Edit tour

Windows Analysis Report
https://www.mypeoplenet.com/Peoplenet/TimeApproval.cfm?hGUID=211D595F-5133-4C5D-B237-30D4F15C806E&RequestTimeOut=120

Overview

General Information

Sample URL:https://www.mypeoplenet.com/Peoplenet/TimeApproval.cfm?hGUID=211D595F-5133-4C5D-B237-30D4F15C806E&RequestTimeOut=120
Analysis ID:1292254

Detection

Score:0
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

No high impact signatures.

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64_ra
  • chrome.exe (PID: 6652 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://www.mypeoplenet.com/Peoplenet/TimeApproval.cfm?hGUID=211D595F-5133-4C5D-B237-30D4F15C806E&RequestTimeOut=120 MD5: 7BC7B4AEDC055BB02BCB52710132E9E1)
    • chrome.exe (PID: 1652 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2056 --field-trial-handle=1756,i,10213972277915500319,10765527100342144928,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationTargetPrediction /prefetch:8 MD5: 7BC7B4AEDC055BB02BCB52710132E9E1)
  • cleanup
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\GoogleUpdater
Source: unknownDNS traffic detected: queries for: www.mypeoplenet.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49817 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49789 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49800 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49803 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49795 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49826 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49820 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49812 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49806 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49823 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49798 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49790 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49819 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49787 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49828 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49805 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49799
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49832
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49798
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49797
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49796
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49795
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49793
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49792
Source: unknownNetwork traffic detected: HTTP traffic on port 49814 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49791
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49790
Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49796 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49825 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49808 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49828
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49827
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49826
Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49825
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49824
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49823
Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49789
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49788
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49821
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49787
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49820
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49786
Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
Source: unknownNetwork traffic detected: HTTP traffic on port 49813 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49819
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49818
Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49799 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49810 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49817
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49815
Source: unknownNetwork traffic detected: HTTP traffic on port 49791 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49814
Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49813
Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49812
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49810
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
Source: unknownNetwork traffic detected: HTTP traffic on port 49788 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49827 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49802 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49808
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49806
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49805
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49804
Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49803
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49802
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49801
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49800
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
Source: unknownNetwork traffic detected: HTTP traffic on port 49821 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49815 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49797 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49801 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49824 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
Source: unknownNetwork traffic detected: HTTP traffic on port 49818 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49786 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49804 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49832 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
Source: unknownNetwork traffic detected: HTTP traffic on port 49792 -> 443
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: classification engineClassification label: clean0.win@21/78@6/76
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Program Files\Google\GoogleUpdater
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://www.mypeoplenet.com/Peoplenet/TimeApproval.cfm?hGUID=211D595F-5133-4C5D-B237-30D4F15C806E&RequestTimeOut=120
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2056 --field-trial-handle=1756,i,10213972277915500319,10765527100342144928,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2056 --field-trial-handle=1756,i,10213972277915500319,10765527100342144928,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\GoogleUpdater
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath Interception1
Process Injection
2
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local SystemExfiltration Over Other Network Medium2
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
Non-Application Layer Protocol
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
Application Layer Protocol
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
https://www.mypeoplenet.com/Peoplenet/TimeApproval.cfm?hGUID=211D595F-5133-4C5D-B237-30D4F15C806E&RequestTimeOut=1200%Avira URL Cloudsafe
https://www.mypeoplenet.com/Peoplenet/TimeApproval.cfm?hGUID=211D595F-5133-4C5D-B237-30D4F15C806E&RequestTimeOut=1200%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
bxvl6.x.incapdns.net
45.60.153.73
truefalse
    unknown
    accounts.google.com
    142.250.185.237
    truefalse
      high
      www.google.com
      142.250.184.228
      truefalse
        high
        clients.l.google.com
        142.250.184.238
        truefalse
          high
          stats.g.doubleclick.net
          142.250.13.157
          truefalse
            high
            clients2.google.com
            unknown
            unknownfalse
              high
              www.mypeoplenet.com
              unknown
              unknownfalse
                high
                NameMaliciousAntivirus DetectionReputation
                https://www.mypeoplenet.com/EmployeePortal/ManagementPortal/Timefalse
                  high
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  142.250.186.78
                  unknownUnited States
                  15169GOOGLEUSfalse
                  1.1.1.1
                  unknownAustralia
                  13335CLOUDFLARENETUSfalse
                  34.104.35.123
                  unknownUnited States
                  15169GOOGLEUSfalse
                  172.217.18.8
                  unknownUnited States
                  15169GOOGLEUSfalse
                  45.60.153.73
                  bxvl6.x.incapdns.netUnited States
                  19551INCAPSULAUSfalse
                  216.58.206.42
                  unknownUnited States
                  15169GOOGLEUSfalse
                  142.250.185.237
                  accounts.google.comUnited States
                  15169GOOGLEUSfalse
                  216.239.32.36
                  unknownUnited States
                  15169GOOGLEUSfalse
                  216.58.206.35
                  unknownUnited States
                  15169GOOGLEUSfalse
                  142.250.13.157
                  stats.g.doubleclick.netUnited States
                  15169GOOGLEUSfalse
                  239.255.255.250
                  unknownReserved
                  unknownunknownfalse
                  142.250.184.238
                  clients.l.google.comUnited States
                  15169GOOGLEUSfalse
                  142.250.184.227
                  unknownUnited States
                  15169GOOGLEUSfalse
                  142.250.184.228
                  www.google.comUnited States
                  15169GOOGLEUSfalse
                  IP
                  192.168.2.1
                  Joe Sandbox Version:38.0.0 Beryl
                  Analysis ID:1292254
                  Start date and time:2023-08-16 17:27:05 +02:00
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:defaultwindowsinteractivecookbook.jbs
                  Sample URL:https://www.mypeoplenet.com/Peoplenet/TimeApproval.cfm?hGUID=211D595F-5133-4C5D-B237-30D4F15C806E&RequestTimeOut=120
