Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://vwj9ymusjv9xeh65cf602u2rmsnkbyf2u7lxtnawlaim1gvceu.moydow.de/5417971987/6327230191/#bnBkL3NmdW9mZGJvYnlmdUFob2p0Ymlkc3ZxJTBsU3RkM0cwdnMvbmJmeXN1VGZ1ekMvezJsdWZxUFhXV0wyNVRmOXZqWkk5eUZbbXJie04xTTZIREp2cGN5dTlRMzplOFZkVEQwMDt0cXV1aQ==

Overview

General Information

Sample URL:https://vwj9ymusjv9xeh65cf602u2rmsnkbyf2u7lxtnawlaim1gvceu.moydow.de/5417971987/6327230191/#bnBkL3NmdW9mZGJvYnlmdUFob2p0Ymlkc3ZxJTBsU3RkM0cwdnMvbmJmeXN1VGZ1ekMvezJsdWZxUFhXV0wyNVRmOXZqWkk5eUZbbXJie04x
Analysis ID:1637739
Infos:

Detection

HTMLPhisher, Invisible JS, Tycoon2FA
Score:100
Range:0 - 100
Confidence:100%

Signatures

AI detected phishing page
Yara detected AntiDebug via timestamp check
Yara detected HtmlPhish10
Yara detected Invisible JS
Yara detected Obfuscation Via HangulCharacter
Yara detected Tycoon 2FA PaaS
AI detected suspicious Javascript
Creates files inside the system directory
Deletes files inside the Windows folder
Detected non-DNS traffic on DNS port
HTML body contains low number of good links
HTML body contains password input but no form action
HTML page contains hidden javascript code
HTML title does not match URL
Invalid T&C link found
Uses Javascript AES encryption / decryption (likely to hide suspicious Javascript code)

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 2960 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: E81F54E6C1129887AEA47E7D092680BF)
    • chrome.exe (PID: 4912 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=1952,i,16432901395981199859,7495216035269137034,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version --mojo-platform-channel-handle=2220 /prefetch:3 MD5: E81F54E6C1129887AEA47E7D092680BF)
  • chrome.exe (PID: 6560 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://vwj9ymusjv9xeh65cf602u2rmsnkbyf2u7lxtnawlaim1gvceu.moydow.de/5417971987/6327230191/#bnBkL3NmdW9mZGJvYnlmdUFob2p0Ymlkc3ZxJTBsU3RkM0cwdnMvbmJmeXN1VGZ1ekMvezJsdWZxUFhXV0wyNVRmOXZqWkk5eUZbbXJie04xTTZIREp2cGN5dTlRMzplOFZkVEQwMDt0cXV1aQ==" MD5: E81F54E6C1129887AEA47E7D092680BF)
  • cleanup
SourceRuleDescriptionAuthorStrings
2.19.d.script.csvJoeSecurity_Tycoon2FA_1Yara detected Tycoon 2FA PaaSJoe Security
    2.19.d.script.csvJoeSecurity_AntiDebugBrowserYara detected AntiDebug via timestamp checkJoe Security
      2.18.d.script.csvJoeSecurity_HangulCharacterYara detected Obfuscation Via HangulCharacterJoe Security
        2.18.d.script.csvJoeSecurity_InvisibleJSYara detected Invisible JSJoe Security
          2.23..script.csvJoeSecurity_Tycoon2FA_1Yara detected Tycoon 2FA PaaSJoe Security
            Click to see the 25 entries
            No Sigma rule has matched
            No Suricata rule has matched

            Click to jump to signature section

            Show All Signature Results

            Phishing

            barindex
            Source: https://cscu7d92p8txbouicg5l0mzaqlzex8hyiu8es41kvvwopetk1z.bytestrxeam.ru/oheyiiqtwfkhhtxzmjuphdf5krzlrakr3ryv7qavx6b9hjiou?QUQYEVCPVLTRUABIEJoe Sandbox AI: Score: 9 Reasons: The URL 'cscu7d92p8txbouicg5l0mzaqlzex8hyiu8es41kvvwopetk1z.bytestrxeam.ru' does not match the legitimate domain 'microsoft.com'., The domain 'bytestrxeam.ru' is not associated with Microsoft and appears suspicious., The URL contains a random string and an unusual domain extension '.ru', which is not typical for Microsoft., The input field email 'purchasing@texanacenter.com' does not align with Microsoft, indicating potential phishing., The brand 'Microsoft' is well-known, and any legitimate site would use a recognizable Microsoft domain. DOM: 3.7.pages.csv
            Source: Yara matchFile source: 3.6.pages.csv, type: HTML
            Source: Yara matchFile source: 3.8.pages.csv, type: HTML
            Source: Yara matchFile source: 3.7.pages.csv, type: HTML
            Source: Yara matchFile source: 3.9.pages.csv, type: HTML
            Source: Yara matchFile source: 2.18.d.script.csv, type: HTML
            Source: Yara matchFile source: 2.4.pages.csv, type: HTML
            Source: Yara matchFile source: 2.3.pages.csv, type: HTML
            Source: Yara matchFile source: 2.18.d.script.csv, type: HTML
            Source: Yara matchFile source: 2.4.pages.csv, type: HTML
            Source: Yara matchFile source: 2.3.pages.csv, type: HTML
            Source: Yara matchFile source: 3.36..script.csv, type: HTML
            Source: Yara matchFile source: 3.33.d.script.csv, type: HTML
            Source: Yara matchFile source: 2.19.d.script.csv, type: HTML
            Source: Yara matchFile source: 2.23..script.csv, type: HTML
            Source: Yara matchFile source: 2.4.pages.csv, type: HTML
            Source: Yara matchFile source: 2.3.pages.csv, type: HTML
            Source: Yara matchFile source: 2.26.d.script.csv, type: HTML
            Source: Yara matchFile source: 3.28..script.csv, type: HTML
            Source: Yara matchFile source: 3.29..script.csv, type: HTML
            Source: Yara matchFile source: 3.6.pages.csv, type: HTML
            Source: Yara matchFile source: 3.8.pages.csv, type: HTML
            Source: Yara matchFile source: 3.7.pages.csv, type: HTML
            Source: Yara matchFile source: 3.9.pages.csv, type: HTML
            Source: 1.16..script.csvJoe Sandbox AI: Detected suspicious JavaScript with source url: https://sturbridge.de/... This script demonstrates several high-risk behaviors, including dynamic code execution, data exfiltration, and obfuscated code/URLs. The script uses various encoding and decoding techniques to conceal the final destination URL, which could be used for malicious purposes such as phishing or redirecting users to malicious sites. Additionally, the script checks the validity of the decoded URL, which suggests an attempt to bypass security measures. Overall, the combination of these behaviors indicates a high-risk script that should be further investigated.
