Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://dfsfsfsd.s3.us-east-005.backblazeb2.com/index+(44).html

Overview

General Information

Sample URL:https://dfsfsfsd.s3.us-east-005.backblazeb2.com/index+(44).html
Analysis ID:830987
Infos:

Detection

HTMLPhisher
Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Yara detected HtmlPhish10
Phishing site detected (based on logo template match)
Phishing site detected (based on image similarity)
HTML body contains low number of good links
Invalid T&C link found
No HTML title found

Classification

  • System is w10x64
  • chrome.exe (PID: 3176 cmdline: C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank MD5: 0FEC2748F363150DC54C1CAFFB1A9408)
    • chrome.exe (PID: 848 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1928 --field-trial-handle=1644,i,2101607640442121641,12480239808714859300,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationTargetPrediction /prefetch:8 MD5: 0FEC2748F363150DC54C1CAFFB1A9408)
  • chrome.exe (PID: 4900 cmdline: C:\Program Files\Google\Chrome\Application\chrome.exe" "https://dfsfsfsd.s3.us-east-005.backblazeb2.com/index+(44).html MD5: 0FEC2748F363150DC54C1CAFFB1A9408)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
dropped/chromecache_121JoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security
    SourceRuleDescriptionAuthorStrings
    61093.0.pages.csvJoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security
      No Sigma rule has matched
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: https://dfsfsfsd.s3.us-east-005.backblazeb2.com/index+(44).htmlSlashNext: detection malicious, Label: Credential Stealing type: Phishing & Social Engineering

      Phishing

      barindex
      Source: Yara matchFile source: 61093.0.pages.csv, type: HTML
      Source: Yara matchFile source: dropped/chromecache_121, type: DROPPED
      Source: https://dfsfsfsd.s3.us-east-005.backblazeb2.com/index+(44).htmlMatcher: Template: onedrive matched
      Source: https://dfsfsfsd.s3.us-east-005.backblazeb2.com/index+(44).htmlMatcher: Found strong image similarity, brand: Microsoft image: 61093.0.img.1.gfk.csv D234686AEA3314E03DFEC220D3F3B5E0
      Source: https://dfsfsfsd.s3.us-east-005.backblazeb2.com/index+(44).htmlHTTP Parser: Number of links: 0
      Source: https://dfsfsfsd.s3.us-east-005.backblazeb2.com/index+(44).htmlHTTP Parser: Number of links: 0
      Source: https://dfsfsfsd.s3.us-east-005.backblazeb2.com/index+(44).htmlHTTP Parser: Invalid link: Privacy & Cookies
      Source: https://dfsfsfsd.s3.us-east-005.backblazeb2.com/index+(44).htmlHTTP Parser: Invalid link: Privacy & Cookies
      Source: https://dfsfsfsd.s3.us-east-005.backblazeb2.com/index+(44).htmlHTTP Parser: HTML title missing
      Source: https://dfsfsfsd.s3.us-east-005.backblazeb2.com/index+(44).htmlHTTP Parser: HTML title missing
      Source: https://dfsfsfsd.s3.us-east-005.backblazeb2.com/index+(44).htmlHTTP Parser: No <meta name="author".. found
      Source: https://dfsfsfsd.s3.us-east-005.backblazeb2.com/index+(44).htmlHTTP Parser: No <meta name="author".. found
      Source: https://dfsfsfsd.s3.us-east-005.backblazeb2.com/index+(44).htmlHTTP Parser: No <meta name="copyright".. found
      Source: https://dfsfsfsd.s3.us-east-005.backblazeb2.com/index+(44).htmlHTTP Parser: No <meta name="copyright".. found
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\GoogleUpdaterJump to behavior
      Source: unknownDNS traffic detected: queries for: clients2.google.com
      Source: unknownNetwork traffic detected: HTTP traffic on port 49698 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
      Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
      Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49698
      Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49696
      Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49696 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
      Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
      Source: global trafficHTTP traffic detected: GET /service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=104.0.5112.81&lang=en-US&acceptformat=crx3&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1 HTTP/1.1Host: clients2.google.comConnection: keep-aliveX-Goog-Update-Interactivity: fgX-Goog-Update-AppId: nmmhkkegccagdldgiimedpiccmgmiedaX-Goog-Update-Updater: chromecrx-104.0.5112.81Sec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
      Source: global trafficHTTP traffic detected: GET /index+(44).html HTTP/1.1Host: dfsfsfsd.s3.us-east-005.backblazeb2.comConnection: keep-alivesec-ch-ua: "Chromium";v="104", " Not A;Brand";v="99", "Google Chrome";v="104"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
      Source: global trafficHTTP traffic detected: GET /bootstrap/4.0.0/css/bootstrap.min.css HTTP/1.1Host: maxcdn.bootstrapcdn.comConnection: keep-alivesec-ch-ua: "Chromium";v="104", " Not A;Brand";v="99", "Google Chrome";v="104"Origin: https://dfsfsfsd.s3.us-east-005.backblazeb2.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: text/css,*/*;q=0.1Sec-Fetch-Site: cross-siteSec-Fetch-Mode: corsSec-Fetch-Dest: styleReferer: https://dfsfsfsd.s3.us-east-005.backblazeb2.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
      Source: global trafficHTTP traffic detected: GET /bootstrap/4.0.0/js/bootstrap.min.js HTTP/1.1Host: maxcdn.bootstrapcdn.comConnection: keep-alivesec-ch-ua: "Chromium";v="104", " Not A;Brand";v="99", "Google Chrome";v="104"Origin: https://dfsfsfsd.s3.us-east-005.backblazeb2.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: corsSec-Fetch-Dest: scriptReferer: https://dfsfsfsd.s3.us-east-005.backblazeb2.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
      Source: global trafficHTTP traffic detected: GET /ajax/libs/popper.js/1.12.9/umd/popper.min.js HTTP/1.1Host: cdnjs.cloudflare.comConnection: keep-alivesec-ch-ua: "Chromium";v="104", " Not A;Brand";v="99", "Google Chrome";v="104"Origin: https://dfsfsfsd.s3.us-east-005.backblazeb2.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: corsSec-Fetch-Dest: scriptReferer: https://dfsfsfsd.s3.us-east-005.backblazeb2.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
      Source: global trafficHTTP traffic detected: GET /bootstrap/4.1.3/js/bootstrap.min.js HTTP/1.1Host: stackpath.bootstrapcdn.comConnection: keep-alivesec-ch-ua: "Chromium";v="104", " Not A;Brand";v="99", "Google Chrome";v="104"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptReferer: https://dfsfsfsd.s3.us-east-005.backblazeb2.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
      Source: global trafficHTTP traffic detected: GET /favicon.ico HTTP/1.1Host: dfsfsfsd.s3.us-east-005.backblazeb2.comConnection: keep-alivesec-ch-ua: "Chromium";v="104", " Not A;Brand";v="99", "Google Chrome";v="104"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://dfsfsfsd.s3.us-east-005.backblazeb2.com/index+(44).htmlAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
      Source: chromecache_120.1.drString found in binary or memory: http://opensource.org/licenses/MIT).
