Edit tour

Windows Analysis Report
https://fleek.ipfs.io/ipfs/bafybeico4deolizdi7ylu3rvt4xjjw464fjmbivlm5ohmu66wdpgt7mbme/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp/#ltest@test.com

Overview

General Information

Sample URL:https://fleek.ipfs.io/ipfs/bafybeico4deolizdi7ylu3rvt4xjjw464fjmbivlm5ohmu66wdpgt7mbme/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp/#ltest@test.com
Analysis ID:1312086

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
HTML body contains password input but no form action
URL contains potential PII (phishing indication)
HTML body contains low number of good links
HTML title does not match URL

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64_ra
  • chrome.exe (PID: 5532 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://fleek.ipfs.io/ipfs/bafybeico4deolizdi7ylu3rvt4xjjw464fjmbivlm5ohmu66wdpgt7mbme/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp/#ltest@test.com MD5: 7BC7B4AEDC055BB02BCB52710132E9E1)
    • chrome.exe (PID: 5368 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2044 --field-trial-handle=1796,i,17441710062625946195,7368691920586174420,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationTargetPrediction /prefetch:8 MD5: 7BC7B4AEDC055BB02BCB52710132E9E1)
  • cleanup
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: https://fleek.ipfs.io/ipfs/bafybeico4deolizdi7ylu3rvt4xjjw464fjmbivlm5ohmu66wdpgt7mbme/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp/#ltest@test.comAvira URL Cloud: detection malicious, Label: phishing
Source: https://fleek.ipfs.io/ipfs/bafybeico4deolizdi7ylu3rvt4xjjw464fjmbivlm5ohmu66wdpgt7mbme/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp/#ltest@test.comVirustotal: Detection: 13%Perma Link
Source: https://fleek.ipfs.io/ipfs/bafybeico4deolizdi7ylu3rvt4xjjw464fjmbivlm5ohmu66wdpgt7mbme/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp/#ltest@test.comHTTP Parser: <input type="password" .../> found but no <form action="...
Source: https://fleek.ipfs.io/ipfs/bafybeico4deolizdi7ylu3rvt4xjjw464fjmbivlm5ohmu66wdpgt7mbme/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp/#ltest@test.comSample URL: PII: ltest@test.com
Source: https://fleek.ipfs.io/ipfs/bafybeico4deolizdi7ylu3rvt4xjjw464fjmbivlm5ohmu66wdpgt7mbme/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp/#ltest@test.comSample URL: PII: ltest@test.com
Source: https://fleek.ipfs.io/ipfs/bafybeico4deolizdi7ylu3rvt4xjjw464fjmbivlm5ohmu66wdpgt7mbme/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp/#ltest@test.comSample URL: PII: ltest@test.com
Source: https://fleek.ipfs.io/ipfs/bafybeico4deolizdi7ylu3rvt4xjjw464fjmbivlm5ohmu66wdpgt7mbme/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp/#ltest@test.comSample URL: PII: ltest@test.com
Source: https://fleek.ipfs.io/ipfs/bafybeico4deolizdi7ylu3rvt4xjjw464fjmbivlm5ohmu66wdpgt7mbme/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp/#ltest@test.comSample URL: PII: ltest@test.com
Source: https://fleek.ipfs.io/ipfs/bafybeico4deolizdi7ylu3rvt4xjjw464fjmbivlm5ohmu66wdpgt7mbme/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp/#ltest@test.comSample URL: PII: ltest@test.com
Source: https://fleek.ipfs.io/ipfs/bafybeico4deolizdi7ylu3rvt4xjjw464fjmbivlm5ohmu66wdpgt7mbme/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp/#ltest@test.comSample URL: PII: ltest@test.com
Source: https://fleek.ipfs.io/ipfs/bafybeico4deolizdi7ylu3rvt4xjjw464fjmbivlm5ohmu66wdpgt7mbme/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp/#ltest@test.comSample URL: PII: ltest@test.com
Source: https://fleek.ipfs.io/ipfs/bafybeico4deolizdi7ylu3rvt4xjjw464fjmbivlm5ohmu66wdpgt7mbme/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp/#ltest@test.comSample URL: PII: ltest@test.com
Source: https://fleek.ipfs.io/ipfs/bafybeico4deolizdi7ylu3rvt4xjjw464fjmbivlm5ohmu66wdpgt7mbme/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp/#ltest@test.comSample URL: PII: ltest@test.com
Source: https://fleek.ipfs.io/ipfs/bafybeico4deolizdi7ylu3rvt4xjjw464fjmbivlm5ohmu66wdpgt7mbme/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp/#ltest@test.comSample URL: PII: ltest@test.com
Source: https://fleek.ipfs.io/ipfs/bafybeico4deolizdi7ylu3rvt4xjjw464fjmbivlm5ohmu66wdpgt7mbme/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp/#ltest@test.comSample URL: PII: ltest@test.com
Source: https://fleek.ipfs.io/ipfs/bafybeico4deolizdi7ylu3rvt4xjjw464fjmbivlm5ohmu66wdpgt7mbme/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp/#ltest@test.comHTTP Parser: Number of links: 0
