Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://action.dataisight.com/?wk=J9L77F7J

Overview

General Information

Sample URL:https://action.dataisight.com/?wk=J9L77F7J
Analysis ID:1428255

Detection

Score:0
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 6992 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://action.dataisight.com/?wk=J9L77F7J MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 6156 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1960,i,7326168514606201960,12092394165656843415,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: unknownHTTPS traffic detected: 23.36.68.63:443 -> 192.168.2.16:49738 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.36.68.63:443 -> 192.168.2.16:49739 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.16:49740 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.16:49741 version: TLS 1.2
Source: chrome.exeMemory has grown: Private usage: 1MB later: 31MB
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 23.36.68.63
Source: unknownTCP traffic detected without corresponding DNS query: 23.36.68.63
Source: unknownTCP traffic detected without corresponding DNS query: 23.36.68.63
Source: unknownTCP traffic detected without corresponding DNS query: 23.36.68.63
Source: unknownTCP traffic detected without corresponding DNS query: 23.36.68.63
Source: unknownTCP traffic detected without corresponding DNS query: 23.36.68.63
Source: unknownTCP traffic detected without corresponding DNS query: 23.36.68.63
Source: unknownTCP traffic detected without corresponding DNS query: 23.36.68.63
Source: unknownTCP traffic detected without corresponding DNS query: 23.36.68.63
Source: unknownTCP traffic detected without corresponding DNS query: 23.36.68.63
Source: unknownTCP traffic detected without corresponding DNS query: 23.36.68.63
Source: unknownTCP traffic detected without corresponding DNS query: 23.36.68.63
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 23.36.68.63
Source: unknownTCP traffic detected without corresponding DNS query: 23.36.68.63
Source: unknownTCP traffic detected without corresponding DNS query: 23.36.68.63
Source: unknownTCP traffic detected without corresponding DNS query: 23.36.68.63
Source: unknownTCP traffic detected without corresponding DNS query: 23.36.68.63
Source: unknownTCP traffic detected without corresponding DNS query: 23.36.68.63
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownDNS traffic detected: queries for: action.dataisight.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49700
Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49702 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49688 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49702
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
Source: unknownHTTPS traffic detected: 23.36.68.63:443 -> 192.168.2.16:49738 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.36.68.63:443 -> 192.168.2.16:49739 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.16:49740 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.16:49741 version: TLS 1.2
Source: classification engineClassification label: clean0.win@14/21@6/98
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://action.dataisight.com/?wk=J9L77F7J
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1960,i,7326168514606201960,12092394165656843415,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1960,i,7326168514606201960,12092394165656843415,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
Extra Window Memory Injection
1
Extra Window Memory Injection
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
prd-vs-action-dataisight-com.external-gslb.multiplan.com
208.78.22.36
truefalse
    high
    www.google.com
    74.125.138.147
    truefalse
      high
      action.dataisight.com
      unknown
      unknownfalse
        unknown
        NameMaliciousAntivirus DetectionReputation
        https://action.dataisight.com/false
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          74.125.138.147
          www.google.comUnited States
          15169GOOGLEUSfalse
          172.217.215.102
          unknownUnited States
          15169GOOGLEUSfalse
          1.1.1.1
          unknownAustralia
          13335CLOUDFLARENETUSfalse
          239.255.255.250
          unknownReserved
          unknownunknownfalse
          142.250.105.84
          unknownUnited States
          15169GOOGLEUSfalse
          142.251.15.95
          unknownUnited States
          15169GOOGLEUSfalse
          74.125.136.100
          unknownUnited States
          15169GOOGLEUSfalse
          208.78.22.36
