Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://www.flamingoblv.com/bdAHAKrXFqXFQCYuPG6x8vSTVrU9FI7svGtQIOtbZGb5Zz82nKKGDoG-o7UnwphbBQK1zePMgTPfELKVecsIqQ~~

Overview

General Information

Sample URL:https://www.flamingoblv.com/bdAHAKrXFqXFQCYuPG6x8vSTVrU9FI7svGtQIOtbZGb5Zz82nKKGDoG-o7UnwphbBQK1zePMgTPfELKVecsIqQ~~
Analysis ID:1585749

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
AI detected suspicious Javascript
AI detected suspicious URL
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 1276 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 6244 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 --field-trial-handle=1928,i,2991646618636845392,2963512715657602525,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 6292 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.flamingoblv.com/bdAHAKrXFqXFQCYuPG6x8vSTVrU9FI7svGtQIOtbZGb5Zz82nKKGDoG-o7UnwphbBQK1zePMgTPfELKVecsIqQ~~" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No yara matches
No Sigma rule has matched
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2025-01-08T07:25:11.609519+010020127862Potentially Bad Traffic192.168.2.16498601.1.1.153UDP
2025-01-08T07:25:11.609519+010020127862Potentially Bad Traffic192.168.2.16498601.1.1.153UDP
2025-01-08T07:25:11.609519+010020127862Potentially Bad Traffic192.168.2.16498601.1.1.153UDP
2025-01-08T07:25:11.609674+010020127862Potentially Bad Traffic192.168.2.16525611.1.1.153UDP
2025-01-08T07:25:11.609674+010020127862Potentially Bad Traffic192.168.2.16525611.1.1.153UDP
2025-01-08T07:25:11.609674+010020127862Potentially Bad Traffic192.168.2.16525611.1.1.153UDP
2025-01-08T07:25:12.838199+010020127862Potentially Bad Traffic192.168.2.16602371.1.1.153UDP
2025-01-08T07:25:12.838199+010020127862Potentially Bad Traffic192.168.2.16602371.1.1.153UDP
2025-01-08T07:25:12.838199+010020127862Potentially Bad Traffic192.168.2.16602371.1.1.153UDP
2025-01-08T07:25:12.838411+010020127862Potentially Bad Traffic192.168.2.16588091.1.1.153UDP
2025-01-08T07:25:12.838411+010020127862Potentially Bad Traffic192.168.2.16588091.1.1.153UDP
2025-01-08T07:25:12.838411+010020127862Potentially Bad Traffic192.168.2.16588091.1.1.153UDP
2025-01-08T07:25:16.065595+010020127862Potentially Bad Traffic192.168.2.16544061.1.1.153UDP
2025-01-08T07:25:16.065595+010020127862Potentially Bad Traffic192.168.2.16544061.1.1.153UDP
2025-01-08T07:25:16.065595+010020127862Potentially Bad Traffic192.168.2.16544061.1.1.153UDP
2025-01-08T07:25:16.065795+010020127862Potentially Bad Traffic192.168.2.16572041.1.1.153UDP
2025-01-08T07:25:16.065795+010020127862Potentially Bad Traffic192.168.2.16572041.1.1.153UDP
2025-01-08T07:25:16.065795+010020127862Potentially Bad Traffic192.168.2.16572041.1.1.153UDP
2025-01-08T07:25:18.241584+010020127862Potentially Bad Traffic192.168.2.16642141.1.1.153UDP
2025-01-08T07:25:18.241584+010020127862Potentially Bad Traffic192.168.2.16642141.1.1.153UDP
2025-01-08T07:25:18.241584+010020127862Potentially Bad Traffic192.168.2.16642141.1.1.153UDP
2025-01-08T07:25:18.241748+010020127862Potentially Bad Traffic192.168.2.16539641.1.1.153UDP
2025-01-08T07:25:18.241748+010020127862Potentially Bad Traffic192.168.2.16539641.1.1.153UDP
2025-01-08T07:25:18.241748+010020127862Potentially Bad Traffic192.168.2.16539641.1.1.153UDP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: https://www.flamingoblv.com/bdAHAKrXFqXFQCYuPG6x8vSTVrU9FI7svGtQIOtbZGb5Zz82nKKGDoG-o7UnwphbBQK1zePMgTPfELKVecsIqQ~~Avira URL Cloud: detection malicious, Label: malware

Phishing

barindex
Source: 0.3.id.script.csvJoe Sandbox AI: Detected suspicious JavaScript with source url: https://electrumtc.fun/?encoded_value=STPMF8&sub1=... The use of `document.write()` to execute a dynamic function call (`datenhay()`) is a high-risk indicator, as it can enable remote code execution. This behavior is considered a security vulnerability and should be investigated further.
Source: 0.2.id.script.csvJoe Sandbox AI: Detected suspicious JavaScript with source url: https://electrumtc.fun/?encoded_value=STPMF8&sub1=... The use of `document.write()` to execute a function called `datenhax()` is a high-risk indicator, as it allows for dynamic code execution. This behavior is often associated with malicious scripts that can inject and execute arbitrary code on the page, posing a significant security risk.
Source: 0.0.id.script.csvJoe Sandbox AI: Detected suspicious JavaScript with source url: https://electrumtc.fun/?encoded_value=STPMF8&sub1=... This script demonstrates high-risk behavior by redirecting the user to an untrusted domain ('https://www.captureclickspath.com/cmp/2SFN28H/36LZDZ2/') without user consent. The use of `history.replaceState()` and `history.pushState()` to manipulate the browser's history and the `setTimeout()` function to trigger the redirect after a short delay are concerning. This script is likely attempting to perform a malicious redirect, which poses a significant risk to the user's security and privacy.
Source: URLJoe Sandbox AI: AI detected Brand spoofing attempt in URL: https://electrumtc.fun
Source: URLJoe Sandbox AI: AI detected Typosquatting in URL: https://electrumtc.fun
Source: https://electrumtc.fun/?encoded_value=STPMF8&sub1=822870&sub2=788771358&sub3=&sub4=&sub5=22467&source_id=&ip=8.46.123.189&domain=www.sebeati.comHTTP Parser: No favicon
Source: https://electrumtc.fun/?encoded_value=STPMF8&sub1=822870&sub2=788771358&sub3=&sub4=&sub5=22467&source_id=&ip=8.46.123.189&domain=www.sebeati.comHTTP Parser: No favicon
Source: https://electrumtc.fun/?encoded_value=STPMF8&sub1=822870&sub2=788771358&sub3=&sub4=&sub5=22467&source_id=&ip=8.46.123.189&domain=www.sebeati.comHTTP Parser: No favicon
Source: https://electrumtc.fun/?encoded_value=STPMF8&sub1=822870&sub2=788771358&sub3=&sub4=&sub5=22467&source_id=&ip=8.46.123.189&domain=www.sebeati.comHTTP Parser: No favicon
Source: https://electrumtc.fun/?encoded_value=STPMF8&sub1=822870&sub2=788771358&sub3=&sub4=&sub5=22467&source_id=&ip=8.46.123.189&domain=www.sebeati.comHTTP Parser: No favicon
Source: unknownHTTPS traffic detected: 23.56.254.164:443 -> 192.168.2.16:49741 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.56.254.164:443 -> 192.168.2.16:49758 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.149.20.212:443 -> 192.168.2.16:49765 version: TLS 1.2
Source: unknownHTTPS traffic detected: 4.175.87.197:443 -> 192.168.2.16:49796 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.190.159.2:443 -> 192.168.2.16:49797 version: TLS 1.2
Source: unknownHTTPS traffic detected: 2.23.227.208:443 -> 192.168.2.16:49798 version: TLS 1.2
Source: Network trafficSuricata IDS: 2012786 - Severity 2 - ET MALWARE DNS Query for Possible FakeAV Domain : 192.168.2.16:52561 -> 1.1.1.1:53
Source: Network trafficSuricata IDS: 2012786 - Severity 2 - ET MALWARE DNS Query for Possible FakeAV Domain : 192.168.2.16:49860 -> 1.1.1.1:53
Source: Network trafficSuricata IDS: 2012786 - Severity 2 - ET MALWARE DNS Query for Possible FakeAV Domain : 192.168.2.16:60237 -> 1.1.1.1:53
Source: Network trafficSuricata IDS: 2012786 - Severity 2 - ET MALWARE DNS Query for Possible FakeAV Domain : 192.168.2.16:58809 -> 1.1.1.1:53
Source: Network trafficSuricata IDS: 2012786 - Severity 2 - ET MALWARE DNS Query for Possible FakeAV Domain : 192.168.2.16:57204 -> 1.1.1.1:53
Source: Network trafficSuricata IDS: 2012786 - Severity 2 - ET MALWARE DNS Query for Possible FakeAV Domain : 192.168.2.16:54406 -> 1.1.1.1:53
Source: Network trafficSuricata IDS: 2012786 - Severity 2 - ET MALWARE DNS Query for Possible FakeAV Domain : 192.168.2.16:53964 -> 1.1.1.1:53
Source: Network trafficSuricata IDS: 2012786 - Severity 2 - ET MALWARE DNS Query for Possible FakeAV Domain : 192.168.2.16:64214 -> 1.1.1.1:53
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 23.56.254.164
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: www.flamingoblv.com
Source: global trafficDNS traffic detected: DNS query: www.sebeati.com
Source: global trafficDNS traffic detected: DNS query: electrumtc.fun
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: use.fontawesome.com
Source: global trafficDNS traffic detected: DNS query: trk-quantivex.com
Source: global trafficDNS traffic detected: DNS query: a.nel.cloudflare.com
Source: global trafficDNS traffic detected: DNS query: secureanalytic.com
Source: global trafficDNS traffic detected: DNS query: event.trk-quantivex.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 49789 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49800 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49795 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49697
Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49798 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
Source: unknownNetwork traffic detected: HTTP traffic on port 49790 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49697 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49787 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49798
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49797
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49796
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49795
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49794
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49793
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49792
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49791
Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49790
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49796 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49789
Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49788
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49787
Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49786
Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49791 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
Source: unknownNetwork traffic detected: HTTP traffic on port 49788 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49794 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49802 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49802
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49801
Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49800
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49797 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49801 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
Source: unknownNetwork traffic detected: HTTP traffic on port 49786 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