Source: https://fleek.ipfs.io/ipfs/bafybeico4deolizdi7ylu3rvt4xjjw464fjmbivlm5ohmu66wdpgt7mbme/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp/#ltest@test.comHTTP Parser: Title: Document-Share Point Online does not match URL
Source: https://fleek.ipfs.io/ipfs/bafybeico4deolizdi7ylu3rvt4xjjw464fjmbivlm5ohmu66wdpgt7mbme/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp/#ltest@test.comHTTP Parser: <input type="password" .../> found
Source: https://fleek.ipfs.io/ipfs/bafybeico4deolizdi7ylu3rvt4xjjw464fjmbivlm5ohmu66wdpgt7mbme/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp/#ltest@test.comHTTP Parser: No <meta name="author".. found
Source: https://fleek.ipfs.io/ipfs/bafybeico4deolizdi7ylu3rvt4xjjw464fjmbivlm5ohmu66wdpgt7mbme/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp/#ltest@test.comHTTP Parser: No <meta name="author".. found
Source: https://fleek.ipfs.io/ipfs/bafybeico4deolizdi7ylu3rvt4xjjw464fjmbivlm5ohmu66wdpgt7mbme/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp/#ltest@test.comHTTP Parser: No <meta name="author".. found
Source: https://fleek.ipfs.io/ipfs/bafybeico4deolizdi7ylu3rvt4xjjw464fjmbivlm5ohmu66wdpgt7mbme/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp/#ltest@test.comHTTP Parser: No <meta name="author".. found
Source: https://fleek.ipfs.io/ipfs/bafybeico4deolizdi7ylu3rvt4xjjw464fjmbivlm5ohmu66wdpgt7mbme/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp/#ltest@test.comHTTP Parser: No <meta name="author".. found
Source: https://fleek.ipfs.io/ipfs/bafybeico4deolizdi7ylu3rvt4xjjw464fjmbivlm5ohmu66wdpgt7mbme/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp/#ltest@test.comHTTP Parser: No <meta name="copyright".. found
Source: https://fleek.ipfs.io/ipfs/bafybeico4deolizdi7ylu3rvt4xjjw464fjmbivlm5ohmu66wdpgt7mbme/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp/#ltest@test.comHTTP Parser: No <meta name="copyright".. found
Source: https://fleek.ipfs.io/ipfs/bafybeico4deolizdi7ylu3rvt4xjjw464fjmbivlm5ohmu66wdpgt7mbme/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp/#ltest@test.comHTTP Parser: No <meta name="copyright".. found
Source: https://fleek.ipfs.io/ipfs/bafybeico4deolizdi7ylu3rvt4xjjw464fjmbivlm5ohmu66wdpgt7mbme/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp/#ltest@test.comHTTP Parser: No <meta name="copyright".. found
Source: https://fleek.ipfs.io/ipfs/bafybeico4deolizdi7ylu3rvt4xjjw464fjmbivlm5ohmu66wdpgt7mbme/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp/#ltest@test.comHTTP Parser: No <meta name="copyright".. found
Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\GoogleUpdater
Source: unknownDNS traffic detected: queries for: clients2.google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: classification engineClassification label: mal56.win@21/29@14/198
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://fleek.ipfs.io/ipfs/bafybeico4deolizdi7ylu3rvt4xjjw464fjmbivlm5ohmu66wdpgt7mbme/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp/#ltest@test.com
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2044 --field-trial-handle=1796,i,17441710062625946195,7368691920586174420,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2044 --field-trial-handle=1796,i,17441710062625946195,7368691920586174420,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Program Files\Google\GoogleUpdater
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\GoogleUpdater
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath Interception1
Process Injection
2
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local SystemExfiltration Over Other Network Medium2
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
Non-Application Layer Protocol
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
Application Layer Protocol
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
https://fleek.ipfs.io/ipfs/bafybeico4deolizdi7ylu3rvt4xjjw464fjmbivlm5ohmu66wdpgt7mbme/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp/#ltest@test.com100%Avira URL Cloudphishing
https://fleek.ipfs.io/ipfs/bafybeico4deolizdi7ylu3rvt4xjjw464fjmbivlm5ohmu66wdpgt7mbme/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp/#ltest@test.com13%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
jsdelivr.map.fastly.net
151.101.65.229
truefalse
    unknown
    stackpath.bootstrapcdn.com
    104.18.11.207
    truefalse
      high
      formsubmit.co
      104.21.1.51
      truefalse
        unknown
        a.nel.cloudflare.com