          prd-vs-action-dataisight-com.external-gslb.multiplan.comUnited States
          32850MULTIPLAN-NY-MULTIPLAN-MDUSfalse
          173.194.219.94
          unknownUnited States
          15169GOOGLEUSfalse
          IP
          192.168.2.16
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1428255
          Start date and time:2024-04-18 18:28:44 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:defaultwindowsinteractivecookbook.jbs
          Sample URL:https://action.dataisight.com/?wk=J9L77F7J
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:14
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • EGA enabled
          Analysis Mode:stream
          Analysis stop reason:Timeout
          Detection:CLEAN
          Classification:clean0.win@14/21@6/98
          • Exclude process from analysis (whitelisted): svchost.exe
          • Excluded IPs from analysis (whitelisted): 173.194.219.94, 142.250.105.84, 172.217.215.102, 172.217.215.139, 172.217.215.113, 172.217.215.101, 172.217.215.138, 172.217.215.100, 34.104.35.123, 142.251.15.95, 64.233.185.95, 142.250.105.95, 108.177.122.95, 142.250.9.95, 64.233.177.95, 74.125.138.95, 74.125.136.95, 64.233.176.95, 172.217.215.95, 173.194.219.95, 172.253.124.95, 23.40.205.42
          • Excluded domains from analysis (whitelisted): clients2.google.com, accounts.google.com, edgedl.me.gvt1.com, content-autofill.googleapis.com, ctldl.windowsupdate.com, clientservices.googleapis.com, clients.l.google.com
          • Not all processes where analyzed, report is missing behavior information
          • VT rate limit hit for: https://action.dataisight.com/?wk=J9L77F7J
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 18 15:29:16 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2673
          Entropy (8bit):3.990094500688774
          Encrypted:false
          SSDEEP:
          MD5:FF475FD89DF61FAB85A4897C8D351EE3
          SHA1:AD150D9B5199F301DDFA5C861AD37EB506EC0C87
          SHA-256:A418329FD95C1486BD70CF5CF720F6AC09ECA27E8B54462B93F6F3B679864756
          SHA-512:77257780F0247F9C57B359E3649019F6B28636E640DE9723A8963B4BF5CD89E1DB7257AC722AB8E0E8DA9390985A3D741326A6B9C117526702C84546AF52AE58
          Malicious:false
          Reputation:unknown
          Preview:L..................F.@.. ...$+.,..../.(.....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........u.d......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 18 15:29:15 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2675
          Entropy (8bit):4.0064529495560715
          Encrypted:false
          SSDEEP:
          MD5:39479696430A2189C0445EEC92BF4CDE
          SHA1:9EE8A9E5FE70558097FF988EBD1ECC0552F6C1BF
          SHA-256:FE3F9954156AC498EAC0DC5F966E3725ACBF9634676AD0334ADCE937A8E386D7
          SHA-512:DA93026E8F890DC8EF2AEFD8FAF59881710E41CD193BCE81DB36791C1058FF3F3B7902FE05F1E2187C1CF97CC68A611625857445C55FE59B9AA3D835CC1D188E
          Malicious:false
          Reputation:unknown
          Preview:L..................F.@.. ...$+.,............N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........u.d......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2689
          Entropy (8bit):4.011817172110564
          Encrypted:false
          SSDEEP:
          MD5:0FBD646C33F1E8FC9765BDAADBA0BE82
          SHA1:FC192D4C52CC32919047F67467029F857CA83998
          SHA-256:06F151EDE3DB279D3355C9FD1C65E9213EEB1701E01083761FEC04871DA01EBF
          SHA-512:54A65107A8A104A9734D0EEB37B66F26DBB9895C3E938B2BA04ACEF3CD435D25ADDEF1FB95FC5B6730C7FF6F3B44143054863F3188C57C6DA12877B2345919C4
          Malicious:false
          Reputation:unknown
          Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........u.d......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 18 15:29:15 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2677
          Entropy (8bit):4.005713223538068
          Encrypted:false
          SSDEEP:
          MD5:78BEC7574D8BA7F1B76D684C516066A4
          SHA1:E2E4D67D4CF1B550EFE2D46481533145FA65B9F2
          SHA-256:D952335B362544BB2BB53CF0A998E2732B59AD7505B560E79C131169E4A7B004
          SHA-512:90041C77353793820E7832A653FBA72B5656A0E1F79DE6C186588CA988C64FDC4CD21777B6081F55162CF4697637560C7AEDDC2A1BB8F8F6B6C6D7230A11FEDA
          Malicious:false
          Reputation:unknown
          Preview:L..................F.@.. ...$+.,............N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........u.d......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 18 15:29:16 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2677
          Entropy (8bit):3.9885418543619005
          Encrypted:false