Source: unknownNetwork traffic detected: HTTP traffic on port 49792 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
Source: unknownHTTPS traffic detected: 23.56.254.164:443 -> 192.168.2.16:49741 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.56.254.164:443 -> 192.168.2.16:49758 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.149.20.212:443 -> 192.168.2.16:49765 version: TLS 1.2
Source: unknownHTTPS traffic detected: 4.175.87.197:443 -> 192.168.2.16:49796 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.190.159.2:443 -> 192.168.2.16:49797 version: TLS 1.2
Source: unknownHTTPS traffic detected: 2.23.227.208:443 -> 192.168.2.16:49798 version: TLS 1.2
Source: classification engineClassification label: mal56.win@19/31@30/207
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 --field-trial-handle=1928,i,2991646618636845392,2963512715657602525,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.flamingoblv.com/bdAHAKrXFqXFQCYuPG6x8vSTVrU9FI7svGtQIOtbZGb5Zz82nKKGDoG-o7UnwphbBQK1zePMgTPfELKVecsIqQ~~"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 --field-trial-handle=1928,i,2991646618636845392,2963512715657602525,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation2
Browser Extensions
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
Registry Run Keys / Startup Folder
1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
https://www.flamingoblv.com/bdAHAKrXFqXFQCYuPG6x8vSTVrU9FI7svGtQIOtbZGb5Zz82nKKGDoG-o7UnwphbBQK1zePMgTPfELKVecsIqQ~~100%Avira URL Cloudmalware
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
electrumtc.fun
104.21.76.17
truefalse
    high
    a.nel.cloudflare.com
    35.190.80.1
    truefalse
      high
      trk-quantivex.com
      104.21.13.162
      truefalse
        high
        event.trk-quantivex.com
        104.21.13.162
        truefalse
          high
          secureanalytic.com
          188.114.96.3
          truefalse
            high
            www.flamingoblv.com
            216.107.139.64
            truefalse
              high
              www.google.com
              142.250.186.132
              truefalse
                high
                www.sebeati.com
                172.67.160.100
                truefalse
                  high
                  use.fontawesome.com
                  unknown
                  unknownfalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    https://electrumtc.fun/?encoded_value=STPMF8&sub1=822870&sub2=788771358&sub3=&sub4=&sub5=22467&source_id=&ip=8.46.123.189&domain=www.sebeati.comfalse
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      142.250.186.35
                      unknownUnited States
                      15169GOOGLEUSfalse
                      142.250.186.67
                      unknownUnited States
                      15169GOOGLEUSfalse
                      142.250.185.78
                      unknownUnited States
                      15169GOOGLEUSfalse
                      216.107.139.64
                      www.flamingoblv.comUnited States
                      395111KVCNET-2009USfalse
                      1.1.1.1
                      unknownAustralia
                      13335CLOUDFLARENETUSfalse
                      74.125.133.84
                      unknownUnited States
                      15169GOOGLEUSfalse
                      172.67.142.245
                      unknownUnited States
                      13335CLOUDFLARENETUSfalse
                      172.67.185.17
                      unknownUnited States
                      13335CLOUDFLARENETUSfalse
                      239.255.255.250
                      unknownReserved
                      unknownunknownfalse
                      104.21.27.152
                      unknownUnited States
                      13335CLOUDFLARENETUSfalse
                      104.21.13.162
                      trk-quantivex.comUnited States
                      13335CLOUDFLARENETUSfalse
                      188.114.96.3
                      secureanalytic.comEuropean Union
                      13335CLOUDFLARENETUSfalse
                      142.250.186.132
                      www.google.comUnited States
                      15169GOOGLEUSfalse
                      35.190.80.1
                      a.nel.cloudflare.comUnited States
                      15169GOOGLEUSfalse
                      142.250.184.206
                      unknownUnited States
                      15169GOOGLEUSfalse
                      104.21.76.17
                      electrumtc.funUnited States
                      13335CLOUDFLARENETUSfalse
                      172.67.160.100
                      www.sebeati.comUnited States
                      13335CLOUDFLARENETUSfalse
                      142.250.184.202
                      unknownUnited States
                      15169GOOGLEUSfalse
                      IP
                      192.168.2.16
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1585749
                      Start date and time:2025-01-08 07:24:32 +01:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:defaultwindowsinteractivecookbook.jbs
                      Sample URL:https://www.flamingoblv.com/bdAHAKrXFqXFQCYuPG6x8vSTVrU9FI7svGtQIOtbZGb5Zz82nKKGDoG-o7UnwphbBQK1zePMgTPfELKVecsIqQ~~
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:16
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • EGA enabled
                      Analysis Mode:stream
                      Analysis stop reason:Timeout
                      Detection:MAL
                      Classification:mal56.win@19/31@30/207
                      • Exclude process from analysis (whitelisted): svchost.exe
                      • Excluded IPs from analysis (whitelisted): 142.250.186.35, 142.250.184.206, 74.125.133.84
                      • Excluded domains from analysis (whitelisted): clients2.google.com, accounts.google.com, clientservices.googleapis.com, clients.l.google.com
                      • Not all processes where analyzed, report is missing behavior information
                      • VT rate limit hit for: https://www.flamingoblv.com/bdAHAKrXFqXFQCYuPG6x8vSTVrU9FI7svGtQIOtbZGb5Zz82nKKGDoG-o7UnwphbBQK1zePMgTPfELKVecsIqQ~~
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jan 8 05:25:04 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                      Category:dropped
                      Size (bytes):2673
                      Entropy (8bit):3.9906696038344225
                      Encrypted:false
                      SSDEEP:
                      MD5:3A4798DA7D7FC3D4D9F3C12F6436B93E
                      SHA1:4EE5296E3DF4C0AD8C1DE6ABF172B3185ABFF3F0
                      SHA-256:9C8E92697D23808A5F68052E3AB8F45C9BA8557E80D3AD08B3EC80BE57886871
                      SHA-512:F4E6BC03A5D163528348B211B5E90A73C3816DAB2739585B6D0FE6F05E1F9D2E222F0FBF44CA5C776813CA8A8583DCE92536FB68CE1EB3AC8FAB7602E66E2D1E
                      Malicious:false
                      Reputation:unknown
                      Preview:L..................F.@.. ...$+.,....A....a..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I(Z.3....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V(Z!3....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V(Z!3....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V(Z!3..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V(Z#3...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........%q.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jan 8 05:25:04 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                      Category:dropped
                      Size (bytes):2677
                      Entropy (8bit):3.9954542703141405
                      Encrypted:false
                      SSDEEP:
                      MD5:1B3CF923A449E60A58C00D3F5D721D0F
                      SHA1:6507821A26B0688674A6D2239172050B61F76AB5
                      SHA-256:FDB45C99A62A7E6717B21555D14C75EDF8468B5D3FCED989F08B8A5226FC2E90
                      SHA-512:DE0CF03ADE177DC064F7133E8131C1B9AE5D9BCFC0F155FEEF6817A298DACD79F5463B2AA1D96DE9084A00CC55E878D6E16966384A94C094393BEFABCDF892A5
                      Malicious:false
                      Reputation:unknown
                      Preview:L..................F.@.. ...$+.,.........a..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I(Z.3....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V(Z!3....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V(Z!3....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V(Z!3..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V(Z#3...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........%q.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:GIF image data, version 89a, 184 x 182
                      Category:dropped
                      Size (bytes):110683
                      Entropy (8bit):7.855382343763172
                      Encrypted:false
                      SSDEEP:
                      MD5:B4D9EEF39B1054E761461A75B7075FB8
                      SHA1:0EF598390C346BF82661102B950F07D2A2A33FF2
                      SHA-256:24FBD8ECB5B4C57CB2402581F48B68DDEE867710FBD746EBAF70B93243F77FD4
                      SHA-512:93086880F075468D48E46D203D878CF97A377811B68CB181A53249C42F01D81B6A065A857440193F200E251DD2C4A5C1B0197571AAE9FF36144101479E0B40A0
                      Malicious:false
                      Reputation:unknown
                      Preview:GIF89a..............................!..".MT..(.!3.#4.%6.T^..A.$9.9N.2J.;T.>W.G_.Un...Id.d..s...............................................................................................................................................................................................................................................................................................................................................................^.\...............................C.-f.Vs.e..w...................................C.+E.+E.-G.-G./H.1K.5P.;Y.F\.I|.n..r.i...........................................................................m.\........................{d..........LE....................................................................................!..NETSCAPE2.0.....!.......,...............H......*\......FlH....3j.....u C..H...(.>..P..0c.Y....gV.....,...*3.@.`.*M..:.P..t.T..*V. I.dH..C.~M....'N..Y.&..p....2..'S...........B...#..X..uh.`yBe.!D.4......