        35.190.80.1
        truefalse
          high
          accounts.google.com
          142.250.80.109
          truefalse
            high
            code.jquery.com
            151.101.130.137
            truefalse
              high
              cdnjs.cloudflare.com
              104.17.25.14
              truefalse
                high
                ipinfo.io
                34.117.59.81
                truefalse
                  high
                  maxcdn.bootstrapcdn.com
                  104.18.10.207
                  truefalse
                    high
                    www.google.com
                    142.251.41.4
                    truefalse
                      high
                      clients.l.google.com
                      142.251.40.238
                      truefalse
                        high
                        fleek.ipfs.io
                        209.94.90.1
                        truefalse
                          high
                          clients2.google.com
                          unknown
                          unknownfalse
                            high
                            cdn.jsdelivr.net
                            unknown
                            unknownfalse
                              high
                              NameMaliciousAntivirus DetectionReputation
                              https://fleek.ipfs.io/ipfs/bafybeico4deolizdi7ylu3rvt4xjjw464fjmbivlm5ohmu66wdpgt7mbme/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp/#ltest@test.comfalse
                                high
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                9.9.9.9
                                unknownUnited States
                                19281QUAD9-AS-1USfalse
                                1.1.1.1
                                unknownAustralia
                                13335CLOUDFLARENETUSfalse
                                104.18.10.207
                                maxcdn.bootstrapcdn.comUnited States
                                13335CLOUDFLARENETUSfalse
                                142.250.65.195
                                unknownUnited States
                                15169GOOGLEUSfalse
                                142.250.176.202
                                unknownUnited States
                                15169GOOGLEUSfalse
                                34.117.59.81
                                ipinfo.ioUnited States
                                139070GOOGLE-AS-APGoogleAsiaPacificPteLtdSGfalse
                                142.251.40.238
                                clients.l.google.comUnited States
                                15169GOOGLEUSfalse
                                151.101.65.229
                                jsdelivr.map.fastly.netUnited States
                                54113FASTLYUSfalse
                                142.251.40.234
                                unknownUnited States
                                15169GOOGLEUSfalse
                                151.101.130.137
                                code.jquery.comUnited States
                                54113FASTLYUSfalse
                                142.250.81.227
                                unknownUnited States
                                15169GOOGLEUSfalse
                                104.18.11.207
                                stackpath.bootstrapcdn.comUnited States
                                13335CLOUDFLARENETUSfalse
                                104.21.1.51
                                formsubmit.coUnited States
                                13335CLOUDFLARENETUSfalse
                                239.255.255.250
                                unknownReserved
                                unknownunknownfalse
                                142.250.72.100
                                unknownUnited States
                                15169GOOGLEUSfalse
                                142.250.80.109
                                accounts.google.comUnited States
                                15169GOOGLEUSfalse
                                35.190.80.1
                                a.nel.cloudflare.comUnited States
                                15169GOOGLEUSfalse
                                209.94.90.1
                                fleek.ipfs.ioUnited States
                                40680PROTOCOLUSfalse