      Source: chromecache_121.1.drString found in binary or memory: https://ajax.googleapis.com/ajax/libs/jquery/2.2.4/jquery.min.js
      Source: chromecache_121.1.drString found in binary or memory: https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/popper.min.js
      Source: chromecache_121.1.drString found in binary or memory: https://code.jquery.com/jquery-3.2.1.slim.min.js
      Source: chromecache_121.1.drString found in binary or memory: https://fonts.googleapis.com/css?family=Open
      Source: chromecache_128.1.drString found in binary or memory: https://fonts.gstatic.com/s/opensans/v34/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsgH1x4gaVI
      Source: chromecache_128.1.drString found in binary or memory: https://fonts.gstatic.com/s/opensans/v34/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsgH1x4iaVI
      Source: chromecache_128.1.drString found in binary or memory: https://fonts.gstatic.com/s/opensans/v34/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsgH1x4jaVI
      Source: chromecache_128.1.drString found in binary or memory: https://fonts.gstatic.com/s/opensans/v34/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsgH1x4kaVI
      Source: chromecache_128.1.drString found in binary or memory: https://fonts.gstatic.com/s/opensans/v34/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsgH1x4saVI
      Source: chromecache_128.1.drString found in binary or memory: https://fonts.gstatic.com/s/opensans/v34/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsgH1x4taVI
      Source: chromecache_128.1.drString found in binary or memory: https://fonts.gstatic.com/s/opensans/v34/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsgH1x4uaVI
      Source: chromecache_128.1.drString found in binary or memory: https://fonts.gstatic.com/s/opensans/v34/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsgH1x4vaVI
      Source: chromecache_127.1.dr, chromecache_125.1.drString found in binary or memory: https://getbootstrap.com)
      Source: chromecache_123.1.drString found in binary or memory: https://getbootstrap.com/)
      Source: chromecache_123.1.dr, chromecache_127.1.dr, chromecache_125.1.drString found in binary or memory: https://github.com/twbs/bootstrap/blob/master/LICENSE)
      Source: chromecache_123.1.dr, chromecache_125.1.drString found in binary or memory: https://github.com/twbs/bootstrap/graphs/contributors)
      Source: chromecache_121.1.drString found in binary or memory: https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0/css/bootstrap.min.css
      Source: chromecache_121.1.drString found in binary or memory: https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0/js/bootstrap.min.js
      Source: chromecache_121.1.drString found in binary or memory: https://nwschool.ac.th/qazxcc/index.php
      Source: chromecache_121.1.drString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.1.3/js/bootstrap.min.js
      Source: unknownHTTP traffic detected: POST /ListAccounts?gpsia=1&source=ChromiumBrowser&json=standard HTTP/1.1Host: accounts.google.comConnection: keep-aliveContent-Length: 1Origin: https://www.google.comContent-Type: application/x-www-form-urlencodedSec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: CONSENT=PENDING+904; SOCS=CAISHAgCEhJnd3NfMjAyMjA4MDgtMF9SQzEaAmVuIAEaBgiAvOuXBg
      Source: classification engineClassification label: mal64.phis.win@26/9@9/10
      Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1928 --field-trial-handle=1644,i,2101607640442121641,12480239808714859300,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationTargetPrediction /prefetch:8
      Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe" "https://dfsfsfsd.s3.us-east-005.backblazeb2.com/index+(44).html
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1928 --field-trial-handle=1644,i,2101607640442121641,12480239808714859300,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationTargetPrediction /prefetch:8
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Program Files\Google\GoogleUpdaterJump to behavior
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeAutomated click: Confirm
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeAutomated click: Next
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeAutomated click: Next
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeAutomated click: Confirm
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeAutomated click: Confirm
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeAutomated click: Next
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeAutomated click: Next
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeAutomated click: Confirm
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeAutomated click: Confirm
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeAutomated click: Next
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeAutomated click: Next
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeAutomated click: Confirm
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\GoogleUpdaterJump to behavior
      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsWindows Management InstrumentationPath Interception1
      Process Injection
      2
      Masquerading
      OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local SystemExfiltration Over Other Network Medium1
      Encrypted Channel
      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
      Process Injection
      LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth3
      Non-Application Layer Protocol
      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration4
      Application Layer Protocol
      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled Transfer1
      Ingress Tool Transfer
      SIM Card SwapCarrier Billing Fraud
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      https://dfsfsfsd.s3.us-east-005.backblazeb2.com/index+(44).html1%VirustotalBrowse
      https://dfsfsfsd.s3.us-east-005.backblazeb2.com/index+(44).html0%Avira URL Cloudsafe
      https://dfsfsfsd.s3.us-east-005.backblazeb2.com/index+(44).html100%SlashNextCredential Stealing type: Phishing & Social Engineering
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      https://getbootstrap.com)0%Avira URL Cloudsafe
      https://nwschool.ac.th/qazxcc/index.php0%Avira URL Cloudsafe
      https://dfsfsfsd.s3.us-east-005.backblazeb2.com/favicon.ico0%Avira URL Cloudsafe
      https://dfsfsfsd.s3.us-east-005.backblazeb2.com/index+(44).html1%VirustotalBrowse
      NameIPActiveMaliciousAntivirus DetectionReputation
      stackpath.bootstrapcdn.com
      104.18.10.207
      truefalse
        high
        accounts.google.com
        142.250.203.109
        truefalse
          high
          cdnjs.cloudflare.com
          104.17.25.14
          truefalse
            high
            dfsfsfsd.s3.us-east-005.backblazeb2.com
            149.137.137.254
            truefalse
              unknown
              maxcdn.bootstrapcdn.com
              104.18.11.207
              truefalse
                high
                c-0001.c-msedge.net
                13.107.4.50
                truefalse
                  unknown
                  www.google.com
                  142.250.203.100
                  truefalse
                    high
                    clients.l.google.com
                    142.250.203.110
                    truefalse
                      high
                      clients2.google.com
                      unknown
                      unknownfalse
                        high
                        code.jquery.com
                        unknown
                        unknownfalse
                          high
                          NameMaliciousAntivirus DetectionReputation
                          https://dfsfsfsd.s3.us-east-005.backblazeb2.com/index+(44).htmltrueunknown
                          https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/popper.min.jsfalse
                            high
                            https://accounts.google.com/ListAccounts?gpsia=1&source=ChromiumBrowser&json=standardfalse
                              high
                              https://dfsfsfsd.s3.us-east-005.backblazeb2.com/index+(44).htmltrueunknown
