Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://liquidfiles.cooley.com/filedrop/jochoa@cooley.com

Overview

General Information

Sample URL:https://liquidfiles.cooley.com/filedrop/jochoa@cooley.com
Analysis ID:1432135

Detection

Score:1
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Detected hidden input values containing email addresses (often used in phishing pages)
Stores files to the Windows start menu directory
URL contains potential PII (phishing indication)

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 4320 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://liquidfiles.cooley.com/filedrop/jochoa@cooley.com MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 6184 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 --field-trial-handle=1976,i,9340924207331991144,4946239053874065700,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: https://liquidfiles.cooley.com/filedrop/jochoa@cooley.comHTTP Parser: jochoa@cooley.com
Source: https://liquidfiles.cooley.com/filedrop/jochoa@cooley.comSample URL: PII: jochoa@cooley.com
Source: https://liquidfiles.cooley.com/filedrop/jochoa@cooley.comSample URL: PII: jochoa@cooley.com
Source: https://liquidfiles.cooley.com/filedrop/jochoa@cooley.comSample URL: PII: jochoa@cooley.com
Source: https://liquidfiles.cooley.com/filedrop/jochoa@cooley.comSample URL: PII: jochoa@cooley.com
Source: https://liquidfiles.cooley.com/filedrop/jochoa@cooley.comSample URL: PII: jochoa@cooley.com
Source: https://liquidfiles.cooley.com/filedrop/jochoa@cooley.comSample URL: PII: jochoa@cooley.com
Source: https://liquidfiles.cooley.com/filedrop/jochoa@cooley.comSample URL: PII: jochoa@cooley.com
Source: https://liquidfiles.cooley.com/filedrop/jochoa@cooley.comSample URL: PII: jochoa@cooley.com
Source: https://liquidfiles.cooley.com/filedrop/jochoa@cooley.comSample URL: PII: jochoa@cooley.com
Source: https://liquidfiles.cooley.com/filedrop/jochoa@cooley.comSample URL: PII: jochoa@cooley.com
Source: https://liquidfiles.cooley.com/filedrop/jochoa@cooley.comSample URL: PII: jochoa@cooley.com
Source: https://liquidfiles.cooley.com/filedrop/jochoa@cooley.comSample URL: PII: jochoa@cooley.com
Source: https://liquidfiles.cooley.com/filedrop/jochoa@cooley.comSample URL: PII: jochoa@cooley.com
Source: unknownHTTPS traffic detected: 23.204.76.112:443 -> 192.168.2.16:49715 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.204.76.112:443 -> 192.168.2.16:49717 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.127.169.103:443 -> 192.168.2.16:49718 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.127.169.103:443 -> 192.168.2.16:49730 version: TLS 1.2
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 23.50.112.6
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 23.204.76.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.204.76.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.204.76.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.204.76.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.204.76.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.204.76.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.204.76.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.204.76.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.204.76.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.204.76.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.204.76.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.204.76.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.204.76.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.204.76.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.204.76.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.204.76.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.204.76.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.204.76.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.204.76.112
