Edit tour

Windows Analysis Report
https://us2.concursolutions.com/nui/signin?lang=en&reset=mfa&handle=sVzOO6XcfvpZpVqYKmj2vBU6nrm1AMUapjTiIwyc%2BsKMhU0%2FXJ4qb%2BUzCr2XxEk%3D&token=dd-3o610re3wam5902s29ojya33cju6w6

Overview

General Information

Sample URL:https://us2.concursolutions.com/nui/signin?lang=en&reset=mfa&handle=sVzOO6XcfvpZpVqYKmj2vBU6nrm1AMUapjTiIwyc%2BsKMhU0%2FXJ4qb%2BUzCr2XxEk%3D&token=dd-3o610re3wam5902s29ojya33cju6w6
Analysis ID:1402187

Detection

Score:1
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

HTML body contains password input but no form action
Stores files to the Windows start menu directory

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64_ra
  • chrome.exe (PID: 7052 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://us2.concursolutions.com/nui/signin?lang=en&reset=mfa&handle=sVzOO6XcfvpZpVqYKmj2vBU6nrm1AMUapjTiIwyc%2BsKMhU0%2FXJ4qb%2BUzCr2XxEk%3D&token=dd-3o610re3wam5902s29ojya33cju6w6 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 1092 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 --field-trial-handle=1936,i,2696854869130905981,16756617355423823784,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: https://us2.concursolutions.com/nui/signin?lang=en&reset=mfa&handle=sVzOO6XcfvpZpVqYKmj2vBU6nrm1AMUapjTiIwyc%2BsKMhU0%2FXJ4qb%2BUzCr2XxEk%3D&token=dd-3o610re3wam5902s29ojya33cju6w6HTTP Parser: <input type="password" .../> found but no <form action="...
Source: https://us2.concursolutions.com/nui/signin?lang=en&reset=mfa&handle=sVzOO6XcfvpZpVqYKmj2vBU6nrm1AMUapjTiIwyc%2BsKMhU0%2FXJ4qb%2BUzCr2XxEk%3D&token=dd-3o610re3wam5902s29ojya33cju6w6HTTP Parser: <input type="password" .../> found
Source: https://us2.concursolutions.com/nui/signin?lang=en&reset=mfa&handle=sVzOO6XcfvpZpVqYKmj2vBU6nrm1AMUapjTiIwyc%2BsKMhU0%2FXJ4qb%2BUzCr2XxEk%3D&token=dd-3o610re3wam5902s29ojya33cju6w6HTTP Parser: No favicon
Source: https://us2.concursolutions.com/nui/signin?lang=en&reset=mfa&handle=sVzOO6XcfvpZpVqYKmj2vBU6nrm1AMUapjTiIwyc%2BsKMhU0%2FXJ4qb%2BUzCr2XxEk%3D&token=dd-3o610re3wam5902s29ojya33cju6w6HTTP Parser: No favicon
Source: https://us2.concursolutions.com/nui/signin?lang=en&reset=mfa&handle=sVzOO6XcfvpZpVqYKmj2vBU6nrm1AMUapjTiIwyc%2BsKMhU0%2FXJ4qb%2BUzCr2XxEk%3D&token=dd-3o610re3wam5902s29ojya33cju6w6HTTP Parser: No <meta name="author".. found
Source: https://us2.concursolutions.com/nui/signin?lang=en&reset=mfa&handle=sVzOO6XcfvpZpVqYKmj2vBU6nrm1AMUapjTiIwyc%2BsKMhU0%2FXJ4qb%2BUzCr2XxEk%3D&token=dd-3o610re3wam5902s29ojya33cju6w6HTTP Parser: No <meta name="author".. found
Source: https://us2.concursolutions.com/nui/signin?lang=en&reset=mfa&handle=sVzOO6XcfvpZpVqYKmj2vBU6nrm1AMUapjTiIwyc%2BsKMhU0%2FXJ4qb%2BUzCr2XxEk%3D&token=dd-3o610re3wam5902s29ojya33cju6w6HTTP Parser: No <meta name="copyright".. found
Source: https://us2.concursolutions.com/nui/signin?lang=en&reset=mfa&handle=sVzOO6XcfvpZpVqYKmj2vBU6nrm1AMUapjTiIwyc%2BsKMhU0%2FXJ4qb%2BUzCr2XxEk%3D&token=dd-3o610re3wam5902s29ojya33cju6w6HTTP Parser: No <meta name="copyright".. found
Source: unknownHTTPS traffic detected: 69.192.108.161:443 -> 192.168.2.16:49748 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.16:49749 version: TLS 1.2
Source: unknownHTTPS traffic detected: 69.192.108.161:443 -> 192.168.2.16:49750 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.16:49753 version: TLS 1.2
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 69.192.108.161
Source: unknownTCP traffic detected without corresponding DNS query: 69.192.108.161
Source: unknownTCP traffic detected without corresponding DNS query: 69.192.108.161
Source: unknownTCP traffic detected without corresponding DNS query: 69.192.108.161
Source: unknownTCP traffic detected without corresponding DNS query: 69.192.108.161
Source: unknownTCP traffic detected without corresponding DNS query: 69.192.108.161
Source: unknownTCP traffic detected without corresponding DNS query: 69.192.108.161
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 69.192.108.161
Source: unknownTCP traffic detected without corresponding DNS query: 69.192.108.161
Source: unknownTCP traffic detected without corresponding DNS query: 69.192.108.161
Source: unknownTCP traffic detected without corresponding DNS query: 69.192.108.161
Source: unknownTCP traffic detected without corresponding DNS query: 69.192.108.161
Source: unknownTCP traffic detected without corresponding DNS query: 69.192.108.161
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownDNS traffic detected: queries for: us2.concursolutions.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49688 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
Source: unknownHTTPS traffic detected: 69.192.108.161:443 -> 192.168.2.16:49748 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.16:49749 version: TLS 1.2
Source: unknownHTTPS traffic detected: 69.192.108.161:443 -> 192.168.2.16:49750 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.16:49753 version: TLS 1.2
Source: classification engineClassification label: clean1.win@14/40@24/152
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://us2.concursolutions.com/nui/signin?lang=en&reset=mfa&handle=sVzOO6XcfvpZpVqYKmj2vBU6nrm1AMUapjTiIwyc%2BsKMhU0%2FXJ4qb%2BUzCr2XxEk%3D&token=dd-3o610re3wam5902s29ojya33cju6w6
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 --field-trial-handle=1936,i,2696854869130905981,16756617355423823784,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 --field-trial-handle=1936,i,2696854869130905981,16756617355423823784,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
https://us2.concursolutions.com/nui/signin?lang=en&reset=mfa&handle=sVzOO6XcfvpZpVqYKmj2vBU6nrm1AMUapjTiIwyc%2BsKMhU0%2FXJ4qb%2BUzCr2XxEk%3D&token=dd-3o610re3wam5902s29ojya33cju6w60%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
www.google.com
142.251.40.196
truefalse
    high
    consent.trustarc.com
    18.238.49.47
    truefalse
      high
      static.concursolutions.com
      unknown
      unknownfalse
        high
        eum.concursolutions.com
