Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://tronld2qi8x.z13.web.core.windows.net/

Overview

General Information

Sample URL:https://tronld2qi8x.z13.web.core.windows.net/
Analysis ID:1427696
Infos:

Detection

TechSupportScam
Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Yara detected TechSupportScam

Classification

  • System is w10x64
  • chrome.exe (PID: 1260 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 1068 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2520 --field-trial-handle=2040,i,6389355939676437814,4571706199680036480,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 6424 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://tronld2qi8x.z13.web.core.windows.net/" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
dropped/chromecache_62JoeSecurity_TechSupportScamYara detected TechSupportScamJoe Security
    SourceRuleDescriptionAuthorStrings
    0.3.pages.csvJoeSecurity_TechSupportScamYara detected TechSupportScamJoe Security
      0.2.pages.csvJoeSecurity_TechSupportScamYara detected TechSupportScamJoe Security
        0.0.pages.csvJoeSecurity_TechSupportScamYara detected TechSupportScamJoe Security
          0.1.pages.csvJoeSecurity_TechSupportScamYara detected TechSupportScamJoe Security
            No Sigma rule has matched
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: https://tronld2qi8x.z13.web.core.windows.net/SlashNext: detection malicious, Label: Scareware type: Phishing & Social Engineering

            Phishing

            barindex
            Source: Yara matchFile source: 0.3.pages.csv, type: HTML
            Source: Yara matchFile source: 0.2.pages.csv, type: HTML
            Source: Yara matchFile source: 0.0.pages.csv, type: HTML
            Source: Yara matchFile source: 0.1.pages.csv, type: HTML
            Source: Yara matchFile source: dropped/chromecache_62, type: DROPPED
            Source: unknownHTTPS traffic detected: 23.47.177.151:443 -> 192.168.2.4:49763 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 23.63.157.166:443 -> 192.168.2.4:49776 version: TLS 1.2
            Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
            Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
            Source: unknownTCP traffic detected without corresponding DNS query: 23.47.177.151
            Source: unknownTCP traffic detected without corresponding DNS query: 23.47.177.151
            Source: unknownTCP traffic detected without corresponding DNS query: 23.47.177.151
            Source: unknownTCP traffic detected without corresponding DNS query: 23.47.177.151
            Source: unknownTCP traffic detected without corresponding DNS query: 23.47.177.151
            Source: unknownTCP traffic detected without corresponding DNS query: 23.47.177.151
            Source: unknownTCP traffic detected without corresponding DNS query: 23.47.177.151
            Source: unknownTCP traffic detected without corresponding DNS query: 23.47.177.151
            Source: unknownTCP traffic detected without corresponding DNS query: 23.47.177.151
            Source: unknownTCP traffic detected without corresponding DNS query: 23.47.177.151
            Source: unknownTCP traffic detected without corresponding DNS query: 23.63.157.166
            Source: unknownTCP traffic detected without corresponding DNS query: 23.63.157.166
            Source: unknownTCP traffic detected without corresponding DNS query: 23.63.157.166
            Source: unknownTCP traffic detected without corresponding DNS query: 23.63.157.166
            Source: unknownTCP traffic detected without corresponding DNS query: 23.63.157.166
            Source: unknownTCP traffic detected without corresponding DNS query: 23.63.157.166
            Source: unknownTCP traffic detected without corresponding DNS query: 23.63.157.166
            Source: unknownTCP traffic detected without corresponding DNS query: 23.63.157.166
            Source: unknownTCP traffic detected without corresponding DNS query: 23.63.157.166
            Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
            Source: unknownTCP traffic detected without corresponding DNS query: 69.164.42.0
            Source: unknownTCP traffic detected without corresponding DNS query: 69.164.42.0
            Source: unknownTCP traffic detected without corresponding DNS query: 69.164.42.0
            Source: unknownTCP traffic detected without corresponding DNS query: 69.164.42.0
            Source: unknownTCP traffic detected without corresponding DNS query: 69.164.42.0
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /?lang=en HTTP/1.1Host: ipwho.isConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: */*Origin: https://tronld2qi8x.z13.web.core.windows.netSec-Fetch-Site: cross-siteSec-Fetch-Mode: corsSec-Fetch-Dest: emptyReferer: https://tronld2qi8x.z13.web.core.windows.net/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /get/script.js?referrer=https://tronld2qi8x.z13.web.core.windows.net/ HTTP/1.1Host: userstatics.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptReferer: https://tronld2qi8x.z13.web.core.windows.net/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
            Source: global trafficHTTP traffic detected: GET /fs/windows/config.json HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMTRange: bytes=0-2147483646User-Agent: Microsoft BITS/7.8Host: fs.microsoft.com
            Source: global trafficHTTP traffic detected: GET /?lang=en HTTP/1.1Host: ipwho.isConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
            Source: chromecache_70.2.drString found in binary or memory: Math.round(p);v["gtm.videoCurrentTime"]=Math.round(q);v["gtm.videoElapsedTime"]=Math.round(f);v["gtm.videoPercent"]=r;v["gtm.videoVisible"]=t;return v},Hj:function(){e=zb()},od:function(){d()}}};var gc=ia(["data-gtm-yt-inspected-"]),qC=["www.youtube.com","www.youtube-nocookie.com"],rC,sC=!1; equals www.youtube.com (Youtube)
            Source: chromecache_70.2.drString found in binary or memory: c?"runIfCanceled":"runIfUncanceled",[]);if(!g.length)return!0;var h=hA(a,c,e);M(121);if("https://www.facebook.com/tr/"===h["gtm.elementUrl"])return M(122),!0;if(d&&f){for(var m=Jb(b,g.length),n=0;n<g.length;++n)g[n](h,m);return m.done}for(var p=0;p<g.length;++p)g[p](h,function(){});return!0},kA=function(){var a=[],b=function(c){return pb(a,function(d){return d.form===c})};return{store:function(c,d){var e=b(c);e?e.button=d:a.push({form:c,button:d})},get:function(c){var d=b(c);return d?d.button:null}}}, equals www.facebook.com (Facebook)
            Source: chromecache_70.2.drString found in binary or memory: e||f||g.length||h.length))return;var n={Sg:d,Qg:e,Rg:f,Ch:g,Dh:h,we:m,zb:b},p=D.YT,q=function(){yC(n)};if(p)return p.ready&&p.ready(q),b;var r=D.onYouTubeIframeAPIReady;D.onYouTubeIframeAPIReady=function(){r&&r();q()};I(function(){for(var t=G.getElementsByTagName("script"),u=t.length,v=0;v<u;v++){var w=t[v].getAttribute("src");if(BC(w,"iframe_api")||BC(w,"player_api"))return b}for(var x=G.getElementsByTagName("iframe"),y=x.length,B=0;B<y;B++)if(!sC&&zC(x[B],n.we))return Lc("https://www.youtube.com/iframe_api"), equals www.youtube.com (Youtube)
            Source: chromecache_70.2.drString found in binary or memory: var DB=function(a,b,c,d,e){var f=Iz("fsl",c?"nv.mwt":"mwt",0),g;g=c?Iz("fsl","nv.ids",[]):Iz("fsl","ids",[]);if(!g.length)return!0;var h=Ez(a,"gtm.formSubmit",g),m=a.action;m&&m.tagName&&(m=a.cloneNode(!1).action);M(121);if("https://www.facebook.com/tr/"===m)return M(122),!0;h["gtm.elementUrl"]=m;h["gtm.formCanceled"]=c;null!=a.getAttribute("name")&&(h["gtm.interactedFormName"]=a.getAttribute("name"));e&&(h["gtm.formSubmitElement"]=e,h["gtm.formSubmitElementText"]=e.value);if(d&&f){if(!uy(h,vy(b, equals www.facebook.com (Facebook)
            Source: unknownDNS traffic detected: queries for: www.google.com
            Source: chromecache_51.2.drString found in binary or memory: http://jquery.com/
            Source: chromecache_51.2.drString found in binary or memory: http://jquery.org/license
            Source: chromecache_51.2.drString found in binary or memory: http://sizzlejs.com/
            Source: chromecache_70.2.drString found in binary or memory: https://adservice.google.com/pagead/regclk
            Source: chromecache_70.2.drString found in binary or memory: https://adservice.googlesyndication.com/pagead/regclk
            Source: chromecache_70.2.drString found in binary or memory: https://cct.google/taggy/agent.js
            Source: chromecache_78.2.drString found in binary or memory: https://ezgif.com/optimize
            Source: chromecache_62.2.drString found in binary or memory: https://ipwho.is/?lang=en
            Source: chromecache_70.2.drString found in binary or memory: https://pagead2.googlesyndication.com
            Source: chromecache_70.2.drString found in binary or memory: https://pagead2.googlesyndication.com/pagead/gen_204?id=tcfe
            Source: chromecache_70.2.drString found in binary or memory: https://stats.g.doubleclick.net/g/collect
            Source: chromecache_70.2.drString found in binary or memory: https://stats.g.doubleclick.net/g/collect?v=2&
            Source: chromecache_70.2.drString found in binary or memory: https://td.doubleclick.net
            Source: chromecache_70.2.drString found in binary or memory: https://www.google.com
            Source: chromecache_70.2.drString found in binary or memory: https://www.googleadservices.com
            Source: chromecache_70.2.drString found in binary or memory: https://www.googletagmanager.com
            Source: chromecache_62.2.drString found in binary or memory: https://www.googletagmanager.com/gtag/js?id=G-8SZJPQT3Z4
            Source: chromecache_70.2.drString found in binary or memory: https://www.merchant-center-analytics.goog
            Source: chromecache_70.2.drString found in binary or memory: https://www.youtube.com/iframe_api
            Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
            Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49672
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49790
            Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49790 -> 443
            Source: unknownHTTPS traffic detected: 23.47.177.151:443 -> 192.168.2.4:49763 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 23.63.157.166:443 -> 192.168.2.4:49776 version: TLS 1.2

