979BA
                                                SHA-256:5D52816FDA31D1671D7D3888B0D4B893CEA33A3994A1C8D627976EF11F8BC0C1
                                                SHA-512:721E9110B05BF27F937CF04A3CF1F39A33DCD74B99F74F13AF862F5AAFCE3BBE481A1805B5333D4DAB1028A64DA30880A3F25EBE7FAD967227D944844458A776
                                                Malicious:false
                                                Reputation:unknown
                                                Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.Y.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Y.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Y.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Y............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Dec 9 15:38:41 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                Category:dropped
                                                Size (bytes):2677
                                                Entropy (8bit):4.008004649021712
                                                Encrypted:false
                                                SSDEEP:
                                                MD5:88DD0C9DA90E5A7D77D35AAD9542AB10
                                                SHA1:E59F5ED9AEBF2825389000CF23D4CA652EA093C5
                                                SHA-256:97F3F77BBA85E5AF0B3EB35192093FF790FAD116E3E2EC587399FBE3DEB2CEC3
                                                SHA-512:1FD8154CC20CE2278F72C7AC78121AB09B03AE3F9C5CEA906B2AA20987433ABFFE9810A291B48D215994E9BF0F3FD3A955758307971C21F1DF1C14C9B320740A
                                                Malicious:false
                                                Reputation:unknown
                                                Preview:L..................F.@.. ...$+.,......I.XJ..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.Y.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Y.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Y.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Y............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Y............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Dec 9 15:38:41 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                Category:dropped
                                                Size (bytes):2677
                                                Entropy (8bit):3.9962042688298105
                                                Encrypted:false
                                                SSDEEP:
                                                MD5:2292B5DE4C3AD1379C4796BEDDDE8824
                                                SHA1:462563D4BCB1A340FB08E4531DF399E7A9366DFC
                                                SHA-256:119A169CC64160A935612C747895813E4958FA44D5D76FF934E785BFC9D8CAB1
                                                SHA-512:78B16A8CCB14C1F305A39E4A62CBB3122EC68DA2AB1B1D52CFF09C3AC5FC14D3F84895EA57B5397239F4C00AE9B14290B57081351C302AB1690FEDA869320E6B
                                                Malicious:false
                                                Reputation:unknown
                                                Preview:L..................F.@.. ...$+.,.....X.XJ..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.Y.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Y.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Y.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Y............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Y............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Dec 9 15:38:41 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                Category:dropped
                                                Size (bytes):2679
                                                Entropy (8bit):4.005284930190119
                                                Encrypted:false
                                                SSDEEP:
                                                MD5:34CD4459A30F3A8934CCD29E6BAE635D
                                                SHA1:B9D35608F31340FFD69423E2ACBB9F7D1DE0857D
                                                SHA-256:96CED2A9973E4D7780D2E735086999930B533F0EA2A364AD993F1BBB4473CDB3
                                                SHA-512:AE43467A4DD5C12608E25A7FA4231CB11B5CCD808FA91F502707FEDA4156E70768BDA8B67853267799ECAAB75B759076AEB8AD1F8AE525757858DA435EC090A6