        unknown
        unknownfalse
          high
          js-agent.newrelic.com
          unknown
          unknownfalse
            high
            us2.concursolutions.com
            unknown
            unknownfalse
              high
              NameMaliciousAntivirus DetectionReputation
              https://us2.concursolutions.com/nui/signin?lang=en&reset=mfa&handle=sVzOO6XcfvpZpVqYKmj2vBU6nrm1AMUapjTiIwyc%2BsKMhU0%2FXJ4qb%2BUzCr2XxEk%3D&token=dd-3o610re3wam5902s29ojya33cju6w6false
                high
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                23.47.170.187
                unknownUnited States
                16625AKAMAI-ASUSfalse
                1.1.1.1
                unknownAustralia
                13335CLOUDFLARENETUSfalse
                18.238.49.47
                consent.trustarc.comUnited States
                16509AMAZON-02USfalse
                23.56.163.58
                unknownUnited States
                16625AKAMAI-ASUSfalse
                142.251.40.234
                unknownUnited States
                15169GOOGLEUSfalse
                18.238.49.99
                unknownUnited States
                16509AMAZON-02USfalse
                142.250.80.78
                unknownUnited States
                15169GOOGLEUSfalse
                142.251.40.131
                unknownUnited States
                15169GOOGLEUSfalse
                96.17.66.199
                unknownUnited States
                16625AKAMAI-ASUSfalse
                142.251.167.84
                unknownUnited States
                15169GOOGLEUSfalse
                239.255.255.250
                unknownReserved
                unknownunknownfalse
                142.251.40.196
                www.google.comUnited States
                15169GOOGLEUSfalse
                151.101.194.137
                unknownUnited States
                54113FASTLYUSfalse
                142.251.35.174
                unknownUnited States
                15169GOOGLEUSfalse
                IP
                192.168.2.16
                Joe Sandbox version:40.0.0 Tourmaline
                Analysis ID:1402187
                Start date and time:2024-03-03 18:35:50 +01:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:defaultwindowsinteractivecookbook.jbs
                Sample URL:https://us2.concursolutions.com/nui/signin?lang=en&reset=mfa&handle=sVzOO6XcfvpZpVqYKmj2vBU6nrm1AMUapjTiIwyc%2BsKMhU0%2FXJ4qb%2BUzCr2XxEk%3D&token=dd-3o610re3wam5902s29ojya33cju6w6
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:12
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • EGA enabled
                Analysis Mode:stream
                Analysis stop reason:Timeout
                Detection:CLEAN
                Classification:clean1.win@14/40@24/152
                • Exclude process from analysis (whitelisted): svchost.exe
                • Excluded IPs from analysis (whitelisted): 142.251.40.131, 142.251.35.174, 142.251.167.84, 23.56.163.58, 34.104.35.123, 23.47.170.187, 142.251.40.234, 142.251.32.106, 142.251.40.106, 142.250.81.234, 142.250.176.202, 142.251.40.202, 142.251.41.10, 142.250.80.42, 142.250.65.202, 142.250.65.234, 142.250.80.106, 142.251.35.170, 142.250.80.10, 142.251.40.138, 142.250.80.74, 142.250.65.170, 151.101.194.137, 151.101.66.137, 151.101.2.137, 151.101.130.137, 96.17.66.199
                • Excluded domains from analysis (whitelisted): global-wildcard.concursolutions.com.edgekey.net, us2.concursolutions.com.edgekey.net, clients2.google.com, accounts.google.com, edgedl.me.gvt1.com, content-autofill.googleapis.com, eum.concursolutions.com.edgekey.net, clientservices.googleapis.com, e7833.dsca.akamaiedge.net, e7833.dscb.akamaiedge.net, clients.l.google.com, dualstack.k.sni.global.fastly.net
                • Not all processes where analyzed, report is missing behavior information
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Mar 3 16:36:19 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                Category:dropped
                Size (bytes):2673
                Entropy (8bit):3.9789384181422127
                Encrypted:false
                SSDEEP:
                MD5:952DB73B59083580193F70BC80530F82
                SHA1:6F2064B1AFE4A9BCB58E2CDA41324D8596FC9449
                SHA-256:DDBF05E4518956415631236F568CF41C4A94917A8DE28C4672D21C7143A93687
                SHA-512:6EDC5C6F1FDA6F78DA1B3B77AF4608E969B93715101596E34FD29B947091EA85E5BD6E4237B72851E77D39E4F2245D88BD054F958C03347962E27790CE91EE0F
                Malicious:false
                Reputation:unknown
                Preview:L..................F.@.. ...$+.,....9e|M.m..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IcX......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VcX......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VcX......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VcX............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VcX.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........l..b.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Mar 3 16:36:19 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                Category:dropped
                Size (bytes):2675
                Entropy (8bit):3.9949504701040124
                Encrypted:false
                SSDEEP:
                MD5:C1C9447733E82C6028A574BFC752C189
                SHA1:857567DDF3E8DD0F1FA23C7CD59377B39AF1EA40
                SHA-256:3D337B1626A5A9BE61FCC95B773B4A4B059203338D0F2A62B29A7D280DA669A2
                SHA-512:2BB61C6560DF0AD2526E5CCECAEF8562E5587D4A42B62B116AF01847A707535C6AB5A347908EEED5196B5777FAC800FDBC5DFB72AD6F96BAFE55C07085391A34
                Malicious:false
                Reputation:unknown