                                104.17.25.14
                                cdnjs.cloudflare.comUnited States
                                13335CLOUDFLARENETUSfalse
                                IP
                                192.168.2.1
                                Joe Sandbox Version:38.0.0 Beryl
                                Analysis ID:1312086
                                Start date and time:2023-09-21 09:33:06 +02:00
                                Joe Sandbox Product:CloudBasic
                                Overall analysis duration:
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:defaultwindowsinteractivecookbook.jbs
                                Sample URL:https://fleek.ipfs.io/ipfs/bafybeico4deolizdi7ylu3rvt4xjjw464fjmbivlm5ohmu66wdpgt7mbme/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp/#ltest@test.com
                                Analysis system description:Windows 10 64 bit version 1909 (MS Office 2019, IE 11, Chrome 104, Firefox 88, Adobe Reader DC 21, Java 8 u291, 7-Zip)
                                Number of analysed new started processes analysed:7
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • EGA enabled
                                Analysis Mode:stream
                                Analysis stop reason:Timeout
                                Detection:MAL
                                Classification:mal56.win@21/29@14/198
                                • Exclude process from analysis (whitelisted): WMIADAP.exe, SIHClient.exe
                                • Excluded IPs from analysis (whitelisted): 142.250.65.195, 34.104.35.123, 142.250.176.202, 142.251.40.234, 142.251.35.170, 142.251.40.138, 142.251.40.106, 142.250.65.234, 142.250.65.170, 142.251.40.170, 142.250.80.74, 142.251.41.10, 142.251.32.106, 142.250.80.106, 142.250.65.202, 142.251.40.202, 142.250.80.42, 142.250.81.234
                                • Excluded domains from analysis (whitelisted): edgedl.me.gvt1.com, content-autofill.googleapis.com, slscr.update.microsoft.com, ajax.googleapis.com, ctldl.windowsupdate.com, clientservices.googleapis.com
                                • Not all processes where analyzed, report is missing behavior information
                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                File Type:ASCII text, with very long lines (32012)
                                Category:downloaded
                                Size (bytes):69597
                                Entropy (8bit):5.369216080582935
                                Encrypted:false
                                SSDEEP:
                                MD5:5F48FC77CAC90C4778FA24EC9C57F37D
                                SHA1:9E89D1515BC4C371B86F4CB1002FD8E377C1829F
                                SHA-256:9365920887B11B33A3DC4BA28A0F93951F200341263E3B9CEFD384798E4BE398
                                SHA-512:CAB8C4AFA1D8E3A8B7856EE29AE92566D44CEEAD70C8D533F2C98A976D77D0E1D314719B5C6A473789D8C6B21EBB4B89A6B0EC2E1C9C618FB1437EBC77D3A269
                                Malicious:false
                                Reputation:low
                                URL:https://code.jquery.com/jquery-3.2.1.slim.min.js
                                Preview:/*! jQuery v3.2.1 -ajax,-ajax/jsonp,-ajax/load,-ajax/parseXML,-ajax/script,-ajax/var/location,-ajax/var/nonce,-ajax/var/rquery,-ajax/xhr,-manipulation/_evalUrl,-event/ajax,-effects,-effects/Tween,-effects/animatedSelector | (c) JS Foundation and other contributors | jquery.org/license */.!function(a,b){"use strict";"object"==typeof module&&"object"==typeof module.exports?module.exports=a.document?b(a,!0):function(a){if(!a.document)throw new Error("jQuery requires a window with a document");return b(a)}:b(a)}("undefined"!=typeof window?window:this,function(a,b){"use strict";var c=[],d=a.document,e=Object.getPrototypeOf,f=c.slice,g=c.concat,h=c.push,i=c.indexOf,j={},k=j.toString,l=j.hasOwnProperty,m=l.toString,n=m.call(Object),o={};function p(a,b){b=b||d;var c=b.createElement("script");c.text=a,b.head.appendChild(c).parentNode.removeChild(c)}var q="3.2.1 -ajax,-ajax/jsonp,-ajax/load,-ajax/parseXML,-ajax/script,-ajax/var/location,-ajax/var/nonce,-ajax/var/rquery,-ajax/xhr,-manipulation/_e
                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                File Type:ASCII text, with very long lines (50758)
                                Category:downloaded
                                Size (bytes):51039