            Spam, unwanted Advertisements and Ransom Demands

            barindex
            Source: Yara matchFile source: 0.3.pages.csv, type: HTML
            Source: Yara matchFile source: 0.2.pages.csv, type: HTML
            Source: Yara matchFile source: 0.0.pages.csv, type: HTML
            Source: Yara matchFile source: 0.1.pages.csv, type: HTML
            Source: Yara matchFile source: dropped/chromecache_62, type: DROPPED
            Source: classification engineClassification label: mal56.phis.win@16/58@8/5
            Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2520 --field-trial-handle=2040,i,6389355939676437814,4571706199680036480,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
            Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://tronld2qi8x.z13.web.core.windows.net/"
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2520 --field-trial-handle=2040,i,6389355939676437814,4571706199680036480,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
            Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath Interception1
            Process Injection
            1
            Process Injection
            OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media2
            Non-Application Layer Protocol
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive3
            Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
            Ingress Tool Transfer
            Traffic DuplicationData Destruction
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            https://tronld2qi8x.z13.web.core.windows.net/100%SlashNextScareware type: Phishing & Social Engineering
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            https://ipwho.is/?lang=en0%URL Reputationsafe
            https://www.merchant-center-analytics.goog0%URL Reputationsafe
            https://cct.google/taggy/agent.js0%URL Reputationsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            ipwho.is
            15.204.213.5
            truefalse
              unknown
              userstatics.com
              172.67.208.186
              truefalse
                unknown
                www.google.com
                172.253.124.106
                truefalse
                  high
                  fp2e7a.wpc.phicdn.net
                  192.229.211.108
                  truefalse
                    unknown
                    NameMaliciousAntivirus DetectionReputation
                    https://ipwho.is/?lang=enfalse
                    • URL Reputation: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://www.google.comchromecache_70.2.drfalse
                      high
                      https://www.youtube.com/iframe_apichromecache_70.2.drfalse
                        high
                        https://stats.g.doubleclick.net/g/collectchromecache_70.2.drfalse
                          high
                          http://jquery.org/licensechromecache_51.2.drfalse
                            high
                            https://td.doubleclick.netchromecache_70.2.drfalse
                              high
                              http://sizzlejs.com/chromecache_51.2.drfalse
                                high
                                https://www.merchant-center-analytics.googchromecache_70.2.drfalse
                                • URL Reputation: safe
                                unknown
                                https://stats.g.doubleclick.net/g/collect?v=2&chromecache_70.2.drfalse
                                  high
                                  https://adservice.google.com/pagead/regclkchromecache_70.2.drfalse
                                    high
                                    https://cct.google/taggy/agent.jschromecache_70.2.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://ezgif.com/optimizechromecache_78.2.drfalse
                                      high
                                      http://jquery.com/chromecache_51.2.drfalse
                                        high
                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs
                                        IPDomainCountryFlagASNASN NameMalicious
                                        15.204.213.5
                                        ipwho.isUnited States
                                        71HP-INTERNET-ASUSfalse
                                        172.67.208.186
                                        userstatics.comUnited States
                                        13335CLOUDFLARENETUSfalse
                                        172.253.124.106
                                        www.google.comUnited States
                                        15169GOOGLEUSfalse
                                        239.255.255.250
                                        unknownReserved
                                        unknownunknownfalse
                                        IP
                                        192.168.2.4
                                        Joe Sandbox version:40.0.0 Tourmaline
                                        Analysis ID:1427696
                                        Start date and time:2024-04-18 00:52:12 +02:00
                                        Joe Sandbox product:CloudBasic
                                        Overall analysis duration:0h 3m 37s
                                        Hypervisor based Inspection enabled:false
                                        Report type:full
                                        Cookbook file name:browseurl.jbs
                                        Sample URL:https://tronld2qi8x.z13.web.core.windows.net/
                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                        Number of analysed new started processes analysed:8
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Detection:MAL
                                        Classification:mal56.phis.win@16/58@8/5
                                        EGA Information:Failed
                                        HCA Information:
                                        • Successful, ratio: 100%
                                        • Number of executed functions: 0
                                        • Number of non-executed functions: 0
                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                        • Excluded IPs from analysis (whitelisted): 172.253.124.94, 172.253.124.139, 172.253.124.101, 172.253.124.138, 172.253.124.100, 172.253.124.113, 172.253.124.102, 108.177.122.84, 34.104.35.123, 20.60.128.65, 172.217.215.97, 142.250.105.113, 142.250.105.100, 142.250.105.101, 142.250.105.139, 142.250.105.102, 142.250.105.138, 13.85.23.86, 72.21.81.240, 13.85.23.206, 192.229.211.108, 20.3.187.198, 142.250.105.94
                                        • Not all processes where analyzed, report is missing behavior information
                                        • Report size getting too big, too many NtSetInformationFile calls found.
                                        • VT rate limit hit for: https://tronld2qi8x.z13.web.core.windows.net/
                                        No simulations
                                        No context
                                        No context
                                        No context
                                        No context
                                        No context
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:ASCII text, with very long lines (820)
                                        Category:downloaded
                                        Size (bytes):79064
                                        Entropy (8bit):5.3886285065472075
                                        Encrypted:false
                                        SSDEEP:1536:oqD4uWibfmaWWfiw7uOm9LofuENlx9TV6p+T3VopklvQDPj10XQjdA4+9T:opzYf/c9E5vQD6X2dA4+9T
                                        MD5:2130B7ED48A1006F774734218D916DEE
                                        SHA1:86D0AAF4ECB3EAD31C3C2739853C089D8D1DC619
                                        SHA-256:D8AF41D20B1AF69B8C2A8E0776D181A8224F17D314FC2479C8A389A9E79D0542
                                        SHA-512:6F86E053FD15052FB86228F94B06EDF586BBA0EA68C11D2F8B688A37C2379683DC7D83A6B77D81381703B5E12B28967DFD21A243AA41DBB313682D7ADBA22C93
                                        Malicious:false
                                        Reputation:low
                                        URL:https://tronld2qi8x.z13.web.core.windows.net/js/jquery-1.4.4.min.js
                                        Preview:/*!. * jQuery JavaScript Library v1.4.4. * http://jquery.com/. *. * Copyright 2010, John Resig. * Dual licensed under the MIT or GPL Version 2 licenses.. * http://jquery.org/license. *. * Includes Sizzle.js. * http://sizzlejs.com/. * Copyright 2010, The Dojo Foundation. * Released under the MIT, BSD, and GPL Licenses.. *. * Date: Thu Nov 11 19:04:53 2010 -0500. */.(function(E,B){function ka(a,b,d){if(d===B&&a.nodeType===1){d=a.getAttribute("data-"+b);if(typeof d==="string"){try{d=d==="true"?true:d==="false"?false:d==="null"?null:!c.isNaN(d)?parseFloat(d):Ja.test(d)?c.parseJSON(d):d}catch(e){}c.data(a,b,d)}else d=B}return d}function U(){return false}function ca(){return true}function la(a,b,d){d[0].type=a;return c.event.handle.apply(b,d)}function Ka(a){var b,d,e,f,h,l,k,o,x,r,A,C=[];f=[];h=c.data(this,this.nodeType?"events":"__events__");if(typeof h==="function")h=.h.events;if(!(a.liveFired===this||!h||!h.live||a.button&&a.type==="click")){if(a.namespace)A=RegExp("(^|\\.)"+a.namespace.s
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:downloaded
                                        Size (bytes):503
                                        Entropy (8bit):4.806069034061486
                                        Encrypted:false
                                        SSDEEP:6:dnPaKIGCRUJACRqSYP8B8PFCZrdEGCXaAVylvTGBi1fWBCE+ZQiGTGBC/ry1TGBD:dS7SsP3CTEGCbslvTWrBCV/lBC/TBC/Q
                                        MD5:CD6C33FBC221D0271C910AF910E6EBED
                                        SHA1:9B52F24D6F10B885BB19DB1C4B531469F96D2914
                                        SHA-256:318698AE5E67C32550D6B40AC09848D598F6317F51A8F09638BA925F6E7CC479
                                        SHA-512:13D12EE60E01EC4DDE5C1BED73A607A891D5CC857A6E161034E71159BD2A352A0F4AD8EF6038CCB2B5D7F23B8899BF9BCB97AA39EAFCC6AE985CDC835E061412
                                        Malicious:false
                                        Reputation:low
                                        URL:https://tronld2qi8x.z13.web.core.windows.net/js/jupiter.js
                                        Preview: function addEvent(obj, evt, fn) {.. if (obj.addEventListener) {.. obj.addEventListener(evt, fn, false);.. } else if (obj.attachEvent) {.. obj.attachEvent("on" + evt, fn);.. }..}....addEvent(document, 'mouseout', function(evt) {.. if (evt.toElement == null && evt.relatedTarget == null) {.. $('.lightbox').slideDown();.. };..});....$('a.close').click(function() {.. $('.lightbox').slideUp();..});..$('body').click(function() {.. $('.lightbox').slideUp();..});..
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:PNG image data, 128 x 128, 1-bit colormap, non-interlaced
                                        Category:downloaded
                                        Size (bytes):722
                                        Entropy (8bit):7.434007974065295
                                        Encrypted:false
                                        SSDEEP:12:6v/73lmhE/6TZoOuuO9bHYs8qJgwvCHa2eYZhJHobEK9trxxqpx8lOOColpjrYUA:o2E/6KphbR8mCHsYpHc3ipGl6olpB9yx
                                        MD5:42D8F2CC1AE5759C2369F255F36EBC03
                                        SHA1:8E592162EEC14E72D0A751D714A641DBECE91F6B
                                        SHA-256:31C6DBE9D867436244F38566ADAD57E3870F4C8489C6804280EB564BFAC5C1BD
                                        SHA-512:4B5BDCEC4F3D6901CD4352F81D239CE418B21D8445CD704002D2A59F4AD2DBD15DD6653F65365BD99FADCB6DF9187466F30A2543E0456EFBB869B3281C8A1E23
                                        Malicious:false
                                        Reputation:low
                                        URL:https://tronld2qi8x.z13.web.core.windows.net/images/vsc.png
                                        Preview:.PNG........IHDR....................PLTE.......g......tRNS.@..f....pHYs................eIDATx^..n.0..)..:E}.......+e.p....c^IA.....Y..a.<Q.....l..(...r..^....p....3.[.uI.....w..U...#./,..*.a\ .*"."t*dmz.;ps.#u....0..Xb....R....~.....8u0..{\...eAl.z. ...>.B.4.M...e..A...`...t..(g).......@....`.g..b.Y./....,......D...~..<..M....8.Y.;|.../c..q...@_.qO..G.....Y@..&.be...../....yN....:x..8.....<W.........*.e......^^ .4..V..9.......v..>.....*.^7.~.._.O.o.@...o).....i...&........`..P.]...@.(....{.*......M......;...o..P...H.9yzv8..A.....}(#@..e...[.5.Nu.0..V.#6 I..8.4-.4-.{...G.R..I...%.)....+T...L..2..lK.6.....G.rlS.m.66..ls......a.a.;.6^....Q`...'v..d...kv...h.......}....N..g..lN....IEND.B`.
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:PNG image data, 1920 x 4340, 8-bit colormap, non-interlaced
                                        Category:downloaded
                                        Size (bytes):462770
                                        Entropy (8bit):7.96289736720607
                                        Encrypted:false
                                        SSDEEP:12288:DXMwroWYpUUd9hSjXrTM3RR1tTmtGOqxcBt:D8gId/sXrAP/4GOccX
                                        MD5:AB996ED3B126F2B5F0C1F214B96AFE7A
                                        SHA1:77223F12976D20E06058FE40040E261BD5688F39
                                        SHA-256:4EAF7B7F53EA1A27A22BAE168F560D9DC78DC2E2185162BE9EE4DB59E1E1065A
                                        SHA-512:821C654BC048F4AA5E0B563A91D0047EACA7F1EF2AC5C481481507F1B13EE539322B82BDFB30E23064BAB6405E3F69B2B951672EFD772535BE790D8E96D0E22D
                                        Malicious:false
                                        Reputation:low
                                        URL:https://tronld2qi8x.z13.web.core.windows.net/images/bg.png
                                        Preview:.PNG........IHDR.............*.Wc....PLTE.........$..3..+w.H[....4n.lS.Ab....Js.&..TQ.......YK.__.......6....)...'..Yc....4......h.......a``...S.'(2......A{..................................................................yP.................-%...............bN.................................]( .j........D'..............TUV"i........................................................n..W.$.f..............CC<.......................n_R...V...e"......%..zk^...Qm..........................VnowwN5..t...yd../4>. ILMm>&.l...h....c....f.......:@P(..\F;.R..tn.}...|..P...O....l?.T...<........[A.L....xG.O&..|..a......hX[I..~a....P..t...Y(-O#Gzr}...E..bL.|.......gn......6P@s[....t..r....4J.n.?J.f...r..d....Y...6..v...R.C.QK...Gb.#...0.\9T.g.s4..W.7.b...@.M....mIDATx.....0...w.....*P#..u......f...6.........>t...................+.....3.A.3s.....W..<E.7;...4...7.z.C..... ....=..^..)D...^."=h G.".......e...UTVE....9.f.%.O....M.wS...m..
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:PNG image data, 520 x 520, 8-bit colormap, non-interlaced
                                        Category:downloaded
                                        Size (bytes):2681
                                        Entropy (8bit):7.104642717027869
                                        Encrypted:false
                                        SSDEEP:48:YCCiUUMR6p8vP/DjQ2aMGRXRXRXRXRXRXRXRXRXyBQ1FIyDCiiiiiiinrzMxAJl:LVUBvQfMGZZZZZZZZZLFISrQx2l
                                        MD5:B01A30D354BFCF51EDF33E0B0EA07402
                                        SHA1:C421359518D1AE258237BF501C563B7F059F8B9B
                                        SHA-256:B67A7C07A045D7CB0F2E216A557AEC0D99405E17C36D1A6B1FF3E2733AA35348
                                        SHA-512:D5424C1A03F03B72A5EE1F6F1962F07BDF9EFCEAA71299965F1EA28CD2E52AD899C1D8AE327754D5B39B355904EF7C9F26E724EA29C30B76074F87443416B3DA
                                        Malicious:false
                                        Reputation:low
                                        URL:https://tronld2qi8x.z13.web.core.windows.net/images/cs.png
                                        Preview:.PNG........IHDR.............<".Q...]PLTE.....................................................................................................tRNS..e.zQ..H^3.o....(.......7...en....IDATx.....@.D.V@...f...?.4A3..u.......c..i..*.M.c.uM...:~...........G..V....C...G.!.N.o....+J$8.\.....6..^...N.t(#..Uvp../.m ....b...q.H.jtp..b.Hpj.At.....r.]>.....}..".l.t..c.>"..i.qY..%$.4..........8X4i.B.Cs..)!.(...F..H0J8@.Q.......`.p.....$.%. .(...F..H0J8@.Q.......`.p.....$.%. .(...F..H0J8@.Q.......`.p.....$.%. .(...F..H0J8@.Q.......`.p.....$.%. .(...F..H0J8@.Q.......`...H0..$X..$....$.}......@.......A..^.............Z.......V..M.......L....L....L..&.L........L.....u...........`...L87..g.<0...&......f=0.i.L.m...~....o3...i.....}`...Lx.......L........................................................................................0..@..........M..L..L..L..L..L..L..L..L..L..L..L..L...1......b..1....AL. &x..<......b..1....AL. &x..<......b..1....AL. &x..<......b..1....AL. &x..<.....
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:PNG image data, 1056 x 908, 8-bit/color RGBA, non-interlaced
                                        Category:dropped
                                        Size (bytes):99389
                                        Entropy (8bit):7.948180012126474
                                        Encrypted:false
                                        SSDEEP:3072:6cx6AZ6LGPH8lJrpSgVxdHNs04mTQrJvlB6qkrKpP:gAXklJdSgVDHB4oQFtBLkrAP
                                        MD5:6B11AD15DA74888BEA9095007A9F7DD6
                                        SHA1:E0BC4A256C552041A88FDAF1A33E8F6494FCFD78
                                        SHA-256:93AB9DDC223156F5F4BA7FF8FC14A885E9B5946FC10917571022D7C2D9A08886
                                        SHA-512:709C9A16C5712E141293293FD10E8182B32B89C21F3220BD1BDC8F3C364A6593FAE401FFA52B540041B1528312D47D8495DA81CD8B705AE8CEF92103DBCEBAA3
                                        Malicious:false
                                        Reputation:low
                                        Preview:.PNG........IHDR... ............~....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:PNG image data, 166 x 92, 4-bit colormap, non-interlaced
                                        Category:downloaded
                                        Size (bytes):1270
                                        Entropy (8bit):6.670080953747829