                Preview:L..................F.@.. ...$+.,....|.pM.m..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IcX......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VcX......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VcX......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VcX............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VcX.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........l..b.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                Category:dropped
                Size (bytes):2689
                Entropy (8bit):4.005496419552857
                Encrypted:false
                SSDEEP:
                MD5:D799BAFEC17265ABFEBBD300A8C918E0
                SHA1:280F55FE01BD8CA655941187CDEF28CA2E3BAEF1
                SHA-256:9460FFC4EBC6767710F9515FC6508D3576683E8D5B1B6C9793021C69BD304680
                SHA-512:3146B9388E33F87B0EEC8074D5C9E7613C8BB52737BF884E0AF04729FBDA2EAE52551646B10ED6FBF6790E89A83E0960CDB1B7D1A5A534820A60E37B59325741
                Malicious:false
                Reputation:unknown
                Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IcX......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VcX......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VcX......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VcX............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........l..b.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Mar 3 16:36:19 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                Category:dropped
                Size (bytes):2677
                Entropy (8bit):3.99464938762997
                Encrypted:false
                SSDEEP:
                MD5:64B07DD81152167A17A03CDA2CDAAA8D
                SHA1:8446255073AB834F8BAE320EDB39483D6D3E73EF
                SHA-256:0C7D4F78EB07BB6AA8C812213AABDC4DA4D390015AB7D17F8897BCDF4C69AABB
                SHA-512:2CEBB1613308D7C894A03884E9791C62C07401C7E72F94C3E5AB8B442B8C0D7F96D9A0D7B888C5B9725B541B3662ECEBB7CCE5BF056464B9571B5EAE71FA0D2A
                Malicious:false
                Reputation:unknown
                Preview:L..................F.@.. ...$+.,.....jM.m..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IcX......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VcX......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VcX......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VcX............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VcX.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........l..b.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Mar 3 16:36:19 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                Category:dropped
                Size (bytes):2677
                Entropy (8bit):3.9845948648723644
                Encrypted:false
                SSDEEP:
                MD5:7B832C559326B61660C799D5C4FEAFA4
                SHA1:E5F0A2D8124092E053535836106936778D1AE066
                SHA-256:237B94CC4456CFE7F948DB176D24A8F62EF431E1C1F3AD0FDD6132D0280A24B2
                SHA-512:C73DDF5C1466B1EBE55957391B7A7C2611B47B27EEE5C5C7387EDD71AD6D96FF22F74BC212C40621CE5C67C6409B6861FF33D2404641304BB54BAD4C869F6FBC
                Malicious:false
                Reputation:unknown
                Preview:L..................F.@.. ...$+.,.....vM.m..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IcX......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VcX......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VcX......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VcX............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VcX.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........l..b.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Mar 3 16:36:19 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                Category:dropped
                Size (bytes):2679
                Entropy (8bit):3.9926907031739165
                Encrypted:false
                SSDEEP:
                MD5:1523FD12DE546AB1143905911FBD5274
                SHA1:DC5F143071726BC98A40AC40344588D7F7325211
                SHA-256:3F276D47CF7CD301B9A32C11C250B62DE194A0529356703A1DBBD547293404EA
                SHA-512:44DA3C351BE1FCCCC691F68203095C0B609ED7A148F77C761A7A97B4084A1B6AB6871D68057C4F031FB1EB25C0D7E83594C956ECE6279976C2ADB9924A00F49E
                Malicious:false
                Reputation:unknown
                Preview:L..................F.@.. ...$+.,.....`M.m..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IcX......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VcX......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VcX......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VcX............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VcX.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........l..b.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text
                Category:downloaded
                Size (bytes):271
                Entropy (8bit):5.280363028445035
                Encrypted:false
                SSDEEP:
                MD5:41FBEE70796F1D74E3059248D8D046EB
                SHA1:82A608E94ECCE163D55A0730704A696CDDEC2D12
                SHA-256:B579D5EA44E65AEDB9DE81DA8AEDEA9F03B57BCEB3E025242BC38467D7576C8C
                SHA-512:4A8CF87CF79DB6CF194D0ABC53C212507C12FB134B36F5C4D9A3159455341B008DC2F8582F27C34E341772EE3EF5D946CFB66DF860002642EB62D339E4A4F2B1
                Malicious:false
                Reputation:unknown
                URL:https://static.concursolutions.com/nui/signin/master/main.sapCnqrThemedCss.__sap_fiori_3_dark__.bundle.9dc440d0215d8ec371dc.js
                Preview:(window.webpackJsonp=window.webpackJsonp||[]).push([[4],{1071:function(n,o,c){},1399:function(n,o,c){},264:function(n,o,c){},272:function(n,o,c){},282:function(n,o,c){}}]);.//# sourceMappingURL=main.sapCnqrThemedCss.__sap_fiori_3_dark__.bundle.9dc440d0215d8ec371dc.js.map
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text, with very long lines (22603)
                Category:downloaded
                Size (bytes):66376
                Entropy (8bit):5.4654613966852565
                Encrypted:false
                SSDEEP:
                MD5:E6D215EB13F3B6224DE726F67C2DA7F6
                SHA1:E8D04E034AF5831D1817867E0E974AF6469BCB7D
                SHA-256:7F64461200257B74D40B9634421654A3F6165EE4D5C6AF4CAE649BB8ECDD150F
                SHA-512:86C320054A2C8BBAA820E8DF86FFA9913924B874ACFDEA954294F418F58E120A4202924F626C5E19F7F1845E7A258BE02D13B44DDFF0145DD1595299CD9F01BB
                Malicious:false
                Reputation:unknown
                URL:https://static.concursolutions.com/nui/signin/master/main.sapCnqrThemedCss.__concur_default__.68359358b46f42b5ce34.css
                Preview:.open-in-mobile{padding:100px 60px 10px 60px;text-align:center}.open-in-mobile button{width:100%}.open-in-mobile .store-link{background-position:50%;background-repeat:no-repeat;display:block;height:50px;margin-top:200px}.open-in-mobile .store-link.ios{background-image:url(styles/images/button_ios_sm.b04c4990d14e14b816e8c413df4f510f.png)}.open-in-mobile .store-link.android{background-image:url(styles/images/button_google_sm.39338b3e6d9833c3d8610a23236ffdd3.png)}.signin.signin-hrd-body{display:flex;flex-direction:column;min-width:auto!important}.signin.signin-hrd-body.lang-hidden #langMenuItem{display:none}.signin.signin-hrd-body .react-component-wrapper{display:flex;flex:1;flex-direction:column}.signin.signin-hrd-body .full-width{width:100%}.signin.signin-hrd-body .hr-sect{align-items:center;color:rgba(0,0,0,.35);display:flex;flex-basis:100%;margin:18px 0}.signin.signin-hrd-body .hr-sect:after,.signin.signin-hrd-body .hr-sect:before{background:rgba(0,0,0,.35);content:"";flex-grow:1;font
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text, with very long lines (58956)
                Category:downloaded
                Size (bytes):176066
                Entropy (8bit):4.961942450606355
                Encrypted:false
                SSDEEP:
                MD5:1F94DC266CA584495DC8E8FEF380CD19
                SHA1:E437E7E6374A16688A7EA36DE0EE1B2CE5E4646F
                SHA-256:AF4FCEA71DEFA0A06345A98CD86D8195211D19EF302646A3F45A70CB9531E392
                SHA-512:0EE7A57101170BFFF3FCC8C06D6318F4C6353A5EF47DDF74D5E4F4776A7C44361718421D1337634D6CB11CCA4AD24ED8B7C71AB5A5A375F11729E2AEB1D79D03
                Malicious:false
                Reputation:unknown
                URL:https://static.concursolutions.com/static/css/concur_default/cnqr-global/manifest-cnqr.443b73b15877742a78a2d805a222954f.css
                Preview:.cnqr-messagebar,.cnqr-panel,section.cnqr-section-panel{background-color:#fff;border:1px solid transparent;border-radius:4px;box-shadow:0 1px 1px rgba(0,0,0,.05);margin-bottom:18px}.cnqr-messagebar-body,.cnqr-panel-body{padding:8px}.cnqr-messagebar-heading,.cnqr-panel-heading{border-bottom:1px solid transparent;border-top-left-radius:3px;border-top-right-radius:3px;padding:10px 15px}.cnqr-messagebar-heading>.dropdown .dropdown-toggle,.cnqr-panel-heading>.dropdown .dropdown-toggle{color:inherit}.cnqr-panel-title{color:inherit;margin-bottom:0;margin-top:0}.cnqr-panel-title>.small,.cnqr-panel-title>.small>a,.cnqr-panel-title>a,.cnqr-panel-title>small,.cnqr-panel-title>small>a{color:inherit}.cnqr-panel-footer{background-color:#f9f9f9;border-bottom-left-radius:3px;border-bottom-right-radius:3px;border-top:1px solid #c0c2c4;padding:10px 15px}.panel>.cnqr-messagebar-heading+.panel-collapse>.list-group .list-group-item:first-child,.panel>.cnqr-panel-heading+.panel-collapse>.list-group .list-gr
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text, with very long lines (21353)
                Category:downloaded
                Size (bytes):784429
                Entropy (8bit):5.148955822172474
                Encrypted:false
                SSDEEP:
                MD5:322C47A161B956686DF815400582A6EC
                SHA1:227BA242A68594BD4F1C60763673EB436A42496F
                SHA-256:AAC9F64A62B843A1E14BFE22E0574D9BEE3777C9FCE156CF51B255BE5292CDA8
                SHA-512:19E00696001B496D60FF4AFC0B5FFC6A47CF8625E6CF01B29477BFBD357FB4951920A90568889DF4C7E955892E6BCC5307DF6C74FD644ECD6010FE14BD237B63
                Malicious:false
                Reputation:unknown
                URL:https://static.concursolutions.com/coreui/ui-floorplans/ui-floorplans-v2.18.6/main.sapCnqrThemedCss.__concur_default__.css
                Preview:.sapcnqr-inline-error-af5ca5{background:none;border:0;-webkit-box-sizing:border-box;box-sizing:border-box;color:#333;font-family:Helvetica Neue,Helvetica,Segoe UI,Arial,sans-serif;font-size:13px;font-weight:400;line-height:1.42857143;margin:0;opacity:1;padding:0;padding:8px 16px;text-shadow:none;text-transform:none}.sapcnqr-inline-error-af5ca5:after,.sapcnqr-inline-error-af5ca5:before{-webkit-box-sizing:inherit;box-sizing:inherit;content:none;font-size:inherit}.sapcnqr-inline-error__error-id-224b87,.sapcnqr-inline-error__error-message-074504{background:none;border:0;-webkit-box-sizing:border-box;box-sizing:border-box;color:#333;color:#ca202c;font-family:Helvetica Neue,Helvetica,Segoe UI,Arial,sans-serif;font-size:13px;font-weight:400;line-height:1.42857143;margin:0;opacity:1;padding:0;text-shadow:none;text-transform:none}.sapcnqr-inline-error__error-id-224b87:after,.sapcnqr-inline-error__error-id-224b87:before,.sapcnqr-inline-error__error-message-074504:after,.sapcnqr-inline-error__err
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:GIF image data, version 89a, 1 x 1
                Category:dropped
                Size (bytes):24
                Entropy (8bit):2.459147917027245
                Encrypted:false
                SSDEEP:
                MD5:BC32ED98D624ACB4008F986349A20D26
                SHA1:2D3DF8C11D2168CE2C27E0937421D11D85016361
                SHA-256:0C9CF152A0AD00D4F102C93C613C104914BE5517AC8F8E0831727F8BFBE8B300
                SHA-512:71ACC6DA78D5D5BF0EEA30E2EE0AC5C992B00EFEC959077DFE0AB769F1DBBD9AF12D5C5C155046283D5416BEB606A9EF323FB410E903768B1569B69F37075B4E
                Malicious:false
                Reputation:unknown
                Preview:GIF89a.......,..........