                                Entropy (8bit):5.247253437401007
                                Encrypted:false
                                SSDEEP:
                                MD5:67176C242E1BDC20603C878DEE836DF3
                                SHA1:27A71B00383D61EF3C489326B3564D698FC1227C
                                SHA-256:56C12A125B021D21A69E61D7190CEFA168D6C28CE715265CEA1B3B0112D169C4
                                SHA-512:9FA75814E1B9F7DB38FE61A503A13E60B82D83DB8F4CE30351BD08A6B48C0D854BAF472D891AF23C443C8293380C2325C7B3361B708AF9971AA0EA09A25CDD0A
                                Malicious:false
                                Reputation:low
                                URL:https://stackpath.bootstrapcdn.com/bootstrap/4.1.3/js/bootstrap.min.js
                                Preview:/*!. * Bootstrap v4.1.3 (https://getbootstrap.com/). * Copyright 2011-2018 The Bootstrap Authors (https://github.com/twbs/bootstrap/graphs/contributors). * Licensed under MIT (https://github.com/twbs/bootstrap/blob/master/LICENSE). */.!function(t,e){"object"==typeof exports&&"undefined"!=typeof module?e(exports,require("jquery"),require("popper.js")):"function"==typeof define&&define.amd?define(["exports","jquery","popper.js"],e):e(t.bootstrap={},t.jQuery,t.Popper)}(this,function(t,e,h){"use strict";function i(t,e){for(var n=0;n<e.length;n++){var i=e[n];i.enumerable=i.enumerable||!1,i.configurable=!0,"value"in i&&(i.writable=!0),Object.defineProperty(t,i.key,i)}}function s(t,e,n){return e&&i(t.prototype,e),n&&i(t,n),t}function l(r){for(var t=1;t<arguments.length;t++){var o=null!=arguments[t]?arguments[t]:{},e=Object.keys(o);"function"==typeof Object.getOwnPropertySymbols&&(e=e.concat(Object.getOwnPropertySymbols(o).filter(function(t){return Object.getOwnPropertyDescriptor(o,t).enum
                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                File Type:Unicode text, UTF-8 text, with very long lines (65306)
                                Category:downloaded
                                Size (bytes):163873
                                Entropy (8bit):5.058104233525069
                                Encrypted:false
                                SSDEEP:
                                MD5:94994C66FEC8C3468B269DC0CC242151
                                SHA1:EC16BD19BF4AE9BC2E2336AC409A503BBBDAACAD
                                SHA-256:62F74B1CF824A89F03554C638E719594C309B4D8A627A758928C0516FA7890AB
                                SHA-512:190194D1F30C8B6DFCB80F9AFDB75625FA5418A52405D81F15D8019BBD92510E817B25A3A18FEDA27D2D1231FE3921FD88FE037E1FBB1CCD08F5FE5E4742FFE3
                                Malicious:false
                                Reputation:low
                                URL:https://cdn.jsdelivr.net/npm/bootstrap@5.1.3/dist/css/bootstrap.min.css
                                Preview:@charset "UTF-8";/*!. * Bootstrap v5.1.3 (https://getbootstrap.com/). * Copyright 2011-2021 The Bootstrap Authors. * Copyright 2011-2021 Twitter, Inc.. * Licensed under MIT (https://github.com/twbs/bootstrap/blob/main/LICENSE). */:root{--bs-blue:#0d6efd;--bs-indigo:#6610f2;--bs-purple:#6f42c1;--bs-pink:#d63384;--bs-red:#dc3545;--bs-orange:#fd7e14;--bs-yellow:#ffc107;--bs-green:#198754;--bs-teal:#20c997;--bs-cyan:#0dcaf0;--bs-white:#fff;--bs-gray:#6c757d;--bs-gray-dark:#343a40;--bs-gray-100:#f8f9fa;--bs-gray-200:#e9ecef;--bs-gray-300:#dee2e6;--bs-gray-400:#ced4da;--bs-gray-500:#adb5bd;--bs-gray-600:#6c757d;--bs-gray-700:#495057;--bs-gray-800:#343a40;--bs-gray-900:#212529;--bs-primary:#0d6efd;--bs-secondary:#6c757d;--bs-success:#198754;--bs-info:#0dcaf0;--bs-warning:#ffc107;--bs-danger:#dc3545;--bs-light:#f8f9fa;--bs-dark:#212529;--bs-primary-rgb:13,110,253;--bs-secondary-rgb:108,117,125;--bs-success-rgb:25,135,84;--bs-info-rgb:13,202,240;--bs-warning-rgb:255,193,7;--bs-danger-rgb:220,53
                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                File Type:ASCII text, with very long lines (19015)
                                Category:downloaded
                                Size (bytes):19188
                                Entropy (8bit):5.212814407014048
                                Encrypted:false
                                SSDEEP:
                                MD5:70D3FDA195602FE8B75E0097EED74DDE
                                SHA1:C3B977AA4B8DFB69D651E07015031D385DED964B
                                SHA-256:A52F7AA54D7BCAAFA056EE0A050262DFC5694AE28DEE8B4CAC3429AF37FF0D66