            Source: 2.17..script.csvJoe Sandbox AI: Detected suspicious JavaScript with source url: https://cscu7d92p8txbouicg5l0mzaqlzex8hyiu8es41kvv... This script demonstrates several high-risk behaviors, including dynamic code execution, data exfiltration, and obfuscated code/URLs. The use of `atob()` and `decodeURIComponent()` to decode and execute remote code is a clear indicator of malicious intent. Additionally, the script appears to be sending user data to an untrusted domain, which poses a significant risk of data theft or other malicious activities. Overall, this script exhibits a high level of suspicion and should be treated as a potential security threat.
            Source: 1.11..script.csvJoe Sandbox AI: Detected suspicious JavaScript with source url: https://sturbridge.de/... This script demonstrates several high-risk behaviors, including dynamic code execution, data exfiltration, and obfuscated code/URLs. It attempts to execute remote code, sends user data to external servers, and uses heavily encoded strings. Additionally, the script checks for the presence of various browser automation tools, which suggests potential malicious intent. Overall, this script poses a significant security risk and should be treated with caution.
            Source: https://vwj9ymusjv9xeh65cf602u2rmsnkbyf2u7lxtnawlaim1gvceu.moydow.de/5417971987/6327230191/#bnBkL3NmdW9mZGJvYnlmdUFob2p0Ymlkc3ZxJTBsU3RkM0cwdnMvbmJmeXN1VGZ1ekMvezJsdWZxUFhXV0wyNVRmOXZqWkk5eUZbbXJie04xTTZIREp2cGN5dTlRMzplOFZkVEQwMDt0cXV1aQ==HTTP Parser: Number of links: 0
            Source: https://cscu7d92p8txbouicg5l0mzaqlzex8hyiu8es41kvvwopetk1z.bytestrxeam.ru/oheyiiqtwfkhhtxzmjuphdf5krzlrakr3ryv7qavx6b9hjiou?QUQYEVCPVLTRUABIEHTTP Parser: Number of links: 0
            Source: https://cscu7d92p8txbouicg5l0mzaqlzex8hyiu8es41kvvwopetk1z.bytestrxeam.ru/oheyiiqtwfkhhtxzmjuphdf5krzlrakr3ryv7qavx6b9hjiou?QUQYEVCPVLTRUABIEHTTP Parser: <input type="password" .../> found but no <form action="...
            Source: https://sturbridge.de/#bnBkL3NmdW9mZGJvYnlmdUFob2p0Ymlkc3ZxJTBsU3RkM0cwdnMvbmJmeXN1VGZ1ekMvezJsdWZxUFhXV0wyNVRmOXZqWkk5eUZbbXJie04xTTZIREp2cGN5dTlRMzplOFZkVEQwMDt0cXV1aQ==HTTP Parser: Base64 decoded: 1741899836.000000
            Source: https://cscu7d92p8txbouicg5l0mzaqlzex8hyiu8es41kvvwopetk1z.bytestrxeam.ru/oheyiiqtwfkhhtxzmjuphdf5krzlrakr3ryv7qavx6b9hjiou?QUQYEVCPVLTRUABIEHTTP Parser: Title: does not match URL
            Source: https://cscu7d92p8txbouicg5l0mzaqlzex8hyiu8es41kvvwopetk1z.bytestrxeam.ru/oheyiiqtwfkhhtxzmjuphdf5krzlrakr3ryv7qavx6b9hjiou?QUQYEVCPVLTRUABIEHTTP Parser: Invalid link: Terms of use
            Source: https://cscu7d92p8txbouicg5l0mzaqlzex8hyiu8es41kvvwopetk1z.bytestrxeam.ru/oheyiiqtwfkhhtxzmjuphdf5krzlrakr3ryv7qavx6b9hjiou?QUQYEVCPVLTRUABIEHTTP Parser: Invalid link: Privacy & cookies
            Source: https://cscu7d92p8txbouicg5l0mzaqlzex8hyiu8es41kvvwopetk1z.bytestrxeam.ru/oheyiiqtwfkhhtxzmjuphdf5krzlrakr3ryv7qavx6b9hjiou?QUQYEVCPVLTRUABIEHTTP Parser: Invalid link: Terms of use
            Source: https://cscu7d92p8txbouicg5l0mzaqlzex8hyiu8es41kvvwopetk1z.bytestrxeam.ru/oheyiiqtwfkhhtxzmjuphdf5krzlrakr3ryv7qavx6b9hjiou?QUQYEVCPVLTRUABIEHTTP Parser: Invalid link: Privacy & cookies
            Source: https://cscu7d92p8txbouicg5l0mzaqlzex8hyiu8es41kvvwopetk1z.bytestrxeam.ru/oheyiiqtwfkhhtxzmjuphdf5krzlrakr3ryv7qavx6b9hjiou?QUQYEVCPVLTRUABIEHTTP Parser: Invalid link: Terms of use
            Source: https://cscu7d92p8txbouicg5l0mzaqlzex8hyiu8es41kvvwopetk1z.bytestrxeam.ru/oheyiiqtwfkhhtxzmjuphdf5krzlrakr3ryv7qavx6b9hjiou?QUQYEVCPVLTRUABIEHTTP Parser: Invalid link: Privacy & cookies
            Source: https://cscu7d92p8txbouicg5l0mzaqlzex8hyiu8es41kvvwopetk1z.bytestrxeam.ru/oheyiiqtwfkhhtxzmjuphdf5krzlrakr3ryv7qavx6b9hjiou?QUQYEVCPVLTRUABIEHTTP Parser: Invalid link: Terms of use
            Source: https://cscu7d92p8txbouicg5l0mzaqlzex8hyiu8es41kvvwopetk1z.bytestrxeam.ru/oheyiiqtwfkhhtxzmjuphdf5krzlrakr3ryv7qavx6b9hjiou?QUQYEVCPVLTRUABIEHTTP Parser: Invalid link: Privacy & cookies
            Source: https://cscu7d92p8txbouicg5l0mzaqlzex8hyiu8es41kvvwopetk1z.bytestrxeam.ru/F2csRk/$purchasing@texanacenter.comHTTP Parser: function bhwsacmmci(){vpeirjdkmx = atob("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...