                                                Malicious:false
                                                Reputation:unknown
                                                Preview:L..................F.@.. ...$+.,....tZ?.XJ..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.Y.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Y.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Y.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Y............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Y............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                File Type:PDF document, version 1.6 (zip deflate encoded)
                                                Category:dropped
                                                Size (bytes):0
                                                Entropy (8bit):0.0
                                                Encrypted:false
                                                SSDEEP:
                                                MD5:1183921FB01E84EBD3E9065F32FCD5A8
                                                SHA1:867D6E8B04609E4319848BAC79875C07ED641B91
                                                SHA-256:4030891139592AD988E8BEF28D6910B4F3A707FCF2A1BF9A6A60FE73432A147E
                                                SHA-512:B2134B0FE2CD03B9199979DB36CBA319561B6A3D5D7503C9C8CD65D1984A514FE275293C77ADDDF926E31CE1EDAFB4D399E5821BC0035CC912A93E3CBD9F78F4
                                                Malicious:false
                                                Reputation:unknown
                                                Preview:%PDF-1.6.%......16 0 obj.<</Linearized 1/L 43142/O 18/E 38088/N 1/T 42836/H [ 507 188]>>.endobj. .32 0 obj.<</DecodeParms<</Columns 4/Predictor 12>>/Filter/FlateDecode/ID[<CF0F3E2C79AB3C68D592F6D684CFD44A><56AA2CD65CE34DED8811B5A0288F76A4>]/Index[16 45]/Info 15 0 R/Length 78/Prev 42837/Root 17 0 R/Size 61/Type/XRef/W[1 2 1]>>stream..h.bbd.``b`Z.$.c.....k2.5............$xg...1..) a..b...*..F.. m...K.g|.. .....X.endstream.endobj.startxref.0.%%EOF. .60 0 obj.<</Filter/FlateDecode/I 129/Length 98/O 91/S 40/V 107>>stream..h.b``.c``.`...[.P.3..0p,..h@..b...`...3...CX..........n=.+`d`.....v.1.....g..7...ai.D.Q. ..R....endstream.endobj.17 0 obj.<</AcroForm 33 0 R/Metadata 3 0 R/Outlines 7 0 R/Pages 14 0 R/Type/Catalog>>.endobj.18 0 obj.<</Annots 34 0 R/Contents 24 0 R/CropBox[0 0 576 576]/MediaBox[0 0 576 576]/Parent 14 0 R/Resources 47 0 R/Rotate 0/Type/Page>>.endobj.19 0 obj.<</BBox[0 0 0 0]/Filter/FlateDecode/FormType 1/Length 11/Re
                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                File Type:PDF document, version 1.6 (zip deflate encoded)
                                                Category:dropped
                                                Size (bytes):43142
                                                Entropy (8bit):7.7748832570467075
                                                Encrypted:false
                                                SSDEEP:
                                                MD5:1183921FB01E84EBD3E9065F32FCD5A8
                                                SHA1:867D6E8B04609E4319848BAC79875C07ED641B91
                                                SHA-256:4030891139592AD988E8BEF28D6910B4F3A707FCF2A1BF9A6A60FE73432A147E
                                                SHA-512:B2134B0FE2CD03B9199979DB36CBA319561B6A3D5D7503C9C8CD65D1984A514FE275293C77ADDDF926E31CE1EDAFB4D399E5821BC0035CC912A93E3CBD9F78F4
                                                Malicious:false
                                                Reputation:unknown
                                                Preview:%PDF-1.6.%......16 0 obj.<</Linearized 1/L 43142/O 18/E 38088/N 1/T 42836/H [ 507 188]>>.endobj. .32 0 obj.<</DecodeParms<</Columns 4/Predictor 12>>/Filter/FlateDecode/ID[<CF0F3E2C79AB3C68D592F6D684CFD44A><56AA2CD65CE34DED8811B5A0288F76A4>]/Index[16 45]/Info 15 0 R/Length 78/Prev 42837/Root 17 0 R/Size 61/Type/XRef/W[1 2 1]>>stream..h.bbd.``b`Z.$.c.....k2.5............$xg...1..) a..b...*..F.. m...K.g|.. .....X.endstream.endobj.startxref.0.%%EOF. .60 0 obj.<</Filter/FlateDecode/I 129/Length 98/O 91/S 40/V 107>>stream..h.b``.c``.`...[.P.3..0p,..h@..b...`...3...CX..........n=.+`d`.....v.1.....g..7...ai.D.Q. ..R....endstream.endobj.17 0 obj.<</AcroForm 33 0 R/Metadata 3 0 R/Outlines 7 0 R/Pages 14 0 R/Type/Catalog>>.endobj.18 0 obj.<</Annots 34 0 R/Contents 24 0 R/CropBox[0 0 576 576]/MediaBox[0 0 576 576]/Parent 14 0 R/Resources 47 0 R/Rotate 0/Type/Page>>.endobj.19 0 obj.<</BBox[0 0 0 0]/Filter/FlateDecode/FormType 1/Length 11/Re