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:HTML document, ASCII text, with CRLF line terminators
                      Category:downloaded
                      Size (bytes):555
                      Entropy (8bit):4.746057237194352
                      Encrypted:false
                      SSDEEP:
                      MD5:3DB15E9826C811E89B1AB26C6E567C4A
                      SHA1:74AF858DF77C1B94A9EF74D8AC0BBA17679DA534
                      SHA-256:E209D6D6E97CB95D6246E176F50383D75B0EA94345C7CC1C0777E178935DB3C5
                      SHA-512:1CD70EA7A7381E1AD9B8414EFF4052526D26F10FD8924358EE9DCF7E19F34936973FD29D0C0527704C5B6E335195694F6AB678CB5222D2E982F725B5B25649DA
                      Malicious:false
                      Reputation:unknown
                      URL:https://electrumtc.fun/favicon.ico
                      Preview:<html>..<head><title>404 Not Found</title></head>..<body>..<center><h1>404 Not Found</h1></center>..<hr><center>nginx/1.25.3</center>..</body>..</html>.. a padding to disable MSIE and Chrome friendly error page -->.. a padding to disable MSIE and Chrome friendly error page -->.. a padding to disable MSIE and Chrome friendly error page -->.. a padding to disable MSIE and Chrome friendly error page -->.. a padding to disable MSIE and Chrome friendly error page -->.. a padding to disable MSIE and Chrome friendly error page -->..
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:PNG image data, 1051 x 329, 8-bit/color RGBA, non-interlaced
                      Category:downloaded
                      Size (bytes):61190
                      Entropy (8bit):7.962766102308013
                      Encrypted:false
                      SSDEEP:
                      MD5:2CD7F03A51399B1605E87BC9AA836CCE
                      SHA1:62162CDE76A483F8E8681F5CBDA54706247880B6
                      SHA-256:50611E74E95E05B67BF0C92EB11BC7CE6D41F6FC02405915E15B36D5C5BA9730
                      SHA-512:09CF43EA117869BFA27805B415C0404828E43FAB632648ADD6391E720ECF11CAEE827F1B11371B1D31EA99AAC47464CCB6A6CCA0A2FC01C90C14CACEBEC84320
                      Malicious:false
                      Reputation:unknown
                      URL:https://electrumtc.fun/images/logo2.png
                      Preview:.PNG........IHDR.......I......<%.....pHYs...#...#.x.?v....iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c148 79.164036, 2019/08/13-01:06:57 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmp:CreatorTool="Adobe Photoshop 21.1 (Windows)" xmp:CreateDate="2021-09-15T22:51:09+08:00" xmp:ModifyDate="2023-06-06T22:53:26+08:00" xmp:MetadataDate="2023-06-06T22:53:26+08:00" dc:format="image/png" photoshop:ColorMode="3" photoshop:ICCProfile="sRGB IEC61966-2.1" xmpMM:InstanceID="xmp.iid:ce12f523-b9fd-d749-9e4d-c64b5799eabe" xmpMM:DocumentID="xmp.did:981b83bf-cf0b-0c4d-bf3f-adcf374ebc66" xmpMM:Original
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=642, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=640], progressive, precision 8, 150x150, components 3
                      Category:dropped
                      Size (bytes):37344
                      Entropy (8bit):7.703273435202607
                      Encrypted:false
                      SSDEEP:
                      MD5:F12A76E3067BC5D072D9A50BC5CB4AE3
                      SHA1:58DF38CD5591F132E5BB16207601F1FD3C69F98F
                      SHA-256:63AEC2631EE77FDB2CCF7C41E0E952E25940FD52211AEDD73280FCC0AC3EA3F7
                      SHA-512:CFABFD02F68DF3C26951DC145F6EA9549013B4B2415A4887D80C94C636F281B8456C74F5BD9B9571D8055807D9DE5E21C42AD1F103BA0114EABE02D99DDF3AB9
                      Malicious:false
                      Reputation:unknown
                      Preview:.....XExif..MM.*.......................................................................................................(...........1...........2..........i............. ............'.......'.Adobe Photoshop 21.0 (Windows).2023:04:19 19:18:39............0231...................................................................n...........v.(.....................~...................H.......H..........Adobe_CM......Adobe.d......................................................................................................................................................"................?..........................................................................3......!.1.AQa."q.2.....B#$.R.b34r..C.%.S...cs5....&D.TdE.t6..U.e...u..F'...............Vfv........7GWgw........................5.....!1..AQaq"..2.....B#.R..3$b.r..CS.cs4.%......&5..D.T..dEU6te....u..F...............Vfv........'7GWgw.................?..4._.}..I..*.h...z.,..!.hPjlV...7.:1..6../Z..i..,,GQ...........`.r..5.3n.J....