                  Analysis system description:Windows 10 64 bit version 1909 (MS Office 2019, IE 11, Chrome 104, Firefox 88, Adobe Reader DC 21, Java 8 u291, 7-Zip)
                  Number of analysed new started processes analysed:2
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • EGA enabled
                  Analysis Mode:stream
                  Analysis stop reason:Timeout
                  Detection:CLEAN
                  Classification:clean0.win@21/78@6/76
                  • Excluded IPs from analysis (whitelisted): 216.58.206.35, 34.104.35.123, 142.250.186.78, 216.58.206.42, 142.250.181.234, 172.217.18.10, 142.250.185.138, 172.217.16.202, 216.58.212.170, 142.250.184.234, 142.250.185.202, 142.250.184.202, 142.250.74.202, 142.250.185.170, 142.250.185.74, 142.250.185.234, 172.217.23.106, 142.250.185.106, 172.217.16.138, 172.217.18.8, 216.239.32.36, 216.239.34.36
                  • Excluded domains from analysis (whitelisted): edgedl.me.gvt1.com, content-autofill.googleapis.com, login.live.com, www.googletagmanager.com, clientservices.googleapis.com, region1.google-analytics.com, www.google-analytics.com
                  • Not all processes where analyzed, report is missing behavior information
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:HTML document, ASCII text, with very long lines (10999), with no line terminators
                  Category:downloaded
                  Size (bytes):10999
                  Entropy (8bit):5.234750873838829
                  Encrypted:false
                  SSDEEP:
                  MD5:9C3C2ED02A6216A08DEECC4920375980
                  SHA1:D8CDAD9AC45405CC9C12C67704EFB77C211321CC
                  SHA-256:0EC4E0295F86B2142B8996E03D4195888843B50D1954D7E248341DA032B7EBBA
                  SHA-512:B0E53B42ED3B46713079D01D53FF005AA32CC4F24604B482BE9B80EB7CF56D42509E70F3336A1E5F8CE82675E5F54F28DB0A38A41A0A9AA80F572A36917F708A
                  Malicious:false
                  Reputation:low
                  URL:https://www.mypeoplenet.com/EmployeePortal/bundles/modernizr?v=wBEWDufH_8Md-Pbioxomt90vm6tJN2Pyy9u9zHtWsPo1
                  Preview:window.Modernizr=function(n,t,i){function a(n){c.cssText=n}function vt(n,t){return a(y.join(n+";")+(t||""))}function h(n,t){return typeof n===t}function v(n,t){return!!~(""+n).indexOf(t)}function lt(n,t){var u,r;for(u in n)if(r=n[u],!v(r,"-")&&c[r]!==i)return t=="pfx"?r:!0;return!1}function yt(n,t,r){var f,u;for(f in n)if(u=t[n[f]],u!==i)return r===!1?n[f]:h(u,"function")?u.bind(r||t):u;return!1}function f(n,t,i){var r=n.charAt(0).toUpperCase()+n.slice(1),u=(n+" "+ot.join(r+" ")+r).split(" ");return h(t,"string")||h(t,"undefined")?lt(u,t):(u=(n+" "+st.join(r+" ")+r).split(" "),yt(u,t,i))}function pt(){u.input=function(i){for(var r=0,u=i.length;r<u;r++)w[i[r]]=!!(i[r]in o);return w.list&&(w.list=!!(t.createElement("datalist")&&n.HTMLDataListElement)),w}("autocomplete autofocus list placeholder max min multiple pattern required step".split(" "));u.inputtypes=function(n){for(var u=0,r,f,e,h=n.length;u<h;u++)o.setAttribute("type",f=n[u]),r=o.type!=="text",r&&(o.value=g,o.style.cssText="pos
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:ASCII text, with very long lines (24264), with no line terminators
                  Category:downloaded
                  Size (bytes):24264
                  Entropy (8bit):5.3660856685155895
                  Encrypted:false
                  SSDEEP:
                  MD5:A46AFB4856477E7C5659A0BE9A13A6E3
                  SHA1:1183C08A048D72943E65D5318502BADAC029733B
                  SHA-256:FF1F0E23000DA742E826722F127AD8B8CE3D3AB8FE849EB7DCC1441F4F39967C
                  SHA-512:D15A998DCE42D7EE064445EDA97AD7D05311CB2357D709127E546BCDC677433E57E06F48C62798F1DA7333DEA7287B9A74A82BD480706A9177140D0EF78BEF39
                  Malicious:false
                  Reputation:low
                  URL:https://www.mypeoplenet.com/EmployeePortal/bundles/app?v=37Sma6l6UE0DVL768qr3mLsIXNgx8UyUadH6Z3oWNJM1
                  Preview:function GetUsableId(n){if(n)return n.replace(/\./g,"_").replace(/\[/g,"_").replace(/\]/g,"_").replace(/\[/g,"_").replace(/\]/g,"_").replace(/\'/g,"_").replace(/\ /g,"_")}function GetResourceTextByKey(n){return ResourceKeys[n]==null&&$.ajax({type:"POST",url:applicationLocation+"/Language/GetResourceTextByKey",data:"key="+n,async:!1,success:function(t){ResourceKeys[n]=t.Text}}),ResourceKeys[n]}function showBlockingMessage(n){$.blockUI({message:'<h4 style="padding:50px 0;font-size:24px;">'+n+"<\/h4>",timeout:1500,css:{top:($(window).height()-400)/2+"px",left:($(window).width()-400)/2+"px",padding:"5px"}})}function BlockUi(n){$.blockUI({message:'<h4 style="padding:50px 0;font-size:24px;">'+n+"<\/h4>",css:{top:($(window).height()-400)/2+"px",left:($(window).width()-400)/2+"px",padding:"5px"}})}function UnblockUi(){$.unblockUI()}function Confirm(n,t,i,r,u,f){var e=$("<div><\/div>").html(u);e.HarmonyDialog({name:"ConfirmPopup",title:f,dialogMaxWidth:"35%",alignTo:"center",draggable:!1,overfl
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:downloaded
                  Size (bytes):98636
                  Entropy (8bit):4.054442945543403
                  Encrypted:false
                  SSDEEP:
                  MD5:6111F4305E171B4FCD23668014C7CE78
                  SHA1:FFEEA315C042B72C0D0138247A9EAC216F0208EC
                  SHA-256:5071F5A163034C2D403D166D8296A9F30B6B82019EB1D2C3E1944C8FB4DE8154
                  SHA-512:5752975A4C1A8A57F9EA804708FF88125CC304288A8BD799E3FF2E5F48EEA89BBB8FFE5B09D1A6A71E53CA24C61508C976C61976528B038B07005D1BE377E31B
                  Malicious:false
                  Reputation:low
                  URL:https://www.mypeoplenet.com/EmployeePortal/scripts/typeahead.min.js
                  Preview:/*!.. * typeahead.js 0.11.1.. * https://github.com/twitter/typeahead.js.. * Copyright 2013-2015 Twitter, Inc. and other contributors; Licensed MIT.. */....(function(root, factory) {.. if (typeof define === "function" && define.amd) {.. define("bloodhound", [ "jquery" ], function(a0) {.. return root["Bloodhound"] = factory(a0);.. });.. } else if (typeof exports === "object") {.. module.exports = factory(require("jquery"));.. } else {.. root["Bloodhound"] = factory(jQuery);.. }..})(this, function($) {.. var _ = function() {.. "use strict";.. return {.. isMsie: function() {.. return /(msie|trident)/i.test(navigator.userAgent) ? navigator.userAgent.match(/(msie |rv:)(\d+(.\d+)?)/i)[2] : false;.. },.. isBlankString: function(str) {.. return !str || /^\s*$/.test(str);.. },.. escapeRegExChars: function(str) {.. return str.repla
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:ASCII text, with very long lines (2343)
                  Category:downloaded
                  Size (bytes):52916
                  Entropy (8bit):5.51283890397623
                  Encrypted:false
                  SSDEEP:
                  MD5:575B5480531DA4D14E7453E2016FE0BC
                  SHA1:E5C5F3134FE29E60B591C87EA85951F0AEA36EE1
                  SHA-256:DE36E50194320A7D3EF1ACE9BD34A875A8BD458B253C061979DD628E9BF49AFD
                  SHA-512:174E48F4FB2A7E7A0BE1E16564F9ED2D0BBCC8B4AF18CB89AD49CF42B1C3894C8F8E29CE673BC5D9BC8552F88D1D47294EE0E216402566A3F446F04ACA24857A
                  Malicious:false
                  Reputation:low
                  URL:https://www.google-analytics.com/analytics.js
                  Preview:(function(){/*.. Copyright The Closure Library Authors.. SPDX-License-Identifier: Apache-2.0.*/.var n=this||self,p=function(a,b){a=a.split(".");var c=n;a[0]in c||"undefined"==typeof c.execScript||c.execScript("var "+a[0]);for(var d;a.length&&(d=a.shift());)a.length||void 0===b?c=c[d]&&c[d]!==Object.prototype[d]?c[d]:c[d]={}:c[d]=b};function q(){for(var a=r,b={},c=0;c<a.length;++c)b[a[c]]=c;return b}function u(){var a="ABCDEFGHIJKLMNOPQRSTUVWXYZ";a+=a.toLowerCase()+"0123456789-_";return a+"."}var r,v;.function aa(a){function b(k){for(;d<a.length;){var m=a.charAt(d++),l=v[m];if(null!=l)return l;if(!/^[\s\xa0]*$/.test(m))throw Error("Unknown base64 encoding at char: "+m);}return k}r=r||u();v=v||q();for(var c="",d=0;;){var e=b(-1),f=b(0),h=b(64),g=b(64);if(64===g&&-1===e)return c;c+=String.fromCharCode(e<<2|f>>4);64!=h&&(c+=String.fromCharCode(f<<4&240|h>>2),64!=g&&(c+=String.fromCharCode(h<<6&192|g)))}};var w={},y=function(a){w.TAGGING=w.TAGGING||[];w.TAGGING[a]=!0};var ba=Array.isArray,c
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:Web Open Font Format, TrueType, length 65452, version 1.0
                  Category:downloaded
                  Size (bytes):65452
                  Entropy (8bit):7.9945249526819975
                  Encrypted:true
                  SSDEEP:
                  MD5:D95D6F5D5AB7CFEFD09651800B69BD54
                  SHA1:7D65E0227D0D7CDC1718119CD2A7DCE0638F151C
                  SHA-256:199411F659F41AACCB959BACB1B0DE30E54F244352A48C6F9894E65AE0F8A9A1
                  SHA-512:E96012D2FCD5DF03C2F7385C9EE2A2932B3909659D59E32BF3155E102EAF9EB7B4B00C5806C892ACE1B8F4BDB58630FB20868AD368C771BD8D2AAD7749B7A399
                  Malicious:false
                  Reputation:low
                  URL:https://www.mypeoplenet.com/EmployeePortal/fonts/fontawesome-webfont.woff?v=4.2.0
                  Preview:wOFF............... ........................FFTM...D........g.).GDEF...`....... .-..OS/2.......>...`..zLcmap.......G......\gasp................glyf.......6....MR .head...H...1...6.f..hhea...|.......$....hmtx......G.....$.zloca................maxp........... .V..name.......u...8L"u@post...p...2...bq..qwebf..............S..........=.......S"......"d-x.c`d``..b...`b`d`d..$Y.<...K.3.x.c`f.f........b...........|........A.+.... ...Q.H1")Q``.....M..x...JBq...x.,.Ow-.........h.";.....O >..,..h.-.UKq...h.N...c.P.&....a.c~0CDN.g....qfO...2.v.(Fn2.(.)..n......Q8..E...$$Q.KRR.....$.R...e..B.B.q$.B.9.P.5.h..a..%.m.p2!....KXb..K.....,..IK........4...2*.........>..z_....l.y..........:...........b';.`RZ.....zS..E=...'..:.J...z.+.C....a....)...6....p.j..............x...|T..0~.9w.}..-..d&.&.$....a'......... ...P.....V.ZQ..}.b.V.w.....n~.b[.U[.?[!s.?...$$.}....{.>..y..<.....#6....q..$rP.F.5...m......)..C\.i....N|J.su.qHH.&\.1.l..2....T.J..~$>.\....w$O.(W..9.w.yw<,.
