Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://www.overflix.gay/ksisjep

Overview

General Information

Sample URL:https://www.overflix.gay/ksisjep
Analysis ID:1585744

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected suspicious Javascript
AI detected suspicious URL
Detected non-DNS traffic on DNS port
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 5768 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 6944 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1928,i,10349417494667735658,8507873040665215017,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 6620 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.overflix.gay/ksisjep" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No yara matches
No Sigma rule has matched
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2025-01-08T07:19:01.564489+010020127862Potentially Bad Traffic192.168.2.16614861.1.1.153UDP
2025-01-08T07:19:01.564628+010020127862Potentially Bad Traffic192.168.2.16655131.1.1.153UDP
2025-01-08T07:19:02.706501+010020127862Potentially Bad Traffic192.168.2.16603971.1.1.153UDP
2025-01-08T07:19:02.706749+010020127862Potentially Bad Traffic192.168.2.16577101.1.1.153UDP
2025-01-08T07:19:06.274319+010020127862Potentially Bad Traffic192.168.2.16645261.1.1.153UDP
2025-01-08T07:19:06.274470+010020127862Potentially Bad Traffic192.168.2.16574051.1.1.153UDP
2025-01-08T07:19:08.514502+010020127862Potentially Bad Traffic192.168.2.16517521.1.1.153UDP
2025-01-08T07:19:08.514654+010020127862Potentially Bad Traffic192.168.2.16568301.1.1.153UDP
2025-01-08T07:20:34.856235+010020127862Potentially Bad Traffic192.168.2.16519461.1.1.153UDP
2025-01-08T07:20:34.856393+010020127862Potentially Bad Traffic192.168.2.16576461.1.1.153UDP

Click to jump to signature section

Show All Signature Results

Phishing

barindex
Source: 0.3.id.script.csvJoe Sandbox AI: Detected suspicious JavaScript with source url: https://electrumtc.fun/?encoded_value=STPMF8&sub1=... The use of `document.write()` to execute a dynamic function call (`datenhay()`) is a high-risk indicator, as it can enable remote code execution. This behavior is considered a security vulnerability and should be investigated further.
Source: 0.2.id.script.csvJoe Sandbox AI: Detected suspicious JavaScript with source url: https://electrumtc.fun/?encoded_value=STPMF8&sub1=... The use of `document.write()` to execute a function called `datenhax()` is a high-risk indicator, as it allows for dynamic code execution. This behavior is often associated with malicious scripts that can inject and execute arbitrary code on the page, posing a significant security risk.
Source: 0.0.id.script.csvJoe Sandbox AI: Detected suspicious JavaScript with source url: https://electrumtc.fun/?encoded_value=STPMF8&sub1=... This script demonstrates high-risk behavior by redirecting the user to an untrusted domain ('https://www.captureclickspath.com/cmp/2SFN28H/36LZDZ2/') without user consent. The use of `history.replaceState()` and `history.pushState()` to manipulate the browser's history and the `setTimeout()` function to trigger the redirect after a short delay are concerning. This script is likely attempting to perform a malicious redirect, which poses a significant risk to the user's security and privacy.
Source: URLJoe Sandbox AI: AI detected Brand spoofing attempt in URL: https://www.overflix.gay
Source: URLJoe Sandbox AI: AI detected Typosquatting in URL: https://www.overflix.gay
Source: URLJoe Sandbox AI: AI detected Brand spoofing attempt in URL: https://electrumtc.fun
Source: URLJoe Sandbox AI: AI detected Typosquatting in URL: https://electrumtc.fun
Source: https://electrumtc.fun/?encoded_value=STPMF8&sub1=822870&sub2=788770977&sub3=&sub4=&sub5=22467&source_id=&ip=8.46.123.189&domain=www.sebeati.comHTTP Parser: No favicon
Source: https://electrumtc.fun/?encoded_value=STPMF8&sub1=822870&sub2=788770977&sub3=&sub4=&sub5=22467&source_id=&ip=8.46.123.189&domain=www.sebeati.comHTTP Parser: No favicon
Source: https://electrumtc.fun/?encoded_value=STPMF8&sub1=822870&sub2=788770977&sub3=&sub4=&sub5=22467&source_id=&ip=8.46.123.189&domain=www.sebeati.comHTTP Parser: No favicon
Source: https://electrumtc.fun/?encoded_value=STPMF8&sub1=822870&sub2=788770977&sub3=&sub4=&sub5=22467&source_id=&ip=8.46.123.189&domain=www.sebeati.comHTTP Parser: No favicon
Source: https://electrumtc.fun/?encoded_value=STPMF8&sub1=822870&sub2=788770977&sub3=&sub4=&sub5=22467&source_id=&ip=8.46.123.189&domain=www.sebeati.comHTTP Parser: No favicon
Source: unknownHTTPS traffic detected: 23.56.254.164:443 -> 192.168.2.16:49728 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.56.254.164:443 -> 192.168.2.16:49732 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.16:49747 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.16:49828 version: TLS 1.2
Source: global trafficTCP traffic: 192.168.2.16:49818 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49818 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49818 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49818 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49818 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49818 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49818 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49818 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49818 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49818 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49818 -> 1.1.1.1:53
Source: Network trafficSuricata IDS: 2012786 - Severity 2 - ET MALWARE DNS Query for Possible FakeAV Domain : 192.168.2.16:65513 -> 1.1.1.1:53
Source: Network trafficSuricata IDS: 2012786 - Severity 2 - ET MALWARE DNS Query for Possible FakeAV Domain : 192.168.2.16:61486 -> 1.1.1.1:53
Source: Network trafficSuricata IDS: 2012786 - Severity 2 - ET MALWARE DNS Query for Possible FakeAV Domain : 192.168.2.16:60397 -> 1.1.1.1:53
Source: Network trafficSuricata IDS: 2012786 - Severity 2 - ET MALWARE DNS Query for Possible FakeAV Domain : 192.168.2.16:57710 -> 1.1.1.1:53
Source: Network trafficSuricata IDS: 2012786 - Severity 2 - ET MALWARE DNS Query for Possible FakeAV Domain : 192.168.2.16:57405 -> 1.1.1.1:53
Source: Network trafficSuricata IDS: 2012786 - Severity 2 - ET MALWARE DNS Query for Possible FakeAV Domain : 192.168.2.16:51752 -> 1.1.1.1:53
Source: Network trafficSuricata IDS: 2012786 - Severity 2 - ET MALWARE DNS Query for Possible FakeAV Domain : 192.168.2.16:56830 -> 1.1.1.1:53
Source: Network trafficSuricata IDS: 2012786 - Severity 2 - ET MALWARE DNS Query for Possible FakeAV Domain : 192.168.2.16:57646 -> 1.1.1.1:53
Source: Network trafficSuricata IDS: 2012786 - Severity 2 - ET MALWARE DNS Query for Possible FakeAV Domain : 192.168.2.16:51946 -> 1.1.1.1:53
Source: Network trafficSuricata IDS: 2012786 - Severity 2 - ET MALWARE DNS Query for Possible FakeAV Domain : 192.168.2.16:64526 -> 1.1.1.1:53
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: www.overflix.gay
Source: global trafficDNS traffic detected: DNS query: www.flamingoblv.com
Source: global trafficDNS traffic detected: DNS query: www.sebeati.com
Source: global trafficDNS traffic detected: DNS query: electrumtc.fun
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: use.fontawesome.com
Source: global trafficDNS traffic detected: DNS query: trk-quantivex.com
Source: global trafficDNS traffic detected: DNS query: secureanalytic.com
Source: global trafficDNS traffic detected: DNS query: a.nel.cloudflare.com
Source: global trafficDNS traffic detected: DNS query: event.trk-quantivex.com
Source: global trafficDNS traffic detected: DNS query: subscription.trk-quantivex.com
Source: global trafficDNS traffic detected: DNS query: api.taboola.com
Source: global trafficDNS traffic detected: DNS query: extension.secureanalytic.com
Source: global trafficDNS traffic detected: DNS query: notification.secureanalytic.com
Source: global trafficDNS traffic detected: DNS query: pushclk.com
Source: global trafficDNS traffic detected: DNS query: d22322n8919ncg.cloudfront.net
Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49865
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
Source: unknownNetwork traffic detected: HTTP traffic on port 49817 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49864
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49863
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49862
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49861
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49860
Source: unknownNetwork traffic detected: HTTP traffic on port 49789 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49800 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49852 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49795 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49859
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49858
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49857
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49856
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49855
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
Source: unknownNetwork traffic detected: HTTP traffic on port 49841 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49854
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49853
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49852
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49851
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49850
Source: unknownNetwork traffic detected: HTTP traffic on port 49812 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49858 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49806 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49823 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49849
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49848
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49847
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49846
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
Source: unknownNetwork traffic detected: HTTP traffic on port 49790 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49845
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49844
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49843
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49842
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49841
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49840
Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49828 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49805 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49839
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49838
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
Source: unknownNetwork traffic detected: HTTP traffic on port 49847 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49836
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49833
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49832
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49831
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49830
Source: unknownNetwork traffic detected: HTTP traffic on port 49839 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49864 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49822 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49853 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49796 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
Source: unknownNetwork traffic detected: HTTP traffic on port 49811 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49828
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49827
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49826
Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49825
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49824
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49823
Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49822
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49788
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49787
Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49786
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
Source: unknownNetwork traffic detected: HTTP traffic on port 49813 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
Source: unknownNetwork traffic detected: HTTP traffic on port 49836 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49807 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49845 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49791 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
Source: unknownNetwork traffic detected: HTTP traffic on port 49862 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49802 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49851 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49830 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
Source: unknownNetwork traffic detected: HTTP traffic on port 49863 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
Source: unknownNetwork traffic detected: HTTP traffic on port 49840 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49857 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49797 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49801 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49824 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
Source: unknownNetwork traffic detected: HTTP traffic on port 49786 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
Source: unknownNetwork traffic detected: HTTP traffic on port 49846 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
Source: unknownNetwork traffic detected: HTTP traffic on port 49792 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49866
Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49803 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49826 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49849 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
Source: unknownNetwork traffic detected: HTTP traffic on port 49866 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49820 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49855 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49798 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49861 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49819 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49844 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49787 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49850 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49831 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49799
Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49798
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49797
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49796
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49795
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49794
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49793
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49792
Source: unknownNetwork traffic detected: HTTP traffic on port 49814 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49791
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49790
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49856 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49825 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49808 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49789
Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49821
Source: unknownNetwork traffic detected: HTTP traffic on port 49865 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49820
Source: unknownNetwork traffic detected: HTTP traffic on port 49842 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49859 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49833 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49819
Source: unknownNetwork traffic detected: HTTP traffic on port 49799 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49817
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49816
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49815
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49814
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49813
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49812
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49811
Source: unknownNetwork traffic detected: HTTP traffic on port 49816 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49788 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49794 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49827 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49809
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49808
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49807
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49806
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49805
Source: unknownNetwork traffic detected: HTTP traffic on port 49848 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49804
Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49803
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49802
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49801
Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49800
Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49838 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49821 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49815 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49854 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49809 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49860 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49843 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49804 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49832 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
Source: unknownHTTPS traffic detected: 23.56.254.164:443 -> 192.168.2.16:49728 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.56.254.164:443 -> 192.168.2.16:49732 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.16:49747 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.16:49828 version: TLS 1.2
Source: classification engineClassification label: mal48.win@19/40@44/239
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1928,i,10349417494667735658,8507873040665215017,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.overflix.gay/ksisjep"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1928,i,10349417494667735658,8507873040665215017,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation2
Browser Extensions
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
Registry Run Keys / Startup Folder
1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
https://www.overflix.gay/ksisjep0%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
electrumtc.fun
104.21.76.17
truetrue
    unknown
    android.l.google.com
    216.58.206.46
    truefalse
      high
      a.nel.cloudflare.com
      35.190.80.1
      truefalse
        high
        tls13.taboola.map.fastly.net
        151.101.65.44
        truefalse
          high
          event.trk-quantivex.com
          104.21.13.162
          truefalse
            high
            secureanalytic.com
            188.114.97.3
            truefalse
              high
              d22322n8919ncg.cloudfront.net
              65.9.7.21
              truefalse
                unknown
                www.flamingoblv.com
                216.107.139.64
                truefalse
                  high
                  www.sebeati.com
                  172.67.160.100
                  truefalse
                    high
                    mobile-gtalk.l.google.com
                    173.194.76.188
                    truefalse
                      high
                      trk-quantivex.com
                      104.21.13.162
                      truefalse
                        high
                        www.google.com
                        142.250.186.132
                        truefalse
                          high
                          www.overflix.gay
                          172.67.133.97
                          truetrue
                            unknown
                            subscription.trk-quantivex.com
                            104.21.13.162
                            truefalse
                              high
                              notification.secureanalytic.com
                              188.114.97.3
                              truefalse
                                high
                                extension.secureanalytic.com
                                188.114.96.3
                                truefalse
                                  high
                                  pushclk.com
                                  172.67.171.114
                                  truefalse
                                    high
                                    api.taboola.com
                                    unknown
                                    unknownfalse
                                      high
                                      use.fontawesome.com
                                      unknown
                                      unknownfalse
                                        high
                                        NameMaliciousAntivirus DetectionReputation
                                        https://electrumtc.fun/?encoded_value=STPMF8&sub1=822870&sub2=788770977&sub3=&sub4=&sub5=22467&source_id=&ip=8.46.123.189&domain=www.sebeati.comfalse
                                          unknown
                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs
                                          IPDomainCountryFlagASNASN NameMalicious
                                          216.107.139.64
                                          www.flamingoblv.comUnited States
                                          395111KVCNET-2009USfalse
                                          172.67.142.245
                                          unknownUnited States
                                          13335CLOUDFLARENETUSfalse
                                          172.67.133.97
                                          www.overflix.gayUnited States
                                          13335CLOUDFLARENETUStrue
                                          216.58.206.78
                                          unknownUnited States
                                          15169GOOGLEUSfalse
                                          172.67.156.201
                                          unknownUnited States
                                          13335CLOUDFLARENETUSfalse
                                          104.21.13.162
                                          event.trk-quantivex.comUnited States
                                          13335CLOUDFLARENETUSfalse
                                          142.250.186.132
                                          www.google.comUnited States
                                          15169GOOGLEUSfalse
                                          35.190.80.1
                                          a.nel.cloudflare.comUnited States
                                          15169GOOGLEUSfalse
                                          142.250.184.227
                                          unknownUnited States
                                          15169GOOGLEUSfalse
                                          172.67.160.100
                                          www.sebeati.comUnited States
                                          13335CLOUDFLARENETUSfalse
                                          142.250.186.138
                                          unknownUnited States
                                          15169GOOGLEUSfalse
                                          142.250.184.195
                                          unknownUnited States
                                          15169GOOGLEUSfalse
                                          151.101.193.44
                                          unknownUnited States
                                          54113FASTLYUSfalse
                                          1.1.1.1
                                          unknownAustralia
                                          13335CLOUDFLARENETUSfalse
                                          108.177.15.84
                                          unknownUnited States
                                          15169GOOGLEUSfalse
                                          173.194.76.188
                                          mobile-gtalk.l.google.comUnited States
                                          15169GOOGLEUSfalse
                                          172.217.16.206
                                          unknownUnited States
                                          15169GOOGLEUSfalse
                                          172.67.171.114
                                          pushclk.comUnited States
                                          13335CLOUDFLARENETUSfalse
                                          65.9.7.21
                                          d22322n8919ncg.cloudfront.netUnited States
                                          16509AMAZON-02USfalse
                                          216.58.206.46
                                          android.l.google.comUnited States
                                          15169GOOGLEUSfalse
                                          239.255.255.250
                                          unknownReserved
                                          unknownunknownfalse
                                          188.114.97.3
                                          secureanalytic.comEuropean Union
                                          13335CLOUDFLARENETUSfalse
                                          104.21.27.152
                                          unknownUnited States
                                          13335CLOUDFLARENETUSfalse
                                          151.101.65.44
                                          tls13.taboola.map.fastly.netUnited States
                                          54113FASTLYUSfalse
                                          188.114.96.3
                                          extension.secureanalytic.comEuropean Union
                                          13335CLOUDFLARENETUSfalse
                                          104.21.76.17
                                          electrumtc.funUnited States
                                          13335CLOUDFLARENETUStrue
                                          IP
                                          192.168.2.16
                                          Joe Sandbox version:41.0.0 Charoite
                                          Analysis ID:1585744
                                          Start date and time:2025-01-08 07:18:19 +01:00
                                          Joe Sandbox product:CloudBasic
                                          Overall analysis duration:
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Cookbook file name:defaultwindowsinteractivecookbook.jbs
                                          Sample URL:https://www.overflix.gay/ksisjep
                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                          Number of analysed new started processes analysed:13
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • EGA enabled
                                          Analysis Mode:stream
                                          Analysis stop reason:Timeout
                                          Detection:MAL
                                          Classification:mal48.win@19/40@44/239
                                          • Exclude process from analysis (whitelisted): svchost.exe
                                          • Excluded IPs from analysis (whitelisted): 142.250.184.195, 216.58.206.78, 108.177.15.84
                                          • Excluded domains from analysis (whitelisted): clients2.google.com, accounts.google.com, clientservices.googleapis.com, clients.l.google.com
                                          • Not all processes where analyzed, report is missing behavior information
                                          • VT rate limit hit for: https://www.overflix.gay/ksisjep
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jan 8 05:18:50 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                          Category:dropped