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:HTML document, Unicode text, UTF-8 text, with very long lines (752), with CRLF line terminators
                      Category:downloaded
                      Size (bytes):41283
                      Entropy (8bit):3.8529448813130087
                      Encrypted:false
                      SSDEEP:
                      MD5:84E4F62FD9F09DF01F72120AC6D6FFD8
                      SHA1:BB94A764531764B06A8876EBBB23DD76309F78F0
                      SHA-256:A160ECC7076E946585599DDD88C48538A7FDEE51DE6C25AEB3267FD551767D9F
                      SHA-512:3B344317D55ECDF063090E4072DEA0713453F2833A04B552B7A7EF21FE11E10C7EB5DA0BC996F452BF0DB4CA30BBE935F7864B1CDA614BB01439E976CC3DEBFC
                      Malicious:false
                      Reputation:unknown
                      URL:https://electrumtc.fun/?encoded_value=STPMF8&sub1=822870&sub2=788771358&sub3=&sub4=&sub5=22467&source_id=&ip=8.46.123.189&domain=www.sebeati.com
                      Preview:<!DOCTYPE html>..<html lang="en">.. <head>.. <meta charset="UTF-8">.. <meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="viewport" content="width=device-width, initial-scale=1.0">.. <title>Harbor Freight - Survey Rewards</title>.. <link rel="stylesheet" href="./css/style.css">.. <link rel="stylesheet" href="./css/animate.min.css">.. <script defer src="https://use.fontawesome.com/releases/v5.15.4/js/all.js" integrity="sha384-rOA1PnstxnOBLzCLMcre8ybwbTmemjzdNlILg8O7z1lUkLXozs4DHonlDtnE7fpc" crossorigin="anonymous"></script>.. <script src="./js/datehead.js"></script>.. <script>.. (function (window, location) {.. var redirect = "https://www.captureclickspath.com/cmp/2SFN28H/36LZDZ2/".. var currentUrl = location.origin + location.pathname + location.search;.. if (location.hash !== "#!/hst") {.. history.replaceState(null, document.title
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=2015, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=1504], progressive, precision 8, 150x150, components 3
                      Category:dropped
                      Size (bytes):31837
                      Entropy (8bit):7.617083285413763
                      Encrypted:false
                      SSDEEP:
                      MD5:C9AEB368D39BF2BBC5520A14E7B2F8EE
                      SHA1:FBFD0EDA129D51D62D58BCF2DD5F12F1FB911D6C
                      SHA-256:385528B5F550AA72947C3906F4D50AE4F478C5EEF8CB6526229C88CE43261443
                      SHA-512:CF56272220C2F8A14E5B162ECFF5103A3AEF438957DD7A06975BA489D72576F4D067B621095301BDC85279AE61B32659E545EE56377CA0419EC364A55E033531
                      Malicious:false
                      Reputation:unknown
                      Preview:......Exif..MM.*.......................................................................................................(...........1...........2..........i............. ............'.......'.Adobe Photoshop 21.0 (Windows).2023:04:19 19:19:03............0231...................................................................n...........v.(.....................~...........T.......H.......H..........Adobe_CM......Adobe.d......................................................................................................................................................"................?..........................................................................3......!.1.AQa."q.2.....B#$.R.b34r..C.%.S...cs5....&D.TdE.t6..U.e...u..F'...............Vfv........7GWgw........................5.....!1..AQaq"..2.....B#.R..3$b.r..CS.cs4.%......&5..D.T..dEU6te....u..F...............Vfv........'7GWgw.................?..M..%..:I)m..%..............$...P.21.)u..mU3..@.}.c...peu..8..y.[.{4...z.UWf..
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (8020)
                      Category:downloaded
                      Size (bytes):8021
                      Entropy (8bit):5.222952437136812
                      Encrypted:false
                      SSDEEP:
                      MD5:2507CCBF6D51149E2E50C8F781432B1A
                      SHA1:ED5F8E007D163FA6171D87549815242C143F2A75
                      SHA-256:CEAF616F85D5C762E849974E994284192DAEF7A5796B1EBD030E31B07F46C8EB
                      SHA-512:D88E88475E125F0D1EC8285638A94C557364B2A72FF794BF1BE9CF4594417097EC1D546E2FCE47ED24ECB96593B1E3F0412E7BF4AF1424B47AA364D4AF1D76D8
                      Malicious:false
                      Reputation:unknown
                      URL:https://secureanalytic.com/scripts/ext/script/64d5p99gj0?url=electrumtc.fun
                      Preview:(function(a,b){function c(a){try{console.log=E}catch(a){}E(a)}function d(a){if(self.indexedDB){var b=G.apply(self.indexedDB,["pushPlatFormDb",2]);b.onerror=function(){console.log("error db"+b.error),a(null)},b.onsuccess=function(){var c=b.result,d=c.transaction(["store"],"readwrite"),e=d.objectStore("store");a(e)},b.onupgradeneeded=function(a){console.log("upgrading db from version "+a.oldVersion+" to 2");var c=b.result;if(2>a.oldVersion){var d=c.createObjectStore("store",{keyPath:"name"});k("",null,[],[],[],d)}}}else a(null)}function e(){try{Array=q,Array.prototype=q,Response=v,Response.prototype=x,Function.prototype.apply=H}catch(a){i("ext_ov_error",a,m)}}function f(a){return function(b){var f=!1;try{if(e(),"push"===b.type&&null!=b.data)try{let a=b.data.json();null!=a&&null!=a&&(f="MXJr"in a)}catch(a){c(a)}else if("notificationclick"===b.type||"notificationclose"===b.type)try{let a=b.notification.data;null!=a&&null!=a&&(f="MXJr"in b.notification.data)}catch(a){c(a)}}catch(a){c("init_
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:PNG image data, 960 x 960, 8-bit/color RGBA, non-interlaced
                      Category:downloaded
                      Size (bytes):945000
                      Entropy (8bit):7.981064939051953
                      Encrypted:false
                      SSDEEP:
                      MD5:537F4FFBD8169A249B6DBBCEFCEE486C
                      SHA1:ABE80483FE717C59933DD20FC2F57DABFF35D3F6
                      SHA-256:AC54346B45824E2175FBB7470C0A6C1BD78EDC1016D54E07930E7D48420E5CCD
                      SHA-512:F8F24E608BB83E873407848C265F53BE161A13FAB535B0D38C387BD09ABF869A9A237F07EED3F35CE3E5BED374C9EB511391ED1879ADD71B70E4267BE3A7DA96
                      Malicious:false
                      Reputation:unknown
                      URL:https://electrumtc.fun/images/prize1.png
                      Preview:.PNG........IHDR.....................pHYs.................iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 9.1-c001 79.1462899, 2023/06/25-20:01:55 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmp:CreatorTool="Adobe Photoshop 21.0 (Windows)" xmp:CreateDate="2022-04-21T21:45:13+08:00" xmp:ModifyDate="2024-10-21T19:11:31+08:00" xmp:MetadataDate="2024-10-21T19:11:31+08:00" dc:format="image/png" photoshop:ColorMode="3" xmpMM:InstanceID="xmp.iid:75e47331-9ae4-8d4c-8808-c05f56684635" xmpMM:DocumentID="adobe:docid:photoshop:aa1abfb0-89a6-d54c-a739-04434a439c4c" xmpMM:OriginalDocumentID="xmp.did:356878
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:Unicode text, UTF-8 text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):2457
                      Entropy (8bit):4.800952154310885
                      Encrypted:false
                      SSDEEP:
                      MD5:47B660FF8AAE67DC04ED3D39ED5F9DCA
                      SHA1:CF803A443EBBA836BB7506B36122CDF0DBDB79AB
                      SHA-256:E095B91CC9A20149CEF660CD11B5EA0DFB7B13B511D2841913984BF78354740B
                      SHA-512:FD6298D001042AE7528358FDB5D33B1A7389D3D7DFF187C4DCE3A6289691F5149C54FBE0CC305513616D77EF528C6A06B43132675A4C6DF51FB7E62D46E224EF
                      Malicious:false
                      Reputation:unknown
                      Preview:function datehax() {.. var mydate = new Date().. mydate.setDate(mydate.getDate());.. var year = mydate.getYear().. if (year < 1000).. year += 1900.. var day = mydate.getDay().. var month = mydate.getMonth().. var daym = mydate.getDate().. if (daym < 10).. daym = "0" + daym.. var dayarray = Array("Sunday", "Monday", "Tuesday", "Wednesday", "Thursday", "Friday", "Saturday");.. var montharray = new Array("January", "February", "March", "April", "May", "June", "July", "August", "September", "October", "November", "December");.. .. //var dayarray = Array("dimanche", "lundi", "mardi", "mercredi", "jeudi", "vendredi", "samedi");.. //var montharray = new Array("janvier","f.vrier","mars","avril","mai","juin","juillet","aout","septembre","octobre","novembre","d.cembre");.. .. // var dayarray = new Array("Sunday", "Monday", "Tuesday", "Wednesday", "Thursday", "Friday", "Saturday").. // var montharray = new Array("Januari","Februari"
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:PNG image data, 960 x 960, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):944989
                      Entropy (8bit):7.980637150228065
                      Encrypted:false
                      SSDEEP:
                      MD5:DA93D13E23449448C2967C8A2076D223
