ID: 430663 Cookbook: browseurl.jbs Time: 19:08:03 Date: 07/06/2021 Version: 32.0.0 Black Diamond Table of Contents

Table of Contents 2 Analysis Report https://efax-01.simplesite.com/ 3 Overview 3 General Information 3 Detection 3 Signatures 3 Classification 3 Process Tree 3 Malware Configuration 3 Yara Overview 3 Dropped Files 3 Sigma Overview 3 Signature Overview 3 AV Detection: 4 Phishing: 4 Mitre Att&ck Matrix 4 Behavior Graph 4 Screenshots 5 Thumbnails 5 Antivirus, Machine Learning and Genetic Malware Detection 6 Initial Sample 6 Dropped Files 6 Unpacked PE Files 6 Domains 6 URLs 6 Domains and IPs 7 Contacted Domains 7 Contacted URLs 7 URLs from Memory and Binaries 7 Contacted IPs 7 Public 7 General Information 8 Simulations 8 Behavior and APIs 8 Joe Sandbox View / Context 8 IPs 8 Domains 8 ASN 9 JA3 Fingerprints 9 Dropped Files 9 Created / dropped Files 9 Static File Info 32 No static file info 32 Network Behavior 32 Network Port Distribution 32 TCP Packets 32 UDP Packets 32 DNS Queries 32 DNS Answers 32 HTTPS Packets 34 Code Manipulations 42 Statistics 42 Behavior 42 System Behavior 42 Analysis Process: iexplore.exe PID: 2644 Parent PID: 792 43 General 43 File Activities 43 Registry Activities 43 Analysis Process: iexplore.exe PID: 4688 Parent PID: 2644 43 General 43 File Activities 43 Registry Activities 43 Disassembly 43

Copyright Joe Security LLC 2021 Page 2 of 43 Analysis Report https://efax-01.simplesite.com/

Overview

General Information Detection Signatures Classification

Sample URL: https://efax-01.simpl esite.com/ AAnntttiiivviiirrruuss ddeettteecctttiiioonn fffoorrr UURRLL oorrr ddoomaaiiinn

Analysis ID: 430663 YAYanarrtraiav idrdueesttte edccettteeteddc HtHiotttmn lllfPPohrh iiiUsshhR11L00 or domain Infos: PYPhahiirissahh diiinneggt e ssciiitttee d dd eHetttteemcctlttPeedhd i (s((bbhaa1ss0eedd oonn llloogg…

Ransomware Most interesting Screenshot: Phishing site detected (based on log HPHThTiMshLLi n bbgoo dsdyiyt e cc odonentttaeaiciinntses d llloo (wwb a nnsuuemdb boeenrrr loofffg … Miner Spreading

HHTTMLL tbtiitotlleed ydd ocoeoesns t nanoiontt s m loaawttcc hhn uUUmRRbLLer of mmaallliiiccciiioouusss HHTTMLL tttiiitttlllee ddooeess nnoottt maatttcchh UURRLL malicious

Evader Phishing

sssuusssppiiiccciiioouusss SHSuTussMppLiiicc iitioiotuluess d fffoorerrms nUUoRRt LLm fffaootuucnhnd dURL suspicious

cccllleeaann

clean Suspicious form URL found Exploiter Banker

HTMLPhisher Spyware Trojan / Bot Adware

Score: 60 Range: 0 - 100 Whitelisted: false Confidence: 100%

Process Tree

System is w10x64 iexplore.exe (PID: 2644 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596) iexplore.exe (PID: 4688 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:2644 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A) cleanup

Malware Configuration

No configs have been found

Yara Overview

Dropped Files

Source Rule Description Author Strings C:\Users\user\AppData\Local\Microsoft\Windows\INet JoeSecurity_HtmlPhish_10 Yara detected Joe Security Cache\IE\PSUEOSZZ\YUYTH2QQ.htm HtmlPhish_10

Sigma Overview

No Sigma rule has matched

Signature Overview

Copyright Joe Security LLC 2021 Page 3 of 43 Click to jump to signature section

AV Detection:

Antivirus detection for URL or domain

Phishing:

Yara detected HtmlPhish10

Phishing site detected (based on logo template match)

Mitre Att&ck Matrix

Command Remote Initial Privilege Defense Credential Lateral and Network Service Access Execution Persistence Escalation Evasion Access Discovery Movement Collection Exfiltration Control Effects Effects Impact Valid Windows Path Process Masquerading 1 OS File and Remote Data from Exfiltration Encrypted Eavesdrop on Remotely Modify Accounts Management Interception Injection 1 Credential Directory Services Local Over Other Channel 2 Insecure Track Device System Instrumentation Dumping Discovery 1 System Network Network Without Partition Medium Communication Authorization Default Scheduled Boot or Boot or Process LSASS Application Remote Data from Exfiltration Non- Exploit SS7 to Remotely Device Accounts Task/Job Logon Logon Injection 1 Memory Window Desktop Removable Over Application Redirect Phone Wipe Data Lockout Initialization Initialization Discovery Protocol Media Bluetooth Layer Calls/SMS Without Scripts Scripts Protocol 1 Authorization Domain At (Linux) Logon Script Logon Obfuscated Files Security Query SMB/Windows Data from Automated Application Exploit SS7 to Obtain Delete Accounts (Windows) Script or Information 1 Account Registry Admin Shares Network Exfiltration Layer Track Device Device Device (Windows) Manager Shared Protocol 2 Location Cloud Data Drive Backups

