Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Factura_Pendiente.html

Overview

General Information

Sample name:Factura_Pendiente.html
Analysis ID:1628091
MD5:16722de25b10aeab64dfde6204f83062
SHA1:399b17d37a0a8aa0bcc4d3b45235f7a322f1a2fa
SHA256:634198c17eb69fbc7b99c5fdf7a49afdd6297562417e0525c5e037874868ffba
Infos:

Detection

Score:52
Range:0 - 100
Confidence:100%

Signatures

AI detected suspicious Javascript
HTML file submission containing password form
Suspicious Javascript code found in HTML file
HTML body contains low number of good links
HTML body contains password input but no form action
HTML page contains hidden javascript code
HTML title does not match URL
None HTTPS page querying sensitive user data (password, username or email)
Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 7116 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\user\Desktop\Factura_Pendiente.html MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 6612 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2056 --field-trial-handle=1964,i,9047870658411574082,10985110720094365929,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

Phishing

barindex
Source: 0.0.id.script.csvJoe Sandbox AI: Detected suspicious JavaScript with source url: file:///C:/Users/user/Desktop/Factura_Pendiente.ht... This script exhibits several high-risk behaviors, including dynamic code execution, data exfiltration, and obfuscated URLs. It collects user credentials and sends them to a suspicious domain, and it also redirects the user to a domain derived from the email address after multiple failed login attempts. These behaviors are highly indicative of a malicious phishing script, posing a significant risk to user security and privacy.
Source: Factura_Pendiente.htmlHTTP Parser: location.href
Source: Factura_Pendiente.htmlHTTP Parser: .location
Source: Factura_Pendiente.htmlHTTP Parser: .location
Source: Factura_Pendiente.htmlHTTP Parser: Number of links: 0
Source: file:///C:/Users/user/Desktop/Factura_Pendiente.htmlHTTP Parser: Number of links: 0
Source: Factura_Pendiente.htmlHTTP Parser: <input type="password" .../> found but no <form action="...
Source: file:///C:/Users/user/Desktop/Factura_Pendiente.htmlHTTP Parser: <input type="password" .../> found but no <form action="...
Source: Factura_Pendiente.htmlHTTP Parser: Base64 decoded: https://acti0no0nine.ksiegihandlowe.pl/go/go.php
Source: Factura_Pendiente.htmlHTTP Parser: Title: Inicio de Sesin does not match URL
Source: file:///C:/Users/user/Desktop/Factura_Pendiente.htmlHTTP Parser: Title: Inicio de Sesin does not match URL
Source: file:///C:/Users/user/Desktop/Factura_Pendiente.htmlHTTP Parser: Has password / email / username input fields
Source: Factura_Pendiente.htmlHTTP Parser: <input type="password" .../> found
Source: file:///C:/Users/user/Desktop/Factura_Pendiente.htmlHTTP Parser: <input type="password" .../> found
Source: Factura_Pendiente.htmlHTTP Parser: No favicon
Source: file:///C:/Users/user/Desktop/Factura_Pendiente.htmlHTTP Parser: No favicon
Source: Factura_Pendiente.htmlHTTP Parser: No <meta name="author".. found
Source: file:///C:/Users/user/Desktop/Factura_Pendiente.htmlHTTP Parser: No <meta name="author".. found
Source: Factura_Pendiente.htmlHTTP Parser: No <meta name="copyright".. found
Source: file:///C:/Users/user/Desktop/Factura_Pendiente.htmlHTTP Parser: No <meta name="copyright".. found
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: global trafficHTTP traffic detected: GET /4Wl0hAx.png HTTP/1.1Host: i.imgur.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /bm8Q6yAlsPsAAAAj/verified.gif HTTP/1.1Host: media.tenor.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /4Wl0hAx.png HTTP/1.1Host: i.imgur.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /bm8Q6yAlsPsAAAAj/verified.gif HTTP/1.1Host: media.tenor.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficDNS traffic detected: DNS query: media.tenor.com
Source: global trafficDNS traffic detected: DNS query: i.imgur.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49985
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49985 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
Source: classification engineClassification label: mal52.phis.winHTML@14/8@10/108
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\user\Desktop\Factura_Pendiente.html
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2056 --field-trial-handle=1964,i,9047870658411574082,10985110720094365929,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2056 --field-trial-handle=1964,i,9047870658411574082,10985110720094365929,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk

Stealing of Sensitive Information

barindex
Source: file:///C:/Users/user/Desktop/Factura_Pendiente.htmlHTTP Parser: file:///C:/Users/user/Desktop/Factura_Pendiente.html
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Browser Extensions
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
Registry Run Keys / Startup Folder
1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Factura_Pendiente.html0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://i.imgur.com/4Wl0hAx.png0%Avira URL Cloudsafe
https://media.tenor.com/bm8Q6yAlsPsAAAAj/verified.gif0%Avira URL Cloudsafe
file:///C:/Users/user/Desktop/Factura_Pendiente.html0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
tenor.googleapis.com
172.217.18.106
truefalse
    unknown
    www.google.com
    172.217.18.4
    truefalse
      high
      ipv4.imgur.map.fastly.net
      199.232.196.193
      truefalse
        high
        media.tenor.com
        unknown
        unknownfalse
          high
          i.imgur.com
          unknown
          unknownfalse
            high
            NameMaliciousAntivirus DetectionReputation
            file:///C:/Users/user/Desktop/Factura_Pendiente.htmltrue
            • Avira URL Cloud: safe
            unknown
            https://media.tenor.com/bm8Q6yAlsPsAAAAj/verified.giffalse
            • Avira URL Cloud: safe
            unknown
            https://i.imgur.com/4Wl0hAx.pngfalse
            • Avira URL Cloud: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            142.250.181.227
            unknownUnited States
            15169GOOGLEUSfalse
            1.1.1.1
            unknownAustralia
            13335CLOUDFLARENETUSfalse
            239.255.255.250
            unknownReserved
            unknownunknownfalse
            172.217.18.106
            tenor.googleapis.comUnited States
            15169GOOGLEUSfalse
            142.250.185.142
            unknownUnited States
            15169GOOGLEUSfalse
            142.250.186.174
            unknownUnited States
            15169GOOGLEUSfalse
            172.217.18.4
            www.google.comUnited States
            15169GOOGLEUSfalse
            64.233.184.84
            unknownUnited States
            15169GOOGLEUSfalse
            199.232.196.193
            ipv4.imgur.map.fastly.netUnited States
            54113FASTLYUSfalse
            142.250.186.99
            unknownUnited States
            15169GOOGLEUSfalse
            IP
            192.168.2.16
            192.168.2.4
            Joe Sandbox version:42.0.0 Malachite
            Analysis ID:1628091
            Start date and time:2025-03-03 15:06:29 +01:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:defaultwindowsinteractivecookbook.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:18
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • EGA enabled
            Analysis Mode:stream
            Analysis stop reason:Timeout
            Sample name:Factura_Pendiente.html
            Detection:MAL
            Classification:mal52.phis.winHTML@14/8@10/108
            Cookbook Comments:
            • Found application associated with file extension: .html
            • Exclude process from analysis (whitelisted): dllhost.exe, SgrmBroker.exe, svchost.exe
            • Excluded IPs from analysis (whitelisted): 142.250.181.227, 142.250.186.174, 64.233.184.84, 172.217.23.110, 142.250.184.238, 23.199.214.10, 13.107.246.60
            • Excluded domains from analysis (whitelisted): fs.microsoft.com, clients2.google.com, accounts.google.com, redirector.gvt1.com, otelrules.azureedge.net, clientservices.googleapis.com, clients.l.google.com
            • Not all processes where analyzed, report is missing behavior information
            • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
            • VT rate limit hit for: tenor.googleapis.com
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:Unknown
            Category:dropped
            Size (bytes):2673
            Entropy (8bit):3.980001655933712
            Encrypted:false
            SSDEEP:
            MD5:29B93BF171055295F2C65A1580371BF3
            SHA1:987E61ACF2787289082A3AF49F7F66F65D3CF9F3
            SHA-256:7EF96C1E25A8F0ADF0F1F193D3472880B378C25D8670E3AEB9A419FEAE06E2E8
            SHA-512:B5C58224C46E2EDEE772BBB7E7964855FEC2FC7226EC05311B47B78BE49492B66BA87136ACC81FEC24515CF07088CF6BFF601A6BDDE5CD1CA0EDDE232B6973DE
            Malicious:false
            Reputation:unknown
            Preview:L..................F.@.. ...$+.,.....Qy.E...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IcZ.p....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VcZ.p....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VcZ.p....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VcZ.p..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VcZ.p...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:Unknown