                                SHA-512:51AFFB5A8CFD2F93B473007F6987B19A0A1A0FB970DDD59EF45BD77A355D82ABBBD60468837A09823496411E797F05B1F962AE93C725ED4C00D514BA40269D14
                                Malicious:false
                                Reputation:low
                                URL:https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/popper.min.js
                                Preview:/*. Copyright (C) Federico Zivolo 2017. Distributed under the MIT License (license terms are at http://opensource.org/licenses/MIT).. */(function(e,t){'object'==typeof exports&&'undefined'!=typeof module?module.exports=t():'function'==typeof define&&define.amd?define(t):e.Popper=t()})(this,function(){'use strict';function e(e){return e&&'[object Function]'==={}.toString.call(e)}function t(e,t){if(1!==e.nodeType)return[];var o=getComputedStyle(e,null);return t?o[t]:o}function o(e){return'HTML'===e.nodeName?e:e.parentNode||e.host}function n(e){if(!e)return document.body;switch(e.nodeName){case'HTML':case'BODY':return e.ownerDocument.body;case'#document':return e.body;}var i=t(e),r=i.overflow,p=i.overflowX,s=i.overflowY;return /(auto|scroll)/.test(r+s+p)?e:n(o(e))}function r(e){var o=e&&e.offsetParent,i=o&&o.nodeName;return i&&'BODY'!==i&&'HTML'!==i?-1!==['TD','TABLE'].indexOf(o.nodeName)&&'static'===t(o,'position')?r(o):o:e?e.ownerDocument.documentElement:document.documentElement}functio
                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                File Type:HTML document, ASCII text
                                Category:dropped
                                Size (bytes):630
                                Entropy (8bit):4.627016413245974
                                Encrypted:false
                                SSDEEP:
                                MD5:478D0A8868FD5CEC3C781F788E9A3353
                                SHA1:D1FA9CBBE30C23D416C46A0566F963CA29704036
                                SHA-256:1ACE16EC43923C0D93BBF2802C56E49C4E2EDAFCE856E5617A6200C1F261A8AF
                                SHA-512:25D2B0F7418C970E0A347C2A40A8CBE9D0E6E40467BA249DF1DF9FB8BA5A0E46B2F6CC22F68E748C4F0B0D04BF5014D9A7CF2DE228997A6522DB1DDA36283673
                                Malicious:false
                                Reputation:low
                                Preview:<!DOCTYPE html>.<html>. <head>. <meta charset="UTF-8" />. <meta name="robots" content="noindex,nofollow" />. <style> body { background-color: #fff; color: #222; font: 16px/1.5 -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, "Helvetica Neue", Arial, sans-serif; margin: 0; }. .container { margin: 30px; max-width: 600px; }. h1 { color: #dc3545; font-size: 24px; }</style>. </head>. <body>. <div class="container">. <h1>Whoops, looks like something went wrong.</h1>. </div>. </body>.</html>
                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                File Type:ASCII text, with very long lines (48664)
                                Category:downloaded
                                Size (bytes):48944
                                Entropy (8bit):5.272507874206726
                                Encrypted:false
                                SSDEEP:
                                MD5:14D449EB8876FA55E1EF3C2CC52B0C17
                                SHA1:A9545831803B1359CFEED47E3B4D6BAE68E40E99
                                SHA-256:E7ED36CEEE5450B4243BBC35188AFABDFB4280C7C57597001DE0ED167299B01B
                                SHA-512:00D9069B9BD29AD0DAA0503F341D67549CCE28E888E1AFFD1A2A45B64A4C1BC460D81CFC4751857F991F2F4FB3D2572FD97FCA651BA0C2B0255530209B182F22
                                Malicious:false
                                Reputation:low
                                URL:https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0/js/bootstrap.min.js
                                Preview:/*!. * Bootstrap v4.0.0 (https://getbootstrap.com). * Copyright 2011-2018 The Bootstrap Authors (https://github.com/twbs/bootstrap/graphs/contributors). * Licensed under MIT (https://github.com/twbs/bootstrap/blob/master/LICENSE). */.!function(t,e){"object"==typeof exports&&"undefined"!=typeof module?e(exports,require("jquery"),require("popper.js")):"function"==typeof define&&define.amd?define(["exports","jquery","popper.js"],e):e(t.bootstrap={},t.jQuery,t.Popper)}(this,function(t,e,n){"use strict";function i(t,e){for(var n=0;n<e.length;n++){var i=e[n];i.enumerable=i.enumerable||!1,i.configurable=!0,"value"in i&&(i.writable=!0),Object.defineProperty(t,i.key,i)}}function s(t,e,n){return e&&i(t.prototype,e),n&&i(t,n),t}function r(){return(r=Object.assign||function(t){for(var e=1;e<arguments.length;e++){var n=arguments[e];for(var i in n)Object.prototype.hasOwnProperty.call(n,i)&&(t[i]=n[i])}return t}).apply(this,arguments)}e=e&&e.hasOwnProperty("default")?e.default:e,n=n&&n.hasOwnProp