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: global trafficDNS traffic detected: DNS query: liquidfiles.cooley.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49688 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownHTTPS traffic detected: 23.204.76.112:443 -> 192.168.2.16:49715 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.204.76.112:443 -> 192.168.2.16:49717 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.127.169.103:443 -> 192.168.2.16:49718 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.127.169.103:443 -> 192.168.2.16:49730 version: TLS 1.2
Source: classification engineClassification label: clean1.win@14/15@6/123
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://liquidfiles.cooley.com/filedrop/jochoa@cooley.com
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 --field-trial-handle=1976,i,9340924207331991144,4946239053874065700,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 --field-trial-handle=1976,i,9340924207331991144,4946239053874065700,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
https://liquidfiles.cooley.com/filedrop/jochoa@cooley.com0%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
liquidfiles.cooley.com
173.227.174.84
truefalse
    high
    www.google.com
    192.178.50.36
    truefalse
      high
      NameMaliciousAntivirus DetectionReputation
      https://liquidfiles.cooley.com/filedrop/jochoa@cooley.comfalse
        high
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        192.178.50.36
        www.google.comUnited States
        15169GOOGLEUSfalse
        1.1.1.1
        unknownAustralia
        13335CLOUDFLARENETUSfalse
        142.250.64.227
        unknownUnited States
        15169GOOGLEUSfalse
        142.250.217.238
        unknownUnited States
        15169GOOGLEUSfalse
        108.177.11.84
        unknownUnited States
        15169GOOGLEUSfalse
        173.227.174.84
        liquidfiles.cooley.comUnited States
        54571COOLEYUSfalse
        239.255.255.250
        unknownReserved
        unknownunknownfalse
        142.251.35.238
        unknownUnited States
        15169GOOGLEUSfalse
        142.250.64.170
        unknownUnited States
        15169GOOGLEUSfalse
        142.250.217.195
        unknownUnited States
        15169GOOGLEUSfalse
        IP
        192.168.2.8
        192.168.2.16
        192.168.2.7
        192.168.2.4
        192.168.2.5
        Joe Sandbox version:40.0.0 Tourmaline
        Analysis ID:1432135
        Start date and time:2024-04-26 15:14:06 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:defaultwindowsinteractivecookbook.jbs
        Sample URL:https://liquidfiles.cooley.com/filedrop/jochoa@cooley.com
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:14
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • EGA enabled
        Analysis Mode:stream
        Analysis stop reason:Timeout
        Detection:CLEAN
        Classification:clean1.win@14/15@6/123
        • Exclude process from analysis (whitelisted): svchost.exe
        • Excluded IPs from analysis (whitelisted): 142.250.64.227, 108.177.11.84, 142.250.217.238, 34.104.35.123
        • Excluded domains from analysis (whitelisted): clients2.google.com, accounts.google.com, edgedl.me.gvt1.com, clientservices.googleapis.com, clients.l.google.com
        • Not all processes where analyzed, report is missing behavior information
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 12:14:37 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
        Category:dropped
        Size (bytes):2673
        Entropy (8bit):3.9817103226292354
        Encrypted:false
        SSDEEP:
        MD5:40E5247017E3E3350AD52FCFF3482C33
        SHA1:B8F0603C6055152417E2F56D4632F6D0EEE3AB4F
        SHA-256:6DCF8F71D6F80FB895E0A99044D1A8FF63BC211E7664A4FC3512C9DD20395916
        SHA-512:CF8E91A164672FB134CAE40EDD143E2D1750A1F11CBCE54B152FE85CB2BA8E6B151BF6B03C5E1DB573C2B8A85EE7B1BB2C425FEB77CFAB6512AEDCCF5F2BB5CD
        Malicious:false
        Reputation:unknown
        Preview:L..................F.@.. ...$+.,....n.J....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.i....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.i....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.i....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.i..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.i...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........O.J......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 12:14:37 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