                              https://clients2.google.com/service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=104.0.5112.81&lang=en-US&acceptformat=crx3&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1false
                                high
                                https://stackpath.bootstrapcdn.com/bootstrap/4.1.3/js/bootstrap.min.jsfalse
                                  high
                                  https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0/js/bootstrap.min.jsfalse
                                    high
                                    https://dfsfsfsd.s3.us-east-005.backblazeb2.com/favicon.icofalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0/css/bootstrap.min.cssfalse
                                      high
                                      NameSourceMaliciousAntivirus DetectionReputation
                                      https://github.com/twbs/bootstrap/graphs/contributors)chromecache_123.1.dr, chromecache_125.1.drfalse
                                        high
                                        https://getbootstrap.com)chromecache_127.1.dr, chromecache_125.1.drfalse
                                        • Avira URL Cloud: safe
                                        low
                                        https://code.jquery.com/jquery-3.2.1.slim.min.jschromecache_121.1.drfalse
                                          high
                                          https://github.com/twbs/bootstrap/blob/master/LICENSE)chromecache_123.1.dr, chromecache_127.1.dr, chromecache_125.1.drfalse
                                            high
                                            https://nwschool.ac.th/qazxcc/index.phpchromecache_121.1.drfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://opensource.org/licenses/MIT).chromecache_120.1.drfalse
                                              high
                                              https://getbootstrap.com/)chromecache_123.1.drfalse
                                                high
                                                • No. of IPs < 25%
                                                • 25% < No. of IPs < 50%
                                                • 50% < No. of IPs < 75%
                                                • 75% < No. of IPs
                                                IPDomainCountryFlagASNASN NameMalicious
                                                104.18.10.207
                                                stackpath.bootstrapcdn.comUnited States
                                                13335CLOUDFLARENETUSfalse
                                                142.250.203.100
                                                www.google.comUnited States
                                                15169GOOGLEUSfalse
                                                142.250.203.110
                                                clients.l.google.comUnited States
                                                15169GOOGLEUSfalse
                                                149.137.137.254
                                                dfsfsfsd.s3.us-east-005.backblazeb2.comUnited States
                                                30103ZOOM-VIDEO-COMM-ASUSfalse
                                                104.18.11.207
                                                maxcdn.bootstrapcdn.comUnited States
                                                13335CLOUDFLARENETUSfalse
                                                239.255.255.250
                                                unknownReserved
                                                unknownunknownfalse
                                                104.17.25.14
                                                cdnjs.cloudflare.comUnited States
                                                13335CLOUDFLARENETUSfalse
                                                142.250.203.109
                                                accounts.google.comUnited States
                                                15169GOOGLEUSfalse
                                                IP
                                                192.168.2.1
                                                127.0.0.1
                                                Joe Sandbox Version:37.0.0 Beryl
                                                Analysis ID:830987
                                                Start date and time:2023-03-20 22:33:37 +01:00
                                                Joe Sandbox Product:CloudBasic
                                                Overall analysis duration:0h 4m 45s
                                                Hypervisor based Inspection enabled:false
                                                Report type:light
                                                Cookbook file name:browseurl.jbs
                                                Sample URL:https://dfsfsfsd.s3.us-east-005.backblazeb2.com/index+(44).html
                                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                Number of analysed new started processes analysed:14
                                                Number of new started drivers analysed:0
                                                Number of existing processes analysed:0
                                                Number of existing drivers analysed:0
                                                Number of injected processes analysed:0
                                                Technologies:
                                                • HCA enabled
                                                • EGA enabled
                                                • HDC enabled
                                                • AMSI enabled
                                                Analysis Mode:default
                                                Analysis stop reason:Timeout
                                                Detection:MAL
                                                Classification:mal64.phis.win@26/9@9/10
                                                EGA Information:Failed
                                                HDC Information:Failed
                                                HCA Information:
                                                • Successful, ratio: 100%
                                                • Number of executed functions: 0
                                                • Number of non-executed functions: 0
                                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                                • TCP Packets have been reduced to 100
                                                • Excluded IPs from analysis (whitelisted): 204.79.197.200, 13.107.21.200, 8.238.85.254, 8.248.143.254, 8.248.149.254, 8.238.191.126, 8.241.126.121, 93.184.221.240, 142.250.203.99, 34.104.35.123, 172.217.168.10, 69.16.175.10, 69.16.175.42, 142.250.203.106, 216.58.215.234, 172.217.168.42
                                                • Excluded domains from analysis (whitelisted): www.bing.com, fg.download.windowsupdate.com.c.footprint.net, fonts.googleapis.com, cds.s5x3j6q5.hwcdn.net, fs.microsoft.com, content-autofill.googleapis.com, dual-a-0001.a-msedge.net, fonts.gstatic.com, ajax.googleapis.com, wu.ec.azureedge.net, ctldl.windowsupdate.com, clientservices.googleapis.com, www-www.bing.com.trafficmanager.net, wu-bg-shim.trafficmanager.net, wu.azureedge.net, edgedl.me.gvt1.com, www-bing-com.dual-a-0001.a-msedge.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, update.googleapis.com
                                                • Not all processes where analyzed, report is missing behavior information
                                                • Report size getting too big, too many NtWriteVirtualMemory calls found.
                                                No simulations
                                                No context
                                                No context
                                                No context
                                                No context