                                        Encrypted:false
                                        SSDEEP:24:Y70L1hSWwjx82lY2T3wQV/duYWXN6yJ3VmhW9/G4LF3+F5daOZt2gwF:YoBNn2cQNyXHJ3L9TFuFaW2go
                                        MD5:05CDF1A2C2FC8F07BEA0A8F4F9356637
                                        SHA1:B7BBD626D1D6C832509E820CAE1D971B34F625E6
                                        SHA-256:AFE332157F4EFE355F3181284E99F4331C4D19703ED1678B5316D2933F95E98E
                                        SHA-512:D8F168BBEE250FAC06382AA8FA52B6AD72AF44C760E474BC0F3E6DA94BA1677F90B543EC582A345BD8DEC45BD1705A81DEE797E718D028E47FCFF9044D4200E6
                                        Malicious:false
                                        Reputation:low
                                        URL:https://tronld2qi8x.z13.web.core.windows.net/images/pcm.png
                                        Preview:.PNG........IHDR.......\........;....gAMA......a.....sRGB........#iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 6.0-c002 79.164488, 2020/07/10-22:06:53 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop 22.0 (Windows)" xmpMM:InstanceID="xmp.iid:F17B94CFCABF11EBBAB7FB721269615E" xmpMM:DocumentID="xmp.did:F17B94D0CABF11EBBAB7FB721269615E"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:F17B94CDCABF11EBBAB7FB721269615E" stRef:documentID="xmp.did:F17B94CECABF11EBBAB7FB721269615E"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>..F.....tEXtSoftware.Adobe ImageReadyq.e<....PLTELiq..............nz....}&[}....tRNS.z.r.N.....IDATX.....@.E..o1.B........b..
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:PNG image data, 12 x 12, 8-bit/color RGB, non-interlaced
                                        Category:downloaded
                                        Size (bytes):364
                                        Entropy (8bit):7.161449027375991
                                        Encrypted:false
                                        SSDEEP:6:6v/lhPkd5nDsLiRa6NhNj1aUIXtYRJiTDc7VkC0hWQpPBPFLsfd9EZXlo1p:6v/7yOLiRa6NzJJyusykCmpBFLoGi
                                        MD5:E144C3378090087C8CE129A30CB6CB4E
                                        SHA1:59DA5466551DE941D0215E45C54AA2CEAF436BE1
                                        SHA-256:B13A03E0DB893734298CBE203BF264407636FFE5DAB0A141F83C492D0034DD6A
                                        SHA-512:3004885B1DCC8C8544024F3C1345B80AB6B50759F290A3545BFA4ED7EA93426E838B7A04556294298BAD1C6198431FBDE06E999628E45DE10119DD1D4FABE32A
                                        Malicious:false
                                        Reputation:low
                                        URL:https://tronld2qi8x.z13.web.core.windows.net/images/set.png
                                        Preview:.PNG........IHDR....................tEXtSoftware.Adobe ImageReadyq.e<....IDATx.\...E@.....TB...-n$...(....5T.7.x.=ZQ...l(n#....WL....N..rY..WY.%I..0.UU/N....|.,K...)...mEQ,.b].p.....8.u]..<....'...ih.....8`.8.........eY..^.o=..........4M..EQ?.B...a.v...q.e..A.^.W.E.4......e.}......+.0........+......m.TI|...3MS0.,{.wq.w.$.>|....0.u.{........IEND.B`.
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:PNG image data, 13 x 13, 8-bit colormap, non-interlaced
                                        Category:dropped
                                        Size (bytes):276
                                        Entropy (8bit):5.44393413565082
                                        Encrypted:false
                                        SSDEEP:6:6v/lhPfElUH+sbxFMAhClyVRpkv2g96+RWT8up:6v/7klbsbzTh2spkv2gR9c
                                        MD5:7616D96C388301E391653647E1F5F057
                                        SHA1:B1868C8F0F46309A8E26F584AC82000D54C06ECD
                                        SHA-256:4C1606563842CCE5F1788329D4417AE3618B33C6365C56A7122439B6AB45C977
                                        SHA-512:C7E5938D274D9D8B5218CF05F83B9B14CC89D1C9B4A7A18596354C548A84D499BC3818E242EDB2F1376A561DEC7DEBA134DD2ADAAC0283C145DA77CA43A8E517
                                        Malicious:false
                                        Reputation:low
                                        Preview:.PNG........IHDR.............E5.N...NPLTE...fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff=u......tRNS..zS...G...j.."...)..m.....(....[IDATx.e.I.. .C......E..n...i..T..}.....M.jDCB....,.e.<lg@.O...:K.P.5J..C.g.[...k...W.s...1.t..r....IEND.B`.
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:PNG image data, 31 x 30, 4-bit colormap, non-interlaced
                                        Category:downloaded
                                        Size (bytes):168
                                        Entropy (8bit):5.414614498746933
                                        Encrypted:false
                                        SSDEEP:3:yionv//thPlKhhmtloZN8s02V42/uDlhlMmI/5DUZfm4XM43ialaRAFRFlvHBlv+:6v/lhPemtl6Q2B/6TfI5IZfmYSal86RC
                                        MD5:ACB05EBCD5F488FC99169CFF02B6DD04
                                        SHA1:DCA893A7B514503E947A57AA072482A0E0CBA912
                                        SHA-256:1AB5EF4E7E196CB1FF39DF44E1A0A39F6880B906EF6FD6DA3CFDBB92FFD33115
                                        SHA-512:13FB028E0B360C36355FBE5D98377548B6008E6939D3AC5296FD20FE7C52359183BFCA7505AD9EF7C8BFE068FB59B91850F86D4C11765746850737174EFF522E
                                        Malicious:false
                                        Reputation:low
                                        URL:https://tronld2qi8x.z13.web.core.windows.net/images/msmm.png
                                        Preview:.PNG........IHDR.............&......sRGB...,.....pHYs.................PLTE.P!............]2.....tRNS......../...!IDATx.c`..A%..`........1...@......"@M........IEND.B`.
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:PNG image data, 13 x 13, 8-bit colormap, non-interlaced
                                        Category:downloaded
                                        Size (bytes):276
                                        Entropy (8bit):5.44393413565082
                                        Encrypted:false
                                        SSDEEP:6:6v/lhPfElUH+sbxFMAhClyVRpkv2g96+RWT8up:6v/7klbsbzTh2spkv2gR9c
                                        MD5:7616D96C388301E391653647E1F5F057
                                        SHA1:B1868C8F0F46309A8E26F584AC82000D54C06ECD
                                        SHA-256:4C1606563842CCE5F1788329D4417AE3618B33C6365C56A7122439B6AB45C977
                                        SHA-512:C7E5938D274D9D8B5218CF05F83B9B14CC89D1C9B4A7A18596354C548A84D499BC3818E242EDB2F1376A561DEC7DEBA134DD2ADAAC0283C145DA77CA43A8E517
                                        Malicious:false
                                        Reputation:low
                                        URL:https://tronld2qi8x.z13.web.core.windows.net/images/bel.png
                                        Preview:.PNG........IHDR.............E5.N...NPLTE...fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff=u......tRNS..zS...G...j.."...)..m.....(....[IDATx.e.I.. .C......E..n...i..T..}.....M.jDCB....,.e.<lg@.O...:K.P.5J..C.g.[...k...W.s...1.t..r....IEND.B`.
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:HTML document, ASCII text, with very long lines (522)
                                        Category:downloaded
                                        Size (bytes):19089
                                        Entropy (8bit):4.5540592106037
                                        Encrypted:false
                                        SSDEEP:192:fNLW3lDcMPo6w6j1P4Ur4U+VsBuULdzmGmKABCXuRNRDxwU:FklDccz1PNrNcCuGdzmGaB7
                                        MD5:646B6D06A712BA36DCF54B6523E60261
                                        SHA1:3DD7021EA2E55F331D4A2C22C4AF6A7A1E534E32
                                        SHA-256:3BF63792BE6646E4F3A448FD8160EC949AECAD7CD901E55AD199F3D343DDC27B
                                        SHA-512:367201F5CAD86799ED3A1BD4426037116CEC54DCCEC026EE85F50FD5EE5B6F693EC17B086EB765E958374E3220ABB586E6DC7B0F3231CC969D9BB104BD794E89
                                        Malicious:false
                                        Reputation:low
                                        URL:https://tronld2qi8x.z13.web.core.windows.net/
                                        Preview:<html lang="en"><head>. <meta charset="utf-8">. <meta content="width=device-width,initial-scale=1,shrink-to-fit=no" name="viewport">. <meta content="noindex,nofollow" name="robots">. <title>System Error Code Er0erydfd1</title>. <link href="images/msmm.png" rel="icon" id="favicon" type="image/png">. <link href="css/tapa.css" rel="stylesheet">.. <script type="text/javascript" src="js/jquery-1.4.4.min.js"></script>. <script type="text/javascript">//<![CDATA[. $(function(){. $('body').bind('contextmenu', function(e){. return false;. });. });// . </script>. Global site tag (gtag.js) - Google Analytics -->.<script async="" src="https://www.googletagmanager.com/gtag/js?id=G-8SZJPQT3Z4"></script>.<script>. window.dataLayer = window.dataLayer || [];. function gtag(){dataLayer.push(arguments);}. gtag('js', new Date());.. gtag('config', 'G-8SZJPQT3Z4');.</script>... <script>. var t = new XMLHttpRequest;. t.onreadystatechange = fu
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:HTML document, ASCII text, with very long lines (321), with no line terminators
                                        Category:downloaded
                                        Size (bytes):321
                                        Entropy (8bit):5.0797555131353365
                                        Encrypted:false
                                        SSDEEP:6:haxU0H2rKRHX96TdzRHxhgR0zY2i21sasPrK5YWORT5AesdyR2p04hwmw2E:hax0rKRHkhzRH/Un2i2GprK5YWO15Aer
                                        MD5:965A80B5F2F52DB2B45891BA2A789739
                                        SHA1:3E0CC63C6BD49530A171AE4B12A293AE7DA9C064
                                        SHA-256:04AFEE11350B8526EAD14EF0D0CA42C3F350CEE7446A1AD09F3C299A35402541
                                        SHA-512:DD99AD6F41A960E2A463641C471EB319A2D047C112B89498874831FE789C34E020BC8F3B05B8832651B498600866770E1F80F6C5186D83913E0DC12254A26F4F
                                        Malicious:false
                                        Reputation:low
                                        URL:https://tronld2qi8x.z13.web.core.windows.net/w1.png
                                        Preview:<!DOCTYPE html><html><head><title>WebContentNotFound</title></head><body><h1>The requested content does not exist.</h1><p><ul><li>HttpStatusCode: 404</li><li>ErrorCode: WebContentNotFound</li><li>RequestId : 8e926b4e-401e-0032-4b1a-916a89000000</li><li>TimeStamp : 2024-04-17T22:53:13.9850191Z</li></ul></p></body></html>
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:PNG image data, 166 x 92, 4-bit colormap, non-interlaced
                                        Category:dropped
                                        Size (bytes):1270
                                        Entropy (8bit):6.670080953747829
                                        Encrypted:false
                                        SSDEEP:24:Y70L1hSWwjx82lY2T3wQV/duYWXN6yJ3VmhW9/G4LF3+F5daOZt2gwF:YoBNn2cQNyXHJ3L9TFuFaW2go
                                        MD5:05CDF1A2C2FC8F07BEA0A8F4F9356637
                                        SHA1:B7BBD626D1D6C832509E820CAE1D971B34F625E6
                                        SHA-256:AFE332157F4EFE355F3181284E99F4331C4D19703ED1678B5316D2933F95E98E
                                        SHA-512:D8F168BBEE250FAC06382AA8FA52B6AD72AF44C760E474BC0F3E6DA94BA1677F90B543EC582A345BD8DEC45BD1705A81DEE797E718D028E47FCFF9044D4200E6
                                        Malicious:false
                                        Reputation:low
                                        Preview:.PNG........IHDR.......\........;....gAMA......a.....sRGB........#iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 6.0-c002 79.164488, 2020/07/10-22:06:53 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop 22.0 (Windows)" xmpMM:InstanceID="xmp.iid:F17B94CFCABF11EBBAB7FB721269615E" xmpMM:DocumentID="xmp.did:F17B94D0CABF11EBBAB7FB721269615E"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:F17B94CDCABF11EBBAB7FB721269615E" stRef:documentID="xmp.did:F17B94CECABF11EBBAB7FB721269615E"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>..F.....tEXtSoftware.Adobe ImageReadyq.e<....PLTELiq..............nz....}&[}....tRNS.z.r.N.....IDATX.....@.E..o1.B........b..
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:PNG image data, 12 x 12, 8-bit/color RGB, non-interlaced
                                        Category:dropped
                                        Size (bytes):364
                                        Entropy (8bit):7.161449027375991
                                        Encrypted:false
                                        SSDEEP:6:6v/lhPkd5nDsLiRa6NhNj1aUIXtYRJiTDc7VkC0hWQpPBPFLsfd9EZXlo1p:6v/7yOLiRa6NzJJyusykCmpBFLoGi
                                        MD5:E144C3378090087C8CE129A30CB6CB4E
                                        SHA1:59DA5466551DE941D0215E45C54AA2CEAF436BE1
                                        SHA-256:B13A03E0DB893734298CBE203BF264407636FFE5DAB0A141F83C492D0034DD6A
                                        SHA-512:3004885B1DCC8C8544024F3C1345B80AB6B50759F290A3545BFA4ED7EA93426E838B7A04556294298BAD1C6198431FBDE06E999628E45DE10119DD1D4FABE32A
                                        Malicious:false
                                        Reputation:low
                                        Preview:.PNG........IHDR....................tEXtSoftware.Adobe ImageReadyq.e<....IDATx.\...E@.....TB...-n$...(....5T.7.x.=ZQ...l(n#....WL....N..rY..WY.%I..0.UU/N....|.,K...)...mEQ,.b].p.....8.u]..<....'...ih.....8`.8.........eY..^.o=..........4M..EQ?.B...a.v...q.e..A.^.W.E.4......e.}......+.0........+......m.TI|...3MS0.,{.wq.w.$.>|....0.u.{........IEND.B`.
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:PNG image data, 31 x 30, 4-bit colormap, non-interlaced
                                        Category:dropped
                                        Size (bytes):168
                                        Entropy (8bit):5.414614498746933
                                        Encrypted:false
                                        SSDEEP:3:yionv//thPlKhhmtloZN8s02V42/uDlhlMmI/5DUZfm4XM43ialaRAFRFlvHBlv+:6v/lhPemtl6Q2B/6TfI5IZfmYSal86RC
                                        MD5:ACB05EBCD5F488FC99169CFF02B6DD04
                                        SHA1:DCA893A7B514503E947A57AA072482A0E0CBA912
                                        SHA-256:1AB5EF4E7E196CB1FF39DF44E1A0A39F6880B906EF6FD6DA3CFDBB92FFD33115
                                        SHA-512:13FB028E0B360C36355FBE5D98377548B6008E6939D3AC5296FD20FE7C52359183BFCA7505AD9EF7C8BFE068FB59B91850F86D4C11765746850737174EFF522E
                                        Malicious:false
                                        Reputation:low
                                        Preview:.PNG........IHDR.............&......sRGB...,.....pHYs.................PLTE.P!............]2.....tRNS......../...!IDATx.c`..A%..`........1...@......"@M........IEND.B`.
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:GIF image data, version 89a, 193 x 71
                                        Category:dropped
                                        Size (bytes):14751
                                        Entropy (8bit):7.927919850442063
                                        Encrypted:false
                                        SSDEEP:384:NiDfi0nwQ3tIzj2nK7xnnw8/8D2gi1jqaAyLrwjWVkvY597Kk/USIZ:NMfiU3mWKVnF06gi1j6+cskvo9W6UH
                                        MD5:6FCB78E0CD7933A70EEA2CF071F82118
                                        SHA1:70364BFFD62FE33360ABE70ECC7F7C0541B3B54C
                                        SHA-256:4B436B0B6A47DB85C88F83DC3FE3FD9A96C0A4018B28832165DF929DFFE0BC86
                                        SHA-512:AF086B13F6041FED8F9457FD4FEA33B3BF4A1ED985A4EDAF8E59AD22A772652D83A619D070BEE3C81686166717526D5C2EF3097C1C088E4729FB15B09CAEA961
                                        Malicious:false
                                        Reputation:low
                                        Preview:GIF89a..G............d....;.........z..|...........d..{.......p`.r.m^.{.........cqa..........u......dsc.......v.rb.{....a.........s...`.........qe.{........u...b...sh.{.........v.{..pi.......u.qi....t.ph..........r...api.z..........r.oh........z.}..{....coj.......s.{....bmn.....mp.......y...`mt.{....................................................................!..NETSCAPE2.0.....!.)Optimized with https://ezgif.com/optimize.!.......,......G......I..8...`(.di.h..l.p,.tm.x..|....pH,...r.l:..tJ.Z..v..z..xL....z.n.....w#..z[N..~.....................................m....W......i....X.........D.........G.../...*..!...............F.............. .V......Kwo`9...]1....u.#......(..xQ.....#z..R...%....J&([.{YC@0..i*..sb...z.<)......R..)...:..t.T.6..m.3...l..V....G[....,.j.UG..V.U...:.l.....+T0.]...&.8.....;f..1.....I ....v6.:oi"..l........K.,al.............N<x..!.......,......6......I..8...`.0ai.h..,...+.tm....|..!.n....H[.8L:.P...Z.
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:PNG image data, 1056 x 908, 8-bit/color RGBA, non-interlaced
                                        Category:downloaded
                                        Size (bytes):99389
                                        Entropy (8bit):7.948180012126474
                                        Encrypted:false
                                        SSDEEP:3072:6cx6AZ6LGPH8lJrpSgVxdHNs04mTQrJvlB6qkrKpP:gAXklJdSgVDHB4oQFtBLkrAP
                                        MD5:6B11AD15DA74888BEA9095007A9F7DD6
                                        SHA1:E0BC4A256C552041A88FDAF1A33E8F6494FCFD78
                                        SHA-256:93AB9DDC223156F5F4BA7FF8FC14A885E9B5946FC10917571022D7C2D9A08886
                                        SHA-512:709C9A16C5712E141293293FD10E8182B32B89C21F3220BD1BDC8F3C364A6593FAE401FFA52B540041B1528312D47D8495DA81CD8B705AE8CEF92103DBCEBAA3
                                        Malicious:false
                                        Reputation:low
                                        URL:https://tronld2qi8x.z13.web.core.windows.net/images/bx1.png
                                        Preview:.PNG........IHDR... ............~....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:PNG image data, 100 x 100, 1-bit colormap, non-interlaced
                                        Category:downloaded