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text, with very long lines (65536), with no line terminators
                Category:downloaded
                Size (bytes):210721
                Entropy (8bit):5.3804535625878325
                Encrypted:false
                SSDEEP:
                MD5:BD4D6F6C73B9F9109E0A739D25D77C1A
                SHA1:99452D0146941A7A0535BDEA71440E59CE4A1099
                SHA-256:7DA94C068DF37FD3D6EC4E04BC5E4A156FD368972B9D2C72E7BD4A5025902A26
                SHA-512:D902BFDD28F6883715F38E27CED8DEB535BF887AD946841B9D63FC6B867D62D791B5A3C5D9A0D6BE0F9DB1BEAC289E59941AA9CEEBC8DEE259C367781F06CF1E
                Malicious:false
                Reputation:unknown
                URL:https://static.concursolutions.com/nui/signin/master/main.bundle.3275a9b5d17d705928cb.js
                Preview:!function(e){function t(t){for(var a,i,s=t[0],d=t[1],c=t[2],l=0,f=[];l<s.length;l++)i=s[l],Object.prototype.hasOwnProperty.call(r,i)&&r[i]&&f.push(r[i][0]),r[i]=0;for(a in d)Object.prototype.hasOwnProperty.call(d,a)&&(e[a]=d[a]);for(u&&u(t);f.length;)f.shift()();return o.push.apply(o,c||[]),n()}function n(){for(var e,t=0;t<o.length;t++){for(var n=o[t],a=!0,s=1;s<n.length;s++){var d=n[s];0!==r[d]&&(a=!1)}a&&(o.splice(t--,1),e=i(i.s=n[0]))}return e}var a={},r={0:0},o=[];function i(t){if(a[t])return a[t].exports;var n=a[t]={i:t,l:!1,exports:{}};return e[t].call(n.exports,n,n.exports,i),n.l=!0,n.exports}i.m=e,i.c=a,i.d=function(e,t,n){i.o(e,t)||Object.defineProperty(e,t,{enumerable:!0,get:n})},i.r=function(e){"undefined"!=typeof Symbol&&Symbol.toStringTag&&Object.defineProperty(e,Symbol.toStringTag,{value:"Module"}),Object.defineProperty(e,"__esModule",{value:!0})},i.t=function(e,t){if(1&t&&(e=i(e)),8&t)return e;if(4&t&&"object"==typeof e&&e&&e.__esModule)return e;var n=Object.create(null)
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text, with very long lines (9066), with no line terminators
                Category:downloaded
                Size (bytes):9066
                Entropy (8bit):4.6403159442989415
                Encrypted:false
                SSDEEP:
                MD5:835068E01C3FE6EB2CDD5C1D36B69575
                SHA1:AB0DD86699A08445B604E5B658FBD5CB7D5AEF92
                SHA-256:151145FB29F122BA5EE8A40061B6D3FAF88BFF2E9A8A2EA59B37CAACB177853E
                SHA-512:3E68F8380C40B5516FC9FBFE2971A4ECBA0F7E20BAE0A598684F117B377A4EC498AB3991B5191506663855DDF7F843430B73D3DADB0C7C35A4EC0223184C6739
                Malicious:false
                Reputation:unknown
                URL:https://static.concursolutions.com/static/css/concur_default/cnqr-view/signin.7838fdbf8c247e2c42005ab84e0dbd52.css
                Preview:.signin .caption-container{height:100%;margin:0 -16px;position:absolute;right:16px;top:0;width:448px}.signin .caption-container .caption{background-color:#000;bottom:0;color:#e2e3e3;display:none;opacity:.8;padding:8px 16px;position:absolute;right:0;text-align:right;width:100%}.signin.signin-1 .cnqr-app-content.container{background-image:url(/static/images/signin/signin-20220302-01.jpg)}.signin.signin-1 .cnqr-app-content .caption-container:hover .caption-1{display:block}.signin.signin-2 .cnqr-app-content.container{background-image:url(/static/images/signin/signin-20220302-02.jpg)}.signin.signin-2 .cnqr-app-content .caption-container:hover .caption-2{display:block}.signin.signin-3 .cnqr-app-content.container{background-image:url(/static/images/signin/signin-20220302-03.jpg)}.signin.signin-3 .cnqr-app-content .caption-container:hover .caption-3{display:block}.signin.signin-4 .cnqr-app-content.container{background-image:url(/static/images/signin/signin-20220302-04.jpg)}.signin.signin-4 .cn
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text, with very long lines (65536), with no line terminators
                Category:downloaded
                Size (bytes):174441
                Entropy (8bit):5.091447657350695
                Encrypted:false
                SSDEEP:
                MD5:A1BE79DD3383C389381A5E8502D8A94E
                SHA1:8490B102DBB50097E2DE39EDC968FC5A0991D764
                SHA-256:B4037EF9F3D4713B25581B757B46B7798768E73AB699A28A927098894BA9AAF0
                SHA-512:37A14BA4E578DA76B8CB055458CD13A6242F093A1AF824232E798A1C96A1EEADE0D04E5677BBFE358D6CB938F70A78F7FF5B5D0BEEC2AF422A6D533A5787CFCA
                Malicious:false
                Reputation:unknown
                URL:https://static.concursolutions.com/static/css/concur_default/cnqr-global/manifest-bootstrap.3a5b72d6192bee979ba6dc60a67fbc67.css
                Preview:.h1,.h2,.h3,.h4,.h5,.h6,h1,h2,h3,h4,h5,h6{color:#333;font-family:Helvetica Neue,Helvetica,Segoe UI Semibold,sans-serif;font-weight:400;line-height:1.1}.h1 .small,.h1 small,.h2 .small,.h2 small,.h3 .small,.h3 small,.h4 .small,.h4 small,.h5 .small,.h5 small,.h6 .small,.h6 small,h1 .small,h1 small,h2 .small,h2 small,h3 .small,h3 small,h4 .small,h4 small,h5 .small,h5 small,h6 .small,h6 small{color:#c0c2c4;line-height:1}.h1,.h2,.h3,h1,h2,h3{margin-bottom:9px;margin-top:18px}.h1 .small,.h1 small,.h2 .small,.h2 small,.h3 .small,.h3 small,h1 .small,h1 small,h2 .small,h2 small,h3 .small,h3 small{font-size:65%}.h4,.h5,.h6,h4,h5,h6{margin-bottom:9px;margin-top:9px}.h4 .small,.h4 small,.h5 .small,.h5 small,.h6 .small,.h6 small,h4 .small,h4 small,h5 .small,h5 small,h6 .small,h6 small{font-size:75%}.h1,h1{font-size:30px}.h2,h2{font-size:20px}.h3,h3{font-size:18px}.h4,h4{font-size:16px}.h5,h5{font-size:14px}.h6,h6{font-size:13px}p{margin:0 0 9px}.lead{font-weight:300;line-height:1.4;margin-bottom:18p