          SSDEEP:
          MD5:D64880B496521C03F488FA3E54F8A8B9
          SHA1:3C3648EEF31717758D0F4FA095661E3623715044
          SHA-256:B729A6412C79E18A19D09E30D939DD23728469752E1B5840E0A12E380E0E1E9E
          SHA-512:751066EE3E3EB2B5024468F9C0C338E6AD5D8B13F8128A9EBD142AB86D24F188D75EB87C151B1CDCF3C44926E7FC74461D3B0CF95AE6982C88A68D9DDFED0D91
          Malicious:false
          Reputation:unknown
          Preview:L..................F.@.. ...$+.,....ro......N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........u.d......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 18 15:29:15 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2679
          Entropy (8bit):4.0027463383475625
          Encrypted:false
          SSDEEP:
          MD5:32B102E2419843A118318C4A5331FD7E
          SHA1:5EE5BF568AFA930B1F61AE1B4DC02C0DE4E12822
          SHA-256:D58E0461C95B6A95217EA90FBF0BFC4A928ED5DB0C026340071CBB2759E6100D
          SHA-512:8FB42C35884F3EC83D7EB11013699C3D3623BE2FA58CB4CCCC677F640AEA8041D957A082710B9FF7B2A4AF8BA189B6561E2B69508C43E695DC04A0ECF35A69F4
          Malicious:false
          Reputation:unknown
          Preview:L..................F.@.. ...$+.,..........N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........u.d......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:ASCII text, with very long lines (65462)
          Category:downloaded
          Size (bytes):1546828
          Entropy (8bit):5.520665741651383
          Encrypted:false
          SSDEEP:
          MD5:D31A4213AE0023862477D77781BF4CDB
          SHA1:830F30AC2C366979E9A76DB96BFF0B73A4AC22D0
          SHA-256:4E4D812299C8872D89C1504B7D549A91618B892BE9C814D148130E05066C40B5
          SHA-512:49E86BB6B1A346DF551CC056243EC52F357011CB2FB173705B99E8B70B890E6832F77EEDAC7761DDAC811720B0615BB8D344DE54665416CD75D7CBD14BE59E65
          Malicious:false
          Reputation:unknown
          URL:https://action.dataisight.com/static/js/2.f7e84c1e.chunk.js
          Preview:/*! For license information please see 2.f7e84c1e.chunk.js.LICENSE.txt */.(this.webpackJsonpMRAProviderPortal=this.webpackJsonpMRAProviderPortal||[]).push([[2],[function(e,t,n){"use strict";e.exports=n(527)},function(e,t,n){"use strict";n.d(t,"a",(function(){return a}));var r=n(30);function o(e,t){var n=Object.keys(e);if(Object.getOwnPropertySymbols){var r=Object.getOwnPropertySymbols(e);t&&(r=r.filter((function(t){return Object.getOwnPropertyDescriptor(e,t).enumerable}))),n.push.apply(n,r)}return n}function a(e){for(var t=1;t<arguments.length;t++){var n=null!=arguments[t]?arguments[t]:{};t%2?o(Object(n),!0).forEach((function(t){Object(r.a)(e,t,n[t])})):Object.getOwnPropertyDescriptors?Object.defineProperties(e,Object.getOwnPropertyDescriptors(n)):o(Object(n)).forEach((function(t){Object.defineProperty(e,t,Object.getOwnPropertyDescriptor(n,t))}))}return e}},function(e,t,n){e.exports=n(533)()},function(e,t){e.exports=function(e,t,n){return t in e?Object.defineProperty(e,t,{value:n,enume
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:PNG image data, 70 x 60, 8-bit/color RGBA, non-interlaced
          Category:dropped
          Size (bytes):3042
          Entropy (8bit):7.863571276143355
          Encrypted:false
          SSDEEP:
          MD5:514AB580C631E01ADB88AB284297EFDF
          SHA1:BFAA2BD6D3C1317E063ADAB381FD49BCB327968B
          SHA-256:F065F254619DAED81A34EA370DFF0ED303C271511DFE45C0ED4B600D4586C921
          SHA-512:01453C17968A2F499FFC4431E24D31FB8F040D2DDBFFF2BF451C07C2D5C130F69D2498498A20AF75346B130DCF78F51E3300331306A9A1C72B4B169F33B3D0B4
          Malicious:false
          Reputation:unknown
          Preview:.PNG........IHDR...F...<.......#....pHYs..........+......tIME.......QZ.W....tEXtAuthor....H....tEXtDescription...!#....tEXtCopyright....:....tEXtCreation time.5.......tEXtSoftware.]p.:....tEXtDisclaimer.........tEXtWarning........tEXtSource.........tEXtComment........tEXtTitle....'....IDATx.._lS...?...8...&.C...k.R.T.)l.*..@..........L.J5M..^....T......[.....ej..@I...Mb..q....9{.}.c.I.Mh.|...s.9.w>.w...s.422"....l..D"!.........:."Z.SD.......F,).i........a...>...J..n...I.I....Z.............9.c6\.r~.Z.....!.r.u.e.4...TNS..=...........`d...[d...>..1.{...@1.,.V....9..._....N...W.c....legG.v.m..I...q...G&y..(..i&a..e!...n..,.p.p..A`G.4..M..k..w....m...p.CX..,.|.v;.u5...aK.4.....$.t.*.G!]...T.=.?...CS...._Q4.......%.cUf%U...V.R.12U..F9..i R.....`H.g'...q.DR..P.|._.a...y..L+..c....|:.p.3....(.e.... ..$@.H...y.qxt._......l.....mF'...|/-&K..!..Np._fb..J.9..%gS.l.Hh....2...........\.w...j.r.F...B0.P........^...P....[z63.Ep.`xt.......r....d..U.9.Q..9oNz!(9I..}....