        Category:dropped
        Size (bytes):2675
        Entropy (8bit):3.99926971215273
        Encrypted:false
        SSDEEP:
        MD5:255C383D2E350A0EE6D24BACFFFAAE49
        SHA1:C45FCC8FD1D28621E6C6DBF76723C938FDE0A640
        SHA-256:EC8B78B87E670DCE87034557C552D790BF61A50B9EE5284353FE9E62A7B5D8F1
        SHA-512:B7C400BDFA94DE8D96A6EB75363FE913175B9F42168AF32FFFD5627EDEC4FC945964195BEAD8D7D591ABEA43B4FDEEEBD40B0213EBBE4E1962B82CB11DA7CA1F
        Malicious:false
        Reputation:unknown
        Preview:L..................F.@.. ...$+.,.....?....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.i....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.i....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.i....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.i..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.i...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........O.J......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
        Category:dropped
        Size (bytes):2689
        Entropy (8bit):4.005482751656376
        Encrypted:false
        SSDEEP:
        MD5:205A076D6C78685E3C6A6B3CE1E5C8C1
        SHA1:EB1EC81BCFA8710EE49AF82352776B41A7968181
        SHA-256:801B5F5C1E1ACDB53CE51366ABC1185F4F24E32C95397039665EA97C1C6E4254
        SHA-512:E47CFF113EF931AA54B6D5999093B8D87BDCC23265CB8601DF839E9C61C4E5E3A6224094239791A47FE6A23A129CE097448E0BAF84039A505F7E19812682773E
        Malicious:false
        Reputation:unknown
        Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.i....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.i....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.i....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.i..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........O.J......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 12:14:37 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
        Category:dropped
        Size (bytes):2677
        Entropy (8bit):3.997232125811574
        Encrypted:false
        SSDEEP:
        MD5:97BDA51223492C3640F679F3E5B82791
        SHA1:DE1CDC4C06CB54E7B386885494A5740037D53300
        SHA-256:66855F0795323EE54B49287D02E9A32BD79D5946E6C41AEA144C05C78D2CF360
        SHA-512:9F6FA641A8FF153C58A2E1D3C75A5D92B3FC7F97636C198BE077BA34249BA54BE6AF981523CC886BB3ED391E15CB9DF745DF73E28EBF15AF1E4E8F3A0977A383
        Malicious:false
        Reputation:unknown
        Preview:L..................F.@.. ...$+.,.....:....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.i....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.i....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.i....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.i..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.i...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........O.J......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 12:14:37 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
        Category:dropped
        Size (bytes):2677
        Entropy (8bit):3.9847605606274104
        Encrypted:false
        SSDEEP:
        MD5:A3ADFB7C5EE471BC540B73A52315A6D8
        SHA1:0442E2FA4988B79E805632199679C15DBB1D1E1B
        SHA-256:A5D81FA8404D599141D2B9485F20B473E75AA57D21B2AB267759232D6A644E64
        SHA-512:18310C3E3E765A990F1458410BAD74284C8A08953DF1AE6F303F4C8BDAD36963D4D275DF06EB0C8228DE95B89FC7BA117EB1A33C87133ADF28C56A88BC129B74
        Malicious:false
        Reputation:unknown
        Preview:L..................F.@.. ...$+.,....vjE....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.i....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.i....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.i....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.i..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.i...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........O.J......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 12:14:37 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