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text
                Category:downloaded
                Size (bytes):266
                Entropy (8bit):5.274172859082968
                Encrypted:false
                SSDEEP:
                MD5:E497D445F4CB03DACE84EA49AEFF09D3
                SHA1:B9549DA240D14BF84789AF5F715CA649D80319DA
                SHA-256:23CE07F3EDC595873F241ADEA0AC90411CFEB70CB4551A367C7D69E299D34742
                SHA-512:343202816ED93F7189E9E41A9DA0D3BE4B607AEDA5851F57817E37C349ACCA11202DBB83F4CC202B9AE343A2DD2FD0C4BD5CC4E949F737E46F56492B3754667B
                Malicious:false
                Reputation:unknown
                URL:https://static.concursolutions.com/nui/signin/master/main.sapCnqrThemedCss.__sap_horizon__.bundle.ae448e5a3a9467ccf1f4.js
                Preview:(window.webpackJsonp=window.webpackJsonp||[]).push([[7],{1078:function(n,o,c){},1406:function(n,o,c){},271:function(n,o,c){},279:function(n,o,c){},289:function(n,o,c){}}]);.//# sourceMappingURL=main.sapCnqrThemedCss.__sap_horizon__.bundle.ae448e5a3a9467ccf1f4.js.map
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text
                Category:downloaded
                Size (bytes):269
                Entropy (8bit):5.286326283849122
                Encrypted:false
                SSDEEP:
                MD5:30A531691A71FE083B82F156CFDCF50B
                SHA1:A4FCD11BA09F57365C5E8BDCC980633F8F30BEEA
                SHA-256:5B0C5A0F6E276BC0054FB61BDBECD64B3310AFD20A0A175D9D608EEFD33EB1B8
                SHA-512:73440AA053157F0B168208BD5B77CFB41707347BCB068F229315083DCEE81C3863E9E4DC3395DF4C434809013AF86AFC49C61155D454BA235D60CE5751699652
                Malicious:false
                Reputation:unknown
                URL:https://static.concursolutions.com/nui/signin/master/main.sapCnqrThemedCss.__concur_gateway__.bundle.1ffc99218a94d96f57a6.js
                Preview:(window.webpackJsonp=window.webpackJsonp||[]).push([[2],{1070:function(n,o,c){},1398:function(n,o,c){},261:function(n,o,c){},263:function(n,o,c){},281:function(n,o,c){}}]);.//# sourceMappingURL=main.sapCnqrThemedCss.__concur_gateway__.bundle.1ffc99218a94d96f57a6.js.map
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:Unicode text, UTF-8 text, with very long lines (12401)
                Category:downloaded
                Size (bytes):12455
                Entropy (8bit):4.906500118493812
                Encrypted:false
                SSDEEP:
                MD5:EF5BB4FF871B011A9F9A0E6E8635A5A3
                SHA1:C304AB48DE3E0E9DA9ABB5D6B0BCBE79C4A5D106
                SHA-256:B7AB5490636A72EFBFCAE9B8028189878F77FBE858DED63A249E86F072E84558
                SHA-512:BE16A95665F5B102EBC543A121932014C87DDEDC14EFF2BC061086EB04C10DA51B460CA365F73DFFEC9B8F6671E8F89EC9D26B42981F5B88010862CCCCABBA61
                Malicious:false
                Reputation:unknown
                URL:https://static.concursolutions.com/coreui/ui-floorplans/ui-floorplans-v2.18.6/translations/ui-floorplans-en-v2.18.6.js
                Preview:(window.wpJsonpUiFloorplans=window.wpJsonpUiFloorplans||[]).push([[0],{93:function(e,r){e.exports={"Common.Continue":"Continue","CoreUI.actingAs":"Acting as {0}","CoreUI.actingAsExpand":"Expand options for acting as another user","CoreUI.actingAsCollapse":"Collapse options for acting as another user","CoreUI.actingAsTitle":"Act As","CoreUI.actingAsOtherUser":"Acting as other user","CoreUI.actAsAnotherUser":"Act as Another User","CoreUI.quickHelpTitleActingAsOtherUser":"Working for Others - Options","CoreUI.quickHelpTitleActingAsOtherUserFiori":"Act As Another User - Options","CoreUI.administeringCompany":"Administering Company {0}","CoreUI.allMyUsers":"All My Users","CoreUI.cancel":"Cancel","CoreUI.close":"Close","CoreUI.currentlyActingAs":"Currently acting as {0}","CoreUI.endActingAsOther":"Done acting for others","CoreUI.error.correlationid":"Correlation ID: {correlationId}","CoreUI.error.error":"Error","CoreUI.error.errorConfig":"Error fetching user switch configuration","CoreUI.err
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text, with no line terminators
                Category:downloaded
                Size (bytes):56
                Entropy (8bit):4.223368771981933
                Encrypted:false
                SSDEEP:
                MD5:F1347FB5A48AA938D383EEA39A3C09A7
                SHA1:441EF0CB23AD23ED8515438065429315594D375F
                SHA-256:978CB457B9642722B602AB2F8442966B720F56959197ED53553128B628876C99
                SHA-512:2C8C493017F971C48C55B82D51BF76CC76C849C53B2E5DC20B1A743CFA12AFA822668247230B04A613036B632C5EC5805F31C8300711278FF2D53BD56E7C89E0
                Malicious:false
                Reputation:unknown