                                                No context
                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                File Type:ASCII text, with very long lines (19015)
                                                Category:downloaded
                                                Size (bytes):19188
                                                Entropy (8bit):5.212814407014048
                                                Encrypted:false
                                                SSDEEP:384:+CbuG4xGNoDic2UjKPafxwC5b/4xQviOJU7QzxzivDdE3pcGdjkd/9jt3B+Kb964:zb4xGmiJfaf7gxQvVU7eziv+cSjknZ3f
                                                MD5:70D3FDA195602FE8B75E0097EED74DDE
                                                SHA1:C3B977AA4B8DFB69D651E07015031D385DED964B
                                                SHA-256:A52F7AA54D7BCAAFA056EE0A050262DFC5694AE28DEE8B4CAC3429AF37FF0D66
                                                SHA-512:51AFFB5A8CFD2F93B473007F6987B19A0A1A0FB970DDD59EF45BD77A355D82ABBBD60468837A09823496411E797F05B1F962AE93C725ED4C00D514BA40269D14
                                                Malicious:false
                                                Reputation:low
                                                URL:https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/popper.min.js
                                                Preview:/*. Copyright (C) Federico Zivolo 2017. Distributed under the MIT License (license terms are at http://opensource.org/licenses/MIT).. */(function(e,t){'object'==typeof exports&&'undefined'!=typeof module?module.exports=t():'function'==typeof define&&define.amd?define(t):e.Popper=t()})(this,function(){'use strict';function e(e){return e&&'[object Function]'==={}.toString.call(e)}function t(e,t){if(1!==e.nodeType)return[];var o=getComputedStyle(e,null);return t?o[t]:o}function o(e){return'HTML'===e.nodeName?e:e.parentNode||e.host}function n(e){if(!e)return document.body;switch(e.nodeName){case'HTML':case'BODY':return e.ownerDocument.body;case'#document':return e.body;}var i=t(e),r=i.overflow,p=i.overflowX,s=i.overflowY;return /(auto|scroll)/.test(r+s+p)?e:n(o(e))}function r(e){var o=e&&e.offsetParent,i=o&&o.nodeName;return i&&'BODY'!==i&&'HTML'!==i?-1!==['TD','TABLE'].indexOf(o.nodeName)&&'static'===t(o,'position')?r(o):o:e?e.ownerDocument.documentElement:document.documentElement}functio
                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                File Type:HTML document, ASCII text, with very long lines (49885), with CRLF line terminators
                                                Category:downloaded
                                                Size (bytes):882335
                                                Entropy (8bit):6.029784958544243
                                                Encrypted:false
                                                SSDEEP:24576:UkeW2Gb7AXLwwKoaxOkZW7FFRl8j6W9Lwv:FnWNEGVtVv
                                                MD5:779AC7EB624E45DDDA8A95DFE830263C
                                                SHA1:6AF9804E308475C08B45D9B276E345C88ED3E689
                                                SHA-256:5E9120662DF96B611855A9D0E9918269205EFD64358DE0491695882986148910
                                                SHA-512:207D9E3D210F29D7DBD54FF626F43698633841506509A69D0831028A4233AC3CE153EC788B9D53B570EC332045F8DF00C8FB30248D759BB75F971930AF467301
                                                Malicious:false
                                                Reputation:low
                                                URL:https://dfsfsfsd.s3.us-east-005.backblazeb2.com/index+(44).html
                                                Preview:<html>..<link rel='stylesheet prefetch' href='https://fonts.googleapis.com/css?family=Open+Sans:600'>..<style>....html {...line-height: 1.15;...-ms-text-size-adjust: 100%;...-webkit-text-size-adjust: 100%..}..body {...height: 100%;...margin: 0..}..article, aside, footer, header, nav, section {...display: block..}..h1 {...font-size: 2em;...margin: .67em 0..}..figcaption, figure, main {...display: block..}..figure {...margin: 1em 40px..}..hr {...box-sizing: content-box;...height: 0;...overflow: visible..}..pre {...font-family: monospace, monospace;...font-size: 1em..}..a {...background-color: transparent;...-webkit-text-decoration-skip: objects..}..abbr[title] {...border-bottom: none;...text-decoration: underline;...text-decoration: underline dotted..}..b, strong {...font-weight: inherit..}..b, strong {...font-weight: bolder..}..code, kbd, samp {...font-family: monospace, monospace;...font-size: 1em..}..dfn {...font-style: italic..}..mark {...background-color: #ff0;...color: #000..}..sma
                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                File Type:ASCII text, with very long lines (32012)
                                                Category:downloaded
                                                Size (bytes):69597
                                                Entropy (8bit):5.369216080582935
                                                Encrypted:false
                                                SSDEEP:1536:qNhEyjjTikEJO4edXXe9J578go6MWX2xkjVe4c4j2ll2Ac7pK3F71QDU8CuT:Exc2yjq4j2uYnQDU8CuT
                                                MD5:5F48FC77CAC90C4778FA24EC9C57F37D
                                                SHA1:9E89D1515BC4C371B86F4CB1002FD8E377C1829F
                                                SHA-256:9365920887B11B33A3DC4BA28A0F93951F200341263E3B9CEFD384798E4BE398
                                                SHA-512:CAB8C4AFA1D8E3A8B7856EE29AE92566D44CEEAD70C8D533F2C98A976D77D0E1D314719B5C6A473789D8C6B21EBB4B89A6B0EC2E1C9C618FB1437EBC77D3A269
                                                Malicious:false
                                                Reputation:low
                                                URL:https://code.jquery.com/jquery-3.2.1.slim.min.js
                                                Preview:/*! jQuery v3.2.1 -ajax,-ajax/jsonp,-ajax/load,-ajax/parseXML,-ajax/script,-ajax/var/location,-ajax/var/nonce,-ajax/var/rquery,-ajax/xhr,-manipulation/_evalUrl,-event/ajax,-effects,-effects/Tween,-effects/animatedSelector | (c) JS Foundation and other contributors | jquery.org/license */.!function(a,b){"use strict";"object"==typeof module&&"object"==typeof module.exports?module.exports=a.document?b(a,!0):function(a){if(!a.document)throw new Error("jQuery requires a window with a document");return b(a)}:b(a)}("undefined"!=typeof window?window:this,function(a,b){"use strict";var c=[],d=a.document,e=Object.getPrototypeOf,f=c.slice,g=c.concat,h=c.push,i=c.indexOf,j={},k=j.toString,l=j.hasOwnProperty,m=l.toString,n=m.call(Object),o={};function p(a,b){b=b||d;var c=b.createElement("script");c.text=a,b.head.appendChild(c).parentNode.removeChild(c)}var q="3.2.1 -ajax,-ajax/jsonp,-ajax/load,-ajax/parseXML,-ajax/script,-ajax/var/location,-ajax/var/nonce,-ajax/var/rquery,-ajax/xhr,-manipulation/_e
                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                File Type:ASCII text, with very long lines (50758)
                                                Category:downloaded
                                                Size (bytes):51039
                                                Entropy (8bit):5.247253437401007
                                                Encrypted:false
                                                SSDEEP:768:E9Yw7GuJM+HV0cen/7Kh5rM7V4RxCKg8FW/xsXQUd+FiID65r48Hgp5HRl+:E9X7PMIM7V4R5LFAxTWyuHHgp5HRl+
                                                MD5:67176C242E1BDC20603C878DEE836DF3
                                                SHA1:27A71B00383D61EF3C489326B3564D698FC1227C
                                                SHA-256:56C12A125B021D21A69E61D7190CEFA168D6C28CE715265CEA1B3B0112D169C4
                                                SHA-512:9FA75814E1B9F7DB38FE61A503A13E60B82D83DB8F4CE30351BD08A6B48C0D854BAF472D891AF23C443C8293380C2325C7B3361B708AF9971AA0EA09A25CDD0A
                                                Malicious:false
                                                Reputation:low
