Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
http://url9212.charteredarena.org/ls/click?upn=u001.kjyKVeM-2Fb1rGOGHOnr1jOBOY3L3JqbNTsl6-2FG2Q28FBbMvScULOdn5hj4fYmOT1gSvNV_eFFQU5nW4TX33oYM-2FvMZ4H4nrQnEbWOt7nYb46lhhradIe8kQ30nH41Yux5-2ByqjXVzNOeRGeH70TSwGBG-2FsCyfS-2BqFuy7r7yA-2BMVhshonhVyPepAGojJAWOStPfHQEXVhS9QapMz6-2FLiLkIDitr77rwl6cV3-2BOVbi

Overview

General Information

Sample URL:http://url9212.charteredarena.org/ls/click?upn=u001.kjyKVeM-2Fb1rGOGHOnr1jOBOY3L3JqbNTsl6-2FG2Q28FBbMvScULOdn5hj4fYmOT1gSvNV_eFFQU5nW4TX33oYM-2FvMZ4H4nrQnEbWOt7nYb46lhhradIe8kQ30nH41Yux5-2ByqjXVzNOeRG
Analysis ID:1432187

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Phishing site detected (based on favicon image match)
Detected clear text password fields (password is not hidden)
HTML body contains low number of good links
Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 6896 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://url9212.charteredarena.org/ls/click?upn=u001.kjyKVeM-2Fb1rGOGHOnr1jOBOY3L3JqbNTsl6-2FG2Q28FBbMvScULOdn5hj4fYmOT1gSvNV_eFFQU5nW4TX33oYM-2FvMZ4H4nrQnEbWOt7nYb46lhhradIe8kQ30nH41Yux5-2ByqjXVzNOeRGeH70TSwGBG-2FsCyfS-2BqFuy7r7yA-2BMVhshonhVyPepAGojJAWOStPfHQEXVhS9QapMz6-2FLiLkIDitr77rwl6cV3-2BOVbi0qMHcpubANPDna-2BAJRWKHhsn2J-2BHsm2h-2B1n0PvhIvECyeSGKW-2FdmoYnwMnfXv-2F0VHDQdAF4JyTklFAWOdWvqmq9QaL29M0Lqvm9PdkAaDucmiv1yWhzGJ-2FSlIlic4yMaUzKSM2tXbVKRT-2BcTJHrLGjV82z-2BxMi-2FPWDvS9vQSeDz0xjN0gvzYnMQqfZiJ7fdvgXYvIvcGvziknMmHkQ7sUHmtLIGr6gsv-2FI2qInnZxnaJ1Ow7w3sMmgc-2FLcAEaJe5QnWJ5qez1H3mc7J1f4VLI4PyjCxv7syUPC13rDkwMklRiABfKztYQ3n9LW3FeH4hgMGYJgJovBs-2FKlVUipIzO24iLrfZpg-2FS6-2Fvp-2BRnBXh4Gim5LY7NxdelnIZomgKJ8r1gxfM163jd5ekCcUFZcZJn8BUr-2FrBOq6vvyf5Ut44ln9oAHSsmy2ecvwUHxQ-2Bo0mJA2r9a8FeSV3APNVBZowUa1ZGpOSvbZRLc6uZxrFl3fSWY774fhm-2Fl3qG7s-2BRWj2lGIHB3NEqH1X520Diu5Le7soeKgWoeaLCSrT5v7lt-2B7XayjukGYP4Yz5jSqZD2gXDxl443sgS6brqBQ3LKHfRN7s2NZ-2F6nWblHw6-2BLG-2FTduGCq0lMfhnVz7mFWLyKhJHvoE3C2dN6qv1-2FpHnRcIGopoYVEdZ-2F182c7Ll7OsxlzgTKemGKriHFjxwOhwkIoHVdgcJWnLS8-3D MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 7080 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2052 --field-trial-handle=1972,i,9677297696033347172,15641227601041245579,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

Phishing

barindex
Source: https://devrteamsdashboardms.softr.app/Matcher: Template: microsoft matched with high similarity
Source: https://devrteamsdashboardms.softr.app/log-in?viewMode=modalMatcher: Template: microsoft matched with high similarity
Source: https://devrteamsdashboardms.softr.app/authMatcher: Template: microsoft matched with high similarity
Source: https://devrteamsdashboardms.softr.app/log-inMatcher: Template: microsoft matched with high similarity
Source: https://devrteamsdashboardms.softr.app/log-in?viewMode=modalHTTP Parser: <input type="text"... for password input
Source: https://devrteamsdashboardms.softr.app/log-inHTTP Parser: <input type="text"... for password input
Source: https://devrteamsdashboardms.softr.app/log-in?viewMode=modalHTTP Parser: Number of links: 0
Source: https://devrteamsdashboardms.softr.app/log-inHTTP Parser: Number of links: 0
Source: https://devrteamsdashboardms.softr.app/log-in?viewMode=modalHTTP Parser: No <meta name="author".. found
Source: https://devrteamsdashboardms.softr.app/log-inHTTP Parser: No <meta name="author".. found
Source: https://devrteamsdashboardms.softr.app/log-inHTTP Parser: No <meta name="author".. found
Source: https://devrteamsdashboardms.softr.app/log-inHTTP Parser: No <meta name="author".. found
Source: https://devrteamsdashboardms.softr.app/log-in?viewMode=modalHTTP Parser: No <meta name="copyright".. found
Source: https://devrteamsdashboardms.softr.app/log-inHTTP Parser: No <meta name="copyright".. found
Source: https://devrteamsdashboardms.softr.app/log-inHTTP Parser: No <meta name="copyright".. found
Source: https://devrteamsdashboardms.softr.app/log-inHTTP Parser: No <meta name="copyright".. found
Source: unknownHTTPS traffic detected: 40.68.123.157:443 -> 192.168.2.16:49738 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.204.76.112:443 -> 192.168.2.16:49739 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.204.76.112:443 -> 192.168.2.16:49740 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.68.123.157:443 -> 192.168.2.16:49754 version: TLS 1.2
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 23.208.86.113
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 23.204.76.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.204.76.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.204.76.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.204.76.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.204.76.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.204.76.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.204.76.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.204.76.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.204.76.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.204.76.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.204.76.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.204.76.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.204.76.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.204.76.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.204.76.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.204.76.112
Source: unknownTCP traffic detected without corresponding DNS query: 23.204.76.112
Source: global trafficHTTP traffic detected: GET /ls/click?upn=u001.kjyKVeM-2Fb1rGOGHOnr1jOBOY3L3JqbNTsl6-2FG2Q28FBbMvScULOdn5hj4fYmOT1gSvNV_eFFQU5nW4TX33oYM-2FvMZ4H4nrQnEbWOt7nYb46lhhradIe8kQ30nH41Yux5-2ByqjXVzNOeRGeH70TSwGBG-2FsCyfS-2BqFuy7r7yA-2BMVhshonhVyPepAGojJAWOStPfHQEXVhS9QapMz6-2FLiLkIDitr77rwl6cV3-2BOVbi0qMHcpubANPDna-2BAJRWKHhsn2J-2BHsm2h-2B1n0PvhIvECyeSGKW-2FdmoYnwMnfXv-2F0VHDQdAF4JyTklFAWOdWvqmq9QaL29M0Lqvm9PdkAaDucmiv1yWhzGJ-2FSlIlic4yMaUzKSM2tXbVKRT-2BcTJHrLGjV82z-2BxMi-2FPWDvS9vQSeDz0xjN0gvzYnMQqfZiJ7fdvgXYvIvcGvziknMmHkQ7sUHmtLIGr6gsv-2FI2qInnZxnaJ1Ow7w3sMmgc-2FLcAEaJe5QnWJ5qez1H3mc7J1f4VLI4PyjCxv7syUPC13rDkwMklRiABfKztYQ3n9LW3FeH4hgMGYJgJovBs-2FKlVUipIzO24iLrfZpg-2FS6-2Fvp-2BRnBXh4Gim5LY7NxdelnIZomgKJ8r1gxfM163jd5ekCcUFZcZJn8BUr-2FrBOq6vvyf5Ut44ln9oAHSsmy2ecvwUHxQ-2Bo0mJA2r9a8FeSV3APNVBZowUa1ZGpOSvbZRLc6uZxrFl3fSWY774fhm-2Fl3qG7s-2BRWj2lGIHB3NEqH1X520Diu5Le7soeKgWoeaLCSrT5v7lt-2B7XayjukGYP4Yz5jSqZD2gXDxl443sgS6brqBQ3LKHfRN7s2NZ-2F6nWblHw6-2BLG-2FTduGCq0lMfhnVz7mFWLyKhJHvoE3C2dN6qv1-2FpHnRcIGopoYVEdZ-2F182c7Ll7OsxlzgTKemGKriHFjxwOhwkIoHVdgcJWnLS8-3D HTTP/1.1Host: url9212.charteredarena.orgConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficDNS traffic detected: DNS query: url9212.charteredarena.org
Source: global trafficDNS traffic detected: DNS query: devrteamsdashboardms.softr.app
Source: global trafficDNS traffic detected: DNS query: assets.softr-files.com
Source: global trafficDNS traffic detected: DNS query: fonts.softr-files.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: uicdn.toast.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49688 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
Source: unknownHTTPS traffic detected: 40.68.123.157:443 -> 192.168.2.16:49738 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.204.76.112:443 -> 192.168.2.16:49739 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.204.76.112:443 -> 192.168.2.16:49740 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.68.123.157:443 -> 192.168.2.16:49754 version: TLS 1.2
Source: classification engineClassification label: mal48.phis.win@15/33@20/170
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://url9212.charteredarena.org/ls/click?upn=u001.kjyKVeM-2Fb1rGOGHOnr1jOBOY3L3JqbNTsl6-2FG2Q28FBbMvScULOdn5hj4fYmOT1gSvNV_eFFQU5nW4TX33oYM-2FvMZ4H4nrQnEbWOt7nYb46lhhradIe8kQ30nH41Yux5-2ByqjXVzNOeRGeH70TSwGBG-2FsCyfS-2BqFuy7r7yA-2BMVhshonhVyPepAGojJAWOStPfHQEXVhS9QapMz6-2FLiLkIDitr77rwl6cV3-2BOVbi0qMHcpubANPDna-2BAJRWKHhsn2J-2BHsm2h-2B1n0PvhIvECyeSGKW-2FdmoYnwMnfXv-2F0VHDQdAF4JyTklFAWOdWvqmq9QaL29M0Lqvm9PdkAaDucmiv1yWhzGJ-2FSlIlic4yMaUzKSM2tXbVKRT-2BcTJHrLGjV82z-2BxMi-2FPWDvS9vQSeDz0xjN0gvzYnMQqfZiJ7fdvgXYvIvcGvziknMmHkQ7sUHmtLIGr6gsv-2FI2qInnZxnaJ1Ow7w3sMmgc-2FLcAEaJe5QnWJ5qez1H3mc7J1f4VLI4PyjCxv7syUPC13rDkwMklRiABfKztYQ3n9LW3FeH4hgMGYJgJovBs-2FKlVUipIzO24iLrfZpg-2FS6-2Fvp-2BRnBXh4Gim5LY7NxdelnIZomgKJ8r1gxfM163jd5ekCcUFZcZJn8BUr-2FrBOq6vvyf5Ut44ln9oAHSsmy2ecvwUHxQ-2Bo0mJA2r9a8FeSV3APNVBZowUa1ZGpOSvbZRLc6uZxrFl3fSWY774fhm-2Fl3qG7s-2BRWj2lGIHB3NEqH1X520Diu5Le7soeKgWoeaLCSrT5v7lt-2B7XayjukGYP4Yz5jSqZD2gXDxl443sgS6brqBQ3LKHfRN7s2NZ-2F6nWblHw6-2BLG-2FTduGCq0lMfhnVz7mFWLyKhJHvoE3C2dN6qv1-2FpHnRcIGopoYVEdZ-2F182c7Ll7OsxlzgTKemGKriHFjxwOhwkIoHVdgcJWnLS8-3D
