Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Markelcorp Pay Application November 29, 2022_11725512247820161423.html

Overview

General Information

Sample Name:Markelcorp Pay Application November 29, 2022_11725512247820161423.html
Analysis ID:756249
MD5:397547503a0f979f55d246022dd70ddf
SHA1:3953830b316290a8f8a4f4f8e8040a9d0231038b
SHA256:57cbed8d8d5433b7e12c7838a6a458adaf27bea086602bf666ecf4276df62fd5
Infos:

Detection

HTMLPhisher
Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected HtmlPhish45
JA3 SSL client fingerprint seen in connection with other malware
Yara signature match
IP address seen in connection with other malware

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 6868 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\user\Desktop\Markelcorp Pay Application November 29, 2022_11725512247820161423.html MD5: 7BC7B4AEDC055BB02BCB52710132E9E1)
    • chrome.exe (PID: 2864 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2036 --field-trial-handle=1800,i,1373531813002401801,16495176252513405895,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationTargetPrediction /prefetch:8 MD5: 7BC7B4AEDC055BB02BCB52710132E9E1)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Markelcorp Pay Application November 29, 2022_11725512247820161423.htmlSUSP_obfuscated_JS_obfuscatorioDetects JS obfuscation done by the js obfuscator (often malicious)@imp0rtp3
  • 0x5d06:$c8: while(!![])
  • 0x5d24:$d1: parseInt(_0x111cb9(0x7c))/0x1*(parseInt(_0x111cb9(0x75))/0x2)+-parseInt(_0x111cb9(0x80))/0x3*(-parseInt(_0x111cb9(0x7b))/0x4)+-parseInt(_0x111cb9(0x6e))/0x5+-parseInt(_0x111cb9(0x83))/0x6*(
  • 0x5d43:$d1: parseInt(_0x111cb9(0x75))/0x2)+-parseInt(_0x111cb9(0x80))/0x3*(-parseInt(_0x111cb9(0x7b))/0x4)+-parseInt(_0x111cb9(0x6e))/0x5+-parseInt(_0x111cb9(0x83))/0x6*(parseInt(_0x111cb9(0x86))/0x7)+-
  • 0x5d63:$d1: parseInt(_0x111cb9(0x80))/0x3*(-parseInt(_0x111cb9(0x7b))/0x4)+-parseInt(_0x111cb9(0x6e))/0x5+-parseInt(_0x111cb9(0x83))/0x6*(parseInt(_0x111cb9(0x86))/0x7)+-parseInt(_0x111cb9(0x6f))/0x8*(
  • 0x5d83:$d1: parseInt(_0x111cb9(0x7b))/0x4)+-parseInt(_0x111cb9(0x6e))/0x5+-parseInt(_0x111cb9(0x83))/0x6*(parseInt(_0x111cb9(0x86))/0x7)+-parseInt(_0x111cb9(0x6f))/0x8*(parseInt(_0x111cb9(0x81))/0x9)+
  • 0x5da3:$d1: parseInt(_0x111cb9(0x6e))/0x5+-parseInt(_0x111cb9(0x83))/0x6*(parseInt(_0x111cb9(0x86))/0x7)+-parseInt(_0x111cb9(0x6f))/0x8*(parseInt(_0x111cb9(0x81))/0x9)+parseInt(_0x111cb9(0x8d))/0xa+
SourceRuleDescriptionAuthorStrings
22653.0.pages.csvSUSP_obfuscated_JS_obfuscatorioDetects JS obfuscation done by the js obfuscator (often malicious)@imp0rtp3
  • 0x77e8:$c8: while(!![])
  • 0x7806:$d1: parseInt(_0x111cb9(0x7c))/0x1*(parseInt(_0x111cb9(0x75))/0x2)+-parseInt(_0x111cb9(0x80))/0x3*(-parseInt(_0x111cb9(0x7b))/0x4)+-parseInt(_0x111cb9(0x6e))/0x5+-parseInt(_0x111cb9(0x83))/0x6*(
  • 0x7825:$d1: parseInt(_0x111cb9(0x75))/0x2)+-parseInt(_0x111cb9(0x80))/0x3*(-parseInt(_0x111cb9(0x7b))/0x4)+-parseInt(_0x111cb9(0x6e))/0x5+-parseInt(_0x111cb9(0x83))/0x6*(parseInt(_0x111cb9(0x86))/0x7)+-
  • 0x7845:$d1: parseInt(_0x111cb9(0x80))/0x3*(-parseInt(_0x111cb9(0x7b))/0x4)+-parseInt(_0x111cb9(0x6e))/0x5+-parseInt(_0x111cb9(0x83))/0x6*(parseInt(_0x111cb9(0x86))/0x7)+-parseInt(_0x111cb9(0x6f))/0x8*(
  • 0x7865:$d1: parseInt(_0x111cb9(0x7b))/0x4)+-parseInt(_0x111cb9(0x6e))/0x5+-parseInt(_0x111cb9(0x83))/0x6*(parseInt(_0x111cb9(0x86))/0x7)+-parseInt(_0x111cb9(0x6f))/0x8*(parseInt(_0x111cb9(0x81))/0x9)+
  • 0x7885:$d1: parseInt(_0x111cb9(0x6e))/0x5+-parseInt(_0x111cb9(0x83))/0x6*(parseInt(_0x111cb9(0x86))/0x7)+-parseInt(_0x111cb9(0x6f))/0x8*(parseInt(_0x111cb9(0x81))/0x9)+parseInt(_0x111cb9(0x8d))/0xa+
22653.0.pages.csvJoeSecurity_HtmlPhish_45Yara detected HtmlPhish_45Joe Security
    22275.2.pages.csvSUSP_obfuscated_JS_obfuscatorioDetects JS obfuscation done by the js obfuscator (often malicious)@imp0rtp3
    • 0x77ea:$c8: while(!![])
    • 0x7808:$d1: parseInt(_0x111cb9(0x7c))/0x1*(parseInt(_0x111cb9(0x75))/0x2)+-parseInt(_0x111cb9(0x80))/0x3*(-parseInt(_0x111cb9(0x7b))/0x4)+-parseInt(_0x111cb9(0x6e))/0x5+-parseInt(_0x111cb9(0x83))/0x6*(
    • 0x7827:$d1: parseInt(_0x111cb9(0x75))/0x2)+-parseInt(_0x111cb9(0x80))/0x3*(-parseInt(_0x111cb9(0x7b))/0x4)+-parseInt(_0x111cb9(0x6e))/0x5+-parseInt(_0x111cb9(0x83))/0x6*(parseInt(_0x111cb9(0x86))/0x7)+-
    • 0x7847:$d1: parseInt(_0x111cb9(0x80))/0x3*(-parseInt(_0x111cb9(0x7b))/0x4)+-parseInt(_0x111cb9(0x6e))/0x5+-parseInt(_0x111cb9(0x83))/0x6*(parseInt(_0x111cb9(0x86))/0x7)+-parseInt(_0x111cb9(0x6f))/0x8*(
    • 0x7867:$d1: parseInt(_0x111cb9(0x7b))/0x4)+-parseInt(_0x111cb9(0x6e))/0x5+-parseInt(_0x111cb9(0x83))/0x6*(parseInt(_0x111cb9(0x86))/0x7)+-parseInt(_0x111cb9(0x6f))/0x8*(parseInt(_0x111cb9(0x81))/0x9)+
    • 0x7887:$d1: parseInt(_0x111cb9(0x6e))/0x5+-parseInt(_0x111cb9(0x83))/0x6*(parseInt(_0x111cb9(0x86))/0x7)+-parseInt(_0x111cb9(0x6f))/0x8*(parseInt(_0x111cb9(0x81))/0x9)+parseInt(_0x111cb9(0x8d))/0xa+
    22275.2.pages.csvJoeSecurity_HtmlPhish_45Yara detected HtmlPhish_45Joe Security
      No Sigma rule has matched
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results