        Category:dropped
        Size (bytes):2679
        Entropy (8bit):3.9948740214397103
        Encrypted:false
        SSDEEP:
        MD5:EAD0A9FB43CB2A77331E735A1EFAAE2E
        SHA1:91E5136EC5C1280AE600B04C9487D5547CC15946
        SHA-256:E519B536CABBC3F759EB9004D1C9EF16937A339C0EC698C5A7EAF3FA4928B5E1
        SHA-512:ACFE10A9B89D99E4E166CA83708CF1BA4DBA1247871930CB7A94B926F55B44C7BDC552AD876B47711DB400D21BEEF1F69D79DD115061789C3C15BAEAB015603E
        Malicious:false
        Reputation:unknown
        Preview:L..................F.@.. ...$+.,......0....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.i....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.i....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.i....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.i..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.i...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........O.J......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:GIF image data, version 89a, 1 x 1
        Category:dropped
        Size (bytes):43
        Entropy (8bit):2.8281918225054152
        Encrypted:false
        SSDEEP:
        MD5:A484EA6CB73E277B9AA3086F01FCD766
        SHA1:7D47FF94C7397594FE4608C80BA2A9026C2F80CF
        SHA-256:D2437DDF45AA84303D14CC4569941C1AE58E8ACCCA92216349C1332794015C6F
        SHA-512:51D95319D7FDCFA0D0E9002CE9F977FA190A787B83AC3D38FB83C42236B3E5B63DDE4ADED3E09268121A426811FE315188972A9E95FE6DFB36320368DDA080C4
        Malicious:false
        Reputation:unknown
        Preview:GIF89a.............!.......,...........D..;
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:ASCII text, with no line terminators
        Category:downloaded
        Size (bytes):116
        Entropy (8bit):4.759361077046977
        Encrypted:false
        SSDEEP:
        MD5:69E30378B2D2666B5AC929951F70E993
        SHA1:FC932B5CDFDA226D07623EED538AC3F0AF213A6A
        SHA-256:68B3264ADD8FDC0AC1786C50F0AF8EBA4FA4F34221D4907CBD04038A3E07E528
        SHA-512:DAB5F1B1506FCEF024B370426544F52870C6EBC9FA3DE1F82540CE577D90CB0B4FE98B5A9C9F6AAFEF6B6FE6A50EF191A0A4D2931AF7B614B69DBA840E247883
        Malicious:false
        Reputation:unknown
        URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISSAkV8ThAwU9LQBIFDTEQwswSBQ035imrEgUNuN4vKRIFDfF-6K8SBQ0G7bv_EgUNSFM-aBIFDbMqnbYSBQ03CxdwEgUNoVVvIw==?alt=proto
        Preview:ClUKCw0xEMLMGgQICRgBCgcNN+YpqxoACgcNuN4vKRoACgcN8X7orxoACgcNBu27/xoACgcNSFM+aBoACgcNsyqdthoACgcNNwsXcBoACgcNoVVvIxoA
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced
        Category:dropped
        Size (bytes):7507
        Entropy (8bit):7.937421774894911
        Encrypted:false
        SSDEEP:
        MD5:EA43A0A9648C8CD424EE4CAF791B1C5C
        SHA1:00185E473BA8AD183E4B080C0A20EC98CD1773FC
        SHA-256:3E0A13A05F89E505BB0C309E990AF71BAC4E1D1433DFAAB11D336D35608483ED
        SHA-512:38E15E887E0737D876F42B455DD1A1FB485C8144EE0739D537102D24C2389E292817F57D6A702FE846EE137558A2A66C1677D37A5569AAD31D3631450A1DEAD9
        Malicious:false
        Reputation:unknown
        Preview:.PNG........IHDR...@...@......iq.....gAMA......a.... cHRM..z&..............u0...`..:....p..Q<....bKGD..............tIME.....3&.1.....WIDATx..{y..E...T.o...}o.%{B .......p..WF..a......S.7.{:3....s..e...#n..`..G.%....7......K-g..NHH...|....uU.o..s.|O...R.....O-...3#6w.i.3....G..k......*s.f.z.#..U.@.eS......x....R..W3s..^..}7........Y@..U.,'"w..j!..J..,.+.......%/... _.N...Ejr?...@.....dy.[..:t.=I.0$...r...E...#+P)E0..(...j.....N8...[WX.#....[...sn@i....#..]...D~.%Y...?....0...r....0.@z.pY2K(.s&..i.P.$.H..HL.%..../.....(^`.5`g.../....W..Hs.F....G@4Z.....O'/.....w.......bx!J.)kA.d...g.<.....0t.=.L...1#`.$.. c.Y..(0........-....&...O..;.....".j..7;..z......E'.:.I.W..$. i....p`4..6....X..=.t>..=.....?...?..W..;....I...S..'%...v..u.&W.).p(....S.....C.zBx.D.....i..i.i.${.s....C....Z.K_.......:......bt......@...^...w{A..,..d ?..Eo....W. =............a...4L+.i&c......6zu.Xj.....^>..?F..Gn..e.~Y...8..p;...M..y..K..{O..pIqJ....... .....@....`.,........