                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                File Type:HTML document, Unicode text, UTF-8 text, with very long lines (14464)
                                Category:dropped
                                Size (bytes):82748
                                Entropy (8bit):5.218878950957974
                                Encrypted:false
                                SSDEEP:
                                MD5:25487FA06214D8FEDD7E23AD4078A7EA
                                SHA1:40CBE3EFFC7BB48235FD71A51186941ACFCAA900
                                SHA-256:21663D285B27123FABF0F96FD82548D62016A342B1349D5457DDFBDAB4D78DB7
                                SHA-512:013733A2C176F46FE76E845EF243690D45FE323E705DCCB914C3CA7018D56949F6F4B7B47F8FD1AB3E155D2F74D9D1BC06D9BA33D05655F5732795236C741030
                                Malicious:false
                                Reputation:low
                                Preview:<!DOCTYPE html><html lang="en"><head><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no, user-scalable=no"/><link rel="canonical" href="https://ipinfo.io"/><title>The trusted source for IP address data, leading IP data provider - IPinfo.io</title><meta name="description" content="Get accurate and reliable IP address information with IPinfo. Trusted by over 400,000 users, developers and businesses, we handle more than 40 billion API requests per month. Sign up for free account today."/><meta property="og:url" content="https://ipinfo.io"/><meta property="og:type" content="website"/><meta property="og:title" content="The trusted source for IP address data, leading IP data provider"/><meta property="og:description" content="Get accurate and reliable IP address information with IPinfo. Trusted by over 400,000 users, developers and businesses, we handle more than 40 billion API requests per month. Sign up for free account today."/><met
                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                File Type:HTML document, ASCII text, with very long lines (40856), with CRLF line terminators
                                Category:downloaded
                                Size (bytes):258469
                                Entropy (8bit):5.927548604465963
                                Encrypted:false
                                SSDEEP:
                                MD5:53CFAA40910AD20CA7E33428BAF97E7B
                                SHA1:246CC3B6F09AFD071DA66B87A465C5E8C1BE206B
                                SHA-256:2616C1A901E748EF116BEE1C45E5F5828211B7A9777875BF63A04FEF9B63DB13
                                SHA-512:E582CDA4C4E85FA4B4FE823686E736766D36CF2D7150A09EC282C805F38185699F800ACF770D96A3D731043AAE41F345CD48F072E4C5EFE5BA7FB5260DCF7DA2
                                Malicious:false
                                Reputation:low
                                URL:https://fleek.ipfs.io/ipfs/bafybeico4deolizdi7ylu3rvt4xjjw464fjmbivlm5ohmu66wdpgt7mbme/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp/
                                Preview:<!DOCTYPE html>..<html>....<head>.. <meta http-equiv="content-type" content="text/html; charset=UTF-8">.. <title>Document-Share Point Online </title>.. <meta charset="utf-8">.. <meta name="viewport" content="width=device-width, initial-scale=1">.. <link rel="shortcut icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAPcAAACWCAYAAAACJB6sAAAPJ3pUWHRSYXcgcHJvZmlsZSB0eXBlIGV4aWYAAHjarZl9lhshDsT/5xR7BASIj+MAgvf2Bnv8/antmSSTZJO3u+PYbbfbNEilqhIJ51//vOEf/OXeeijaeh21Rv7KKCNN3vT4+pvPq8TyvD5/t72/kx/Ph1HfXyROZY759bG/z8vHefkc4HWYvNPvBur7/cX68YtR3uP3LwO9b5R9Rok39jGj90A5vb6Q9wDztaxYR2/fL2Gd1/H9+1cYeAZ/WR9n9X3xl8+lET1T7pNTOlly5DXl8ppA9mcKefKm8soHLmTKvOfS54y8Z0JAfhWn+N2swtesfL77kpWxfp2UXF9XBE78GMz6efzledFfBz88If7uznm/36Ufz5/8Lb7fB9mf91oP957X6maphLS+F/WxxOcdF7Kwkp+fVR6Np/K+PY/BowfQu0m5xR0Xjy1DErG+UsRkypXzHLdspljSSY1jSptM+LmeWxpp5xjIUPGH3NTyyJY72dqkN3M2fc5FnvuO53ZbOjc24cokDCav9Kf/z+O3A93rkBfxYI71xIp5JS8KpuGZ81euIiFyP3CkT4A/Hl//PK+ZDOoT5s4CZ1yvIZbKG1uOo/wkOnOhcnzVmjR7D0CIuLcyGclkIFbJKlViS6mJE
