Edit tour

Windows Analysis Report
https://mainpage.me/kanegraphical

Overview

General Information

Sample URL:https://mainpage.me/kanegraphical
Analysis ID:1337732

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

HTML page contains suspicious base64 encoded javascript
Phishing site or detected (based on various text indicators)
Stores files to the Windows start menu directory
HTML page contains hidden URLs or javascript code
HTML page contains obfuscate script src
HTML body contains low number of good links
Creates files inside the system directory
Uses insecure TLS / SSL version for HTTPS connection
Submit button contains javascript call

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64_ra
  • chrome.exe (PID: 1740 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://mainpage.me/kanegraphical MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
    • chrome.exe (PID: 3832 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 --field-trial-handle=1924,i,7648137891351208460,11612428426030146988,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
  • cleanup
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

Phishing

barindex
Source: https://p37xg5nukd2qsjy.ycxnindcxq.ru/5fdh3/HTTP Parser: Base64 decoded: document.write
Source: https://p37xg5nukd2qsjy.ycxnindcxq.ru/5fdh3/HTTP Parser: Base64 decoded: document.write
Source: https://p37xg5nukd2qsjy.ycxnindcxq.ru/5fdh3/0TVKXFAx1uBe9S8H9thUtcZ5FpeTBkDM7b8xo4FuVNO66x2C9a9dNFsAyM4lsLrYQ1ghCVMyavCiLoMmzuF41FPQq49HTTP Parser: Base64 decoded: document.write
Source: Chrome DOMOCR Text: Kane Graphical Kane Graphical has shared a document with you via SharePoint PDE Click on 'VIEW SHARED DOCUMENT to access shared files OPEN DOCUMENT
Source: https://p37xg5nukd2qsjy.ycxnindcxq.ru/5fdh3/HTTP Parser: Base64 decoded: <!DOCTYPE html><html lang="en"><head><meta name="viewport" content="width=device-width, initial-scale=1"><meta http-equiv="content-language" content="en"><script src="https://challenges.cloudflare.com/turnstile/v0/api.js" async></script><link rel="stylesh...
Source: https://p37xg5nukd2qsjy.ycxnindcxq.ru/5fdh3/HTTP Parser: Script src: data:text/javascript;base64,ZG9jdW1lbnQud3JpdGUoZGVjb2RlVVJJQ29tcG9uZW50KGVzY2FwZShhdG9iKGRvY3VtZW50LnF1ZXJ5U2VsZWN0b3IoInlyUVRJZWJUb0x1TEV0bCIpLmdldEF0dHJpYnV0ZSgiZGRWYXlaQ2hOSmtnVnhqIikpKSkpO3BXaWtZT3dQZ0doZkdCcG56VmJPPSJmSldCZkVlQU1LREhHWEEiOw==
Source: https://p37xg5nukd2qsjy.ycxnindcxq.ru/5fdh3/HTTP Parser: Script src: data:text/javascript;base64,ZG9jdW1lbnQud3JpdGUoZGVjb2RlVVJJQ29tcG9uZW50KGVzY2FwZShhdG9iKGRvY3VtZW50LnF1ZXJ5U2VsZWN0b3IoInlyUVRJZWJUb0x1TEV0bCIpLmdldEF0dHJpYnV0ZSgiZGRWYXlaQ2hOSmtnVnhqIikpKSkpO3BXaWtZT3dQZ0doZkdCcG56VmJPPSJmSldCZkVlQU1LREhHWEEiOw==
Source: https://p37xg5nukd2qsjy.ycxnindcxq.ru/5fdh3/0TVKXFAx1uBe9S8H9thUtcZ5FpeTBkDM7b8xo4FuVNO66x2C9a9dNFsAyM4lsLrYQ1ghCVMyavCiLoMmzuF41FPQq49HTTP Parser: Script src: data:text/javascript;base64,ZG9jdW1lbnQud3JpdGUoZGVjb2RlVVJJQ29tcG9uZW50KGVzY2FwZShhdG9iKGRvY3VtZW50LnF1ZXJ5U2VsZWN0b3IoImF0SUlJd0thR0lwT3RnbCIpLmdldEF0dHJpYnV0ZSgidGtNUEtXU0xHVmpsbmV4IikpKSkpO2xrdUpVRnNZTEZYb1dJZWNWc3J4PSJYQW5WcnZmdWdBTEtLZG4iOw==
Source: https://p37xg5nukd2qsjy.ycxnindcxq.ru/5fdh3/0TVKXFAx1uBe9S8H9thUtcZ5FpeTBkDM7b8xo4FuVNO66x2C9a9dNFsAyM4lsLrYQ1ghCVMyavCiLoMmzuF41FPQq49HTTP Parser: Number of links: 0
Source: https://p37xg5nukd2qsjy.ycxnindcxq.ru/5fdh3/0TVKXFAx1uBe9S8H9thUtcZ5FpeTBkDM7b8xo4FuVNO66x2C9a9dNFsAyM4lsLrYQ1ghCVMyavCiLoMmzuF41FPQq49HTTP Parser: On click: gN(true)
Source: https://p37xg5nukd2qsjy.ycxnindcxq.ru/5fdh3/0TVKXFAx1uBe9S8H9thUtcZ5FpeTBkDM7b8xo4FuVNO66x2C9a9dNFsAyM4lsLrYQ1ghCVMyavCiLoMmzuF41FPQq49HTTP Parser: <input type="password" .../> found
Source: https://p37xg5nukd2qsjy.ycxnindcxq.ru/5fdh3/0TVKXFAx1uBe9S8H9thUtcZ5FpeTBkDM7b8xo4FuVNO66x2C9a9dNFsAyM4lsLrYQ1ghCVMyavCiLoMmzuF41FPQq49HTTP Parser: No <meta name="author".. found
Source: https://mainpage.me/kanegraphicalHTTP Parser: No favicon
Source: https://p37xg5nukd2qsjy.ycxnindcxq.ru/5fdh3/HTTP Parser: No favicon
Source: https://p37xg5nukd2qsjy.ycxnindcxq.ru/5fdh3/HTTP Parser: No favicon
Source: https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/sdsvw/0x4AAAAAAAMgDtFVFRxey0Y1/auto/normalHTTP Parser: No favicon
Source: https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/sdsvw/0x4AAAAAAAMgDtFVFRxey0Y1/auto/normalHTTP Parser: No favicon
Source: https://p37xg5nukd2qsjy.ycxnindcxq.ru/5fdh3/0TVKXFAx1uBe9S8H9thUtcZ5FpeTBkDM7b8xo4FuVNO66x2C9a9dNFsAyM4lsLrYQ1ghCVMyavCiLoMmzuF41FPQq49HTTP Parser: No favicon
Source: https://p37xg5nukd2qsjy.ycxnindcxq.ru/5fdh3/0TVKXFAx1uBe9S8H9thUtcZ5FpeTBkDM7b8xo4FuVNO66x2C9a9dNFsAyM4lsLrYQ1ghCVMyavCiLoMmzuF41FPQq49HTTP Parser: No <meta name="copyright".. found
Source: unknownHTTPS traffic detected: 173.222.162.7:443 -> 192.168.2.18:49737 version: TLS 1.0
Source: unknownHTTPS traffic detected: 40.68.123.157:443 -> 192.168.2.18:49734 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.127.169.103:443 -> 192.168.2.18:49740 version: TLS 1.2
Source: unknownHTTPS traffic detected: 173.222.162.7:443 -> 192.168.2.18:49737 version: TLS 1.0
Source: unknownDNS traffic detected: queries for: mainpage.me
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
Source: unknownNetwork traffic detected: HTTP traffic on port 49790 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49787 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49790
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49788
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49787
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49786
Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
Source: unknownNetwork traffic detected: HTTP traffic on port 49788 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
Source: unknownNetwork traffic detected: HTTP traffic on port 49786 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.7
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.7
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.7
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.7
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.7
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.7
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.7
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.7
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.7
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.7
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.7
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownHTTPS traffic detected: 40.68.123.157:443 -> 192.168.2.18:49734 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.127.169.103:443 -> 192.168.2.18:49740 version: TLS 1.2
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_BITS_1740_727860439