            Category:dropped
            Size (bytes):2675
            Entropy (8bit):3.994346721633837
            Encrypted:false
            SSDEEP:
            MD5:30BE4F29A349E79D8B287C727ECCA9AB
            SHA1:44B99420A11A1F2171EB93FA88D0B70D758365C3
            SHA-256:8AA79D7BF4601AC7CD270AE18BEC9BBB7CD3964F744CC4CB814FC11AD3F4EA88
            SHA-512:E0509914196D6DB3B32A78793FD155CA155005F766BF9BE766C0554FC903977EB1CA9205C70C796BE31A1D94D6656A6F52E75E4363D0FDD05FDA8F4640DC7DDB
            Malicious:false
            Reputation:unknown
            Preview:L..................F.@.. ...$+.,.....Xl.E...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IcZ.p....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VcZ.p....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VcZ.p....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VcZ.p..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VcZ.p...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:Unknown
            Category:dropped
            Size (bytes):2689
            Entropy (8bit):4.0061960634944365
            Encrypted:false
            SSDEEP:
            MD5:559B5C6F470A509019D715FF574DCE93
            SHA1:740CC6BC49BEC077B07D625073B03575A170BBB5
            SHA-256:AB4F40EE4FFDB247DD890181D08FBEB93974F36058933DF76CCC1A44E1C2D4DB
            SHA-512:FD159EB2C9B17075B5C87D8B51446364F4CEA6B6DA46D2A05FF06750AD7CE390E70E90ED41ACC404DF9D9DB787DCAE8EC9F56EFC72027E5E6A519A8651F39E83
            Malicious:false
            Reputation:unknown
            Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IcZ.p....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VcZ.p....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VcZ.p....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VcZ.p..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:Unknown
            Category:dropped
            Size (bytes):2677
            Entropy (8bit):3.9938200395070624
            Encrypted:false
            SSDEEP:
            MD5:E66B722002E78D4C890DD490B02F7F4E
            SHA1:FEAAD697BD8E347EE06E59723C92532C9513B28E
            SHA-256:922F4BCAB7D8EACA193B0610DC1383CB414B2FC85F4131CA54B01504CED54122
            SHA-512:5123F20B3690D1F92CF9BE1284D4E8A7262898D73807D08ABFF0417B1F03D99E9B3D237CE96D5CAAB3F1CC003960CAF13B4B6E23E156278383A61F83BD6CBDC2
            Malicious:false
            Reputation:unknown
            Preview:L..................F.@.. ...$+.,......f.E...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IcZ.p....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VcZ.p....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VcZ.p....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VcZ.p..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VcZ.p...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:Unknown
            Category:dropped
            Size (bytes):2677
            Entropy (8bit):3.981323134222479
            Encrypted:false
            SSDEEP:
            MD5:3A1411CECC2C621B38E6E294E8FFA85A
            SHA1:CC186D1AD2D90AF204C55D3E834B9692F9D58508
            SHA-256:63C991A30EAD9D338AE115F49A98E622E5792C7DA1F0DED89022097090F704D6
            SHA-512:8A8C91F12AF7108A3F8BDFE0B17A888D459432B7AE21097FDA000786AA80B7BC9102900AFBBE62877AD2E1385664A6ACCCBF3E2BF60F0EE298851B0F7704DBF9
            Malicious:false
            Reputation:unknown
            Preview:L..................F.@.. ...$+.,.....6s.E...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IcZ.p....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VcZ.p....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VcZ.p....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VcZ.p..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VcZ.p...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:Unknown
            Category:dropped
            Size (bytes):2679
            Entropy (8bit):3.99555861038661
            Encrypted:false
            SSDEEP:
            MD5:4E3F0E6FB2E44385524412AE2ABFBF16
            SHA1:1CAF8ACAD9548A96847C25D81200DE73E6EE21E7
            SHA-256:027E25E695C44F2FEAF3BA5173770DBB4C5CC170C03D3313E126980341CA2948
            SHA-512:5C31FEFB7D1E064CB820E22BE6B286062F130D2E91CC2F9D73A56038EC1716B96974D965E88C187CE766FC0CEE263379346D7EDA6E949D51D35479C834FBFDCF
            Malicious:false
            Reputation:unknown
            Preview:L..................F.@.. ...$+.,......[.E...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IcZ.p....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VcZ.p....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VcZ.p....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VcZ.p..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VcZ.p...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:PNG image data, 738 x 955, 8-bit/color RGBA, non-interlaced