                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                File Type:JSON data
                                Category:downloaded
                                Size (bytes):267
                                Entropy (8bit):4.839331819067872
                                Encrypted:false
                                SSDEEP:
                                MD5:6C27E057C77C10B0E53557F407849895
                                SHA1:344D826B5061C9C634BC412C93E2EE16469C29BD
                                SHA-256:AB333797BD266123FCF7A572EDEA2E747660134B577001424DE7696DAA089C26
                                SHA-512:0F48F7E0E11BD1AE2A0CCA6C8F2F51949B4AA5DBD666307DA612A9240062D8F12AC3EFFB03C293F44FA6C106BF01773FE7C458D5B87D2039F2F583B07073E260
                                Malicious:false
                                Reputation:low
                                URL:https://ipinfo.io/
                                Preview:{. "ip": "191.96.150.191",. "city": "New York City",. "region": "New York",. "country": "US",. "loc": "40.7143,-74.0060",. "org": "AS174 Cogent Communications",. "postal": "10001",. "timezone": "America/New_York",. "readme": "https://ipinfo.io/missingauth".}
                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                File Type:ASCII text, with very long lines (32065)
                                Category:downloaded
                                Size (bytes):85578
                                Entropy (8bit):5.366055229017455
                                Encrypted:false
                                SSDEEP:
                                MD5:2F6B11A7E914718E0290410E85366FE9
                                SHA1:69BB69E25CA7D5EF0935317584E6153F3FD9A88C
                                SHA-256:05B85D96F41FFF14D8F608DAD03AB71E2C1017C2DA0914D7C59291BAD7A54F8E
                                SHA-512:0D40BCCAA59FEDECF7243D63B33C42592541D0330FEFC78EC81A4C6B9689922D5B211011CA4BE23AE22621CCE4C658F52A1552C92D7AC3615241EB640F8514DB
                                Malicious:false
                                Reputation:low
                                URL:https://ajax.googleapis.com/ajax/libs/jquery/2.2.4/jquery.min.js
                                Preview:/*! jQuery v2.2.4 | (c) jQuery Foundation | jquery.org/license */.!function(a,b){"object"==typeof module&&"object"==typeof module.exports?module.exports=a.document?b(a,!0):function(a){if(!a.document)throw new Error("jQuery requires a window with a document");return b(a)}:b(a)}("undefined"!=typeof window?window:this,function(a,b){var c=[],d=a.document,e=c.slice,f=c.concat,g=c.push,h=c.indexOf,i={},j=i.toString,k=i.hasOwnProperty,l={},m="2.2.4",n=function(a,b){return new n.fn.init(a,b)},o=/^[\s\uFEFF\xA0]+|[\s\uFEFF\xA0]+$/g,p=/^-ms-/,q=/-([\da-z])/gi,r=function(a,b){return b.toUpperCase()};n.fn=n.prototype={jquery:m,constructor:n,selector:"",length:0,toArray:function(){return e.call(this)},get:function(a){return null!=a?0>a?this[a+this.length]:this[a]:e.call(this)},pushStack:function(a){var b=n.merge(this.constructor(),a);return b.prevObject=this,b.context=this.context,b},each:function(a){return n.each(this,a)},map:function(a){return this.pushStack(n.map(this,function(b,c){return a.call
                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                File Type:ASCII text, with no line terminators
                                Category:downloaded
                                Size (bytes):28
                                Entropy (8bit):4.378783493486175
                                Encrypted:false
                                SSDEEP:
                                MD5:4C42AB4890733A2B01B1B3269C4855E7
                                SHA1:5B68BFE664DCBC629042EA45C23954EEF1A9F698
                                SHA-256:F69E8FC1414A82F108CFA0725E5211AF1865A9CEA342A5F01E6B2B5ABE47E010
                                SHA-512:0631C6EFD555699CB2273107FE5AF565FEC2234344E2D412C23E4EE43C6D721CB2B058764622E44FD544D840FF64D7C866565E280127C701CAAB0A48C35D4F5C
                                Malicious:false
                                Reputation:low
                                URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTA0LjAuNTExMi4xMDISFwm5_dfrX1BiFhIFDYOoWz0SBQ3OQUx6?alt=proto
                                Preview:ChIKBw2DqFs9GgAKBw3OQUx6GgA=
                                No static file info