                                        Size (bytes):332
                                        Entropy (8bit):6.871743379185684
                                        Encrypted:false
                                        SSDEEP:6:6v/lhP8SsClmDlhK7/6TmMUnl/iIntVNqCsCja6K97kCuQKQZ99z/p7WMFbip:6v/7NLlWhE/6TmLnl/vtiC068A3/IVxs
                                        MD5:9D8A90A63D20F05D27E5D6ABB35E0CD0
                                        SHA1:5873B4007E9D55B4D891A4C427B3735ED23DBFE8
                                        SHA-256:7DF9F467D23EE1887EDB2123CCA10A1A9C4624CDCF7199C64E78A8430031F9F5
                                        SHA-512:DE64196F0A8E375DB6E4EFFF5F53AD2E77B9336D045C937C81CE1F1DED039844AB0E9F66B1599301CAF795532C9F03F0A6FD45A0117233C4BF2862419C280CC6
                                        Malicious:false
                                        Reputation:low
                                        URL:https://tronld2qi8x.z13.web.core.windows.net/images/dm.png
                                        Preview:.PNG........IHDR...d...d.....J,......PLTE.......g......tRNS.@..f....pHYs.................IDATx^..1n. ..`#...@.r.N.U.I.9.G..22 Sp..A^U.c..O.0...e}h[..}....9.L...Q.@'..%I.a.F.X.P`..*..cu.oD...}.K.wP....e}*.....'~..2..."...N..M.5.Ep...E>I5.".hg..6.e...)...H...l.!7.bXX.p.'..I../RI."_...K.QJiB..3x.~....z.;..#....5W.....IEND.B`.
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:ASCII text, with very long lines (5955)
                                        Category:downloaded
                                        Size (bytes):299883
                                        Entropy (8bit):5.564220533455295
                                        Encrypted:false
                                        SSDEEP:3072:kK4agnq+71vbzwHn239Q/8hnp2LUF1eFS+MCY55CgY8pv1Hg6nLP/w22uaoa/on:p4Vq8wH2tNnVL55Cv8pNHgMLn2uj
                                        MD5:8C2E5B06847F81285EF9CCD48BDE341A
                                        SHA1:2B999B8F6338F39F49ABFF7FC51EAE16D39A1BED
                                        SHA-256:3A235027BF5ABAEC6C9232FBE0D9FF65B0DD5FF9E9C90F1D5EC0A9D72592CCC5
                                        SHA-512:2580ADDF2F9F59EF2DB25E6CFDE7C26FD696334D5479B469DC0E24F72FF79F21DF9CA87D1E5DB5419B8705E47B48C675699ACFF91227C8AA580B6A6932AF20AA
                                        Malicious:false
                                        Reputation:low
                                        URL:https://www.googletagmanager.com/gtag/js?id=G-8SZJPQT3Z4
                                        Preview:.// Copyright 2012 Google Inc. All rights reserved.. .(function(){..var data = {."resource": {. "version":"1",. . "macros":[{"function":"__e"},{"vtp_signal":0,"function":"__c","vtp_value":0},{"function":"__c","vtp_value":""},{"function":"__c","vtp_value":0},{"vtp_signal":0,"function":"__c","vtp_value":0},{"function":"__c","vtp_value":""},{"function":"__c","vtp_value":0}],. "tags":[{"function":"__ogt_1p_data_v2","priority":14,"vtp_isAutoEnabled":true,"vtp_autoCollectExclusionSelectors":["list",["map","exclusionSelector",""]],"vtp_isEnabled":true,"vtp_cityType":"CSS_SELECTOR","vtp_manualEmailEnabled":false,"vtp_firstNameType":"CSS_SELECTOR","vtp_countryType":"CSS_SELECTOR","vtp_cityValue":"","vtp_emailType":"CSS_SELECTOR","vtp_regionType":"CSS_SELECTOR","vtp_autoEmailEnabled":true,"vtp_postalCodeValue":"","vtp_lastNameValue":"","vtp_phoneType":"CSS_SELECTOR","vtp_phoneValue":"","vtp_streetType":"CSS_SELECTOR","vtp_autoPhoneEnabled":false,"vtp_postalCodeType":"CSS_SELECTOR","vtp_email
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:HTML document, ASCII text, with very long lines (321), with no line terminators
                                        Category:downloaded
                                        Size (bytes):321
                                        Entropy (8bit):5.066088059482697
                                        Encrypted:false
                                        SSDEEP:6:haxU0H2rKRHX96TdzRHxhgR0zY2i21sasPrK5YWOJVqR2p04hkkXZw5E:hax0rKRHkhzRH/Un2i2GprK5YWOJ8eSG
                                        MD5:3ECCDE784D760F1678DAD6B5A39F5778
                                        SHA1:5D947E4A12D27E1B4B4F87F627FFA83CFB7F64B6
                                        SHA-256:B46AD606C5B3BF7F460350147F42400E8190948B55E1B806D2B5B0A151CE2220
                                        SHA-512:ECB2560E409079927FDBC55B68F9ADC3C05C91A2DC0EEBA9668C738DF62A21EE4422971CCF797AAA835650075F9A613CDC90F1297912B7E6EDCF69D0CE0E59DF
                                        Malicious:false
                                        Reputation:low
                                        URL:https://tronld2qi8x.z13.web.core.windows.net/w3.png
                                        Preview:<!DOCTYPE html><html><head><title>WebContentNotFound</title></head><body><h1>The requested content does not exist.</h1><p><ul><li>HttpStatusCode: 404</li><li>ErrorCode: WebContentNotFound</li><li>RequestId : e7fe0a99-301e-005a-671a-910c19000000</li><li>TimeStamp : 2024-04-17T22:53:12.9023902Z</li></ul></p></body></html>
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:ASCII text, with very long lines (2083), with no line terminators
                                        Category:downloaded
                                        Size (bytes):2083
                                        Entropy (8bit):5.0463133028709635
                                        Encrypted:false
                                        SSDEEP:48:W/iGbnd2lcCB2/GxUH3M1+Rh9FNGDzjUYx7u9rDTlRSg40:Y9d2ldWR017MDE0
                                        MD5:33B3E05F86FE68782A71C3EB89C637DF
                                        SHA1:B4271F567F27351847B2CA127DCB8D88A03300A3
                                        SHA-256:B1A5978232E5BAD9D779EC449BBBB365E393A818D44DAE1A38C97BAD79ADA48F
                                        SHA-512:E60CD591C34640B39CB95BA14F90CD0563A4B25E4F26212F5FC79203A09463CF2DD5C787230385270BD0A725379568F518C814D326ABDCDB347F8A955CAC78AA
                                        Malicious:false
                                        Reputation:low
                                        URL:https://tronld2qi8x.z13.web.core.windows.net/js/nvidia.js
                                        Preview:function toggleFullScreen(e){var n=document.body;e instanceof HTMLElement&&(n=e);var t=document.webkitIsFullScreen||document.mozFullScreen||!1;n.requestFullScreen=n.requestFullScreen||n.webkitRequestFullScreen||n.mozRequestFullScreen||function(){return!1},document.cancelFullScreen=document.cancelFullScreen||document.webkitCancelFullScreen||document.mozCancelFullScreen||function(){return!1},t?document.cancelFullScreen():n.requestFullScreen()}function addEvent(e,n,t){e.addEventListener?e.addEventListener(n,t,!1):e.attachEvent&&e.attachEvent("on"+n,t)}$(document).ready(function(){var e=document.createElement("audio");e.setAttribute("src","ai2.mp3"),e.addEventListener("ended",function(){this.play()},!1),$(".map").click(function(){e.play()}),$(".black").click(function(){e.play()}),$("#footer").click(function(){e.play()}),$("#qwrqwewrqwdqw").click(function(){e.play()})}),$(document).ready(function(){$("body").mouseover(function(){$("#footer").fadeIn("").css({bottom:-20,position:"fixed"}).ani
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:PNG image data, 128 x 128, 1-bit colormap, non-interlaced
                                        Category:dropped
                                        Size (bytes):722
                                        Entropy (8bit):7.434007974065295
                                        Encrypted:false
                                        SSDEEP:12:6v/73lmhE/6TZoOuuO9bHYs8qJgwvCHa2eYZhJHobEK9trxxqpx8lOOColpjrYUA:o2E/6KphbR8mCHsYpHc3ipGl6olpB9yx
                                        MD5:42D8F2CC1AE5759C2369F255F36EBC03
                                        SHA1:8E592162EEC14E72D0A751D714A641DBECE91F6B
                                        SHA-256:31C6DBE9D867436244F38566ADAD57E3870F4C8489C6804280EB564BFAC5C1BD
                                        SHA-512:4B5BDCEC4F3D6901CD4352F81D239CE418B21D8445CD704002D2A59F4AD2DBD15DD6653F65365BD99FADCB6DF9187466F30A2543E0456EFBB869B3281C8A1E23
                                        Malicious:false
                                        Reputation:low
                                        Preview:.PNG........IHDR....................PLTE.......g......tRNS.@..f....pHYs................eIDATx^..n.0..)..:E}.......+e.p....c^IA.....Y..a.<Q.....l..(...r..^....p....3.[.uI.....w..U...#./,..*.a\ .*"."t*dmz.;ps.#u....0..Xb....R....~.....8u0..{\...eAl.z. ...>.B.4.M...e..A...`...t..(g).......@....`.g..b.Y./....,......D...~..<..M....8.Y.;|.../c..q...@_.qO..G.....Y@..&.be...../....yN....:x..8.....<W.........*.e......^^ .4..V..9.......v..>.....*.^7.~.._.O.o.@...o).....i...&........`..P.]...@.(....{.*......M......;...o..P...H.9yzv8..A.....}(#@..e...[.5.Nu.0..V.#6 I..8.4-.4-.{...G.R..I...%.)....+T...L..2..lK.6.....G.rlS.m.66..ls......a.a.;.6^....Q`...'v..d...kv...h.......}....N..g..lN....IEND.B`.
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:assembler source, ASCII text, with very long lines (324), with CRLF line terminators
                                        Category:downloaded
                                        Size (bytes):18178
                                        Entropy (8bit):4.868191588228292
                                        Encrypted:false
                                        SSDEEP:192:m5pyua9kzmx5XO0CfsXLruzG61fMDl1tFpFab5rjloqSrXVrqODz7frYYkYYPlcr:6pyusXrJm4lICr
                                        MD5:7EB9DB6D3E4C84E0E29BEE4CC963F3A0
                                        SHA1:BEBA530C07ECB65C1C80BC73429BBB01B812EB0B
                                        SHA-256:B93DABEBD37A3D0F9067554802BA410632C88E12DB36C17CB586719E4A3ABA71
                                        SHA-512:E931634C19125A4D1EC41283DBB9A4AFCF287A2B80B924760D69FDB1E42F3740336FF4F0F8F4E66A65FF2CCBCDACBAFB7F61023C305653CDDD70A2BAD84B1B11
                                        Malicious:false
                                        Reputation:low
                                        URL:https://tronld2qi8x.z13.web.core.windows.net/css/tapa.css
                                        Preview:.table,label {.. max-width: 100%..}.....btn:focus,.btn:hover,body {.. color: #333..}....#txtintro,.row:after {.. clear: both..}....#bottom ul,.mar_top ul,.total_detail ul,.total_detail_scan ul {.. list-style-type: none..}....#footer,#qwrqwewrqwdqw,.btn,[role=button],button {.. cursor: pointer..}....@-webkit-keyframes progress-bar-stripes {.. 0% {.. background-position: 40px 0.. }.... to {.. background-position: 0 0.. }..}....@-o-keyframes progress-bar-stripes {.. 0% {.. background-position: 40px 0.. }.... to {.. background-position: 0 0.. }..}....@keyframes progress-bar-stripes {.. 0% {.. background-position: 40px 0.. }.... to {.. background-position: 0 0.. }..}....@keyframes rotate {.. 0% {.. transform: rotate(0).. }.... to {.. transform: rotate(360deg).. }..}....@keyframes zoominoutsinglefeatured {.. 0%,to {.. transform: scale(1,1).. }.... 50% {..
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:PNG image data, 1920 x 4340, 8-bit colormap, non-interlaced
                                        Category:dropped
                                        Size (bytes):462770
                                        Entropy (8bit):7.96289736720607
                                        Encrypted:false
                                        SSDEEP:12288:DXMwroWYpUUd9hSjXrTM3RR1tTmtGOqxcBt:D8gId/sXrAP/4GOccX
                                        MD5:AB996ED3B126F2B5F0C1F214B96AFE7A
                                        SHA1:77223F12976D20E06058FE40040E261BD5688F39
                                        SHA-256:4EAF7B7F53EA1A27A22BAE168F560D9DC78DC2E2185162BE9EE4DB59E1E1065A
                                        SHA-512:821C654BC048F4AA5E0B563A91D0047EACA7F1EF2AC5C481481507F1B13EE539322B82BDFB30E23064BAB6405E3F69B2B951672EFD772535BE790D8E96D0E22D
                                        Malicious:false
                                        Reputation:low
                                        Preview:.PNG........IHDR.............*.Wc....PLTE.........$..3..+w.H[....4n.lS.Ab....Js.&..TQ.......YK.__.......6....)...'..Yc....4......h.......a``...S.'(2......A{..................................................................yP.................-%...............bN.................................]( .j........D'..............TUV"i........................................................n..W.$.f..............CC<.......................n_R...V...e"......%..zk^...Qm..........................VnowwN5..t...yd../4>. ILMm>&.l...h....c....f.......:@P(..\F;.R..tn.}...|..P...O....l?.T...<........[A.L....xG.O&..|..a......hX[I..~a....P..t...Y(-O#Gzr}...E..bL.|.......gn......6P@s[....t..r....4J.n.?J.f...r..d....Y...6..v...R.C.QK...Gb.#...0.\9T.g.s4..W.7.b...@.M....mIDATx.....0...w.....*P#..u......f...6.........>t...................+.....3.A.3s.....W..<E.7;...4...7.z.C..... ....=..^..)D...^."=h G.".......e...UTVE....9.f.%.O....M.wS...m..
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:PNG image data, 140 x 30, 1-bit colormap, non-interlaced
                                        Category:downloaded
                                        Size (bytes):187
                                        Entropy (8bit):6.13774750591943
                                        Encrypted:false
                                        SSDEEP:3:yionv//thPlDBTBwl5yTzcVrK42/uDlhl+fpq06IcNZd2yYgCKfLv3/tLGQctJmc:6v/lhPbTS+TABK7/6TCVkj2If/tLGmY5
                                        MD5:271021CFA45940978184BE0489841FD3
                                        SHA1:201030AF9B1BC5D3C8D453EFBFDF89B68D6C1BE5
                                        SHA-256:C5A324F181AF16879B6C4C52B731B23392F2816DEF159B157C4DE620CFF1CD41
                                        SHA-512:EFA6766F88B385F91EB0B3D0298AE16CA461055581E5AC898BC90931388898BA341FE780C0A4433DFA9A106FE408701944E89FF6F75DBA7D46AEE83D6173C50D
                                        Malicious:false
                                        Reputation:low
                                        URL:https://tronld2qi8x.z13.web.core.windows.net/images/mnc.png
                                        Preview:.PNG........IHDR..............d5....PLTEvvv.../.......pHYs................[IDAT(.....@...&....;......!8D....P@..&h./..5....e..%:.h)@.E'..st.......*..iq.5.A...w......piK.G....IEND.B`.
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:PNG image data, 100 x 100, 1-bit colormap, non-interlaced
                                        Category:dropped
                                        Size (bytes):332
                                        Entropy (8bit):6.871743379185684
                                        Encrypted:false
                                        SSDEEP:6:6v/lhP8SsClmDlhK7/6TmMUnl/iIntVNqCsCja6K97kCuQKQZ99z/p7WMFbip:6v/7NLlWhE/6TmLnl/vtiC068A3/IVxs
                                        MD5:9D8A90A63D20F05D27E5D6ABB35E0CD0
                                        SHA1:5873B4007E9D55B4D891A4C427B3735ED23DBFE8
                                        SHA-256:7DF9F467D23EE1887EDB2123CCA10A1A9C4624CDCF7199C64E78A8430031F9F5
                                        SHA-512:DE64196F0A8E375DB6E4EFFF5F53AD2E77B9336D045C937C81CE1F1DED039844AB0E9F66B1599301CAF795532C9F03F0A6FD45A0117233C4BF2862419C280CC6
                                        Malicious:false
                                        Reputation:low
                                        Preview:.PNG........IHDR...d...d.....J,......PLTE.......g......tRNS.@..f....pHYs.................IDATx^..1n. ..`#...@.r.N.U.I.9.G..22 Sp..A^U.c..O.0...e}h[..}....9.L...Q.@'..%I.a.F.X.P`..*..cu.oD...}.K.wP....e}*.....'~..2..."...N..M.5.Ep...E>I5.".hg..6.e...)...H...l.!7.bXX.p.'..I../RI."_...K.QJiB..3x.~....z.;..#....5W.....IEND.B`.
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:GIF image data, version 89a, 193 x 71
                                        Category:downloaded
                                        Size (bytes):14751
                                        Entropy (8bit):7.927919850442063
                                        Encrypted:false
                                        SSDEEP:384:NiDfi0nwQ3tIzj2nK7xnnw8/8D2gi1jqaAyLrwjWVkvY597Kk/USIZ:NMfiU3mWKVnF06gi1j6+cskvo9W6UH
                                        MD5:6FCB78E0CD7933A70EEA2CF071F82118
                                        SHA1:70364BFFD62FE33360ABE70ECC7F7C0541B3B54C
                                        SHA-256:4B436B0B6A47DB85C88F83DC3FE3FD9A96C0A4018B28832165DF929DFFE0BC86
                                        SHA-512:AF086B13F6041FED8F9457FD4FEA33B3BF4A1ED985A4EDAF8E59AD22A772652D83A619D070BEE3C81686166717526D5C2EF3097C1C088E4729FB15B09CAEA961
                                        Malicious:false
                                        Reputation:low
                                        URL:https://tronld2qi8x.z13.web.core.windows.net/images/re.gif
                                        Preview:GIF89a..G............d....;.........z..|...........d..{.......p`.r.m^.{.........cqa..........u......dsc.......v.rb.{....a.........s...`.........qe.{........u...b...sh.{.........v.{..pi.......u.qi....t.ph..........r...api.z..........r.oh........z.}..{....coj.......s.{....bmn.....mp.......y...`mt.{....................................................................!..NETSCAPE2.0.....!.)Optimized with https://ezgif.com/optimize.!.......,......G......I..8...`(.di.h..l.p,.tm.x..|....pH,...r.l:..tJ.Z..v..z..xL....z.n.....w#..z[N..~.....................................m....W......i....X.........D.........G.../...*..!...............F.............. .V......Kwo`9...]1....u.#......(..xQ.....#z..R...%....J&([.{YC@0..i*..sb...z.<)......R..)...:..t.T.6..m.3...l..V....G[....,.j.UG..V.U...:.l.....+T0.]...&.8.....;f..1.....I ....v6.:oi"..l........K.,al.............N<x..!.......,......6......I..8...`.0ai.h..,...+.tm....|..!.n....H[.8L:.P...Z.
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:PNG image data, 140 x 30, 1-bit colormap, non-interlaced
                                        Category:dropped
                                        Size (bytes):187
                                        Entropy (8bit):6.13774750591943
                                        Encrypted:false
                                        SSDEEP:3:yionv//thPlDBTBwl5yTzcVrK42/uDlhl+fpq06IcNZd2yYgCKfLv3/tLGQctJmc:6v/lhPbTS+TABK7/6TCVkj2If/tLGmY5
                                        MD5:271021CFA45940978184BE0489841FD3
                                        SHA1:201030AF9B1BC5D3C8D453EFBFDF89B68D6C1BE5
                                        SHA-256:C5A324F181AF16879B6C4C52B731B23392F2816DEF159B157C4DE620CFF1CD41