            Source: anonymous functionHTTP Parser: var otherweburl = "";var websitenames = ["godaddy", "okta"];var bes = ["apple.com","netflix.com"];var pes = ["https:\/\/t.me\/","https:\/\/t.com\/","t.me\/","https:\/\/t.me.com\/","t.me.com\/","t.me@","https:\/\/t.me@","https:\/\/t.me","https:\/\/t.com","t.me","https:\/\/t.me.com","t.me.com","t.me\/@","https:\/\/t.me\/@","https:\/\/t.me@\/","t.me@\/","https:\/\/www.telegram.me\/","https:\/\/www.telegram.me"];var capnum = 1;var appnum = 1;var pvn = 0;var view = "";var pagelinkval = "x6avo";var emailcheck = "purchasing@texanacenter.com";var webname = "rtrim(/web9/, '/')";var urlo = "/rfxu4hsy2hshikakzizetrt0yucpgsulpssthx9vdnjqi6q4a3vy55nkrz4";var gdf = "/ghmovgx4qqpifmlrgesxwxcjuu7jbagqooab115";var odf = "/ghzd8ya8wtwcltmzr8dytwif8v8tg7uvcvc0yqwsocd650";var twa = 0;var currentreq = null;var requestsent = false;var pagedata = "";var redirecturl = "";var useragent = navigator.useragent;var browsername;var userip;var usercountry;var errorcodeexecuted = false;if(us...
            Source: https://vwj9ymusjv9xeh65cf602u2rmsnkbyf2u7lxtnawlaim1gvceu.moydow.de/5417971987/6327230191/#bnBkL3NmdW9mZGJvYnlmdUFob2p0Ymlkc3ZxJTBsU3RkM0cwdnMvbmJmeXN1VGZ1ekMvezJsdWZxUFhXV0wyNVRmOXZqWkk5eUZbbXJie04xTTZIREp2cGN5dTlRMzplOFZkVEQwMDt0cXV1aQ==HTTP Parser: Iframe src: https://login.microsoftonline.com/logout.srf?ct=1548343592&rver=64.4.6456.0&lc=1033&id=501392
            Source: https://cscu7d92p8txbouicg5l0mzaqlzex8hyiu8es41kvvwopetk1z.bytestrxeam.ru/oheyiiqtwfkhhtxzmjuphdf5krzlrakr3ryv7qavx6b9hjiou?QUQYEVCPVLTRUABIEHTTP Parser: <input type="password" .../> found
            Source: https://vwj9ymusjv9xeh65cf602u2rmsnkbyf2u7lxtnawlaim1gvceu.moydow.de/5417971987/6327230191/#bnBkL3NmdW9mZGJvYnlmdUFob2p0Ymlkc3ZxJTBsU3RkM0cwdnMvbmJmeXN1VGZ1ekMvezJsdWZxUFhXV0wyNVRmOXZqWkk5eUZbbXJie04xTTZIREp2cGN5dTlRMzplOFZkVEQwMDt0cXV1aQ==HTTP Parser: No favicon
            Source: https://sturbridge.de/#bnBkL3NmdW9mZGJvYnlmdUFob2p0Ymlkc3ZxJTBsU3RkM0cwdnMvbmJmeXN1VGZ1ekMvezJsdWZxUFhXV0wyNVRmOXZqWkk5eUZbbXJie04xTTZIREp2cGN5dTlRMzplOFZkVEQwMDt0cXV1aQ==HTTP Parser: No favicon
            Source: https://cscu7d92p8txbouicg5l0mzaqlzex8hyiu8es41kvvwopetk1z.bytestrxeam.ru/oheyiiqtwfkhhtxzmjuphdf5krzlrakr3ryv7qavx6b9hjiou?QUQYEVCPVLTRUABIEHTTP Parser: No favicon
            Source: https://cscu7d92p8txbouicg5l0mzaqlzex8hyiu8es41kvvwopetk1z.bytestrxeam.ru/oheyiiqtwfkhhtxzmjuphdf5krzlrakr3ryv7qavx6b9hjiou?QUQYEVCPVLTRUABIEHTTP Parser: No favicon
            Source: https://cscu7d92p8txbouicg5l0mzaqlzex8hyiu8es41kvvwopetk1z.bytestrxeam.ru/oheyiiqtwfkhhtxzmjuphdf5krzlrakr3ryv7qavx6b9hjiou?QUQYEVCPVLTRUABIEHTTP Parser: No favicon
            Source: https://cscu7d92p8txbouicg5l0mzaqlzex8hyiu8es41kvvwopetk1z.bytestrxeam.ru/oheyiiqtwfkhhtxzmjuphdf5krzlrakr3ryv7qavx6b9hjiou?QUQYEVCPVLTRUABIEHTTP Parser: No favicon
            Source: https://cscu7d92p8txbouicg5l0mzaqlzex8hyiu8es41kvvwopetk1z.bytestrxeam.ru/oheyiiqtwfkhhtxzmjuphdf5krzlrakr3ryv7qavx6b9hjiou?QUQYEVCPVLTRUABIEHTTP Parser: No <meta name="author".. found
            Source: https://cscu7d92p8txbouicg5l0mzaqlzex8hyiu8es41kvvwopetk1z.bytestrxeam.ru/oheyiiqtwfkhhtxzmjuphdf5krzlrakr3ryv7qavx6b9hjiou?QUQYEVCPVLTRUABIEHTTP Parser: No <meta name="author".. found
            Source: https://cscu7d92p8txbouicg5l0mzaqlzex8hyiu8es41kvvwopetk1z.bytestrxeam.ru/oheyiiqtwfkhhtxzmjuphdf5krzlrakr3ryv7qavx6b9hjiou?QUQYEVCPVLTRUABIEHTTP Parser: No <meta name="author".. found
            Source: https://cscu7d92p8txbouicg5l0mzaqlzex8hyiu8es41kvvwopetk1z.bytestrxeam.ru/oheyiiqtwfkhhtxzmjuphdf5krzlrakr3ryv7qavx6b9hjiou?QUQYEVCPVLTRUABIEHTTP Parser: No <meta name="author".. found
            Source: https://vwj9ymusjv9xeh65cf602u2rmsnkbyf2u7lxtnawlaim1gvceu.moydow.de/5417971987/6327230191/#bnBkL3NmdW9mZGJvYnlmdUFob2p0Ymlkc3ZxJTBsU3RkM0cwdnMvbmJmeXN1VGZ1ekMvezJsdWZxUFhXV0wyNVRmOXZqWkk5eUZbbXJie04xTTZIREp2cGN5dTlRMzplOFZkVEQwMDt0cXV1aQ==HTTP Parser: No <meta name="copyright".. found
            Source: https://cscu7d92p8txbouicg5l0mzaqlzex8hyiu8es41kvvwopetk1z.bytestrxeam.ru/oheyiiqtwfkhhtxzmjuphdf5krzlrakr3ryv7qavx6b9hjiou?QUQYEVCPVLTRUABIEHTTP Parser: No <meta name="copyright".. found
            Source: https://cscu7d92p8txbouicg5l0mzaqlzex8hyiu8es41kvvwopetk1z.bytestrxeam.ru/oheyiiqtwfkhhtxzmjuphdf5krzlrakr3ryv7qavx6b9hjiou?QUQYEVCPVLTRUABIEHTTP Parser: No <meta name="copyright".. found
            Source: https://cscu7d92p8txbouicg5l0mzaqlzex8hyiu8es41kvvwopetk1z.bytestrxeam.ru/oheyiiqtwfkhhtxzmjuphdf5krzlrakr3ryv7qavx6b9hjiou?QUQYEVCPVLTRUABIEHTTP Parser: No <meta name="copyright".. found
            Source: https://cscu7d92p8txbouicg5l0mzaqlzex8hyiu8es41kvvwopetk1z.bytestrxeam.ru/oheyiiqtwfkhhtxzmjuphdf5krzlrakr3ryv7qavx6b9hjiou?QUQYEVCPVLTRUABIEHTTP Parser: No <meta name="copyright".. found
            Source: chrome.exeMemory has grown: Private usage: 7MB later: 26MB
            Source: global trafficTCP traffic: 192.168.2.16:61937 -> 1.1.1.1:53
            Source: global trafficTCP traffic: 192.168.2.16:61937 -> 1.1.1.1:53
            Source: global trafficTCP traffic: 192.168.2.16:61955 -> 1.1.1.1:53
            Source: global trafficTCP traffic: 192.168.2.16:61937 -> 1.1.1.1:53
            Source: global trafficTCP traffic: 192.168.2.16:61955 -> 1.1.1.1:53
            Source: global trafficTCP traffic: 192.168.2.16:61937 -> 1.1.1.1:53
            Source: global trafficTCP traffic: 192.168.2.16:61955 -> 1.1.1.1:53
            Source: global trafficTCP traffic: 192.168.2.16:61937 -> 1.1.1.1:53
            Source: global trafficTCP traffic: 192.168.2.16:61955 -> 1.1.1.1:53
            Source: global trafficTCP traffic: 192.168.2.16:61937 -> 1.1.1.1:53
            Source: global trafficTCP traffic: 192.168.2.16:61955 -> 1.1.1.1:53
            Source: global trafficTCP traffic: 192.168.2.16:61937 -> 1.1.1.1:53
            Source: global trafficTCP traffic: 192.168.2.16:61955 -> 1.1.1.1:53
            Source: global trafficTCP traffic: 192.168.2.16:61937 -> 1.1.1.1:53
            Source: global trafficTCP traffic: 192.168.2.16:61955 -> 1.1.1.1:53
            Source: global trafficTCP traffic: 192.168.2.16:61937 -> 1.1.1.1:53
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
            Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
            Source: unknownTCP traffic detected without corresponding DNS query: 2.23.227.208
            Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
            Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
            Source: unknownTCP traffic detected without corresponding DNS query: 142.250.186.67
            Source: unknownTCP traffic detected without corresponding DNS query: 142.250.186.67
            Source: unknownTCP traffic detected without corresponding DNS query: 142.250.186.67
            Source: unknownTCP traffic detected without corresponding DNS query: 142.250.186.67
            Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
            Source: unknownTCP traffic detected without corresponding DNS query: 142.250.186.67
            Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
            Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
            Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
            Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
            Source: unknownTCP traffic detected without corresponding DNS query: 23.60.203.209
            Source: unknownTCP traffic detected without corresponding DNS query: 23.60.203.209
            Source: unknownTCP traffic detected without corresponding DNS query: 23.60.203.209
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
            Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /jquery-3.3.1.slim.min.js HTTP/1.1Host: code.jquery.comConnection: keep-aliveOrigin: https://vwj9ymusjv9xeh65cf602u2rmsnkbyf2u7lxtnawlaim1gvceu.moydow.desec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: corsSec-Fetch-Dest: scriptReferer: https://vwj9ymusjv9xeh65cf602u2rmsnkbyf2u7lxtnawlaim1gvceu.moydow.de/Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /jquery-1.9.1.min.js HTTP/1.1Host: code.jquery.comConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptSec-Fetch-Storage-Access: activeReferer: https://vwj9ymusjv9xeh65cf602u2rmsnkbyf2u7lxtnawlaim1gvceu.moydow.de/Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /ajax/libs/popper.js/1.14.0/umd/popper.min.js HTTP/1.1Host: cdnjs.cloudflare.comConnection: keep-aliveOrigin: https://vwj9ymusjv9xeh65cf602u2rmsnkbyf2u7lxtnawlaim1gvceu.moydow.desec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: corsSec-Fetch-Dest: scriptReferer: https://vwj9ymusjv9xeh65cf602u2rmsnkbyf2u7lxtnawlaim1gvceu.moydow.de/Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /logout.srf?ct=1548343592&rver=64.4.6456.0&lc=1033&id=501392 HTTP/1.1Host: login.microsoftonline.comConnection: keep-alivesec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Sec-Fetch-Site: cross-siteSec-Fetch-Mode: navigateSec-Fetch-Dest: iframeSec-Fetch-Storage-Access: activeReferer: https://vwj9ymusjv9xeh65cf602u2rmsnkbyf2u7lxtnawlaim1gvceu.moydow.de/Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /ajax/libs/crypto-js/4.1.1/crypto-js.min.js HTTP/1.1Host: cdnjs.cloudflare.comConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"Intervention: <https://www.chromestatus.com/feature/5718547946799104>; level="warning"sec-ch-ua-mobile: ?0Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptSec-Fetch-Storage-Access: activeReferer: https://cscu7d92p8txbouicg5l0mzaqlzex8hyiu8es41kvvwopetk1z.bytestrxeam.ru/Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /turnstile/v0/api.js?onload=onloadTurnstileCallback HTTP/1.1Host: challenges.cloudflare.comConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"Intervention: <https://www.chromestatus.com/feature/5718547946799104>; level="warning"sec-ch-ua-mobile: ?0Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptSec-Fetch-Storage-Access: activeReferer: https://cscu7d92p8txbouicg5l0mzaqlzex8hyiu8es41kvvwopetk1z.bytestrxeam.ru/Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /jquery-3.6.0.min.js HTTP/1.1Host: code.jquery.comConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"Intervention: <https://www.chromestatus.com/feature/5718547946799104>; level="warning"sec-ch-ua-mobile: ?0Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptSec-Fetch-Storage-Access: activeReferer: https://cscu7d92p8txbouicg5l0mzaqlzex8hyiu8es41kvvwopetk1z.bytestrxeam.ru/Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /r/gsr1.crl HTTP/1.1Cache-Control: max-age = 3000Connection: Keep-AliveAccept: */*If-Modified-Since: Tue, 07 Jan 2025 07:28:00 GMTUser-Agent: Microsoft-CryptoAPI/10.0Host: c.pki.goog
            Source: global trafficHTTP traffic detected: GET /r/r4.crl HTTP/1.1Cache-Control: max-age = 3000Connection: Keep-AliveAccept: */*If-Modified-Since: Thu, 25 Jul 2024 14:48:00 GMTUser-Agent: Microsoft-CryptoAPI/10.0Host: c.pki.goog
            Source: global trafficHTTP traffic detected: GET /turnstile/v0/g/f3b948d8acb8/api.js HTTP/1.1Host: challenges.cloudflare.comConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"Intervention: <https://www.chromestatus.com/feature/5718547946799104>; level="warning"sec-ch-ua-mobile: ?0Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptSec-Fetch-Storage-Access: activeReferer: https://cscu7d92p8txbouicg5l0mzaqlzex8hyiu8es41kvvwopetk1z.bytestrxeam.ru/Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /favicon.png HTTP/1.1Host: developers.cloudflare.comConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageSec-Fetch-Storage-Access: activeReferer: https://cscu7d92p8txbouicg5l0mzaqlzex8hyiu8es41kvvwopetk1z.bytestrxeam.ru/Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /favicon.png HTTP/1.1Host: developers.cloudflare.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptySec-Fetch-Storage-Access: activeAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9Cookie: __cf_bm=XR32j.c56DCluf_zlU_9DOQ_LpNAAIcas4XM.Le6HHs-1741899851-1.0.1.1-8JF0eEOJeqDNCReScokyotFwPDfA7mXe3UqFDzPWdqYbnU6xCAXCwvePVBiFnhkGXnq.jDHDwjN7qmF9KAPNXIlesgcTVpvnoSMBqzrnm9Y
            Source: global trafficHTTP traffic detected: GET /fent/randexp.js/releases/download/v0.4.3/randexp.min.js HTTP/1.1Host: github.comConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"Intervention: <https://www.chromestatus.com/feature/5718547946799104>; level="warning"sec-ch-ua-mobile: ?0Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptSec-Fetch-Storage-Access: activeReferer: https://cscu7d92p8txbouicg5l0mzaqlzex8hyiu8es41kvvwopetk1z.bytestrxeam.ru/Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /github-production-release-asset-2e65be/2925284/11f3acf8-4ccb-11e6-8ce4-c179c0a212de?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=releaseassetproduction%2F20250313%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20250313T210434Z&X-Amz-Expires=300&X-Amz-Signature=a63cd4a7978e3f9ed79c5b95c645945118ee807ea55d03ae9f0eb77bd6dfe32b&X-Amz-SignedHeaders=host&response-content-disposition=attachment%3B%20filename%3Drandexp.min.js&response-content-type=application%2Foctet-stream HTTP/1.1Host: objects.githubusercontent.comConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"Intervention: <https://www.chromestatus.com/feature/5718547946799104>; level="warning"sec-ch-ua-mobile: ?0Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptSec-Fetch-Storage-Access: activeReferer: https://cscu7d92p8txbouicg5l0mzaqlzex8hyiu8es41kvvwopetk1z.bytestrxeam.ru/Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficDNS traffic detected: DNS query: vwj9ymusjv9xeh65cf602u2rmsnkbyf2u7lxtnawlaim1gvceu.moydow.de
            Source: global trafficDNS traffic detected: DNS query: www.google.com
            Source: global trafficDNS traffic detected: DNS query: code.jquery.com
            Source: global trafficDNS traffic detected: DNS query: cdnjs.cloudflare.com
            Source: global trafficDNS traffic detected: DNS query: stackpath.bootstrapcdn.com
            Source: global trafficDNS traffic detected: DNS query: login.microsoftonline.com
            Source: global trafficDNS traffic detected: DNS query: aadcdn.msftauth.net
            Source: global trafficDNS traffic detected: DNS query: sturbridge.de
            Source: global trafficDNS traffic detected: DNS query: a.nel.cloudflare.com
            Source: global trafficDNS traffic detected: DNS query: cscu7d92p8txbouicg5l0mzaqlzex8hyiu8es41kvvwopetk1z.bytestrxeam.ru
            Source: global trafficDNS traffic detected: DNS query: challenges.cloudflare.com
            Source: global trafficDNS traffic detected: DNS query: developers.cloudflare.com
            Source: global trafficDNS traffic detected: DNS query: 30l2.zvaznx.ru
            Source: global trafficDNS traffic detected: DNS query: github.com
            Source: global trafficDNS traffic detected: DNS query: ok4static.oktacdn.com
            Source: global trafficDNS traffic detected: DNS query: objects.githubusercontent.com
            Source: global trafficDNS traffic detected: DNS query: get.geojs.io
            Source: global trafficDNS traffic detected: DNS query: kbfi4cfujrxchcr2csgbs5xchglhvxkwqbnzhnewgqajnta2en4hc.goldenvisaportugal.ru