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:ASCII text, with very long lines (32767)
        Category:downloaded
        Size (bytes):1170818
        Entropy (8bit):5.3040817550890935
        Encrypted:false
        SSDEEP:
        MD5:C004882181021C5E402B6E14F0864304
        SHA1:92C256B6A21710D74C79B14D56F5567D7EFD5B6F
        SHA-256:960C913208A60AEAAC47E0CE652F8F74A8171677EDCF98749ACC107B911FEA2D
        SHA-512:C033183393B946184FA59BFF72C0BC4C6C8DD80FF26555E29F4FC3108604CC757FA734F8436BB299C4D30311312C32BA5390E495884A8FD4CEB8E03799609D70
        Malicious:false
        Reputation:unknown
        URL:https://liquidfiles.cooley.com/assets/application-960c913208a60aeaac47e0ce652f8f74a8171677edcf98749acc107b911fea2d.js
        Preview:function size_to_human(e){return e>1048576?(e/1048576).toFixed(2)+" MB":e>1024?(e/1024).toFixed(2)+" KB":e.toFixed(2)+" B"}function speed_to_human(e){return e>1048576?(e/1048576).toFixed(2)+" MB/s":e>1024?(e/1024).toFixed(2)+" KB/s":e.toFixed(2)+" B/s"}function time_to_human(e){return t=parseInt(e),days=parseInt(t/86400),t-=86400*days,hours=parseInt(t/3600),t-=3600*hours,minutes=parseInt(t/60),t-=60*minutes,content="",parseInt(days)>0&&(content+=days+" days"),(parseInt(hours)>0||parseInt(days)>0)&&(content&&(content+=", "),content+=hours+" hours"),content&&(content+=", "),content+=minutes+" min "+t+" s",content}function TimeCounter(e){var t=parseInt(e),i=parseInt(t/86400);t-=86400*i;var n=parseInt(t/3600);t-=3600*n;var o=parseInt(t/60),s="";return i&&(s+=i+" days"),(n||i)&&(s&&(s+=", "),s+=n+" hours"),s&&(s+=", "),s+=o+" min "+(t-=60*o)+" s"}function upload_speed(e,t){var i=e/t;return i>1048576?(i/1048576).toFixed(2)+" MB/s":i>1024?(i/1024).toFixed(2)+" KB/s":i.toFixed(2)+" B/s"}functi
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:Web Open Font Format (Version 2), TrueType, length 80300, version 331.-31392
        Category:downloaded
        Size (bytes):80300
        Entropy (8bit):7.997228177449401
        Encrypted:true
        SSDEEP:
        MD5:8E1ED89B6CCB8CE41FAF5CB672677105
        SHA1:9B592048B9062B00F0B2DD782D70A95B7DC69B83
        SHA-256:6B555920E358F8A25A422988B448615C33BCCCB4F932E8331CEBFC8E2A737FC7
        SHA-512:E2F6B4574CB1541DFF6852D0AF44FAAE80286110E8451841EADE4B53EBDF31150602640FE1BDFFF41459EA4AE884D14D115FBC93B30D199C87B88F5D07E4CD72
        Malicious:false
        Reputation:unknown
        URL:https://liquidfiles.cooley.com/assets/font-awesome/fa-solid-900-6b555920e358f8a25a422988b448615c33bcccb4f932e8331cebfc8e2a737fc7.woff2
        Preview:wOF2......9...........9R.K.`....................?FFTM....`..N.....`..@.6.$..0..4.. ..+...[2{..2.Q2...L4n.+..;.....E..t..;..J...qe......h.9..u.c..GR....u..C.!...\.Z......8.U.:a.......5/}.:...<;v..3ZE.4..chz....Y,.N#.:..!..~.RQk.b..>L..O..(.!.&.........^.J2D2D2..............n5z..)....%.L.<M...2..Q.K.y.....}...{...v.T...".......N.<..j.......e(..8G..,...\n..\n.\....#.H.i.n...,....F2...5cn5..W.|.FI.....=.:.]ME...d.....-..........-........`.=...O......w..........UN..!Y.D.p.3..j8G.R...}.yY@.n.d.f....Tt|.O.*%..y...Y..........u.~..N.../.8....#r.6j.......hcXyS)....f.~F.Y......=.Q}C...SPA.....@.T...0.\..M..e.....O[VZic}...m..._Y.....n..{.)..[.4D...~94......'.<...1M."..O.....OK......g"..S.Wk.....PJ.H.........+F.GB..!d.180...{.!...n.....)..OKj.6...7&.k.....,..qu.....n;D...<....H]....3.......v...D.....F.F..... .....G..89$.........jj.A.J?.X......C.?..n...B....~b....*)0Dm.k.'.Y....c.7<.K.....|...F.I?o_.....]aAS/.!." ..E....Tod..........n.\.