            Category:downloaded
            Size (bytes):162544
            Entropy (8bit):7.97807338547275
            Encrypted:false
            SSDEEP:
            MD5:F4FE4B2BD12912A3A2D9D68191388EE5
            SHA1:0621F786CB4A17BF64DB6E6E4EF937F835F8A9F9
            SHA-256:1751B36EAFF8981AD19A42E41E2CBDEAD340ABAAF4B45D2461DC0B3B8DD15130
            SHA-512:383B5FB3DA67A7ED4DA7FAC780100F1F26D037353A7555329EDA75DC1AB46DBAB412D24D5587CE6DECC94524F4014619106F4DACA4E5ABB1898A6A7DE3DD08D9
            Malicious:false
            Reputation:unknown
            URL:https://i.imgur.com/4Wl0hAx.png
            Preview:.PNG........IHDR....................IDATx......*...K.s.{]....v.Lc...@ dp...L;.......c'~#t.....YX...d2.L&...9.e........&..d2.L&.(.....w.poVq..d2.L&.......E.7....d2.L&..d.Xa...{;...d2.L&..d.<U.6...d2.L&.......L&..d2.LO....d2.L&.......L&..d2.LO....d2.L&.......L&..d2.LO....d2.L&.......L&..d2.LO....d2.L&.......L&..d2.LO....d2.L&.......L&..d2.LO....d2.L&.......L&..d2.LO....d2.L&.......L&..d2.LO....d2.L&....-.n..tF1.@T..7N..?.q...2...x=Z.....u.g....f.. .....&..d2u2....8R3..$..H%..!..m.:.....P...........su.......q..cz.g...s...6....=....g.D.5 ....!.....w.6P3.L&..e .......t....+. x..p./..R.$._....k..!.KP..}..C...3P..1...r...@.jP!...@<.t...A..>w.&90H....p..<....h.#.................G}.}[p.G. ?K}@.......&..d.L....2|7.....@......q..q.....{....}.O.Cx.....ia...#@#|..8:@7.q.........._^^*.C..m..^.u.[..>......u...d.W....8[....w ...6..E.]...g.....\...... ..A[...._h......&..d.<....$.o!.....,...a...d._...B.,K....%.3....p...>.....q..7...S...p.....`<..D..k...s..g>.C........w.).O.A..
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:GIF image data, version 89a, 200 x 195
            Category:dropped
            Size (bytes):55334
            Entropy (8bit):7.948000476472091
            Encrypted:false
            SSDEEP:
            MD5:4D4A965AEB96B7866C767E411BB0B13D
            SHA1:F0997FBD448DED4C0BEDC20495A12FFBB2F27F7A
            SHA-256:223F8DFA667924536916AC5AED8AFFD099270BCAC3EC90423403A00101BA5FF6
            SHA-512:640D1945C5DBAADC075945FF842D1E66969931DF2C185984600320EFB4B108176B27F30261A8FAEA4C128CB8CADD797A41A0A762BE5C3233963998651174182F
            Malicious:false
            Reputation:unknown
            Preview:GIF89a...........u.A...t.>v.Bw.B..W......u.=t.=......].....\..\..\w.C......t.<t.=......v.C...t.<.............\..........................................................................................!..NETSCAPE2.0.....!.......,...........`".di.h..l.p,.tm...|....pH,....[..N.4.l....5.>..xL.u[.ly.n...xi@.....q..E.............x&.8.z<.6......................j0...................8.+.C.............3.[.............>..h1.................G.............6N.~....E....3j.6aB.S."..@.^..(S.bt..Z..".4....8..l..W.,. 0.p1....2.`..F.r.EJ.(..H1.i....?fF.Z..Y.Jo...)...f..5..]...qu;......z.@.a.......o.@.n.=l.B.......o..Q...\........E.X.K.Fj.p.m.}C2..[.....im..:~...\.A.k?W..g.4a..B..w..=.8.bw..<....j...;V/jr..7..H....B5...h..Xcn.'.....W.M...........8....D!k".&O....q..."..RQ.v..(.....ZL.57..Q(_.....=...p."$.L.D......'MVy.>M."..Vv...H.q.\^z..q....e.).,y.2b.]....e....e.7..[x...|.#.....F.BqY.Q...X8......:...~:.F..dJ%~.2Y.YX1.`.-.....KB.*.&........2.*j...J[{.6...1..
            File type:HTML document, Unicode text, UTF-8 text, with CRLF line terminators
            Entropy (8bit):4.971049026873873
            TrID:
            • HyperText Markup Language (15015/1) 20.56%
            • HyperText Markup Language (12001/1) 16.44%
            • HyperText Markup Language (12001/1) 16.44%
            • HyperText Markup Language (11501/1) 15.75%
            • HyperText Markup Language (11501/1) 15.75%
            File name:Factura_Pendiente.html
            File size:3'781 bytes
            MD5:16722de25b10aeab64dfde6204f83062
            SHA1:399b17d37a0a8aa0bcc4d3b45235f7a322f1a2fa
            SHA256:634198c17eb69fbc7b99c5fdf7a49afdd6297562417e0525c5e037874868ffba
            SHA512:69459d1729643a9ea9984e5e64135ae24028e6be2b12417085a5c1b99ec5a3689384f9486630921a1a22a866facd8768f2f8f66dbe6b8e88bd01762643f93eb7
            SSDEEP:48:ta4+F33JQQgnOIOa53FKTDT9ANltSvGdHIdV1SNo5TtjGt7jfUuijz5bGj7Iukn:kR3h6FK3IDS0oryjPi/jj
            TLSH:2771325655C60A462877E3B86FE28309FB9240278741861D3F4C22979F79D49C9E3FC8
            File Content Preview:<!DOCTYPE html>..<html lang="es">..<head>.. <meta charset="UTF-8">.. <meta name="viewport" content="width=device-width, initial-scale=1.0">.. <title>Inicio de Sesi..n</title>.. <style>.. body {.. margin: 0;.. padding: 0;.. background
            Icon Hash:173149cccc490307