            Source: unknownHTTP traffic detected: POST /report/v4?s=1mNxRncKtagOX6akzCNEOE2P0eicNopEbErFuq62s5g2CLbgGZlL%2FyEJNQx705al%2FUZTUjzPSjkjD2CfdEcYigoeSNk21JwaGmAG%2BbhyCWYQF2awb%2FVUYQmpHT1WA8Qy HTTP/1.1Host: a.nel.cloudflare.comConnection: keep-aliveContent-Length: 445Content-Type: application/reports+jsonOrigin: https://sturbridge.deUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: unknownNetwork traffic detected: HTTP traffic on port 61975 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 61946 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 61969 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
            Source: unknownNetwork traffic detected: HTTP traffic on port 61961 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
            Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 61941 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 61966 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
            Source: unknownNetwork traffic detected: HTTP traffic on port 61949 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
            Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 61940 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
            Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
            Source: unknownNetwork traffic detected: HTTP traffic on port 61948 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 61963 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
            Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49673
            Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61939
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
            Source: unknownNetwork traffic detected: HTTP traffic on port 61968 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
            Source: unknownNetwork traffic detected: HTTP traffic on port 61943 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 61960 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49700
            Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61949
            Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 61956 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61941
            Source: unknownNetwork traffic detected: HTTP traffic on port 61965 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61942
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61943
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61944
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61945
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61946
            Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61947
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61948
            Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 61942 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61940
            Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49679 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 61959 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49671 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61953
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61956
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61959
            Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 61945 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61950
            Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 61950 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61963
            Source: unknownNetwork traffic detected: HTTP traffic on port 61939 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61965
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61966
            Source: unknownNetwork traffic detected: HTTP traffic on port 61967 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61967
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61968
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61969
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61960
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61961
            Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 61944 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 61953 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 61970 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61975
            Source: unknownNetwork traffic detected: HTTP traffic on port 61947 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61970
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\scoped_dir2960_1363680689
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile deleted: C:\Windows\SystemTemp\scoped_dir2960_1363680689
            Source: classification engineClassification label: mal100.phis.evad.win@25/0@56/274
            Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=1952,i,16432901395981199859,7495216035269137034,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version --mojo-platform-channel-handle=2220 /prefetch:3
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=1952,i,16432901395981199859,7495216035269137034,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version --mojo-platform-channel-handle=2220 /prefetch:3
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://vwj9ymusjv9xeh65cf602u2rmsnkbyf2u7lxtnawlaim1gvceu.moydow.de/5417971987/6327230191/#bnBkL3NmdW9mZGJvYnlmdUFob2p0Ymlkc3ZxJTBsU3RkM0cwdnMvbmJmeXN1VGZ1ekMvezJsdWZxUFhXV0wyNVRmOXZqWkk5eUZbbXJie04xTTZIREp2cGN5dTlRMzplOFZkVEQwMDt0cXV1aQ=="
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: Window RecorderWindow detected: More than 3 window changes detected

            Malware Analysis System Evasion

            barindex
            Source: Yara matchFile source: 2.19.d.script.csv, type: HTML
            Source: Yara matchFile source: 3.28..script.csv, type: HTML
            Source: Yara matchFile source: 3.29..script.csv, type: HTML
            Source: Yara matchFile source: 3.6.pages.csv, type: HTML
            Source: Yara matchFile source: 3.8.pages.csv, type: HTML
            Source: Yara matchFile source: 3.7.pages.csv, type: HTML
            Source: Yara matchFile source: 3.9.pages.csv, type: HTML
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity Information1
            Scripting
            1
            Drive-by Compromise
            Windows Management Instrumentation1
            Browser Extensions
            1
            Process Injection
            1
            Masquerading
            OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/Job1
            Scripting
            1
            Extra Window Memory Injection
            1
            Process Injection
            LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media3
            Non-Application Layer Protocol
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
            Deobfuscate/Decode Files or Information
            Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive4
            Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            File Deletion
            NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
            Ingress Tool Transfer
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Extra Window Memory Injection
            LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            https://vwj9ymusjv9xeh65cf602u2rmsnkbyf2u7lxtnawlaim1gvceu.moydow.de/5417971987/6327230191/#bnBkL3NmdW9mZGJvYnlmdUFob2p0Ymlkc3ZxJTBsU3RkM0cwdnMvbmJmeXN1VGZ1ekMvezJsdWZxUFhXV0wyNVRmOXZqWkk5eUZbbXJie04xTTZIREp2cGN5dTlRMzplOFZkVEQwMDt0cXV1aQ==0%Avira URL Cloudsafe
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            https://login.microsoftonline.com/logout.srf?ct=1548343592&rver=64.4.6456.0&lc=1033&id=5013920%Avira URL Cloudsafe
            https://code.jquery.com/jquery-1.9.1.min.js0%Avira URL Cloudsafe