                                          Size (bytes):2675
                                          Entropy (8bit):3.9972649620890657
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:BF2B08D9EF09AA39D3A2B79E1D764056
                                          SHA1:3C4D6F9D6D0829C081D3F86BFA1FD7730486BF7A
                                          SHA-256:BDCC3476F5A22D8F212073393A8D86BF2C131DC2A9963C0D02DF58A96C454641
                                          SHA-512:5EEA48071448E0F398ADDAA8D344E4319C0B57C4344B5B3B4F3A339ADD3812FC106C10D4820A17C6BEE7B21C081A7848F6BAF2EB0FCE7B8AEAD3E45B95A2F503
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:L..................F.@.. ...$+.,....;.5/.a..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I(ZO2....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V(ZX2....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V(ZX2....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V(ZX2..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V(ZZ2...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............9.\.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                          Category:dropped
                                          Size (bytes):2689
                                          Entropy (8bit):4.008009134515379
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:5AD52124D086295E8D297899B9CC8CA6
                                          SHA1:5A802EFB5672CEC08F6295E18CC5A29394DCEF59
                                          SHA-256:3D40D264ED53D7D552C065B8C40E01948C5DCDB0762EC81D6FEE93D232A46207
                                          SHA-512:441B40827B148AF80D2D7B9221299FA221971A837B5903BE0FEC8A39642D91CE0278456940893595BAE5754B8053960DD1047CA77EAA83D0C2C89A435CB32D4E
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I(ZO2....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V(ZX2....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V(ZX2....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V(ZX2..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............9.\.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jan 8 05:18:50 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                          Category:dropped
                                          Size (bytes):2677
                                          Entropy (8bit):3.997628845620407
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:66A6E46E4A1FBEB3ABFFBEBF3C1E5C92
                                          SHA1:7C3C883242887DBBAA540CDBA624DBBF48A60AE8
                                          SHA-256:29317F32B4E6E81BA076F1DD6086E41BB4198E489DCDAE43B4DD50AF4B52F390
                                          SHA-512:7BC979659F3B61193288D1CAF905995C1F718B79FF4CF3651FC29FD3DADA5294F63FFA6AB8C58C718FE487635F5FB552FDBE304FB5FB7BB75E29328CA5FFC7E0
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:L..................F.@.. ...$+.,......//.a..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I(ZO2....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V(ZX2....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V(ZX2....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V(ZX2..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V(ZZ2...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............9.\.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jan 8 05:18:50 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                          Category:dropped
                                          Size (bytes):2677
                                          Entropy (8bit):3.9841539897661495
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:5EA2F80C684AE31661B279A43D8E9B5B
                                          SHA1:8CE17925C161392939C9873F7B88CB935D7C565A
                                          SHA-256:5E5F41D96007E8D602F5695128BCA3D6963818BE83826B13AE09F51E12CC1770
                                          SHA-512:9BD6F9F1DB5A0EAB06A4E0C58FB55013249228A3BDBC65F8F9B6249EF4138DAA38F836AB647D7FC9B2687350D71EABB2D2123827FF3A67EA143CD047583F305B
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:L..................F.@.. ...$+.,....b.:/.a..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I(ZO2....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V(ZX2....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V(ZX2....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V(ZX2..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V(ZZ2...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............9.\.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jan 8 05:18:50 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                          Category:dropped
                                          Size (bytes):2679
                                          Entropy (8bit):3.995176146719624
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:C191EAFF9C99FD4E2C84A3427FA3358B
                                          SHA1:DE1DBF0C37AE71778D03D35763E5F17AF94EB97F
                                          SHA-256:8F865C0D97CB507A4C8EA72A3E31B888D28ACE30A31C8F999E6263B53826DC1D
                                          SHA-512:87F226643A40FC5D36E8FDFBB6A8B6C92EEA250FC26CE6FA4EC51148801D87CA069D5ACCEAA192605BA6DF1A880489131CC8EFBCC58613A4A1707328FB6A1213
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:L..................F.@.. ...$+.,......&/.a..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I(ZO2....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V(ZX2....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V(ZX2....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V(ZX2..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V(ZZ2...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............9.\.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (8139)
                                          Category:downloaded
                                          Size (bytes):8140
                                          Entropy (8bit):5.236311454697542
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:38A7DF470A20748B45512F70322D0206
                                          SHA1:3282CF7797672E9ADDD03A4CAF605DAC850F4301
                                          SHA-256:2F57B5A23FDCFA1C9053FB5E683424F3CF31809E451F4AC5CFD9B46DEEA5D945
                                          SHA-512:9BFC595BD8A7C9B74984AE51387DBBABC0D22ADDA4A5324A2F0769C84E589F49CF0614907B2343FBB013D9858973DA87A6F6B0EA0C4C1ADCF7D98AF96610891E
                                          Malicious:false
                                          Reputation:unknown
                                          URL:https://trk-quantivex.com/scripts/push/script/64d5p99gj0?url=electrumtc.fun
                                          Preview:'use strict';const smPushApplicationServerPublicKey="BDnASIlN8u2OhhYnM61OCx7FTFc7qpsJNNw1UDN26bLSlMRyE-FG1jfIleF7PGGHK0fIWvCAE5U_l7NgCdzXbLQ=",smPushSiteId="4og39p1rg3",smClientId="64d5p99gj0",serviceWorker="/service-worker.js";let smPushDomain="push.trk-quantivex.com",pushLogging=!0;const version=818;let smPushSubscriptionId,subscriptionDomain="subscription.trk-quantivex.com",eventDomain="event.trk-quantivex.com",sessionId="";const utmObj={mt:"",utm_source:"",utm_medium:"",utm_campaign:"",source_one:"",source_two:"",source_three:"",source_four:"",source_five:"",first_name:"",last_name:"",email:"",email_md5:"",zip_code:"",gender:"",age:""},taboolaUrl="https://api.taboola.com/2.0/json/smpush-general/user.sync?app.type=web&app.apikey=dd83e155339c3c4626a1a3e8465b50db3024b412";function urlBase64ToUint8Array(a){const b="=".repeat((4-a.length%4)%4),c=(a+b).replace(/\-/g,"+").replace(/_/g,"/"),d=window.atob(c),e=new Uint8Array(d.length);for(let b=0;b<d.length;++b)e[b]=d.charCodeAt(b);return e
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (11700)
                                          Category:downloaded
                                          Size (bytes):11701
                                          Entropy (8bit):5.28704316889371
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:977C9F2303785F366C61C6DF506E4617
                                          SHA1:6EB3A7A1731E28F837FF22F85084B59FB50B71D1
                                          SHA-256:DE2874BEF4F728BC85475CF4098A29C23B89C71A90D651F28BAC7A45FFBB055A
                                          SHA-512:4655660BB9A57E888AFE8B8EB46266D6D05AB3F9815CEA48E6BD4073AEA402B5209DAA98DF5BA60E66546F94CF3EF5D08884F9248970E37779EA5EFAFC34F94C
                                          Malicious:false
                                          Reputation:unknown
                                          URL:https://secureanalytic.com/scripts/sw/script/64d5p99gj0?url=electrumtc.fun
                                          Preview:'use strict';const env={log:!0,retry:10,sleepTime:1e4,domain:"push.secureanalytic.com",notificationDomain:"notification.secureanalytic.com",subscriptionDomain:"subscription.secureanalytic.com",eventDomain:"event.secureanalytic.com"},applicationServerPublicKey="BDnASIlN8u2OhhYnM61OCx7FTFc7qpsJNNw1UDN26bLSlMRyE-FG1jfIleF7PGGHK0fIWvCAE5U_l7NgCdzXbLQ=",siteId="4og39p1rg3",smClientId="64d5p99gj0",version=533,smAPIKey="87e99772e7d94df197c5677835d9135e";let smPushSubscriptionId;function getStore(a){if(self.indexedDB){var b=self.indexedDB.open("pushPlatFormDb",2);b.onerror=function(){console.log("error db"+b.error),a(null)},b.onsuccess=function(){var c=b.result,d=c.transaction(["store"],"readwrite"),e=d.objectStore("store");a(e)},b.onupgradeneeded=function(a){console.log("upgrading db from version "+a.oldVersion+" to 2");var c=b.result;if(2>a.oldVersion){var d=c.createObjectStore("store",{keyPath:"name"});setUserDataInStore("",null,[],[],[],d)}}}else a(null)}function arrayRotate(a,b){return b?
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:JSON data
                                          Category:downloaded
                                          Size (bytes):83
                                          Entropy (8bit):4.561551408515342
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:013EDA12CEDB4F1AE3A1600AB9C99378
                                          SHA1:B5249CBF8F9E65EF66F7C55532E7A88FBA0976AC
                                          SHA-256:FEED526B4B05311A218A5BA0C3D3A93AF9C5692738B23823592EF7B37E0780C2
                                          SHA-512:E68E0ACE2628E2C3BB437D38E13D7D40C29FE8C4E6EB6BF6418E90B23A035B23D664BBEB721FE525E9BC47B169506ADFA3820E7D4F1704EB381289396230E47E
                                          Malicious:false
                                          Reputation:unknown
                                          URL:https://api.taboola.com/2.0/json/smpush-general/user.sync?app.type=web&app.apikey=dd83e155339c3c4626a1a3e8465b50db3024b412
                                          Preview:{"user":{"id":"57c65395-69f3-443c-a70c-f62c3c5b68e5-tucte779eb6","isNewUser":true}}
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:GIF image data, version 89a, 184 x 182
                                          Category:dropped
                                          Size (bytes):124490
                                          Entropy (8bit):7.8640718109105885
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:FB15CE1DFACCB69FD9AB7F273E35A9B6
                                          SHA1:A74C92D986784781AB0B01793608B070DCC4166D
                                          SHA-256:35F9930D147DCC30546BDEF8ABD7618CBBBB76379CCA8D73B391DAA5C3CB6ACA
                                          SHA-512:D1C20DB57CADB232C2544CE4A73154C08F92DDC16E9B636D428D82C8E9B8E54CC535A0BCCEF980B2AA0C8BE5A0F4E04CAA7E808FCC81FF02B99C8ABE67493627
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:GIF89a..............................!..".MT..(.!3.#4.%6.T^..A.$9.9N.2J.;T.>W.G_.Un...Id.d..s...............................................................................................................................................................................................................................................................................................................................................................^.\...............................C.-f.Vs.e..w...................................C.+E.+E.-G.-G./H.1K.5P.;Y.F\.I|.n..r.i...........................................................................m.\........................{d..........LE....................................................................................!..NETSCAPE2.0.....!.......,...............H......*\......FlH....3j.....u C..H...(.>..P..0c.Y....gV.....,...*3.@.`.*M..:.P..t.T..*V. I.dH..C.~M....'N..Y.&..p....2..'S...........B...#..X..uh.`yBe.!D.4......
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:HTML document, ASCII text, with CRLF line terminators
                                          Category:downloaded
                                          Size (bytes):555
                                          Entropy (8bit):4.746057237194352
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:3DB15E9826C811E89B1AB26C6E567C4A
                                          SHA1:74AF858DF77C1B94A9EF74D8AC0BBA17679DA534
                                          SHA-256:E209D6D6E97CB95D6246E176F50383D75B0EA94345C7CC1C0777E178935DB3C5
                                          SHA-512:1CD70EA7A7381E1AD9B8414EFF4052526D26F10FD8924358EE9DCF7E19F34936973FD29D0C0527704C5B6E335195694F6AB678CB5222D2E982F725B5B25649DA
                                          Malicious:false
                                          Reputation:unknown
                                          URL:https://electrumtc.fun/favicon.ico
                                          Preview:<html>..<head><title>404 Not Found</title></head>..<body>..<center><h1>404 Not Found</h1></center>..<hr><center>nginx/1.25.3</center>..</body>..</html>.. a padding to disable MSIE and Chrome friendly error page -->.. a padding to disable MSIE and Chrome friendly error page -->.. a padding to disable MSIE and Chrome friendly error page -->.. a padding to disable MSIE and Chrome friendly error page -->.. a padding to disable MSIE and Chrome friendly error page -->.. a padding to disable MSIE and Chrome friendly error page -->..