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2052 --field-trial-handle=1972,i,9677297696033347172,15641227601041245579,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2052 --field-trial-handle=1972,i,9677297696033347172,15641227601041245579,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
http://url9212.charteredarena.org/ls/click?upn=u001.kjyKVeM-2Fb1rGOGHOnr1jOBOY3L3JqbNTsl6-2FG2Q28FBbMvScULOdn5hj4fYmOT1gSvNV_eFFQU5nW4TX33oYM-2FvMZ4H4nrQnEbWOt7nYb46lhhradIe8kQ30nH41Yux5-2ByqjXVzNOeRGeH70TSwGBG-2FsCyfS-2BqFuy7r7yA-2BMVhshonhVyPepAGojJAWOStPfHQEXVhS9QapMz6-2FLiLkIDitr77rwl6cV3-2BOVbi0qMHcpubANPDna-2BAJRWKHhsn2J-2BHsm2h-2B1n0PvhIvECyeSGKW-2FdmoYnwMnfXv-2F0VHDQdAF4JyTklFAWOdWvqmq9QaL29M0Lqvm9PdkAaDucmiv1yWhzGJ-2FSlIlic4yMaUzKSM2tXbVKRT-2BcTJHrLGjV82z-2BxMi-2FPWDvS9vQSeDz0xjN0gvzYnMQqfZiJ7fdvgXYvIvcGvziknMmHkQ7sUHmtLIGr6gsv-2FI2qInnZxnaJ1Ow7w3sMmgc-2FLcAEaJe5QnWJ5qez1H3mc7J1f4VLI4PyjCxv7syUPC13rDkwMklRiABfKztYQ3n9LW3FeH4hgMGYJgJovBs-2FKlVUipIzO24iLrfZpg-2FS6-2Fvp-2BRnBXh4Gim5LY7NxdelnIZomgKJ8r1gxfM163jd5ekCcUFZcZJn8BUr-2FrBOq6vvyf5Ut44ln9oAHSsmy2ecvwUHxQ-2Bo0mJA2r9a8FeSV3APNVBZowUa1ZGpOSvbZRLc6uZxrFl3fSWY774fhm-2Fl3qG7s-2BRWj2lGIHB3NEqH1X520Diu5Le7soeKgWoeaLCSrT5v7lt-2B7XayjukGYP4Yz5jSqZD2gXDxl443sgS6brqBQ3LKHfRN7s2NZ-2F6nWblHw6-2BLG-2FTduGCq0lMfhnVz7mFWLyKhJHvoE3C2dN6qv1-2FpHnRcIGopoYVEdZ-2F182c7Ll7OsxlzgTKemGKriHFjxwOhwkIoHVdgcJWnLS8-3D0%Avira URL Cloudsafe
http://url9212.charteredarena.org/ls/click?upn=u001.kjyKVeM-2Fb1rGOGHOnr1jOBOY3L3JqbNTsl6-2FG2Q28FBbMvScULOdn5hj4fYmOT1gSvNV_eFFQU5nW4TX33oYM-2FvMZ4H4nrQnEbWOt7nYb46lhhradIe8kQ30nH41Yux5-2ByqjXVzNOeRGeH70TSwGBG-2FsCyfS-2BqFuy7r7yA-2BMVhshonhVyPepAGojJAWOStPfHQEXVhS9QapMz6-2FLiLkIDitr77rwl6cV3-2BOVbi0qMHcpubANPDna-2BAJRWKHhsn2J-2BHsm2h-2B1n0PvhIvECyeSGKW-2FdmoYnwMnfXv-2F0VHDQdAF4JyTklFAWOdWvqmq9QaL29M0Lqvm9PdkAaDucmiv1yWhzGJ-2FSlIlic4yMaUzKSM2tXbVKRT-2BcTJHrLGjV82z-2BxMi-2FPWDvS9vQSeDz0xjN0gvzYnMQqfZiJ7fdvgXYvIvcGvziknMmHkQ7sUHmtLIGr6gsv-2FI2qInnZxnaJ1Ow7w3sMmgc-2FLcAEaJe5QnWJ5qez1H3mc7J1f4VLI4PyjCxv7syUPC13rDkwMklRiABfKztYQ3n9LW3FeH4hgMGYJgJovBs-2FKlVUipIzO24iLrfZpg-2FS6-2Fvp-2BRnBXh4Gim5LY7NxdelnIZomgKJ8r1gxfM163jd5ekCcUFZcZJn8BUr-2FrBOq6vvyf5Ut44ln9oAHSsmy2ecvwUHxQ-2Bo0mJA2r9a8FeSV3APNVBZowUa1ZGpOSvbZRLc6uZxrFl3fSWY774fhm-2Fl3qG7s-2BRWj2lGIHB3NEqH1X520Diu5Le7soeKgWoeaLCSrT5v7lt-2B7XayjukGYP4Yz5jSqZD2gXDxl443sgS6brqBQ3LKHfRN7s2NZ-2F6nWblHw6-2BLG-2FTduGCq0lMfhnVz7mFWLyKhJHvoE3C2dN6qv1-2FpHnRcIGopoYVEdZ-2F182c7Ll7OsxlzgTKemGKriHFjxwOhwkIoHVdgcJWnLS8-3D0%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
assets.softr-files.com0%VirustotalBrowse
url9212.charteredarena.org0%VirustotalBrowse
fonts.softr-files.com0%VirustotalBrowse
devrteamsdashboardms.softr.app0%VirustotalBrowse
SourceDetectionScannerLabelLink
about:blank0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
dkauf0r2pwmce.cloudfront.net
13.249.98.111
truefalse
    high
    sendgrid.net
    167.89.115.150
    truefalse
      high
      www.google.com
      142.250.64.196
      truefalse
        high
        fonts.softr-files.com
        3.72.135.223
        truefalseunknown
        devrteamsdashboardms.softr.app
        3.64.247.100
        truefalseunknown
        url9212.charteredarena.org
        unknown
        unknownfalseunknown
        assets.softr-files.com
        unknown
        unknownfalseunknown
        uicdn.toast.com
        unknown
        unknownfalse
          high
          NameMaliciousAntivirus DetectionReputation
          https://devrteamsdashboardms.softr.app/authtrue
            unknown
            https://devrteamsdashboardms.softr.app/log-intrue
              unknown
              https://devrteamsdashboardms.softr.app/log-in?viewMode=modaltrue
                unknown
                https://devrteamsdashboardms.softr.app/true
                  unknown
                  about:blankfalse
                  • Avira URL Cloud: safe
                  low
                  http://url9212.charteredarena.org/ls/click?upn=u001.kjyKVeM-2Fb1rGOGHOnr1jOBOY3L3JqbNTsl6-2FG2Q28FBbMvScULOdn5hj4fYmOT1gSvNV_eFFQU5nW4TX33oYM-2FvMZ4H4nrQnEbWOt7nYb46lhhradIe8kQ30nH41Yux5-2ByqjXVzNOeRGeH70TSwGBG-2FsCyfS-2BqFuy7r7yA-2BMVhshonhVyPepAGojJAWOStPfHQEXVhS9QapMz6-2FLiLkIDitr77rwl6cV3-2BOVbi0qMHcpubANPDna-2BAJRWKHhsn2J-2BHsm2h-2B1n0PvhIvECyeSGKW-2FdmoYnwMnfXv-2F0VHDQdAF4JyTklFAWOdWvqmq9QaL29M0Lqvm9PdkAaDucmiv1yWhzGJ-2FSlIlic4yMaUzKSM2tXbVKRT-2BcTJHrLGjV82z-2BxMi-2FPWDvS9vQSeDz0xjN0gvzYnMQqfZiJ7fdvgXYvIvcGvziknMmHkQ7sUHmtLIGr6gsv-2FI2qInnZxnaJ1Ow7w3sMmgc-2FLcAEaJe5QnWJ5qez1H3mc7J1f4VLI4PyjCxv7syUPC13rDkwMklRiABfKztYQ3n9LW3FeH4hgMGYJgJovBs-2FKlVUipIzO24iLrfZpg-2FS6-2Fvp-2BRnBXh4Gim5LY7NxdelnIZomgKJ8r1gxfM163jd5ekCcUFZcZJn8BUr-2FrBOq6vvyf5Ut44ln9oAHSsmy2ecvwUHxQ-2Bo0mJA2r9a8FeSV3APNVBZowUa1ZGpOSvbZRLc6uZxrFl3fSWY774fhm-2Fl3qG7s-2BRWj2lGIHB3NEqH1X520Diu5Le7soeKgWoeaLCSrT5v7lt-2B7XayjukGYP4Yz5jSqZD2gXDxl443sgS6brqBQ3LKHfRN7s2NZ-2F6nWblHw6-2BLG-2FTduGCq0lMfhnVz7mFWLyKhJHvoE3C2dN6qv1-2FpHnRcIGopoYVEdZ-2F182c7Ll7OsxlzgTKemGKriHFjxwOhwkIoHVdgcJWnLS8-3Dfalse
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    142.250.189.131
                    unknownUnited States
                    15169GOOGLEUSfalse
                    192.178.50.67
                    unknownUnited States
                    15169GOOGLEUSfalse
                    1.1.1.1
                    unknownAustralia
                    13335CLOUDFLARENETUSfalse
                    142.251.107.84
                    unknownUnited States
                    15169GOOGLEUSfalse
                    3.64.247.100
                    devrteamsdashboardms.softr.appUnited States
                    16509AMAZON-02USfalse
                    167.89.115.150
                    sendgrid.netUnited States
                    11377SENDGRIDUSfalse
                    3.72.135.223
                    fonts.softr-files.comUnited States
                    16509AMAZON-02USfalse
                    142.250.64.196
                    www.google.comUnited States
                    15169GOOGLEUSfalse
                    142.250.217.174
                    unknownUnited States
                    15169GOOGLEUSfalse
                    104.123.154.162
                    unknownUnited States
                    20940AKAMAI-ASN1EUfalse
                    239.255.255.250
                    unknownReserved
                    unknownunknownfalse
                    13.249.98.40
                    unknownUnited States
                    16509AMAZON-02USfalse
                    13.249.98.30
                    unknownUnited States
                    16509AMAZON-02USfalse
                    142.250.217.234
                    unknownUnited States
                    15169GOOGLEUSfalse
                    13.249.98.111
                    dkauf0r2pwmce.cloudfront.netUnited States
                    16509AMAZON-02USfalse
                    172.217.2.206
                    unknownUnited States
                    15169GOOGLEUSfalse
                    142.250.217.195
                    unknownUnited States
                    15169GOOGLEUSfalse
                    IP
                    192.168.2.16
                    192.168.2.5
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1432187
                    Start date and time:2024-04-26 16:44:27 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:defaultwindowsinteractivecookbook.jbs