                                                URL:https://stackpath.bootstrapcdn.com/bootstrap/4.1.3/js/bootstrap.min.js
                                                Preview:/*!. * Bootstrap v4.1.3 (https://getbootstrap.com/). * Copyright 2011-2018 The Bootstrap Authors (https://github.com/twbs/bootstrap/graphs/contributors). * Licensed under MIT (https://github.com/twbs/bootstrap/blob/master/LICENSE). */.!function(t,e){"object"==typeof exports&&"undefined"!=typeof module?e(exports,require("jquery"),require("popper.js")):"function"==typeof define&&define.amd?define(["exports","jquery","popper.js"],e):e(t.bootstrap={},t.jQuery,t.Popper)}(this,function(t,e,h){"use strict";function i(t,e){for(var n=0;n<e.length;n++){var i=e[n];i.enumerable=i.enumerable||!1,i.configurable=!0,"value"in i&&(i.writable=!0),Object.defineProperty(t,i.key,i)}}function s(t,e,n){return e&&i(t.prototype,e),n&&i(t,n),t}function l(r){for(var t=1;t<arguments.length;t++){var o=null!=arguments[t]?arguments[t]:{},e=Object.keys(o);"function"==typeof Object.getOwnPropertySymbols&&(e=e.concat(Object.getOwnPropertySymbols(o).filter(function(t){return Object.getOwnPropertyDescriptor(o,t).enum
                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                File Type:ASCII text, with very long lines (32065)
                                                Category:downloaded
                                                Size (bytes):85578
                                                Entropy (8bit):5.366055229017455
                                                Encrypted:false
                                                SSDEEP:1536:EYE1JVoiB9JqZdXXe2pD3PgoIiulrUndZ6a4tfOR7WpfWBZ2BJda4w9W3qG9a986:v4J+OlfOhWppCW6G9a98Hr2
                                                MD5:2F6B11A7E914718E0290410E85366FE9
                                                SHA1:69BB69E25CA7D5EF0935317584E6153F3FD9A88C
                                                SHA-256:05B85D96F41FFF14D8F608DAD03AB71E2C1017C2DA0914D7C59291BAD7A54F8E
                                                SHA-512:0D40BCCAA59FEDECF7243D63B33C42592541D0330FEFC78EC81A4C6B9689922D5B211011CA4BE23AE22621CCE4C658F52A1552C92D7AC3615241EB640F8514DB
                                                Malicious:false
                                                Reputation:low
                                                URL:https://ajax.googleapis.com/ajax/libs/jquery/2.2.4/jquery.min.js
                                                Preview:/*! jQuery v2.2.4 | (c) jQuery Foundation | jquery.org/license */.!function(a,b){"object"==typeof module&&"object"==typeof module.exports?module.exports=a.document?b(a,!0):function(a){if(!a.document)throw new Error("jQuery requires a window with a document");return b(a)}:b(a)}("undefined"!=typeof window?window:this,function(a,b){var c=[],d=a.document,e=c.slice,f=c.concat,g=c.push,h=c.indexOf,i={},j=i.toString,k=i.hasOwnProperty,l={},m="2.2.4",n=function(a,b){return new n.fn.init(a,b)},o=/^[\s\uFEFF\xA0]+|[\s\uFEFF\xA0]+$/g,p=/^-ms-/,q=/-([\da-z])/gi,r=function(a,b){return b.toUpperCase()};n.fn=n.prototype={jquery:m,constructor:n,selector:"",length:0,toArray:function(){return e.call(this)},get:function(a){return null!=a?0>a?this[a+this.length]:this[a]:e.call(this)},pushStack:function(a){var b=n.merge(this.constructor(),a);return b.prevObject=this,b.context=this.context,b},each:function(a){return n.each(this,a)},map:function(a){return this.pushStack(n.map(this,function(b,c){return a.call
                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                File Type:ASCII text, with very long lines (48664)
                                                Category:downloaded
                                                Size (bytes):48944
                                                Entropy (8bit):5.272507874206726
                                                Encrypted:false
                                                SSDEEP:768:9VG5R15WbHVKZrycEHSYro34CrSLB6WU/6DqBf4l1B:9VIRuo53XiwWTvl1B
                                                MD5:14D449EB8876FA55E1EF3C2CC52B0C17
                                                SHA1:A9545831803B1359CFEED47E3B4D6BAE68E40E99
                                                SHA-256:E7ED36CEEE5450B4243BBC35188AFABDFB4280C7C57597001DE0ED167299B01B
                                                SHA-512:00D9069B9BD29AD0DAA0503F341D67549CCE28E888E1AFFD1A2A45B64A4C1BC460D81CFC4751857F991F2F4FB3D2572FD97FCA651BA0C2B0255530209B182F22
                                                Malicious:false
                                                Reputation:low
                                                URL:https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0/js/bootstrap.min.js
                                                Preview:/*!. * Bootstrap v4.0.0 (https://getbootstrap.com). * Copyright 2011-2018 The Bootstrap Authors (https://github.com/twbs/bootstrap/graphs/contributors). * Licensed under MIT (https://github.com/twbs/bootstrap/blob/master/LICENSE). */.!function(t,e){"object"==typeof exports&&"undefined"!=typeof module?e(exports,require("jquery"),require("popper.js")):"function"==typeof define&&define.amd?define(["exports","jquery","popper.js"],e):e(t.bootstrap={},t.jQuery,t.Popper)}(this,function(t,e,n){"use strict";function i(t,e){for(var n=0;n<e.length;n++){var i=e[n];i.enumerable=i.enumerable||!1,i.configurable=!0,"value"in i&&(i.writable=!0),Object.defineProperty(t,i.key,i)}}function s(t,e,n){return e&&i(t.prototype,e),n&&i(t,n),t}function r(){return(r=Object.assign||function(t){for(var e=1;e<arguments.length;e++){var n=arguments[e];for(var i in n)Object.prototype.hasOwnProperty.call(n,i)&&(t[i]=n[i])}return t}).apply(this,arguments)}e=e&&e.hasOwnProperty("default")?e.default:e,n=n&&n.hasOwnProp
                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:downloaded
                                                Size (bytes):28
                                                Entropy (8bit):4.137537511266052
                                                Encrypted:false
                                                SSDEEP:3:G4iC1Y:ziC1Y
                                                MD5:C41A026A97DFC107025EEC7F45F29C85
                                                SHA1:B77C8FE6D6A770AF1758FC34B3E716656B8F2485
                                                SHA-256:8A7130BC862841606D062AC516513B01EB176CEF37D017E18B54E844E8390029
                                                SHA-512:6DE72788DA933F3DA0D1FB315335B8DE1BD9D4F7B59A0F1D1F6E758AB0D1EC3D7F0B8FFCDE16313B555BFE18832FF8671A2159F5AFCEEA6C45C2A037345ED017
                                                Malicious:false
                                                Reputation:low
                                                URL:https://content-autofill.googleapis.com/v1/pages/ChRDaHJvbWUvMTA0LjAuNTExMi44MRIXCQA2a1JSmA4aEgUNU1WBtRIFDa0JrrE=?alt=proto
                                                Preview:ChIKBw1TVYG1GgAKBw2tCa6xGgA=
                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                File Type:ASCII text, with very long lines (65325)
                                                Category:downloaded
                                                Size (bytes):144877
                                                Entropy (8bit):5.049937202697915
                                                Encrypted:false
                                                SSDEEP:1536:GcoqwrUPyDHU7c7TcDEBi82NcuSELL4d/+oENM6HN26Q:VoPgPard2oENM6HN26Q
                                                MD5:450FC463B8B1A349DF717056FBB3E078
                                                SHA1:895125A4522A3B10EE7ADA06EE6503587CBF95C5
                                                SHA-256:2C0F3DCFE93D7E380C290FE4AB838ED8CADFF1596D62697F5444BE460D1F876D
                                                SHA-512:93BF1ED5F6D8B34F53413A86EFD4A925D578C97ABC757EA871F3F46F340745E4126C48219D2E8040713605B64A9ECF7AD986AA8102F5EA5ECF9228801D962F5D
                                                Malicious:false
                                                Reputation:low