                                        SHA-512:EFA6766F88B385F91EB0B3D0298AE16CA461055581E5AC898BC90931388898BA341FE780C0A4433DFA9A106FE408701944E89FF6F75DBA7D46AEE83D6173C50D
                                        Malicious:false
                                        Reputation:low
                                        Preview:.PNG........IHDR..............d5....PLTEvvv.../.......pHYs................[IDAT(.....@...&....;......!8D....P@..&h./..5....e..%:.h)@.E'..st.......*..iq.5.A...w......piK.G....IEND.B`.
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, mono 22050 Hz
                                        Category:downloaded
                                        Size (bytes):310889
                                        Entropy (8bit):6.0827723964472336
                                        Encrypted:false
                                        SSDEEP:6144:tw78qtWLT4gFpI7gfogcXWKdM1I519inwhdoZtFYSxDi7T4:SLtc3FEgggcmkM1IBoZ4mio
                                        MD5:76E1021471B59EAB6636722ABD062CE2
                                        SHA1:B9995645ACA3920A1D483BBC6F18D248F02CBD69
                                        SHA-256:11BCC8B04F73624DC4684623DFB81BB16D86A51694103FC8555414E82E5200AC
                                        SHA-512:D0AA60C723C1F128A4FD8DAA4A89D5D45C3AABB48CC93D9EA71510F44142B15161C6D975DDFE4031297A06CD5C2FD4A77F47A3CBB06E500BED40AEF5DE34F880
                                        Malicious:false
                                        Reputation:low
                                        URL:https://tronld2qi8x.z13.web.core.windows.net/media/Fm7-alert.wav:2f74e9008cf4e3:0
                                        Preview:RIFF....WAVEfmt ........"V..D.......LIST....INFOIART&...IVONA Reader - Microsoft Zira Desktop.ICMT....License: Unknown..IGNR....Speech..INAM....Important Security..IPRD....Warning.IPRT....1.ISFT....Lavf58.76.100.data...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:downloaded
                                        Size (bytes):133
                                        Entropy (8bit):5.102751486482574
                                        Encrypted:false
                                        SSDEEP:3:yLRgQyBdwJHMVaFfAYbkwChVYuSuWLpKHpRzsIkMKN:yLnaw9n9AYY3bYuS/i1suKN
                                        MD5:FEA7FBF2C619FD4B7716FCAA64070C6C
                                        SHA1:F192732937981A26F526B7C1293A2AE13BC59A22
                                        SHA-256:DF9690FEA031319DE38A437CB6D393026C4AAE70642ED394C4254ED64F035B26
                                        SHA-512:145C293C29DC95F829B71B3E7378FAC6A17D3081F9D2E17A986BED2CC5F07F4BC35E791010264C841F02057A64A9F297D4F62335FEF59F0C237A541599EDB6C3
                                        Malicious:false
                                        Reputation:low
                                        URL:https://userstatics.com/get/script.js?referrer=https://tronld2qi8x.z13.web.core.windows.net/
                                        Preview:document.querySelectorAll("script").forEach(e=>{new RegExp(atob("dXNlcnN0YXRpY3MuY29t")).test(e.src)&&document.body.removeChild(e)});
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:JSON data
                                        Category:downloaded
                                        Size (bytes):720
                                        Entropy (8bit):5.092029147555353
                                        Encrypted:false
                                        SSDEEP:12:YS4YhZImV+xaNmd6wpHb2WJHXmjCM2L+sHi3y2ARQDosJDNCFaq/Pe5sj+VkozFY:YL0RNMhHbVJ3mjP2SC21RCFrnjaVzFY
                                        MD5:DB8901411523C77E973D09005BB4F436
                                        SHA1:044BEB42F89ED3149EA98045DC8CA2C30B595EAD
                                        SHA-256:ACB773F9431FE9A1E68C12270EA2437DABA79051DCD729586E27F738B7D51FE2
                                        SHA-512:36BE2AE3F99C7A13D43600C38E179ADBCE8C0BE95155FD8F0BC5E1408CD893A1998F770AE5B6153130B2E757889A7052B9199A9C8AF05AB5F7DA7A2A06B8CD1D
                                        Malicious:false
                                        Reputation:low
                                        URL:https://ipwho.is/?lang=en
                                        Preview:{"ip":"81.181.57.52","success":true,"type":"IPv4","continent":"North America","continent_code":"NA","country":"United States","country_code":"US","region":"Georgia","region_code":"GA","city":"Atlanta","latitude":33.7489954,"longitude":-84.3879824,"is_eu":false,"postal":"30303","calling_code":"1","capital":"Washington D.C.","borders":"CA,MX","flag":{"img":"https:\/\/cdn.ipwhois.io\/flags\/us.svg","emoji":"\ud83c\uddfa\ud83c\uddf8","emoji_unicode":"U+1F1FA U+1F1F8"},"connection":{"asn":212238,"org":"Binbox Global Services SRL","isp":"Datacamp Limited","domain":"cogentco.com"},"timezone":{"id":"America\/New_York","abbr":"EDT","is_dst":true,"offset":-14400,"utc":"-04:00","current_time":"2024-04-17T18:53:09-04:00"}}
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:JSON data
                                        Category:dropped
                                        Size (bytes):1026
                                        Entropy (8bit):4.681930488712884
                                        Encrypted:false
                                        SSDEEP:24:7XNLWAtaN83Jfmtr2erK2fvrQbqUbFdJisxYx6qwOBZMmA:7XNW2aKPSK2fvrdYbJisCMqwOQ
                                        MD5:D65D7BCA4F3120E4034EAEEFC1125011
                                        SHA1:BB37AB5B201933B97B0DC2131A8AC873EB59E851
                                        SHA-256:CC171A99CBFC41E832AA0E0B6B771FA359AA1DC25A7F6E3840AFB22475AC55E7
                                        SHA-512:10CE97380ADCD89345C1924B173643CD2E7BBAB88056E6EF382F6301DE318E69B0558F91B999EAE41484D692FE8C7078353C22728DD132C99435B4CFBD8A23C3
                                        Malicious:false
                                        Reputation:low
                                        Preview:{. "About Us": "https:\/\/ipwhois.io",. "ip": "81.181.57.52",. "success": true,. "type": "IPv4",. "continent": "North America",. "continent_code": "NA",. "country": "United States",. "country_code": "US",. "region": "Georgia",. "region_code": "GA",. "city": "Atlanta",. "latitude": 33.7489954,. "longitude": -84.3879824,. "is_eu": false,. "postal": "30303",. "calling_code": "1",. "capital": "Washington D.C.",. "borders": "CA,MX",. "flag": {. "img": "https:\/\/cdn.ipwhois.io\/flags\/us.svg",. "emoji": "\ud83c\uddfa\ud83c\uddf8",. "emoji_unicode": "U+1F1FA U+1F1F8". },. "connection": {. "asn": 212238,. "org": "Binbox Global Services SRL",. "isp": "Datacamp Limited",. "domain": "cogentco.com". },. "timezone": {. "id": "America\/New_York",. "abbr": "EDT",. "is_dst": true,. "offset": -14400,. "utc": "-04:00",. "current_time": "2024-04-
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:PNG image data, 520 x 520, 8-bit colormap, non-interlaced
                                        Category:dropped
                                        Size (bytes):2681
                                        Entropy (8bit):7.104642717027869
                                        Encrypted:false
                                        SSDEEP:48:YCCiUUMR6p8vP/DjQ2aMGRXRXRXRXRXRXRXRXRXyBQ1FIyDCiiiiiiinrzMxAJl:LVUBvQfMGZZZZZZZZZLFISrQx2l
                                        MD5:B01A30D354BFCF51EDF33E0B0EA07402
                                        SHA1:C421359518D1AE258237BF501C563B7F059F8B9B
                                        SHA-256:B67A7C07A045D7CB0F2E216A557AEC0D99405E17C36D1A6B1FF3E2733AA35348
                                        SHA-512:D5424C1A03F03B72A5EE1F6F1962F07BDF9EFCEAA71299965F1EA28CD2E52AD899C1D8AE327754D5B39B355904EF7C9F26E724EA29C30B76074F87443416B3DA
                                        Malicious:false
                                        Reputation:low
                                        Preview:.PNG........IHDR.............<".Q...]PLTE.....................................................................................................tRNS..e.zQ..H^3.o....(.......7...en....IDATx.....@.D.V@...f...?.4A3..u.......c..i..*.M.c.uM...:~...........G..V....C...G.!.N.o....+J$8.\.....6..^...N.t(#..Uvp../.m ....b...q.H.jtp..b.Hpj.At.....r.]>.....}..".l.t..c.>"..i.qY..%$.4..........8X4i.B.Cs..)!.(...F..H0J8@.Q.......`.p.....$.%. .(...F..H0J8@.Q.......`.p.....$.%. .(...F..H0J8@.Q.......`.p.....$.%. .(...F..H0J8@.Q.......`.p.....$.%. .(...F..H0J8@.Q.......`...H0..$X..$....$.}......@.......A..^.............Z.......V..M.......L....L....L..&.L........L.....u...........`...L87..g.<0...&......f=0.i.L.m...~....o3...i.....}`...Lx.......L........................................................................................0..@..........M..L..L..L..L..L..L..L..L..L..L..L..L...1......b..1....AL. &x..<......b..1....AL. &x..<......b..1....AL. &x..<......b..1....AL. &x..<.....
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:downloaded
                                        Size (bytes):5816
                                        Entropy (8bit):4.707067894665527
                                        Encrypted:false
                                        SSDEEP:96:rSCU5PMZwzlNZiD07WJiOiq+mh5hoFzT6M:OCmPMZKT0gSJiOiYjuFzT6M
                                        MD5:41D726BA8105809814789FD8B9D6015A
                                        SHA1:A560687A3E1622DAA162E711CCCDACFC070E2278
                                        SHA-256:86C48A03A2DD5D8848990B64B04FC70A9C7B7CC551AA5FA251B2B57292E37113
                                        SHA-512:D3A858DEC6B8168FB2D0E5945A841DB55FC90C316FABFC07B754C84765980482FC9DD2EDCB579D42CF929352F38AF148FE26A437F3CF4494D6385EB9652145F4
                                        Malicious:false
                                        Reputation:low
                                        URL:https://tronld2qi8x.z13.web.core.windows.net/js/jscode.js
                                        Preview:$(function() {.. var a = 0,.. b = setInterval(function() {.. a += 10;.. $("#dynamic").css("width", a + "%").attr("aria-valuenow", a).text(a + "% Complete");.. 100 <= a && clearInterval(b).. }, 100).. });.... (function(a) {.. a.fn.countTo = function(b) {.. b = b || {};.. return a(this).each(function() {.. function d(a) {.. a = c.formatter.call(k, a, c);.. h.html(a).. }.. var c = a.extend({}, a.fn.countTo.defaults, {.. from: a(this).data("from"),.. to: a(this).data("to"),.. speed: a(this).data("speed"),.. refreshInterval: a(this).data("refresh-interval"),.. decimals: a(this).data("decimals").. }, b),.. l = Math.ceil(c.speed / c.refreshInterval),.. n = (c.to - c.from) / l,.. k = this,.. h = a(this),.. m = 0,.. f = c.from,.. g = h.data("countTo") || {};.. h.data("countTo"
                                        No static file info
                                        TimestampSource PortDest PortSource IPDest IP
                                        Apr 18, 2024 00:52:57.294061899 CEST49675443192.168.2.4173.222.162.32
                                        Apr 18, 2024 00:53:07.042684078 CEST49675443192.168.2.4173.222.162.32
                                        Apr 18, 2024 00:53:08.926065922 CEST49741443192.168.2.4172.253.124.106
                                        Apr 18, 2024 00:53:08.926101923 CEST44349741172.253.124.106192.168.2.4
                                        Apr 18, 2024 00:53:08.926187038 CEST49741443192.168.2.4172.253.124.106
                                        Apr 18, 2024 00:53:08.926356077 CEST49741443192.168.2.4172.253.124.106
                                        Apr 18, 2024 00:53:08.926368952 CEST44349741172.253.124.106192.168.2.4
                                        Apr 18, 2024 00:53:09.146341085 CEST44349741172.253.124.106192.168.2.4
                                        Apr 18, 2024 00:53:09.146589041 CEST49741443192.168.2.4172.253.124.106
                                        Apr 18, 2024 00:53:09.146612883 CEST44349741172.253.124.106192.168.2.4
                                        Apr 18, 2024 00:53:09.148282051 CEST44349741172.253.124.106192.168.2.4
                                        Apr 18, 2024 00:53:09.148350954 CEST49741443192.168.2.4172.253.124.106
                                        Apr 18, 2024 00:53:09.149302006 CEST49741443192.168.2.4172.253.124.106
                                        Apr 18, 2024 00:53:09.149384975 CEST44349741172.253.124.106192.168.2.4
                                        Apr 18, 2024 00:53:09.200095892 CEST49741443192.168.2.4172.253.124.106
                                        Apr 18, 2024 00:53:09.200110912 CEST44349741172.253.124.106192.168.2.4
                                        Apr 18, 2024 00:53:09.243643999 CEST49741443192.168.2.4172.253.124.106
                                        Apr 18, 2024 00:53:09.420948982 CEST49750443192.168.2.415.204.213.5
                                        Apr 18, 2024 00:53:09.421000957 CEST4434975015.204.213.5192.168.2.4
                                        Apr 18, 2024 00:53:09.421070099 CEST49750443192.168.2.415.204.213.5
                                        Apr 18, 2024 00:53:09.421689034 CEST49750443192.168.2.415.204.213.5
                                        Apr 18, 2024 00:53:09.421719074 CEST4434975015.204.213.5192.168.2.4
                                        Apr 18, 2024 00:53:09.802067041 CEST4434975015.204.213.5192.168.2.4
                                        Apr 18, 2024 00:53:09.844130993 CEST49750443192.168.2.415.204.213.5
                                        Apr 18, 2024 00:53:09.928857088 CEST49750443192.168.2.415.204.213.5
                                        Apr 18, 2024 00:53:09.928881884 CEST4434975015.204.213.5192.168.2.4
                                        Apr 18, 2024 00:53:09.933684111 CEST4434975015.204.213.5192.168.2.4
                                        Apr 18, 2024 00:53:09.933748960 CEST49750443192.168.2.415.204.213.5
                                        Apr 18, 2024 00:53:09.944094896 CEST49750443192.168.2.415.204.213.5
                                        Apr 18, 2024 00:53:09.944417953 CEST4434975015.204.213.5192.168.2.4
                                        Apr 18, 2024 00:53:09.945359945 CEST49750443192.168.2.415.204.213.5
                                        Apr 18, 2024 00:53:09.945379019 CEST4434975015.204.213.5192.168.2.4
                                        Apr 18, 2024 00:53:09.997402906 CEST49750443192.168.2.415.204.213.5
                                        Apr 18, 2024 00:53:10.068856955 CEST4434975015.204.213.5192.168.2.4
                                        Apr 18, 2024 00:53:10.069031000 CEST4434975015.204.213.5192.168.2.4
                                        Apr 18, 2024 00:53:10.069084883 CEST49750443192.168.2.415.204.213.5
                                        Apr 18, 2024 00:53:10.335232019 CEST49750443192.168.2.415.204.213.5
                                        Apr 18, 2024 00:53:10.335304022 CEST4434975015.204.213.5192.168.2.4
                                        Apr 18, 2024 00:53:10.818068981 CEST49761443192.168.2.4172.67.208.186
                                        Apr 18, 2024 00:53:10.818106890 CEST44349761172.67.208.186192.168.2.4
                                        Apr 18, 2024 00:53:10.818171978 CEST49761443192.168.2.4172.67.208.186
                                        Apr 18, 2024 00:53:10.865623951 CEST49761443192.168.2.4172.67.208.186
                                        Apr 18, 2024 00:53:10.865638971 CEST44349761172.67.208.186192.168.2.4
                                        Apr 18, 2024 00:53:11.093105078 CEST44349761172.67.208.186192.168.2.4
                                        Apr 18, 2024 00:53:11.093574047 CEST49761443192.168.2.4172.67.208.186
                                        Apr 18, 2024 00:53:11.093581915 CEST44349761172.67.208.186192.168.2.4
                                        Apr 18, 2024 00:53:11.094814062 CEST44349761172.67.208.186192.168.2.4
                                        Apr 18, 2024 00:53:11.094913960 CEST49761443192.168.2.4172.67.208.186
                                        Apr 18, 2024 00:53:11.347671986 CEST49763443192.168.2.423.47.177.151
                                        Apr 18, 2024 00:53:11.347716093 CEST4434976323.47.177.151192.168.2.4
                                        Apr 18, 2024 00:53:11.347829103 CEST49763443192.168.2.423.47.177.151
                                        Apr 18, 2024 00:53:11.349658966 CEST49763443192.168.2.423.47.177.151
                                        Apr 18, 2024 00:53:11.349675894 CEST4434976323.47.177.151192.168.2.4
                                        Apr 18, 2024 00:53:11.473124981 CEST49761443192.168.2.4172.67.208.186
                                        Apr 18, 2024 00:53:11.473639011 CEST44349761172.67.208.186192.168.2.4
                                        Apr 18, 2024 00:53:11.474410057 CEST49761443192.168.2.4172.67.208.186
                                        Apr 18, 2024 00:53:11.474427938 CEST44349761172.67.208.186192.168.2.4
                                        Apr 18, 2024 00:53:11.519877911 CEST49761443192.168.2.4172.67.208.186
                                        Apr 18, 2024 00:53:11.576113939 CEST4434976323.47.177.151192.168.2.4
                                        Apr 18, 2024 00:53:11.576198101 CEST49763443192.168.2.423.47.177.151
                                        Apr 18, 2024 00:53:11.802356005 CEST49763443192.168.2.423.47.177.151
                                        Apr 18, 2024 00:53:11.802403927 CEST4434976323.47.177.151192.168.2.4
                                        Apr 18, 2024 00:53:11.803337097 CEST4434976323.47.177.151192.168.2.4
                                        Apr 18, 2024 00:53:11.810898066 CEST44349761172.67.208.186192.168.2.4
                                        Apr 18, 2024 00:53:11.811014891 CEST44349761172.67.208.186192.168.2.4
                                        Apr 18, 2024 00:53:11.811127901 CEST49761443192.168.2.4172.67.208.186
                                        Apr 18, 2024 00:53:11.844865084 CEST49763443192.168.2.423.47.177.151
                                        Apr 18, 2024 00:53:12.115873098 CEST49761443192.168.2.4172.67.208.186
                                        Apr 18, 2024 00:53:12.115906000 CEST44349761172.67.208.186192.168.2.4
                                        Apr 18, 2024 00:53:12.197851896 CEST49763443192.168.2.423.47.177.151
                                        Apr 18, 2024 00:53:12.244115114 CEST4434976323.47.177.151192.168.2.4
                                        Apr 18, 2024 00:53:12.303165913 CEST4434976323.47.177.151192.168.2.4