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=360, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=480], progressive, precision 8, 352x264, components 3
                                          Category:dropped
                                          Size (bytes):102996
                                          Entropy (8bit):7.925724481847048
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:256CCBB2F8B016CBC94B5F57E4A4236C
                                          SHA1:832258BABB30D133F67EE829CCEECCA5AB71EB86
                                          SHA-256:057084C8EFF09752EAB8198CEA30C3575503DA950D13531AB4A6A09DB4E410C0
                                          SHA-512:77697616B45DF88D5B2E3B8ED35DEDDBC3DDB78DCD16F5B6ABBF82A1A34F5A4C9E3770074327B7FE92C820B2C79F631BD759B91D6F8A77E4CD2E623A3C0FCDC0
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:....%.Exif..MM.*...........................h...........................................................................(...........1...........2..........i............. ............'.......'.Adobe Photoshop 24.7 (Windows).2024:10:21 19:13:49............0231.......................`...........................................n...........v.(.....................~..........$A.......H.......H..........Adobe_CM......Adobe.d.................................................................................................................................................x...."................?..........................................................................3......!.1.AQa."q.2.....B#$.R.b34r..C.%.S...cs5....&D.TdE.t6..U.e...u..F'...............Vfv........7GWgw........................5.....!1..AQaq"..2.....B#.R..3$b.r..CS.cs4.%......&5..D.T..dEU6te....u..F...............Vfv........'7GWgw.................?....=/....O.n.....Z.._.s+..;.w.g..?.....u...cZ.VA..^.Z.}Q.....[.M.V...;UW.;..
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:PNG image data, 1051 x 329, 8-bit/color RGBA, non-interlaced
                                          Category:downloaded
                                          Size (bytes):61190
                                          Entropy (8bit):7.962766102308013
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:2CD7F03A51399B1605E87BC9AA836CCE
                                          SHA1:62162CDE76A483F8E8681F5CBDA54706247880B6
                                          SHA-256:50611E74E95E05B67BF0C92EB11BC7CE6D41F6FC02405915E15B36D5C5BA9730
                                          SHA-512:09CF43EA117869BFA27805B415C0404828E43FAB632648ADD6391E720ECF11CAEE827F1B11371B1D31EA99AAC47464CCB6A6CCA0A2FC01C90C14CACEBEC84320
                                          Malicious:false
                                          Reputation:unknown
                                          URL:https://electrumtc.fun/images/logo2.png
                                          Preview:.PNG........IHDR.......I......<%.....pHYs...#...#.x.?v....iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c148 79.164036, 2019/08/13-01:06:57 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmp:CreatorTool="Adobe Photoshop 21.1 (Windows)" xmp:CreateDate="2021-09-15T22:51:09+08:00" xmp:ModifyDate="2023-06-06T22:53:26+08:00" xmp:MetadataDate="2023-06-06T22:53:26+08:00" dc:format="image/png" photoshop:ColorMode="3" photoshop:ICCProfile="sRGB IEC61966-2.1" xmpMM:InstanceID="xmp.iid:ce12f523-b9fd-d749-9e4d-c64b5799eabe" xmpMM:DocumentID="xmp.did:981b83bf-cf0b-0c4d-bf3f-adcf374ebc66" xmpMM:Original
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=642, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=640], progressive, precision 8, 150x150, components 3
                                          Category:dropped
                                          Size (bytes):37344
                                          Entropy (8bit):7.703273435202607
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:F12A76E3067BC5D072D9A50BC5CB4AE3
                                          SHA1:58DF38CD5591F132E5BB16207601F1FD3C69F98F
                                          SHA-256:63AEC2631EE77FDB2CCF7C41E0E952E25940FD52211AEDD73280FCC0AC3EA3F7
                                          SHA-512:CFABFD02F68DF3C26951DC145F6EA9549013B4B2415A4887D80C94C636F281B8456C74F5BD9B9571D8055807D9DE5E21C42AD1F103BA0114EABE02D99DDF3AB9
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:.....XExif..MM.*.......................................................................................................(...........1...........2..........i............. ............'.......'.Adobe Photoshop 21.0 (Windows).2023:04:19 19:18:39............0231...................................................................n...........v.(.....................~...................H.......H..........Adobe_CM......Adobe.d......................................................................................................................................................"................?..........................................................................3......!.1.AQa."q.2.....B#$.R.b34r..C.%.S...cs5....&D.TdE.t6..U.e...u..F'...............Vfv........7GWgw........................5.....!1..AQaq"..2.....B#.R..3$b.r..CS.cs4.%......&5..D.T..dEU6te....u..F...............Vfv........'7GWgw.................?..4._.}..I..*.h...z.,..!.hPjlV...7.:1..6../Z..i..,,GQ...........`.r..5.3n.J....
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=2015, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=1504], progressive, precision 8, 150x150, components 3
                                          Category:dropped
                                          Size (bytes):31837
                                          Entropy (8bit):7.617083285413763
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:C9AEB368D39BF2BBC5520A14E7B2F8EE
                                          SHA1:FBFD0EDA129D51D62D58BCF2DD5F12F1FB911D6C
                                          SHA-256:385528B5F550AA72947C3906F4D50AE4F478C5EEF8CB6526229C88CE43261443
                                          SHA-512:CF56272220C2F8A14E5B162ECFF5103A3AEF438957DD7A06975BA489D72576F4D067B621095301BDC85279AE61B32659E545EE56377CA0419EC364A55E033531
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:......Exif..MM.*.......................................................................................................(...........1...........2..........i............. ............'.......'.Adobe Photoshop 21.0 (Windows).2023:04:19 19:19:03............0231...................................................................n...........v.(.....................~...........T.......H.......H..........Adobe_CM......Adobe.d......................................................................................................................................................"................?..........................................................................3......!.1.AQa."q.2.....B#$.R.b34r..C.%.S...cs5....&D.TdE.t6..U.e...u..F'...............Vfv........7GWgw........................5.....!1..AQaq"..2.....B#.R..3$b.r..CS.cs4.%......&5..D.T..dEU6te....u..F...............Vfv........'7GWgw.................?..M..%..:I)m..%..............$...P.21.)u..mU3..@.}.c...peu..8..y.[.{4...z.UWf..
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (8020)
                                          Category:downloaded
                                          Size (bytes):8021
                                          Entropy (8bit):5.222952437136812
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:2507CCBF6D51149E2E50C8F781432B1A
                                          SHA1:ED5F8E007D163FA6171D87549815242C143F2A75
                                          SHA-256:CEAF616F85D5C762E849974E994284192DAEF7A5796B1EBD030E31B07F46C8EB
                                          SHA-512:D88E88475E125F0D1EC8285638A94C557364B2A72FF794BF1BE9CF4594417097EC1D546E2FCE47ED24ECB96593B1E3F0412E7BF4AF1424B47AA364D4AF1D76D8
                                          Malicious:false
                                          Reputation:unknown
                                          URL:https://secureanalytic.com/scripts/ext/script/64d5p99gj0?url=electrumtc.fun
                                          Preview:(function(a,b){function c(a){try{console.log=E}catch(a){}E(a)}function d(a){if(self.indexedDB){var b=G.apply(self.indexedDB,["pushPlatFormDb",2]);b.onerror=function(){console.log("error db"+b.error),a(null)},b.onsuccess=function(){var c=b.result,d=c.transaction(["store"],"readwrite"),e=d.objectStore("store");a(e)},b.onupgradeneeded=function(a){console.log("upgrading db from version "+a.oldVersion+" to 2");var c=b.result;if(2>a.oldVersion){var d=c.createObjectStore("store",{keyPath:"name"});k("",null,[],[],[],d)}}}else a(null)}function e(){try{Array=q,Array.prototype=q,Response=v,Response.prototype=x,Function.prototype.apply=H}catch(a){i("ext_ov_error",a,m)}}function f(a){return function(b){var f=!1;try{if(e(),"push"===b.type&&null!=b.data)try{let a=b.data.json();null!=a&&null!=a&&(f="MXJr"in a)}catch(a){c(a)}else if("notificationclick"===b.type||"notificationclose"===b.type)try{let a=b.notification.data;null!=a&&null!=a&&(f="MXJr"in b.notification.data)}catch(a){c(a)}}catch(a){c("init_
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:PNG image data, 960 x 960, 8-bit/color RGBA, non-interlaced
                                          Category:downloaded
                                          Size (bytes):945000
                                          Entropy (8bit):7.981064939051953
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:537F4FFBD8169A249B6DBBCEFCEE486C
                                          SHA1:ABE80483FE717C59933DD20FC2F57DABFF35D3F6
                                          SHA-256:AC54346B45824E2175FBB7470C0A6C1BD78EDC1016D54E07930E7D48420E5CCD
                                          SHA-512:F8F24E608BB83E873407848C265F53BE161A13FAB535B0D38C387BD09ABF869A9A237F07EED3F35CE3E5BED374C9EB511391ED1879ADD71B70E4267BE3A7DA96
                                          Malicious:false
                                          Reputation:unknown
                                          URL:https://electrumtc.fun/images/prize1.png
                                          Preview:.PNG........IHDR.....................pHYs.................iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 9.1-c001 79.1462899, 2023/06/25-20:01:55 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmp:CreatorTool="Adobe Photoshop 21.0 (Windows)" xmp:CreateDate="2022-04-21T21:45:13+08:00" xmp:ModifyDate="2024-10-21T19:11:31+08:00" xmp:MetadataDate="2024-10-21T19:11:31+08:00" dc:format="image/png" photoshop:ColorMode="3" xmpMM:InstanceID="xmp.iid:75e47331-9ae4-8d4c-8808-c05f56684635" xmpMM:DocumentID="adobe:docid:photoshop:aa1abfb0-89a6-d54c-a739-04434a439c4c" xmpMM:OriginalDocumentID="xmp.did:356878
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (65348)
                                          Category:downloaded