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:troff or preprocessor input, ASCII text, with very long lines (305), with CRLF line terminators
                  Category:downloaded
                  Size (bytes):28323
                  Entropy (8bit):4.864705518870454
                  Encrypted:false
                  SSDEEP:
                  MD5:D747D5B755B138AF0A6D94AF2D894169
                  SHA1:EDF2017CCE9BD3DAC2D9936BC4BD909471893733
                  SHA-256:7C0A80A79D8D22F8FB6B46A81DF22BB799C7E34E5040D030BE11317CC342D612
                  SHA-512:613B8CC7E088C576B597E8F96833E6F7C2856D571814D865AF602E85ADE9C231C217594B6D8F7F21341096C53374CD6C716E399070B928D89BE2635AD4816F26
                  Malicious:false
                  Reputation:low
                  URL:https://www.mypeoplenet.com/EmployeePortal/Content/font-awesome.css
                  Preview:/*!.. * Font Awesome 4.2.0 by @davegandy - http://fontawesome.io - @fontawesome.. * License - http://fontawesome.io/license (Font: SIL OFL 1.1, CSS: MIT License).. */../* FONT PATH.. * -------------------------- */..@font-face {.. font-family: 'FontAwesome';.. src: url('../fonts/fontawesome-webfont.eot?v=4.2.0');.. src: url('../fonts/fontawesome-webfont.eot?#iefix&v=4.2.0') format('embedded-opentype'), url('../fonts/fontawesome-webfont.woff?v=4.2.0') format('woff'), url('../fonts/fontawesome-webfont.ttf?v=4.2.0') format('truetype'), url('../fonts/fontawesome-webfont.svg?v=4.2.0#fontawesomeregular') format('svg');.. font-weight: normal;.. font-style: normal;..}...fa {.. display: inline-block;.. font: normal normal normal 14px/1 FontAwesome;.. font-size: inherit;.. text-rendering: auto;.. -webkit-font-smoothing: antialiased;.. -moz-osx-font-smoothing: grayscale;..}../* makes the font 33% larger relative to the icon container */...fa-lg {.. font-size: 1.33333333em;.. line-h
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:ASCII text, with very long lines (1436), with CRLF line terminators
                  Category:downloaded
                  Size (bytes):34497
                  Entropy (8bit):5.1220283579602395
                  Encrypted:false
                  SSDEEP:
                  MD5:A0729FABA9CB56871A4AAA3D950270A1
                  SHA1:78743FDE21A54C4845B92D46DB0473AD03F0B494
                  SHA-256:53B390C4767C4A8431D358AF0A0DB566F845EC978026EBEF154FD17DDAA495DC
                  SHA-512:C80192FB72ACD25D9A3BA50460AE507DE9FA6C7043D45AAB122999F341332FFC253A6D58CA4680643DD026D9BA00AB9D478AC22B9330481FA09EF2B270838036
                  Malicious:false
                  Reputation:low
                  URL:https://www.mypeoplenet.com/EmployeePortal/Content/css/redmond/jquery-ui-1.8.6.custom.css
                  Preview:/*.. * jQuery UI CSS Framework 1.8.6.. *.. * Copyright 2010, AUTHORS.txt (http://jqueryui.com/about).. * Dual licensed under the MIT or GPL Version 2 licenses... * http://jquery.org/license.. *.. * http://docs.jquery.com/UI/Theming/API.. */..../* Layout helpers..----------------------------------*/...ui-helper-hidden { display: none; }...ui-helper-hidden-accessible { position: absolute; left: -99999999px; }...ui-helper-reset { margin: 0; padding: 0; border: 0; outline: 0; line-height: 1.3; text-decoration: none; font-size: 100%; list-style: none; }...ui-helper-clearfix:after { content: "."; display: block; height: 0; clear: both; visibility: hidden; }...ui-helper-clearfix { display: inline-block; }../* required comment for clearfix to work in Opera \*/..* html .ui-helper-clearfix { height:1%; }...ui-helper-clearfix { display:block; }../* end clearfix */...ui-helper-zfix { width: 100%; height: 100%; top: 0; left: 0; position: absolute; opacity: 0; filter:Alpha(Opacity=0); }....../* Inte
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:GIF image data, version 89a, 100 x 100
                  Category:downloaded
                  Size (bytes):11613
                  Entropy (8bit):7.845742363780595
                  Encrypted:false
                  SSDEEP:
                  MD5:9C9F1B04B4498F116FE245645020DED7
                  SHA1:6EECE828628AF354C9C522F8D6D375E9BB946C36
                  SHA-256:374768D74A7A4A83AB3B327EA59EBCBC19EC7A5A7C34B4BFC8F8E8E97EE1CA6C
                  SHA-512:0AD5DF83B761FBE093EDA08DFD7A279416F87EE10A8567EB3431DA174503DBF4CFEBC3CB6B6E0BB06DD76A905E05E53AFB85CD86E9010B9E7560B45F310A7154
                  Malicious:false
                  Reputation:low
                  URL:https://www.mypeoplenet.com/EmployeePortal/Content/LessCss/Images/pageLoader.gif
                  Preview:GIF89ad.d....................|................|.................|.........................|.....................................|..|..............................................................................|.....|....................|.....|.............|.............................|..|.......|.....................|....................|..............|.............|...........|..........................................................................................|.....|.....................................................................................................................................|..................|........................................................................!..NETSCAPE2.0.....!..XMP DataXMP<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.3-c011 66.145661, 2012/02/06-14:56:27 "> <rdf:RDF xmlns:rdf="ht
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:Unicode text, UTF-8 text, with very long lines (17704), with no line terminators
                  Category:downloaded
                  Size (bytes):17738
                  Entropy (8bit):5.343106490118252
                  Encrypted:false
                  SSDEEP:
                  MD5:89C965C5B026099DD28BCFA99D7D34BF
                  SHA1:08AC32328F9E1F3E29268F9E88CFD1A664658401
                  SHA-256:03022D83B1AE69C4B566A7B5D603F085BFCD781021A854A1F5E6E27964E3989A
                  SHA-512:83A5A79E6161F7379801A371867735FFD1EE7E9B7FCE9340F46A9422B2A6AAE49E9F617187094F4853641323A1BBB6279BFB721222227984AD370E6B807A3FF6