Behavior Graph

Copyright Joe Security LLC 2021 Page 4 of 43 Hide Legend Behavior Graph Legend: ID: 430663 Process URL: https://efax-01.simplesite.com/ Startdate: 07/06/2021 Signature Architecture: WINDOWS Created File Score: 60 DNS/IP Info Is Dropped

efax-01.simplesite.com Is Windows Process

Number of created Registry Values started Number of created Files

Phishing site detected Antivirus detection Yara detected HtmlPhish10 (based on logo template Visual Basic for URL or domain match) Delphi

Java

iexplore.exe .Net C# or VB.NET

C, C++ or other language

6 62 Is malicious

Internet started

iexplore.exe

9 159

pages-wildcard.weebly.com weebly.map.fastly.net

199.34.228.54, 443, 49758, 49759 151.101.1.46, 443, 49764, 49765 11 other IPs or domains dropped WEEBLYUS FASTLYUS United States United States

C:\Users\user\AppData\Local\...\YUYTH2QQ.htm, HTML

Screenshots

Thumbnails This section contains all screenshots as thumbnails, including those not shown in the slideshow.

Copyright Joe Security LLC 2021 Page 5 of 43 Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

Source Detection Scanner Label Link https://efax-01.simplesite.com/ 0% Virustotal Browse https://efax-01.simplesite.com/ 0% Avira URL Cloud safe

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

Source Detection Scanner Label Link weebly.map.fastly.net 0% Virustotal Browse

URLs

Source Detection Scanner Label Link

Copyright Joe Security LLC 2021 Page 6 of 43 Source Detection Scanner Label Link https://securemailoffice365onlinefaxmessages.weebly.com/ 100% SlashNext Fake Login Page type: Phishing & Social Engineering .sf.net)IoniconsIoniconsMediumMediumFontForge 0% Avira URL Cloud safe fontforge.sf.net) 0% Avira URL Cloud safe https://securemailoffisite.com/ 0% Avira URL Cloud safe hammerjs.github.io/ 0% Avira URL Cloud safe https://www.gstatic.cn/charts/debug/% 0% URL Reputation safe https://www.gstatic.cn/charts/debug/% 0% URL Reputation safe https://www.gstatic.cn/charts/debug/% 0% URL Reputation safe https://fontawesome.comhttps://fontawesome.comFont 0% Avira URL Cloud safe https://www.gstatic.cn/charts/% 0% URL Reputation safe https://www.gstatic.cn/charts/% 0% URL Reputation safe https://www.gstatic.cn/charts/% 0% URL Reputation safe https://www.internalfb.com/intern/invariant/ 0% URL Reputation safe https://www.internalfb.com/intern/invariant/ 0% URL Reputation safe https://www.internalfb.com/intern/invariant/ 0% URL Reputation safe https://www.google.%/ads/ga-audiences? 0% URL Reputation safe https://www.google.%/ads/ga-audiences? 0% URL Reputation safe https://www.google.%/ads/ga-audiences? 0% URL Reputation safe fontforge.sf.net)Created 0% Avira URL Cloud safe

Domains and IPs

Contacted Domains

Name IP Active Malicious Antivirus Detection Reputation efax-01.simplesite.com 143.204.98.105 true false high css.simplesite.com 143.204.98.33 true false high pages-wildcard.weebly.com 199.34.228.54 true false high scontent.xx.fbcdn.net 31.13.92.14 true false high cdn.simplesite.com 143.204.98.102 true false high sp-2020021412301152490000000a- 44.241.96.221 true false high 1069308460.us-west-2.elb.amazonaws.com www.simplesite.com 143.204.98.111 true false high weebly.map.fastly.net 151.101.1.46 true false 0%, Virustotal, Browse unknown ec.editmysite.com unknown unknown false high securemailoffice365onlinefaxmessages.weebly.co unknown unknown false high m cdn2.editmysite.com unknown unknown false high fpdownload.macromedia.com unknown unknown false high connect.facebook.net unknown unknown false high

Contacted URLs

Name Malicious Antivirus Detection Reputation https://efax-01.simplesite.com/ false high https://securemailoffice365onlinefaxmessages.weebly.com/ false SlashNext: Fake Login Page type: Phishing & high Social Engineering

URLs from Memory and Binaries

Contacted IPs

Public

IP Domain Country Flag ASN ASN Name Malicious 31.13.92.14 scontent.xx.fbcdn.net Ireland 32934 FACEBOOKUS false 151.101.1.46 weebly.map.fastly.net United States 54113 FASTLYUS false 199.34.228.54 pages- United States 27647 WEEBLYUS false wildcard.weebly.com 143.204.98.105 efax-01.simplesite.com United States 16509 AMAZON-02US false

Copyright Joe Security LLC 2021 Page 7 of 43 IP Domain Country Flag ASN ASN Name Malicious 44.241.96.221 sp- United States 16509 AMAZON-02US false 2020021412301152490000 000a-1069308460.us- west- 2.elb.amazonaws.com 143.204.98.33 css.simplesite.com United States 16509 AMAZON-02US false 143.204.98.111 www.simplesite.com United States 16509 AMAZON-02US false 143.204.98.102 cdn.simplesite.com United States 16509 AMAZON-02US false