                    Sample URL:http://url9212.charteredarena.org/ls/click?upn=u001.kjyKVeM-2Fb1rGOGHOnr1jOBOY3L3JqbNTsl6-2FG2Q28FBbMvScULOdn5hj4fYmOT1gSvNV_eFFQU5nW4TX33oYM-2FvMZ4H4nrQnEbWOt7nYb46lhhradIe8kQ30nH41Yux5-2ByqjXVzNOeRGeH70TSwGBG-2FsCyfS-2BqFuy7r7yA-2BMVhshonhVyPepAGojJAWOStPfHQEXVhS9QapMz6-2FLiLkIDitr77rwl6cV3-2BOVbi0qMHcpubANPDna-2BAJRWKHhsn2J-2BHsm2h-2B1n0PvhIvECyeSGKW-2FdmoYnwMnfXv-2F0VHDQdAF4JyTklFAWOdWvqmq9QaL29M0Lqvm9PdkAaDucmiv1yWhzGJ-2FSlIlic4yMaUzKSM2tXbVKRT-2BcTJHrLGjV82z-2BxMi-2FPWDvS9vQSeDz0xjN0gvzYnMQqfZiJ7fdvgXYvIvcGvziknMmHkQ7sUHmtLIGr6gsv-2FI2qInnZxnaJ1Ow7w3sMmgc-2FLcAEaJe5QnWJ5qez1H3mc7J1f4VLI4PyjCxv7syUPC13rDkwMklRiABfKztYQ3n9LW3FeH4hgMGYJgJovBs-2FKlVUipIzO24iLrfZpg-2FS6-2Fvp-2BRnBXh4Gim5LY7NxdelnIZomgKJ8r1gxfM163jd5ekCcUFZcZJn8BUr-2FrBOq6vvyf5Ut44ln9oAHSsmy2ecvwUHxQ-2Bo0mJA2r9a8FeSV3APNVBZowUa1ZGpOSvbZRLc6uZxrFl3fSWY774fhm-2Fl3qG7s-2BRWj2lGIHB3NEqH1X520Diu5Le7soeKgWoeaLCSrT5v7lt-2B7XayjukGYP4Yz5jSqZD2gXDxl443sgS6brqBQ3LKHfRN7s2NZ-2F6nWblHw6-2BLG-2FTduGCq0lMfhnVz7mFWLyKhJHvoE3C2dN6qv1-2FpHnRcIGopoYVEdZ-2F182c7Ll7OsxlzgTKemGKriHFjxwOhwkIoHVdgcJWnLS8-3D
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:14
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • EGA enabled
                    Analysis Mode:stream
                    Analysis stop reason:Timeout
                    Detection:MAL
                    Classification:mal48.phis.win@15/33@20/170
                    • Exclude process from analysis (whitelisted): svchost.exe
                    • Excluded IPs from analysis (whitelisted): 192.178.50.67, 142.250.217.174, 142.251.107.84, 34.104.35.123, 142.250.217.195
                    • Excluded domains from analysis (whitelisted): clients2.google.com, accounts.google.com, edgedl.me.gvt1.com, fonts.gstatic.com, clientservices.googleapis.com, clients.l.google.com
                    • Not all processes where analyzed, report is missing behavior information
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 13:44:53 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2673
                    Entropy (8bit):3.9862627439428198
                    Encrypted:false
                    SSDEEP:
                    MD5:5FDA2A6B3DBC759438B7C7985B2FC762
                    SHA1:DB6705103457D40F6134C4A33C39933FD5465305
                    SHA-256:17F76F3A5A20FEDC8401D5DE4640EE0F93A6B9CB46F7BFFF46623D4E8FFC0D7C
                    SHA-512:B95037DB556BD26FB193553B09CB31DD192038C6BB990F690CC819BAFCEBE1DAB4FEBCB00E85284BB7A6AEFD321188027E86EB572CDE0E9636DC2E3BD576B375
                    Malicious:false
                    Reputation:unknown
                    Preview:L..................F.@.. ...$+.,.....?.L...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.u....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.u....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.u....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.u..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.u...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............:.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 13:44:53 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2675
                    Entropy (8bit):4.001307160095406
                    Encrypted:false
                    SSDEEP:
                    MD5:26C4702A9B4B429215CE4AF33A2C7242
                    SHA1:E6B0F71C3752D3BC2B2AC684D750EED7735C59B8
                    SHA-256:F9FDEFA213044F400BAF582C7DAF215F6E9511739541B559D685AE11D2271036
                    SHA-512:1CA3F3E127F73E4D8A0E1C3833D2BA8893A6D50052DE31E284012942512497FBD480806738228A57630E6794F0580D187E88AB1E79897B81008643CA867CF46F
                    Malicious:false
                    Reputation:unknown
                    Preview:L..................F.@.. ...$+.,....I,.L...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.u....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.u....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.u....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.u..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.u...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............:.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2689
                    Entropy (8bit):4.00853702806315
                    Encrypted:false
                    SSDEEP:
                    MD5:36941090E0CEE99A694A835E88DC81BA
                    SHA1:3336913708B3F6B422B4B5CACBAE46469C7F1AEA
                    SHA-256:71F2246DDAE428E07A1916A2CB3E602018C9EBA700657A49FB1575EA5526CA28
                    SHA-512:54EB975B3CE8E3705AFF582CD01CAED678ADD10422593582BDB1DB459CFB1B75E900767A4A3F89657D2A73C89E1B463E1E7A8073C9FA18341F8B49AE1093A076
                    Malicious:false
                    Reputation:unknown
                    Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.u....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.u....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.u....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.u..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............:.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 13:44:53 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2677
                    Entropy (8bit):4.001208715778368
                    Encrypted:false
                    SSDEEP:
                    MD5:908F347207796A4071302355516C9045
                    SHA1:612BB76A0D98E34B919D05A5A1C670EBF64EE8EF
                    SHA-256:CD6C13819B7EF01A76C1072D2C1EFA536DFA8AAF00827EA67FB83BBF24556247
                    SHA-512:F802106186F9A4E6F1461D8CAE9249E3B42E0B1C587E1F7BF485223AD0F9B99969161386BB2AA1B28654204293CC360E673C441F4AE81696E44F5C48D5D6E6A5
                    Malicious:false
                    Reputation:unknown
                    Preview:L..................F.@.. ...$+.,......L...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.u....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.u....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.u....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.u..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.u...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............:.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 13:44:53 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2677
                    Entropy (8bit):3.9889805257143247
                    Encrypted:false
                    SSDEEP:
                    MD5:61EF8A54552090BCF41BAD941657B6FA
                    SHA1:92C7CD2750512083A452E29A405FC8EF1C59447A
                    SHA-256:AD1066490B644C0EC5D7B156779EF7A4CDB26163F2E57DB4085163D7C86B8077
                    SHA-512:73298CDB7307F48D37E321EC5A465B8B3D741A2AFBF6217B03356A8C5D6A61A350F039B30F20A27FBB158F5805EADAB0477904D26E136164590A4481942FD382
                    Malicious:false
                    Reputation:unknown
                    Preview:L..................F.@.. ...$+.,.....(.L...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.u....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.u....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.u....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.u..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.u...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............:.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 13:44:53 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2679
                    Entropy (8bit):3.9974942821473123
                    Encrypted:false
                    SSDEEP:
                    MD5:260B5E4DCC07E5364CCC279E889EF9B9
                    SHA1:187694ECF73EA115B4FE320BA2F3C7FE6F1E2195
                    SHA-256:E923CAC88B69CFD7048ED710DC9AF21D96DD4B01B511A48BFEFDD3102C95D501
                    SHA-512:FBF59C0262216A215E5CA0CC9FB2DBBA2764F9DA68798287C2BFE00796E82876C1F8490310A11C0FCDD831306036242C204AAFE73B32C015FEFD07F1C82615C7
                    Malicious:false
                    Reputation:unknown
                    Preview:L..................F.@.. ...$+.,.....%.L...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.u....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.u....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.u....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.u..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.u...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............:.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (65447)
                    Category:downloaded
                    Size (bytes):87462
                    Entropy (8bit):5.262148110388299
                    Encrypted:false