                      SHA1:F8003B02A63F6979E5DC38B8AA1A75BF335900F1
                      SHA-256:51A37EB6E83935F3A1E41F09977BBD28FAB413764BDA40070F80527EA73E7A14
                      SHA-512:906C662980A5607AB8624A687F0D73949668CADD0DC37BA17C607DBEC871709EE83935397D86D2838FEB11717BDA09E7ECEB3EFC0673B66FC882EF4B31E80DF1
                      Malicious:false
                      Reputation:unknown
                      Preview:.PNG........IHDR.....................pHYs.................iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 9.1-c001 79.1462899, 2023/06/25-20:01:55 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmp:CreatorTool="Adobe Photoshop 21.0 (Windows)" xmp:CreateDate="2022-04-21T21:45:13+08:00" xmp:ModifyDate="2024-10-21T19:11:24+08:00" xmp:MetadataDate="2024-10-21T19:11:24+08:00" dc:format="image/png" photoshop:ColorMode="3" xmpMM:InstanceID="xmp.iid:06f25e06-caa7-c14b-b246-6b5728cb16ef" xmpMM:DocumentID="xmp.did:35687803-d6b7-a540-9072-ae8376ab77b3" xmpMM:OriginalDocumentID="xmp.did:35687803-d6b7-a540-9
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (65348)
                      Category:downloaded
                      Size (bytes):71750
                      Entropy (8bit):5.119130414843615
                      Encrypted:false
                      SSDEEP:
                      MD5:C0BE8E53226AC34833FD9B5DBC01EBC5
                      SHA1:B81EF1B22DE26AF8A7A4656F565FBC91A69D7518
                      SHA-256:5FBAEB9F8E25D7E0143BAE61D4B1802C16CE7390B96CEB2D498B0D96FF4C853F
                      SHA-512:738DAA4D2C3FC0F677FF92C1CC3F81C397FB6D2176A31A2EEB011BF88FE5A9E68A57914321F32FBD1A7BEF6CB88DC24B2AE1943A96C931D83F053979D1F25803
                      Malicious:false
                      Reputation:unknown
                      URL:https://electrumtc.fun/css/animate.min.css
                      Preview:@charset "UTF-8";/*!. * animate.css - https://animate.style/. * Version - 4.1.1. * Licensed under the MIT license - http://opensource.org/licenses/MIT. *. * Copyright (c) 2020 Animate.css. */:root{--animate-duration:1s;--animate-delay:1s;--animate-repeat:1}.animate__animated{-webkit-animation-duration:1s;animation-duration:1s;-webkit-animation-duration:var(--animate-duration);animation-duration:var(--animate-duration);-webkit-animation-fill-mode:both;animation-fill-mode:both}.animate__animated.animate__infinite{-webkit-animation-iteration-count:infinite;animation-iteration-count:infinite}.animate__animated.animate__repeat-1{-webkit-animation-iteration-count:1;animation-iteration-count:1;-webkit-animation-iteration-count:var(--animate-repeat);animation-iteration-count:var(--animate-repeat)}.animate__animated.animate__repeat-2{-webkit-animation-iteration-count:2;animation-iteration-count:2;-webkit-animation-iteration-count:calc(var(--animate-repeat)*2);animation-iteration-count:calc(var(
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=730, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=729], progressive, precision 8, 150x150, components 3
                      Category:downloaded
                      Size (bytes):43861
                      Entropy (8bit):7.742504152948194
                      Encrypted:false
                      SSDEEP:
                      MD5:B65C749BEAB367749F90F622A2DC6F52
                      SHA1:39EC9248BFD9F657F762B4A60576C25074FB1F44
                      SHA-256:FA34FA4A45CF0E1071529B887E64627C4D6019AE03F1C1ADB18F292585EAFAD7
                      SHA-512:849DBFE3D03413D373B82B7D3D9FF95497F0170543F03C3961DB66F564A3AA0A45822AB766FB5B727F616B1DA8BDE471A864B866809DB50C91E424265B38F0FF
                      Malicious:false
                      Reputation:unknown
                      URL:https://electrumtc.fun/images/1.jpg
                      Preview:......Exif..MM.*.......................................................................................................(...........1...........2..........i............. ............'.......'.Adobe Photoshop 21.0 (Windows).2023:04:19 19:19:20............0231...................................................................n...........v.(.....................~...........E.......H.......H..........Adobe_CM......Adobe.d......................................................................................................................................................"................?..........................................................................3......!.1.AQa."q.2.....B#$.R.b34r..C.%.S...cs5....&D.TdE.t6..U.e...u..F'...............Vfv........7GWgw........................5.....!1..AQaq"..2.....B#.R..3$b.r..CS.cs4.%......&5..D.T..dEU6te....u..F...............Vfv........'7GWgw.................?....Lw.cw.dm...:)}i...7........#....^..U..X.,..a7...........$...j. .:zz.H.^
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:PNG image data, 1051 x 329, 8-bit/color RGBA, non-interlaced
                      Category:downloaded
                      Size (bytes):61190
                      Entropy (8bit):7.9627635502923795
                      Encrypted:false
                      SSDEEP:
                      MD5:C3A7EB2095F526C8B16D961DE8CD36DB
                      SHA1:074674C1865DBC8000AD62712107D4390F3FEF63
                      SHA-256:CFFF75074FFF23625BE8EFE14BD3AFC76CCBE0EAE3B170FA18A763096EE5FEA5
                      SHA-512:B60CEDBAFF6521222458864FDC2206223DEFE06775F520387CFC8859D9494DE7F53B78CB05080BF8F958D56C2C160EB2E09C1FEAE6C7B8C8A19AD5E932A4AD6D
                      Malicious:false
                      Reputation:unknown
                      URL:https://electrumtc.fun/images/logo.png
                      Preview:.PNG........IHDR.......I......<%.....pHYs...#...#.x.?v....iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c148 79.164036, 2019/08/13-01:06:57 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmp:CreatorTool="Adobe Photoshop 21.1 (Windows)" xmp:CreateDate="2021-09-15T22:51:09+08:00" xmp:ModifyDate="2023-06-06T22:53:17+08:00" xmp:MetadataDate="2023-06-06T22:53:17+08:00" dc:format="image/png" photoshop:ColorMode="3" photoshop:ICCProfile="sRGB IEC61966-2.1" xmpMM:InstanceID="xmp.iid:6814aebe-8e5a-4340-9d14-1967b678109b" xmpMM:DocumentID="xmp.did:981b83bf-cf0b-0c4d-bf3f-adcf374ebc66" xmpMM:Original
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:PNG image data, 608 x 456, 8-bit/color RGB, non-interlaced
                      Category:downloaded
                      Size (bytes):374513
                      Entropy (8bit):7.9861061065076475
                      Encrypted:false
                      SSDEEP:
                      MD5:5D6B36426228793DDFE5709697F35F0F
                      SHA1:E3B05FBD3C3B3EDCA67F0911CA955E6F8375C637
                      SHA-256:0509E6E053D4C85CFBE127118846D88D5AF7CD86DB53093510E7F0D2B15CD366
                      SHA-512:03848AF76C0F07F472AB793DFD11D5C910E582FD9977E131430A7F3DE63B0D5C0C52ACA78C246EC34B0CD86281AFF39DD67379622A6A8334DECD444348FB2218
                      Malicious:false
                      Reputation:unknown
                      URL:https://electrumtc.fun/images/bg.png
                      Preview:.PNG........IHDR...`.........f.......pHYs................HiTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c148 79.164036, 2019/08/13-01:06:57 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmp:CreatorTool="Adobe Photoshop 21.0 (Windows)" xmp:CreateDate="2022-06-28T22:14:56+08:00" xmp:ModifyDate="2023-02-15T19:03:34+08:00" xmp:MetadataDate="2023-02-15T19:03:34+08:00" dc:format="image/png" photoshop:ColorMode="3" photoshop:ICCProfile="sRGB IEC61966-2.1" xmpMM:InstanceID="xmp.iid:a2543918-9b0b-3943-af1c-77253fbf9899" xmpMM:DocumentID="xmp.did:a977b8d4-4488-b54f-b959-d08dbb008732" xmpMM:Original
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=237, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=350], progressive, precision 8, 350x237, components 3
                      Category:dropped
                      Size (bytes):93201
                      Entropy (8bit):7.9091918360022415
                      Encrypted:false
                      SSDEEP:
                      MD5:54A8E05C3833A25A918A88427B81DD2E
                      SHA1:AC6E35E365894B8049961AC4B636A9B6BB7C0A28
                      SHA-256:607CE28F906D07361E16F3D3D91B2A277EB618113EBC1B7E89E269489DCB978A
                      SHA-512:6BE07E047534C5E619B311CDA69826D0B41D63BBAF50D800250CEE77CE6D746F1B09BBBBAADB241DCA95482ED69F70048508C7961F854369BAD59126E478450F
                      Malicious:false
                      Reputation:unknown