                URL:"https://eum.concursolutions.com/1/NRJS-ee5200b86a4ec78386d?a=974955169&sa=1&v=1210.e2a3f80&t=Unnamed%20Transaction&rst=5051&ck=1&ref=https://us2.concursolutions.com/nui/signin&be=1691&fe=4392&dc=3217&af=err,xhr,stn,ins,spa&perf=%7B%22timing%22:%7B%22of%22:1709487377343,%22n%22:0,%22f%22:18,%22dn%22:259,%22dne%22:259,%22c%22:259,%22s%22:259,%22ce%22:497,%22rq%22:497,%22rp%22:761,%22rpe%22:851,%22dl%22:765,%22di%22:3217,%22ds%22:3217,%22de%22:3217,%22dc%22:4391,%22l%22:4391,%22le%22:4393%7D,%22navigation%22:%7B%7D%7D&fp=2238&fcp=2238&jsonp=NREUM.setToken"
                Preview:NREUM.setToken({'stn':0,'err':1,'ins':1,'spa':1,'sr':1})
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text, with very long lines (440)
                Category:downloaded
                Size (bytes):172105
                Entropy (8bit):5.219243734972893
                Encrypted:false
                SSDEEP:
                MD5:34D4018B68DEA3A2000B000FE7236C08
                SHA1:4CCC25CF507E5831E3EE746B4032D7ACA36CC68B
                SHA-256:614D30605C0A3FA5369BB44D38580C22803E6B809D6F4FB9F5447B0A79B26CB7
                SHA-512:589ADE1EFF2693344F9BDDE12FA093F48DC6A9206C1442EC43DF61C69E203B74BDF76B40F6AD1DA0085C11E140854334D2EAC5BF1029E56EA2BFB4C29BE8EC8D
                Malicious:false
                Reputation:unknown
                URL:https://static.concursolutions.com/coreui/ui-theming/ui-theming-v3.10.0/concur_gateway/css_variables.css
                Preview:/**.* Copyright (c) 2012-2023 SAP SE or an SAP affiliate company and Theming Base Content contributors. Licensed under the Apache License, Version 2.0 - see LICENSE.txt..*.* Theming Engine 1.23061.0.* data:{"Path": "Base.baseLib.sap_fiori_3.css_variables", "PathPattern": "/%frameworkId%/%libId%/%themeId%/%fileId%.css", "Extends": ["sap_base_fiori","baseTheme"], "Tags": ["Fiori_3","LightColorScheme"], "FallbackThemeId": "sap_belize", "Engine": {"Name": "theming-engine", "Version": "1.23061.0"}, "Version": { "Build": "11.8.0.20231019133853", "Source": "11.8.0"}}.*/...sapThemeMetaData-Base-baseLib{background-image: url('data:text/plain;utf-8,{"Path": "Base.baseLib.sap_fiori_3.css_variables", "PathPattern": "/%frameworkId%/%libId%/%themeId%/%fileId%.css", "Extends": ["sap_base_fiori","baseTheme"], "Tags": ["Fiori_3","LightColorScheme"], "FallbackThemeId": "sap_belize", "Engine": {"Name": "theming-engine", "Version": "1.23061.0"}, "Version": { "Build": "11.8.0.20231019133853", "Source": "11
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text, with very long lines (1810)
                Category:downloaded
                Size (bytes):94121
                Entropy (8bit):5.29747292951185
                Encrypted:false
                SSDEEP:
                MD5:5DD0CFB4D0F6D51E00064272ABA1778F
                SHA1:40BDABD95EA2AEFC3E1F08BB8AF13C62685248D3
                SHA-256:3F4FB3CBD69B5C862E78A33733AC8EF1E17559F4E1032A1703C254E185C81282
                SHA-512:86AEBA49F66AC291D5889AAFF0BF4C1F1A090668A991F474E4D169190CEFE50D9B24918B8B80A0109038E310DCD45D1CCE972A757FF071799A25B4F2508FBE95
                Malicious:false
                Reputation:unknown
                URL:https://consent.trustarc.com/asset/notice.js/v/v1.7-2475
                Preview:function _truste_eu(){function t(){var g=truste.eu.bindMap;g.feat.isConsentRetrieved=g.feat.crossDomain?g.feat.isConsentRetrieved:!0;if(!t.done&&truste.util.isConsentResolved()){t.done=!0;var k=function(){var a=(new Date).getTime(),c=truste.util.readCookie(truste.eu.COOKIE_REPOP,!0),d=truste.eu.bindMap.popTime;return d&&d!=c&&a>=d}();k&&(g.feat.dropPopCookie=!0);truste.eu.ccpa.initialize();truste.eu.gpp.initialize();truste.eu.gpcDntAutoOptOut();truste.eu.gcm();var a=function(){var a=truste.eu.bindMap;.if(a.feat.consentResolution){var c=truste.util.readCookie(truste.eu.COOKIE_GDPR_PREF_NAME,!0);if(c&&(c=c.split(":"),!RegExp(a.behavior+"."+a.behaviorManager).test(c[2])&&(/(,us|none)/i.test(c[2])||"eu"==a.behaviorManager&&/implied.eu/i.test(c[2]))))return!0}return!1};truste.util.fireCustomEvent("truste-cookie",g.prefCookie);truste.eu.isGPCDNTEvent()?g.feat.dntShowUI&&"expressed"==g.behavior&&truste.util.executeOnCondition(function(){return g.prefCookie||g.feat.gpp.gppApplies&&null==truste
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text, with very long lines (29691)
                Category:downloaded
                Size (bytes):29818
                Entropy (8bit):4.785238501564548
                Encrypted:false
                SSDEEP:
                MD5:FFADC8D5ED0E13BFE3EA116D1F9DC409
                SHA1:326DDBABBBCBD58470EAFBE18CDF4471A36ECFFE
                SHA-256:06C43DAEA27DC1B20612479FB9DDDA4F6D6AE470B98F9218DCE806A9525E4716
                SHA-512:5270CE75E6EA4DDA0FACC1324FB02F25F2ACB976782B1C5DD6DB2E52B8B4A7B2BD5552E7628D3C1965D9A7FECADD89E63756E91F36A408D0621A869D398B1ED7
                Malicious:false
                Reputation:unknown
                URL:https://static.concursolutions.com/static/css/concur_default/cnqr-javascript/manifest-react.91ba6c438fdc2731b84958bfa3a82652.css