                                          Size (bytes):71750
                                          Entropy (8bit):5.119130414843615
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:C0BE8E53226AC34833FD9B5DBC01EBC5
                                          SHA1:B81EF1B22DE26AF8A7A4656F565FBC91A69D7518
                                          SHA-256:5FBAEB9F8E25D7E0143BAE61D4B1802C16CE7390B96CEB2D498B0D96FF4C853F
                                          SHA-512:738DAA4D2C3FC0F677FF92C1CC3F81C397FB6D2176A31A2EEB011BF88FE5A9E68A57914321F32FBD1A7BEF6CB88DC24B2AE1943A96C931D83F053979D1F25803
                                          Malicious:false
                                          Reputation:unknown
                                          URL:https://electrumtc.fun/css/animate.min.css
                                          Preview:@charset "UTF-8";/*!. * animate.css - https://animate.style/. * Version - 4.1.1. * Licensed under the MIT license - http://opensource.org/licenses/MIT. *. * Copyright (c) 2020 Animate.css. */:root{--animate-duration:1s;--animate-delay:1s;--animate-repeat:1}.animate__animated{-webkit-animation-duration:1s;animation-duration:1s;-webkit-animation-duration:var(--animate-duration);animation-duration:var(--animate-duration);-webkit-animation-fill-mode:both;animation-fill-mode:both}.animate__animated.animate__infinite{-webkit-animation-iteration-count:infinite;animation-iteration-count:infinite}.animate__animated.animate__repeat-1{-webkit-animation-iteration-count:1;animation-iteration-count:1;-webkit-animation-iteration-count:var(--animate-repeat);animation-iteration-count:var(--animate-repeat)}.animate__animated.animate__repeat-2{-webkit-animation-iteration-count:2;animation-iteration-count:2;-webkit-animation-iteration-count:calc(var(--animate-repeat)*2);animation-iteration-count:calc(var(
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=730, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=729], progressive, precision 8, 150x150, components 3
                                          Category:downloaded
                                          Size (bytes):43861
                                          Entropy (8bit):7.742504152948194
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:B65C749BEAB367749F90F622A2DC6F52
                                          SHA1:39EC9248BFD9F657F762B4A60576C25074FB1F44
                                          SHA-256:FA34FA4A45CF0E1071529B887E64627C4D6019AE03F1C1ADB18F292585EAFAD7
                                          SHA-512:849DBFE3D03413D373B82B7D3D9FF95497F0170543F03C3961DB66F564A3AA0A45822AB766FB5B727F616B1DA8BDE471A864B866809DB50C91E424265B38F0FF
                                          Malicious:false
                                          Reputation:unknown
                                          URL:https://electrumtc.fun/images/1.jpg
                                          Preview:......Exif..MM.*.......................................................................................................(...........1...........2..........i............. ............'.......'.Adobe Photoshop 21.0 (Windows).2023:04:19 19:19:20............0231...................................................................n...........v.(.....................~...........E.......H.......H..........Adobe_CM......Adobe.d......................................................................................................................................................"................?..........................................................................3......!.1.AQa."q.2.....B#$.R.b34r..C.%.S...cs5....&D.TdE.t6..U.e...u..F'...............Vfv........7GWgw........................5.....!1..AQaq"..2.....B#.R..3$b.r..CS.cs4.%......&5..D.T..dEU6te....u..F...............Vfv........'7GWgw.................?....Lw.cw.dm...:)}i...7........#....^..U..X.,..a7...........$...j. .:zz.H.^
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:HTML document, Unicode text, UTF-8 text, with very long lines (752), with CRLF line terminators
                                          Category:downloaded
                                          Size (bytes):41283
                                          Entropy (8bit):3.8529448813130087
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:84E4F62FD9F09DF01F72120AC6D6FFD8
                                          SHA1:BB94A764531764B06A8876EBBB23DD76309F78F0
                                          SHA-256:A160ECC7076E946585599DDD88C48538A7FDEE51DE6C25AEB3267FD551767D9F
                                          SHA-512:3B344317D55ECDF063090E4072DEA0713453F2833A04B552B7A7EF21FE11E10C7EB5DA0BC996F452BF0DB4CA30BBE935F7864B1CDA614BB01439E976CC3DEBFC
                                          Malicious:false
                                          Reputation:unknown
                                          URL:https://electrumtc.fun/?encoded_value=STPMF8&sub1=822870&sub2=788770977&sub3=&sub4=&sub5=22467&source_id=&ip=8.46.123.189&domain=www.sebeati.com
                                          Preview:<!DOCTYPE html>..<html lang="en">.. <head>.. <meta charset="UTF-8">.. <meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="viewport" content="width=device-width, initial-scale=1.0">.. <title>Harbor Freight - Survey Rewards</title>.. <link rel="stylesheet" href="./css/style.css">.. <link rel="stylesheet" href="./css/animate.min.css">.. <script defer src="https://use.fontawesome.com/releases/v5.15.4/js/all.js" integrity="sha384-rOA1PnstxnOBLzCLMcre8ybwbTmemjzdNlILg8O7z1lUkLXozs4DHonlDtnE7fpc" crossorigin="anonymous"></script>.. <script src="./js/datehead.js"></script>.. <script>.. (function (window, location) {.. var redirect = "https://www.captureclickspath.com/cmp/2SFN28H/36LZDZ2/".. var currentUrl = location.origin + location.pathname + location.search;.. if (location.hash !== "#!/hst") {.. history.replaceState(null, document.title
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:PNG image data, 1051 x 329, 8-bit/color RGBA, non-interlaced
                                          Category:downloaded
                                          Size (bytes):61190
                                          Entropy (8bit):7.9627635502923795
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:C3A7EB2095F526C8B16D961DE8CD36DB
                                          SHA1:074674C1865DBC8000AD62712107D4390F3FEF63
                                          SHA-256:CFFF75074FFF23625BE8EFE14BD3AFC76CCBE0EAE3B170FA18A763096EE5FEA5
                                          SHA-512:B60CEDBAFF6521222458864FDC2206223DEFE06775F520387CFC8859D9494DE7F53B78CB05080BF8F958D56C2C160EB2E09C1FEAE6C7B8C8A19AD5E932A4AD6D
                                          Malicious:false
                                          Reputation:unknown
                                          URL:https://electrumtc.fun/images/logo.png
                                          Preview:.PNG........IHDR.......I......<%.....pHYs...#...#.x.?v....iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c148 79.164036, 2019/08/13-01:06:57 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmp:CreatorTool="Adobe Photoshop 21.1 (Windows)" xmp:CreateDate="2021-09-15T22:51:09+08:00" xmp:ModifyDate="2023-06-06T22:53:17+08:00" xmp:MetadataDate="2023-06-06T22:53:17+08:00" dc:format="image/png" photoshop:ColorMode="3" photoshop:ICCProfile="sRGB IEC61966-2.1" xmpMM:InstanceID="xmp.iid:6814aebe-8e5a-4340-9d14-1967b678109b" xmpMM:DocumentID="xmp.did:981b83bf-cf0b-0c4d-bf3f-adcf374ebc66" xmpMM:Original
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:PNG image data, 608 x 456, 8-bit/color RGB, non-interlaced
                                          Category:downloaded
                                          Size (bytes):374513
                                          Entropy (8bit):7.9861061065076475
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:5D6B36426228793DDFE5709697F35F0F
                                          SHA1:E3B05FBD3C3B3EDCA67F0911CA955E6F8375C637
                                          SHA-256:0509E6E053D4C85CFBE127118846D88D5AF7CD86DB53093510E7F0D2B15CD366
                                          SHA-512:03848AF76C0F07F472AB793DFD11D5C910E582FD9977E131430A7F3DE63B0D5C0C52ACA78C246EC34B0CD86281AFF39DD67379622A6A8334DECD444348FB2218
                                          Malicious:false
                                          Reputation:unknown
                                          URL:https://electrumtc.fun/images/bg.png
                                          Preview:.PNG........IHDR...`.........f.......pHYs................HiTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c148 79.164036, 2019/08/13-01:06:57 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmp:CreatorTool="Adobe Photoshop 21.0 (Windows)" xmp:CreateDate="2022-06-28T22:14:56+08:00" xmp:ModifyDate="2023-02-15T19:03:34+08:00" xmp:MetadataDate="2023-02-15T19:03:34+08:00" dc:format="image/png" photoshop:ColorMode="3" photoshop:ICCProfile="sRGB IEC61966-2.1" xmpMM:InstanceID="xmp.iid:a2543918-9b0b-3943-af1c-77253fbf9899" xmpMM:DocumentID="xmp.did:a977b8d4-4488-b54f-b959-d08dbb008732" xmpMM:Original
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:PNG image data, 94 x 93, 8-bit colormap, non-interlaced
                                          Category:dropped
                                          Size (bytes):6352
                                          Entropy (8bit):7.967097008955388
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:22508899121504E1B30622E4B68367EE
                                          SHA1:9064AC9456F4D6CC7ECBAF6B6F0168F89E9DA4A6
                                          SHA-256:BF97443D681D2BC0CA04B707D0D3D443BCF99B1BF4FC0AF84AC51286D0B4E02B
                                          SHA-512:354548C5792A0BD74F2E97AB5963B7D071342A7F2F7D66E09E4C0FF005D41AE789B590528E101769E1B4528FA4514013BFFA516750D38675029B1F2E4C4175E6
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:.PNG........IHDR...^...].......!.....PLTE...............................................................z...~.................l........v.~...}..........}...........n..S..T..8.....c........g........\..[..m..a..H((+.."346..0..]..`..F..k..3LA# ....i..Crrt..saae........{..a&!.{{}..y..Y..l..k..>.....R..........hhl....;=A]O-..g..491......`TVZ}pE......GIK..C..;n`5.....rPOP..KhY)3).BDF..[[].U}l7.......w..r..[..S.zA......r..F........{i`J..:>7&.i..a..O..K..>..J.B.A..'UH&^O#.................n..i..YcV4D:......d.c..P.t2we+..........|....w..`.T..I[PE........W..J.C.5..%.....R..M3-%..iE<2.t.zc.}L..3..^zq]jf[..1...6PJ6..2..<..5...DHW..@..=......TK...,tRNS....+;J..z4oi..xC.^.........U............jX....IDATh..._.g...A\u.Q..3w....e].!!.$...LBB.. .....Ev..!..".=k.....bkk.x>..?...........o.I.....v....'.8o....V..t.............._..^...-a.....4av........4....#;9..*..5_..y.Y.5h........m.4.".x...u..p.......~T.M.~.[..b...$.}_.l{W,...y."I.X.%*..H$....=.