General Information

Joe Sandbox Version: 32.0.0 Black Diamond Analysis ID: 430663 Start date: 07.06.2021 Start time: 19:08:03 Joe Sandbox Product: CloudBasic Overall analysis duration: 0h 3m 20s Hypervisor based Inspection enabled: false Report type: light Cookbook file name: browseurl.jbs Sample URL: https://efax-01.simplesite.com/ Analysis system description: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211 Number of analysed new started processes analysed: 13 Number of new started drivers analysed: 0 Number of existing processes analysed: 0 Number of existing drivers analysed: 0 Number of injected processes analysed: 0 Technologies: HCA enabled EGA enabled AMSI enabled Analysis Mode: default Analysis stop reason: Timeout Detection: MAL Classification: mal60.phis.win@3/69@10/8 Cookbook Comments: Adjust boot time Enable AMSI Browsing link: https://securem ailoffice365onlinefaxmessages.weebly.com/ Warnings: Show All

Simulations

Behavior and APIs

No simulations

Joe Sandbox View / Context

IPs

No context

Domains

Copyright Joe Security LLC 2021 Page 8 of 43 No context

ASN

No context

JA3 Fingerprints

No context

Dropped Files

No context

Created / dropped Files

C:\Users\user\AppData\Local\Microsoft\Internet Explorer\DOMStore\EA1BGKC2\efax-01.simplesite[1].xml Process: C:\Program Files (x86)\Internet Explorer\iexplore.exe File Type: ASCII text, with no line terminators Category: dropped Size (bytes): 26 Entropy (8bit): 2.469670487371862 Encrypted: false SSDEEP: 3:D90aK1r0aKb:JFK1rFKb MD5: 132294CA22370B52822C17DCB5BE3AF6 SHA1: DD26B82638AD38AD471F7621A9EB79FED448A71C SHA-256: 451ABBE0AEFC000F49967DABF8D42344D146429F03C8C8D4AE5E33FF9963CF77 SHA-512: 6D5808CAD199A785C82763C68F0AE1F4938C304B46B70529EA26B3D300EF9430AD496C688D95D01588576B3A577001D62245D98137FD5CD825AD62E17D36F15C Malicious: false Reputation: low Preview:

C:\Users\user\AppData\Local\Microsoft\Internet Explorer\DOMStore\Z6EMRDPE\securemailoffice365onlinefaxmessages.weebly[1].xml Process: C:\Program Files (x86)\Internet Explorer\iexplore.exe File Type: ASCII text, with very long lines, with no line terminators Category: dropped Size (bytes): 2730 Entropy (8bit): 5.710498379172651 Encrypted: false SSDEEP: 48:0vkQqDx22J8TdlxGRenn4nL5SYXONV5dMXtMDRCQm4hwkIwTWO5Ma9C9D7p5dKbA:PQqDc2J8TdlxGRen4nL5SYXOT5SXtMD6 MD5: AC1497B2595D4839C04D0D24AA2B5EEF SHA1: EF2933698E4D2E12268D19791880C713B7F7EA42 SHA-256: 4165C9DC36DC2DC9DA5604B254EAFEA980890E0B0D3DFA7184F59A82DF39B780 SHA-512: DED89E8910F62620F3A2EC756BC437E10C6505B77820B850320390BD862B63D66A0F9FCAF83FE42FAD3A7334EFC61D87895ACE03181978F72F5E9280E5AA6146 Malicious: false Reputation: low Preview: ...e.

C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\OZpEg_xvsDZQL_LKIF7q4jP3zWj8[1].woff

Process: C:\Program Files (x86)\Internet Explorer\iexplore.exe File Type: Web Open Format, TrueType, length 47412, version 1.1 Category: downloaded Size (bytes): 47412 Entropy (8bit): 7.990698856684309 Encrypted: true SSDEEP: 768:eI9DP3yJ7JOVfH2mdxSZAzNWJmQwewBdNYttezZOdTLI+F5jTQ27KLxL8iE6RSqR:ndPi2W+xSZABwmQw9dmttez4H1zHQwut MD5: F4CE2FACE198528C023D9829F2C8A966 SHA1: 721DA89B459818124B5556D8305807E29E0C9805 SHA-256: BE959900EB3AFF193CDD7192A33B91BB664755F7068B51E6533E8E37CBC32014 SHA-512: 5D7B2DC217BCCA5EFAF328ABA465E2EF491BD7714E93E70BC13C60D44681DFFD51FF3B91DB99CA741A145DF9C58B6DAE46D9F936A83383C99E63174E75ED3D 04 Malicious: false Reputation: low IE Cache URL: https://fonts.gstatic.com/s/quattrocento/v12/OZpEg_xvsDZQL_LKIF7q4jP3zWj8.woff Preview: wOFF...... 4...... )\...... GPOS...l...... ".(..GSUB...t...... A.L.OS/2...... S...`l..>cmap...L...... Qa3Vcvt ...4...%...0...@fpgm...\...... IAy..gasp...... glyf...... J...J .N.head...T...6...6.G..hhea...... $...)hmtx...... 4.....K".loca...... j...maxp...... ,name...... C...8M.b.post...... b....prep...... V...V...x.4.C.PQ.E..:.n.mL.m.v.l.m..i.o..l...... };..E.DE.u.>.... >C"...;.8...... `.....9.....EQQ_..k.J.X../...r8;<...... Ny^~U..*..m....j.:.n..n...... ~._..&..i.....k&..f..m.yj.[a...v.]j?;.r...k...... ~...'..\[email protected]O.c...M..f...e....v...=...... /...s...N.S]..[..Y...X...... [email protected]../...... p...V.C....\>;..^.r.7k!Z+.....dx*..F...`g.E/.q..O...... W]...... /90.."G+-C..}...|r...... F...}.. ..h...d.e..<[email protected]..|:..L.R...... @-c.6.}....u