                                        Apr 18, 2024 00:53:12.303322077 CEST4434976323.47.177.151192.168.2.4
                                        Apr 18, 2024 00:53:12.303384066 CEST49763443192.168.2.423.47.177.151
                                        Apr 18, 2024 00:53:12.305685043 CEST49763443192.168.2.423.47.177.151
                                        Apr 18, 2024 00:53:12.305705070 CEST4434976323.47.177.151192.168.2.4
                                        Apr 18, 2024 00:53:12.305732012 CEST49763443192.168.2.423.47.177.151
                                        Apr 18, 2024 00:53:12.305738926 CEST4434976323.47.177.151192.168.2.4
                                        Apr 18, 2024 00:53:12.449345112 CEST49775443192.168.2.415.204.213.5
                                        Apr 18, 2024 00:53:12.449388981 CEST4434977515.204.213.5192.168.2.4
                                        Apr 18, 2024 00:53:12.449533939 CEST49775443192.168.2.415.204.213.5
                                        Apr 18, 2024 00:53:12.452033043 CEST49775443192.168.2.415.204.213.5
                                        Apr 18, 2024 00:53:12.452064037 CEST4434977515.204.213.5192.168.2.4
                                        Apr 18, 2024 00:53:12.473995924 CEST49776443192.168.2.423.63.157.166
                                        Apr 18, 2024 00:53:12.474050045 CEST4434977623.63.157.166192.168.2.4
                                        Apr 18, 2024 00:53:12.474117994 CEST49776443192.168.2.423.63.157.166
                                        Apr 18, 2024 00:53:12.474597931 CEST49776443192.168.2.423.63.157.166
                                        Apr 18, 2024 00:53:12.474616051 CEST4434977623.63.157.166192.168.2.4
                                        Apr 18, 2024 00:53:12.692434072 CEST4434977623.63.157.166192.168.2.4
                                        Apr 18, 2024 00:53:12.692533970 CEST49776443192.168.2.423.63.157.166
                                        Apr 18, 2024 00:53:12.694761992 CEST49776443192.168.2.423.63.157.166
                                        Apr 18, 2024 00:53:12.694768906 CEST4434977623.63.157.166192.168.2.4
                                        Apr 18, 2024 00:53:12.695286989 CEST4434977623.63.157.166192.168.2.4
                                        Apr 18, 2024 00:53:12.697263956 CEST49776443192.168.2.423.63.157.166
                                        Apr 18, 2024 00:53:12.700042009 CEST4434977515.204.213.5192.168.2.4
                                        Apr 18, 2024 00:53:12.707454920 CEST49775443192.168.2.415.204.213.5
                                        Apr 18, 2024 00:53:12.707485914 CEST4434977515.204.213.5192.168.2.4
                                        Apr 18, 2024 00:53:12.708607912 CEST4434977515.204.213.5192.168.2.4
                                        Apr 18, 2024 00:53:12.708677053 CEST49775443192.168.2.415.204.213.5
                                        Apr 18, 2024 00:53:12.709774017 CEST49775443192.168.2.415.204.213.5
                                        Apr 18, 2024 00:53:12.709849119 CEST4434977515.204.213.5192.168.2.4
                                        Apr 18, 2024 00:53:12.710823059 CEST49775443192.168.2.415.204.213.5
                                        Apr 18, 2024 00:53:12.710838079 CEST4434977515.204.213.5192.168.2.4
                                        Apr 18, 2024 00:53:12.740133047 CEST4434977623.63.157.166192.168.2.4
                                        Apr 18, 2024 00:53:12.763403893 CEST49775443192.168.2.415.204.213.5
                                        Apr 18, 2024 00:53:12.900561094 CEST4434977623.63.157.166192.168.2.4
                                        Apr 18, 2024 00:53:12.900717974 CEST4434977623.63.157.166192.168.2.4
                                        Apr 18, 2024 00:53:12.900788069 CEST49776443192.168.2.423.63.157.166
                                        Apr 18, 2024 00:53:12.901487112 CEST49776443192.168.2.423.63.157.166
                                        Apr 18, 2024 00:53:12.901504993 CEST4434977623.63.157.166192.168.2.4
                                        Apr 18, 2024 00:53:12.901514053 CEST49776443192.168.2.423.63.157.166
                                        Apr 18, 2024 00:53:12.901520967 CEST4434977623.63.157.166192.168.2.4
                                        Apr 18, 2024 00:53:12.985377073 CEST4434977515.204.213.5192.168.2.4
                                        Apr 18, 2024 00:53:12.985552073 CEST4434977515.204.213.5192.168.2.4
                                        Apr 18, 2024 00:53:12.985605955 CEST49775443192.168.2.415.204.213.5
                                        Apr 18, 2024 00:53:12.986278057 CEST49775443192.168.2.415.204.213.5
                                        Apr 18, 2024 00:53:12.986299992 CEST4434977515.204.213.5192.168.2.4
                                        Apr 18, 2024 00:53:19.165139914 CEST44349741172.253.124.106192.168.2.4
                                        Apr 18, 2024 00:53:19.165220976 CEST44349741172.253.124.106192.168.2.4
                                        Apr 18, 2024 00:53:19.165304899 CEST49741443192.168.2.4172.253.124.106
                                        Apr 18, 2024 00:53:19.379522085 CEST49741443192.168.2.4172.253.124.106
                                        Apr 18, 2024 00:53:19.379537106 CEST44349741172.253.124.106192.168.2.4
                                        Apr 18, 2024 00:53:19.488878965 CEST49672443192.168.2.4173.222.162.32
                                        Apr 18, 2024 00:53:19.488905907 CEST44349672173.222.162.32192.168.2.4
                                        Apr 18, 2024 00:53:24.211184025 CEST804972369.164.42.0192.168.2.4
                                        Apr 18, 2024 00:53:24.211330891 CEST4972380192.168.2.469.164.42.0
                                        Apr 18, 2024 00:53:24.211330891 CEST4972380192.168.2.469.164.42.0
                                        Apr 18, 2024 00:53:24.315296888 CEST804972369.164.42.0192.168.2.4
                                        Apr 18, 2024 00:53:24.315360069 CEST804972369.164.42.0192.168.2.4
                                        Apr 18, 2024 00:53:24.315409899 CEST4972380192.168.2.469.164.42.0
                                        Apr 18, 2024 00:53:38.594048977 CEST804972469.164.42.0192.168.2.4
                                        Apr 18, 2024 00:53:38.594135046 CEST4972480192.168.2.469.164.42.0
                                        Apr 18, 2024 00:53:38.594347954 CEST4972480192.168.2.469.164.42.0
                                        Apr 18, 2024 00:53:38.699388027 CEST804972469.164.42.0192.168.2.4
                                        Apr 18, 2024 00:54:08.862684965 CEST49790443192.168.2.4172.253.124.106
                                        Apr 18, 2024 00:54:08.862736940 CEST44349790172.253.124.106192.168.2.4
                                        Apr 18, 2024 00:54:08.862799883 CEST49790443192.168.2.4172.253.124.106
                                        Apr 18, 2024 00:54:08.863064051 CEST49790443192.168.2.4172.253.124.106
                                        Apr 18, 2024 00:54:08.863080025 CEST44349790172.253.124.106192.168.2.4
                                        Apr 18, 2024 00:54:09.082140923 CEST44349790172.253.124.106192.168.2.4
                                        Apr 18, 2024 00:54:09.082397938 CEST49790443192.168.2.4172.253.124.106
                                        Apr 18, 2024 00:54:09.082416058 CEST44349790172.253.124.106192.168.2.4
                                        Apr 18, 2024 00:54:09.082875013 CEST44349790172.253.124.106192.168.2.4
                                        Apr 18, 2024 00:54:09.083193064 CEST49790443192.168.2.4172.253.124.106
                                        Apr 18, 2024 00:54:09.083276033 CEST44349790172.253.124.106192.168.2.4
                                        Apr 18, 2024 00:54:09.136791945 CEST49790443192.168.2.4172.253.124.106
                                        Apr 18, 2024 00:54:19.076389074 CEST44349790172.253.124.106192.168.2.4
                                        Apr 18, 2024 00:54:19.076555967 CEST44349790172.253.124.106192.168.2.4
                                        Apr 18, 2024 00:54:19.076633930 CEST49790443192.168.2.4172.253.124.106
                                        Apr 18, 2024 00:54:21.222043991 CEST49790443192.168.2.4172.253.124.106
                                        Apr 18, 2024 00:54:21.222069979 CEST44349790172.253.124.106192.168.2.4
                                        TimestampSource PortDest PortSource IPDest IP
                                        Apr 18, 2024 00:53:06.709945917 CEST53509801.1.1.1192.168.2.4
                                        Apr 18, 2024 00:53:07.323209047 CEST53561331.1.1.1192.168.2.4
                                        Apr 18, 2024 00:53:08.810045958 CEST5070753192.168.2.41.1.1.1
                                        Apr 18, 2024 00:53:08.810204983 CEST5686553192.168.2.41.1.1.1
                                        Apr 18, 2024 00:53:08.914804935 CEST53568651.1.1.1192.168.2.4
                                        Apr 18, 2024 00:53:08.925225973 CEST53507071.1.1.1192.168.2.4
                                        Apr 18, 2024 00:53:09.266365051 CEST5943453192.168.2.41.1.1.1
                                        Apr 18, 2024 00:53:09.266525984 CEST5115653192.168.2.41.1.1.1
                                        Apr 18, 2024 00:53:09.372240067 CEST53511561.1.1.1192.168.2.4
                                        Apr 18, 2024 00:53:09.374833107 CEST53586471.1.1.1192.168.2.4
                                        Apr 18, 2024 00:53:09.391877890 CEST53594341.1.1.1192.168.2.4
                                        Apr 18, 2024 00:53:10.455729961 CEST6339053192.168.2.41.1.1.1
                                        Apr 18, 2024 00:53:10.456182957 CEST6429253192.168.2.41.1.1.1
                                        Apr 18, 2024 00:53:10.561378002 CEST53633901.1.1.1192.168.2.4
                                        Apr 18, 2024 00:53:10.561963081 CEST53642921.1.1.1192.168.2.4
                                        Apr 18, 2024 00:53:10.792768002 CEST53608491.1.1.1192.168.2.4
                                        Apr 18, 2024 00:53:12.320177078 CEST5403553192.168.2.41.1.1.1
                                        Apr 18, 2024 00:53:12.320503950 CEST5620253192.168.2.41.1.1.1
                                        Apr 18, 2024 00:53:12.425514936 CEST53540351.1.1.1192.168.2.4
                                        Apr 18, 2024 00:53:12.425658941 CEST53562021.1.1.1192.168.2.4
                                        Apr 18, 2024 00:53:25.538094044 CEST138138192.168.2.4192.168.2.255
                                        Apr 18, 2024 00:53:27.803481102 CEST53558221.1.1.1192.168.2.4
                                        Apr 18, 2024 00:53:47.438227892 CEST53535481.1.1.1192.168.2.4
                                        Apr 18, 2024 00:54:06.220088005 CEST53653121.1.1.1192.168.2.4
                                        Apr 18, 2024 00:54:10.560765982 CEST53510901.1.1.1192.168.2.4
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Apr 18, 2024 00:53:08.810045958 CEST192.168.2.41.1.1.10xe0a5Standard query (0)www.google.comA (IP address)IN (0x0001)false
                                        Apr 18, 2024 00:53:08.810204983 CEST192.168.2.41.1.1.10x7a72Standard query (0)www.google.com65IN (0x0001)false
                                        Apr 18, 2024 00:53:09.266365051 CEST192.168.2.41.1.1.10x5126Standard query (0)ipwho.isA (IP address)IN (0x0001)false
                                        Apr 18, 2024 00:53:09.266525984 CEST192.168.2.41.1.1.10x96dcStandard query (0)ipwho.is65IN (0x0001)false
                                        Apr 18, 2024 00:53:10.455729961 CEST192.168.2.41.1.1.10x55beStandard query (0)userstatics.comA (IP address)IN (0x0001)false
                                        Apr 18, 2024 00:53:10.456182957 CEST192.168.2.41.1.1.10x4f1cStandard query (0)userstatics.com65IN (0x0001)false
                                        Apr 18, 2024 00:53:12.320177078 CEST192.168.2.41.1.1.10x534Standard query (0)ipwho.isA (IP address)IN (0x0001)false
                                        Apr 18, 2024 00:53:12.320503950 CEST192.168.2.41.1.1.10xb213Standard query (0)ipwho.is65IN (0x0001)false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Apr 18, 2024 00:53:08.914804935 CEST1.1.1.1192.168.2.40x7a72No error (0)www.google.com65IN (0x0001)false
                                        Apr 18, 2024 00:53:08.925225973 CEST1.1.1.1192.168.2.40xe0a5No error (0)www.google.com172.253.124.106A (IP address)IN (0x0001)false
                                        Apr 18, 2024 00:53:08.925225973 CEST1.1.1.1192.168.2.40xe0a5No error (0)www.google.com172.253.124.104A (IP address)IN (0x0001)false
                                        Apr 18, 2024 00:53:08.925225973 CEST1.1.1.1192.168.2.40xe0a5No error (0)www.google.com172.253.124.99A (IP address)IN (0x0001)false
                                        Apr 18, 2024 00:53:08.925225973 CEST1.1.1.1192.168.2.40xe0a5No error (0)www.google.com172.253.124.105A (IP address)IN (0x0001)false
                                        Apr 18, 2024 00:53:08.925225973 CEST1.1.1.1192.168.2.40xe0a5No error (0)www.google.com172.253.124.147A (IP address)IN (0x0001)false
                                        Apr 18, 2024 00:53:08.925225973 CEST1.1.1.1192.168.2.40xe0a5No error (0)www.google.com172.253.124.103A (IP address)IN (0x0001)false
                                        Apr 18, 2024 00:53:09.391877890 CEST1.1.1.1192.168.2.40x5126No error (0)ipwho.is15.204.213.5A (IP address)IN (0x0001)false
                                        Apr 18, 2024 00:53:10.561378002 CEST1.1.1.1192.168.2.40x55beNo error (0)userstatics.com172.67.208.186A (IP address)IN (0x0001)false
                                        Apr 18, 2024 00:53:10.561378002 CEST1.1.1.1192.168.2.40x55beNo error (0)userstatics.com104.21.53.38A (IP address)IN (0x0001)false
                                        Apr 18, 2024 00:53:10.561963081 CEST1.1.1.1192.168.2.40x4f1cNo error (0)userstatics.com65IN (0x0001)false
                                        Apr 18, 2024 00:53:12.425514936 CEST1.1.1.1192.168.2.40x534No error (0)ipwho.is15.204.213.5A (IP address)IN (0x0001)false
                                        Apr 18, 2024 00:53:21.609170914 CEST1.1.1.1192.168.2.40xa4e8No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                        Apr 18, 2024 00:53:21.609170914 CEST1.1.1.1192.168.2.40xa4e8No error (0)fp2e7a.wpc.phicdn.net192.229.211.108A (IP address)IN (0x0001)false
                                        Apr 18, 2024 00:53:43.317740917 CEST1.1.1.1192.168.2.40x337aNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                        Apr 18, 2024 00:53:43.317740917 CEST1.1.1.1192.168.2.40x337aNo error (0)fp2e7a.wpc.phicdn.net192.229.211.108A (IP address)IN (0x0001)false
                                        Apr 18, 2024 00:54:02.611113071 CEST1.1.1.1192.168.2.40x61c3No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                        Apr 18, 2024 00:54:02.611113071 CEST1.1.1.1192.168.2.40x61c3No error (0)fp2e7a.wpc.phicdn.net192.229.211.108A (IP address)IN (0x0001)false
                                        Apr 18, 2024 00:54:19.389862061 CEST1.1.1.1192.168.2.40x151eNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                        Apr 18, 2024 00:54:19.389862061 CEST1.1.1.1192.168.2.40x151eNo error (0)fp2e7a.wpc.phicdn.net192.229.211.108A (IP address)IN (0x0001)false
                                        • https:
                                          • ipwho.is
                                          • userstatics.com
                                        • fs.microsoft.com
                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.44975015.204.213.54431068C:\Program Files\Google\Chrome\Application\chrome.exe
                                        TimestampBytes transferredDirectionData
                                        2024-04-17 22:53:09 UTC586OUTGET /?lang=en HTTP/1.1
                                        Host: ipwho.is
                                        Connection: keep-alive
                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                        sec-ch-ua-mobile: ?0
                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                        sec-ch-ua-platform: "Windows"
                                        Accept: */*
                                        Origin: https://tronld2qi8x.z13.web.core.windows.net
                                        Sec-Fetch-Site: cross-site
                                        Sec-Fetch-Mode: cors
                                        Sec-Fetch-Dest: empty
                                        Referer: https://tronld2qi8x.z13.web.core.windows.net/
                                        Accept-Encoding: gzip, deflate, br
                                        Accept-Language: en-US,en;q=0.9
                                        2024-04-17 22:53:10 UTC255INHTTP/1.1 200 OK
                                        Date: Wed, 17 Apr 2024 22:53:09 GMT
                                        Content-Type: application/json; charset=utf-8
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        Server: ipwhois
                                        Access-Control-Allow-Origin: *
                                        Access-Control-Allow-Headers: *
                                        X-Robots-Tag: noindex
                                        2024-04-17 22:53:10 UTC732INData Raw: 32 64 30 0d 0a 7b 22 69 70 22 3a 22 38 31 2e 31 38 31 2e 35 37 2e 35 32 22 2c 22 73 75 63 63 65 73 73 22 3a 74 72 75 65 2c 22 74 79 70 65 22 3a 22 49 50 76 34 22 2c 22 63 6f 6e 74 69 6e 65 6e 74 22 3a 22 4e 6f 72 74 68 20 41 6d 65 72 69 63 61 22 2c 22 63 6f 6e 74 69 6e 65 6e 74 5f 63 6f 64 65 22 3a 22 4e 41 22 2c 22 63 6f 75 6e 74 72 79 22 3a 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 22 63 6f 75 6e 74 72 79 5f 63 6f 64 65 22 3a 22 55 53 22 2c 22 72 65 67 69 6f 6e 22 3a 22 47 65 6f 72 67 69 61 22 2c 22 72 65 67 69 6f 6e 5f 63 6f 64 65 22 3a 22 47 41 22 2c 22 63 69 74 79 22 3a 22 41 74 6c 61 6e 74 61 22 2c 22 6c 61 74 69 74 75 64 65 22 3a 33 33 2e 37 34 38 39 39 35 34 2c 22 6c 6f 6e 67 69 74 75 64 65 22 3a 2d 38 34 2e 33 38 37 39 38 32 34 2c 22 69 73
                                        Data Ascii: 2d0{"ip":"81.181.57.52","success":true,"type":"IPv4","continent":"North America","continent_code":"NA","country":"United States","country_code":"US","region":"Georgia","region_code":"GA","city":"Atlanta","latitude":33.7489954,"longitude":-84.3879824,"is