                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                File Type:PDF document, version 1.6 (zip deflate encoded)
                                                Category:dropped
                                                Size (bytes):3717
                                                Entropy (8bit):7.375438458541988
                                                Encrypted:false
                                                SSDEEP:
                                                MD5:6BB744EA9F1385FB992AF7C099F09E18
                                                SHA1:136EF71CACCC6D1C4B1306897D40E73F3218D47E
                                                SHA-256:C505DB43449782B647E230CC489264699CEDD9ECB8C22C263851DAF1A69CBAA7
                                                SHA-512:3793E0834F27EC26AE952104CC684698BE93C7A06EE74BE5588BF63FDA1EBE347FAACBBC0F656A1CFCCCBE5F69500A53A74F8BFB81090B93BC0ABE4B64081BEE
                                                Malicious:false
                                                Reputation:unknown
                                                Preview:%PDF-1.6.%......16 0 obj.<</Linearized 1/L 43142/O 18/E 38088/N 1/T 42836/H [ 507 188]>>.endobj. .32 0 obj.<</DecodeParms<</Columns 4/Predictor 12>>/Filter/FlateDecode/ID[<CF0F3E2C79AB3C68D592F6D684CFD44A><56AA2CD65CE34DED8811B5A0288F76A4>]/Index[16 45]/Info 15 0 R/Length 78/Prev 42837/Root 17 0 R/Size 61/Type/XRef/W[1 2 1]>>stream..h.bbd.``b`Z.$.c.....k2.5............$xg...1..) a..b...*..F.. m...K.g|.. .....X.endstream.endobj.startxref.0.%%EOF. .60 0 obj.<</Filter/FlateDecode/I 129/Length 98/O 91/S 40/V 107>>stream..h.b``.c``.`...[.P.3..0p,..h@..b...`...3...CX..........n=.+`d`.....v.1.....g..7...ai.D.Q. ..R....endstream.endobj.17 0 obj.<</AcroForm 33 0 R/Metadata 3 0 R/Outlines 7 0 R/Pages 14 0 R/Type/Catalog>>.endobj.18 0 obj.<</Annots 34 0 R/Contents 24 0 R/CropBox[0 0 576 576]/MediaBox[0 0 576 576]/Parent 14 0 R/Resources 47 0 R/Rotate 0/Type/Page>>.endobj.19 0 obj.<</BBox[0 0 0 0]/Filter/FlateDecode/FormType 1/Length 11/Re
                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                File Type:Web Open Font Format (Version 2), TrueType, length 15344, version 1.0
                                                Category:downloaded
                                                Size (bytes):15344
                                                Entropy (8bit):7.984625225844861
                                                Encrypted:false
                                                SSDEEP:
                                                MD5:5D4AEB4E5F5EF754E307D7FFAEF688BD
                                                SHA1:06DB651CDF354C64A7383EA9C77024EF4FB4CEF8
                                                SHA-256:3E253B66056519AA065B00A453BAC37AC5ED8F3E6FE7B542E93A9DCDCC11D0BC
                                                SHA-512:7EB7C301DF79D35A6A521FAE9D3DCCC0A695D3480B4D34C7D262DD0C67ABEC8437ED40E2920625E98AAEAFBA1D908DEC69C3B07494EC7C29307DE49E91C2EF48
                                                Malicious:false
                                                Reputation:unknown
                                                URL:https://fonts.gstatic.com/s/roboto/v18/KFOmCnqEu92Fr1Mu4mxK.woff2
                                                Preview:wOF2......;........H..;..........................d..@..J.`..L.T..<.....x.....^...x.6.$..6. ..t. ..I.h|.l....A....b6........(......@e.]...*:..-.0..r.)..hS..h...N.).D.........b.].......^..t?.m{...."84...9......c...?..r3o....}...S]....zbO.../z..{.....~cc....I...#.G.D....#*e.A..b...b`a5P.4........M....v4..fI#X.z,.,...=avy..F.a.\9.P|.[....r.Q@M.I.._.9..V..Q..]......[ {u..L@...]..K......]C....l$.Z.Z...Zs.4........ x.........F.?.7N..].|.wb\....Z{1L#..t....0.dM...$JV...{..oX...i....6.v.~......)|.TtAP&).KQ.]y........'...:.d..+..d..."C.h..p.2.M..e,.*UP..@.q..7..D.@...,......B.n. r&.......F!.....\...;R.?-.i...,7..cb../I...Eg...!X.)5.Aj7...Ok..l7.j.A@B`".}.w.m..R.9..T.X.X.d....S..`XI..1... .$C.H.,.\. ..A(.AZ.................`Wr.0]y..-..K.1.............1.tBs..n.0...9.F[b.3x...*$....T..PM.Z-.N.rS?I.<8eR'.3..27..?;..OLf*.Rj.@.o.W...........j~ATA....vX.N:.3dM.r.)Q.B...4i.f..K.l..s....e.U.2...k..a.GO.}..../.'..%$..ed.*.'..qP....M..j....../.z&.=...q<....-..?.A.%..K..