C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\S6u9w4BMUTPHh6UVSwaPHw[1].woff Process: C:\Program Files (x86)\Internet Explorer\iexplore.exe File Type: Web Open Font Format, TrueType, length 30356, version 1.1 Category: downloaded Size (bytes): 30356 Entropy (8bit): 7.984659107266564 Encrypted: false SSDEEP: 768:7wRsdJP2Pm1jtroogr9oYiCZ2dBhcb6WiMCkCB6:7wqdJu+1jtgRo9CZOBKb6JMfCB6 MD5: C3A17DCD22924A57167BDCA954763C01 SHA1: 670A02140DCE20D2C174049489F9FE7FEC20E4F7 SHA-256: 66BDD962AD3C4A394964E44600D43808FC3377E3323E00C86213C2564AAE5651 SHA-512: DBFC9CD39B4521FAB9CC2FE75B7C9EB9D31DAA9606571726185CBCC7D6A6A913C80F6DDAD8FC16E95C14E3578185E737E0E578DFC99794B18224CC07A23B7C 3C Malicious: false Reputation: low IE Cache URL: https://fonts.gstatic.com/s/lato/v17/S6u9w4BMUTPHh6UVSwaPHw.woff Preview: wOFF...... v...... @...... GPOS...l...x...X..Y.GSUB...... S...p.S..OS/2...8...Z...`zed.cmap...... Q.[cvt ...L...*...... fpgm...x...... rZr@gasp...... glyf...... ]Z.... ]..$head..n`...6...6...Ghhea..n...... $....hmtx..n....I.....0H.loca..q...... BQz.maxp..r...... name..s....1....8.P.post..tP...... g.prep..vH...K...K....x.T..leQ.EW.>~Dc.m.m+....m ...... {Sg....(4.;..{...1...... p.b[.u...1.%.".w\..[p..`...:...... 3P....[....Z]._.g.l.Lm..%.E...... c.T..fKs..]Yh.T.v.wKW.d.]Q.j...... R..j...`..}.!7.B.|....bb1..A...... c...8'..>..[...... \X...*:&6.8. FujR.:4.!.hJ3..V...miG{:.Nt....C?.2.!.e.#..X.1...c>.X.b.....a....V.....d.{....r....O....L....(.8..Nr.3.....5.s...... y.c..g..5...W.._..?.D.I....G...... k.....`..+X.(.*.....V7zZ...w...y...... T.n..e$".-@ .5M...... 1&...... ".T...v.....4%.....5s8...~..6.(...nr...~...... }..<.j.D...X ^...&u...@#M4.....1..q..7*[email protected].,._...... [!.dR....!U<.%..O!.L...Tt1....g..p6z1...D....

C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\api[1].js Process: C:\Program Files (x86)\Internet Explorer\iexplore.exe File Type: ASCII text, with very long lines, with no line terminators Category: downloaded Size (bytes): 852 Entropy (8bit): 5.5042056563136175 Encrypted: false SSDEEP: 24:2jkm94/zKPccAjZy+KVCetjK1iO0FsLqo40RWUnYN:VKEcixKoehK1iO0iLrwUnG MD5: 693DE0A9EB3960A4E5938E3A3AE0774E SHA1: 5C9491B9E447E5367352DD7449BD61A31B9ADEEC SHA-256: 26A7814D15E84C9FA9257A6F35AABAFF58835A67EF9BB29CA1FD17C4EFE320CD SHA-512: ACE03F400EF3C706813426A1449F2A7616380CF8A628E3276FE47BF1D689D99E3A6BE55F62EBB445EF36871A7EFF5F769E41A159D408DDF8971CCE76EE84BA07 Malicious: false Reputation: low IE Cache URL: https://www.google.com/recaptcha/api.js?render=explicit&hl=en