      Phishing

      barindex
      Source: Yara matchFile source: 22653.0.pages.csv, type: HTML
      Source: Yara matchFile source: 22275.2.pages.csv, type: HTML
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\GoogleUpdaterJump to behavior
      Source: unknownHTTPS traffic detected: 152.199.23.72:443 -> 192.168.2.2:49740 version: TLS 1.2
      Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
      Source: Joe Sandbox ViewIP Address: 152.199.23.72 152.199.23.72
      Source: Joe Sandbox ViewIP Address: 152.199.23.72 152.199.23.72
      Source: unknownDNS traffic detected: queries for: code.jquery.com
      Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49821
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49820
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
      Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
      Source: unknownNetwork traffic detected: HTTP traffic on port 49821 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49797 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
      Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
      Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49797
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
      Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
      Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49820 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49793
      Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
      Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
      Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficHTTP traffic detected: GET /service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=104.0.5112.102&lang=en-US&acceptformat=crx3&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1 HTTP/1.1Host: clients2.google.comConnection: keep-aliveX-Goog-Update-Interactivity: fgX-Goog-Update-AppId: nmmhkkegccagdldgiimedpiccmgmiedaX-Goog-Update-Updater: chromecrx-104.0.5112.102Sec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
      Source: global trafficHTTP traffic detected: GET /ajax/libs/font-awesome/4.7.0/css/font-awesome.css HTTP/1.1Host: cdnjs.cloudflare.comConnection: keep-alivesec-ch-ua: "Chromium";v="104", " Not A;Brand";v="99", "Google Chrome";v="104"Origin: nullsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: text/css,*/*;q=0.1Sec-Fetch-Site: cross-siteSec-Fetch-Mode: corsSec-Fetch-Dest: styleAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
      Source: global trafficHTTP traffic detected: GET /shared/1.0/content/images/picker_verify_call_fe87496cc7a44412f7893a72099c120a.svg HTTP/1.1Host: aadcdn.msauth.netConnection: keep-alivesec-ch-ua: "Chromium";v="104", " Not A;Brand";v="99", "Google Chrome";v="104"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
      Source: global trafficHTTP traffic detected: GET /shared/1.0/content/images/picker_verify_sms_27a6d18b56f46818420e60a773c36d4e.svg HTTP/1.1Host: aadcdn.msauth.netConnection: keep-alivesec-ch-ua: "Chromium";v="104", " Not A;Brand";v="99", "Google Chrome";v="104"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
      Source: global trafficHTTP traffic detected: GET /shared/1.0/content/images/picker_verify_fluent_authenticator_b59c16ca9bf156438a8a96d45e33db64.svg HTTP/1.1Host: aadcdn.msauth.netConnection: keep-alivesec-ch-ua: "Chromium";v="104", " Not A;Brand";v="99", "Google Chrome";v="104"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
      Source: global trafficHTTP traffic detected: GET /dbd5a2dd-ttl-x9zsondwno6uogaxggczkbj5okcite29gtm-6do/logintenantbranding/0/bannerlogo?ts=636450702596912772 HTTP/1.1Host: aadcdn.msauthimages.netConnection: keep-alivesec-ch-ua: "Chromium";v="104", " Not A;Brand";v="99", "Google Chrome";v="104"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
      Source: global trafficHTTP traffic detected: GET /dbd5a2dd-ttl-x9zsondwno6uogaxggczkbj5okcite29gtm-6do/logintenantbranding/0/bannerlogo?ts=636450702596912772 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.183 Safari/537.36Host: aadcdn.msauthimages.net
      Source: global trafficHTTP traffic detected: GET /dbd5a2dd-ttl-x9zsondwno6uogaxggczkbj5okcite29gtm-6do/logintenantbranding/0/bannerlogo?ts=636450702596912772 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.183 Safari/537.36Host: aadcdn.msauthimages.netIf-Modified-Since: Tue, 31 Oct 2017 18:11:00 GMTIf-None-Match: 0x8D5208ABDB3B476
      Source: unknownHTTP traffic detected: POST /ListAccounts?gpsia=1&source=ChromiumBrowser&json=standard HTTP/1.1Host: accounts.google.comConnection: keep-aliveContent-Length: 1Origin: https://www.google.comContent-Type: application/x-www-form-urlencodedSec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: CONSENT=YES+srp.gws-20210525-0-RC1.de+FX+704
      Source: unknownHTTPS traffic detected: 152.199.23.72:443 -> 192.168.2.2:49740 version: TLS 1.2
      Source: Markelcorp Pay Application November 29, 2022_11725512247820161423.html, type: SAMPLEMatched rule: SUSP_obfuscated_JS_obfuscatorio date = 2021-08-25, author = @imp0rtp3, description = Detects JS obfuscation done by the js obfuscator (often malicious), score = , reference = https://obfuscator.io