Source: classification engineClassification label: mal48.phis.win@18/70@26/145
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://mainpage.me/kanegraphical
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 --field-trial-handle=1924,i,7648137891351208460,11612428426030146988,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 --field-trial-handle=1924,i,7648137891351208460,11612428426030146988,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts1
Scripting
1
Registry Run Keys / Startup Folder
1
Process Injection
11
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local SystemExfiltration Over Other Network Medium2
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
Non-Application Layer Protocol
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
Scripting
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
Application Layer Protocol
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
https://mainpage.me/kanegraphical0%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
jsdelivr.map.fastly.net
151.101.1.229
truefalse
    unknown
    a.nel.cloudflare.com
    35.190.80.1
    truefalse
      high
      accounts.google.com
      142.250.69.205
      truefalse
        high
        challenges.cloudflare.com
        104.17.2.184
        truefalse
          high
          linkme.vn
          172.67.212.38
          truefalse
            unknown
            www.google.com
            142.251.33.100
            truefalse
              high
              clients.l.google.com
              142.251.33.78
              truefalse
                high
                p37xg5nukd2qsjy.ycxnindcxq.ru
                172.67.199.29
                truefalse
                  unknown
                  mainpage.me
                  104.236.198.49
                  truefalse
                    unknown
                    clients1.google.com
                    unknown
                    unknownfalse
                      high
                      clients2.google.com
                      unknown
                      unknownfalse
                        high
                        cdn.jsdelivr.net
                        unknown
                        unknownfalse
                          high
                          NameMaliciousAntivirus DetectionReputation
                          https://mainpage.me/kanegraphicalfalse
                            unknown
                            https://p37xg5nukd2qsjy.ycxnindcxq.ru/5fdh3/0TVKXFAx1uBe9S8H9thUtcZ5FpeTBkDM7b8xo4FuVNO66x2C9a9dNFsAyM4lsLrYQ1ghCVMyavCiLoMmzuF41FPQq49false
                              unknown
                              https://p37xg5nukd2qsjy.ycxnindcxq.ru/5fdh3/false
                                unknown
                                https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/sdsvw/0x4AAAAAAAMgDtFVFRxey0Y1/auto/normalfalse
                                  high
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  142.251.33.100
                                  www.google.comUnited States
                                  15169GOOGLEUSfalse
                                  151.101.1.229
                                  jsdelivr.map.fastly.netUnited States
                                  54113FASTLYUSfalse
                                  1.1.1.1
                                  unknownAustralia
                                  13335CLOUDFLARENETUSfalse
                                  172.217.14.202
                                  unknownUnited States
                                  15169GOOGLEUSfalse
                                  142.251.211.238
                                  unknownUnited States
                                  15169GOOGLEUSfalse
                                  142.251.33.78
                                  clients.l.google.comUnited States
                                  15169GOOGLEUSfalse
                                  172.67.199.29
                                  p37xg5nukd2qsjy.ycxnindcxq.ruUnited States
                                  13335CLOUDFLARENETUSfalse
                                  172.67.212.38
                                  linkme.vnUnited States
                                  13335CLOUDFLARENETUSfalse
                                  104.17.3.184
                                  unknownUnited States
                                  13335CLOUDFLARENETUSfalse
                                  104.236.198.49
                                  mainpage.meUnited States
                                  14061DIGITALOCEAN-ASNUSfalse
                                  142.251.215.227
                                  unknownUnited States
                                  15169GOOGLEUSfalse
                                  239.255.255.250
                                  unknownReserved
                                  unknownunknownfalse
                                  142.250.69.195
                                  unknownUnited States
                                  15169GOOGLEUSfalse
                                  142.250.69.205
                                  accounts.google.comUnited States
                                  15169GOOGLEUSfalse
                                  35.190.80.1
                                  a.nel.cloudflare.comUnited States
                                  15169GOOGLEUSfalse
                                  104.17.2.184
                                  challenges.cloudflare.comUnited States
                                  13335CLOUDFLARENETUSfalse
                                  IP
                                  192.168.2.18
                                  Joe Sandbox Version:38.0.0 Ammolite
                                  Analysis ID:1337732
                                  Start date and time:2023-11-06 16:15:19 +01:00
                                  Joe Sandbox Product:CloudBasic
                                  Overall analysis duration:
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:defaultwindowsinteractivecookbook.jbs
                                  Sample URL:https://mainpage.me/kanegraphical
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:5
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • EGA enabled
                                  Analysis Mode:stream
                                  Analysis stop reason:Timeout
                                  Detection:MAL
                                  Classification:mal48.phis.win@18/70@26/145
                                  • Exclude process from analysis (whitelisted): SIHClient.exe
                                  • Excluded IPs from analysis (whitelisted): 8.252.36.126, 8.252.68.126, 8.240.115.126, 142.250.69.195, 34.104.35.123