                  Malicious:false
                  Reputation:low
                  URL:https://www.mypeoplenet.com/EmployeePortal/bundles/globalization?v=f2E3kC4xVlImPxEArdgkRTEb4ch_Y8SvPibT5jTdFQ81
                  Preview:(function(n,t){var i,g,nt,tt,it,u,h,v,c,rt,y,f,r,p,e,l,w,b,ut,k,o,a,d,s;i=function(n){return new i.prototype.init(n)};typeof require!="undefined"&&typeof exports!="undefined"&&typeof module!="undefined"?module.exports=i:n.Globalize=i;i.cultures={};i.prototype={constructor:i,init:function(n){return this.cultures=i.cultures,this.cultureSelector=n,this}};i.prototype.init.prototype=i.prototype;i.cultures["default"]={name:"en",englishName:"English",nativeName:"English",isRTL:!1,language:"en",numberFormat:{pattern:["-n"],decimals:2,",":",",".":".",groupSizes:[3],"+":"+","-":"-",NaN:"NaN",negativeInfinity:"-Infinity",positiveInfinity:"Infinity",percent:{pattern:["-n %","n %"],decimals:2,groupSizes:[3],",":",",".":".",symbol:"%"},currency:{pattern:["($n)","$n"],decimals:2,groupSizes:[3],",":",",".":".",symbol:"$"}},calendars:{standard:{name:"Gregorian_USEnglish","/":"/",":":":",firstDay:0,days:{names:["Sunday","Monday","Tuesday","Wednesday","Thursday","Friday","Saturday"],namesAbbr:["Sun","Mon
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (65533), with no line terminators
                  Category:downloaded
                  Size (bytes):121824
                  Entropy (8bit):5.239195581042081
                  Encrypted:false
                  SSDEEP:
                  MD5:71D61631D008F86EC0E1ECF07320A3E6
                  SHA1:0BFE7D9EFC5F98E0385C3A84E4C6AF8BF56B1446
                  SHA-256:5C1DFD5A4662E15828B774F4170582BA7BBBE73A1D413F8E6B0F751FA15961D6
                  SHA-512:D4097435DFEE1402737E12894AF2B53341B9196A0682E2408FDEF63A96A6EB48C667920E36B79B5521097F7D55094F2466947AB79924B67B0B4985672A7B1905
                  Malicious:false
                  Reputation:low
                  URL:https://www.mypeoplenet.com/EmployeePortal/Content/LessCss/Harmony/approval.min.css
                  Preview:.html,body,div,span,applet,object,iframe,h1,h2,h3,h4,h5,h6,blockquote,pre,a,abbr,acronym,address,big,cite,code,del,dfn,em,img,ins,kbd,q,s,samp,small,strike,strong,sub,sup,tt,var,b,u,i,center,dl,dt,dd,ol,ul,li,fieldset,form,label,legend,table,caption,tbody,tfoot,thead,tr,th,td,article,aside,canvas,details,embed,figure,figcaption,footer,header,hgroup,menu,nav,output,ruby,section,summary,time,mark,audio,video{margin:0;padding:0;border:0;font-family:Segoe UI,Helvetica,Arial,sans-serif;font-size:100%;text-decoration:none}article,aside,details,figcaption,figure,footer,header,hgroup,menu,nav,section{display:block}body{line-height:1}blockquote,q{quotes:none}blockquote:before,blockquote:after,q:before,q:after{content:'';content:none}table{border-collapse:collapse;border-spacing:0}h1,h2,h3,h4,h5,h6{color:#4d4d4d;font-weight:400}h1 a,h2 a,h3 a,h4 a,h5 a,h6 a{font-weight:inherit}h1{font-size:46px;line-height:50px;margin-bottom:14px}h2{margin-bottom:10px}h3{font-size:18px;margin-bottom:8px}h4{fon
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (7085), with CRLF line terminators
                  Category:downloaded
                  Size (bytes):7203
                  Entropy (8bit):5.228802210688077
                  Encrypted:false
                  SSDEEP:
                  MD5:42B363B1C67956611EED337629BF8CA8
                  SHA1:54AB4AD8198D4CCCECD3ECA9F1E9BED3ED669E3B
                  SHA-256:B3DD0087573D2E737DB5EF7BB7F0C27C17E5831AAC5FD19DF39F104D1580D7D0
                  SHA-512:3F924F6F1BAFF22379E041095D1BB3E195F812BAEE1F12F715E26FCAEE28E3B7159B8B0E0530D476571F9EA70605892D7DAEDF13D86AFB31877627EC9637E1A8
                  Malicious:false
                  Reputation:low
                  URL:https://www.mypeoplenet.com/EmployeePortal/scripts/jquery-migrate-1.2.1.min.js
                  Preview:./*! jQuery Migrate v1.2.1 | (c) 2005, 2013 jQuery Foundation, Inc. and other contributors | jquery.org/license */..jQuery.migrateMute===void 0&&(jQuery.migrateMute=!0),function(e,t,n){function r(n){var r=t.console;i[n]||(i[n]=!0,e.migrateWarnings.push(n),r&&r.warn&&!e.migrateMute&&(r.warn("JQMIGRATE: "+n),e.migrateTrace&&r.trace&&r.trace()))}function a(t,a,i,o){if(Object.defineProperty)try{return Object.defineProperty(t,a,{configurable:!0,enumerable:!0,get:function(){return r(o),i},set:function(e){r(o),i=e}}),n}catch(s){}e._definePropertyBroken=!0,t[a]=i}var i={};e.migrateWarnings=[],!e.migrateMute&&t.console&&t.console.log&&t.console.log("JQMIGRATE: Logging is active"),e.migrateTrace===n&&(e.migrateTrace=!0),e.migrateReset=function(){i={},e.migrateWarnings.length=0},"BackCompat"===document.compatMode&&r("jQuery is not compatible with Quirks Mode");var o=e("<input/>",{size:1}).attr("size")&&e.attrFn,s=e.attr,u=e.attrHooks.value&&e.attrHooks.value.get||function(){return null},c=e.att
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                  Category:dropped
                  Size (bytes):506
                  Entropy (8bit):7.428657394688475
                  Encrypted:false
                  SSDEEP:
                  MD5:1BBBA9AF4534465119CE650EFF0DC568
                  SHA1:9F33E767E970A32EEB4717F0D5D7FC0AA7C5D502
                  SHA-256:9EE150F3B5615B8870689E385E5D584AFFF8A362DDA54EC4923BF0C2BB18852E
                  SHA-512:FE6A4EDFA9C84403584E9874C7435ADC433F8C29052F5ECE91AE5CF62A7EB06E15D78F70129EE360B0906F1216FFAC2266F273316279CF460D54DC31E8045AAB
                  Malicious:false
                  Reputation:low
                  Preview:.PNG........IHDR................a....pHYs..........o.d....IDAT8O.S=HBQ...{aE.BS.9.4.P.\4..`..Yi..V[A.4....f.sAC..D?SD..5Dc.D...^..."I?|.{.y.;.;...F....,.Z.._.H.D...Is.ipZ..i.z1U%4,......VM......*W`7..QU..{.S.2.6........P..-........$Bx......hc.9.9.r6$.+v!..U3.6L......s..#......o.>...R........u....*.{.n..(W.._^,...0.1&..>..Q9.......u.k2Z..}.yN...ZD......O..1.....<.w...I..e.p.M...j..gc..*T.$...../.SF...a!C...~."?P.. .h.b..H....~|.. ...'....sM.Q...C..nS....).I.....A.....*.t.y......IEND.B`.