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        1192.168.2.449761172.67.208.1864431068C:\Program Files\Google\Chrome\Application\chrome.exe
                                        TimestampBytes transferredDirectionData
                                        2024-04-17 22:53:11 UTC603OUTGET /get/script.js?referrer=https://tronld2qi8x.z13.web.core.windows.net/ HTTP/1.1
                                        Host: userstatics.com
                                        Connection: keep-alive
                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                        sec-ch-ua-mobile: ?0
                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                        sec-ch-ua-platform: "Windows"
                                        Accept: */*
                                        Sec-Fetch-Site: cross-site
                                        Sec-Fetch-Mode: no-cors
                                        Sec-Fetch-Dest: script
                                        Referer: https://tronld2qi8x.z13.web.core.windows.net/
                                        Accept-Encoding: gzip, deflate, br
                                        Accept-Language: en-US,en;q=0.9
                                        2024-04-17 22:53:11 UTC826INHTTP/1.1 200 OK
                                        Date: Wed, 17 Apr 2024 22:53:11 GMT
                                        Content-Type: text/html; charset=utf-8
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        X-Powered-By: PHP/8.2.1
                                        Access-Control-Allow-Origin: https://tronld2qi8x.z13.web.core.windows.net
                                        Access-Control-Allow-Methods: GET, POST
                                        Access-Control-Allow-Headers: X-Requested-With,content-type
                                        Access-Control-Allow-Credentials: true
                                        CF-Cache-Status: DYNAMIC
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=gzi0hpANsQ%2Fb2IWr%2Fpn%2Bx%2FJy3k%2Bh%2FpgWIt6khARyMP3iKfvWntqZzlveAznvQzR%2FziZVBigN2DknHb%2FBhsLgRpdOtVawz0rVhNKTYjdvar3JrOyqDAFKfyEC6PS7NbUmQuQ%3D"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 875ffd62ebae135d-ATL
                                        alt-svc: h3=":443"; ma=86400
                                        2024-04-17 22:53:11 UTC139INData Raw: 38 35 0d 0a 64 6f 63 75 6d 65 6e 74 2e 71 75 65 72 79 53 65 6c 65 63 74 6f 72 41 6c 6c 28 22 73 63 72 69 70 74 22 29 2e 66 6f 72 45 61 63 68 28 65 3d 3e 7b 6e 65 77 20 52 65 67 45 78 70 28 61 74 6f 62 28 22 64 58 4e 6c 63 6e 4e 30 59 58 52 70 59 33 4d 75 59 32 39 74 22 29 29 2e 74 65 73 74 28 65 2e 73 72 63 29 26 26 64 6f 63 75 6d 65 6e 74 2e 62 6f 64 79 2e 72 65 6d 6f 76 65 43 68 69 6c 64 28 65 29 7d 29 3b 0d 0a
                                        Data Ascii: 85document.querySelectorAll("script").forEach(e=>{new RegExp(atob("dXNlcnN0YXRpY3MuY29t")).test(e.src)&&document.body.removeChild(e)});
                                        2024-04-17 22:53:11 UTC5INData Raw: 30 0d 0a 0d 0a
                                        Data Ascii: 0