      Source: 22653.0.pages.csv, type: HTMLMatched rule: SUSP_obfuscated_JS_obfuscatorio date = 2021-08-25, author = @imp0rtp3, description = Detects JS obfuscation done by the js obfuscator (often malicious), score = , reference = https://obfuscator.io
      Source: 22275.2.pages.csv, type: HTMLMatched rule: SUSP_obfuscated_JS_obfuscatorio date = 2021-08-25, author = @imp0rtp3, description = Detects JS obfuscation done by the js obfuscator (often malicious), score = , reference = https://obfuscator.io
      Source: classification engineClassification label: mal48.phis.winHTML@26/0@15/11
      Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\user\Desktop\Markelcorp Pay Application November 29, 2022_11725512247820161423.html
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2036 --field-trial-handle=1800,i,1373531813002401801,16495176252513405895,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationTargetPrediction /prefetch:8
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2036 --field-trial-handle=1800,i,1373531813002401801,16495176252513405895,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationTargetPrediction /prefetch:8
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Program Files\Google\GoogleUpdaterJump to behavior
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\GoogleUpdaterJump to behavior
      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsWindows Management InstrumentationPath Interception1
      Process Injection
      2
      Masquerading
      OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local SystemExfiltration Over Other Network Medium1
      Encrypted Channel
      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
      Process Injection
      LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth3
      Non-Application Layer Protocol
      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration4
      Application Layer Protocol
      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled Transfer1
      Ingress Tool Transfer
      SIM Card SwapCarrier Billing Fraud
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      part-0017.t-0009.t-msedge.net0%VirustotalBrowse
      cs1025.wpc.upsiloncdn.net0%VirustotalBrowse
      dreams15.co0%VirustotalBrowse
      aadcdn.msauthimages.net0%VirustotalBrowse
      SourceDetectionScannerLabelLink
      https://aadcdn.msauthimages.net/dbd5a2dd-ttl-x9zsondwno6uogaxggczkbj5okcite29gtm-6do/logintenantbranding/0/bannerlogo?ts=6364507025969127720%Avira URL Cloudsafe
      https://dreams15.co/csc/host9/0f70e1a.php0%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      part-0017.t-0009.t-msedge.net
      13.107.213.45
      truefalseunknown
      accounts.google.com
      142.250.186.109
      truefalse
        high
        cdnjs.cloudflare.com
        104.17.25.14
        truefalse
          high
          www.google.com
          172.217.16.132
          truefalse
            high
            clients.l.google.com
            142.250.185.206
            truefalse
              high
              cs1025.wpc.upsiloncdn.net
              152.199.23.72
              truefalseunknown
              dreams15.co
              192.185.196.50
              truefalseunknown
              aadcdn.msauthimages.net
              unknown
              unknownfalseunknown
              c.s-microsoft.com
              unknown
              unknownfalse
                high
                clients2.google.com
                unknown
                unknownfalse
                  high
                  code.jquery.com
                  unknown
                  unknownfalse
                    high
                    assets.onestore.ms
                    unknown
                    unknownfalse
                      unknown
                      ajax.aspnetcdn.com
                      unknown
                      unknownfalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        file:///C:/Users/user/Desktop/Markelcorp%20Pay%20Application%20November%2029,%202022_11725512247820161423.htmlfalse
                          low
                          https://dreams15.co/csc/host9/0f70e1a.phpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/font-awesome.cssfalse
                            high
                            file:///C:/Users/user/Desktop/Markelcorp%20Pay%20Application%20November%2029,%202022_11725512247820161423.html#false
                              low
                              https://clients2.google.com/service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=104.0.5112.102&lang=en-US&acceptformat=crx3&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1false
                                high
                                https://accounts.google.com/ListAccounts?gpsia=1&source=ChromiumBrowser&json=standardfalse
                                  high
                                  https://aadcdn.msauthimages.net/dbd5a2dd-ttl-x9zsondwno6uogaxggczkbj5okcite29gtm-6do/logintenantbranding/0/bannerlogo?ts=636450702596912772false