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:ASCII text, with very long lines (10672), with no line terminators
                  Category:downloaded
                  Size (bytes):10672
                  Entropy (8bit):5.336488731243419
                  Encrypted:false
                  SSDEEP:
                  MD5:AB8344A71BC5175430E8EE987D72A190
                  SHA1:9DEAE8DA1C22505574F326FA64F29BD6677BB6B8
                  SHA-256:BC5728E6A9E7DB693ABD2BE20D828BD7E474054D54AE77552A84ED45AE8276EA
                  SHA-512:F65BA4AB16E3FC839326BC122D663B7BF4AA81F7823F2C6E7A4F33F280FAA87382C1BC5345ADC5CF980B17D781603223918677E4ACB6FF96D1FC6EF81B317D74
                  Malicious:false
                  Reputation:low
                  URL:https://www.mypeoplenet.com/EmployeePortal/bundles/init?v=1Q4AVyBb-Td8yGzy40JIfhvrklL7W6IwVeRZCWg2Ltk1
                  Preview:function mainLayout(){$("#watermark").css({background:"#F8F8F8"})}function globalScripts(n){buildHelpStatus(n)}function setInitialTimout(){window.setTimeout("checkTimeout()",9e5)}function checkTimeout(){var n=function(){window.location=applicationLocation+"/signin/timeout"},t=window.setTimeout(n,12e4),i=GetResourceTextByKey("PeopleNet.Web.Resources.CommonTerms.SessionIsExpiring"),r=function(){clearTimeout(t);setInitialTimout();$.ajax({type:"POST",async:!0,contentType:"application/json; charset=utf-8",url:applicationLocation+"/signin/heartbeat",success:function(){},error:function(){},dataType:"json"})},u=function(){window.location=applicationLocation+"/signin/signout"};Confirm(GetResourceTextByKey("PeopleNet.Web.Resources.Buttons.Yes"),r,GetResourceTextByKey("PeopleNet.Web.Resources.Buttons.No"),u,i,GetResourceTextByKey("PeopleNet.Web.Resources.CommonTerms.Confirm"))}function buildHelpStatus(n){$(document).on("click","#statusLegend",function(){var e=$("#StatusLegend"),f,i;e.show();var h
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (555), with CRLF line terminators
                  Category:downloaded
                  Size (bytes):188192
                  Entropy (8bit):4.975695305152069
                  Encrypted:false
                  SSDEEP:
                  MD5:CBD8CD340137DC5AF7A3CC839896F2FE
                  SHA1:CDBA7493D6D00EABA0F07657582C9C0B896CEE13
                  SHA-256:A98707BBE45272683B8DF35CA113BB9E670C1F99B2AF73D589C8684A165311D9
                  SHA-512:8F76EB4B2B48740BCE1B94094CA4D331EA350437B50BE9A260B3189827C0C6DC51FA273CB7034ED13B1AACDE05C25B30E01382D956CFA8F8F7AEDA3B01258880
                  Malicious:false
                  Reputation:low
                  URL:https://www.mypeoplenet.com/EmployeePortal/Content/LessCss/Bootstrap/bootstrap-wrapper.css
                  Preview:..modal-open {.. overflow: hidden;..}...modal {.. display: none;.. overflow: hidden;.. position: fixed;.. top: 0;.. right: 0;.. bottom: 0;.. left: 0;.. z-index: 1050;.. -webkit-overflow-scrolling: touch;.. outline: 0;..}...modal.fade .modal-dialog {.. -webkit-transform: translate(0, -25%);.. -ms-transform: translate(0, -25%);.. -o-transform: translate(0, -25%);.. transform: translate(0, -25%);.. -webkit-transition: -webkit-transform 0.3s ease-out;.. -moz-transition: -moz-transform 0.3s ease-out;.. -o-transition: -o-transform 0.3s ease-out;.. transition: transform 0.3s ease-out;..}...modal.in .modal-dialog {.. -webkit-transform: translate(0, 0);.. -ms-transform: translate(0, 0);.. -o-transform: translate(0, 0);.. transform: translate(0, 0);..}...modal-open .modal {.. overflow-x: hidden;.. overflow-y: auto;..}...modal-dialog {.. position: relative;.. width: auto;.. margin: 10px;..}...modal-content {.. position: relative;.. background-color: #ffffff;.. bor
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:ASCII text, with CRLF, LF line terminators
                  Category:downloaded
                  Size (bytes):1192987
                  Entropy (8bit):4.2847731742653625
                  Encrypted:false
                  SSDEEP:
                  MD5:97032FB9484302ED21E9E4F6AAF36C5B
                  SHA1:28968C192BADD927E01036CDC13C545528D6C368
                  SHA-256:C1EAC13FA02289516CC88B84436092DE46C41105DC7F60191B956572F611860E
                  SHA-512:F6A4D919EE0D72AE35BD795922050ED1558EE948DFE9015F280F320D2D2A0881E713D26511ADCF42929E49C118AFFBF6176ED2AB51F4A73AC517B9840731BBA2
                  Malicious:false
                  Reputation:low
                  URL:https://www.mypeoplenet.com/EmployeePortal/Scripts/angular.js
                  Preview:// Avoid `console` errors in browsers that lack a console...(function () {.. var method;.. var noop = function () { };.. var methods = [.. 'assert', 'clear', 'count', 'debug', 'dir', 'dirxml', 'error',.. 'exception', 'group', 'groupCollapsed', 'groupEnd', 'info', 'log',.. 'markTimeline', 'profile', 'profileEnd', 'table', 'time', 'timeEnd',.. 'timeStamp', 'trace', 'warn'.. ];.. var length = methods.length;.. var console = (window.console = window.console || {});.... while (length--) {.. method = methods[length];.... // Only stub undefined methods... if (!console[method]) {.. console[method] = noop;.. }.. }..}());..///*IE8 toISOString hack */..//if (!Date.prototype.toISOString) {..// Date.prototype.toISOString = function () {..// function pad(n) { return n < 10 ? '0' + n : n }..// return this.getUTCFullYear() + '-'..// + pad(this.getUTCMonth() + 1) + '-'..// +
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:Unicode text, UTF-8 text, with very long lines (65533), with no line terminators
                  Category:downloaded
                  Size (bytes):319791
                  Entropy (8bit):5.213335309972184
                  Encrypted:false
                  SSDEEP:
                  MD5:D7023F81870C0FA6D40B210007E12B0C
                  SHA1:1BC1EC8AAB27083E0975E3F61FB43DD0C8EEE986
                  SHA-256:CB641020A5AE70B07E6261E9EF2DD3F222E75529ABD14054C920D274D4FB0D5A
                  SHA-512:2D7293E7D1A35658AA2F5CC10ED30409250002FF3AF67EC6FF0D25CDCF1EE96C2EA0DC7F882DAF9904D4EF34AD2F30943D228B998FB3AA17575791D81B8FC0C7
                  Malicious:false
                  Reputation:low
                  URL:https://www.mypeoplenet.com/EmployeePortal/bundles/jquery?v=7LZ47vfCsSVtCLhO6ygf6VjvNdX59hYnRtmLu7Nrw4w1