            https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.14.0/umd/popper.min.js0%Avira URL Cloudsafe
            https://a.nel.cloudflare.com/report/v4?s=1mNxRncKtagOX6akzCNEOE2P0eicNopEbErFuq62s5g2CLbgGZlL%2FyEJNQx705al%2FUZTUjzPSjkjD2CfdEcYigoeSNk21JwaGmAG%2BbhyCWYQF2awb%2FVUYQmpHT1WA8Qy0%Avira URL Cloudsafe
            https://a.nel.cloudflare.com/report/v4?s=vNk81mXVwRjjoBLeqTPCTeg05KguhzTofAnkbSAOXWXVjVMLv04FHBSFSKAKMLLRyQcD3ArXQfA3Wb3WjnndjaVzV6JAjTKzrliIYPtyf5G3gjJ4CAGiWvwM9Q598MkYV6tK0%Avira URL Cloudsafe
            https://a.nel.cloudflare.com/report/v4?s=IGMACMMwe2y3UU07B44eG7DtQgbZHj9RFtyHC2YZUG61BjVyTUNTriXTwQ13BHSN1J9p6pbolpG0cAhY4QW6bx8iEvNfPxoF9cPuzerYkgQ8Hz%2FAEDjVwhzbsm%2BSZW5%2F0%Avira URL Cloudsafe
            https://a.nel.cloudflare.com/report/v4?s=13PQs5kEnnbnEn%2Fhi26sBRIrFlQDJXBdGVcq61P8w4AKlnT4Sxc4qEulWBK%2Bv%2FlpumB%2FkWXV5FGIi5ef%2BhsCi%2Bhr9fs8kayl5upo3PMOKtKVL%2BariUucqkJywr8z6Ks31hwP0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            stackpath.bootstrapcdn.com
            104.18.10.207
            truefalse
              high
              e329293.dscd.akamaiedge.net
              2.19.96.24
              truefalse
                high
                a.nel.cloudflare.com
                35.190.80.1
                truefalse
                  high
                  developers.cloudflare.com
                  104.16.2.189
                  truefalse
                    high
                    cscu7d92p8txbouicg5l0mzaqlzex8hyiu8es41kvvwopetk1z.bytestrxeam.ru
                    172.67.191.141
                    truetrue
                      unknown
                      github.com
                      140.82.121.3
                      truefalse
                        high
                        kbfi4cfujrxchcr2csgbs5xchglhvxkwqbnzhnewgqajnta2en4hc.goldenvisaportugal.ru
                        104.21.48.1
                        truefalse
                          unknown
                          s-part-0039.t-0009.t-msedge.net
                          13.107.246.67
                          truefalse
                            high
                            www.tm.a.prd.aadg.trafficmanager.net
                            20.190.160.64
                            truefalse
                              high
                              30l2.zvaznx.ru
                              104.21.16.1
                              truefalse
                                unknown
                                sturbridge.de
                                104.21.64.1
                                truefalse
                                  high
                                  vwj9ymusjv9xeh65cf602u2rmsnkbyf2u7lxtnawlaim1gvceu.moydow.de
                                  104.21.13.170
                                  truefalse
                                    unknown
                                    code.jquery.com
                                    151.101.2.137
                                    truefalse
                                      high
                                      cdnjs.cloudflare.com
                                      104.17.24.14
                                      truefalse
                                        high
                                        challenges.cloudflare.com
                                        104.18.95.41
                                        truefalse
                                          high
                                          get.geojs.io
                                          104.26.1.100
                                          truefalse
                                            high
                                            www.google.com
                                            142.250.186.100
                                            truefalse
                                              high
                                              d19d360lklgih4.cloudfront.net
                                              13.33.187.68
                                              truefalse
                                                high
                                                objects.githubusercontent.com
                                                185.199.110.133
                                                truefalse
                                                  high
                                                  aadcdn.msftauth.net
                                                  unknown
                                                  unknownfalse
                                                    high
                                                    ok4static.oktacdn.com
                                                    unknown
                                                    unknownfalse
                                                      high
                                                      login.microsoftonline.com
                                                      unknown
                                                      unknownfalse
                                                        high
                                                        NameMaliciousAntivirus DetectionReputation
                                                        https://a.nel.cloudflare.com/report/v4?s=IGMACMMwe2y3UU07B44eG7DtQgbZHj9RFtyHC2YZUG61BjVyTUNTriXTwQ13BHSN1J9p6pbolpG0cAhY4QW6bx8iEvNfPxoF9cPuzerYkgQ8Hz%2FAEDjVwhzbsm%2BSZW5%2Ffalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.14.0/umd/popper.min.jsfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        https://vwj9ymusjv9xeh65cf602u2rmsnkbyf2u7lxtnawlaim1gvceu.moydow.de/5417971987/6327230191/#bnBkL3NmdW9mZGJvYnlmdUFob2p0Ymlkc3ZxJTBsU3RkM0cwdnMvbmJmeXN1VGZ1ekMvezJsdWZxUFhXV0wyNVRmOXZqWkk5eUZbbXJie04xTTZIREp2cGN5dTlRMzplOFZkVEQwMDt0cXV1aQ==false
                                                          unknown
                                                          https://code.jquery.com/jquery-3.6.0.min.jsfalse
                                                            high
                                                            https://cdnjs.cloudflare.com/ajax/libs/crypto-js/4.1.1/crypto-js.min.jsfalse
                                                              high
                                                              https://cscu7d92p8txbouicg5l0mzaqlzex8hyiu8es41kvvwopetk1z.bytestrxeam.ru/oheyiiqtwfkhhtxzmjuphdf5krzlrakr3ryv7qavx6b9hjiou?QUQYEVCPVLTRUABIEtrue
                                                                unknown
                                                                https://developers.cloudflare.com/favicon.pngfalse
                                                                  high
                                                                  https://a.nel.cloudflare.com/report/v4?s=vNk81mXVwRjjoBLeqTPCTeg05KguhzTofAnkbSAOXWXVjVMLv04FHBSFSKAKMLLRyQcD3ArXQfA3Wb3WjnndjaVzV6JAjTKzrliIYPtyf5G3gjJ4CAGiWvwM9Q598MkYV6tKfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  https://a.nel.cloudflare.com/report/v4?s=13PQs5kEnnbnEn%2Fhi26sBRIrFlQDJXBdGVcq61P8w4AKlnT4Sxc4qEulWBK%2Bv%2FlpumB%2FkWXV5FGIi5ef%2BhsCi%2Bhr9fs8kayl5upo3PMOKtKVL%2BariUucqkJywr8z6Ks31hwPfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  https://challenges.cloudflare.com/turnstile/v0/g/f3b948d8acb8/api.jsfalse
                                                                    high
                                                                    https://code.jquery.com/jquery-1.9.1.min.jsfalse
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    https://a.nel.cloudflare.com/report/v4?s=1mNxRncKtagOX6akzCNEOE2P0eicNopEbErFuq62s5g2CLbgGZlL%2FyEJNQx705al%2FUZTUjzPSjkjD2CfdEcYigoeSNk21JwaGmAG%2BbhyCWYQF2awb%2FVUYQmpHT1WA8Qyfalse