                                  • Avira URL Cloud: safe
                                  unknown
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  142.250.186.68
                                  unknownUnited States
                                  15169GOOGLEUSfalse
                                  142.250.185.206
                                  clients.l.google.comUnited States
                                  15169GOOGLEUSfalse
                                  142.250.186.36
                                  unknownUnited States
                                  15169GOOGLEUSfalse
                                  152.199.23.72
                                  cs1025.wpc.upsiloncdn.netUnited States
                                  15133EDGECASTUSfalse
                                  13.107.213.45
                                  part-0017.t-0009.t-msedge.netUnited States
                                  8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                  142.250.186.109
                                  accounts.google.comUnited States
                                  15169GOOGLEUSfalse
                                  239.255.255.250
                                  unknownReserved
                                  unknownunknownfalse
                                  192.185.196.50
                                  dreams15.coUnited States
                                  46606UNIFIEDLAYER-AS-1USfalse
                                  104.17.25.14
                                  cdnjs.cloudflare.comUnited States
                                  13335CLOUDFLARENETUSfalse
                                  IP
                                  192.168.2.1
                                  127.0.0.1
                                  Joe Sandbox Version:36.0.0 Rainbow Opal
                                  Analysis ID:756249
                                  Start date and time:2022-11-29 21:48:50 +01:00
                                  Joe Sandbox Product:CloudBasic
                                  Overall analysis duration:0h 3m 53s
                                  Hypervisor based Inspection enabled:false
                                  Report type:light
                                  Sample file name:Markelcorp Pay Application November 29, 2022_11725512247820161423.html
                                  Cookbook file name:defaultwindowsinteractivecookbook.jbs
                                  Analysis system description:Windows 10 64 bit version 1909 (MS Office 2019, IE 11, Chrome 104, Firefox 88, Adobe Reader DC 21, Java 8 u291, 7-Zip)
                                  Number of analysed new started processes analysed:5
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • HDC enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Detection:MAL
                                  Classification:mal48.phis.winHTML@26/0@15/11
                                  EGA Information:Failed
                                  HDC Information:Failed
                                  HCA Information:
                                  • Successful, ratio: 100%
                                  • Number of executed functions: 0
                                  • Number of non-executed functions: 0
                                  Cookbook Comments:
                                  • Found application associated with file extension: .html
                                  • Exclude process from analysis (whitelisted): WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe
                                  • TCP Packets have been reduced to 100
                                  • Excluded IPs from analysis (whitelisted): 69.16.175.42, 69.16.175.10, 216.58.212.131, 34.104.35.123, 88.221.169.152, 23.3.109.244, 152.199.19.160, 184.24.10.194, 95.101.54.137, 95.101.54.139, 95.101.54.216, 95.101.54.121, 172.217.16.131
                                  • Excluded domains from analysis (whitelisted): cds.s5x3j6q5.hwcdn.net, assets.onestore.ms.edgekey.net, slscr.update.microsoft.com, e13678.dscb.akamaiedge.net, clientservices.googleapis.com, a1449.dscg2.akamai.net, www.microsoft.com-c-3.edgekey.net.globalredir.akadns.net, a1945.g2.akamai.net, www.microsoft.com-c-3.edgekey.net, mscomajax.vo.msecnd.net, login.live.com, aadcdn.azureedge.net, aadcdn.ec.azureedge.net, update.googleapis.com, statics-marketingsites-eus-ms-com.akamaized.net, img-prod-cms-rt-microsoft-com.akamaized.net, e10583.dspg.akamaiedge.net, client.wns.windows.com, aadcdnoriginwus2.azureedge.net, cs22.wpc.v0cdn.net, aadcdn.msauth.net, assets.onestore.ms.akadns.net, firstparty-azurefd-prod.trafficmanager.net, c-s.cms.ms.akadns.net, edgedl.me.gvt1.com, privacy.microsoft.com, aadcdnoriginwus2.afd.azureedge.net, c.s-microsoft.com-c.edgekey.net, e13678.dscg.akamaiedge.net, privacy.microsoft.com.edgekey.net, www.microsoft.com, e13678.dspb.akamaiedge.net
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report size getting too big, too many NtWriteVirtualMemory calls found.