                                  • Excluded domains from analysis (whitelisted): cdp-tlu-shim.trafficmanager.net, edgedl.me.gvt1.com, msedge.b.tlu.dl.delivery.mp.microsoft.com, dl.delivery.mp.microsoft.com.c.footprint.net, clientservices.googleapis.com, dns.msftncsi.com
                                  • Not all processes where analyzed, report is missing behavior information
                                  • VT rate limit hit for: https://mainpage.me/kanegraphical
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Nov 6 14:16:11 2023, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                                  Category:dropped
                                  Size (bytes):2675
                                  Entropy (8bit):3.972231498933939
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:C989609784DD1A3A4351A4ABB9A96C65
                                  SHA1:8193D5010D1D73C626855B4159460378A660638B
                                  SHA-256:90567EA55FD7711849FCD173EB78DCCAED354869739E4804567F85E136B48805
                                  SHA-512:FBBB2AE30B2750D7880D2F14352191D21768F9835D097BC41C60C95F1B75618072A4C644373A272098651A34E993BC9E1597E16333C679BD7053495A36D2FBF4
                                  Malicious:false
                                  Reputation:low
                                  Preview:L..................F.@.. ...$+.,....T..,........y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.R..PROGRA~1..t......O.IfW.y....B...............J......Y..P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VfW.z....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.R..Chrome..>......CW.VfW.z....M......................pd.C.h.r.o.m.e.....`.1.....FW.R..APPLIC~1..H......CW.VfW.z...........................pd.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VfW.z.....#......................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Nov 6 14:16:11 2023, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                                  Category:dropped
                                  Size (bytes):2677
                                  Entropy (8bit):3.98700813086654
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:CE8AEAE13A69159689A8C3414D247E99
                                  SHA1:C8572E08F3E6B39169D7B5DF536C1D9A47D8E47F
                                  SHA-256:AECA5B0231FB1D48D880C08F462BB5E8B986150999E72CD983DC4042F770E659
                                  SHA-512:C50408EC0162F9C39218599CE1C3DB049116D77D281D0026EFA2ABFBDAC664AE2E9120DC50F9D1EAA9F47146FFCFEC60F51961EDF2E1D7836741D9B7B2EE89AE
                                  Malicious:false
                                  Reputation:low
                                  Preview:L..................F.@.. ...$+.,....Q`.,........y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.R..PROGRA~1..t......O.IfW.y....B...............J......Y..P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VfW.z....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.R..Chrome..>......CW.VfW.z....M......................pd.C.h.r.o.m.e.....`.1.....FW.R..APPLIC~1..H......CW.VfW.z...........................pd.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VfW.z.....#......................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 09:23:19 2023, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                                  Category:dropped
                                  Size (bytes):2691
                                  Entropy (8bit):3.9955567245356183
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:4B2D5C1925E8040CC3BD46F7762C7703
                                  SHA1:8532EA4BFA809E014AE7E672EF80A25D1E2D24C7
                                  SHA-256:BB3525164BF92C943F7DF00BC3548E067DABD8BC9DF3767A7C171BCA89247458
                                  SHA-512:F563663D72BADA5F773F1CC3E04430273BACE4A985F614C6E56A8BE9138C0F56E25797C9ACAAA54C56914402834BAE2F5561E9C4C0A4007ECD4C5C9DAD607C53
                                  Malicious:false
                                  Reputation:low
                                  Preview:L..................F.@.. ...$+.,....?.4 ?.......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.R..PROGRA~1..t......O.IfW.y....B...............J......Y..P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VfW.z....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.R..Chrome..>......CW.VfW.z....M......................pd.C.h.r.o.m.e.....`.1.....FW.R..APPLIC~1..H......CW.VfW.z...........................pd.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VFW.R.....#......................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Nov 6 14:16:11 2023, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                                  Category:dropped
                                  Size (bytes):2679
                                  Entropy (8bit):3.9832260489914186
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:B3D9A0CB1312F996D52E4687504264DE
                                  SHA1:B1A71180A7B73DD2B292AC59402D23D7EB07BBF7
                                  SHA-256:30B6FFD793BFF10C824801B746FE0862744BEC331C98758B706FBD66F89E24C4
                                  SHA-512:BEA7BC5B57D506C98E474F82BFCA75B08DCC15D696694D2CDAB605DF966BC0BBA4F8F39192D0463E9A36B8FA0B79724B93FCFDE76DD6F7607C335D13A8E0B037
                                  Malicious:false
                                  Reputation:low
                                  Preview:L..................F.@.. ...$+.,.......,........y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.R..PROGRA~1..t......O.IfW.y....B...............J......Y..P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VfW.z....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.R..Chrome..>......CW.VfW.z....M......................pd.C.h.r.o.m.e.....`.1.....FW.R..APPLIC~1..H......CW.VfW.z...........................pd.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VfW.z.....#......................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Nov 6 14:16:11 2023, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                                  Category:dropped
                                  Size (bytes):2679
                                  Entropy (8bit):3.97028555936956
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:27C31A5081EB02C3946495BF0872C3D2
                                  SHA1:1499E589991AA79C54021DEE2AB007C7B6D5C98E
                                  SHA-256:545FAD11DDB91E1677C3A397D430BE3D273D6F7EDEBD5B155992F6F53D99D7F4
                                  SHA-512:ECA28530EA0B02A80F27F07322D4788571F9DB4A7C7415F2EDB1116199C08C9A0D1B00E8D50D8BDA69B60C9C6D9F86543457FBC861EBCBFC3EFA2A3E0601E0E2