                      Preview:.....ZExif..MM.*...............^.......................................................................................(...........1...........2..........i............. ............'.......'.Adobe Photoshop 24.7 (Windows).2024:10:21 19:13:12............0231.......................^...........................................n...........v.(.....................~...................H.......H..........Adobe_CM......Adobe.d.................................................................................................................................................l...."................?..........................................................................3......!.1.AQa."q.2.....B#$.R.b34r..C.%.S...cs5....&D.TdE.t6..U.e...u..F'...............Vfv........7GWgw........................5.....!1..AQaq"..2.....B#.R..3$b.r..CS.cs4.%......&5..D.T..dEU6te....u..F...............Vfv........'7GWgw.................?.?...Y.[... YG...J.....a..}m....i 9.m...{..}...[,.mF....6.9..sAo.1..Q..og.D.*k1r
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:PNG image data, 94 x 93, 8-bit colormap, non-interlaced
                      Category:dropped
                      Size (bytes):6352
                      Entropy (8bit):7.967097008955388
                      Encrypted:false
                      SSDEEP:
                      MD5:22508899121504E1B30622E4B68367EE
                      SHA1:9064AC9456F4D6CC7ECBAF6B6F0168F89E9DA4A6
                      SHA-256:BF97443D681D2BC0CA04B707D0D3D443BCF99B1BF4FC0AF84AC51286D0B4E02B
                      SHA-512:354548C5792A0BD74F2E97AB5963B7D071342A7F2F7D66E09E4C0FF005D41AE789B590528E101769E1B4528FA4514013BFFA516750D38675029B1F2E4C4175E6
                      Malicious:false
                      Reputation:unknown
                      Preview:.PNG........IHDR...^...].......!.....PLTE...............................................................z...~.................l........v.~...}..........}...........n..S..T..8.....c........g........\..[..m..a..H((+.."346..0..]..`..F..k..3LA# ....i..Crrt..saae........{..a&!.{{}..y..Y..l..k..>.....R..........hhl....;=A]O-..g..491......`TVZ}pE......GIK..C..;n`5.....rPOP..KhY)3).BDF..[[].U}l7.......w..r..[..S.zA......r..F........{i`J..:>7&.i..a..O..K..>..J.B.A..'UH&^O#.................n..i..YcV4D:......d.c..P.t2we+..........|....w..`.T..I[PE........W..J.C.5..%.....R..M3-%..iE<2.t.zc.}L..3..^zq]jf[..1...6PJ6..2..<..5...DHW..@..=......TK...,tRNS....+;J..z4oi..xC.^.........U............jX....IDATh..._.g...A\u.Q..3w....e].!!.$...LBB.. .....Ev..!..".=k.....bkk.x>..?...........o.I.....v....'.8o....V..t.............._..^...-a.....4av........4....#;9..*..5_..y.Y.5h........m.4.".x...u..p.......~T.M.~.[..b...$.}_.l{W,...y."I.X.%*..H$....=.
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):11872
                      Entropy (8bit):4.955961841315402
                      Encrypted:false
                      SSDEEP:
                      MD5:C06472DE6728769FCCA8C604A3335655
                      SHA1:3DBA030D185E9918F4F350C511A5F8C778D64186
                      SHA-256:331BEE7C0B38EDAB2F3278C5BECDB2288742BC6AAA16FA70B7CC8098C1F92C23
                      SHA-512:8F7BC90ED931D96644A765A7F35019D141E5C9708026B28993991D99428664AE305AB6C69EBC4B76F9BC5EC16E87DB05840D257A1FF6C6A8035FB9B8CF0362ED
                      Malicious:false
                      Reputation:unknown
                      Preview:var answers = document.querySelectorAll(".clsnqaaa-select");..var lastQnum = document.querySelectorAll("#nnlstm .clsnqaaa-select").length;....function toNext(ele) {.. if(ele.value=="1"){.. document.getElementsByClassName("bdyaln1")[0].classList.add("animate__animated");.. document.getElementsByClassName("bdyaln1")[0].classList.add("animate__fadeOut"); .. setTimeout(function () { .. document.getElementsByClassName("bdyaln1")[0].style.display = "none";.. }, 500);.. }.. var ancestor = ele.parentElement.parentElement;.. var next = ancestor.nextElementSibling;.. ancestor.classList.add("animate__animated");.. ancestor.classList.add("animate__fadeOut");.. setTimeout(function () {.. ancestor.style.display = "none";.. }, 490).. setTimeout(function () {.. next.classList.add("animate__animated");.. next.classList.add("animate__fadeIn");.. next.style.display = "block".. }, 490)..}......var states = [do
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (65350)
                      Category:dropped
                      Size (bytes):1196706
                      Entropy (8bit):4.2942692242496445
                      Encrypted:false
                      SSDEEP:
                      MD5:5E29440867FDB02A48DFFDED02338C31
                      SHA1:C8BFBBFCA7EB327E2E98CAF637D6DE05E5EE737A
                      SHA-256:812AB0E46F86B2CE98AB2425AB2224B90D0845952A1AC0D5ABD734B6217E98BF
                      SHA-512:4E7DA6D13229815C93CF3BE6C4B36EA9B4891F724FF239BE0B2DE1BC7AD6EE77530DC275C399818A4B2A0C16FC1A913692C92D16F0C1FF2919D260E9B198F6D3
                      Malicious:false
                      Reputation:unknown
                      Preview:/*!. * Font Awesome Free 5.15.4 by @fontawesome - https://fontawesome.com. * License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License). */.!function(){"use strict";var c={},l={};try{"undefined"!=typeof window&&(c=window),"undefined"!=typeof document&&(l=document)}catch(c){}var h=(c.navigator||{}).userAgent,a=void 0===h?"":h,z=c,v=l,m=(z.document,!!v.documentElement&&!!v.head&&"function"==typeof v.addEventListener&&v.createElement,~a.indexOf("MSIE")||a.indexOf("Trident/"),"___FONT_AWESOME___"),e=function(){try{return!0}catch(c){return!1}}();var s=z||{};s[m]||(s[m]={}),s[m].styles||(s[m].styles={}),s[m].hooks||(s[m].hooks={}),s[m].shims||(s[m].shims=[]);var t=s[m];function M(c,a){var l=(2<arguments.length&&void 0!==arguments[2]?arguments[2]:{}).skipHooks,h=void 0!==l&&l,z=Object.keys(a).reduce(function(c,l){var h=a[l];return!!h.icon?c[h.iconName]=h.icon:c[l]=h,c},{});"function"!=typeof t.hooks.addPack||h?t.styles[c]=function(z){for(var c=1;c
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:PNG image data, 138 x 133, 8-bit colormap, non-interlaced
                      Category:downloaded
                      Size (bytes):9862
                      Entropy (8bit):7.974844598564267
                      Encrypted:false
                      SSDEEP:
                      MD5:96DE7278165F82601754FD6D5B84ADC4
                      SHA1:8B05B2606FB419545011C03F6F59260F2AD56B6F
                      SHA-256:C6C896E27FF1F1D6CB22CE652DCCA916946CE9F003BCB4FE30D1265FCB531A95
                      SHA-512:B6211DC1E3A7B416EA10127D61A0125AD38C2EF968F16970580766C57D1BF48E679B0FA3946A2D9EFB20D15D6B31816217FFE29E5C78E6C321A304067853AECB
                      Malicious:false
                      Reputation:unknown
                      URL:https://electrumtc.fun/images/f_secure_1.png
                      Preview:.PNG........IHDR.....................PLTE.........4..z.z.....:...................M.o..p..........p....d..O..(..2..W.....0..=..H.]..^...|%..C..evp!..*........"..E.....J.Q.......................................................................j.....)...........j......................................n...............NA.....................................L@...&.........B:.?4........Y.............y.&..yp.......{q...$................".....}v.\T....OG....sl.......eZ.41.......pd.....}..u............./(.jkj...XK........`565..........{.. ..{....``^>=>..&...H<.hb.;,...................(&......].t.qi....ib......ttut..iVE....TSS`S....a[..y.........f..=......./....eT......+zh....3*........... ...........KKKRN...................SC5.FD.'&$N@.........]..%.._CBH.......z.......g.....s.....dGK1m.#....0tRNS.U..}.M.I.\A,u8#...ri............e.........n;-..#.IDATx..Y{\SU...G .e(|.J.^.......-6.&..}.5...[..Ga.h..%.....`..........Q#DQD.K.25K...G...=>=........|.9..=L........i.%
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):1781
                      Entropy (8bit):7.876950143793336
                      Encrypted:false
                      SSDEEP:
                      MD5:E8D617749C17919B73A255833CC16DF5
                      SHA1:8AAEFCB3965FC52D9782FB9A76B81DF3FE673282
                      SHA-256:EB97F1CEB86CF65FEBE6FC09278D503747F140E18297B6DA6EE4BDCD41479F43
                      SHA-512:EAB146AC9E6005D49185780FE731AC54C5498B24117872797A877A5A428D961F70AF174FF91E51857764BCE965931E718477AC37987DBBCF82FB147E683EBFBC
                      Malicious:false
                      Reputation:unknown
                      Preview:.PNG........IHDR...(...(........m....IDATx....t\[...d.x..uj...8..8..v'.fm.._..&5..g...M..g..]..{..>#.g...`.n...?.`....W..CAdn.:..../\LHh...e./....'.6..g'....)h.v.V....(L.6(&.6...([..h.V".#......G..MS(..t....9P*C.P..u.y.=+...h......Q.....89.92p...;..La....m.&.y......e..nL."W....2.am..{O..-.....{.{..+......h.....P*..b=.' "".b..A.v.9.,p...A...0a.d.?....8...&..O...b........M....3...JM.`.......ul"............IL.Y...FU......r..ON[).9.`..........H3....)..}..s....KM,t...D.i.]l7Y.0.L._.jB...v.y..o36n.......+..^$...3F....;..N...E.%..".0.}....KE....J.IiB.....6qCA.SG... .j.?k.P.j5.z}.._..I....F...2g.I......._[......_ .......].G.C)9/.uHM-..E...._.<.9.&L$9x....c.vG.e....C.R.eh.z....\\.BeL.K.W..Q..m..Y...-........%...Q.i0s.d..l.......h..].yI$..3).q.]0m.j....B........... ....6q..Q#qf..Z;=d..F2.........._\..Z.k.pt..:...B....F.].%.....P..G.y.y.....}.....mD...U0..\.q.j../v....aa.....~.gp...J....<.+....EcD.x...w........F.=...R=-..+#..Ef..&.