                                  No simulations
                                  No context
                                  No context
                                  No context
                                  No context
                                  No context
                                  No created / dropped files found
                                  File type:HTML document, ASCII text, with very long lines (27416), with no line terminators
                                  Entropy (8bit):5.901857288894095
                                  TrID:
                                    File name:Markelcorp Pay Application November 29, 2022_11725512247820161423.html
                                    File size:27416
                                    MD5:397547503a0f979f55d246022dd70ddf
                                    SHA1:3953830b316290a8f8a4f4f8e8040a9d0231038b
                                    SHA256:57cbed8d8d5433b7e12c7838a6a458adaf27bea086602bf666ecf4276df62fd5
                                    SHA512:3eada352c4b80b96222e2430e354201f2d813372c437418632927013a444fc6d9ef8ce67ce3b7d3025f8ccd4fa888f3d26b615dc9abc885ab2459dd927e55ab5
                                    SSDEEP:768:7nzsDrtJtatBLtrevto8W+3YNYziUr9Dng6PsyTljhdqk/rmWLT/AhlDfy:7n4DrtJtatxtrevto8W+7iUJg6PsUrw6
                                    TLSH:C2C23D130A077A775F113B7B0B5B3E0F2405BD9D2AE16984D7168E64E11EB0B09EA23D
                                    File Content Preview:<head> </head><body> <div id="loadingScreen" style=""><input class="UOvCe9ucmB4k" type="hidden" id="b64u" value="aHR0cHM6Ly9kcmVhbXMxNS5jby9jc2MvaG9zdDkvMGY3MGUxYS5waHA="></input><div style="display:none;" id="e5zezr5TRTXB" name="V2Y8WIS38Z3i" class="5tAa
                                    Icon Hash:78d0a8cccc88c460
                                    TimestampSource PortDest PortSource IPDest IP
                                    Nov 29, 2022 21:49:25.169923067 CET49720443192.168.2.2142.250.185.206
                                    Nov 29, 2022 21:49:25.169967890 CET44349720142.250.185.206192.168.2.2
                                    Nov 29, 2022 21:49:25.170053005 CET49720443192.168.2.2142.250.185.206
                                    Nov 29, 2022 21:49:25.170311928 CET49720443192.168.2.2142.250.185.206
                                    Nov 29, 2022 21:49:25.170341969 CET44349720142.250.185.206192.168.2.2
                                    Nov 29, 2022 21:49:25.171641111 CET49721443192.168.2.2142.250.186.109
                                    Nov 29, 2022 21:49:25.171701908 CET44349721142.250.186.109192.168.2.2
                                    Nov 29, 2022 21:49:25.171828032 CET49721443192.168.2.2142.250.186.109
                                    Nov 29, 2022 21:49:25.172151089 CET49721443192.168.2.2142.250.186.109
                                    Nov 29, 2022 21:49:25.172179937 CET44349721142.250.186.109192.168.2.2
                                    Nov 29, 2022 21:49:25.230479002 CET44349721142.250.186.109192.168.2.2
                                    Nov 29, 2022 21:49:25.234889984 CET49721443192.168.2.2142.250.186.109
                                    Nov 29, 2022 21:49:25.234934092 CET44349721142.250.186.109192.168.2.2
                                    Nov 29, 2022 21:49:25.236869097 CET44349721142.250.186.109192.168.2.2
                                    Nov 29, 2022 21:49:25.236974001 CET49721443192.168.2.2142.250.186.109
                                    Nov 29, 2022 21:49:25.264257908 CET44349720142.250.185.206192.168.2.2
                                    Nov 29, 2022 21:49:25.264630079 CET49720443192.168.2.2142.250.185.206
                                    Nov 29, 2022 21:49:25.264659882 CET44349720142.250.185.206192.168.2.2
                                    Nov 29, 2022 21:49:25.265274048 CET44349720142.250.185.206192.168.2.2
                                    Nov 29, 2022 21:49:25.265377045 CET49720443192.168.2.2142.250.185.206
                                    Nov 29, 2022 21:49:25.266294956 CET44349720142.250.185.206192.168.2.2
                                    Nov 29, 2022 21:49:25.266380072 CET49720443192.168.2.2142.250.185.206
                                    Nov 29, 2022 21:49:25.609740019 CET49721443192.168.2.2142.250.186.109
                                    Nov 29, 2022 21:49:25.609904051 CET44349721142.250.186.109192.168.2.2
                                    Nov 29, 2022 21:49:25.609936953 CET49721443192.168.2.2142.250.186.109
                                    Nov 29, 2022 21:49:25.609950066 CET44349721142.250.186.109192.168.2.2
                                    Nov 29, 2022 21:49:25.610193968 CET44349721142.250.186.109192.168.2.2
                                    Nov 29, 2022 21:49:25.616101027 CET49720443192.168.2.2142.250.185.206
                                    Nov 29, 2022 21:49:25.616147995 CET44349720142.250.185.206192.168.2.2
                                    Nov 29, 2022 21:49:25.616252899 CET49720443192.168.2.2142.250.185.206
                                    Nov 29, 2022 21:49:25.616266966 CET44349720142.250.185.206192.168.2.2
                                    Nov 29, 2022 21:49:25.616398096 CET44349720142.250.185.206192.168.2.2
                                    Nov 29, 2022 21:49:25.645034075 CET44349720142.250.185.206192.168.2.2
                                    Nov 29, 2022 21:49:25.645133972 CET49720443192.168.2.2142.250.185.206
                                    Nov 29, 2022 21:49:25.645164967 CET44349720142.250.185.206192.168.2.2
                                    Nov 29, 2022 21:49:25.645329952 CET44349720142.250.185.206192.168.2.2
                                    Nov 29, 2022 21:49:25.645414114 CET49720443192.168.2.2142.250.185.206