                                  Malicious:false
                                  Reputation:low
                                  Preview:L..................F.@.. ...$+.,....-e.,........y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.R..PROGRA~1..t......O.IfW.y....B...............J......Y..P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VfW.z....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.R..Chrome..>......CW.VfW.z....M......................pd.C.h.r.o.m.e.....`.1.....FW.R..APPLIC~1..H......CW.VfW.z...........................pd.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VfW.z.....#......................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Nov 6 14:16:10 2023, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                                  Category:dropped
                                  Size (bytes):2681
                                  Entropy (8bit):3.985635612406796
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:4ECABB71A9A0C34E977AB4EB7D2660D0
                                  SHA1:6CB8A0F0105090B1617D9CFF2A211E9A1D273C37
                                  SHA-256:CF5112E047E45ADADBC2019C0BBA1276C9EC29C4C9747967EA57CF614E0583B6
                                  SHA-512:D0A80294A5FAB548E1EC8F36D4A1C30A56E9D11E3DDFA4DA23D2E41045D93B3E4A8ACD637E71C318AEF54615DEB2F2658F89EC4863C5173B83CA4CA40B9CCBFB
                                  Malicious:false
                                  Reputation:low
                                  Preview:L..................F.@.. ...$+.,....y.,........y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.R..PROGRA~1..t......O.IfW.y....B...............J......Y..P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VfW.z....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.R..Chrome..>......CW.VfW.z....M......................pd.C.h.r.o.m.e.....`.1.....FW.R..APPLIC~1..H......CW.VfW.z...........................pd.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VfW.z.....#......................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:HTML document, ASCII text, with CRLF, LF line terminators
                                  Category:downloaded
                                  Size (bytes):1236
                                  Entropy (8bit):5.217533690963681
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:30A9AA3E2018DF9E4D5A7DEA65C283F6
                                  SHA1:6ABB0707A87DD0140AE3488C3F2A378726E2CA53
                                  SHA-256:230D91B44FFD4DE6A3CFE521B2560E5ED59763DF51A5DE76FC01513787FB1682
                                  SHA-512:8F81262C4A373AAC14E4BB31BCD26FC4E706D7A2D8B2F71B7822444307D2D3FFA44F6602B6902A2D471BC2ECB96F48A43A4901B3C63E940F68C949A3B9F18E7F
                                  Malicious:false
                                  Reputation:low
                                  URL:https://p37xg5nukd2qsjy.ycxnindcxq.ru/favicon.ico
                                  Preview:<!DOCTYPE html>.<html style="height:100%">.<head>.<meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">.<title> 404 Not Found..</title></head>.<body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;">.<div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;">. <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">404</h1>.<h2 style="margin-top:20px;font-size: 30px;">Not Found..</h2>.<p>The resource requested could not be found on this server!</p>.</div></div><div style="color:#f0f0f0; font-size:12px;margin:auto;padding:0px 30px 0px 30px;position:relative;clear:both;height:100px;margin-top:-101px;background-color:#474747;border-top: 1px solid rgba(0,0,0,0.15);box-shadow: 0 1px 0 rgba(255, 255, 255, 0.3) inset;">.<br>Proudly powered by <a style="color:#fff;" href
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:ASCII text, with very long lines (19965)
                                  Category:downloaded
                                  Size (bytes):26854
                                  Entropy (8bit):4.556885716326323
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:C5E166B74AA89AEB97C3316EDF5E2034
                                  SHA1:AAE88670DC753E9CDCDB7BB9C1B02614E87811F9
                                  SHA-256:B4344056299744B289E6D3610B745CF772D10ABD202B5FFC39BC795BA01E0B4A
                                  SHA-512:26EDA38BBEDA0A3EF0911497D06F0523E4843B97B2AE270002EB4FBF5E511F9CFBA0A81D408C73DE10FDBFB6719AC7176A23AEA38644C3AFBC4DE46685252352
                                  Malicious:false
                                  Reputation:low
                                  URL:https://mainpage.me/themes/altum/assets/js/custom.js?v=3100
                                  Preview:'use strict';../* Temporarily disable the form submission button to avoid multiple submissions */.document.querySelectorAll('[type="submit"][name="submit"]:not([data-is-ajax])').forEach(element => {. element.addEventListener('click', event => {. let button = event.currentTarget;.. /* Disable the button */. button.classList.add('disabled');. button.classList.add('container-disabled-simple');.. /* Save the current button text */. let current_button_text = button.innerText;.. /* Show a loading spinner instead of the text */. button.innerHTML = '<div class="spinner-border spinner-border-sm" role="status"></div>';.. /* Go back to the button default state */. setTimeout(() => {. button.classList.remove('disabled');. button.classList.remove('container-disabled-simple');. button.innerText = current_button_text;. }, 2500);.. });.});../* Enable tooltips everywhere */.if(typeof $ ==
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:PNG image data, 29 x 80, 8-bit/color RGB, non-interlaced
                                  Category:downloaded
                                  Size (bytes):61
                                  Entropy (8bit):4.035372245524405
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:01234B2CB42CB021DC75AA9AE63AE8F2
                                  SHA1:D2923449596D17D0DBB735520ED158DBFA8FD1C7
                                  SHA-256:B9C50A03C3B280A0494124EBB94D2BA51FBDAB60C6767AC92357E582612B8196
                                  SHA-512:99C369A94EDBDB23CCC0BED15A05E5DFC5EE6ADC0026ABFC4B96264D1E76DC6011EDA44775CABA6A4A25EC3B94A6F9D17CB76278E3EB6E72E964AB43972F7B4C
                                  Malicious:false
                                  Reputation:low
                                  URL:https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/i/821e4d6abf7c2840/1699283838413/SEsJZyXM3vehl5v
                                  Preview:.PNG........IHDR.......P.....j7......IDAT.....$.....IEND.B`.