                                                URL:https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0/css/bootstrap.min.css
                                                Preview:/*!. * Bootstrap v4.0.0 (https://getbootstrap.com). * Copyright 2011-2018 The Bootstrap Authors. * Copyright 2011-2018 Twitter, Inc.. * Licensed under MIT (https://github.com/twbs/bootstrap/blob/master/LICENSE). */:root{--blue:#007bff;--indigo:#6610f2;--purple:#6f42c1;--pink:#e83e8c;--red:#dc3545;--orange:#fd7e14;--yellow:#ffc107;--green:#28a745;--teal:#20c997;--cyan:#17a2b8;--white:#fff;--gray:#6c757d;--gray-dark:#343a40;--primary:#007bff;--secondary:#6c757d;--success:#28a745;--info:#17a2b8;--warning:#ffc107;--danger:#dc3545;--light:#f8f9fa;--dark:#343a40;--breakpoint-xs:0;--breakpoint-sm:576px;--breakpoint-md:768px;--breakpoint-lg:992px;--breakpoint-xl:1200px;--font-family-sans-serif:-apple-system,BlinkMacSystemFont,"Segoe UI",Roboto,"Helvetica Neue",Arial,sans-serif,"Apple Color Emoji","Segoe UI Emoji","Segoe UI Symbol";--font-family-monospace:SFMono-Regular,Menlo,Monaco,Consolas,"Liberation Mono","Courier New",monospace}*,::after,::before{box-sizing:border-box}html{font-family:sans
                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                File Type:ASCII text
                                                Category:downloaded
                                                Size (bytes):2787
                                                Entropy (8bit):5.570988829563644
                                                Encrypted:false
                                                SSDEEP:48:ZOxMMB9kOJOxMMB9YivFZ8OxMMB9hOxMMB9eOxMMB9odUOxMMB9ZvOxMMB99toQg:ZOxMMBtJOxMMBfvFZ8OxMMBjOxMMBoOq
                                                MD5:1EFD88F39E1B11D2F6506F4E7C853D60
                                                SHA1:35ADDC2C29544E49BCA30C49CFF776D7CD6805F5
                                                SHA-256:3262C2BD70D868ED379B89EB25E964BF826721F17189A5170C352D20A7563F94
                                                SHA-512:18609127E68B33614D9FAA5E3CCB53BC2D5F8F89A1EC3DC6451D6DE90787B1F39CA0F721AE1D9DC85A850681F38E3801A38A998919B95EDDF593CDE132CA694A
                                                Malicious:false
                                                Reputation:low
                                                URL:https://fonts.googleapis.com/css?family=Open+Sans:600
                                                Preview:/* cyrillic-ext */.@font-face {. font-family: 'Open Sans';. font-style: normal;. font-weight: 600;. font-stretch: 100%;. src: url(https://fonts.gstatic.com/s/opensans/v34/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsgH1x4taVIGxA.woff2) format('woff2');. unicode-range: U+0460-052F, U+1C80-1C88, U+20B4, U+2DE0-2DFF, U+A640-A69F, U+FE2E-FE2F;.}./* cyrillic */.@font-face {. font-family: 'Open Sans';. font-style: normal;. font-weight: 600;. font-stretch: 100%;. src: url(https://fonts.gstatic.com/s/opensans/v34/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsgH1x4kaVIGxA.woff2) format('woff2');. unicode-range: U+0301, U+0400-045F, U+0490-0491, U+04B0-04B1, U+2116;.}./* greek-ext */.@font-face {. font-family: 'Open Sans';. font-style: normal;. font-weight: 600;. font-stretch: 100%;. src: url(https://fonts.gstatic.com/s/opensans/v34/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsgH1x4saVIGxA.woff2) format('woff2');. unicode-range: U+1F00-1FFF;.}./* greek */.@font-fa
                                                No static file info
                                                TimestampSource PortDest PortSource IPDest IP
                                                Mar 20, 2023 22:34:33.285990953 CET49696443192.168.2.3142.250.203.109
                                                Mar 20, 2023 22:34:33.286077023 CET44349696142.250.203.109192.168.2.3
                                                Mar 20, 2023 22:34:33.286183119 CET49696443192.168.2.3142.250.203.109
                                                Mar 20, 2023 22:34:33.286806107 CET49696443192.168.2.3142.250.203.109
                                                Mar 20, 2023 22:34:33.286845922 CET44349696142.250.203.109192.168.2.3
                                                Mar 20, 2023 22:34:33.297059059 CET49698443192.168.2.3142.250.203.110
                                                Mar 20, 2023 22:34:33.297133923 CET44349698142.250.203.110192.168.2.3
                                                Mar 20, 2023 22:34:33.297224045 CET49698443192.168.2.3142.250.203.110
                                                Mar 20, 2023 22:34:33.299969912 CET49698443192.168.2.3142.250.203.110
                                                Mar 20, 2023 22:34:33.300004959 CET44349698142.250.203.110192.168.2.3
                                                Mar 20, 2023 22:34:33.361490965 CET44349696142.250.203.109192.168.2.3
                                                Mar 20, 2023 22:34:33.371572971 CET44349698142.250.203.110192.168.2.3
                                                Mar 20, 2023 22:34:33.377690077 CET49698443192.168.2.3142.250.203.110
                                                Mar 20, 2023 22:34:33.377732038 CET44349698142.250.203.110192.168.2.3
                                                Mar 20, 2023 22:34:33.378070116 CET49696443192.168.2.3142.250.203.109
                                                Mar 20, 2023 22:34:33.378129959 CET44349696142.250.203.109192.168.2.3
                                                Mar 20, 2023 22:34:33.378335953 CET44349698142.250.203.110192.168.2.3
                                                Mar 20, 2023 22:34:33.378448963 CET49698443192.168.2.3142.250.203.110
                                                Mar 20, 2023 22:34:33.379755974 CET44349698142.250.203.110192.168.2.3
                                                Mar 20, 2023 22:34:33.379889011 CET49698443192.168.2.3142.250.203.110
                                                Mar 20, 2023 22:34:33.380012035 CET44349696142.250.203.109192.168.2.3
                                                Mar 20, 2023 22:34:33.380088091 CET49696443192.168.2.3142.250.203.109
                                                Mar 20, 2023 22:34:34.571316004 CET49698443192.168.2.3142.250.203.110
                                                Mar 20, 2023 22:34:34.571382046 CET44349698142.250.203.110192.168.2.3
                                                Mar 20, 2023 22:34:34.571466923 CET49698443192.168.2.3142.250.203.110
                                                Mar 20, 2023 22:34:34.571499109 CET44349698142.250.203.110192.168.2.3
                                                Mar 20, 2023 22:34:34.571707964 CET49696443192.168.2.3142.250.203.109
                                                Mar 20, 2023 22:34:34.571774006 CET44349698142.250.203.110192.168.2.3
                                                Mar 20, 2023 22:34:34.571779966 CET44349696142.250.203.109192.168.2.3
                                                Mar 20, 2023 22:34:34.571852922 CET49696443192.168.2.3142.250.203.109
                                                Mar 20, 2023 22:34:34.571867943 CET44349696142.250.203.109192.168.2.3
                                                Mar 20, 2023 22:34:34.572096109 CET44349696142.250.203.109192.168.2.3
                                                Mar 20, 2023 22:34:34.609304905 CET44349698142.250.203.110192.168.2.3
                                                Mar 20, 2023 22:34:34.609461069 CET49698443192.168.2.3142.250.203.110
                                                Mar 20, 2023 22:34:34.609496117 CET44349698142.250.203.110192.168.2.3
                                                Mar 20, 2023 22:34:34.609720945 CET44349698142.250.203.110192.168.2.3
                                                Mar 20, 2023 22:34:34.609810114 CET49698443192.168.2.3142.250.203.110
                                                Mar 20, 2023 22:34:34.625536919 CET44349696142.250.203.109192.168.2.3
                                                Mar 20, 2023 22:34:34.625688076 CET49696443192.168.2.3142.250.203.109
                                                Mar 20, 2023 22:34:34.625736952 CET44349696142.250.203.109192.168.2.3