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:PNG image data, 482 x 100, 8-bit/color RGBA, non-interlaced
        Category:downloaded
        Size (bytes):25158
        Entropy (8bit):7.980472496548169
        Encrypted:false
        SSDEEP:
        MD5:72C83C9CCB68474B90E20EF1E0F38E72
        SHA1:123B95B15CCEF3190B0717B244FE12D14ECA8B1A
        SHA-256:6290F8CA4D1C39AC4E06FA63F6DD4C50A8DE9B711D6F4457D92C13D7311D6B35
        SHA-512:FA779AED74E78DC8895D9E3BB554E4CBCB326E21C0FEBD41D0DA32E9B6248BC5CB844B37C1DBE7432D0054D233E7EC7315EE36C76C561EBB88774BD2E6735A22
        Malicious:false
        Reputation:unknown
        URL:https://liquidfiles.cooley.com/assets/lf_menu-6290f8ca4d1c39ac4e06fa63f6dd4c50a8de9b711d6f4457d92c13d7311d6b35.png
        Preview:.PNG........IHDR.......d.....Zw3.....sRGB.......b.IDATx..w.]U.>...Z{.S..$....@."..,p.W.z....P....p...".. .{/.&..].b7X.......O..r..k..?..dB.%.L.....3.s.Y.Y..B.. B....l....Tj.....z.*...$H. A.....30. .I.V6\...EO}..~F.N>!....$H.....z....+.U.b......V....%...!.....$H......I.XT.CO.e..<%..9^J...2...V......%H. A...1.!....$MW?4e..>%..[).......mKE..s9NH8A....$..q.P|.+....&...'..."....7..C.P...M..A....$D<......m.t]:p6]H...7.(................v....$H......0rd..{..q..a.7H.*+...TP\..]...S.$w...$H. !....6\...l.[E.....a.t.,Q.'.F..|.I...N. A....O.$..)x.M.....g.Y.Z.*D...iD.C[nx.S...d..$H. AB...}.............2mE+r.>yy.S.....W.."H..$H. ....t_"@pH.Nm!.q..A.qMP...jv...b.....V.....p....$H.x"!...-dj?.Z|;Hk/....*..S....w3W/..f...KK....$H...p..[..m..hd..0.z.......|@...0.~..8..G.,..he...KB...$H.`..'...o....C..e.^..N.1.@......%b..r.w..?.W.WO.\.@.V..b..q..%..LMh.>.3..r...S.*75Qu'H. A....o.Y.x...N...Uz.2m....(...b.D.+..8.z,X@.&'X.....U..|..d..#.#`.lv.*(...CD".H.-I..3x=..`.<..xz..O}
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:ASCII text, with no line terminators
        Category:downloaded
        Size (bytes):52
        Entropy (8bit):4.416691881561024
        Encrypted:false
        SSDEEP:
        MD5:F903A4028D316A2DDD219D1F06D2BCC6
        SHA1:57742CC934C0861BB4A13CABF0FBD082EEDCEE71
        SHA-256:8A476DB890E9BF6CA646670D54F7A474CE73FEBE0708951456458FBC19816A8A
        SHA-512:74021D7570124E3D3EA31681D3447584E19EEAC27C20C7C4EAD941018C0DF9F20E0EAEE7508E904C9730EB1FB9F9026EABD0CE7F18595E319F74D96F8EF2CDC1
        Malicious:false
        Reputation:unknown
        URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISJQlwbG2yahkD2BIFDTEQwswSBQ035imrEgUNuN4vKRIFDfF-6K8=?alt=proto
        Preview:CiQKBw0xEMLMGgAKBw035imrGgAKBw243i8pGgAKBw3xfuivGgA=
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:ASCII text, with very long lines (65317)
        Category:downloaded
        Size (bytes):368711
        Entropy (8bit):5.058926109938691
        Encrypted:false
        SSDEEP:
        MD5:0114615AC5A88F1E7B8AF0E38438756D
        SHA1:292128B156189F43FEE47B244ABE9102CDB64A47
        SHA-256:2F676140147F8A571DA8125FFA620FD1458ECD643AFCA955A42E8D3DE1FDAA63
        SHA-512:703273CDA6D06C700B063463B947CE132CF5E9182079CF1811BA3FE56E1744904261A19789B3409514F46AF6D8E9FFD5D49B38E6FD302BB55A395AF57784726A