Copyright Joe Security LLC 2021 Page 11 of 43 C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\api[1].js Preview: /* PLEASE DO NOT COPY AND PASTE THIS CODE. */(function(){var w=window,C='___grecaptcha_cfg',cfg=w[C]=w[C]||{},N='grecaptcha';var gr=w[N]=w[N]||{};gr.r eady=gr.ready||function(f){(cfg['fns']=cfg['fns']||[]).push(f);};w['__recaptcha_api']='https://www.google.com/recaptcha/api2/';(cfg['render']=cfg['render']||[]).push('explicit');w[ '__google_recaptcha_client']=true;var d=document,po=d.createElement('script');po.type='text/javascript';po.async=true;po.src='https://www.gstatic.com/recaptcha/ releases/CdDdhZfPbLLrfYLBdThNS0-Y/recaptcha__en.js';po.crossOrigin='anonymous';po.integrity='sha384-3pNlpjOSWmuah66pVKQKOiPacG4Zb6CkqGCd1vLD 1fLs77yx0HzO8mvn4afvVxw4';var e=d.querySelector('script[nonce]'),n=e&&(e['nonce']||e.getAttribute('nonce'));if(n){po.setAttribute('nonce',n);}var s=d.getElement sByTagName('script')[0];s.parentNode.insertBefore(po, s);})();

C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\css[1].css Process: C:\Program Files (x86)\Internet Explorer\iexplore.exe File Type: ASCII text Category: dropped Size (bytes): 368 Entropy (8bit): 5.131961962605393 Encrypted: false SSDEEP: 6:0IFFN+56ZN7izlpdgmJk2SpJNijFFBPLQ+56ZRWHTizlpdTczfr1nNin:jF3O6ZN76paKeqF70O6ZRoT6p2zRY MD5: 95821BA6370D527B91BB2DCFAD42C0D0 SHA1: AF76A7EAFC5077992D3177012F51EE270DEA7E34 SHA-256: E45B4BC394D249BC29B0F06334CBDE3B4885C29302E1E37395215569937E580D SHA-512: 1D6D9C7DF45C94A950BE470C0A443D25F8809BDED3092998193EA73C758A1108732F0680C335C24DEC9F20162B2A7E2D98DD9B89326DD884421DAA2B089C2A1C Malicious: false Reputation: low Preview: @font-face {. font-family: '';. font-style: normal;. font-weight: 700;. src: url(https://fonts.gstatic.com/s/lato/v17/S6u9w4BMUTPHh6UVSwaPHw.woff) format('woff'); .}.@font-face {. font-family: 'Merriweather';. font-style: normal;. font-weight: 400;. src: url(https://fonts.gstatic.com/s/merriweather/v22/u-440qyriQwlOrhSvowK_l5-c iZK.woff) format('woff');.}.

C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\custom[1].js Process: C:\Program Files (x86)\Internet Explorer\iexplore.exe File Type: ASCII text Category: downloaded Size (bytes): 5906 Entropy (8bit): 4.736424703288825 Encrypted: false SSDEEP: 96:NHglB91+1Sb0dHKzFzam0JHfSEcpyi6pODCeue/l8OpNhTF0OU2VPvAf3yALukQg:NI+1Sb09CMTJ/cpyi6pKie/ldpP2OU26 MD5: 29FC207672510B76EAD1EF5DBA730E07 SHA1: B6786A2C238A15CAFB14171CEBCECE74BC3E54B5 SHA-256: 51336E9210D70B71C15C249D51F2F67EF80B727549AAC03C489071722B7C74F0 SHA-512: 154CFE34A22B6FE063502F185E7E2D9B236CB595718E20BAACFD3F5B79ED2E409863AB9DA6179C4C12ED35EF34AEC97E9BAD5AC1569ED72BB10CEF6C9786C3 99 Malicious: false Reputation: low IE Cache URL: https://securemailoffice365onlinefaxmessages.weebly.com/files/theme/custom.js?1556830342 Preview: jQuery(function($) {.. // Check your elements. $.fn.checkNavPositioning = function($el, $nav, scrollClass) {. var navHeight = $nav.outerHeight();.. if(((this.oute rHeight() - $(window).scrollTop()) < $nav.outerHeight()) && !$el.hasClass(scrollClass)) {. $el.addClass(scrollClass);. $el.css('padding-top', navHeight);. } else if((t his.outerHeight() >= $(window).scrollTop()) && $el.hasClass(scrollClass)) {. $el.removeClass(scrollClass);. $el.css('padding-top', 0);. }. }.. // Mobile sidebars. $ .fn.expandableSidebar = function(expandedClass) {. var $me = this;.. $me.on('click', function() {. if(!$me.hasClass(expandedClass)) {. $me.addClass(expa ndedClass);. } else {. $me.removeClass(expandedClass);. }. });. }.. // Interval loop. $.fn.intervalLoop = function(condition, action, duration, limit) {. var counter = 0;. var looper = setInterval(function(){. if (counter >= limit || $.fn.checkIfElementExists(condit

C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\footerlayout5[1].css Process: C:\Program Files (x86)\Internet Explorer\iexplore.exe File Type: ASCII text Category: downloaded Size (bytes): 6635 Entropy (8bit): 4.794029988683484 Encrypted: false SSDEEP: 192:dWc+rPoefkMDPJqdyTiFS982r3t5CZb2XGlPMZnXF8AlXto8Y8xETKZFj/fAY1kC:VFq2K1oLyFz7l MD5: F65CBBEE5BA35BEE474F4527D5849A95 SHA1: B27D9A12D3C3AEDCD504C16A9F90D4869E0ED8FF SHA-256: 2DF72E2E645165F7607636572D46FF5383C20005C2FE15102A6EBC92EB407C1C SHA-512: 8B63AD8421E4EABDAFCA68FDCB2FBAA27A2F0A75781B1B44A39EECAF585C5E9F8A8E7ABE023AD652E9C4ABD21B74B2A8C99F85F796989197F0C19433DDE78 A4B Malicious: false Reputation: low IE Cache URL: https://efax-01.simplesite.com/d/designs/base/footerlayout5.css