                    SSDEEP:
                    MD5:E6C2415C0ACE414E5153670314CE99A9
                    SHA1:5A9EEAC34D86E92E5660E0F4F87204F1ED0C8FF6
                    SHA-256:D8F9AFBF492E4C139E9D2BCB9BA6EF7C14921EB509FB703BC7A3F911B774EFF8
                    SHA-512:DE027062931EDD07B01842EFF24FC15FDBDCAA1AF245DCD133155FABA9E0C965F0A34DC6144CE3B149BC43B4597073C792CB6DABBFC6168C63095523923BCF77
                    Malicious:false
                    Reputation:unknown
                    URL:https://assets.softr-files.com/libs/jquery/3.7.0/jquery.min.js
                    Preview:/*! jQuery v3.7.0 | (c) OpenJS Foundation and other contributors | jquery.org/license */.!function(e,t){"use strict";"object"==typeof module&&"object"==typeof module.exports?module.exports=e.document?t(e,!0):function(e){if(!e.document)throw new Error("jQuery requires a window with a document");return t(e)}:t(e)}("undefined"!=typeof window?window:this,function(ie,e){"use strict";var oe=[],r=Object.getPrototypeOf,ae=oe.slice,g=oe.flat?function(e){return oe.flat.call(e)}:function(e){return oe.concat.apply([],e)},s=oe.push,se=oe.indexOf,n={},i=n.toString,ue=n.hasOwnProperty,o=ue.toString,a=o.call(Object),le={},v=function(e){return"function"==typeof e&&"number"!=typeof e.nodeType&&"function"!=typeof e.item},y=function(e){return null!=e&&e===e.window},C=ie.document,u={type:!0,src:!0,nonce:!0,noModule:!0};function m(e,t,n){var r,i,o=(n=n||C).createElement("script");if(o.text=e,t)for(r in u)(i=t[r]||t.getAttribute&&t.getAttribute(r))&&o.setAttribute(r,i);n.head.appendChild(o).parentNode.remove
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (20831)
                    Category:downloaded
                    Size (bytes):21004
                    Entropy (8bit):5.2169391810760875
                    Encrypted:false
                    SSDEEP:
                    MD5:56456DB9D72A4B380ED3CB63095E6022
                    SHA1:6DBCE88AEE15B42F29083DF7A07513CF3B486BA0
                    SHA-256:66F3A07E1FA9B64A686B66381E4458DBC8ABF3DBBFF954720C4EEC07B84411C2
                    SHA-512:E56BD96B837B26ADD354D0A9E2B8DC04C95CEA94F7959EE05718ED23A224296FAE22D49AFAB160B45963BD99C2C501A3F12517E431EB68A13A327FF8B262B50A
                    Malicious:false
                    Reputation:unknown
                    URL:https://assets.softr-files.com/libs/popper.js/1.14.7/umd/popper.min.js
                    Preview:/*. Copyright (C) Federico Zivolo 2019. Distributed under the MIT License (license terms are at http://opensource.org/licenses/MIT).. */(function(e,t){'object'==typeof exports&&'undefined'!=typeof module?module.exports=t():'function'==typeof define&&define.amd?define(t):e.Popper=t()})(this,function(){'use strict';function e(e){return e&&'[object Function]'==={}.toString.call(e)}function t(e,t){if(1!==e.nodeType)return[];var o=e.ownerDocument.defaultView,n=o.getComputedStyle(e,null);return t?n[t]:n}function o(e){return'HTML'===e.nodeName?e:e.parentNode||e.host}function n(e){if(!e)return document.body;switch(e.nodeName){case'HTML':case'BODY':return e.ownerDocument.body;case'#document':return e.body;}var i=t(e),r=i.overflow,p=i.overflowX,s=i.overflowY;return /(auto|scroll|overlay)/.test(r+s+p)?e:n(o(e))}function r(e){return 11===e?pe:10===e?se:pe||se}function p(e){if(!e)return document.documentElement;for(var o=r(10)?document.body:null,n=e.offsetParent||null;n===o&&e.nextElementSibling;)n
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:PNG image data, 2048 x 2048, 8-bit colormap, non-interlaced
                    Category:dropped
                    Size (bytes):11991
                    Entropy (8bit):2.7917240238145595
                    Encrypted:false
                    SSDEEP:
                    MD5:E31059842ABEF653A8AD5BEDE793EF94
                    SHA1:3CCF31BF0BD22F1A61BB6AA7CBD88F74CBB53F21
                    SHA-256:29030805B259D61804B9322AE6580D95C44196E0C5182BF45A2AC92AD54A6504
                    SHA-512:F5221C5CFB99C63EBCADD3708F698917E9890F285E49B6653558C7E8230C3D59E4692DB587D0D9FE201CB52E71C9A4D84D0ED2BDBC4A56B976C3BAD97236FBB1
                    Malicious:false
                    Reputation:unknown
                    Preview:.PNG........IHDR..............y#.....gAMA......a.... cHRM..z&..............u0...`..:....p..Q<...NPLTE....`6.Z...........S%............................................q.N.....bKGD..n......tIME.........V...-.IDATx...K..P.D.'....Pt.+u.....I...S......................................................................................................................................................................................Q.nZ ....P].|]..+........ .....@......... .@............ .@............ .@......................... .<1..@........... ......@......................... .@............ .@............ .@......... .....@......... ......@........... ............ ... .@............ .@............ .@............ .@......... ... .@...@...... ......@........... .@...@......... .....@..... ........@..... ........@..... ........@....................... ......@.......... .....@...............@..... ........@..... ........@..... ............... .....@........... ......@...............
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:Unicode text, UTF-8 text, with very long lines (65338)
                    Category:downloaded
                    Size (bytes):165456
                    Entropy (8bit):6.079140130865821
                    Encrypted:false
                    SSDEEP:
                    MD5:2E5DA0F3429EE8137BDF344238B5B49F
                    SHA1:7B511207C1A8E535305E65E7B9957E5042797669
                    SHA-256:D7356B9394CCDFDDB06D9D9F65C0DE473A3C0BED6AB9C377CC382BDB71CA6876
                    SHA-512:DF7916C4153DCBA889D3BCE8EA3A6C579449E1BBD58A52266518A41F9350C5AD81A1B191CCC259AFE16690DC437EF6E343F3596FD36CE795A14F3829D2575B77
                    Malicious:false
                    Reputation:unknown
                    URL:https://uicdn.toast.com/editor/3.2.1/toastui-editor.min.css
                    Preview:@charset "utf-8";./*!. * @toast-ui/editor. * @version 3.2.1 | Thu Sep 29 2022. * @author NHN Cloud FE Development Lab <dl_javascript@nhn.com>. * @license MIT. */.ProseMirror{word-wrap:break-word;font-feature-settings:"liga" 0;-webkit-font-variant-ligatures:none;font-variant-ligatures:none;position:relative;white-space:pre-wrap;white-space:break-spaces}.ProseMirror pre{white-space:pre-wrap}.ProseMirror li{position:relative}.ProseMirror-hideselection ::selection{background:transparent}.ProseMirror-hideselection ::-moz-selection{background:transparent}.ProseMirror-hideselection{caret-color:transparent}.ProseMirror-selectednode{outline:2px solid #8cf}li.ProseMirror-selectednode{outline:none}li.ProseMirror-selectednode:after{border:2px solid #8cf;bottom:-2px;content:"";left:-32px;pointer-events:none;position:absolute;right:-2px;top:-2px}img.ProseMirror-separator{border:none!important;display:inline!important;margin:0!important}.auto-height,.auto-height .toastui-editor-defaultUI{height:auto}
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with no line terminators
                    Category:dropped
                    Size (bytes):157
                    Entropy (8bit):4.556404455417995
                    Encrypted:false
                    SSDEEP:
                    MD5:C18CC70A92845A5A3E19DFC03A394752
                    SHA1:637384A856F489AB8AD2899A5F9753AE9E8B3DE4
                    SHA-256:CC7F8EF3F967BA76F3BE3AF3B37E3AF341FFEDB98AF74A59B6E6ACE031382F22
                    SHA-512:801BDA467F83BD8E52C5BB13AF0D70C5FF3A4BCA74274F0AC7C0B0F04BCA99A801C4018122FFFDF42D072DB466C15B627D42B5F1FA8F58015F2BB59C44A65BC6
                    Malicious:false
                    Reputation:unknown
                    Preview:.success-icon{color:inherit;font-size:inherit;margin-left:10px}.MuiButton-root{display:inline-flex;overflow:hidden;text-overflow:ellipsis;white-space:nowrap}
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (61777)
                    Category:dropped
                    Size (bytes):183764
                    Entropy (8bit):5.472990370550911
                    Encrypted:false
                    SSDEEP:
                    MD5:7A15095204ABFC607EDEFBA53DF7DF92
                    SHA1:EE72545F451C6FA193B42B97E081F0F17AC42C19
                    SHA-256:C8163617251F319147F4A9FED9F9F0ECD09AC6A8CD1E89A09EA9354AA6697033
                    SHA-512:4772DCF23FC37846EF3EFED23632D79DEE066AA5D6DF14D7D055E93E22F2E139BC87AF9F44AB4C2CA897FE3D5156326818D8CFA2569D60DD6D9A54CAAFAE95B9
                    Malicious:false
                    Reputation:unknown
                    Preview:var renderBlock;(()=>{var e={94184:(e,t)=>{var r;!function(){"use strict";var n={}.hasOwnProperty;function o(){for(var e=[],t=0;t<arguments.length;t++){var r=arguments[t];if(r){var a=typeof r;if("string"===a||"number"===a)e.push(r);else if(Array.isArray(r)){if(r.length){var i=o.apply(null,r);i&&e.push(i)}}else if("object"===a)if(r.toString===Object.prototype.toString)for(var s in r)n.call(r,s)&&r[s]&&e.push(s);else e.push(r.toString())}}return e.join(" ")}e.exports?(o.default=o,e.exports=o):void 0===(r=function(){return o}.apply(t,[]))||(e.exports=r)}()},8679:(e,t,r)=>{"use strict";var n=r(21296),o={childContextTypes:!0,contextType:!0,contextTypes:!0,defaultProps:!0,displayName:!0,getDefaultProps:!0,getDerivedStateFromError:!0,getDerivedStateFromProps:!0,mixins:!0,propTypes:!0,type:!0},a={name:!0,length:!0,prototype:!0,caller:!0,callee:!0,arguments:!0,arity:!0},i={$$typeof:!0,compare:!0,defaultProps:!0,displayName:!0,propTypes:!0,type:!0},s={};function l(e){return n.isMemo(e)?i:s[e.$$t
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:Unicode text, UTF-8 text, with very long lines (7097)
                    Category:downloaded
                    Size (bytes):7102
                    Entropy (8bit):5.200032716115063
                    Encrypted:false
                    SSDEEP:
                    MD5:DD694C727FC5E6F6372E142B66DDB576
                    SHA1:E83E76DF57D64C1CF25B3FDBA9EDCBC8069AF228
                    SHA-256:46DC1F18EF5FD887B12B7A2866C824A7097B62C6127EE4016F51BAD9118BB6A7
                    SHA-512:A9CC1C02E97B77BC94728CF73264000626860DAFA05646835A0657EB011DFF3DC8EB3EB69D00835B712A8A8406F8EF909460A9C6624B747E6C9E1E086833E23C
                    Malicious:false
                    Reputation:unknown
                    URL:https://assets.softr-files.com/libs/micromodal/0.4.10/micromodal.min.js
                    Preview:!function(e,t){"object"==typeof exports&&"undefined"!=typeof module?module.exports=t():"function"==typeof define&&define.amd?define(t):(e="undefined"!=typeof globalThis?globalThis:e||self).MicroModal=t()}(this,(function(){"use strict";function e(e,t){for(var o=0;o<t.length;o++){var n=t[o];n.enumerable=n.enumerable||!1,n.configurable=!0,"value"in n&&(n.writable=!0),Object.defineProperty(e,n.key,n)}}function t(e){return function(e){if(Array.isArray(e))return o(e)}(e)||function(e){if("undefined"!=typeof Symbol&&Symbol.iterator in Object(e))return Array.from(e)}(e)||function(e,t){if(!e)return;if("string"==typeof e)return o(e,t);var n=Object.prototype.toString.call(e).slice(8,-1);"Object"===n&&e.constructor&&(n=e.constructor.name);if("Map"===n||"Set"===n)return Array.from(e);if("Arguments"===n||/^(?:Ui|I)nt(?:8|16|32)(?:Clamped)?Array$/.test(n))return o(e,t)}(e)||function(){throw new TypeError("Invalid attempt to spread non-iterable instance.\nIn order to be iterable, non-array objects must
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (65536), with no line terminators
                    Category:dropped
                    Size (bytes):185127
                    Entropy (8bit):5.475178173298395
                    Encrypted:false
                    SSDEEP:
                    MD5:A76E8D519AC4120E780B48911B63027B
                    SHA1:FEB2B67FD65E7BFAC6C10E71D8E85DB7C896C8CB
                    SHA-256:EBAD802B9281AD033C3CA72477E211C9AE2EBB13DB6CFCD29F6892A75A054A23
                    SHA-512:3D05E38EEC238C48F867BD9149194743EF97C81DA9A17D1B77CE0AB8BB56E48712AA9D7E7312173834FD3F528D6820F09179A8B466BF277154F9D835C22B2E81
                    Malicious:false
                    Reputation:unknown
                    Preview:var renderBlock;(()=>{var e={94184:(e,t)=>{var r;!function(){"use strict";var n={}.hasOwnProperty;function o(){for(var e=[],t=0;t<arguments.length;t++){var r=arguments[t];if(r){var a=typeof r;if("string"===a||"number"===a)e.push(r);else if(Array.isArray(r)){if(r.length){var i=o.apply(null,r);i&&e.push(i)}}else if("object"===a)if(r.toString===Object.prototype.toString)for(var s in r)n.call(r,s)&&r[s]&&e.push(s);else e.push(r.toString())}}return e.join(" ")}e.exports?(o.default=o,e.exports=o):void 0===(r=function(){return o}.apply(t,[]))||(e.exports=r)}()},8679:(e,t,r)=>{"use strict";var n=r(21296),o={childContextTypes:!0,contextType:!0,contextTypes:!0,defaultProps:!0,displayName:!0,getDefaultProps:!0,getDerivedStateFromError:!0,getDerivedStateFromProps:!0,mixins:!0,propTypes:!0,type:!0},a={name:!0,length:!0,prototype:!0,caller:!0,callee:!0,arguments:!0,arity:!0},i={$$typeof:!0,compare:!0,defaultProps:!0,displayName:!0,propTypes:!0,type:!0},s={};function l(e){return n.isMemo(e)?i:s[e.$$t
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (52276)
                    Category:downloaded
                    Size (bytes):102526
                    Entropy (8bit):4.781903903660331
                    Encrypted:false
                    SSDEEP:
                    MD5:C43CD173EEEBA2F72AA6B431D06B8C07
                    SHA1:427A692F7F39EABB3D5B8510AEE2743025DAF813
                    SHA-256:C880EB3D25C765D399840AA204FEC22B3230310991089F14781F09A35ED80B8A
                    SHA-512:02F6F6422B83104BC1E1B64961D7EDDA63635528417ED2DD3C6F0527457B8AB4CB43C528D2A70FC61E0F96AEC6E6D1A6D2B53ED523E1568B6D78BA41111C1393
                    Malicious:false
                    Reputation:unknown
                    URL:https://assets.softr-files.com/libs/font-awesome/6.5.0/css/all.min.css
                    Preview:/*!. * Font Awesome Free 6.5.0 by @fontawesome - https://fontawesome.com. * License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License). * Copyright 2023 Fonticons, Inc.. */..fa{font-family:var(--fa-style-family,"Font Awesome 6 Free");font-weight:var(--fa-style,900)}.fa,.fa-brands,.fa-classic,.fa-regular,.fa-sharp,.fa-solid,.fab,.far,.fas{-moz-osx-font-smoothing:grayscale;-webkit-font-smoothing:antialiased;display:var(--fa-display,inline-block);font-style:normal;font-variant:normal;line-height:1;text-rendering:auto}.fa-classic,.fa-regular,.fa-solid,.far,.fas{font-family:"Font Awesome 6 Free"}.fa-brands,.fab{font-family:"Font Awesome 6 Brands"}.fa-1x{font-size:1em}.fa-2x{font-size:2em}.fa-3x{font-size:3em}.fa-4x{font-size:4em}.fa-5x{font-size:5em}.fa-6x{font-size:6em}.fa-7x{font-size:7em}.fa-8x{font-size:8em}.fa-9x{font-size:9em}.fa-10x{font-size:10em}.fa-2xs{font-size:.625em;line-height:.1em;vertical-align:.225em}.fa-xs{font-size:.75em;line-
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 539x349, components 3
                    Category:dropped
                    Size (bytes):49267
                    Entropy (8bit):7.934206137271149
                    Encrypted:false
                    SSDEEP:
                    MD5:0FD1444A8A6DA40D175B7718F5737E8D
                    SHA1:744785F0B881A8203C1AEDD1A22C7A6F7004CC2F
                    SHA-256:B68C3189ED74D0BDC8A8CA825B0DBDA8F6E1E46C37D29778F93D7E1DAC55D7F2
                    SHA-512:96581F6CE242BFB7C01EA666A1BD8468F305540FD1550DBB2CA43249F21D42BCBD9BDE0BB8B2356A2D1C4140C8CAC9777C9A32ADD2630AC53E58416378DFF8A5
                    Malicious:false
                    Reputation:unknown
                    Preview:......JFIF.............C....................................................................C.......................................................................]...."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?.........I....>.....?...'....?...e+Z......3.._[X.#S.:d...j...sR"v..../....0N=.'.....D..o#H....U0s.....*...S.Fp.3.{.^.u.k.s.........W..^.j...sS..{v.....YQ;g......N.....~..)r.K..1......2.......?S....N.....~.qT...k.R......[....O...?..'a.......wU.A.n.......m.~..Dc.}oq..........;.......\.....{v.....^y..N.}.T.I.........;.......l"v....?....c...?...D9.=.?...,..m/s.