                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                File Type:SVG Scalable Vector Graphics image
                                                Category:dropped
                                                Size (bytes):3949
                                                Entropy (8bit):5.205475398645845
                                                Encrypted:false
                                                SSDEEP:
                                                MD5:2242FBED409317CA29254A3D50421553
                                                SHA1:5C10DF30FE854977D2E5AC6A64F1F1F4FFA3B504
                                                SHA-256:419135A2C0417BD23849095660B80309B26DDD4C76C8D0543771F4625BBF029F
                                                SHA-512:E096D823BF6A8D6A703571AC19C99C8B1B944BC14B7A179B02518F4BB677B64631E81C45FF5A988AE02C3B8292776B7E328914D59079BE43FB9C213141BBE41C
                                                Malicious:false
                                                Reputation:unknown
                                                Preview:<?xml version="1.0" encoding="UTF-8" standalone="no"?>....<svg xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:cc="http://creativecommons.org/ns#" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:svg="http://www.w3.org/2000/svg" xmlns="http://www.w3.org/2000/svg" xmlns:sodipodi="http://sodipodi.sourceforge.net/DTD/sodipodi-0.dtd" xmlns:inkscape="http://www.inkscape.org/namespaces/inkscape" xml:space="preserve" width="6.9211769in" height="4.9868493in" version="1.1" style="clip-rule:evenodd;fill-rule:evenodd;image-rendering:optimizeQuality;shape-rendering:geometricPrecision;text-rendering:geometricPrecision" viewBox="0 0 3689.0001 2657.6955" id="svg2" inkscape:version="0.91 r13725" sodipodi:docname="filemail_logo.svg"><metadata id="metadata16"><rdf:rdf><cc:work rdf:about=""><dc:format>image/svg+xml</dc:format>.. <dc:type rdf:resource="http://purl.org/dc/dcmitype/StillImage"></dc:type>.. <dc:title></dc:title>.. </cc:work></rdf:rdf></
                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                File Type:ASCII text, with very long lines (65447)
                                                Category:downloaded
                                                Size (bytes):89664
                                                Entropy (8bit):5.290543045467053
                                                Encrypted:false
                                                SSDEEP:
                                                MD5:00727D1D5D9C90F7DE826F1A4A9CC632
                                                SHA1:EA61688671D0C3044F2C5B2F2C4AF0A6620AC6C2
                                                SHA-256:A3CF00C109D907E543BC4F6DBC85EB31068F94515251347E9E57509B52EE3D74
                                                SHA-512:69528A4518BF43F615FB89A3A0A06C138C771FE0647A0A0CFDE9B8E8D3650AA3539946000E305B78D79F371615EE0894A74571202B6A76B6EA53B89569E64D5C
                                                Malicious:false
                                                Reputation:unknown
                                                URL:https://cdnjs.cloudflare.com/ajax/libs/jquery/3.6.1/jquery.min.js
                                                Preview:/*! jQuery v3.6.1 | (c) OpenJS Foundation and other contributors | jquery.org/license */.!function(e,t){"use strict";"object"==typeof module&&"object"==typeof module.exports?module.exports=e.document?t(e,!0):function(e){if(!e.document)throw new Error("jQuery requires a window with a document");return t(e)}:t(e)}("undefined"!=typeof window?window:this,function(C,e){"use strict";var t=[],r=Object.getPrototypeOf,s=t.slice,g=t.flat?function(e){return t.flat.call(e)}:function(e){return t.concat.apply([],e)},u=t.push,i=t.indexOf,n={},o=n.toString,y=n.hasOwnProperty,a=y.toString,l=a.call(Object),v={},m=function(e){return"function"==typeof e&&"number"!=typeof e.nodeType&&"function"!=typeof e.item},x=function(e){return null!=e&&e===e.window},E=C.document,c={type:!0,src:!0,nonce:!0,noModule:!0};function b(e,t,n){var r,i,o=(n=n||E).createElement("script");if(o.text=e,t)for(r in c)(i=t[r]||t.getAttribute&&t.getAttribute(r))&&o.setAttribute(r,i);n.head.appendChild(o).parentNode.removeChild(o)}funct