Copyright Joe Security LLC 2021 Page 12 of 43 C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\footerlayout5[1].css Preview: .layout5 .footer-wrapper {. height: auto;. bottom: 0;. position: relative;.}..layout5 .footer-wrapper .footer-subtitle {. font-size: 14px;.}..layout5 .footer-wrapper .hr-row-co ntainer {. border-top-width: 1.5px;. border-top-style: solid;. margin-top: 15px;. padding-top: 15px;. position: absolute;. left: 0;.}..layout5 .footer-wrapper .second-row-con tainer {. margin-top: 15px;. padding-top: 15px;.}..layout5 .footer-wrapper .footer-info-text {. font-size: 14px;. font-weight: normal;. margin-bottom: 10px;. text-transform: uppercase;.}..layout5 .footer-wrapper .footer-column {. text-align: center;.}..layout5 .footer-wrapper .footer-layout5-flex {. display: flex;.}..layout5 .footer-wrapper .footer-a lign-justify {. justify-content: space-between;.}..layout5 .footer-wrapper .footer-align-center {. justify-content: center;.}..layout5 .footer-wrapper .footer-align-start {. justify- content: flex-start;.}..layout5 .footer-wrapper .social-media-share-footer {. display: block;.

C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\jquery.min[1].js Process: C:\Program Files (x86)\Internet Explorer\iexplore.exe File Type: ASCII text, with very long lines Category: downloaded Size (bytes): 93636 Entropy (8bit): 5.292860855150671 Encrypted: false SSDEEP: 1536:s6IzxETpavYSGaW4snuHEk/yosnSFngC/VEEG0vd0KO4emAp2LSEMBoviR+I1z5T:O+vIklosn/BLXjxzMhsSQ MD5: 3576A6E73C9DCCDBBC4A2CF8FF544AD7 SHA1: 06E872300088B9BA8A08427D28ED0EFCDF9C6FF5 SHA-256: 61C6CAEBD23921741FB5FFE6603F16634FCA9840C2BF56AC8201E9264D6DACCF SHA-512: 27D41F6CFB8596A183D8261509AEB39FCFFB3C48199C6A4CE6AB45381660C2E8E30E71B9C39163C78E98CEABC887F391B2D723EE5B92B6FBC81E48AC422E522 B Malicious: false Reputation: low IE Cache URL: https://ajax.googleapis.com/ajax/libs/jquery/1.8.3/jquery.min.js Preview: /*! jQuery v1.8.3 jquery.com | jquery.org/license */.(function(e,t){function _(e){var t=M[e]={};return v.each(e.split(y),function(e,n){t[n]=!0}),t}function H(e,n,r){if(r===t&&e.nod eType===1){var i="data-"+n.replace(P,"-$1").toLowerCase();r=e.getAttribute(i);if(typeof r=="string"){try{r=r==="true"?!0:r==="false"?!1:r==="null"?null:+r+""===r?+r:D.tes t(r)?v.parseJSON(r):r}catch(s){}v.data(e,n,r)}else r=t}return r}function B(e){var t;for(t in e){if(t==="data"&&v.isEmptyObject(e[t]))continue;if(t!=="toJSON")return!1}ret urn!0}function et(){return!1}function tt(){return!0}function ut(e){return!e||!e.parentNode||e.parentNode.nodeType===11}function at(e,t){do e=e[t];while(e&&e.nodeType!==1) ;return e}function ft(e,t,n){t=t||0;if(v.isFunction(t))return v.grep(e,function(e,r){var i=!!t.call(e,r,e);return i===n});if(t.nodeType)return v.grep(e,function(e,r){return e===t== =n});if(typeof t=="string"){var r=v.grep(e,function(e){return e.nodeType===1});if(it.test(t))return v.filter(t,r,!n);t=v.filter(t,

C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\loader[1].js Process: C:\Program Files (x86)\Internet Explorer\iexplore.exe File Type: ASCII text, with very long lines Category: downloaded Size (bytes): 66641 Entropy (8bit): 5.434661983761373 Encrypted: false SSDEEP: 1536:I/21P/UQgXuTldAGYKNT8kUKLahzdulT7rf2TDloAYgXSe1Aon:I+9OXuTsZdATQRn MD5: 71AD5C961CF52E591899582324CD5E19 SHA1: 15231E77FDDF606C83F11107A87BD34218DA6161 SHA-256: EFDDE317B774ED03A69918BB931553608881C84987CE79E68C7F9D32D6138A96 SHA-512: A06019D987EB6ABAAAFF91C08C4158FA4B86D21CB5E8D96B4F83320C5B4972230C3809F2F0CACD121683DFDCCC214017A470D14BBE0E15F35BA76964C3ABCE 70 Malicious: false Reputation: low IE Cache URL: https://www.gstatic.com/charts/loader.js?callback=gloader_ready Preview: (function(){/*.. Copyright The Closure Library Authors.. SPDX-License-Identifier: Apache-2.0.*/.'use strict';var l;function aa(a){var b=0;return function(){return b