                                    Nov 29, 2022 21:49:25.647753000 CET49720443192.168.2.2142.250.185.206
                                    Nov 29, 2022 21:49:25.647782087 CET44349720142.250.185.206192.168.2.2
                                    Nov 29, 2022 21:49:25.661397934 CET44349721142.250.186.109192.168.2.2
                                    Nov 29, 2022 21:49:25.661525011 CET49721443192.168.2.2142.250.186.109
                                    Nov 29, 2022 21:49:25.661566019 CET44349721142.250.186.109192.168.2.2
                                    Nov 29, 2022 21:49:25.661901951 CET44349721142.250.186.109192.168.2.2
                                    Nov 29, 2022 21:49:25.662024021 CET49721443192.168.2.2142.250.186.109
                                    Nov 29, 2022 21:49:25.663353920 CET49721443192.168.2.2142.250.186.109
                                    Nov 29, 2022 21:49:25.663387060 CET44349721142.250.186.109192.168.2.2
                                    Nov 29, 2022 21:49:26.055250883 CET49724443192.168.2.2192.185.196.50
                                    Nov 29, 2022 21:49:26.055305958 CET44349724192.185.196.50192.168.2.2
                                    Nov 29, 2022 21:49:26.055425882 CET49724443192.168.2.2192.185.196.50
                                    Nov 29, 2022 21:49:26.056669950 CET49724443192.168.2.2192.185.196.50
                                    Nov 29, 2022 21:49:26.056695938 CET44349724192.185.196.50192.168.2.2
                                    Nov 29, 2022 21:49:26.344027996 CET44349724192.185.196.50192.168.2.2
                                    Nov 29, 2022 21:49:26.367523909 CET49724443192.168.2.2192.185.196.50
                                    Nov 29, 2022 21:49:26.367566109 CET44349724192.185.196.50192.168.2.2
                                    Nov 29, 2022 21:49:26.371709108 CET44349724192.185.196.50192.168.2.2
                                    Nov 29, 2022 21:49:26.371860981 CET49724443192.168.2.2192.185.196.50
                                    Nov 29, 2022 21:49:26.374160051 CET49724443192.168.2.2192.185.196.50
                                    Nov 29, 2022 21:49:26.374183893 CET44349724192.185.196.50192.168.2.2
                                    Nov 29, 2022 21:49:26.374389887 CET49724443192.168.2.2192.185.196.50
                                    Nov 29, 2022 21:49:26.374411106 CET44349724192.185.196.50192.168.2.2
                                    Nov 29, 2022 21:49:26.374438047 CET44349724192.185.196.50192.168.2.2
                                    Nov 29, 2022 21:49:26.492465019 CET49724443192.168.2.2192.185.196.50
                                    Nov 29, 2022 21:49:26.492506027 CET44349724192.185.196.50192.168.2.2
                                    Nov 29, 2022 21:49:26.690649033 CET49724443192.168.2.2192.185.196.50
                                    Nov 29, 2022 21:49:27.820089102 CET49729443192.168.2.2142.250.186.36
                                    Nov 29, 2022 21:49:27.820167065 CET44349729142.250.186.36192.168.2.2
                                    Nov 29, 2022 21:49:27.820301056 CET49729443192.168.2.2142.250.186.36
                                    Nov 29, 2022 21:49:27.820621014 CET49729443192.168.2.2142.250.186.36
                                    Nov 29, 2022 21:49:27.820648909 CET44349729142.250.186.36192.168.2.2
                                    Nov 29, 2022 21:49:27.882930040 CET44349729142.250.186.36192.168.2.2
                                    Nov 29, 2022 21:49:27.883419037 CET49729443192.168.2.2142.250.186.36
                                    Nov 29, 2022 21:49:27.883466959 CET44349729142.250.186.36192.168.2.2
                                    Nov 29, 2022 21:49:27.884829998 CET44349729142.250.186.36192.168.2.2
                                    Nov 29, 2022 21:49:27.884938002 CET49729443192.168.2.2142.250.186.36
                                    Nov 29, 2022 21:49:27.898240089 CET44349724192.185.196.50192.168.2.2
                                    Nov 29, 2022 21:49:27.898283005 CET44349724192.185.196.50192.168.2.2
                                    Nov 29, 2022 21:49:27.898294926 CET44349724192.185.196.50192.168.2.2
                                    Nov 29, 2022 21:49:27.898370981 CET44349724192.185.196.50192.168.2.2
                                    Nov 29, 2022 21:49:27.898518085 CET49724443192.168.2.2192.185.196.50
                                    Nov 29, 2022 21:49:27.898565054 CET44349724192.185.196.50192.168.2.2
                                    Nov 29, 2022 21:49:27.936952114 CET49729443192.168.2.2142.250.186.36
                                    Nov 29, 2022 21:49:27.937006950 CET44349729142.250.186.36192.168.2.2
                                    Nov 29, 2022 21:49:27.937390089 CET44349729142.250.186.36192.168.2.2
                                    Nov 29, 2022 21:49:27.991183996 CET49729443192.168.2.2142.250.186.36
                                    Nov 29, 2022 21:49:27.991214037 CET44349729142.250.186.36192.168.2.2
                                    Nov 29, 2022 21:49:27.991281033 CET49724443192.168.2.2192.185.196.50
                                    Nov 29, 2022 21:49:28.030251980 CET44349724192.185.196.50192.168.2.2
                                    Nov 29, 2022 21:49:28.030282974 CET44349724192.185.196.50192.168.2.2
                                    Nov 29, 2022 21:49:28.030421019 CET44349724192.185.196.50192.168.2.2
                                    Nov 29, 2022 21:49:28.030462980 CET44349724192.185.196.50192.168.2.2
                                    Nov 29, 2022 21:49:28.030524969 CET49724443192.168.2.2192.185.196.50
                                    Nov 29, 2022 21:49:28.030549049 CET44349724192.185.196.50192.168.2.2
                                    Nov 29, 2022 21:49:28.030570984 CET44349724192.185.196.50192.168.2.2