                  Preview:(function(n,t){function dt(n){var t=n.length,r=i.type(n);return i.isWindow(n)?!1:1===n.nodeType&&t?!0:"array"===r||"function"!==r&&(0===t||"number"==typeof t&&t>0&&t-1 in n)}function kf(n){var t=gt[n]={};return i.each(n.match(s)||[],function(n,i){t[i]=!0}),t}function ir(n,r,u,f){if(i.acceptData(n)){var s,h,c=i.expando,a="string"==typeof r,l=n.nodeType,o=l?i.cache:n,e=l?n[c]:n[c]&&c;if(e&&o[e]&&(f||o[e].data)||!a||u!==t)return e||(l?n[c]=e=b.pop()||i.guid++:e=c),o[e]||(o[e]={},l||(o[e].toJSON=i.noop)),("object"==typeof r||"function"==typeof r)&&(f?o[e]=i.extend(o[e],r):o[e].data=i.extend(o[e].data,r)),s=o[e],f||(s.data||(s.data={}),s=s.data),u!==t&&(s[i.camelCase(r)]=u),a?(h=s[r],null==h&&(h=s[i.camelCase(r)])):h=s,h}}function rr(n,t,r){if(i.acceptData(n)){var o,h,e,s=n.nodeType,u=s?i.cache:n,f=s?n[i.expando]:i.expando;if(u[f]){if(t&&(e=r?u[f]:u[f].data)){for(i.isArray(t)?t=t.concat(i.map(t,i.camelCase)):(t in e)?t=[t]:(t=i.camelCase(t),t=(t in e)?[t]:t.split(" ")),o=0,h=t.length;h>o;o+
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:ASCII text, with very long lines (531), with CRLF line terminators
                  Category:downloaded
                  Size (bytes):2594
                  Entropy (8bit):5.168145206249638
                  Encrypted:false
                  SSDEEP:
                  MD5:1C117B8D0943928E193D03E2C8B3954D
                  SHA1:C9C52D78EA3907B62DE87F31E314F51C17C1B822
                  SHA-256:93FB849D72ACD96FE1F3874DA898902E7CD561EF6EE90E513310BCE5B37F79F7
                  SHA-512:EFBD4ABE1609DC8E0E9B32DC7440EE86C13F604064297E5EEBA94EFDD8216BE39EF6F7879ADA50BF1920661FB021227CD3F30913174E6F4FB549C02E6F07E36C
                  Malicious:false
                  Reputation:low
                  URL:https://www.mypeoplenet.com/EmployeePortal/scripts/plugins/jquery.mb.browser.min.js
                  Preview:/*.. * ******************************************************************************.. * jquery.mb.components.. * file: jquery.mb.browser.min.js.. *.. * Copyright (c) 2001-2013. Matteo Bicocchi (Pupunzi);.. * Open lab srl, Firenze - Italy.. * email: matteo@open-lab.com.. * site: .http://pupunzi.com.. * blog:.http://pupunzi.open-lab.com.. * .http://open-lab.com.. *.. * Licences: MIT, GPL.. * http://www.opensource.org/licenses/mit-license.php.. * http://www.gnu.org/licenses/gpl.html.. *.. * last modified: 17/01/13 0.12.. * *****************************************************************************.. */..(function(){if(!jQuery.browser){jQuery.browser={};jQuery.browser.mozilla=!1;jQuery.browser.webkit=!1;jQuery.browser.opera=!1;jQuery.browser.msie=!1;var a=navigator.userAgent;jQuery.browser.name=navigator.appName;jQuery.browser.fullVersion=""+parseFloat(navigator.appVersion);jQuery.browser.majorVersion=parseInt(navigator.appVersion,10);var c,b;if(-1!=(b=a.indexOf("Opera"))){
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:ASCII text, with very long lines (1110), with CRLF line terminators
                  Category:downloaded
                  Size (bytes):194425
                  Entropy (8bit):4.843389585135604
                  Encrypted:false
                  SSDEEP:
                  MD5:85CE9F6E852A83A8994D3E4EDC1F572C
                  SHA1:2EF3B0DF94CF5F82D9E17E58111E598BFF69A192
                  SHA-256:32687E960D7DF507E391AE56B19169741E45998B415CFCC768826332939752C9
                  SHA-512:28BFBB59D856352D0162E2252186EA71540D3D21CA46A4FCC17A68971D6CEE2596D3BCE8AC94EF6A68F082910D58565D37ED7627C56107C42010B3B909DCEE7A
                  Malicious:false
                  Reputation:low
                  URL:https://www.mypeoplenet.com/EmployeePortal/Scripts/angular-ui/ui-bootstrap-tpls.js
                  Preview:/*.. * angular-ui-bootstrap.. * http://angular-ui.github.io/bootstrap/.... * Version: 0.13.3 - 2015-08-09.. * License: MIT.. */..angular.module("ui.bootstrap", ["ui.bootstrap.tpls", "ui.bootstrap.collapse","ui.bootstrap.accordion","ui.bootstrap.alert","ui.bootstrap.bindHtml","ui.bootstrap.buttons","ui.bootstrap.carousel","ui.bootstrap.dateparser","ui.bootstrap.position","ui.bootstrap.datepicker","ui.bootstrap.dropdown","ui.bootstrap.modal","ui.bootstrap.pagination","ui.bootstrap.tooltip","ui.bootstrap.popover","ui.bootstrap.progressbar","ui.bootstrap.rating","ui.bootstrap.tabs","ui.bootstrap.timepicker","ui.bootstrap.transition","ui.bootstrap.typeahead"]);..angular.module("ui.bootstrap.tpls", ["template/accordion/accordion-group.html","template/accordion/accordion.html","template/alert/alert.html","template/carousel/carousel.html","template/carousel/slide.html","template/datepicker/datepicker.html","template/datepicker/day.html","template/datepicker/month.html","template/datepicker/pop
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:PNG image data, 81 x 18, 8-bit/color RGBA, non-interlaced
                  Category:downloaded
                  Size (bytes):1609
                  Entropy (8bit):7.796929920646953
                  Encrypted:false
                  SSDEEP:
                  MD5:05EA7E454C9AB9CD16BDDDE30B47C070
                  SHA1:012F1EB64FDC78FC3B6B594990D61FE938AAF8FF
                  SHA-256:A4EF45D57CE7C100D11808BCABF5B81A0C416083BAF403440EBA6A6057E3297B
                  SHA-512:D1F2FB8C0F594D8E9306FF6002AD65801035FBD5181325FFA9D08492929CC953EE13A91482774D3FEC9F9445DA646D56602B728310A91A24B431E7CE76B6DBAF
                  Malicious:false
                  Reputation:low
                  URL:https://www.mypeoplenet.com/EmployeePortal/Content/LessCss/Images/fullLogoIcon.png
                  Preview:.PNG........IHDR...Q.........#C2.....sRGB.........gAMA......a.....pHYs..........o.d....IDATXG.XoH]e...s..d...`.5......3./}..5.6...>....%sH...F_R...:4..h.'......P.k.k...k........{<W.*......{......\...].....%..+..;u.....e...U.5=Y.(..O.%.....D....\5..s.R.....y%vN.K..3Y....}E2..."HV.......f.|q..)..^..J.....C.:`A.|.]t..P.L..Kv.}.C..3...+K...__..........<....zm7H<....Q.:....Z.s[\...n..7..f.I.v.8I'.|...~.m@5.v...X.^!....K...(.o.>&....._>$..b..*...E...C.!-$..9<$...A.J..s..<...R.S- u.q..kP..a(u=...~..6.h...P....;./Q^\$.?....o.x.Sr......G*JJ%.6k.....8n#.0kU.PtG..>.>kZ...~>.............j.3..XH........<....59...9........}.o......=.r.I..^.....u%n.#Bb.\.....g.t.X......1-......3<<TK..zc..5Aa&..Pb.P?..>.?.C.j|.Y.s.}{..X.......`.g...*|....L.i...?..M......_.T..0...s......^}R...#.D.....]3...g.q.'%4L"....}E....@.._....D....e....|....6.M..Zm...W....3..o.h;...R(. H.Y.....=...>Df......r.<|.o15A.....9.(.....Q....~.A......d.B.V..750...@.........h*u.m\.....R..#.`&..-:g.^.