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:JSON data
          Category:dropped
          Size (bytes):187
          Entropy (8bit):5.2039946252598765
          Encrypted:false
          SSDEEP:
          MD5:A31905FD6A719866F5F38ED5393F4CEF
          SHA1:225B83AD790CE0718D342E66475DF42D029E5F4C
          SHA-256:BD0F57834D4179545732423E6828E37D3776765ED6628D70460FE7167DC251A3
          SHA-512:AB06FBDD7824684CDC3D656A3F4B90E97CCA1CF1084DFDAC11515040959D74AC2164D97A7F7300D0000F312CCFD67C66FF6BEDD090692CC46DD87111B916F28D
          Malicious:false
          Reputation:unknown
          Preview:{"REACT_APP_CLIENT_KEY_V2" : "6Ldw3s4ZAAAAAMjoWiiZorsbcQoK1EWSaNKjB2FK","REACT_APP_CLIENT_KEY_V3" :"6LeW3s4ZAAAAACVIOd2ah2vNUzMci1kFK7B_ChlX","REACT_APP_CLIENT_APPD_KEY":"AD-AAB-ABY-ZGZ"}
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:JSON data
          Category:downloaded
          Size (bytes):387
          Entropy (8bit):4.823101379285255
          Encrypted:false
          SSDEEP:
          MD5:38FAB4B47F28CD4E41C1300C1008179C
          SHA1:9E2AE72CB95E9D82FFF72FE4E850C33AF3A435E0
          SHA-256:A28935C0363F771659A4FAA2453D06FD8019CD8AF776C533BDDF4927EDC9FF67
          SHA-512:9E5F40D764316261943443C56349A2FD4C2CA26E46C6AC8CBF3A61DC833B96C47F7E9E1837F6FD7694D9870483C6E6299B174683AFC683F5F15BD9B98C9C077B
          Malicious:false
          Reputation:unknown
          URL:https://action.dataisight.com/maintenance
          Preview:{"msg":"<div class=\"container\">\n\tNote: The Internet Explorer 11 desktop application will be retired and go out of support on June 15, 2022. The same IE11 apps and sites you use today can open in Microsoft Edge with Internet Explorer mode, or you can use an alternate browser like Google Chrome. <a href=\"https://aka.ms/IEModeBlog\" target=\"_blank\">Learn more here</a>.\n</div>\n"}
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:JSON data
          Category:downloaded
          Size (bytes):365
          Entropy (8bit):4.710212867455013
          Encrypted:false
          SSDEEP:
          MD5:E7F3183DF76B135DB1509D1F28990A02
          SHA1:E0FB005FCAED829634E4FB6593E70E59DE53E9E2
          SHA-256:AAF303AA42225B20AD1A72A7CA744337652DA391B2238D5AC0FB5E838E4CC686
          SHA-512:AE8C61702761C88E324826A0FA029117AEB96FA920C9F82D0D871D5C5C70C23AF50619DE4B94EB08FA665ED0002B8E185B60B34A0ED851B0853A5F9514A6A730
          Malicious:false
          Reputation:unknown
          URL:https://action.dataisight.com/manifest.json
          Preview:{. "short_name": "React App",. "name": "Create React App Sample",. "icons": [. {. "src": "favicon.ico",. "sizes": "64x64 32x32 24x24 16x16",. "type": "image/x-icon"}. ],. "contentSecurityPolicy": {. "img-src": "'self' data:". },. "start_url": ".",. "display": "standalone",. "theme_color": "#000000",. "background_color": "#ffffff".}.