                                    Nov 29, 2022 21:49:28.030581951 CET49724443192.168.2.2192.185.196.50
                                    Nov 29, 2022 21:49:28.030642986 CET49724443192.168.2.2192.185.196.50
                                    Nov 29, 2022 21:49:28.030642986 CET49724443192.168.2.2192.185.196.50
                                    Nov 29, 2022 21:49:28.030654907 CET44349724192.185.196.50192.168.2.2
                                    Nov 29, 2022 21:49:28.030723095 CET49724443192.168.2.2192.185.196.50
                                    Nov 29, 2022 21:49:28.030745029 CET44349724192.185.196.50192.168.2.2
                                    Nov 29, 2022 21:49:28.030920029 CET44349724192.185.196.50192.168.2.2
                                    TimestampSource PortDest PortSource IPDest IP
                                    Nov 29, 2022 21:49:25.122175932 CET6381653192.168.2.21.1.1.1
                                    Nov 29, 2022 21:49:25.137428999 CET5917453192.168.2.21.1.1.1
                                    Nov 29, 2022 21:49:25.138392925 CET5692453192.168.2.21.1.1.1
                                    Nov 29, 2022 21:49:25.155177116 CET53591741.1.1.1192.168.2.2
                                    Nov 29, 2022 21:49:25.155576944 CET53569241.1.1.1192.168.2.2
                                    Nov 29, 2022 21:49:25.820012093 CET5909853192.168.2.21.1.1.1
                                    Nov 29, 2022 21:49:26.053008080 CET53590981.1.1.1192.168.2.2
                                    Nov 29, 2022 21:49:27.760616064 CET5147953192.168.2.21.1.1.1
                                    Nov 29, 2022 21:49:27.779509068 CET53514791.1.1.1192.168.2.2
                                    Nov 29, 2022 21:49:27.791209936 CET5503353192.168.2.21.1.1.1
                                    Nov 29, 2022 21:49:27.809509993 CET53550331.1.1.1192.168.2.2
                                    Nov 29, 2022 21:49:28.536875010 CET4991353192.168.2.21.1.1.1
                                    Nov 29, 2022 21:49:28.555459023 CET53499131.1.1.1192.168.2.2
                                    Nov 29, 2022 21:49:29.472599030 CET6360453192.168.2.21.1.1.1
                                    Nov 29, 2022 21:49:32.623863935 CET5477053192.168.2.21.1.1.1
                                    Nov 29, 2022 21:50:15.816103935 CET5358053192.168.2.21.1.1.1
                                    Nov 29, 2022 21:50:15.816636086 CET6157553192.168.2.21.1.1.1
                                    Nov 29, 2022 21:50:15.816977978 CET6441953192.168.2.21.1.1.1
                                    Nov 29, 2022 21:50:27.823905945 CET4973753192.168.2.21.1.1.1
                                    Nov 29, 2022 21:50:27.842633963 CET53497371.1.1.1192.168.2.2
                                    Nov 29, 2022 21:50:27.870192051 CET6459753192.168.2.21.1.1.1
                                    Nov 29, 2022 21:50:27.888355017 CET53645971.1.1.1192.168.2.2
                                    Nov 29, 2022 21:50:46.049969912 CET5515653192.168.2.21.1.1.1
                                    Nov 29, 2022 21:50:46.282641888 CET53551561.1.1.1192.168.2.2
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Nov 29, 2022 21:49:25.122175932 CET192.168.2.21.1.1.10xc9f4Standard query (0)code.jquery.comA (IP address)IN (0x0001)false
                                    Nov 29, 2022 21:49:25.137428999 CET192.168.2.21.1.1.10xb156Standard query (0)clients2.google.comA (IP address)IN (0x0001)false
                                    Nov 29, 2022 21:49:25.138392925 CET192.168.2.21.1.1.10x2714Standard query (0)accounts.google.comA (IP address)IN (0x0001)false
                                    Nov 29, 2022 21:49:25.820012093 CET192.168.2.21.1.1.10x1fStandard query (0)dreams15.coA (IP address)IN (0x0001)false
                                    Nov 29, 2022 21:49:27.760616064 CET192.168.2.21.1.1.10x50abStandard query (0)www.google.comA (IP address)IN (0x0001)false
                                    Nov 29, 2022 21:49:27.791209936 CET192.168.2.21.1.1.10xd888Standard query (0)www.google.comA (IP address)IN (0x0001)false
                                    Nov 29, 2022 21:49:28.536875010 CET192.168.2.21.1.1.10x80c8Standard query (0)cdnjs.cloudflare.comA (IP address)IN (0x0001)false
                                    Nov 29, 2022 21:49:29.472599030 CET192.168.2.21.1.1.10xb9f3Standard query (0)aadcdn.msauthimages.netA (IP address)IN (0x0001)false
                                    Nov 29, 2022 21:49:32.623863935 CET192.168.2.21.1.1.10x12dStandard query (0)aadcdn.msauthimages.netA (IP address)IN (0x0001)false
                                    Nov 29, 2022 21:50:15.816103935 CET192.168.2.21.1.1.10x624bStandard query (0)ajax.aspnetcdn.comA (IP address)IN (0x0001)false
                                    Nov 29, 2022 21:50:15.816636086 CET192.168.2.21.1.1.10x548bStandard query (0)c.s-microsoft.comA (IP address)IN (0x0001)false
                                    Nov 29, 2022 21:50:15.816977978 CET192.168.2.21.1.1.10x4e8fStandard query (0)assets.onestore.msA (IP address)IN (0x0001)false
                                    Nov 29, 2022 21:50:27.823905945 CET192.168.2.21.1.1.10x6b6cStandard query (0)www.google.comA (IP address)IN (0x0001)false
                                    Nov 29, 2022 21:50:27.870192051 CET192.168.2.21.1.1.10x8055Standard query (0)www.google.comA (IP address)IN (0x0001)false
                                    Nov 29, 2022 21:50:46.049969912 CET192.168.2.21.1.1.10x192dStandard query (0)dreams15.coA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Nov 29, 2022 21:49:25.141035080 CET1.1.1.1192.168.2.20xc9f4No error (0)code.jquery.comcds.s5x3j6q5.hwcdn.netCNAME (Canonical name)IN (0x0001)false
                                    Nov 29, 2022 21:49:25.155177116 CET1.1.1.1192.168.2.20xb156No error (0)clients2.google.comclients.l.google.comCNAME (Canonical name)IN (0x0001)false