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        2192.168.2.44976323.47.177.151443
                                        TimestampBytes transferredDirectionData
                                        2024-04-17 22:53:12 UTC161OUTHEAD /fs/windows/config.json HTTP/1.1
                                        Connection: Keep-Alive
                                        Accept: */*
                                        Accept-Encoding: identity
                                        User-Agent: Microsoft BITS/7.8
                                        Host: fs.microsoft.com
                                        2024-04-17 22:53:12 UTC467INHTTP/1.1 200 OK
                                        Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
                                        Content-Type: application/octet-stream
                                        ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
                                        Last-Modified: Tue, 16 May 2017 22:58:00 GMT
                                        Server: ECAcc (chd/0758)
                                        X-CID: 11
                                        X-Ms-ApiVersion: Distribute 1.2
                                        X-Ms-Region: prod-eus2-z1
                                        Cache-Control: public, max-age=29460
                                        Date: Wed, 17 Apr 2024 22:53:12 GMT
                                        Connection: close
                                        X-CID: 2


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        3192.168.2.44977623.63.157.166443
                                        TimestampBytes transferredDirectionData
                                        2024-04-17 22:53:12 UTC239OUTGET /fs/windows/config.json HTTP/1.1
                                        Connection: Keep-Alive
                                        Accept: */*
                                        Accept-Encoding: identity
                                        If-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMT
                                        Range: bytes=0-2147483646
                                        User-Agent: Microsoft BITS/7.8
                                        Host: fs.microsoft.com
                                        2024-04-17 22:53:12 UTC530INHTTP/1.1 200 OK
                                        Content-Type: application/octet-stream
                                        Last-Modified: Tue, 16 May 2017 22:58:00 GMT
                                        ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
                                        ApiVersion: Distribute 1.1
                                        Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
                                        X-Azure-Ref: 0rcGnYgAAAAANOnx9vccHTr21ROgX9ESTU0pDRURHRTAzMDkAY2VmYzI1ODMtYTliMi00NGE3LTk3NTUtYjc2ZDE3ZTA1Zjdm
                                        Cache-Control: public, max-age=29472
                                        Date: Wed, 17 Apr 2024 22:53:12 GMT
                                        Content-Length: 55
                                        Connection: close
                                        X-CID: 2
                                        2024-04-17 22:53:12 UTC55INData Raw: 7b 22 66 6f 6e 74 53 65 74 55 72 69 22 3a 22 66 6f 6e 74 73 65 74 2d 32 30 31 37 2d 30 34 2e 6a 73 6f 6e 22 2c 22 62 61 73 65 55 72 69 22 3a 22 66 6f 6e 74 73 22 7d
                                        Data Ascii: {"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        4192.168.2.44977515.204.213.54431068C:\Program Files\Google\Chrome\Application\chrome.exe
                                        TimestampBytes transferredDirectionData
                                        2024-04-17 22:53:12 UTC340OUTGET /?lang=en HTTP/1.1
                                        Host: ipwho.is
                                        Connection: keep-alive
                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                        Accept: */*
                                        Sec-Fetch-Site: none
                                        Sec-Fetch-Mode: cors
                                        Sec-Fetch-Dest: empty
                                        Accept-Encoding: gzip, deflate, br
                                        Accept-Language: en-US,en;q=0.9
                                        2024-04-17 22:53:12 UTC223INHTTP/1.1 200 OK
                                        Date: Wed, 17 Apr 2024 22:53:12 GMT
                                        Content-Type: application/json; charset=utf-8
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        Server: ipwhois
                                        Access-Control-Allow-Headers: *
                                        X-Robots-Tag: noindex
                                        2024-04-17 22:53:12 UTC1038INData Raw: 34 30 32 0d 0a 7b 0a 20 20 20 20 22 41 62 6f 75 74 20 55 73 22 3a 20 22 68 74 74 70 73 3a 5c 2f 5c 2f 69 70 77 68 6f 69 73 2e 69 6f 22 2c 0a 20 20 20 20 22 69 70 22 3a 20 22 38 31 2e 31 38 31 2e 35 37 2e 35 32 22 2c 0a 20 20 20 20 22 73 75 63 63 65 73 73 22 3a 20 74 72 75 65 2c 0a 20 20 20 20 22 74 79 70 65 22 3a 20 22 49 50 76 34 22 2c 0a 20 20 20 20 22 63 6f 6e 74 69 6e 65 6e 74 22 3a 20 22 4e 6f 72 74 68 20 41 6d 65 72 69 63 61 22 2c 0a 20 20 20 20 22 63 6f 6e 74 69 6e 65 6e 74 5f 63 6f 64 65 22 3a 20 22 4e 41 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 5f 63 6f 64 65 22 3a 20 22 55 53 22 2c 0a 20 20 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 47 65 6f 72 67 69
                                        Data Ascii: 402{ "About Us": "https:\/\/ipwhois.io", "ip": "81.181.57.52", "success": true, "type": "IPv4", "continent": "North America", "continent_code": "NA", "country": "United States", "country_code": "US", "region": "Georgi


                                        Click to jump to process

                                        Click to jump to process

                                        Click to jump to process

                                        Target ID:0
                                        Start time:00:53:00
                                        Start date:18/04/2024
                                        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
                                        Imagebase:0x7ff76e190000
                                        File size:3'242'272 bytes
                                        MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:low
                                        Has exited:false

                                        Target ID:2
                                        Start time:00:53:05
                                        Start date:18/04/2024
                                        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2520 --field-trial-handle=2040,i,6389355939676437814,4571706199680036480,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
                                        Imagebase:0x7ff76e190000
                                        File size:3'242'272 bytes
                                        MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:low
                                        Has exited:false

                                        Target ID:3
                                        Start time:00:53:07
                                        Start date:18/04/2024
                                        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://tronld2qi8x.z13.web.core.windows.net/"
                                        Imagebase:0x7ff76e190000
                                        File size:3'242'272 bytes
                                        MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:low
                                        Has exited:true

                                        No disassembly