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (65324)
                    Category:downloaded
                    Size (bytes):155758
                    Entropy (8bit):5.06621719317054
                    Encrypted:false
                    SSDEEP:
                    MD5:A15C2AC3234AA8F6064EF9C1F7383C37
                    SHA1:6E10354828454898FDA80F55F3DECB347FD9ED21
                    SHA-256:60B19E5DA6A9234FF9220668A5EC1125C157A268513256188EE80F2D2C8D8D36
                    SHA-512:B435CF71A9AE66C59677A3AC285C87EA702A87F32367FE5893CF13E68F9A31FCA0A8D14F6A7D692F23C5027751CE63961CA4FE8D20F35A926FF24AE3EB1D4B30
                    Malicious:false
                    Reputation:unknown
                    URL:https://assets.softr-files.com/libs/bootstrap/4.3.1/css/bootstrap.min.css
                    Preview:/*!. * Bootstrap v4.3.1 (https://getbootstrap.com/). * Copyright 2011-2019 The Bootstrap Authors. * Copyright 2011-2019 Twitter, Inc.. * Licensed under MIT (https://github.com/twbs/bootstrap/blob/master/LICENSE). */:root{--blue:#007bff;--indigo:#6610f2;--purple:#6f42c1;--pink:#e83e8c;--red:#dc3545;--orange:#fd7e14;--yellow:#ffc107;--green:#28a745;--teal:#20c997;--cyan:#17a2b8;--white:#fff;--gray:#6c757d;--gray-dark:#343a40;--primary:#007bff;--secondary:#6c757d;--success:#28a745;--info:#17a2b8;--warning:#ffc107;--danger:#dc3545;--light:#f8f9fa;--dark:#343a40;--breakpoint-xs:0;--breakpoint-sm:576px;--breakpoint-md:768px;--breakpoint-lg:992px;--breakpoint-xl:1200px;--font-family-sans-serif:-apple-system,BlinkMacSystemFont,"Segoe UI",Roboto,"Helvetica Neue",Arial,"Noto Sans",sans-serif,"Apple Color Emoji","Segoe UI Emoji","Segoe UI Symbol","Noto Color Emoji";--font-family-monospace:SFMono-Regular,Menlo,Monaco,Consolas,"Liberation Mono","Courier New",monospace}*,::after,::before{box-sizing:
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:Unicode text, UTF-8 text, with very long lines (65534), with no line terminators
                    Category:dropped
                    Size (bytes):3654167
                    Entropy (8bit):5.78051414740482
                    Encrypted:false
                    SSDEEP:
                    MD5:239A5AC2B95D8349AA03A960E91A612B
                    SHA1:5E8D10081E560AEBECCCADC1E31F961853FB080A
                    SHA-256:1490EA73AD6F2552CBAB96CE4C530BAC06B35842E5257EC5D1537BD2AF2570CE
                    SHA-512:45E686C7F8321F9064AA73EA7CC7F4F8D6F00E4D95CA1C8A68B8B08F479C9F9190CD9E9EE14DC2973C5676DDF0CB1B833879AAA89B89B2D1E842AE4560A93BBE
                    Malicious:false
                    Reputation:unknown
                    Preview:var renderBlock;(()=>{var e={54697:(e,t,n)=>{"use strict";n.d(t,{Z:()=>z});var r=n(11526),o=n(46411),i=n(26686),a=n(27563),s=n(20211),c=n(88160),l=n(92190),p=function(e,t,n){for(var r=0,i=0;r=i,i=(0,o.fj)(),38===r&&12===i&&(t[n]=1),!(0,o.r)(i);)(0,o.lp)();return(0,o.tP)(e,o.FK)},d=function(e,t){return(0,o.cE)(function(e,t){var n=-1,r=44;do{switch((0,o.r)(r)){case 0:38===r&&12===(0,o.fj)()&&(t[n]=1),e[n]+=p(o.FK-1,t,n);break;case 2:e[n]+=(0,o.iF)(r);break;case 4:if(44===r){e[++n]=58===(0,o.fj)()?"&\f":"",t[n]=e[n].length;break}default:e[n]+=(0,i.Dp)(r)}}while(r=(0,o.lp)());return e}((0,o.un)(e),t))},u=new WeakMap,b=function(e){if("rule"===e.type&&e.parent&&!(e.length<1)){for(var t=e.value,n=e.parent,r=e.column===n.column&&e.line===n.line;"rule"!==n.type;)if(!(n=n.parent))return;if((1!==e.props.length||58===t.charCodeAt(0)||u.get(n))&&!r){u.set(e,!0);for(var o=[],i=d(t,o),a=n.props,s=0,c=0;s<i.length;s++)for(var l=0;l<a.length;l++,c++)e.props[c]=o[s]?i[s].replace(/&\f/g,a[l]):a[l]+" "+i[
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with no line terminators
                    Category:downloaded
                    Size (bytes):28
                    Entropy (8bit):4.280394654123194
                    Encrypted:false
                    SSDEEP:
                    MD5:06B28D056499156EF978C2B5AE16B50C
                    SHA1:E1D7C07524C61CEFCD75E9CC010484C837BD3349
                    SHA-256:5880AF1D797AB5009590808066290450DE2BC550EC09A7DEAA6C0F7E098BDC8F
                    SHA-512:EAA22057F62F57D5EB5397145A087FBBF903CCA910624E4650775EADAD836E6A29DB75837B85982A7B935757A80CF2F88F91D352BB3DD60134702BDF2E3A383D
                    Malicious:false
                    Reputation:unknown
                    URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISFwlbjoV-_s8zNRIFDWqCztASBQ26xifT?alt=proto
                    Preview:ChIKBw1qgs7QGgAKBw26xifTGgA=
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:Web Open Font Format (Version 2), TrueType, length 25200, version 1.0
                    Category:downloaded
                    Size (bytes):25200
                    Entropy (8bit):7.9894777248480695
                    Encrypted:false
                    SSDEEP:
                    MD5:351540371BC840FFC95E0B3E670D727B
                    SHA1:AC66C6C30243C81B820EFE5732770273D24537D4
                    SHA-256:62429575B7D315B6AD0C016109842A5E4A0532D06EADC973132DBEC61169DD86
                    SHA-512:616A8D1D068B41D6C56E604BF7DA8B589090FE00400F3676806B1BC914D043F7A1C3C46B8636433B2C43B2E825DFA884124A2AB03AB5F94660B213732C5DA930
                    Malicious:false
                    Reputation:unknown
                    URL:https://fonts.softr-files.com/google/static/s/geologica/v1/oY1l8evIr7j9P3TN9YwNAdyjzUyDKkKdAGOJh1UlCDUIhAIdhCZOn1fLsig7jfvCCPHZckUWE1lE.woff2
                    Preview:wOF2......bp..........a...........................2......&?HVAR.P?MVAR\.`?STAT.`.."/l...........0.6.6.$..4. ........[..Q.l.-..6....:..+.4z....(t.D...".76..3..8.c...`#."..S.....j..Y&Q..42...2KSeC.m....yC.....l.....O..%..>.T.N.}w.o}.!~.2..r.v......=$X.M?i.T..|......A...WV..nzG..W..:.s>..p..Mq....._.S.I..!...&"..O(*.....i8.&`i.:.9.u..X.K]..}.mG...>4.....?.XY.X..2.-....g..qV..g6..3.....\.....!..*.....;E 3....!..>{f.I....hF.....*V.\t......../2.....tu..KD*..W+4z>.....fV.P.<.f.M....S.U..b..@...".aB...}{.~.....6....Z|q......m...b......V"F...\{sY...9[..m....M.x..i.s.Li...N(@..9 ......h..a....."....y.......9.[...h...}..>j.G..Y.E.....@.../.|...h8.6.......5D..D...J.P.;......?....'H.4.m...Z` ..O..3..[d....E...O.]S...."|D.......J..g..ui....U@..=...V./..^7t{rk7r.E.E).e.x...t.....Y ..`..oZF...236.136...wV......w..T..)........#.w..@f...'.......\..ka....w.9?..Fr.9..(<......R..#.B...~...w@z..d..t.....G##<...7..r8.j..........-u.Z...=B2.!R..>....j,.S8M.LJxr..-.F8.
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with no line terminators
                    Category:downloaded
                    Size (bytes):28
                    Entropy (8bit):3.967720100474499
                    Encrypted:false
                    SSDEEP:
                    MD5:FFB8AE6EFB34660CE1F566CCF1D494A9
                    SHA1:0ADEA9ACA93E3173697F21CF6C1FF00BDE021032
                    SHA-256:B0E878B33DDA02E3CDB1E57B8C825121605C89518565CA4EB130F609CD3F277F
                    SHA-512:E5218349A2DC235069591450CA1E02244669A89D2511E64006C6C0CFDCAE0E1256111DF0ED04F53EA29428A8572D7FCC25EE226A41B44ED64D0DB196B0CAD8CA
                    Malicious:false
                    Reputation:unknown
                    URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISFwnt9DPeoEEJCRIFDeZwhQ0SBQ3pNK13?alt=proto
                    Preview:ChIKBw3mcIUNGgAKBw3pNK13GgA=
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text
                    Category:downloaded
                    Size (bytes):22878
                    Entropy (8bit):5.597849076099615
                    Encrypted:false
                    SSDEEP:
                    MD5:4A820756A24BA4DD78328EF01D9B703C
                    SHA1:AB2A16D30ABB56DFB459B45E06D6AF595151431C
                    SHA-256:761FC38A6EF86B8F920784075A9DF7E509625CD2D32352FD45800C0D410B9059
                    SHA-512:9586EF919273D11A1BF2345EE7C844E36F3EBD8B9DBC1D5A771644004AF309365B039FBF9ABA2209E0FB2A5A0E04C7FA812183A794BC328674C62717BEA8DE1C
                    Malicious:false
                    Reputation:unknown
                    URL:"https://fonts.softr-files.com/google/api/css?family=Geologica:100,200,300,400,500,600,700,800,900&display=swap"
                    Preview:/* cyrillic-ext */.@font-face {. font-family: 'Geologica';. font-style: normal;. font-weight: 100;. font-display: swap;. src: url(https://fonts.softr-files.com/google/static/s/geologica/v1/oY1l8evIr7j9P3TN9YwNAdyjzUyDKkKdAGOJh1UlCDUIhAIdhCZOn1fLsig7jfvCCPHZckUWHllEP2A.woff2) format('woff2');. unicode-range: U+0460-052F, U+1C80-1C88, U+20B4, U+2DE0-2DFF, U+A640-A69F, U+FE2E-FE2F;.}./* cyrillic */.@font-face {. font-family: 'Geologica';. font-style: normal;. font-weight: 100;. font-display: swap;. src: url(https://fonts.softr-files.com/google/static/s/geologica/v1/oY1l8evIr7j9P3TN9YwNAdyjzUyDKkKdAGOJh1UlCDUIhAIdhCZOn1fLsig7jfvCCPHZckUWF1lEP2A.woff2) format('woff2');. unicode-range: U+0301, U+0400-045F, U+0490-0491, U+04B0-04B1, U+2116;.}./* greek */.@font-face {. font-family: 'Geologica';. font-style: normal;. font-weight: 100;. font-display: swap;. src: url(https://fonts.softr-files.com/google/static/s/geologica/v1/oY1l8evIr7j9P3TN9YwNAdyjzUyDKkKdAGOJh1UlCDUIhAIdhCZOn1f
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text
                    Category:downloaded
                    Size (bytes):8015
                    Entropy (8bit):5.3961791557434955
                    Encrypted:false
                    SSDEEP:
                    MD5:3F9D16467E883A8C857A6339A18BAF16
                    SHA1:EE1ACABCB1EF2FF587D66B5A84DCE0DD3450530E
                    SHA-256:33D28CD5B7DE5035548505769F43BBE61C78F6CC99775051D5751C8A1E3A7B75
                    SHA-512:2AA493DCA7186D81BFAC8F8A57CF9E46E624A297FFD7EB56001BB56FD0E0F9999CD3EF1E2F3F869E248F63175D5545347E49BD25D604A18BC98B6FEBA5F6C7E8
                    Malicious:false
                    Reputation:unknown
                    URL:"https://fonts.softr-files.com/google/api/css?family=Assistant:200,300,400,500,600,700,800&display=swap"