                                                Mar 20, 2023 22:34:34.625962973 CET44349696142.250.203.109192.168.2.3
                                                Mar 20, 2023 22:34:34.626050949 CET49696443192.168.2.3142.250.203.109
                                                Mar 20, 2023 22:34:34.643790960 CET49696443192.168.2.3142.250.203.109
                                                Mar 20, 2023 22:34:34.643824100 CET44349696142.250.203.109192.168.2.3
                                                Mar 20, 2023 22:34:34.644315958 CET49698443192.168.2.3142.250.203.110
                                                Mar 20, 2023 22:34:34.644345999 CET44349698142.250.203.110192.168.2.3
                                                Mar 20, 2023 22:34:35.280416012 CET49699443192.168.2.3149.137.137.254
                                                Mar 20, 2023 22:34:35.280500889 CET44349699149.137.137.254192.168.2.3
                                                Mar 20, 2023 22:34:35.280642986 CET49699443192.168.2.3149.137.137.254
                                                Mar 20, 2023 22:34:35.280951977 CET49699443192.168.2.3149.137.137.254
                                                Mar 20, 2023 22:34:35.281001091 CET44349699149.137.137.254192.168.2.3
                                                Mar 20, 2023 22:34:35.533071041 CET44349699149.137.137.254192.168.2.3
                                                Mar 20, 2023 22:34:35.533456087 CET49699443192.168.2.3149.137.137.254
                                                Mar 20, 2023 22:34:35.533498049 CET44349699149.137.137.254192.168.2.3
                                                Mar 20, 2023 22:34:35.534892082 CET44349699149.137.137.254192.168.2.3
                                                Mar 20, 2023 22:34:35.534992933 CET49699443192.168.2.3149.137.137.254
                                                Mar 20, 2023 22:34:35.570651054 CET49699443192.168.2.3149.137.137.254
                                                Mar 20, 2023 22:34:35.570722103 CET44349699149.137.137.254192.168.2.3
                                                Mar 20, 2023 22:34:35.570909977 CET49699443192.168.2.3149.137.137.254
                                                Mar 20, 2023 22:34:35.570925951 CET44349699149.137.137.254192.168.2.3
                                                Mar 20, 2023 22:34:35.571049929 CET44349699149.137.137.254192.168.2.3
                                                Mar 20, 2023 22:34:35.708223104 CET49699443192.168.2.3149.137.137.254
                                                Mar 20, 2023 22:34:35.708275080 CET44349699149.137.137.254192.168.2.3
                                                Mar 20, 2023 22:34:35.779844046 CET44349699149.137.137.254192.168.2.3
                                                Mar 20, 2023 22:34:35.779900074 CET44349699149.137.137.254192.168.2.3
                                                Mar 20, 2023 22:34:35.779948950 CET44349699149.137.137.254192.168.2.3
                                                Mar 20, 2023 22:34:35.779967070 CET44349699149.137.137.254192.168.2.3
                                                Mar 20, 2023 22:34:35.779985905 CET44349699149.137.137.254192.168.2.3
                                                Mar 20, 2023 22:34:35.779999018 CET49699443192.168.2.3149.137.137.254
                                                Mar 20, 2023 22:34:35.780073881 CET44349699149.137.137.254192.168.2.3
                                                Mar 20, 2023 22:34:35.780121088 CET49699443192.168.2.3149.137.137.254
                                                Mar 20, 2023 22:34:35.780121088 CET49699443192.168.2.3149.137.137.254
                                                Mar 20, 2023 22:34:35.780121088 CET49699443192.168.2.3149.137.137.254
                                                Mar 20, 2023 22:34:35.780148029 CET44349699149.137.137.254192.168.2.3
                                                Mar 20, 2023 22:34:35.780205011 CET49699443192.168.2.3149.137.137.254
                                                Mar 20, 2023 22:34:35.880132914 CET44349699149.137.137.254192.168.2.3
                                                Mar 20, 2023 22:34:35.880162954 CET44349699149.137.137.254192.168.2.3
                                                Mar 20, 2023 22:34:35.880254984 CET49699443192.168.2.3149.137.137.254
                                                Mar 20, 2023 22:34:35.880264997 CET44349699149.137.137.254192.168.2.3
                                                Mar 20, 2023 22:34:35.880283117 CET44349699149.137.137.254192.168.2.3
                                                Mar 20, 2023 22:34:35.880297899 CET44349699149.137.137.254192.168.2.3
                                                Mar 20, 2023 22:34:35.880302906 CET49699443192.168.2.3149.137.137.254
                                                Mar 20, 2023 22:34:35.880330086 CET49699443192.168.2.3149.137.137.254
                                                Mar 20, 2023 22:34:35.880371094 CET44349699149.137.137.254192.168.2.3
                                                Mar 20, 2023 22:34:35.880405903 CET49699443192.168.2.3149.137.137.254
                                                Mar 20, 2023 22:34:35.880405903 CET49699443192.168.2.3149.137.137.254
                                                Mar 20, 2023 22:34:35.880428076 CET44349699149.137.137.254192.168.2.3
                                                Mar 20, 2023 22:34:35.880462885 CET49699443192.168.2.3149.137.137.254
                                                Mar 20, 2023 22:34:35.929647923 CET44349699149.137.137.254192.168.2.3
                                                Mar 20, 2023 22:34:35.929677010 CET44349699149.137.137.254192.168.2.3
                                                Mar 20, 2023 22:34:35.929835081 CET49699443192.168.2.3149.137.137.254
                                                Mar 20, 2023 22:34:35.929835081 CET49699443192.168.2.3149.137.137.254
                                                Mar 20, 2023 22:34:35.929838896 CET44349699149.137.137.254192.168.2.3
                                                Mar 20, 2023 22:34:35.929886103 CET44349699149.137.137.254192.168.2.3
                                                Mar 20, 2023 22:34:35.929908991 CET44349699149.137.137.254192.168.2.3
                                                Mar 20, 2023 22:34:35.929955959 CET44349699149.137.137.254192.168.2.3
                                                Mar 20, 2023 22:34:35.930001020 CET49699443192.168.2.3149.137.137.254
                                                Mar 20, 2023 22:34:35.930001020 CET49699443192.168.2.3149.137.137.254
                                                Mar 20, 2023 22:34:35.930001020 CET49699443192.168.2.3149.137.137.254
                                                Mar 20, 2023 22:34:35.930006027 CET44349699149.137.137.254192.168.2.3
                                                TimestampSource PortDest PortSource IPDest IP
                                                Mar 20, 2023 22:34:33.231920004 CET4997753192.168.2.38.8.8.8
                                                Mar 20, 2023 22:34:33.233052969 CET5784053192.168.2.38.8.8.8
                                                Mar 20, 2023 22:34:33.258387089 CET53499778.8.8.8192.168.2.3
                                                Mar 20, 2023 22:34:33.261249065 CET53578408.8.8.8192.168.2.3
                                                Mar 20, 2023 22:34:33.797461033 CET5799053192.168.2.38.8.8.8
                                                Mar 20, 2023 22:34:33.818470955 CET53579908.8.8.8192.168.2.3
                                                Mar 20, 2023 22:34:36.329946041 CET5295553192.168.2.38.8.8.8
                                                Mar 20, 2023 22:34:36.334986925 CET6058253192.168.2.38.8.8.8
                                                Mar 20, 2023 22:34:36.349397898 CET53529558.8.8.8192.168.2.3
                                                Mar 20, 2023 22:34:36.379159927 CET5713453192.168.2.38.8.8.8