C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\plugins[1].js Process: C:\Program Files (x86)\Internet Explorer\iexplore.exe File Type: ASCII text Category: downloaded Size (bytes): 67464 Entropy (8bit): 4.809594581809692 Encrypted: false SSDEEP: 1536:59rPpU1wHKYTpQ73CHJHDuYL/OHHeZF+YwLMC0ht/uJFO0815wZDk5/2i:59rPpl1NQ73CHJHDuYL/OHHeZF+pLM7h MD5: 64497D2AB794CDB5E3C5C86CF7C5A611 SHA1: 34ACD67927409D0795EE025F64F99757494AFFED SHA-256: 637B5D2A661D0201F239A7AFCD1278BF55BEC7EF7ADA6CC6C0485C4E45D9B702 SHA-512: 899F4AC83667EBB8A432FC9F6C8D0015ADAA05C82B6EC2CAC2BF8ABC30A11D85BE325B152C01D9BE6CC22D57A92BC6A96D84A866F234A4F26805E65564D782 89 Malicious: false

Copyright Joe Security LLC 2021 Page 13 of 43 C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\plugins[1].js Reputation: low IE Cache URL: https://securemailoffice365onlinefaxmessages.weebly.com/files/theme/plugins.js?1556830342 Preview: ./*! Hammer.JS - v2.0.4 - 2014-09-28. * http://hammerjs.github.io/. *. * Copyright (c) 2014 Jorik Tangelder;. * Licensed under the MIT license */.(function(window, docume nt, exportName, undefined) {. 'use strict';..var VENDOR_PREFIXES = ['', 'webkit', 'moz', 'MS', 'ms', 'o'];.var TEST_ELEMENT = document.createElement('div');..var TYPE_FUNCTION = 'function';..var round = Math.round;.var abs = Math.abs;.var now = Date.now;../**. * set a timeout with a given scope. * @param {Function} fn. * @param {Number} timeout. * @param {Object} context. * @returns {number}. */.function setTimeoutContext(fn, timeout, context) {. return setTimeout(bindFn(fn, contex t), timeout);.}../**. * if the argument is an array, we want to execute the fn on each entry. * if it aint an array we don't want to do a thing.. * this is used by all the methods that accept a single and array argument.. * @param {*|Array} arg. * @param {String} fn. * @param {Object} [context]. * @returns {Boolean}. */.function invokeArr

C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\recaptcha__en[1].js Process: C:\Program Files (x86)\Internet Explorer\iexplore.exe File Type: ASCII text, with very long lines Category: downloaded Size (bytes): 349568 Entropy (8bit): 5.719470557851192 Encrypted: false SSDEEP: 6144:vkoBKV7P3kPLI5yhOftr91660YoYDKrC/jvOwu0pFK/76iLthcQ63X+r4zt68+w7:vkoWPU8ftH4I/zOwuSFKjrxhcQ6n+r9q MD5: 28936BBDD08D5295ED2D058552DFB90B SHA1: 2209BDB7B6CB70DAD606487A1475955663A08C07 SHA-256: 734160057D9682A89035825F63793CD0F945523EFA3F8D33B8BEF89BD7BDEF5E SHA-512: 8D5758E8F31BBDEE0C603B8CA6349E0FBD55B3612CDADA4CDEFB1159B3F0DAF3A49E81077E881370470F58490669A33764B1F61F75FFD5E899495134BD3F13B7 Malicious: false Reputation: low IE Cache URL: https://www.gstatic.com/recaptcha/releases/CdDdhZfPbLLrfYLBdThNS0-Y/recaptcha__en.js Preview: (function(){/*.. Copyright The Closure Library Authors.. SPDX-License-Identifier: Apache-2.0.*/.var m=function(){return[function(T,h,Q,B,G,w){if(!((T|((T>>1)%(w=[2,3,9],1 9)||(G=h.constructor===Uint8Array?h:h.constructor===ArrayBuffer?new Uint8Array(h):h.constructor===Array?new Uint8Array(h):h.constructor===String?R[19](w[0],"",1 ,w[1],4,h):h instanceof Uint8Array?new Uint8Array(h.buffer,h.byteOffset,h.byteLength):new Uint8Array(0)),w)[0])%11))try{G=h()}catch(u){G=Q}return(T|4)%((T^970)% ((T<',G=G+"pro