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:assembler source, ASCII text
          Category:downloaded
          Size (bytes):1083
          Entropy (8bit):4.954238197653071
          Encrypted:false
          SSDEEP:
          MD5:7CC6D42FC5D39752994966AD613273E0
          SHA1:60406614B600A1829BBF8FD065FFC98754C067E5
          SHA-256:6387B6311F3AC9E3DA91ADF402601789931AFBB2F92B43236C827B07CD33FD95
          SHA-512:E538C9391320F415E6865D90D221528C4863C29B67D55F81078CCEC1545FCDE4172A32C84D0B75BE7936A4DEB287E431286A89318402CFC3E7A5FF737E8EF702
          Malicious:false
          Reputation:unknown
          URL:https://action.dataisight.com/index.css
          Preview:.bg-light {. background-color: #f8f9fa !important;.}...py-3 {. padding-top: 1rem !important;.}...flex-md-nowrap {. flex-wrap: nowrap !important;.}...align-items-center {. align-items: center !important;.}...d-flex {. display: flex !important;.}..mr-3,..mx-3 {. margin-right: 1rem !important;.}..img {. vertical-align: middle;. border-style: none;.}...h4,.h4 {. font-size: 1.5rem;.}..mb-1,..my-1 {. margin-bottom: 0.25rem !important;.}...flex-column {. flex-direction: column !important;.}...p-3 {. padding: 1rem !important;.}..flex-grow-1 {. flex-grow: 1 !important;.}...text-center {. text-align: center !important;.}..mt-5,..my-5 {. margin-top: 3rem !important;.}...mb-4,..my-4 {. margin-bottom: 1.5rem !important;.}..h4,.h4 {. font-size: 1.5rem;.}..h3 {. font-family: 'Ubuntu',sans-serif;. }. . . . .h5 {. font-family: 'Ubuntu',sans-serif;..body {. font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto,. "Helvetica Neue", Arial, "Noto Sans", sans-serif, "
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:JSON data
          Category:downloaded
          Size (bytes):281
          Entropy (8bit):4.514764697704379
          Encrypted:false
          SSDEEP:
          MD5:28CD90F3555C6CC6092B17B43BA2E591
          SHA1:DD8EB261B13F2A9B11A5A444D73659258CAD1EE9
          SHA-256:F75213D3A55F506EE92B06BCE392678B87E969B8C0639E4CDE32B65266787DA4
          SHA-512:5B8BB9265869C11FE279FAB8F3F5C6D7E67EC2455C0DCA3369DC8E1F661455A2E94665C443FF1ADB429B51F2811A04960B04E068AE66D9B0E2036D5A0EFA311A
          Malicious:false
          Reputation:unknown
          URL:https://action.dataisight.com/comingSoon
          Preview:[.. {.. "title":"EOP (Explanation of Payment) will be required with submissions",.. "body":"In order to expedite and accurately review your inquiry, the EOP for the claim is needed. It provides us with the payment status as well as any patient responsibility.".. }..]