                                                Mar 20, 2023 22:34:36.397258997 CET5604253192.168.2.38.8.8.8
                                                Mar 20, 2023 22:34:36.401427031 CET53571348.8.8.8192.168.2.3
                                                Mar 20, 2023 22:34:36.419397116 CET53560428.8.8.8192.168.2.3
                                                Mar 20, 2023 22:34:36.420403004 CET5963653192.168.2.38.8.8.8
                                                Mar 20, 2023 22:34:36.451076031 CET53596368.8.8.8192.168.2.3
                                                Mar 20, 2023 22:35:36.486462116 CET5199253192.168.2.38.8.8.8
                                                Mar 20, 2023 22:35:36.514359951 CET53519928.8.8.8192.168.2.3
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Mar 20, 2023 22:34:33.231920004 CET192.168.2.38.8.8.80x8610Standard query (0)clients2.google.comA (IP address)IN (0x0001)false
                                                Mar 20, 2023 22:34:33.233052969 CET192.168.2.38.8.8.80xa57fStandard query (0)accounts.google.comA (IP address)IN (0x0001)false
                                                Mar 20, 2023 22:34:33.797461033 CET192.168.2.38.8.8.80xe2cStandard query (0)dfsfsfsd.s3.us-east-005.backblazeb2.comA (IP address)IN (0x0001)false
                                                Mar 20, 2023 22:34:36.329946041 CET192.168.2.38.8.8.80x3897Standard query (0)maxcdn.bootstrapcdn.comA (IP address)IN (0x0001)false
                                                Mar 20, 2023 22:34:36.334986925 CET192.168.2.38.8.8.80x5894Standard query (0)code.jquery.comA (IP address)IN (0x0001)false
                                                Mar 20, 2023 22:34:36.379159927 CET192.168.2.38.8.8.80x9a7bStandard query (0)cdnjs.cloudflare.comA (IP address)IN (0x0001)false
                                                Mar 20, 2023 22:34:36.397258997 CET192.168.2.38.8.8.80x3dcStandard query (0)stackpath.bootstrapcdn.comA (IP address)IN (0x0001)false
                                                Mar 20, 2023 22:34:36.420403004 CET192.168.2.38.8.8.80x5087Standard query (0)www.google.comA (IP address)IN (0x0001)false
                                                Mar 20, 2023 22:35:36.486462116 CET192.168.2.38.8.8.80x72b5Standard query (0)www.google.comA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Mar 20, 2023 22:34:22.546449900 CET8.8.8.8192.168.2.30xb105No error (0)au.c-0001.c-msedge.netc-0001.c-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                Mar 20, 2023 22:34:22.546449900 CET8.8.8.8192.168.2.30xb105No error (0)c-0001.c-msedge.net13.107.4.50A (IP address)IN (0x0001)false
                                                Mar 20, 2023 22:34:22.962954998 CET8.8.8.8192.168.2.30x6420No error (0)au.c-0001.c-msedge.netc-0001.c-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                Mar 20, 2023 22:34:22.962954998 CET8.8.8.8192.168.2.30x6420No error (0)c-0001.c-msedge.net13.107.4.50A (IP address)IN (0x0001)false
                                                Mar 20, 2023 22:34:33.258387089 CET8.8.8.8192.168.2.30x8610No error (0)clients2.google.comclients.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                Mar 20, 2023 22:34:33.258387089 CET8.8.8.8192.168.2.30x8610No error (0)clients.l.google.com142.250.203.110A (IP address)IN (0x0001)false
                                                Mar 20, 2023 22:34:33.261249065 CET8.8.8.8192.168.2.30xa57fNo error (0)accounts.google.com142.250.203.109A (IP address)IN (0x0001)false
                                                Mar 20, 2023 22:34:33.818470955 CET8.8.8.8192.168.2.30xe2cNo error (0)dfsfsfsd.s3.us-east-005.backblazeb2.com149.137.137.254A (IP address)IN (0x0001)false
                                                Mar 20, 2023 22:34:36.349397898 CET8.8.8.8192.168.2.30x3897No error (0)maxcdn.bootstrapcdn.com104.18.11.207A (IP address)IN (0x0001)false
                                                Mar 20, 2023 22:34:36.349397898 CET8.8.8.8192.168.2.30x3897No error (0)maxcdn.bootstrapcdn.com104.18.10.207A (IP address)IN (0x0001)false
                                                Mar 20, 2023 22:34:36.357712030 CET8.8.8.8192.168.2.30x5894No error (0)code.jquery.comcds.s5x3j6q5.hwcdn.netCNAME (Canonical name)IN (0x0001)false
                                                Mar 20, 2023 22:34:36.401427031 CET8.8.8.8192.168.2.30x9a7bNo error (0)cdnjs.cloudflare.com104.17.25.14A (IP address)IN (0x0001)false
                                                Mar 20, 2023 22:34:36.401427031 CET8.8.8.8192.168.2.30x9a7bNo error (0)cdnjs.cloudflare.com104.17.24.14A (IP address)IN (0x0001)false
                                                Mar 20, 2023 22:34:36.419397116 CET8.8.8.8192.168.2.30x3dcNo error (0)stackpath.bootstrapcdn.com104.18.10.207A (IP address)IN (0x0001)false
                                                Mar 20, 2023 22:34:36.419397116 CET8.8.8.8192.168.2.30x3dcNo error (0)stackpath.bootstrapcdn.com104.18.11.207A (IP address)IN (0x0001)false
                                                Mar 20, 2023 22:34:36.451076031 CET8.8.8.8192.168.2.30x5087No error (0)www.google.com142.250.203.100A (IP address)IN (0x0001)false
                                                Mar 20, 2023 22:35:36.514359951 CET8.8.8.8192.168.2.30x72b5No error (0)www.google.com142.250.203.100A (IP address)IN (0x0001)false
                                                • clients2.google.com
                                                • accounts.google.com
                                                • dfsfsfsd.s3.us-east-005.backblazeb2.com
                                                • https:
                                                  • maxcdn.bootstrapcdn.com
                                                  • cdnjs.cloudflare.com
                                                  • stackpath.bootstrapcdn.com

                                                Click to jump to process

                                                Target ID:0
                                                Start time:22:34:29
                                                Start date:20/03/2023
                                                Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank
                                                Imagebase:0x7ff614650000
                                                File size:2851656 bytes
                                                MD5 hash:0FEC2748F363150DC54C1CAFFB1A9408
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:low

                                                Target ID:1
                                                Start time:22:34:30
                                                Start date:20/03/2023
                                                Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                Wow64 process (32bit):false
                                                Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1928 --field-trial-handle=1644,i,2101607640442121641,12480239808714859300,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationTargetPrediction /prefetch:8
                                                Imagebase:0x7ff614650000
                                                File size:2851656 bytes
                                                MD5 hash:0FEC2748F363150DC54C1CAFFB1A9408
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:low

                                                Target ID:2
                                                Start time:22:34:31
                                                Start date:20/03/2023
                                                Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Program Files\Google\Chrome\Application\chrome.exe" "https://dfsfsfsd.s3.us-east-005.backblazeb2.com/index+(44).html
                                                Imagebase:0x7ff614650000
                                                File size:2851656 bytes
                                                MD5 hash:0FEC2748F363150DC54C1CAFFB1A9408
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:low

                                                No disassembly