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:ASCII text, with very long lines (5857)
                  Category:downloaded
                  Size (bytes):224972
                  Entropy (8bit):5.5750996094908905
                  Encrypted:false
                  SSDEEP:
                  MD5:6E623DAFC6BFED5714C969F744E0C8C1
                  SHA1:00CC2EC99242A13CE2D7AC42EBF3FA9487583E51
                  SHA-256:584D14F4E48718F861686BB11EC83628AA22CA7ABC12638EF3EB2D8C502A3595
                  SHA-512:0D2BC7BA533ED70A88DFD0EEC220FB1099EBD03A59194A03BADE9A5FA8BEA6A7A169A8F6D3DBB9896E68FCD7C16D3C9399B44BEFE96DC5CA01EB8AFDA1481065
                  Malicious:false
                  Reputation:low
                  URL:https://www.googletagmanager.com/gtag/js?id=G-33C4LX9LQ6&cx=c&_slc=1
                  Preview:.// Copyright 2012 Google Inc. All rights reserved.. .(function(){..var data = {."resource": {. "version":"2",. . "macros":[{"function":"__e"},{"vtp_signal":0,"function":"__c","vtp_value":0},{"function":"__c","vtp_value":"google.co.uk"},{"function":"__c","vtp_value":0},{"vtp_signal":0,"function":"__c","vtp_value":0},{"function":"__c","vtp_value":"google.co.uk"},{"function":"__c","vtp_value":0}],. "tags":[{"function":"__ogt_ga_send","priority":7,"vtp_value":true,"tag_id":16},{"function":"__ogt_referral_exclusion","priority":7,"vtp_includeConditions":["list","mypeoplenet\\.com"],"tag_id":18},{"function":"__ogt_session_timeout","priority":7,"vtp_sessionMinutes":30,"vtp_sessionHours":0,"tag_id":19},{"function":"__ogt_1p_data_v2","priority":7,"vtp_isAutoEnabled":true,"vtp_autoCollectExclusionSelectors":["list",["map","exclusionSelector",""]],"vtp_isEnabled":true,"vtp_autoEmailEnabled":true,"vtp_autoPhoneEnabled":false,"vtp_autoAddressEnabled":false,"vtp_isAutoCollectPiiEnabledFlag":fals
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:ASCII text, with very long lines (65536), with no line terminators
                  Category:downloaded
                  Size (bytes):201665
                  Entropy (8bit):5.299547199766962
                  Encrypted:false
                  SSDEEP:
                  MD5:36A1FDA597DA5947C35D7A0216ECF420
                  SHA1:71306B5F6A3F8D2A921046EAA455F99A3565FAAA
                  SHA-256:B22FDFC8680E23C6E1B4878F319B5B2686F3BDA4EC141389921137C61EF2A6A3
                  SHA-512:C63B133571821C0761D21A1970EF6CFC5DD592400741D94BE3260DD5C7B5CEB5E5EB3820E131E11E807FDA5D85BD5DE6B52CFA5CE22E78E43C9EB311303A3C5F
                  Malicious:false
                  Reputation:low
                  URL:https://www.mypeoplenet.com/EmployeePortal/bundles/extlibs?v=VBWraexXAoOUBuFVUmGT8tn9E_SzxRF4Ri3jUwOQQmY1
                  Preview:var JSON;JSON||(JSON={}),function(){"use strict";function i(n){return n<10?"0"+n:n}function o(n){return e.lastIndex=0,e.test(n)?'"'+n.replace(e,function(n){var t=s[n];return typeof t=="string"?t:"\\u"+("0000"+n.charCodeAt(0).toString(16)).slice(-4)})+'"':'"'+n+'"'}function u(i,f){var s,l,h,a,v=n,c,e=f[i];e&&typeof e=="object"&&typeof e.toJSON=="function"&&(e=e.toJSON(i));typeof t=="function"&&(e=t.call(f,i,e));switch(typeof e){case"string":return o(e);case"number":return isFinite(e)?String(e):"null";case"boolean":case"null":return String(e);case"object":if(!e)return"null";if(n+=r,c=[],Object.prototype.toString.apply(e)==="[object Array]"){for(a=e.length,s=0;s<a;s+=1)c[s]=u(s,e)||"null";return h=c.length===0?"[]":n?"[\n"+n+c.join(",\n"+n)+"\n"+v+"]":"["+c.join(",")+"]",n=v,h}if(t&&typeof t=="object")for(a=t.length,s=0;s<a;s+=1)typeof t[s]=="string"&&(l=t[s],h=u(l,e),h&&c.push(o(l)+(n?": ":":")+h));else for(l in e)Object.prototype.hasOwnProperty.call(e,l)&&(h=u(l,e),h&&c.push(o(l)+(n?":
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:PNG image data, 19 x 21, 4-bit colormap, non-interlaced
                  Category:dropped
                  Size (bytes):315
                  Entropy (8bit):6.23525950498827
                  Encrypted:false
                  SSDEEP:
                  MD5:969EF4CF9CC9F6FE286E3D7348EA6916
                  SHA1:312E77ED26943BFE301167FF5A1DE1180E4BC09C
                  SHA-256:4A5F614D199A2A81FA1B4584F6F57C659B7DB818304E512D5E3BB30817A0A6B1
                  SHA-512:8E9FDCE3EC566FC3F51B759CF808206BF2718442ACF5D79C3E29238A4FA888F5AFFFB1B74195184D1F6C3D750708A7EE781AB1436AE42469A5F9E2E584BD769D
                  Malicious:false
                  Reputation:low
                  Preview:.PNG........IHDR.............V'......sBIT.....O.....PLTE...fffffffffffffff........S.....tRNS.."3DU.....~....pHYs...........~.....tEXtCreation Time.02/04/10.;P_....tEXtSoftware.Macromedia Fireworks 8.h.x...YIDAT..c` .0...YJ.P.......XP....,,..............i@a%..cW.`ZZ....k8......P..LK+/`H...2..'`,Qu.......IEND.B`.
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:PNG image data, 123 x 60, 8-bit colormap, non-interlaced
                  Category:downloaded
                  Size (bytes):2738
                  Entropy (8bit):7.619867663705176
                  Encrypted:false
                  SSDEEP:
                  MD5:FE697CA0BCE88BD78FCA4E288742C9F8
                  SHA1:DD763BDE3B857B7984E5E44B6F83C1B66F9BE0D0
                  SHA-256:E63D67ACB138A114D521C88721AA0B4772EE0CE252B8618AEE19FFCF6BD4FF57
                  SHA-512:CFE24AFAEB92FE20469C338E923A6B88323C8066DBAA8AB8605F18AB384EE52A163F386E9C558FC7E6255E0ED43F82E03C6BD3DF8BE47D3F8CD52B2CB1397FD4
                  Malicious:false
                  Reputation:low
                  URL:https://www.mypeoplenet.com/Images/LocumTenens_Logo.png
                  Preview:.PNG........IHDR...{...<.....qD5.....tEXtSoftware.Adobe ImageReadyq.e<...siTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c140 79.160451, 2017/05/06-01:08:21 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmpMM:OriginalDocumentID="xmp.did:626b0ed0-ee44-4667-ad19-8b74bb8ca35c" xmpMM:DocumentID="xmp.did:67F8B27A26EC11E9A61CDA22CB93D12F" xmpMM:InstanceID="xmp.iid:67F8B27926EC11E9A61CDA22CB93D12F" xmp:CreatorTool="Adobe Photoshop CC (Macintosh)"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:626b0ed0-ee44-4667-ad19-8b74bb8ca35c" stRef:documentID="xmp.did:626b0ed0-ee44-4667-ad19-8b74bb8ca35c"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>..R.....PLTE............S{.I........