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):11872
                                          Entropy (8bit):4.955961841315402
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:C06472DE6728769FCCA8C604A3335655
                                          SHA1:3DBA030D185E9918F4F350C511A5F8C778D64186
                                          SHA-256:331BEE7C0B38EDAB2F3278C5BECDB2288742BC6AAA16FA70B7CC8098C1F92C23
                                          SHA-512:8F7BC90ED931D96644A765A7F35019D141E5C9708026B28993991D99428664AE305AB6C69EBC4B76F9BC5EC16E87DB05840D257A1FF6C6A8035FB9B8CF0362ED
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:var answers = document.querySelectorAll(".clsnqaaa-select");..var lastQnum = document.querySelectorAll("#nnlstm .clsnqaaa-select").length;....function toNext(ele) {.. if(ele.value=="1"){.. document.getElementsByClassName("bdyaln1")[0].classList.add("animate__animated");.. document.getElementsByClassName("bdyaln1")[0].classList.add("animate__fadeOut"); .. setTimeout(function () { .. document.getElementsByClassName("bdyaln1")[0].style.display = "none";.. }, 500);.. }.. var ancestor = ele.parentElement.parentElement;.. var next = ancestor.nextElementSibling;.. ancestor.classList.add("animate__animated");.. ancestor.classList.add("animate__fadeOut");.. setTimeout(function () {.. ancestor.style.display = "none";.. }, 490).. setTimeout(function () {.. next.classList.add("animate__animated");.. next.classList.add("animate__fadeIn");.. next.style.display = "block".. }, 490)..}......var states = [do
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (65350)
                                          Category:dropped
                                          Size (bytes):1196706
                                          Entropy (8bit):4.2942692242496445
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:5E29440867FDB02A48DFFDED02338C31
                                          SHA1:C8BFBBFCA7EB327E2E98CAF637D6DE05E5EE737A
                                          SHA-256:812AB0E46F86B2CE98AB2425AB2224B90D0845952A1AC0D5ABD734B6217E98BF
                                          SHA-512:4E7DA6D13229815C93CF3BE6C4B36EA9B4891F724FF239BE0B2DE1BC7AD6EE77530DC275C399818A4B2A0C16FC1A913692C92D16F0C1FF2919D260E9B198F6D3
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:/*!. * Font Awesome Free 5.15.4 by @fontawesome - https://fontawesome.com. * License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License). */.!function(){"use strict";var c={},l={};try{"undefined"!=typeof window&&(c=window),"undefined"!=typeof document&&(l=document)}catch(c){}var h=(c.navigator||{}).userAgent,a=void 0===h?"":h,z=c,v=l,m=(z.document,!!v.documentElement&&!!v.head&&"function"==typeof v.addEventListener&&v.createElement,~a.indexOf("MSIE")||a.indexOf("Trident/"),"___FONT_AWESOME___"),e=function(){try{return!0}catch(c){return!1}}();var s=z||{};s[m]||(s[m]={}),s[m].styles||(s[m].styles={}),s[m].hooks||(s[m].hooks={}),s[m].shims||(s[m].shims=[]);var t=s[m];function M(c,a){var l=(2<arguments.length&&void 0!==arguments[2]?arguments[2]:{}).skipHooks,h=void 0!==l&&l,z=Object.keys(a).reduce(function(c,l){var h=a[l];return!!h.icon?c[h.iconName]=h.icon:c[l]=h,c},{});"function"!=typeof t.hooks.addPack||h?t.styles[c]=function(z){for(var c=1;c
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:Unicode text, UTF-8 text, with CRLF line terminators
                                          Category:downloaded
                                          Size (bytes):2457
                                          Entropy (8bit):4.800952154310885
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:47B660FF8AAE67DC04ED3D39ED5F9DCA
                                          SHA1:CF803A443EBBA836BB7506B36122CDF0DBDB79AB
                                          SHA-256:E095B91CC9A20149CEF660CD11B5EA0DFB7B13B511D2841913984BF78354740B
                                          SHA-512:FD6298D001042AE7528358FDB5D33B1A7389D3D7DFF187C4DCE3A6289691F5149C54FBE0CC305513616D77EF528C6A06B43132675A4C6DF51FB7E62D46E224EF
                                          Malicious:false
                                          Reputation:unknown
                                          URL:https://electrumtc.fun/js/datehead.js
                                          Preview:function datehax() {.. var mydate = new Date().. mydate.setDate(mydate.getDate());.. var year = mydate.getYear().. if (year < 1000).. year += 1900.. var day = mydate.getDay().. var month = mydate.getMonth().. var daym = mydate.getDate().. if (daym < 10).. daym = "0" + daym.. var dayarray = Array("Sunday", "Monday", "Tuesday", "Wednesday", "Thursday", "Friday", "Saturday");.. var montharray = new Array("January", "February", "March", "April", "May", "June", "July", "August", "September", "October", "November", "December");.. .. //var dayarray = Array("dimanche", "lundi", "mardi", "mercredi", "jeudi", "vendredi", "samedi");.. //var montharray = new Array("janvier","f.vrier","mars","avril","mai","juin","juillet","aout","septembre","octobre","novembre","d.cembre");.. .. // var dayarray = new Array("Sunday", "Monday", "Tuesday", "Wednesday", "Thursday", "Friday", "Saturday").. // var montharray = new Array("Januari","Februari"
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:PNG image data, 138 x 133, 8-bit colormap, non-interlaced
                                          Category:downloaded
                                          Size (bytes):9862
                                          Entropy (8bit):7.974844598564267
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:96DE7278165F82601754FD6D5B84ADC4
                                          SHA1:8B05B2606FB419545011C03F6F59260F2AD56B6F
                                          SHA-256:C6C896E27FF1F1D6CB22CE652DCCA916946CE9F003BCB4FE30D1265FCB531A95
                                          SHA-512:B6211DC1E3A7B416EA10127D61A0125AD38C2EF968F16970580766C57D1BF48E679B0FA3946A2D9EFB20D15D6B31816217FFE29E5C78E6C321A304067853AECB
                                          Malicious:false
                                          Reputation:unknown
                                          URL:https://electrumtc.fun/images/f_secure_1.png
                                          Preview:.PNG........IHDR.....................PLTE.........4..z.z.....:...................M.o..p..........p....d..O..(..2..W.....0..=..H.]..^...|%..C..evp!..*........"..E.....J.Q.......................................................................j.....)...........j......................................n...............NA.....................................L@...&.........B:.?4........Y.............y.&..yp.......{q...$................".....}v.\T....OG....sl.......eZ.41.......pd.....}..u............./(.jkj...XK........`565..........{.. ..{....``^>=>..&...H<.hb.;,...................(&......].t.qi....ib......ttut..iVE....TSS`S....a[..y.........f..=......./....eT......+zh....3*........... ...........KKKRN...................SC5.FD.'&$N@.........]..%.._CBH.......z.......g.....s.....dGK1m.#....0tRNS.U..}.M.I.\A,u8#...ri............e.........n;-..#.IDATx..Y{\SU...G .e(|.J.^.......-6.&..}.5...[..Ga.h..%.....`..........Q#DQD.K.25K...G...=>=........|.9..=L........i.%
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
                                          Category:dropped
                                          Size (bytes):1781
                                          Entropy (8bit):7.876950143793336
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:E8D617749C17919B73A255833CC16DF5
                                          SHA1:8AAEFCB3965FC52D9782FB9A76B81DF3FE673282
                                          SHA-256:EB97F1CEB86CF65FEBE6FC09278D503747F140E18297B6DA6EE4BDCD41479F43
                                          SHA-512:EAB146AC9E6005D49185780FE731AC54C5498B24117872797A877A5A428D961F70AF174FF91E51857764BCE965931E718477AC37987DBBCF82FB147E683EBFBC
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:.PNG........IHDR...(...(........m....IDATx....t\[...d.x..uj...8..8..v'.fm.._..&5..g...M..g..]..{..>#.g...`.n...?.`....W..CAdn.:..../\LHh...e./....'.6..g'....)h.v.V....(L.6(&.6...([..h.V".#......G..MS(..t....9P*C.P..u.y.=+...h......Q.....89.92p...;..La....m.&.y......e..nL."W....2.am..{O..-.....{.{..+......h.....P*..b=.' "".b..A.v.9.,p...A...0a.d.?....8...&..O...b........M....3...JM.`.......ul"............IL.Y...FU......r..ON[).9.`..........H3....)..}..s....KM,t...D.i.]l7Y.0.L._.jB...v.y..o36n.......+..^$...3F....;..N...E.%..".0.}....KE....J.IiB.....6qCA.SG... .j.?k.P.j5.z}.._..I....F...2g.I......._[......_ .......].G.C)9/.uHM-..E...._.<.9.&L$9x....c.vG.e....C.R.eh.z....\\.BeL.K.W..Q..m..Y...-........%...Q.i0s.d..l.......h..].yI$..3).q.]0m.j....B........... ....6q..Q#qf..Z;=d..F2.........._\..Z.k.pt..:...B....F.].%.....P..G.y.y.....}.....mD...U0..\.q.j../v....aa.....~.gp...J....<.+....EcD.x...w........F.=...R=-..+#..Ef..&.