                                    Nov 29, 2022 21:49:25.155177116 CET1.1.1.1192.168.2.20xb156No error (0)clients.l.google.com142.250.185.206A (IP address)IN (0x0001)false
                                    Nov 29, 2022 21:49:25.155576944 CET1.1.1.1192.168.2.20x2714No error (0)accounts.google.com142.250.186.109A (IP address)IN (0x0001)false
                                    Nov 29, 2022 21:49:26.053008080 CET1.1.1.1192.168.2.20x1fNo error (0)dreams15.co192.185.196.50A (IP address)IN (0x0001)false
                                    Nov 29, 2022 21:49:27.779509068 CET1.1.1.1192.168.2.20x50abNo error (0)www.google.com172.217.16.132A (IP address)IN (0x0001)false
                                    Nov 29, 2022 21:49:27.809509993 CET1.1.1.1192.168.2.20xd888No error (0)www.google.com142.250.186.36A (IP address)IN (0x0001)false
                                    Nov 29, 2022 21:49:28.555459023 CET1.1.1.1192.168.2.20x80c8No error (0)cdnjs.cloudflare.com104.17.25.14A (IP address)IN (0x0001)false
                                    Nov 29, 2022 21:49:28.555459023 CET1.1.1.1192.168.2.20x80c8No error (0)cdnjs.cloudflare.com104.17.24.14A (IP address)IN (0x0001)false
                                    Nov 29, 2022 21:49:28.560442924 CET1.1.1.1192.168.2.20x9a60No error (0)dual.part-0017.t-0009.t-msedge.netpart-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                    Nov 29, 2022 21:49:28.560442924 CET1.1.1.1192.168.2.20x9a60No error (0)part-0017.t-0009.t-msedge.net13.107.213.45A (IP address)IN (0x0001)false
                                    Nov 29, 2022 21:49:28.560442924 CET1.1.1.1192.168.2.20x9a60No error (0)part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false
                                    Nov 29, 2022 21:49:29.490746975 CET1.1.1.1192.168.2.20xb9f3No error (0)aadcdn.msauthimages.netaadcdn.azureedge.netCNAME (Canonical name)IN (0x0001)false
                                    Nov 29, 2022 21:49:29.490746975 CET1.1.1.1192.168.2.20xb9f3No error (0)cs1025.wpc.upsiloncdn.net152.199.23.72A (IP address)IN (0x0001)false
                                    Nov 29, 2022 21:49:32.642046928 CET1.1.1.1192.168.2.20x12dNo error (0)aadcdn.msauthimages.netaadcdn.azureedge.netCNAME (Canonical name)IN (0x0001)false
                                    Nov 29, 2022 21:49:32.642046928 CET1.1.1.1192.168.2.20x12dNo error (0)cs1025.wpc.upsiloncdn.net152.199.23.72A (IP address)IN (0x0001)false
                                    Nov 29, 2022 21:49:32.964016914 CET1.1.1.1192.168.2.20x786aNo error (0)dual.part-0017.t-0009.t-msedge.netpart-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                    Nov 29, 2022 21:49:32.964016914 CET1.1.1.1192.168.2.20x786aNo error (0)part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false
                                    Nov 29, 2022 21:49:32.964016914 CET1.1.1.1192.168.2.20x786aNo error (0)part-0017.t-0009.t-msedge.net13.107.213.45A (IP address)IN (0x0001)false
                                    Nov 29, 2022 21:50:15.833900928 CET1.1.1.1192.168.2.20x624bNo error (0)ajax.aspnetcdn.commscomajax.vo.msecnd.netCNAME (Canonical name)IN (0x0001)false
                                    Nov 29, 2022 21:50:15.837498903 CET1.1.1.1192.168.2.20x548bNo error (0)c.s-microsoft.comc-s.cms.ms.akadns.netCNAME (Canonical name)IN (0x0001)false
                                    Nov 29, 2022 21:50:15.838330984 CET1.1.1.1192.168.2.20x4e8fNo error (0)assets.onestore.msassets.onestore.ms.akadns.netCNAME (Canonical name)IN (0x0001)false
                                    Nov 29, 2022 21:50:27.842633963 CET1.1.1.1192.168.2.20x6b6cNo error (0)www.google.com142.250.185.132A (IP address)IN (0x0001)false
                                    Nov 29, 2022 21:50:27.888355017 CET1.1.1.1192.168.2.20x8055No error (0)www.google.com142.250.186.68A (IP address)IN (0x0001)false
                                    Nov 29, 2022 21:50:46.282641888 CET1.1.1.1192.168.2.20x192dNo error (0)dreams15.co192.185.196.50A (IP address)IN (0x0001)false
                                    • accounts.google.com
                                    • clients2.google.com
                                    • dreams15.co
                                    • cdnjs.cloudflare.com
                                    • aadcdn.msauth.net
                                    • aadcdn.msauthimages.net

                                    Click to jump to process

                                    Target ID:0
                                    Start time:21:49:20
                                    Start date:29/11/2022
                                    Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\user\Desktop\Markelcorp Pay Application November 29, 2022_11725512247820161423.html
                                    Imagebase:0x7ff600460000
                                    File size:2852640 bytes
                                    MD5 hash:7BC7B4AEDC055BB02BCB52710132E9E1
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:moderate

                                    Target ID:1
                                    Start time:21:49:22
                                    Start date:29/11/2022
                                    Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2036 --field-trial-handle=1800,i,1373531813002401801,16495176252513405895,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationTargetPrediction /prefetch:8
                                    Imagebase:0x7ff600460000
                                    File size:2852640 bytes
                                    MD5 hash:7BC7B4AEDC055BB02BCB52710132E9E1
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:moderate

                                    No disassembly