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:ASCII text, with very long lines (65536), with no line terminators
                  Category:downloaded
                  Size (bytes):71030
                  Entropy (8bit):5.269015648725902
                  Encrypted:false
                  SSDEEP:
                  MD5:B451CA82EE0FA5A0B0D92748C7367A84
                  SHA1:C0402F3B906CF7384BB74A2FFBD93EE9635FFD7D
                  SHA-256:31B262E476726A8A47470FE0163933548528400BB1CC1F6455ACC1B68648A6CF
                  SHA-512:32F983C819E39E67E209E0ED9A0C5EC817D21274041D9FE8C3081B0DF940AE273C5F46F3F2D98F56136CEF89D001D83D0987DA68611883E8FCFA434771DD9C95
                  Malicious:false
                  Reputation:low
                  URL:https://www.mypeoplenet.com/EmployeePortal/bundles/timeApproval?v=n-nA2YCN9EKpngjxdGZtpa-WvKHPh98YP7QfHVYxsEo1
                  Preview:function GetDecimal(n){return n==undefined?0:n.substring?Globalize.parseFloat(n):n}var convertTime,udfDataTypeEnum,vm;ko.bindingHandlers.numericInput={init:function(n,t,i){$(n).change(function(){var n=this.value,r,u;n.trim()==""&&(n=0);!isNaN(parseFloat(n))&&ko.isObservable(t())?(r=ko.utils.unwrapObservable(i().precision)||ko.bindingHandlers.numericText.defaultPrecision,u=parseFloat(GetDecimal(n)).toFixed(r),t()(u)):t()(0)})},update:function(n,t,i,r,u){var e=ko.utils.unwrapObservable(t()),s=i(),f=parseFloat(e),o=isNaN(f)?0:f.toFixed(2);ko.bindingHandlers.value.update(n,function(){return Globalize.format(parseFloat(o),"n")});u.$root.isHoursPerWeek&&r.assignmentNumber!==null&&u.$root.updateWeeklyAssignmentStatus(r)},defaultPrecision:2};ko.bindingHandlers.numericText={update:function(n,t,i){var r=ko.utils.unwrapObservable(t()),f=ko.utils.unwrapObservable(i().precision)||ko.bindingHandlers.numericText.defaultPrecision,u=parseFloat(r),e=isNaN(u)?r:u.toFixed(f);ko.bindingHandlers.text.update
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:PNG image data, 18 x 18, 8-bit/color RGBA, non-interlaced
                  Category:downloaded
                  Size (bytes):1257
                  Entropy (8bit):6.785226768135577
                  Encrypted:false
                  SSDEEP:
                  MD5:F7806B497D33B83F0053BD075C6F412A
                  SHA1:440ADD592CCFF4554BDF4588FBB7D8A6E1FB27B2
                  SHA-256:1465B7C4674B31E2FD2DD370DBE07E60BE5D1C861D7020C2FE750E9BABFFFC6E
                  SHA-512:3532DB61315EC744A937EBCE215B00CB0DD1B4ADF71C18B2C852EC0BDDAF2FAD12DF5FC7DC530C38BBA64BEEF6879526FF205F522FBE8E8DE09969077B76A96F
                  Malicious:false
                  Reputation:low
                  URL:https://www.mypeoplenet.com/EmployeePortal/content/images/icn-pen.png
                  Preview:.PNG........IHDR.............V.W....tEXtSoftware.Adobe ImageReadyq.e<..."iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.3-c011 66.145661, 2012/02/06-14:56:27 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CS6 (Windows)" xmpMM:InstanceID="xmp.iid:07824105EEF311E2885393652146F0A1" xmpMM:DocumentID="xmp.did:07824106EEF311E2885393652146F0A1"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:07824103EEF311E2885393652146F0A1" stRef:documentID="xmp.did:07824104EEF311E2885393652146F0A1"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>.=|...]IDATx...+.a...g....:....4spsr0)...7.Q.......IJ)...q..;.....m..}.O....S.v..g>...}.. .UJ..S.9l...8....I\.
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:ASCII text, with no line terminators
                  Category:downloaded
                  Size (bytes):112
                  Entropy (8bit):4.736400904101784
                  Encrypted:false
                  SSDEEP:
                  MD5:E9386CA5A9C0509618EA0DCDBA791D3B
                  SHA1:C9937DD4E504BA0037758C366C901E6AE9F35E5D
                  SHA-256:5D2B06A568C665717BCF48D348473E6570B1EF9C3926B273EBFEE2FB8CF1BC6B
                  SHA-512:2A6CBA4A8469B5442DF90B94F840407E6FFA5C8F49E9B40E7801A7804E20ED3FC59B33E5B091BEBB475E85AAB8764989A5DF8727D9CED401AFA88AC495063D21
                  Malicious:false
                  Reputation:low
                  URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTA0LjAuNTExMi4xMDISSAluuT9lIBFfZxIFDZFhlU4SBQ2RYZVOEgUNunrPNhIFDQ4dWwUSBQ2c-eW-EgUNlSDA1RIFDb9CG5MSBQ3l_rPaEgUNF9Mz2g==?alt=proto
                  Preview:ClEKBw2RYZVOGgAKBw2RYZVOGgAKBw26es82GgAKBw0OHVsFGgAKBw2c+eW+GgAKBw2VIMDVGgAKBw2/QhuTGgAKBw3l/rPaGgAKBw0X0zPaGgA=
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:PNG image data, 26 x 26, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):491
                  Entropy (8bit):7.353727947345717
                  Encrypted:false
                  SSDEEP:
                  MD5:2282A8AB06979A2ED9CD5D005DEF6F07
                  SHA1:F425D807A71A8E325B3970A9C3B295E41FF25B9A
                  SHA-256:57DC717DBC85593B7AF100EDEC2FE962662FAAA8CE36B2FF9DF5EF8B87CE81E9
                  SHA-512:CDC583800ACEF3BEEC491BCC1FB90DFBEACD8B885CBC88676A6120B212F2C9D7FDD04CED7CDDD2343B3B4E4A423BA554DE80BAC7120B47C0801049AFCCF5DB25
                  Malicious:false
                  Reputation:low
                  Preview:.PNG........IHDR.............&(.....tEXtSoftware.Adobe ImageReadyq.e<....IDATx.b....@=.D.R.C...L.2x.0W...i.'...2..d..Y..........F.<......D@.......O..6...'.... a...Z.=W......$...........B....a.......',..l@..!"...$.....b..K.h.....F...&...<.....0.~.,.5.8.f2...p..O,zn@.....g2...{H-a......{r....(.?...{.....( ..#I..4.[......S.O.... ...o.`.}q...4........_...T+Q.I.j...i..j........\$.8x.E............du2..0...\.u...`B..8;...Q..YW...X.Q.b..k?..R...}b-A.....6...?.ZL....IEND.B`.
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:PNG image data, 22 x 22, 8-bit/color RGBA, non-interlaced
                  Category:downloaded
                  Size (bytes):687
                  Entropy (8bit):7.599009741923002
                  Encrypted:false
                  SSDEEP:
                  MD5:A6461CE6BD5C3A1028618EEC5941AA65
                  SHA1:C2965E31D04C4A86D578F1FDA98417ECB215A906
                  SHA-256:4D837161C2967749B5143EB32398D78D7E14DA7A4C1CD3065B3A100DEBDF1B9C
                  SHA-512:0D1A17BE0786A123103C01EEF88D405688F221474A99A66AA4F4222C0F4D6869BA1B0153B6839050EEAD007479DC4AE94E21086CA6882011C5E87A4AE8A9AC33
                  Malicious:false
                  Reputation:low
                  URL:https://www.mypeoplenet.com/EmployeePortal/Content/LessCss/Images/icn-return.png
                  Preview:.PNG........IHDR..............l;....pHYs..........o.d...aIDATHK...k.A.....lh .X.... .m5i.m.1.E..^..^. z......T.Q..`OM6. (.....x....E/.$...w..M.n.$.....;o..[.r&.x>5../$.>Vs9cD.{*.......t.....z2..6...g...(..:.8a.1.[}A.z..hT...h...2...b!.....F...B.:.`:.....R&^#.R p...F.4.....|^6........@.oUs.y.|x..VV.#9.i'...-YF.....".>U.f/i...'$"..Xn.Y'5....r.fs..SWu.IJ../P.K......H.........iz.9W....\O"u...J.T....+.+..u)....H...&[.44.9...%.Us.y........R....Z.g......~.S.o:.....q..":.i.J......a.i~..L.F....x3p.ws(...z.d.nz:.....h.%d..Z...2.I....L-..0.....f.V(u..1.h..a<.%...|.....a.._.=>....../..*....(..^.D,...r =U..L...... ....k...O..)=U...C......b*....\...>.......IEND.B`.
                  No static file info