                    Preview:/* hebrew */.@font-face {. font-family: 'Assistant';. font-style: normal;. font-weight: 200;. font-display: swap;. src: url(https://fonts.softr-files.com/google/static/s/assistant/v19/2sDcZGJYnIjSi6H75xkzamW5O7w.woff2) format('woff2');. unicode-range: U+0590-05FF, U+200C-2010, U+20AA, U+25CC, U+FB1D-FB4F;.}./* latin-ext */.@font-face {. font-family: 'Assistant';. font-style: normal;. font-weight: 200;. font-display: swap;. src: url(https://fonts.softr-files.com/google/static/s/assistant/v19/2sDcZGJYnIjSi6H75xkzZmW5O7w.woff2) format('woff2');. unicode-range: U+0100-02AF, U+0304, U+0308, U+0329, U+1E00-1E9F, U+1EF2-1EFF, U+2020, U+20A0-20AB, U+20AD-20C0, U+2113, U+2C60-2C7F, U+A720-A7FF;.}./* latin */.@font-face {. font-family: 'Assistant';. font-style: normal;. font-weight: 200;. font-display: swap;. src: url(https://fonts.softr-files.com/google/static/s/assistant/v19/2sDcZGJYnIjSi6H75xkzaGW5.woff2) format('woff2');. unicode-range: U+0000-00FF, U+0131, U+0152-0153, U+0
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with no line terminators
                    Category:downloaded
                    Size (bytes):28
                    Entropy (8bit):4.307354922057604
                    Encrypted:false
                    SSDEEP:
                    MD5:459517A071C88A7360DD08896FCD73C6
                    SHA1:6D76272B8BF3786F8E75AB7B7376ED083FBD62E9
                    SHA-256:2A8C1A70C52FF905505D6B225F2050031EA71150CCABFA42D117F71B143BFDAB
                    SHA-512:6F1049EBA5F2AFE8636A965A3545D580117CC215E5B5E7BFFDF34955DBF2A2319894F0DE0254E6D04FAE7F7E6C098A68465B5AEF6A282CDC05DCB9FC3B786BF5
                    Malicious:false
                    Reputation:unknown
                    URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISFwkDXKo5J2TWqRIFDZ4w6N4SBQ3SsF0x?alt=proto
                    Preview:ChIKBw2eMOjeGgAKBw3SsF0xGgA=
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:Web Open Font Format (Version 2), TrueType, length 156532, version 773.256
                    Category:downloaded
                    Size (bytes):156532
                    Entropy (8bit):7.996386572265519
                    Encrypted:true
                    SSDEEP:
                    MD5:D465BCCB9EDF0873F021F66D4B09D89C
                    SHA1:214F3C71DE28C682602AECD39E9AD2BBA15F1B0C
                    SHA-256:F4C5A5B297E623BC159679563A4D1EB16E409CA3B57698FBC00FD2C907DADAE0
                    SHA-512:35D7523F48386E89B1CAD6A47DF65D64415AB9C45E6425BB4AB25AC9510F6D2E9DE3D7CAD79C2491660E885D7A38D3FFA9E93EB50AE045FBD072DEAF114E10B8
                    Malicious:false
                    Reputation:unknown
                    URL:https://assets.softr-files.com/libs/font-awesome/6.5.0/webfonts/fa-solid-900.woff2
                    Preview:wOF2......ct.......A..c(.........................6.$. .`..<......\.@..m. % ....PX.....6.F.h.....^.......f%.....*..~.....W.........7...../.....?.....q...i........h..s'@.I...D...V.F.)(V..`.7.B....u....J...I.U..9E..`M...Zf......R.&.t&&.j....-..$...";.:...9... .3;...8...j%.'.@....>=.Hbdj..W.@.<].'7..`..tja~.X.<<....O..@./)x."A..6.....A..V+...^.t[p.a.A............N.>ilUN.@ek..^ .U.%....E ...pz&..M..^5TWwAc.d.....C......6Y...y...e../f.P..:...v..._B..zBOO.......f7cv....;.\..`:.1. .bHZ.."E.T$E.5iE...y.e..)."..m...Cz{..Yr....?ij....W.UH.....P@w...h.:.."..I+..DR.-(Q....4r...(.R;HCg8.aw{.I..c8..,{..L.5......R..g.{.g.'..<...........X....G.H$E..(0H.).A..e.B..).2O.l..2..Z....I.g...L9Hr..y~...\......4...x.....x.&.!?....M&ix..E....7.'):K..l.R.......K.%R .x.m...f..Wr...)...{.....n9W.........=H....5J.=b...$BT.Q....$`.....3..UT..<....K..KM$._O.S....a........p....%S8.S.Na.....2.F.U.\.....|.._.h.;.}L.....Y.Z..!..S.N.*EG]..<_k.Y.}.!t/.<U.....:......P`B..4.B......
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:Unicode text, UTF-8 text, with very long lines (33797), with no line terminators
                    Category:downloaded
                    Size (bytes):33799
                    Entropy (8bit):5.147604138837549
                    Encrypted:false
                    SSDEEP:
                    MD5:6D67EE57C9E8EE87BCB10D491D7D72FD
                    SHA1:76C4969733B936C7B8E8F26BE2FB3C1391CFAF97
                    SHA-256:C9291BE14DB4D5043E88F26E4613893C14694076D8B85735476CFC2C9FF96E41
                    SHA-512:02F2884B176D100295A2C875356768A92D5FDAB76906F2D332B3EE6A1941F655C73E3457AF353E9EBC1F3110FFD6DE256A205F6B359908F868D67D2970B30615
                    Malicious:false
                    Reputation:unknown
                    URL:https://assets.softr-files.com/softr-blocks/prod/blocks/form3/3.8.0/main.css?t=1714047698404
                    Preview:.form-input-holder{display:flex;flex-direction:column;margin:8px auto;width:100%}.form-input-label{color:#616161;font:600 12px/18px var(--font,"Inter")}.form-error-text{color:#de350b;display:flex;font-family:var(--font,"Inter");font-size:12px;gap:5px}.rich-text-editor h1,.rich-text-editor h2,.rich-text-editor h3,.rich-text-editor h4,.rich-text-editor h5,.rich-text-editor h6,.rich-text-editor p,.rich-text-editor small{white-space:pre-wrap}.sonner-toast [data-icon]{display:none!important}.sonner-toast [data-close-button]{border-radius:50%;left:unset;right:-15px!important}.sonner-toast{background-repeat:no-repeat;border-radius:8px;color:#5a5d63;font-size:13px;list-style-type:none;margin:0 0 6px;padding:15px 15px 15px 50px;width:400px}.sonner-toast-success{background-color:#e9f6f2;background-image:url(https://softr-assets-eu-shared.s3.eu-central-1.amazonaws.com/studio/blocks/assets/success.svg);background-position:16px 15px;border:1px solid #d3f0e7}.sonner-toast-error{background-color:#fce
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (630)
                    Category:dropped
                    Size (bytes):10736
                    Entropy (8bit):5.326945534063153
                    Encrypted:false
                    SSDEEP:
                    MD5:8DB4C5DEFE50C0EF09221C4EFC5189F1
                    SHA1:B41DE63895D3776B2D86755C9102941A9793CA2A
                    SHA-256:F24E1D0755F8B25546D41A30866735062AED45ABEB74FBE40019F0E85E5FE8C0
                    SHA-512:9CCF06C661481B59EC08B1B3D3C9DAF50269EEEDCC2CB2692118C2116BAFE9031E926DE836C1BD401E10DCFE116C4CADD291D12A9F95C71A92A67ED9B3C5A405
                    Malicious:false
                    Reputation:unknown
                    Preview:/**. * @license React. * react.production.min.js. *. * Copyright (c) Facebook, Inc. and its affiliates.. *. * This source code is licensed under the MIT license found in the. * LICENSE file in the root directory of this source tree.. */.(function(){'use strict';(function(c,x){"object"===typeof exports&&"undefined"!==typeof module?x(exports):"function"===typeof define&&define.amd?define(["exports"],x):(c=c||self,x(c.React={}))})(this,function(c){function x(a){if(null===a||"object"!==typeof a)return null;a=V&&a[V]||a["@@iterator"];return"function"===typeof a?a:null}function w(a,b,e){this.props=a;this.context=b;this.refs=W;this.updater=e||X}function Y(){}function K(a,b,e){this.props=a;this.context=b;this.refs=W;this.updater=e||X}function Z(a,b,.e){var m,d={},c=null,h=null;if(null!=b)for(m in void 0!==b.ref&&(h=b.ref),void 0!==b.key&&(c=""+b.key),b)aa.call(b,m)&&!ba.hasOwnProperty(m)&&(d[m]=b[m]);var l=arguments.length-2;if(1===l)d.children=e;else if(1<l){for(var f=Array(l),k=0;k<l;k++)f[k
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (314), with no line terminators
                    Category:downloaded
                    Size (bytes):314
                    Entropy (8bit):4.741262420541203
                    Encrypted:false
                    SSDEEP:
                    MD5:41958594B85FAE7594C57BC5E5C6CA17
                    SHA1:16834D29B8CD4FDE203C49307039F5AE78A086BB
                    SHA-256:F319C43825DF96650A2854FF38E0DA0BC33AE2627102D19D69DFE318645374A1
                    SHA-512:A9AF3B194FC84C576F57739F56002CEA22AFAC8230E968A10F7ED274FF1C5A2919FC6AE0E4E6E058B150F47A8E6633B66C4AE55D1AF5BD15299FA9AA655F1A30
                    Malicious:false
                    Reputation:unknown
                    URL:https://assets.softr-files.com/softr-blocks/prod/blocks/hero1/3.0.2/main.css?t=1713376346476
                    Preview:video{-webkit-backface-visibility:hidden!important;-moz-backface-visibility:hidden!important;-webkit-mask-image:-webkit-radial-gradient(#fff,#000)!important}.success-icon{color:inherit;font-size:inherit;margin-left:10px}.MuiButton-root{display:inline-flex;overflow:hidden;text-overflow:ellipsis;white-space:nowrap}
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:Web Open Font Format (Version 2), TrueType, length 21700, version 1.0
                    Category:downloaded
                    Size (bytes):21700
                    Entropy (8bit):7.98891968946638
                    Encrypted:false
                    SSDEEP:
                    MD5:08FB1CF87B0042174100B61AA1D90542
                    SHA1:D99B93CDD8F0A96804739DF161B0EB3ACF0EF209
                    SHA-256:39E8CBDA3D0DBDEBF90FFD27F3990859A78F3E7561A8FF2B1F12DF25306854A7
                    SHA-512:FDDD9F0AC892D935BE240A4EF9EF8FF63111B4DAD3E91AD824D2AF6EE9FC9043DBCDA18049476A907551274B7E4ECC32A62B4127520294F2042B637937C5163C
                    Malicious:false
                    Reputation:unknown
                    URL:https://fonts.softr-files.com/google/static/s/assistant/v19/2sDcZGJYnIjSi6H75xkzaGW5.woff2
                    Preview:wOF2......T...........TR..........................Q..X..*?HVAR...`?STAT.2'&..|/`....l....b.0.\.6.$..@. ..4......h.5l.F....Br.Kl6.v;&.K76*J:.G...B..1.?..#..D....1<;5.=K..+.Q.g...D.Z..z..}i.'.F.}....Kg...|;...h.9=-...`...R...Rw:hh..'...@.BL..r..c>.....8.9bL.+...W;.g.;9".N....._{.S.....\<Sy. f.............$.%$...EF.....q.."c..6Z..h#.6r.r......v....6.l...9.n.N.....+.I...5.....p........`....R.e..W.xN!$8..#Ix$..Gb..c.W....n.w.C.!...!\B..K.!.....D.:.....}......?..........aQ..Os..p.>M.I...^r.]....$.#...B.A.%.U.h....s..;u~G;.......n.......h.<b.K.BHS.4..aB..g.....t.W&+qY.M..Z.B6.6..C........q.../..Z.[..r.tR&..!.'....!....G.F8B...e!dy-.B......hu........Z....Z.....{.s.....n..n...:h...W40.....$......Q?>..*..zd..EG.O+_.....+.5......q.........:8.....^.wU...^.%.j.V:9.....<.k......O..C{..,S"w.U.2iK.R.(k...z.~.....o.,.+..|.Xc...:rD3=..j....nO..Z..T.`.H.&..H..#.P...f....$.$.....kw...P....x'.a.*H .7/I.../T.V+.+\y..e........Qx..U.......B.U..Q...w`.D.+"r.+^n.RO.