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:SVG Scalable Vector Graphics image
          Category:downloaded
          Size (bytes):187
          Entropy (8bit):5.092241570490809
          Encrypted:false
          SSDEEP:
          MD5:EE59E84BC1CE00855008BCE35DD1987A
          SHA1:E8D0DC5A6651C898A14EAC173516F3964FB44E86
          SHA-256:EE764DF5BA0C287060DAD6469D334B17A79FD0A2A30EACCB1B07C894E736B052
          SHA-512:C2E0312BCF7AC169FF1A9B2CFFEA340164098BF82AB4EDE4F740AE455D847E38DD15FE2DE29BA74CF764010C118C8E28F9D039FE1AC6BEE78B2BBEE270A3E2FA
          Malicious:false
          Reputation:unknown
          URL:https://action.dataisight.com/static/media/background.ee59e84b.svg
          Preview:<svg width='6' height='6' viewBox='0 0 6 6' xmlns='http://www.w3.org/2000/svg'>. <g fill='#b8b9bd' fill-opacity='0.39' fill-rule='evenodd'><path d='M5 0h1L0 6V5zM6 5v1H5z'/></g>.</svg>
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:ASCII text, with no line terminators
          Category:downloaded
          Size (bytes):16
          Entropy (8bit):3.75
          Encrypted:false
          SSDEEP:
          MD5:A7EC53A1E18D539AD762B5E408E86F86
          SHA1:6A2629FFDCA03F2B02652436B73F3DE03A3DF229
          SHA-256:865AAD7DEF634C6AF13C55DD812F136C854F223BEA5FB5CB137B1224E843115F
          SHA-512:2D129E6F30A0B986FE5BEB9E7B699FEF543142BC3DB13AC10FEB87EE2071C67835773C0554CFAFE099A3D904C559D881999E4627226CCF52FC4C17706766BBD9
          Malicious:false
          Reputation:unknown
          URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISEAniN-Oz65uFHhIFDWMFM7k=?alt=proto
          Preview:CgkKBw1jBTO5GgA=
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:ASCII text, with very long lines (4900), with no line terminators
          Category:downloaded
          Size (bytes):4900
          Entropy (8bit):5.147617518846937
          Encrypted:false
          SSDEEP:
          MD5:FDD583EF61FDDEF1694EAE3ACE22BC7D
          SHA1:10057679BD9F6193BC011FF1621B384A9E504773
          SHA-256:DBBB555BCFFE2ED90A324DAFB4E646ECAB55DE4E2515DC6D4CCD2EAB4AE4AFE8
          SHA-512:9E281946B998CD7E391AA30B17310678466DF3E8E3EF4EE9F25BE0EDB387580DD22D4C330A655B704592879182F6E5CCB1D70FEA80B55E247F4666C3A1966B71
          Malicious:false
          Reputation:unknown
          URL:https://action.dataisight.com/static/css/main.a560e60d.chunk.css
          Preview:.grecaptcha-badge{visibility:hidden}.logo{background-image:url(/static/media/dis-logo-180.5a96aa36.gif);width:180px;height:46px;display:block;background-repeat:no-repeat}.recaptcha-img{background-image:url(/static/media/recaptcha-badge.514ab580.png);width:70px;height:60px}.icon-bottom{position:fixed;bottom:0;right:0}.bg-dark-grey{background-color:rgba(0,0,0,.05)}.bg-danger-light{background-color:#f8d7da!important;color:#721c24}.cookie-banner{box-shadow:0 0 5px 1px rgba(0,0,0,.3);background:#fff;display:flex;flex-wrap:wrap;justify-content:center;align-items:center;padding:1.5rem 1.5rem 1rem;position:fixed;bottom:0;right:0;max-width:35rem;opacity:.85;left:50%!important;transform:translateX(-50%);z-index:1}@media screen and (max-width:812px){.cookie-banner{width:100%}}.react-bootstrap-table-page-btns-ul{float:right;margin-top:0!important}.react-bootstrap-table-pagination-list-hidden{display:none}.content-center{position:fixed;top:50%;left:50%;margin:-25px 0 0 -25px}.page-item .page-link{l
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:JSON data
          Category:downloaded
          Size (bytes):1926
          Entropy (8bit):4.564436981863746
          Encrypted:false
          SSDEEP:
          MD5:76518B3AF7C26B66897B2BC49A0A22CD
          SHA1:70A711F6A0AAC7142FD412466E9079D449A076B2
          SHA-256:7B70BAA9DEE6892B9BF4AF7470C3F2D3462771B57EFB27D245EEBAD90533984D
          SHA-512:30F61DA1CCEB3CE1C64C72A1AD8BCEF0CCF58112B2FBA8FBB0561595A9C1039EE50A6204A6E023AAE6C4A412C94A7275463994D70FA99D13A1C0F065470EBE32