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:ASCII text, with very long lines (669)
                                  Category:downloaded
                                  Size (bytes):18423
                                  Entropy (8bit):5.214335071510136
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:C622E0F8BB623F429BC733FA45961D4D
                                  SHA1:67AACAAAD6D9BDAF45B4A9B265627EFEE5BD5338
                                  SHA-256:44C68951462F2A18E868C8AA27055CA446DC341B1EF2FE7172F72735DDF744E2
                                  SHA-512:FAADCFC6C6561EC8F135F2288E328246CB2037911A947697CC80542D6D843E97C8B83873A2D80E17D5831A7AC6D9A3E1223437FAEA20F4D4BAC17155FBAFEFAE
                                  Malicious:false
                                  Reputation:low
                                  URL:https://mainpage.me/themes/altum/assets/css/custom.css?v=3100
                                  Preview:html {..scroll-behavior: smooth;.}..b, strong {..font-weight: 500;.}./* Cancel the bg white for dark mode */.body[data-theme-style="dark"].bg-white {..background: var(--body-bg) !important;.}../* App */..app {..background: var(--gray-50);.}...app-container {.}...app-overlay {..position: fixed;..width: 100%;..height: 100%;..background: var(--gray-100);..z-index: 100;..opacity: .5;.}...app-sidebar {..display: flex;..flex-direction: column;..min-width: 260px;..max-width: 260px;..background: var(--white);..border-right: 2px solid var(--gray-200);..margin-left: -262px;..transition: margin .15s linear;..overflow-y: auto;..position: fixed;..top: 0;..bottom: 0;..left: 0;..height: 100%;..z-index: 101;.}..[dir="rtl"] .app-sidebar {..margin-left: initial;..left: initial;..right: 0;..margin-right: -262px;.}..[dir="rtl"] [data-theme-style="dark"] .app-sidebar {..border-right: 0;..border-left: 2px solid var(--gray-200);.}..body.app-sidebar-opened .app-sidebar {..margin-left: 0;.}..[dir="rtl"] body.a
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:ASCII text
                                  Category:downloaded
                                  Size (bytes):3594
                                  Entropy (8bit):4.778172565926644
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:0C787E8ECC2B95CCB9EB70D4B62CD2A4
                                  SHA1:CB7AF06ACBA1808C2C79B03D943CF191F94C474C
                                  SHA-256:D2B0FE02F511AD6C8F2BA22723445D3504B64A6131DE71DD12C58CD848A6307B
                                  SHA-512:72A2814F52645D5C5F3BA1991BA330AFA20D3ED25C9B5BFBAA0205F9CA0D0C7BA9914DA634EE2C72E021475F57BA2B7AE99F1D36748D4491AEBE288A48C71E0E
                                  Malicious:false
                                  Reputation:low
                                  URL:https://mainpage.me/themes/altum/assets/css/link-custom.css?v=3100
                                  Preview:.link-html {. min-height: 100%;.}...link-body {. background-size: cover !important;. background-position: center center !important;. background-repeat: no-repeat !important;. min-height: 100%;.}...link-video-background {. object-fit: cover;. width: 100vw;. height: 100vh;. position: fixed;. top: 0;. left: 0;.}...link-content {. padding-top: 2rem;.}...link-image {. width: 125px;. height: 125px;. object-fit: contain;.}...link-verified {. border: 2px solid #3897F0;. border-radius: 50rem;. padding: .25rem .4rem;. background: white;. color: #3897F0;. font-weight: bold;.}...link-btn {. position: relative;. white-space: normal;. word-wrap: break-word;. padding: 1rem 4.5rem;. font-size: 1.1rem;. box-shadow: 0 0 20px #00000010;. transition: opacity 0.3s, background 0.3s;. border-radius: 0;.}...link-btn:hover {. animation: none;.}...link-btn-straight {. border-radius: 0;.}...link-btn-round {. border-ra
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:ASCII text, with very long lines (34253)
                                  Category:downloaded
                                  Size (bytes):34254
                                  Entropy (8bit):5.36866791146213
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:C0390DF00FECB63B161780E815A6610C
                                  SHA1:E3A9B96C3D11004287C2BD6D1AF16AFF1C34F74E
                                  SHA-256:47651E05CBF8B23AEE60B901BB914F56609EB1848970C1CC7A2B2FE9FD034D3B
                                  SHA-512:15B1E00416BB8441C8E7B46AA1FEB7819AE0C2D687F965DF6B20E13840985BE4F8DE21C658BB77F15EF53722E083E5832F3E016137CB003D05A356764E7CE56F
                                  Malicious:false
                                  Reputation:low
                                  URL:https://challenges.cloudflare.com/turnstile/v0/b/61b90d1d/api.js
                                  Preview:"use strict";(function(){function Ke(e,n,i,f,u,y,m){try{var l=e[y](m),d=l.value}catch(h){i(h);return}l.done?n(d):Promise.resolve(d).then(f,u)}function Ze(e){return function(){var n=this,i=arguments;return new Promise(function(f,u){var y=e.apply(n,i);function m(d){Ke(y,f,u,m,l,"next",d)}function l(d){Ke(y,f,u,m,l,"throw",d)}m(void 0)})}}function O(e,n){return n!=null&&typeof Symbol!="undefined"&&n[Symbol.hasInstance]?!!n[Symbol.hasInstance](e):O(e,n)}function ye(e,n,i){return n in e?Object.defineProperty(e,n,{value:i,enumerable:!0,configurable:!0,writable:!0}):e[n]=i,e}function Le(e){for(var n=1;n<arguments.length;n++){var i=arguments[n]!=null?arguments[n]:{},f=Object.keys(i);typeof Object.getOwnPropertySymbols=="function"&&(f=f.concat(Object.getOwnPropertySymbols(i).filter(function(u){return Object.getOwnPropertyDescriptor(i,u).enumerable}))),f.forEach(function(u){ye(e,u,i[u])})}return e}function et(e){if(Array.isArray(e))return e}function tt(e,n){var i=e==null?null:typeof Symbol!="und
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:PNG image data, 2 x 2, 8-bit/color RGB, non-interlaced
                                  Category:downloaded
                                  Size (bytes):61
                                  Entropy (8bit):3.990210155325004
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:9246CCA8FC3C00F50035F28E9F6B7F7D
                                  SHA1:3AA538440F70873B574F40CD793060F53EC17A5D
                                  SHA-256:C07D7D29E3C20FA6CA4C5D20663688D52BAD13E129AD82CE06B80EB187D9DC84
                                  SHA-512:A2098304D541DF4C71CDE98E4C4A8FB1746D7EB9677CEBA4B19FF522EFDD981E484224479FD882809196B854DBC5B129962DBA76198D34AAECF7318BD3736C6B
                                  Malicious:false
                                  Reputation:low
                                  URL:https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/cmg/1/wh0E0SXYnx6pTBdJW%2Fl926I%2BPRUplRdtQz3K9lHXs%2Fs%3D
                                  Preview:.PNG........IHDR...............s....IDAT.....$.....IEND.B`.