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    https://code.jquery.com/jquery-3.3.1.slim.min.jsfalse
                                                                      high
                                                                      https://login.microsoftonline.com/logout.srf?ct=1548343592&rver=64.4.6456.0&lc=1033&id=501392false
                                                                      • Avira URL Cloud: safe
                                                                      unknown
                                                                      https://cscu7d92p8txbouicg5l0mzaqlzex8hyiu8es41kvvwopetk1z.bytestrxeam.ru/F2csRk/$purchasing@texanacenter.comfalse
                                                                        unknown
                                                                        https://sturbridge.de/#bnBkL3NmdW9mZGJvYnlmdUFob2p0Ymlkc3ZxJTBsU3RkM0cwdnMvbmJmeXN1VGZ1ekMvezJsdWZxUFhXV0wyNVRmOXZqWkk5eUZbbXJie04xTTZIREp2cGN5dTlRMzplOFZkVEQwMDt0cXV1aQ==false
                                                                          unknown
                                                                          https://challenges.cloudflare.com/turnstile/v0/api.js?onload=onloadTurnstileCallbackfalse
                                                                            high
                                                                            • No. of IPs < 25%
                                                                            • 25% < No. of IPs < 50%
                                                                            • 50% < No. of IPs < 75%
                                                                            • 75% < No. of IPs
                                                                            IPDomainCountryFlagASNASN NameMalicious
                                                                            104.21.48.1
                                                                            kbfi4cfujrxchcr2csgbs5xchglhvxkwqbnzhnewgqajnta2en4hc.goldenvisaportugal.ruUnited States
                                                                            13335CLOUDFLARENETUSfalse
                                                                            142.250.186.67
                                                                            unknownUnited States
                                                                            15169GOOGLEUSfalse
                                                                            104.18.10.207
                                                                            stackpath.bootstrapcdn.comUnited States
                                                                            13335CLOUDFLARENETUSfalse
                                                                            104.26.1.100
                                                                            get.geojs.ioUnited States
                                                                            13335CLOUDFLARENETUSfalse
                                                                            104.21.64.1
                                                                            sturbridge.deUnited States
                                                                            13335CLOUDFLARENETUSfalse
                                                                            142.251.168.84
                                                                            unknownUnited States
                                                                            15169GOOGLEUSfalse
                                                                            104.21.112.1
                                                                            unknownUnited States
                                                                            13335CLOUDFLARENETUSfalse
                                                                            2.19.96.24
                                                                            e329293.dscd.akamaiedge.netEuropean Union
                                                                            20940AKAMAI-ASN1EUfalse
                                                                            104.21.96.1
                                                                            unknownUnited States
                                                                            13335CLOUDFLARENETUSfalse
                                                                            172.67.191.141
                                                                            cscu7d92p8txbouicg5l0mzaqlzex8hyiu8es41kvvwopetk1z.bytestrxeam.ruUnited States
                                                                            13335CLOUDFLARENETUStrue
                                                                            35.190.80.1
                                                                            a.nel.cloudflare.comUnited States
                                                                            15169GOOGLEUSfalse
                                                                            151.101.194.137
                                                                            unknownUnited States
                                                                            54113FASTLYUSfalse
                                                                            172.217.18.110
                                                                            unknownUnited States
                                                                            15169GOOGLEUSfalse
                                                                            185.199.110.133
                                                                            objects.githubusercontent.comNetherlands
                                                                            54113FASTLYUSfalse
                                                                            104.16.2.189
                                                                            developers.cloudflare.comUnited States
                                                                            13335CLOUDFLARENETUSfalse
                                                                            142.250.186.99
                                                                            unknownUnited States
                                                                            15169GOOGLEUSfalse
                                                                            142.250.184.195
                                                                            unknownUnited States
                                                                            15169GOOGLEUSfalse
                                                                            104.17.24.14
                                                                            cdnjs.cloudflare.comUnited States
                                                                            13335CLOUDFLARENETUSfalse
                                                                            104.21.16.1
                                                                            30l2.zvaznx.ruUnited States
                                                                            13335CLOUDFLARENETUSfalse
                                                                            1.1.1.1