          Malicious:false
          Reputation:unknown
          URL:https://action.dataisight.com/whatsNew
          Preview: [.. {.. "title":"Request an Account",.. "body":"Creating an account to submit multiple inquiries provides an efficient, faster way to submit more than one inquiry.</div>",.. "moreContentName":"Learn more about requesting an account",.. "moreContentHeading":"To reguest an account go to the <div><a href=\"https://action.dataisight.com/create-inquiries-login\">Sign in screen</a> and click the <b>Submit a request</b> link.",.. "moreContentBody":[.. "Enter your Name, Company Name, Email, and Phone.",.. "Select Request Account, and your Account information will be emailed to you from support@dataisight.com with the subject line starting with 'Almost done' once it is created.".. ].. },.. {.. "title":"Multiple Claim Uploads",.. "body":"Create inquiries for up to 400 claims at a time once your account is created.",.. "moreContentName":"Learn more about multiple claim uploads",.. "moreContentBody":[.. "To expedite y
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:HTML document, ASCII text, with very long lines (3586), with no line terminators
          Category:downloaded
          Size (bytes):3586
          Entropy (8bit):5.296175185336391
          Encrypted:false
          SSDEEP:
          MD5:12AB5196E6C53D6C669480D94EB98C82
          SHA1:6FB943A996798FE18BA87080A7E6B4267A3B018C
          SHA-256:0938D31F567A023720CDBD4B86D09882DFC149639339FBB3E329CBE8FF09F6FD
          SHA-512:6C7AFAC6C42C5F0CD99A7BAFBCC6A6D37D1A9DA3D56BDCCC19EE457F47C32929A88866CB4AD5FAF59D77CC8742AB8060196F826E77DD32DA95D795ED29924871
          Malicious:false
          Reputation:unknown
          URL:https://action.dataisight.com/?wk=J9L77F7J
          Preview:<!doctype html><html lang="en"><head><meta charset="utf-8"/><link rel="icon" href="favicon.ico"/><link rel="stylesheet" href="index.css" media="all"><meta name="viewport" content="width=device-width,initial-scale=1"/><meta name="theme-color" content="#000000"/><meta name="description" content="Web site created using create-react-app"/><link rel="apple-touch-icon" href="favicon.ico"/><link rel="manifest" href="/manifest.json"/><title>Data iSight Provider Portal</title><link href="/static/css/main.a560e60d.chunk.css" rel="stylesheet"></head><body><div id="root" class="d-flex flex-column vh-100 bg-light"><noscript><header class="d-flex flex-wrap flex-md-nowrap align-items-center py-3"><img src="dis-logo-180.gif" class="mr-3" alt="Data iSight"/><div class="h4 my-1">Provider Portal</div></header><main class="flex-grow-1 p-3"><div class="text-center mt-5"><p class="h4 mb-4">Javascript is required to use this application</p><p>If you think that Javascript is enabled in your browser, please tr
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:ASCII text, with very long lines (65536), with no line terminators
          Category:downloaded
          Size (bytes):185853
          Entropy (8bit):5.194853097971643
          Encrypted:false
          SSDEEP:
          MD5:A2D3B45AFC46AA98758EE7C287370547
          SHA1:856BDE1EFFD5F4DED4BE7B7862CF5680D87D7A54
          SHA-256:6E3918A6DA72659EC295971C2AB8E839565F9E767F5694F6A0AE0E3460B55A6E
          SHA-512:8CE2CA7E75F325E6144EC05794FCB2AE3B211086DD064A4A0078E423850B6585E81028EE7B6FD30B7626167027DB9147733D4AD98580858994A56EA828539D21
          Malicious:false
          Reputation:unknown
          URL:https://action.dataisight.com/static/js/main.855cb61b.chunk.js