C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\screen-shot-2021-04-07-at-12-23-42-pm[1].png Process: C:\Program Files (x86)\Internet Explorer\iexplore.exe File Type: PNG image data, 842 x 273, 8-bit grayscale, non-interlaced Category: downloaded Size (bytes): 19995 Entropy (8bit): 7.979920569704566 Encrypted: false SSDEEP: 384:2YZZez44GzaXL8frdmY2/XYrVh8YesisCaRXwtmDeSLnk5/eoYw4MWIC:dZoz4+XLSdmY2vYZ/eNsCaRkm7Ln0V4d MD5: B26AB8D65B055296155AB8EB9A907E9C SHA1: 134E725A5159BF7A4CF6B43211AC73A804AFB3CA SHA-256: 5256137B53434A8EF08AB40A84886B77F6576A3A40F378CEDF5FD35DB73BABD0 SHA-512: DAE902351C0AF2A35762CCEEBC76B4014B846F4D16AE73A2883F2B8904124549ECBE15AD9D0CC2913859A7B993F481540578AB4A71730B74134C6160536EF509 Malicious: false Reputation: low IE Cache URL: https://securemailoffice365onlinefaxmessages.weebly.com/uploads/1/3/7/9/137919641/published/screen-shot-2021-04-07-at-12-23-42-pm.png?1622801934 Preview: .PNG...... IHDR...J...... `g.,....orNT..w...M.IDATx..y.,G~.7$m...... ,;.a...%.![...C.Z...... h.AI.V.D.$W$w..K..,.K,.X..x...... >..c...... rU...... ?stuuu.~..:2..!...X.i.....HJ..( )!.....@... ..!.HJ..( )!.....@.....!.HJ..( )!.....@.....!.HJ..( )!.....@.....!.HJ..( )!.....@.....!.HJ..( )!.....@.....!.7#...... 9=...... tv.. ...]rzU".O,.... -!.G....t:/.g....dz..kO...i...c.\..N....&...S.\. -!.G...... + .../...x...... g...... 7.X!\...47>..E.._....o....W.H..5..V.8....wr.NC .dA).r...... e....v.._7...... C.....m.m...p...;.

C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\simplesite-webfont-2[1].eot Process: C:\Program Files (x86)\Internet Explorer\iexplore.exe File Type: Embedded OpenType (EOT), icomoon family Category: downloaded Size (bytes): 55496 Entropy (8bit): 6.396305200414213 Encrypted: false SSDEEP: 768:KfDTG2CCBlaiDK/hd8jYUf3hk7AGJt7th4b5beREog++M3tW+lOA38mTRtZdwm:8DC2nnDCMvKsy4b5Ego3TlOA38IRtZG MD5: 021B62820C595CFB9C92772243EA042E SHA1: 44869A9DD3E758A0334CAACAB4AF01B1091BEBE7 SHA-256: 58BCBD4EB40DEFDD10E5CEEC3A589E77B0AC875E1BE699FB1EACDA86D138DCE1 SHA-512: 476A0F03889D6F366E454E3CBA10E513533A0B6CABD582BFD4B4E13F0249018A426B919B632566C363E18068A0033956B1C7924ADAFC3CB28CDE0B3B5675B208 Malicious: false

Copyright Joe Security LLC 2021 Page 14 of 43 C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\simplesite-webfont-2[1].eot Reputation: low IE Cache URL: https://css.simplesite.com/d/fonts/simplesite-webfont-2.eot Preview: ....$...... LP...... B...... i.c.o.m.o.o.n.....R.e.g.u.l.a.r.....V.e.r.s.i.o.n. .1...2.....i.c.o.m.o.o.n...... 0OS/2...... `cmap.V.[...... Tgasp...... p ....glyf..Q....x...phead..~...... 6hhea...... $hmtx.H.....D...dloca...... maxp...... \... name.L.....|....post...... 3...... @...... @...@...... 8...... 79...... 79...... 79...... 2.....|...... 3!2.....#!".....'.&47.6....<...}...... o...... F...~...... #.,.5.>.G.P.Y.b.k.t....%.0.'70.7'.0&'70..%.0..'067%.0&'70..'.0&730../.067.0..7'067.0..7'067.0..7'06..0&..70...0&'.70...0&'.70..'06'..0..'067.".1.0...... 6 7>.7>.706...10..'...... P>.S...M4.C1.P.I>.L/.!&5..$"S2..4...3..2..(,,1#<.y.K?.N/..O>.M3..H,.B0.,..+...*..-..++-2#>.....4...... R[U

C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\templateArtifacts[1].js Process: C:\Program Files (x86)\Internet Explorer\iexplore.exe File Type: exported SGML document, ASCII text, with very long lines Category: downloaded Size (bytes): 7160 Entropy (8bit): 4.819263409497788 Encrypted: false SSDEEP: 192:tUpqUXGMhJpJuMEpVyfWsgBm6zCg/8LWLEBOqpJ:tUpqUXGMbpJudWgBrb/8LWIJ MD5: AE81AB7069097A055829FB9919258138 SHA1: 7DC529F16FB595BBBFC5937ADFE1D0A5CF563F8A SHA-256: 5A630B41E7C3D34392BCB150A5731B6261BC6314D71D5DB8407A646AF15BF8AF SHA-512: 923F0E92ED682F638ECA768065630AD26195F03CFD54BA235531C50D587321E45D0E0000E811F943557BA08D9C8A21A3F4B430433370C28C456ACD6B094C63DE Malicious: false Reputation: low IE Cache URL: https://securemailoffice365onlinefaxmessages.weebly.com/files/templateArtifacts.js?1622801939 Preview: // Gets converted to _W.Weebly = window.Weebly || {};.Weebly.templates = {...'search/filter/search-facet-color': "

  • \n\t

    {{facet_name}}<\/h3>\n\t
    \n\t\t
      \n\t\t\t{{#facet_entries}}\n\t\t\t\t
    • \n\t\t\t\t\t
    • \n\t

      {{facet_name}}<\/h3>\n\t\n\t\t
        \n\t\t\t{{#facet_entries}}\n\t\t\t\t
      • \n\t\t\t\t\t