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:ASCII text, with no line terminators
                                  Category:downloaded
                                  Size (bytes):28
                                  Entropy (8bit):4.039148671903071
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:347BD4FF6C2933B9D6DD0A68430A2D9D
                                  SHA1:EC85831C072E713E5F8A16B4E782A52950FCBCD0
                                  SHA-256:02ABA1FE56D128AB70BE8DEF230D99A51C29D60B1CC07336ED454B8293847463
                                  SHA-512:970A3A6A8F9DD33D3F93FD5BEE00D652A98AED1A5E44C44733094D6D9539FFBD010725F2F48FBA6E1F55B228133FA2C59C6BD340CBCAD61A4B55EC036E117F04
                                  Malicious:false
                                  Reputation:low
                                  URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xNDkSFwnGSQjHXFgiqRIFDSKE8YASBQ3Fk8Qk?alt=proto
                                  Preview:ChIKBw0ihPGAGgAKBw3Fk8QkGgA=
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:ASCII text, with very long lines (65348)
                                  Category:downloaded
                                  Size (bytes):71751
                                  Entropy (8bit):5.119246267674109
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:ACC544860202CA85BD85DC0429880450
                                  SHA1:AB2E786B8F411E124E9FBCBC02F323269BEFF034
                                  SHA-256:721FD25FAD2CEEA766B483F7692FC840097DE75BB54185273920ADF62DA63E15
                                  SHA-512:C1622F9F6E9A38F6E7DD2B5FF0FB6A188F432D8F2D9670B98F7C842190FB3B7FAA29B54F66E87FF15C7B741D7C65F52DEDA428D8BFC76D9027C4CEDAF1B16655
                                  Malicious:false
                                  Reputation:low
                                  URL:https://mainpage.me/themes/altum/assets/css/animate.min.css?v=3100
                                  Preview:@charset "UTF-8";/*!. * animate.css - https://animate.style/. * Version - 4.1.1. * Licensed under the MIT license - http://opensource.org/licenses/MIT. *. * Copyright (c) 2020 Animate.css. */:root{--animate-duration:1s;--animate-delay:1s;--animate-repeat:1}.animate__animated{-webkit-animation-duration:1s;animation-duration:1s;-webkit-animation-duration:var(--animate-duration);animation-duration:var(--animate-duration);-webkit-animation-fill-mode:both;animation-fill-mode:both}.animate__animated.animate__infinite{-webkit-animation-iteration-count:infinite;animation-iteration-count:infinite}.animate__animated.animate__repeat-1{-webkit-animation-iteration-count:1;animation-iteration-count:1;-webkit-animation-iteration-count:var(--animate-repeat);animation-iteration-count:var(--animate-repeat)}.animate__animated.animate__repeat-2{-webkit-animation-iteration-count:2;animation-iteration-count:2;-webkit-animation-iteration-count:calc(var(--animate-repeat)*2);animation-iteration-count:calc(var(
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:Unicode text, UTF-8 text, with very long lines (65306)
                                  Category:downloaded
                                  Size (bytes):155845
                                  Entropy (8bit):5.0596333050371385
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:ABE91756D18B7CD60871A2F47C1E8192
                                  SHA1:7C1C9E0573E5CEA8BAD3733BE2FC63AA8C68EA8D
                                  SHA-256:7633B7C0C97D19E682FEEE8AFA2738523FCB2A14544A550572CAEECD2EEFE66B
                                  SHA-512:BAC54101DEBAFCDA5535F0607B5F60C2CDA3E896629E771AD76AC07B697E77E4242D4F5F886D363B55FC43A85EA48A6BFC460A66F2B1FC8F56B27BA326E3A604
                                  Malicious:false
                                  Reputation:low
                                  URL:https://cdn.jsdelivr.net/npm/bootstrap@5.0.2/dist/css/bootstrap.min.css
                                  Preview:@charset "UTF-8";/*!. * Bootstrap v5.0.2 (https://getbootstrap.com/). * Copyright 2011-2021 The Bootstrap Authors. * Copyright 2011-2021 Twitter, Inc.. * Licensed under MIT (https://github.com/twbs/bootstrap/blob/main/LICENSE). */:root{--bs-blue:#0d6efd;--bs-indigo:#6610f2;--bs-purple:#6f42c1;--bs-pink:#d63384;--bs-red:#dc3545;--bs-orange:#fd7e14;--bs-yellow:#ffc107;--bs-green:#198754;--bs-teal:#20c997;--bs-cyan:#0dcaf0;--bs-white:#fff;--bs-gray:#6c757d;--bs-gray-dark:#343a40;--bs-primary:#0d6efd;--bs-secondary:#6c757d;--bs-success:#198754;--bs-info:#0dcaf0;--bs-warning:#ffc107;--bs-danger:#dc3545;--bs-light:#f8f9fa;--bs-dark:#212529;--bs-font-sans-serif:system-ui,-apple-system,"Segoe UI",Roboto,"Helvetica Neue",Arial,"Noto Sans","Liberation Sans",sans-serif,"Apple Color Emoji","Segoe UI Emoji","Segoe UI Symbol","Noto Color Emoji";--bs-font-monospace:SFMono-Regular,Menlo,Monaco,Consolas,"Liberation Mono","Courier New",monospace;--bs-gradient:linear-gradient(180deg, rgba(255, 255, 255,
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:ASCII text, with very long lines (63188)
                                  Category:downloaded
                                  Size (bytes):63426
                                  Entropy (8bit):5.120589252383324
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:0190F03CA128CF4FF37ECA7237F6CA8D
                                  SHA1:756A64EC71255FF659E4183572E58970AAC3EB79
                                  SHA-256:AEF771D2E517167FE65B281EBBD263D11F079C3A07E91D022A7D1E79D558D7C6