          Preview:(this.webpackJsonpMRAProviderPortal=this.webpackJsonpMRAProviderPortal||[]).push([[0],{314:function(e,t,a){"use strict";t.a={api:{webKeyAPI:{name:"/authentication/webKeyValidation",type:"POST"},tinAPI:{name:"/authentication/tinValidation",type:"POST"},maintenanceAPI:{name:"/maintenance",type:"GET"},pendingAgreementAPI:{name:"/claimAgreements/claims",type:"GET"},closureAgreementAPI:{name:"/claimAgreements/closure",type:"POST"},agreementCommentaryAPI:{name:"/claimAgreements/commentary",type:"POST"},eventTrackingAPI:{name:"/eventTracking/logEvent",type:"POST"},lineDetailAPI:{name:"/claimAgreements/claimLines",type:"GET"},loasGenerationAPI:{name:"/claimAgreements/loasGeneration",type:"POST"},patientDobAPI:{name:"/claimAgreements/patient",type:"GET"},claimSearchAPI:{name:"/claims",type:"POST"},fileUpload:{name:"/fileUpload",type:"POST"},fileDelete:{name:"/fileUpload/delete",type:"POST"},inquiryCreation:{name:"/claimInquiries/inquiryCreation",type:"POST"},createUserAPI:{name:"/portalIdentity
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
          Category:downloaded
          Size (bytes):1787
          Entropy (8bit):7.535547392354853
          Encrypted:false
          SSDEEP:
          MD5:25C4E594D036CE47B5809D23D88CEC1B
          SHA1:EFFCA37902D0CA471930B990D043B32C1F10D2D8
          SHA-256:A44323BE3918F94693EB165B85ACD35459957D14B56EF52484FD4E63034B0BC5
          SHA-512:6931A2514AE9463EBFEC3697C5AE85B144FB2BC7F2049E19F41E9500D8DAB06267E36366BE8D8E6BD041874CDCB230F2F507E9A6EDDFADBC25074BAF6F0296A9
          Malicious:false
          Reputation:unknown
          URL:https://action.dataisight.com/favicon.ico
          Preview:.PNG........IHDR... ... .....szz.....gAMA....|.Q.... cHRM..z%..............u0...`..:....o........IDATx.b...?.@...b.P.. ......4.... ...S.&&&.FFF..,E..~d...=.'.3........a.acb..bf..dbx.....P...3.?..._.At..._....L........I...............+>..7...?....R.........@...h,..............(..-g`......Q^...V....o~%....Q..._`.0202?..a.././>.5..a.ggaT...C.d ._ ......k=@......@..i\..,.'............$...X,...Q. ..d..@$9.j0.0'...<.!.&F...~?Q.d..HT^.%..r...?#@......}....'.>Q........O.%...j.l........._....L....... ...y..\..,^..\39X.e@........\S..B......*.Z......n..8..@x.......y..8f:)sm`ga.[...0.............t.#hN&.@.......w.... .......#8.y.$...W.r3...6..,@.~...c././>.../....".~..\.,.U.>=.. &.>.^......CK.7.(..cSY.."\.v..6....P...KW_..~...P..AQ...(%.@d...z.....@UF................V......7cgfX...,..)O1.}.....G.|.....#!`..........s..."..P..VF.. }..e...r.._..%......O.=...w)....4.5....w...S..(..?....&.F`Q...........?....1...........~1x..qz..q....~a....O....._.T.3...s.."...d..........0M.>...
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:GIF image data, version 89a, 180 x 46
          Category:downloaded
          Size (bytes):3159
          Entropy (8bit):7.535449630698634
          Encrypted:false
          SSDEEP:
          MD5:5A96AA3603322B26152F1840D36738F7
          SHA1:A37862A90BD59F60353763AFF24DEDDA31A63C54
          SHA-256:8A792A465FB673F7F46817DFFE092029EF9F72E0248D2B924B1DAB28445B6842
          SHA-512:67182019E3652AAB77BB94D6408AA267511328D7A693FB806F084731F2B02E99D2513DBEA5FB4ABC169D5E1BC1571641DF48F9FEEB6055D3AF57A32AE3FF9EAB
          Malicious:false
          Reputation:unknown
          URL:https://action.dataisight.com/static/media/dis-logo-180.5a96aa36.gif
          Preview:GIF89a.......T]g....|$fff.A...py..kL....o....u4......|fU...~!oqt.....s:..^...{kR..d..&...[`d....{).kJ..........c{{|......=Yr.|....p.....nC.Ifff.,..........y,.a.U..Klb\.=Q\i...........Kms{.2....s9........#.R./.Dciq...................m...|'.j.u..........x0..}...rd[J[l.q?..(Z^e.......X.iO.t........Jfff.7.P..X....lH.........c...............hR.kB.{0.{.....?..........fff.*.k.T.sB.!sst...ZZk...\dm~~....ruzmmp.s1.1.....D.u6.^........u............\......M.u.8..O.....).........................................................................................................................................................................................................................................................!.....<.,............y..H......*\.!.WR...0...C..j.... C..qa..3.` ...%".K...I...8..2...@...yEO.H.*.t%..P.LRJ..U...j....`y..J.g..a..8..@e..YK.n.)...%.$...v...c.'..p.n.).1.:XZ..S..".[19.l....B2.|..)...S.....^..
          No static file info