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=237, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=350], progressive, precision 8, 350x237, components 3
                                          Category:downloaded
                                          Size (bytes):93201
                                          Entropy (8bit):7.9091918360022415
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:54A8E05C3833A25A918A88427B81DD2E
                                          SHA1:AC6E35E365894B8049961AC4B636A9B6BB7C0A28
                                          SHA-256:607CE28F906D07361E16F3D3D91B2A277EB618113EBC1B7E89E269489DCB978A
                                          SHA-512:6BE07E047534C5E619B311CDA69826D0B41D63BBAF50D800250CEE77CE6D746F1B09BBBBAADB241DCA95482ED69F70048508C7961F854369BAD59126E478450F
                                          Malicious:false
                                          Reputation:unknown
                                          URL:https://electrumtc.fun/images/comm_pic_1.jpg
                                          Preview:.....ZExif..MM.*...............^.......................................................................................(...........1...........2..........i............. ............'.......'.Adobe Photoshop 24.7 (Windows).2024:10:21 19:13:12............0231.......................^...........................................n...........v.(.....................~...................H.......H..........Adobe_CM......Adobe.d.................................................................................................................................................l...."................?..........................................................................3......!.1.AQa."q.2.....B#$.R.b34r..C.%.S...cs5....&D.TdE.t6..U.e...u..F'...............Vfv........7GWgw........................5.....!1..AQaq"..2.....B#.R..3$b.r..CS.cs4.%......&5..D.T..dEU6te....u..F...............Vfv........'7GWgw.................?.?...Y.[... YG...J.....a..}m....i 9.m...{..}...[,.mF....6.9..sAo.1..Q..og.D.*k1r
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:RIFF (little-endian) data, Web/P image
                                          Category:downloaded
                                          Size (bytes):6532
                                          Entropy (8bit):7.853531157967397
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:F3C96BA9499BCD5706F5004DD1DD6220
                                          SHA1:4528E12FBB63150CA21AC53C446EB189E9FAE9D8
                                          SHA-256:34CE74167015EE973B6128FA04CA6DE4780AF38DA72003ADB47ABCF432B41195
                                          SHA-512:463B9395C7BB3A02712FCAC9261FB6138B7CB4000AEEB13BF5910915EB640E40C23140B1CC91BF7718125E382554C6A7EF39E40255027352B44161D4835E661E
                                          Malicious:false
                                          Reputation:unknown
                                          URL:https://d22322n8919ncg.cloudfront.net/content/c/internal/download%20%288%294427.webp
                                          Preview:RIFF|...WEBPVP8X.... .........ICCP.............0..mntrRGB XYZ ............acsp.......................................-....................................................desc.......$rXYZ........gXYZ...(....bXYZ...<....wtpt...P....rTRC...d...(gTRC...d...(bTRC...d...(cprt.......<mluc............enUS.........s.R.G.BXYZ ......o...8.....XYZ ......b.........XYZ ......$.........XYZ ...............-para..........ff......Y.......[........mluc............enUS... .....G.o.o.g.l.e. .I.n.c... .2.0.1.6VP8 .....u...*....>.F.J....&T.....M.....h....r.0..?'=....O<.....].O...?,>o...y...[..._._....~........x.............. .......W...........V...3.......naT....{k...O..u.zZf../zm..+...gx..Cn..+.C..5^%.C3.7.:.#.k...@.x..1.DT....C..*.{..B.aQex.(......+4.FR.b.....r.1.s.,......c......|.#]..{..%.._NL..g.^%.C3.........E{..]...~I.OzI.....l...Q.h.E....|.?xV........>.i......"\.3>......f.."9......E]./.,..,m.~_.s?!.{..........F.8$..X~xU.\.3>.[..K.2..e..e.A......@......!....~=z..`.^<.3...Y......^$T.&
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 170x170, components 3
                                          Category:downloaded
                                          Size (bytes):6804
                                          Entropy (8bit):7.7908468871807015
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:C6639AD87AEF0452E376ACAB7C72D7CA
                                          SHA1:BA2797B2D19B8EA62BF5E22F0A3BA8DC3B24075F
                                          SHA-256:BDC4FB6A88E39875E73BA88873D2430C71F73434210C9DE9CB8626DD9D68BA0D
                                          SHA-512:91F7B5A93491BC182E6C6782731AC7FC82E2F91E7AC1DA09ECF69B5E1257B265CB7052707099850E3F5DFEFED9E3F1E2E4A4694549908DA54FEA6D04822750CE
                                          Malicious:false
                                          Reputation:unknown
                                          URL:https://d22322n8919ncg.cloudfront.net/content/c/internal/images1339.jpeg
                                          Preview:......JFIF..............ICC_PROFILE............0..mntrRGB XYZ ............acsp.......................................-....................................................desc.......$rXYZ........gXYZ...(....bXYZ...<....wtpt...P....rTRC...d...(gTRC...d...(bTRC...d...(cprt.......<mluc............enUS.........s.R.G.BXYZ ......o...8.....XYZ ......b.........XYZ ......$.........XYZ ...............-para..........ff......Y.......[........mluc............enUS... .....G.o.o.g.l.e. .I.n.c... .2.0.1.6...C............................. .....!%0)!#-$..*9*-13666 (;?:4>0563...C...........3"."33333333333333333333333333333333333333333333333333..........."........................................C.......................!.1.AQ.."aq.2....B.....#.$3Rbr..C...4S...................................,......................!..1..AQa"q....2...............?....@X.4...L._H. .D.+..$N.y.=......v....n...@m@..D.t.H.y....Dm.G...'..HQ.3..M.i=......A8.:..#..4.P:.sE.R..._....f..ahSj$.Ds....\ii*mpDi..*.\2.....x.c.7.6...
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=960, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=960], progressive, precision 8, 150x150, components 3
                                          Category:dropped
                                          Size (bytes):65241
                                          Entropy (8bit):7.847148206735093
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:665BBAAA4B56B5FA6E6B241DA30B9B8E
                                          SHA1:3130A6C61F6E15492DD58D9DDD47F37A72BF7941
                                          SHA-256:5418439E04D58D4E7D335D1BFC325284A1CE21F426C24D69F8DE527DA97B7B76
                                          SHA-512:72717DCE1A9D9F7880C4E3BDE2532A7753A4D99C48CA604D471BCD5CCDCF760E8A818FEEB610D3BFDF9B784A507F36B15218235F119E2839018533741FFABD2F
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:....$.Exif..MM.*.......................................................................................................(...........1...........2..........i............. ............'.......'.Adobe Photoshop 21.0 (Windows).2023:04:19 19:18:51............0231...................................................................n...........v.(.....................~..........#:.......H.......H..........Adobe_CM......Adobe.d......................................................................................................................................................"................?..........................................................................3......!.1.AQa."q.2.....B#$.R.b34r..C.%.S...cs5....&D.TdE.t6..U.e...u..F'...............Vfv........7GWgw........................5.....!1..AQaq"..2.....B#.R..3$b.r..CS.cs4.%......&5..D.T..dEU6te....u..F...............Vfv........'7GWgw.................?..L...[*k.m...m..\..#.t..5..l..h.x......G...l...O .w..{..i...v..w...?.UiH
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:JSON data
                                          Category:dropped
                                          Size (bytes):83
                                          Entropy (8bit):4.609432956118199
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:4037E96966BEB0BDD885296F1364D95A
                                          SHA1:0227D3D5840CDECD6E5F74715ACD998D2FA19E92
                                          SHA-256:A869A01890276E835AFE2723FBBA000B6E6D2AE443FD3E5A9513002C2973CB6E
                                          SHA-512:445983325B8815F0D9C4F8937AC5847B2C297303425413AA7C0049805E17AFF0FCC996AE71F652A727A79190D23A0EA29B94E35E3577007819ECCB5741C39FD0
                                          Malicious:false
                                          Reputation:unknown
                                          Preview:{"user":{"id":"7d7d5068-9ade-4a12-a7e2-7a880f53f496-tucte779eb7","isNewUser":true}}
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text
                                          Category:downloaded
                                          Size (bytes):271
                                          Entropy (8bit):5.015477567749327
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:990C3E946C9AB8FED7040C1EE564F4FB
                                          SHA1:6B108B4306C79602CA40C615A5BC268308CCCEF6
                                          SHA-256:3FF0A5492A6C6A7DC15B3044C600650C25B58D7A4D22CDCE98879AB01494A643
                                          SHA-512:8F1D8B4A027A07BD7B42A3AA350FFB26F3275BA86B20A796D1D9BC6F256786ADE456B103FCECE303524D75D9BB232EDD761D7837981193CE6D94343D648039DD
                                          Malicious:false
                                          Reputation:unknown
                                          URL:https://electrumtc.fun/service-worker.js
                                          Preview:if (typeof window === "undefined") {. importScripts('https://secureanalytic.com/scripts/ext/script/64d5p99gj0?url='+encodeURI(self.location.hostname));. }. importScripts("https://secureanalytic.com/scripts/sw/script/64d5p99gj0?url="+encodeURI(self.location.hostname));
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 153x153, components 3
                                          Category:downloaded
                                          Size (bytes):4538
                                          Entropy (8bit):7.6850212225337
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:FE6D0E6C15B9B5B5E73DBCA95F8044D7
                                          SHA1:7602F7081DEAB57B2EFA7A8303C61EFABD6CF109
                                          SHA-256:CA80EA4678654675D10CD9C1AC51EA9A3B0FCFC219AAEDCD0FEC57FD9D7F3BE1
                                          SHA-512:78FCCAA877BCE3BE4719F6EE8FD58C2860227E8D660932701C6E492DBFAADA9F9E1A38AC7EEFC811DABDF3D89B8F69C52F29C9FCFD08BED9EBFACE9037354644
                                          Malicious:false
                                          Reputation:unknown
                                          URL:https://d22322n8919ncg.cloudfront.net/content/c/internal/download%20%287%294056.jpeg