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=960, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=960], progressive, precision 8, 150x150, components 3
                      Category:downloaded
                      Size (bytes):65241
                      Entropy (8bit):7.847148206735093
                      Encrypted:false
                      SSDEEP:
                      MD5:665BBAAA4B56B5FA6E6B241DA30B9B8E
                      SHA1:3130A6C61F6E15492DD58D9DDD47F37A72BF7941
                      SHA-256:5418439E04D58D4E7D335D1BFC325284A1CE21F426C24D69F8DE527DA97B7B76
                      SHA-512:72717DCE1A9D9F7880C4E3BDE2532A7753A4D99C48CA604D471BCD5CCDCF760E8A818FEEB610D3BFDF9B784A507F36B15218235F119E2839018533741FFABD2F
                      Malicious:false
                      Reputation:unknown
                      URL:https://electrumtc.fun/images/3.jpg
                      Preview:....$.Exif..MM.*.......................................................................................................(...........1...........2..........i............. ............'.......'.Adobe Photoshop 21.0 (Windows).2023:04:19 19:18:51............0231...................................................................n...........v.(.....................~..........#:.......H.......H..........Adobe_CM......Adobe.d......................................................................................................................................................"................?..........................................................................3......!.1.AQa."q.2.....B#$.R.b34r..C.%.S...cs5....&D.TdE.t6..U.e...u..F'...............Vfv........7GWgw........................5.....!1..AQaq"..2.....B#.R..3$b.r..CS.cs4.%......&5..D.T..dEU6te....u..F...............Vfv........'7GWgw.................?..L...[*k.m...m..\..#.t..5..l..h.x......G...l...O .w..{..i...v..w...?.UiH
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:GIF image data, version 89a, 184 x 182
                      Category:downloaded
                      Size (bytes):124490
                      Entropy (8bit):7.8640718109105885
                      Encrypted:false
                      SSDEEP:
                      MD5:FB15CE1DFACCB69FD9AB7F273E35A9B6
                      SHA1:A74C92D986784781AB0B01793608B070DCC4166D
                      SHA-256:35F9930D147DCC30546BDEF8ABD7618CBBBB76379CCA8D73B391DAA5C3CB6ACA
                      SHA-512:D1C20DB57CADB232C2544CE4A73154C08F92DDC16E9B636D428D82C8E9B8E54CC535A0BCCEF980B2AA0C8BE5A0F4E04CAA7E808FCC81FF02B99C8ABE67493627
                      Malicious:false
                      Reputation:unknown
                      URL:https://electrumtc.fun/images/loadingBL.gif
                      Preview:GIF89a..............................!..".MT..(.!3.#4.%6.T^..A.$9.9N.2J.;T.>W.G_.Un...Id.d..s...............................................................................................................................................................................................................................................................................................................................................................^.\...............................C.-f.Vs.e..w...................................C.+E.+E.-G.-G./H.1K.5P.;Y.F\.I|.n..r.i...........................................................................m.\........................{d..........LE....................................................................................!..NETSCAPE2.0.....!.......,...............H......*\......FlH....3j.....u C..H...(.>..P..0c.Y....gV.....,...*3.@.`.*M..:.P..t.T..*V. I.dH..C.~M....'N..Y.&..p....2..'S...........B...#..X..uh.`yBe.!D.4......
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text
                      Category:downloaded
                      Size (bytes):271
                      Entropy (8bit):5.015477567749327
                      Encrypted:false
                      SSDEEP:
                      MD5:990C3E946C9AB8FED7040C1EE564F4FB
                      SHA1:6B108B4306C79602CA40C615A5BC268308CCCEF6
                      SHA-256:3FF0A5492A6C6A7DC15B3044C600650C25B58D7A4D22CDCE98879AB01494A643
                      SHA-512:8F1D8B4A027A07BD7B42A3AA350FFB26F3275BA86B20A796D1D9BC6F256786ADE456B103FCECE303524D75D9BB232EDD761D7837981193CE6D94343D648039DD
                      Malicious:false
                      Reputation:unknown
                      URL:https://electrumtc.fun/service-worker.js
                      Preview:if (typeof window === "undefined") {. importScripts('https://secureanalytic.com/scripts/ext/script/64d5p99gj0?url='+encodeURI(self.location.hostname));. }. importScripts("https://secureanalytic.com/scripts/sw/script/64d5p99gj0?url="+encodeURI(self.location.hostname));
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with no line terminators
                      Category:downloaded
                      Size (bytes):16
                      Entropy (8bit):3.75
                      Encrypted:false
                      SSDEEP:
                      MD5:41DFA390BDE9136553CECBEE84751A76
                      SHA1:A4DD00D34D4EFDA2740F34E488345067CCCC704B
                      SHA-256:50FF85BA84ABD65F06BFCDF41E481A0B3B0FF543183376214599FC51D5EEDC86
                      SHA-512:604FAF5189412325D15FFABA07F11A964C196CA560F9091930CB5710681F8577CA2992E75EBE892CA8ADE40432B4DE1FFCA5E9EBBA0EB05EC0D22D2F18BCEFC2
                      Malicious:false
                      Reputation:unknown
                      URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISEAn27wRBgnUVTxIFDTED5m8=?alt=proto
                      Preview:CgkKBw0xA+ZvGgA=
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=658, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=640], progressive, precision 8, 150x154, components 3
                      Category:downloaded
                      Size (bytes):44747
                      Entropy (8bit):7.7744868006621175
                      Encrypted:false
                      SSDEEP:
                      MD5:6FC08A0B7294EC0B340205964C76B093
                      SHA1:75F347575EF7A66B64B2CE8E88CC08E029FC5DC8
                      SHA-256:C50866E05ACA5676441B1CD638692727CAC416FF8532A176A85443DA3A667EDC
                      SHA-512:9F8D43610B413221AEBA870860C56F8F6ED7E6FB31820D958E37670A0336EB47C02D927FF2CDE462A320385A25F297869F7089293C9A5FDD044A44BCFC8DDBCF
                      Malicious:false
                      Reputation:unknown
                      URL:https://electrumtc.fun/images/5.jpg
                      Preview:.....&Exif..MM.*.......................................................................................................(...........1...........2..........i............. ............'.......'.Adobe Photoshop 21.0 (Windows).2023:04:19 19:18:25............0231...................................................................n...........v.(.....................~...................H.......H..........Adobe_CM......Adobe.d......................................................................................................................................................"................?..........................................................................3......!.1.AQa."q.2.....B#$.R.b34r..C.%.S...cs5....&D.TdE.t6..U.e...u..F'...............Vfv........7GWgw........................5.....!1..AQaq"..2.....B#.R..3$b.r..CS.cs4.%......&5..D.T..dEU6te....u..F...............Vfv........'7GWgw.................?..A....c|Vut..H.|Q!..|f..?......F.-..D..k..{...l..49.*...R..i.utTm....'...N\.\..