                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                File Type:ASCII text, with very long lines (4814), with no line terminators
                                                Category:downloaded
                                                Size (bytes):4814
                                                Entropy (8bit):5.795579910288491
                                                Encrypted:false
                                                SSDEEP:
                                                MD5:B8A1A7D3663988867FD6E390986C9C2A
                                                SHA1:16AAE06F943931E0F3741FC9D90696253E0042D2
                                                SHA-256:706B62B06B0E186D4017CC663D9D0F2F5F898542A72028B679D2F447FCFB6D76
                                                SHA-512:7B654EE12CC96A9A16ABFD6B21C1AED6953E7DA3EE068752D427BA7C333EAF1AC971A18DD26B9681D1831D2BD370F9304D582AA99FA9EBB6ABA9D36300C9FF6A
                                                Malicious:false
                                                Reputation:unknown
                                                URL:https://googleads.g.doubleclick.net/pagead/viewthroughconversion/1039234079/?random=1733762333465&cv=11&fst=1733762333465&bg=ffffff&guid=ON&async=1&gtm=45be4c40v9166926293za200&gcd=13l3l3l3l1l1&dma=0&tag_exp=101925629~102067555~102067808~102081485&u_w=1280&u_h=1024&url=https%3A%2F%2Fapp.filemail.com%2Ft%2FBLFGBJSQ&hn=www.googleadservices.com&frm=0&tiba=Maya%20Lopez%20-%20Maya%20Lopez%20shared%20Inv-91129%22%20With%20you&npa=0&pscdl=noapi&auid=1084192964.1733762333&uaa=x86&uab=64&uafvl=Google%2520Chrome%3B117.0.5938.132%7CNot%253BA%253DBrand%3B8.0.0.0%7CChromium%3B117.0.5938.132&uamb=0&uam=&uap=Windows&uapv=10.0.0&uaw=0&fledge=1&data=event%3Dgtag.config&rfmt=3&fmt=4
                                                Preview:(function(){var s = {};(function(){var h=typeof Object.defineProperties=="function"?Object.defineProperty:function(b,a,c){if(b==Array.prototype||b==Object.prototype)return b;b[a]=c.value;return b};function k(b){b=["object"==typeof globalThis&&globalThis,b,"object"==typeof window&&window,"object"==typeof self&&self,"object"==typeof global&&global];for(var a=0;a<b.length;++a){var c=b[a];if(c&&c.Math==Math)return c}throw Error("Cannot find global object");} var m=k(this),n=typeof Symbol==="function"&&typeof Symbol("x")==="symbol",q={},t={};function u(b,a,c){if(!c||b!=null){c=t[a];if(c==null)return b[a];c=b[c];return c!==void 0?c:b[a]}} function v(b,a,c){if(a)a:{var d=b.split(".");b=d.length===1;var e=d[0],g;!b&&e in q?g=q:g=m;for(e=0;e<d.length-1;e++){var f=d[e];if(!(f in g))break a;g=g[f]}d=d[d.length-1];c=n&&c==="es6"?g[d]:null;a=a(c);a!=null&&(b?h(q,d,{configurable:!0,writable:!0,value:a}):a!==c&&(t[d]===void 0&&(b=Math.random()*1E9>>>0,t[d]=n?m.Symbol(d):"$jscp$"+b+"$"+d),h(g,t[d],{co
                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                File Type:HTML document, ASCII text, with no line terminators
                                                Category:downloaded
                                                Size (bytes):13
                                                Entropy (8bit):2.7773627950641693
                                                Encrypted:false
                                                SSDEEP:
                                                MD5:C83301425B2AD1D496473A5FF3D9ECCA
                                                SHA1:941EFB7368E46B27B937D34B07FC4D41DA01B002
                                                SHA-256:B633A587C652D02386C4F16F8C6F6AAB7352D97F16367C3C40576214372DD628
                                                SHA-512:83BAFE4C888008AFDD1B72C028C7F50DEE651CA9E7D8E1B332E0BF3AA1315884155A1458A304F6E5C5627E714BF5A855A8B8D7DB3F4EB2BB2789FE2F8F6A1D83
                                                Malicious:false
                                                Reputation:unknown
                                                URL:https://td.doubleclick.net/td/rul/1039234079?random=1733762333465&cv=11&fst=1733762333465&fmt=3&bg=ffffff&guid=ON&async=1&gtm=45be4c40v9166926293za200&gcd=13l3l3l3l1l1&dma=0&tag_exp=101925629~102067555~102067808~102081485&u_w=1280&u_h=1024&url=https%3A%2F%2Fapp.filemail.com%2Ft%2FBLFGBJSQ&hn=www.googleadservices.com&frm=0&tiba=Maya%20Lopez%20-%20Maya%20Lopez%20shared%20Inv-91129%22%20With%20you&npa=0&pscdl=noapi&auid=1084192964.1733762333&uaa=x86&uab=64&uafvl=Google%2520Chrome%3B117.0.5938.132%7CNot%253BA%253DBrand%3B8.0.0.0%7CChromium%3B117.0.5938.132&uamb=0&uam=&uap=Windows&uapv=10.0.0&uaw=0&fledge=1&data=event%3Dgtag.config