                                  SHA-512:25A3A100E9C4E1AB956E2E1B9A1988561771A26E83840E095C2DE34EC32CF6902F22FE08C93761D45ABC56317521B742EEFD7A9A357999526C5ABD4A9D2C5338
                                  Malicious:false
                                  Reputation:low
                                  URL:https://mainpage.me/themes/altum/assets/js/libraries/bootstrap.min.js?v=3100
                                  Preview:/*!. * Bootstrap v4.6.0 (https://getbootstrap.com/). * Copyright 2011-2021 The Bootstrap Authors (https://github.com/twbs/bootstrap/graphs/contributors). * Licensed under MIT (https://github.com/twbs/bootstrap/blob/main/LICENSE). */.!function(t,e){"object"==typeof exports&&"undefined"!=typeof module?e(exports,require("jquery"),require("popper.js")):"function"==typeof define&&define.amd?define(["exports","jquery","popper.js"],e):e((t="undefined"!=typeof globalThis?globalThis:t||self).bootstrap={},t.jQuery,t.Popper)}(this,(function(t,e,n){"use strict";function i(t){return t&&"object"==typeof t&&"default"in t?t:{default:t}}var o=i(e),a=i(n);function s(t,e){for(var n=0;n<e.length;n++){var i=e[n];i.enumerable=i.enumerable||!1,i.configurable=!0,"value"in i&&(i.writable=!0),Object.defineProperty(t,i.key,i)}}function l(t,e,n){return e&&s(t.prototype,e),n&&s(t,n),t}function r(){return(r=Object.assign||function(t){for(var e=1;e<arguments.length;e++){var n=arguments[e];for(var i in n)Object.p
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:ASCII text, with very long lines (65451)
                                  Category:downloaded
                                  Size (bytes):89476
                                  Entropy (8bit):5.2896589255084425
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:DC5E7F18C8D36AC1D3D4753A87C98D0A
                                  SHA1:C8E1C8B386DC5B7A9184C763C88D19A346EB3342
                                  SHA-256:F7F6A5894F1D19DDAD6FA392B2ECE2C5E578CBF7DA4EA805B6885EB6985B6E3D
                                  SHA-512:6CB4F4426F559C06190DF97229C05A436820D21498350AC9F118A5625758435171418A022ED523BAE46E668F9F8EA871FEAB6AFF58AD2740B67A30F196D65516
                                  Malicious:false
                                  Reputation:low
                                  URL:https://mainpage.me/themes/altum/assets/js/libraries/jquery.min.js?v=3100
                                  Preview:/*! jQuery v3.5.1 | (c) JS Foundation and other contributors | jquery.org/license */.!function(e,t){"use strict";"object"==typeof module&&"object"==typeof module.exports?module.exports=e.document?t(e,!0):function(e){if(!e.document)throw new Error("jQuery requires a window with a document");return t(e)}:t(e)}("undefined"!=typeof window?window:this,function(C,e){"use strict";var t=[],r=Object.getPrototypeOf,s=t.slice,g=t.flat?function(e){return t.flat.call(e)}:function(e){return t.concat.apply([],e)},u=t.push,i=t.indexOf,n={},o=n.toString,v=n.hasOwnProperty,a=v.toString,l=a.call(Object),y={},m=function(e){return"function"==typeof e&&"number"!=typeof e.nodeType},x=function(e){return null!=e&&e===e.window},E=C.document,c={type:!0,src:!0,nonce:!0,noModule:!0};function b(e,t,n){var r,i,o=(n=n||E).createElement("script");if(o.text=e,t)for(r in c)(i=t[r]||t.getAttribute&&t.getAttribute(r))&&o.setAttribute(r,i);n.head.appendChild(o).parentNode.removeChild(o)}function w(e){return null==e?e+"":"o
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:HTML document, Unicode text, UTF-8 text, with very long lines (410)
                                  Category:downloaded
                                  Size (bytes):11134
                                  Entropy (8bit):4.526368622210992
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:D37F391694E44294FADB1A2B84339101
                                  SHA1:1929C517A861A90BE2038D49B1974CDDD3D71A09
                                  SHA-256:E29F3A032C9072F14F62D5CE1B1EA4D58BC707D426E30024EFD738C44A891C6D
                                  SHA-512:A47FA0E3FEE83EEC527CF205A2B0B168762DE8A812E354F63887E8E158F2C7C29210500E01F68014867D9390BB7326413F8887D1C65E0AAD268350089EF73B98
                                  Malicious:false
                                  Reputation:low
                                  URL:https://mainpage.me/favicon.ico
                                  Preview:<!DOCTYPE html>.<html lang="en" dir="ltr">. <head>. <title>Not found - Mainpage.me</title>. <base href="https://mainpage.me/">. <meta charset="UTF-8">. <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" />.. . . . <link rel="alternate" href="https://mainpage.me/favicon.ico" hreflang="x-default" />. <link rel="alternate" href="https://mainpage.me/it/favicon.ico" hreflang="it" />. . . <link href="https://mainpage.me/themes/altum/assets/css/bootstrap.min.css?v=3100" id="css_theme_style" rel="stylesheet" media="screen,print">. <link href="https://mainpage.me/themes/altum/assets/css/custom.css?v=3100" rel="stylesheet" media="screen,print">. . . Affiliatable Base Code --> <script src="https://cdn.affiliata
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (65320)
                                  Category:downloaded
                                  Size (bytes):220642
                                  Entropy (8bit):5.118105201453808
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:E470390FFFB5145A0FE8023FDD641B99
                                  SHA1:FB9D3C19494B34FD5001159927AAAC9E31D1BC9A
                                  SHA-256:702B5B8B9B52325606EF74D541BB408632DCD9EFC08FE1AE7A3E65DDFFB2091B