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (57791)
                    Category:downloaded
                    Size (bytes):58072
                    Entropy (8bit):5.247960089226309
                    Encrypted:false
                    SSDEEP:
                    MD5:E1D98D47689E00F8ECBC5D9F61BDB42E
                    SHA1:6778FED3CF095A318141A31F455C8F4663885BDE
                    SHA-256:0A34A87842C539C1F4FEEC56BBA982FD596B73500046A6E6FE38A22260C6577B
                    SHA-512:021E615983F30EC5477FD8B611E8C5045AC6D9900F9A9BB8649B56E0C7D282965A727F8CF501C3B7E1DDFF02F5B44924D5481BCEA7A926BE8A9E166314A07ED0
                    Malicious:false
                    Reputation:unknown
                    URL:https://assets.softr-files.com/libs/bootstrap/4.3.1/js/bootstrap.min.js
                    Preview:/*!. * Bootstrap v4.3.1 (https://getbootstrap.com/). * Copyright 2011-2019 The Bootstrap Authors (https://github.com/twbs/bootstrap/graphs/contributors). * Licensed under MIT (https://github.com/twbs/bootstrap/blob/master/LICENSE). */.!function(t,e){"object"==typeof exports&&"undefined"!=typeof module?e(exports,require("jquery"),require("popper.js")):"function"==typeof define&&define.amd?define(["exports","jquery","popper.js"],e):e((t=t||self).bootstrap={},t.jQuery,t.Popper)}(this,function(t,g,u){"use strict";function i(t,e){for(var n=0;n<e.length;n++){var i=e[n];i.enumerable=i.enumerable||!1,i.configurable=!0,"value"in i&&(i.writable=!0),Object.defineProperty(t,i.key,i)}}function s(t,e,n){return e&&i(t.prototype,e),n&&i(t,n),t}function l(o){for(var t=1;t<arguments.length;t++){var r=null!=arguments[t]?arguments[t]:{},e=Object.keys(r);"function"==typeof Object.getOwnPropertySymbols&&(e=e.concat(Object.getOwnPropertySymbols(r).filter(function(t){return Object.getOwnPropertyDescriptor
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (13062)
                    Category:downloaded
                    Size (bytes):13454
                    Entropy (8bit):5.230506727854273
                    Encrypted:false
                    SSDEEP:
                    MD5:52D6FB0D394FF9D946143DFB1104719B
                    SHA1:BA83927A0B497BCC450A3E40B99BAB9A8241A66C
                    SHA-256:107FBB21D462C56B56E6D741C0C9135CBF87BD6E6D02A578A1FFC76C067B9C47
                    SHA-512:14E7F8B2E160CFB3AB5A6062CB2596E3CBBFFBA19A6801520C76A0876101BBF187FF5F8E41261CD0D1467867992B4819DEFB94D68BE6CD5CC3E9BC664F8BDACA
                    Malicious:false
                    Reputation:unknown
                    URL:https://assets.softr-files.com/libs/iframe-resizer/4.2.11/iframeResizer.contentWindow.min.js
                    Preview:/*! iFrame Resizer (iframeSizer.contentWindow.min.js) - v4.2.11 - 2020-06-02. * Desc: Include this file in any page being loaded into an iframe. * to force the iframe to resize to the content size.. * Requires: iframeResizer.min.js on host page.. * Copyright: (c) 2020 David J. Bradshaw - dave@bradshaw.net. * License: MIT. */..!function(d){if("undefined"!=typeof window){var n=!0,o=10,i="",r=0,a="",t=null,u="",c=!1,s={resize:1,click:1},l=128,f=!0,m=1,h="bodyOffset",g=h,p=!0,v="",y={},b=32,w=null,T=!1,E="[iFrameSizer]",O=E.length,S="",M={max:1,min:1,bodyScroll:1,documentElementScroll:1},I="child",N=!0,A=window.parent,C="*",z=0,k=!1,e=null,R=16,x=1,L="scroll",F=L,P=window,D=function(){re("onMessage function not defined")},j=function(){},q=function(){},H={height:function(){return re("Custom height calculation function not defined"),document.documentElement.offsetHeight},width:function(){return re("Custom width calculation function not defined"),document.body.scrollWidth}},W={},B=
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (945)
                    Category:downloaded
                    Size (bytes):131881
                    Entropy (8bit):5.376869797338495
                    Encrypted:false
                    SSDEEP:
                    MD5:3EC5FE6799E257B7DDCF84950C045110
                    SHA1:357427112ADA241EBDB9CAEBC03F9EF8EB0DE3E9
                    SHA-256:659861D6D431DE87E8FED3829A4D0CE48E06B274C4E5D90FB6C87981C43D470E
                    SHA-512:D0CD51BE63BDE4CC6CD1A2F9857FB8A406E7B923E9C012C4D1D8A1C4D0E1FB2FFB4CCA36473D349E9FA3311E9F563EAA9E368FB2C984E2C8F6E845E4BD15673E
                    Malicious:false
                    Reputation:unknown
                    URL:https://assets.softr-files.com/softr-blocks/prod/libs/react/18.2.0/react-dom18.min.js
                    Preview:/**. * @license React. * react-dom.production.min.js. *. * Copyright (c) Facebook, Inc. and its affiliates.. *. * This source code is licensed under the MIT license found in the. * LICENSE file in the root directory of this source tree.. */.(function(){/*. Modernizr 3.0.0pre (Custom Build) | MIT.*/.'use strict';(function(Q,mb){"object"===typeof exports&&"undefined"!==typeof module?mb(exports,require("react")):"function"===typeof define&&define.amd?define(["exports","react"],mb):(Q=Q||self,mb(Q.ReactDOM={},Q.React))})(this,function(Q,mb){function n(a){for(var b="https://reactjs.org/docs/error-decoder.html?invariant="+a,c=1;c<arguments.length;c++)b+="&args[]="+encodeURIComponent(arguments[c]);return"Minified React error #"+a+"; visit "+b+" for the full message or use the non-minified dev environment for full errors and additional helpful warnings."}.function nb(a,b){Ab(a,b);Ab(a+"Capture",b)}function Ab(a,b){$b[a]=b;for(a=0;a<b.length;a++)cg.add(b[a])}function cj(a){if(Zd.call(dg,a))retu
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:HTML document, ASCII text, with very long lines (64537)
                    Category:downloaded
                    Size (bytes):121835
                    Entropy (8bit):5.270276297068472
                    Encrypted:false
                    SSDEEP:
                    MD5:F03EC8C6C69B0543D81419FBD1F75EDC
                    SHA1:5CE57271407C32C556C793176DB6576C89F8D9A9
                    SHA-256:6690A6DAC644E26ED4C09D298AE808C9B1049D76E7C99EE4B4D1C4C7AEE72E56
                    SHA-512:7C69D5D47B48873670413B9250CDFDF35AF38E4FC7F1B136E190A9084353F94A48F8F6BAE1FD17A418304121E99A799EC8AF987D28511AFC7888788448223ADA
                    Malicious:false
                    Reputation:unknown
                    URL:https://devrteamsdashboardms.softr.app/
                    Preview:<!DOCTYPE html>.. Last Published: Fri, April 26 2024 09:15:22 -->.<html lang="en">.<head>.. <meta charset="utf-8">. <meta http-equiv="X-UA-Compatible" content="IE=edge">. <meta name="viewport" content="user-scalable=no, initial-scale=1, maximum-scale=1, minimum-scale=1, width=device-width, height=device-height, target-densitydpi=device-dpi, shrink-to-fit=no"/>. <script>. const reactDefaultThemes = {defaultBaseTextSize: '16px',defaultBodyFont: 'Geologica',defaultBodyFontWeight: '400',defaultBodyTextColor: '#767676',defaultButtonBackgroundColor: '#1e2adf',defaultButtonRoundness: '.5rem',defaultButtonTextColor: '#ffffff',defaultContainerStyle: 'container',defaultTitleFont: 'Geologica',defaultTitleFontWeight: '900',defaultTitleTextColor: '#000000',defaultSize: 'M',defaultBackgroundColor: '#FFFFFF',defaultShadow: true,defaultBackgroundStyle: 'HIGHLIGHTED'};. </script>. <script>/*! For license information please see softr-block-wrapper.min.js.LICENSE.txt */.(
                    No static file info