                                                                            unknownAustralia
                                                                            13335CLOUDFLARENETUSfalse
                                                                            13.33.187.68
                                                                            d19d360lklgih4.cloudfront.netUnited States
                                                                            16509AMAZON-02USfalse
                                                                            140.82.121.3
                                                                            github.comUnited States
                                                                            36459GITHUBUSfalse
                                                                            104.18.95.41
                                                                            challenges.cloudflare.comUnited States
                                                                            13335CLOUDFLARENETUSfalse
                                                                            216.58.206.46
                                                                            unknownUnited States
                                                                            15169GOOGLEUSfalse
                                                                            151.101.2.137
                                                                            code.jquery.comUnited States
                                                                            54113FASTLYUSfalse
                                                                            142.251.32.110
                                                                            unknownUnited States
                                                                            15169GOOGLEUSfalse
                                                                            104.21.13.170
                                                                            vwj9ymusjv9xeh65cf602u2rmsnkbyf2u7lxtnawlaim1gvceu.moydow.deUnited States
                                                                            13335CLOUDFLARENETUSfalse
                                                                            142.250.186.142
                                                                            unknownUnited States
                                                                            15169GOOGLEUSfalse
                                                                            142.250.186.100
                                                                            www.google.comUnited States
                                                                            15169GOOGLEUSfalse
                                                                            20.190.160.64
                                                                            www.tm.a.prd.aadg.trafficmanager.netUnited States
                                                                            8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                                            142.250.185.74
                                                                            unknownUnited States
                                                                            15169GOOGLEUSfalse
                                                                            IP
                                                                            192.168.2.16
                                                                            192.168.2.20
                                                                            Joe Sandbox version:42.0.0 Malachite
                                                                            Analysis ID:1637739
                                                                            Start date and time:2025-03-13 22:02:36 +01:00
                                                                            Joe Sandbox product:CloudBasic
                                                                            Overall analysis duration:
                                                                            Hypervisor based Inspection enabled:false
                                                                            Report type:full
                                                                            Cookbook file name:defaultwindowsinteractivecookbook.jbs
                                                                            Sample URL:https://vwj9ymusjv9xeh65cf602u2rmsnkbyf2u7lxtnawlaim1gvceu.moydow.de/5417971987/6327230191/#bnBkL3NmdW9mZGJvYnlmdUFob2p0Ymlkc3ZxJTBsU3RkM0cwdnMvbmJmeXN1VGZ1ekMvezJsdWZxUFhXV0wyNVRmOXZqWkk5eUZbbXJie04xTTZIREp2cGN5dTlRMzplOFZkVEQwMDt0cXV1aQ==
                                                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                            Number of analysed new started processes analysed:14
                                                                            Number of new started drivers analysed:0
                                                                            Number of existing processes analysed:0
                                                                            Number of existing drivers analysed:0
                                                                            Number of injected processes analysed:0
                                                                            Technologies:
                                                                            • EGA enabled
                                                                            Analysis Mode:stream
                                                                            Analysis stop reason:Timeout
                                                                            Detection:MAL
                                                                            Classification:mal100.phis.evad.win@25/0@56/274
                                                                            • Exclude process from analysis (whitelisted): svchost.exe
                                                                            • Excluded IPs from analysis (whitelisted): 142.250.186.142, 142.250.184.195, 172.217.18.110, 142.251.168.84, 142.250.184.238, 142.250.185.142
                                                                            • Excluded domains from analysis (whitelisted): clients2.google.com, accounts.google.com, redirector.gvt1.com, aadcdnoriginwus2.azureedge.net, clientservices.googleapis.com, aadcdnoriginwus2.afd.azureedge.net, aadcdn.msauth.net, clients.l.google.com, firstparty-azurefd-prod.trafficmanager.net
                                                                            • Not all processes where analyzed, report is missing behavior information
                                                                            • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                            • VT rate limit hit for: https://vwj9ymusjv9xeh65cf602u2rmsnkbyf2u7lxtnawlaim1gvceu.moydow.de/5417971987/6327230191/#bnBkL3NmdW9mZGJvYnlmdUFob2p0Ymlkc3ZxJTBsU3RkM0cwdnMvbmJmeXN1VGZ1ekMvezJsdWZxUFhXV0wyNVRmOXZqWkk5eUZbbXJie04xTTZIREp2cGN5dTlRMzplOFZkVEQwMDt0cXV1aQ==
                                                                            No created / dropped files found
                                                                            No static file info