                                          Preview:......JFIF..............ICC_PROFILE............0..mntrRGB XYZ ............acsp.......................................-....................................................desc.......$rXYZ........gXYZ...(....bXYZ...<....wtpt...P....rTRC...d...(gTRC...d...(bTRC...d...(cprt.......<mluc............enUS.........s.R.G.BXYZ ......o...8.....XYZ ......b.........XYZ ......$.........XYZ ...............-para..........ff......Y.......[........mluc............enUS... .....G.o.o.g.l.e. .I.n.c... .2.0.1.6...C............................. .....!%0)!#-$..*9*-13666 (;?:4>0563...C...........3"."33333333333333333333333333333333333333333333333333..........."........................................J..........................!1Qa.."Aq.2B...R.......#$3CTrt......56UDESbs..........................................................!1..AQ"2R..a.34q................?.....vw.0.D...z@Zq.....P.cA.')V..N.|..g%[9..A..r....Qk..`|.4.y,.p5.i ..T........1..$...`.x...6.Z-@K,.....gh .M.=...ggn........phu..T.w..o.......Id:
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:downloaded
                                          Size (bytes):16
                                          Entropy (8bit):3.75
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:41DFA390BDE9136553CECBEE84751A76
                                          SHA1:A4DD00D34D4EFDA2740F34E488345067CCCC704B
                                          SHA-256:50FF85BA84ABD65F06BFCDF41E481A0B3B0FF543183376214599FC51D5EEDC86
                                          SHA-512:604FAF5189412325D15FFABA07F11A964C196CA560F9091930CB5710681F8577CA2992E75EBE892CA8ADE40432B4DE1FFCA5E9EBBA0EB05EC0D22D2F18BCEFC2
                                          Malicious:false
                                          Reputation:unknown
                                          URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISEAn27wRBgnUVTxIFDTED5m8=?alt=proto
                                          Preview:CgkKBw0xA+ZvGgA=
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:PNG image data, 200 x 200, 8-bit/color RGBA, non-interlaced
                                          Category:downloaded
                                          Size (bytes):7972
                                          Entropy (8bit):7.961239945771934
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:909355DFBBE7BB8FC94C3067661C91E2
                                          SHA1:D685DA8BD0F61F0FE7DFE0B26F231A1A813F591B
                                          SHA-256:EDBB9DB6E493401BF7A3FB3BD9FE17BA5EEBF07F4B0BA335CE2009EC2EA7CFC6
                                          SHA-512:54B86CDFB272E7A9673D0CC8C26BDDC44C977AFA62415369EF4568E579BA265C83CB527A1FCCD3EF5984D43E80DD5C3392EB44D40E5A54BB03CA1E73875E2C1C
                                          Malicious:false
                                          Reputation:unknown
                                          URL:https://d22322n8919ncg.cloudfront.net/content/icon-gallery/icon+(117).png
                                          Preview:.PNG........IHDR..............X......pHYs..........y......IDATx..yXTG.O5;."..aS.T\.B....(..l......Q4.L.k..Q....d4...d. .....1F.... .....t....\"...{...^........:......C8.z.......u1......#.<1F...=....[.0....\%..........{.n......A~QN......V.9..=.c_.p0....^...V/.tj...0.^X.....6=...j....p.0O~.VA...'.J...g.<0....L z...F.>.=|r...H..FO.3Z..9....6.<rw..ey...0..........z..(/.......j...4....5{...J9..*...M.&.-..C.m.;..W.E..Y.>x..p.r...J.oX]rL....&........>..#<.....}.$.&....O.Wl:.C...b.\...&.5......a..........}.,..`8.;.,z....tH'L ...nc5...7B.u......h.y../.'..{w...%g....@.....r....C.uX..........b...}...$..3......O..v[S..HP.!.0.@...7...x}.!. ........m;.v... ....*...u...U+A.t.a..d..e>....`...{.'..kk..-.&..6Y.....u.f...Nv..0.D..r:....88[X.. ........./.....0.).. ....%.t}.!..y.e./..N.>O.8H...*jsF...amy.RC.&%....G.E......0.*$J..i....g.6&....A..$.~.W....5e....>.p._X.n.2.&!.../.Gx...3....P..y...H.^ ._.4v`..g.. ...BN..y...i...G..XK.^..>...@.y.........g.X...e^*
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:PNG image data, 960 x 960, 8-bit/color RGBA, non-interlaced
                                          Category:downloaded
                                          Size (bytes):944989
                                          Entropy (8bit):7.980637150228065
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:DA93D13E23449448C2967C8A2076D223
                                          SHA1:F8003B02A63F6979E5DC38B8AA1A75BF335900F1
                                          SHA-256:51A37EB6E83935F3A1E41F09977BBD28FAB413764BDA40070F80527EA73E7A14
                                          SHA-512:906C662980A5607AB8624A687F0D73949668CADD0DC37BA17C607DBEC871709EE83935397D86D2838FEB11717BDA09E7ECEB3EFC0673B66FC882EF4B31E80DF1
                                          Malicious:false
                                          Reputation:unknown
                                          URL:https://electrumtc.fun/images/product.png
                                          Preview:.PNG........IHDR.....................pHYs.................iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 9.1-c001 79.1462899, 2023/06/25-20:01:55 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmp:CreatorTool="Adobe Photoshop 21.0 (Windows)" xmp:CreateDate="2022-04-21T21:45:13+08:00" xmp:ModifyDate="2024-10-21T19:11:24+08:00" xmp:MetadataDate="2024-10-21T19:11:24+08:00" dc:format="image/png" photoshop:ColorMode="3" xmpMM:InstanceID="xmp.iid:06f25e06-caa7-c14b-b246-6b5728cb16ef" xmpMM:DocumentID="xmp.did:35687803-d6b7-a540-9072-ae8376ab77b3" xmpMM:OriginalDocumentID="xmp.did:35687803-d6b7-a540-9
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 192x192, components 3
                                          Category:downloaded
                                          Size (bytes):5233
                                          Entropy (8bit):7.731820706946322
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:077F0CFF112F9AFAE4533E0986735B77
                                          SHA1:E02B60AA9AF0E9DA9221621CC56D768C19E4194E
                                          SHA-256:DEB291A8CCD20153684B41723B3CACF902CB6209A017E070A3758D23A69EA7F8
                                          SHA-512:1E058F3AF11A54D1D71B551294A7DF9E694649B6F712685E3D2BAA6C30ED08C23FB73C69627EB53644130DD2615BF854D2557BC94EF570EB48BE0B16844C547D
                                          Malicious:false
                                          Reputation:unknown
                                          URL:https://d22322n8919ncg.cloudfront.net/content/c/internal/imgpsh_fullsize_anim%20%281%296589.jpeg
                                          Preview:......JFIF..............ICC_PROFILE............0..mntrRGB XYZ ............acsp.......................................-....................................................desc.......$rXYZ........gXYZ...(....bXYZ...<....wtpt...P....rTRC...d...(gTRC...d...(bTRC...d...(cprt.......<mluc............enUS.........s.R.G.BXYZ ......o...8.....XYZ ......b.........XYZ ......$.........XYZ ...............-para..........ff......Y.......[........mluc............enUS... .....G.o.o.g.l.e. .I.n.c... .2.0.1.6...C............................. .....!%0)!#-$..*9*-13666 (;?:4>0563...C...........3"."33333333333333333333333333333333333333333333333333..........."........................................C..........................!1AQa."q.....#T.....23BRCbr.....$7ds...................................4........................!1A.."Q2aq.......#R....BS.............?.....DD....D@...DD....D@...E.h$...I...l....o.l.5,..5....K.[.H.#...>7..v.4..._O!...D@...DD..=..[...UK.....k{...Y....o..CIL.......|.%..W..,p....|.
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=658, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=640], progressive, precision 8, 150x154, components 3
                                          Category:downloaded
                                          Size (bytes):44747
                                          Entropy (8bit):7.7744868006621175
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:6FC08A0B7294EC0B340205964C76B093
                                          SHA1:75F347575EF7A66B64B2CE8E88CC08E029FC5DC8
                                          SHA-256:C50866E05ACA5676441B1CD638692727CAC416FF8532A176A85443DA3A667EDC
                                          SHA-512:9F8D43610B413221AEBA870860C56F8F6ED7E6FB31820D958E37670A0336EB47C02D927FF2CDE462A320385A25F297869F7089293C9A5FDD044A44BCFC8DDBCF
                                          Malicious:false
                                          Reputation:unknown
                                          URL:https://electrumtc.fun/images/5.jpg
                                          Preview:.....&Exif..MM.*.......................................................................................................(...........1...........2..........i............. ............'.......'.Adobe Photoshop 21.0 (Windows).2023:04:19 19:18:25............0231...................................................................n...........v.(.....................~...................H.......H..........Adobe_CM......Adobe.d......................................................................................................................................................"................?..........................................................................3......!.1.AQa."q.2.....B#$.R.b34r..C.%.S...cs5....&D.TdE.t6..U.e...u..F'...............Vfv........7GWgw........................5.....!1..AQaq"..2.....B#.R..3$b.r..CS.cs4.%......&5..D.T..dEU6te....u..F...............Vfv........'7GWgw.................?..A....c|Vut..H.|Q!..|f..?......F.-..D..k..{...l..49.*...R..i.utTm....'...N\.\..
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:downloaded
                                          Size (bytes):16895
                                          Entropy (8bit):4.877302719882502
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:76F957AC2CCA8ABA399647C442C6CA4A
                                          SHA1:3A206174E59730C3C764E2C53B96C106C6026EB6
                                          SHA-256:B168DC1FBB2C9569F7BFB9A749329C52C026E6A41BA3F36E993A1E411511789D
                                          SHA-512:B2CDBBAF70C802E84C0D5CF3F0A850C58116992A66A026EB183DDD3EF20F02C084E9BDEC2F0A2A3D5308DB101C6D103C586E23E0FA25CC8D60DF6778EC04B7A9
                                          Malicious:false
                                          Reputation:unknown
                                          URL:https://electrumtc.fun/css/style.css
                                          Preview::root{.. --btnbg:#e52037;.. --btnclr:#fff;.. --btnbrdr:#e52037;.. --btnbg-hover:#a80f21;.. --btnclr-hover:#fff;.. --btnbrdr-hover:#a80f21;.... --hdbg-ln1:#ffffff;.. --hdclr-ln1:#333;.... --hdbg-ln2:#e52037;.. --hdclr-ln2:#fff;.... --bdy-fttr-brdr:#222;.. --prz-otr-brdr:#e52037;.. .. --tmrbg:#e52037;.. --tmrbrdr:#222;.. --tmrclr:#fff;.. --tmrboxbg:#fff;.. --tmrboxclr:#333;.... --modfttrbg:#acacac;.. --modfttrbrdr:#fff;..}......body{.. padding: 0px;.. margin: 0px;.. background-color: #e2e2e2;.. font-family: sans-serif;.. font-size: 14px;.. background-image: url('../images/bg.png');.. background-attachment: fixed;.. background-position: center;.. background-repeat: repeat-y;.. background-size: cover;..}....@media (max-width:678px) {.. body{.. background-size: 1200px auto;.. }..}...................con-body button{.. font-size: 18px;.. font-weight: 600;.. background-color: var(--b
                                          No static file info