                                  SHA-512:C5D8F1105E7A3E371D938C3D6C01F81F30EBD477FA21661FB2F76FF82C04C1EED216190A7106481B7184D5C6958A9F46B6E71ADE681C9D1DFD174943654FDC4F
                                  Malicious:false
                                  Reputation:low
                                  URL:https://mainpage.me/themes/altum/assets/css/bootstrap.min.css?v=3100
                                  Preview:./*!. * Bootstrap v4.6.0 (https://getbootstrap.com/). * Copyright 2011-2021 The Bootstrap Authors. * Copyright 2011-2021 Twitter, Inc.. * Licensed under MIT (https://github.com/twbs/bootstrap/blob/main/LICENSE). */:root{--blue: #007bff;--indigo: #6610f2;--purple: #6f42c1;--pink: #e83e8c;--red: #dc3545;--orange: #fd7e14;--yellow: #ffc107;--green: #28a745;--teal: #20c997;--cyan: #17a2b8;--white: #fff;--gray: #6c7789;--gray-dark: #31363f;--primary: #38b2ac;--secondary: #6c7789;--success: #28a745;--info: #17a2b8;--warning: #ffc107;--danger: #dc3545;--light: #f6f8f8;--dark: #31363f;--gray-50: #fcfdfd;--gray-100: #f6f8f8;--gray-200: #f1f2f4;--gray-300: #e5e8eb;--gray-400: #a6b0b9;--gray-500: #9ba4b0;--gray-600: #6c7789;--gray-700: #4c5461;--gray-800: #31363f;--gray-900: #1d2025;--primary-100: #e6fffa;--primary-200: #b2f5ea;--primary-300: #7fe6d8;--primary-400: #4dd1c4;--primary-600: #319694;--primary-700: #2d7a7c;--primary-800: #285f62;--primary-900: #234e52;--breakpoint-xs: 0;--breakpoint
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:ASCII text, with very long lines (65350)
                                  Category:downloaded
                                  Size (bytes):1196706
                                  Entropy (8bit):4.2942692242496445
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:5E29440867FDB02A48DFFDED02338C31
                                  SHA1:C8BFBBFCA7EB327E2E98CAF637D6DE05E5EE737A
                                  SHA-256:812AB0E46F86B2CE98AB2425AB2224B90D0845952A1AC0D5ABD734B6217E98BF
                                  SHA-512:4E7DA6D13229815C93CF3BE6C4B36EA9B4891F724FF239BE0B2DE1BC7AD6EE77530DC275C399818A4B2A0C16FC1A913692C92D16F0C1FF2919D260E9B198F6D3
                                  Malicious:false
                                  Reputation:low
                                  URL:https://mainpage.me/themes/altum/assets/js/libraries/fontawesome-all.min.js?v=3100
                                  Preview:/*!. * Font Awesome Free 5.15.4 by @fontawesome - https://fontawesome.com. * License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License). */.!function(){"use strict";var c={},l={};try{"undefined"!=typeof window&&(c=window),"undefined"!=typeof document&&(l=document)}catch(c){}var h=(c.navigator||{}).userAgent,a=void 0===h?"":h,z=c,v=l,m=(z.document,!!v.documentElement&&!!v.head&&"function"==typeof v.addEventListener&&v.createElement,~a.indexOf("MSIE")||a.indexOf("Trident/"),"___FONT_AWESOME___"),e=function(){try{return!0}catch(c){return!1}}();var s=z||{};s[m]||(s[m]={}),s[m].styles||(s[m].styles={}),s[m].hooks||(s[m].hooks={}),s[m].shims||(s[m].shims=[]);var t=s[m];function M(c,a){var l=(2<arguments.length&&void 0!==arguments[2]?arguments[2]:{}).skipHooks,h=void 0!==l&&l,z=Object.keys(a).reduce(function(c,l){var h=a[l];return!!h.icon?c[h.iconName]=h.icon:c[l]=h,c},{});"function"!=typeof t.hooks.addPack||h?t.styles[c]=function(z){for(var c=1;c
                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  File Type:ASCII text, with very long lines (18860)
                                  Category:downloaded
                                  Size (bytes):18994
                                  Entropy (8bit):5.209985583187137
                                  Encrypted:false
                                  SSDEEP:
                                  MD5:3621381129597BF34D48A9E2623E05C9
                                  SHA1:EDB00146D1636C247C7AFAA61F11AAD0C0FC5120
                                  SHA-256:3675F226F985B64EEA6AE8544D5496A32D19993AAE1AC4A3FA101263EF3206F7
                                  SHA-512:A6BC3381A6B80D4F0420B147898BBDC05DBF908A870FF51B2850B17E0FED55AA17C6AF33D65D93A2C8501DF220D2E6072C7CF99F9583E331287011026B5E6E4C
                                  Malicious:false
                                  Reputation:low
                                  URL:https://mainpage.me/themes/altum/assets/js/libraries/popper.min.js?v=3100
                                  Preview:/*. Copyright (C) Federico Zivolo 2017. Distributed under the MIT License (license terms are at http://opensource.org/licenses/MIT).. */(function(e,t){'object'==typeof exports&&'undefined'!=typeof module?module.exports=t():'function'==typeof define&&define.amd?define(t):e.Popper=t()})(this,function(){'use strict';function e(e){return e&&'[object Function]'==={}.toString.call(e)}function t(e,t){if(1!==e.nodeType)return[];var o=window.getComputedStyle(e,null);return t?o[t]:o}function o(e){return'HTML'===e.nodeName?e:e.parentNode||e.host}function n(e){if(!e||-1!==['HTML','BODY','#document'].indexOf(e.nodeName))return window.document.body;var i=t(e),r=i.overflow,p=i.overflowX,s=i.overflowY;return /(auto|scroll)/.test(r+s+p)?e:n(o(e))}function r(e){var o=e&&e.offsetParent,i=o&&o.nodeName;return i&&'BODY'!==i&&'HTML'!==i?-1!==['TD','TABLE'].indexOf(o.nodeName)&&'static'===t(o,'position')?r(o):o:window.document.documentElement}function p(e){var t=e.nodeName;return'BODY'!==t&&('HTML'===t||r(e.
                                  No static file info