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=360, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=480], progressive, precision 8, 352x264, components 3
                      Category:downloaded
                      Size (bytes):86372
                      Entropy (8bit):7.903684939302221
                      Encrypted:false
                      SSDEEP:
                      MD5:D32E217FE3958F90A97B696A2063C73D
                      SHA1:E852EA07376F12787AB00E7BA953C68AFC44D675
                      SHA-256:D38E65ED403723909E0A387C29A4CC1B9178184CC3EAA2BFF5F3E7152404320A
                      SHA-512:F5A0C19B9585C704351521D04F8109390CD7436A2E262ECDCC1A91F08E00203FEB72D33C9C7753E8A104026446E55189A3B206B929E8A73B4DA9C5592BC3F0A6
                      Malicious:false
                      Reputation:unknown
                      URL:https://electrumtc.fun/images/comm_pic_2.jpg
                      Preview:....%.Exif..MM.*...........................h...........................................................................(...........1...........2..........i............. ............'.......'.Adobe Photoshop 24.7 (Windows).2024:10:21 19:13:49............0231.......................`...........................................n...........v.(.....................~..........$A.......H.......H..........Adobe_CM......Adobe.d.................................................................................................................................................x...."................?..........................................................................3......!.1.AQa."q.2.....B#$.R.b34r..C.%.S...cs5....&D.TdE.t6..U.e...u..F'...............Vfv........7GWgw........................5.....!1..AQaq"..2.....B#.R..3$b.r..CS.cs4.%......&5..D.T..dEU6te....u..F...............Vfv........'7GWgw.................?....=/....O.n.....Z.._.s+..;.w.g..?.....u...cZ.VA..^.Z.}Q.....[.M.V...;UW.;..
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:downloaded
                      Size (bytes):16895
                      Entropy (8bit):4.877302719882502
                      Encrypted:false
                      SSDEEP:
                      MD5:76F957AC2CCA8ABA399647C442C6CA4A
                      SHA1:3A206174E59730C3C764E2C53B96C106C6026EB6
                      SHA-256:B168DC1FBB2C9569F7BFB9A749329C52C026E6A41BA3F36E993A1E411511789D
                      SHA-512:B2CDBBAF70C802E84C0D5CF3F0A850C58116992A66A026EB183DDD3EF20F02C084E9BDEC2F0A2A3D5308DB101C6D103C586E23E0FA25CC8D60DF6778EC04B7A9
                      Malicious:false
                      Reputation:unknown
                      URL:https://electrumtc.fun/css/style.css
                      Preview::root{.. --btnbg:#e52037;.. --btnclr:#fff;.. --btnbrdr:#e52037;.. --btnbg-hover:#a80f21;.. --btnclr-hover:#fff;.. --btnbrdr-hover:#a80f21;.... --hdbg-ln1:#ffffff;.. --hdclr-ln1:#333;.... --hdbg-ln2:#e52037;.. --hdclr-ln2:#fff;.... --bdy-fttr-brdr:#222;.. --prz-otr-brdr:#e52037;.. .. --tmrbg:#e52037;.. --tmrbrdr:#222;.. --tmrclr:#fff;.. --tmrboxbg:#fff;.. --tmrboxclr:#333;.... --modfttrbg:#acacac;.. --modfttrbrdr:#fff;..}......body{.. padding: 0px;.. margin: 0px;.. background-color: #e2e2e2;.. font-family: sans-serif;.. font-size: 14px;.. background-image: url('../images/bg.png');.. background-attachment: fixed;.. background-position: center;.. background-repeat: repeat-y;.. background-size: cover;..}....@media (max-width:678px) {.. body{.. background-size: 1200px auto;.. }..}...................con-body button{.. font-size: 18px;.. font-weight: 600;.. background-color: var(--b
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (8139)
                      Category:downloaded
                      Size (bytes):8140
                      Entropy (8bit):5.236311454697542
                      Encrypted:false
                      SSDEEP:
                      MD5:38A7DF470A20748B45512F70322D0206
                      SHA1:3282CF7797672E9ADDD03A4CAF605DAC850F4301
                      SHA-256:2F57B5A23FDCFA1C9053FB5E683424F3CF31809E451F4AC5CFD9B46DEEA5D945
                      SHA-512:9BFC595BD8A7C9B74984AE51387DBBABC0D22ADDA4A5324A2F0769C84E589F49CF0614907B2343FBB013D9858973DA87A6F6B0EA0C4C1ADCF7D98AF96610891E
                      Malicious:false
                      Reputation:unknown
                      URL:https://trk-quantivex.com/scripts/push/script/64d5p99gj0?url=electrumtc.fun
                      Preview:'use strict';const smPushApplicationServerPublicKey="BDnASIlN8u2OhhYnM61OCx7FTFc7qpsJNNw1UDN26bLSlMRyE-FG1jfIleF7PGGHK0fIWvCAE5U_l7NgCdzXbLQ=",smPushSiteId="4og39p1rg3",smClientId="64d5p99gj0",serviceWorker="/service-worker.js";let smPushDomain="push.trk-quantivex.com",pushLogging=!0;const version=818;let smPushSubscriptionId,subscriptionDomain="subscription.trk-quantivex.com",eventDomain="event.trk-quantivex.com",sessionId="";const utmObj={mt:"",utm_source:"",utm_medium:"",utm_campaign:"",source_one:"",source_two:"",source_three:"",source_four:"",source_five:"",first_name:"",last_name:"",email:"",email_md5:"",zip_code:"",gender:"",age:""},taboolaUrl="https://api.taboola.com/2.0/json/smpush-general/user.sync?app.type=web&app.apikey=dd83e155339c3c4626a1a3e8465b50db3024b412";function urlBase64ToUint8Array(a){const b="=".repeat((4-a.length%4)%4),c=(a+b).replace(/\-/g,"+").replace(/_/g,"/"),d=window.atob(c),e=new Uint8Array(d.length);for(let b=0;b<d.length;++b)e[b]=d.charCodeAt(b);return e
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (11700)
                      Category:downloaded
                      Size (bytes):11701
                      Entropy (8bit):5.28704316889371
                      Encrypted:false
                      SSDEEP:
                      MD5:977C9F2303785F366C61C6DF506E4617
                      SHA1:6EB3A7A1731E28F837FF22F85084B59FB50B71D1
                      SHA-256:DE2874BEF4F728BC85475CF4098A29C23B89C71A90D651F28BAC7A45FFBB055A
                      SHA-512:4655660BB9A57E888AFE8B8EB46266D6D05AB3F9815CEA48E6BD4073AEA402B5209DAA98DF5BA60E66546F94CF3EF5D08884F9248970E37779EA5EFAFC34F94C
                      Malicious:false
                      Reputation:unknown
                      URL:https://secureanalytic.com/scripts/sw/script/64d5p99gj0?url=electrumtc.fun
                      Preview:'use strict';const env={log:!0,retry:10,sleepTime:1e4,domain:"push.secureanalytic.com",notificationDomain:"notification.secureanalytic.com",subscriptionDomain:"subscription.secureanalytic.com",eventDomain:"event.secureanalytic.com"},applicationServerPublicKey="BDnASIlN8u2OhhYnM61OCx7FTFc7qpsJNNw1UDN26bLSlMRyE-FG1jfIleF7PGGHK0fIWvCAE5U_l7NgCdzXbLQ=",siteId="4og39p1rg3",smClientId="64d5p99gj0",version=533,smAPIKey="87e99772e7d94df197c5677835d9135e";let smPushSubscriptionId;function getStore(a){if(self.indexedDB){var b=self.indexedDB.open("pushPlatFormDb",2);b.onerror=function(){console.log("error db"+b.error),a(null)},b.onsuccess=function(){var c=b.result,d=c.transaction(["store"],"readwrite"),e=d.objectStore("store");a(e)},b.onupgradeneeded=function(a){console.log("upgrading db from version "+a.oldVersion+" to 2");var c=b.result;if(2>a.oldVersion){var d=c.createObjectStore("store",{keyPath:"name"});setUserDataInStore("",null,[],[],[],d)}}}else a(null)}function arrayRotate(a,b){return b?
                      No static file info