                                                Preview:<html></html>
                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1800x1200, components 3
                                                Category:downloaded
                                                Size (bytes):163139
                                                Entropy (8bit):7.980209460174626
                                                Encrypted:false
                                                SSDEEP:
                                                MD5:28A49D6E2E02097F185A356B699855FC
                                                SHA1:E6E67E246AED7FD0AC31799084C1880B9BE7D40A
                                                SHA-256:579C414EF0DA32BF8DD1EAF3165B8C407EFA1B36FB14D3598EFA9FE1CE344679
                                                SHA-512:9CD1A0CFA468996B4390936D281904CAB1C8CDEA1DA194486F02D0272E9F784EBC7A351F1060E5A3EB17782290129F8A25C685A77135D663C229759747960C35
                                                Malicious:false
                                                Reputation:unknown
                                                URL:https://app.filemail.com/Frontend/images/backgrounds/047.jpg
                                                Preview:......JFIF.............C...........................%!'&$!$#).;2),8,#$3F48=?BCB(1HMH@M;AB?...C...........?*$*??????????????????????????????????????????????????..........."...............................................................................%A@..PT....D.Q.TQ........UA.@@P.....@Ui+..9.@.UITj..b"..(...*..(5DF...........(..*."......D.........q.9X.tAn.`t.r.t#.2]=....../.}..no..;Zd .$gg..6x) RF.>.W.M.h......"......(..........P........R.......u..^d.%Z1{..R..w55t.zK$.Xs...s7;8Z.!..:+..ETs..li......B.b.D.;....(....._..9.L.=....(..(.......@Q.@..P..F..c....T.@Pp..Z...........(. ........Dk..PAA...E........@..@....@...V....A..v.....q`......V.$gkk...n..5.C1M..,..4^..h\.1...D......... (.r5....(*0{Q.9.AAUi..A-.k.%9...J.r.;.k..jc.b....z.lI.....CnE.fjD...J.6koh..n|.+....YJUWX.Q.|....+Q..9X..Zin..ls..[5.^..oLRe..!%jF.@.@.E..Q.Q.U....P...........X=!..J.EE....D.....".(8E...p5..G ....h . .".."............LVm....Rhgl...B....8..u.Gh..S.,.e....7:j.V...j./..BZ......#.....QF...
                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                File Type:HTML document, ASCII text, with very long lines (9881)
                                                Category:dropped
                                                Size (bytes):33834
                                                Entropy (8bit):5.243578657557217
                                                Encrypted:false
                                                SSDEEP:
                                                MD5:D14BF2E5B5FD70890652865C958D339F
                                                SHA1:173948FAC4EDD36E7E430B1271814B198028FCC1
                                                SHA-256:E8388DE20847A3C484A6D0A2B41D7186E02851ADB7544F719B398C14178BC2BD
                                                SHA-512:1C4C33E84F9393E9851B4D7D2999634ADC077B2244496F12DBF37413669B28D5993F3522B029D4E0552F1C006FD56FAA09AB821E1A4DE4FABBB7FF50535B85F8
                                                Malicious:false
                                                Reputation:unknown
                                                Preview: <html lang="en"><head><meta charset="UTF-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"/><meta name="viewport" content="width=device-width, initial-scale=1.0"><style> #containerShadow,#ef{border-radius:0 0 7px 7px}#cal,#cal>.r{display:flex}#fmask,#openedFlap{width:var(--envW);height:107px}#cal,#ef,#fmask,#logo{overflow:hidden}#loadingScreen{position:fixed;top:0;bottom:0;left:0;right:0;background-color:#fff}#loadingLogo{position:fixed;top:calc(50vh - 90px);left:calc(50vw - 90px);width:180px;height:180px}#MSLogo{position:fixed;bottom:36px;left:calc(50vw - 45px)}.dark #loadingScreen{background-color:#333}.darkNew #loadingScr