        Malicious:false
        Reputation:unknown
        URL:https://liquidfiles.cooley.com/assets/application-2f676140147f8a571da8125ffa620fd1458ecd643afca955a42e8d3de1fdaa63.css
        Preview:/*!. * Bootstrap v5.2.3 (https://getbootstrap.com/). * Copyright 2011-2022 The Bootstrap Authors. * Copyright 2011-2022 Twitter, Inc.. * Licensed under MIT (https://github.com/twbs/bootstrap/blob/main/LICENSE). */:root{--bs-blue: #0d6efd;--bs-indigo: #6610f2;--bs-purple: #6f42c1;--bs-pink: #d63384;--bs-red: #dc3545;--bs-orange: #fd7e14;--bs-yellow: #ffc107;--bs-green: #198754;--bs-teal: #20c997;--bs-cyan: #0dcaf0;--bs-black: #000;--bs-white: #fff;--bs-gray: #6c757d;--bs-gray-dark: #343a40;--bs-gray-100: #f8f9fa;--bs-gray-200: #e9ecef;--bs-gray-300: #dee2e6;--bs-gray-400: #ced4da;--bs-gray-500: #adb5bd;--bs-gray-600: #6c757d;--bs-gray-700: #495057;--bs-gray-800: #343a40;--bs-gray-900: #212529;--bs-primary: #0d6efd;--bs-secondary: #6c757d;--bs-success: #198754;--bs-info: #0dcaf0;--bs-warning: #ffc107;--bs-danger: #dc3545;--bs-light: #f8f9fa;--bs-dark: #212529;--bs-primary-rgb: 13, 110, 253;--bs-secondary-rgb: 108, 117, 125;--bs-success-rgb: 25, 135, 84;--bs-info-rgb: 13, 202,
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:Web Open Font Format (Version 2), TrueType, length 6948, version 1.0
        Category:downloaded
        Size (bytes):6948
        Entropy (8bit):7.965430651429935
        Encrypted:false
        SSDEEP:
        MD5:265E4CBAA04991D0D14AD908780835E9
        SHA1:E42083235ED94BD4AFAF1A952962719D642764A6
        SHA-256:17AFF42970B1DBE2386C2251F0742F468BF55CF7C6C636231973549C4B5A9B98
        SHA-512:89B18B6367E3EDFABA996435B097356183AF65BB42150C491D707F2E66A57EECCFF596383A88E9F5A0B08BF347E9BF166D9867C486DF68E8B9FA6229EE57A6F1
        Malicious:false
        Reputation:unknown
        URL:https://liquidfiles.cooley.com/assets/summernote-17aff42970b1dbe2386c2251f0742f468bf55cf7c6c636231973549c4b5a9b98.woff2
        Preview:wOF2.......$......6D..............................|.`..n..p.n..(..6.$..L. .....+...E.j.8..&...l.....=....n..>.'L&$......{.^....v.n41k..t2Hb9.8.Q..........y..c...L&;....mci@.....}.......t......m...!p...._...k...5.....-......G.S...o..W...[@mY...g.e.E't.N..9.\.W"....L.c.^o,.......vo..bJ<L...|.m...1-.K&.91K...^.y...F.....Jy..6;....../I....Z'>,................v.g..R...BmW....o.....Oz...._......=..d...dq..I.+.G$.B.Vj...'.i.......$.kv...5.i if.%..eC..Ad.d.G;..{.>.+N.".."<F.!".t|....]A.PeR4...,A..<..K...,K..\.......g....S....f.....y.)......?.&6.h...X.3t...?...eP....B.....4...D..3.b.....V..x..FT<#..`.B:.........F.(1...t.q..'.)...j...a..O.W.s'.W.:./...O.u.S"....%....F...]... ..:..+......[.....h?h.V..9p&(....ia'a.[.E..;.6....T.....x .vv.!..............c..T..[..a%.TqGK.....%.h$.lW.5ci.@S....R.j.0..a{.l%....v.....-i..&.@cR-.c."..Z.h...&(..K...(.l.LX...0*.5...W....O5.. .f...1..>w...kk!v..$.X.p...(......b:..Mc P.U..".....c..G..`..1...s..8;...G.L....R.CD
        No static file info