                Preview:/*!. *. * React -> Bootstrap Manifest file for all Gateway project styling.. * link all customization and overrides here.. *. */.react-datepicker-popper[data-placement^=bottom] .react-datepicker__triangle,.react-datepicker-popper[data-placement^=top] .react-datepicker__triangle,.react-datepicker__month-read-view--down-arrow,.react-datepicker__month-year-read-view--down-arrow,.react-datepicker__year-read-view--down-arrow{margin-left:-8px;position:absolute}.react-datepicker-popper[data-placement^=bottom] .react-datepicker__triangle,.react-datepicker-popper[data-placement^=bottom] .react-datepicker__triangle:before,.react-datepicker-popper[data-placement^=top] .react-datepicker__triangle,.react-datepicker-popper[data-placement^=top] .react-datepicker__triangle:before,.react-datepicker__month-read-view--down-arrow,.react-datepicker__month-read-view--down-arrow:before,.react-datepicker__month-year-read-view--down-arrow,.react-datepicker__month-year-read-view--down-arrow:before,.react-date
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text, with very long lines (3564)
                Category:downloaded
                Size (bytes):14807
                Entropy (8bit):5.47332492805629
                Encrypted:false
                SSDEEP:
                MD5:0847D60ACB92E6377F586BF989C9CE4F
                SHA1:2E4B0883A76B5E54C68AF64F4E9173E65B1D2E00
                SHA-256:90C62EEE43A93D412CFF1114D430B0AD9AC7D91D3D240825F5D80101A8EBD16E
                SHA-512:07ECECC6351B9344099CC6142813028F22B33C3156A74AF8FAF77E57C9947C00ACDEFC95F299B73F7CC5C6A1C424231F261C63A4271EC2678CD4115668838670
                Malicious:false
                Reputation:unknown
                URL:https://consent.trustarc.com/notice?domain=concursolutions.com&c=teconsent&language=en&js=nj&noticeType=bb&text=true&country=US
                Preview:function _truste_eumap(){truste=self.truste||{};truste.eu||(truste.eu={});truste.util||(truste.util={});.truste.util.error=function(p,l,o){o=o||{};var n=l&&l.toString()||"",e=o.caller||"";if(l&&l.stack){n+="\n"+l.stack.match(/(@|at)[^\n\r\t]*/)[0]+"\n"+l.stack.match(/(@|at)[^\n\r\t]*$/)[0].}truste.util.trace(p,n,o);if(truste.util.debug||!l&&!p){return}var d={apigwlambdaUrl:"https://api-js-log.trustarc.com/error",enableJsLog:false};.if(d.enableJsLog){delete o.caller;delete o.mod;delete o.domain;delete o.authority;o.msg=p;var m=new (self.XMLHttpRequest||self.XDomainRequest||self.ActiveXObject)("MSXML2.XMLHTTP.3.0");.m.open("POST",d.apigwlambdaUrl,true);m.setRequestHeader&&m.setRequestHeader("Content-type","application/json");.m.send(truste.util.getJSON({info:truste.util.getJSON(o)||"",error:n,caller:e}))}};truste.util.trace=function(){if(self.console&&console.log&&(this.debug||this.debug!==false&&(self.location.hostname.indexOf(".")<0||self.location.hostname.indexOf(".truste-svc.net")>0)
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text
                Category:downloaded
                Size (bytes):269
                Entropy (8bit):5.2436836969708605
                Encrypted:false
                SSDEEP:
                MD5:EB7AA83D87E8902943BAE4C3812FFDC3
                SHA1:A2C1972CBEA37C9A86222025EC17EFC025911E8D
                SHA-256:14FFEC426B58163581F38AFA90D68817CEDFE145480918EB10EC0F8969B5F8D0
                SHA-512:1AB34F0EF5FCCD063924434FDE4A24C3E1F8DE1E7700EB91F0A22D80D0222CDC117FD9F2041DFDD39A95FD14904F8CB53488AAF3467304D270E6A1662A3449EE
                Malicious:false
                Reputation:unknown
                URL:https://static.concursolutions.com/nui/signin/master/main.sapCnqrThemedCss.__concur_default__.bundle.ff07f6fb8d4ce74acda7.js
                Preview:(window.webpackJsonp=window.webpackJsonp||[]).push([[1],{1069:function(n,o,c){},1397:function(n,o,c){},260:function(n,o,c){},262:function(n,o,c){},280:function(n,o,c){}}]);.//# sourceMappingURL=main.sapCnqrThemedCss.__concur_default__.bundle.ff07f6fb8d4ce74acda7.js.map
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text
                Category:downloaded
                Size (bytes):266
                Entropy (8bit):5.299173174870971
                Encrypted:false
                SSDEEP:
                MD5:4AAC20A6A29B6954D2D908A4D60716F4
                SHA1:76DBEEF8F6813770F93024ED6872579AA6BB4540
                SHA-256:37D210863AB16A0BC0FE11F3D0DF6F549B5E3448C342174431910655197FBC6C
                SHA-512:F7B12FF9C7D7B57DB4569CC6B400365199FB0589191D0C4E52F08F250767E99CD7B6EA1CF82BCA393AF1036D8B62D621A88BDFA5865ECCF2DC7FBF11DB3F897F
                Malicious:false
                Reputation:unknown
                URL:https://static.concursolutions.com/nui/signin/master/main.sapCnqrThemedCss.__sap_fiori_3__.bundle.930f0740926b62ea64a9.js
                Preview:(window.webpackJsonp=window.webpackJsonp||[]).push([[3],{1074:function(n,o,c){},1402:function(n,o,c){},267:function(n,o,c){},275:function(n,o,c){},285:function(n,o,c){}}]);.//# sourceMappingURL=main.sapCnqrThemedCss.__sap_fiori_3__.bundle.930f0740926b62ea64a9.js.map
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text
                Category:downloaded
                Size (bytes):270
                Entropy (8bit):5.29115284389302
                Encrypted:false
                SSDEEP:
                MD5:B2E163064BF8C8A30AAA86EB3D85E669
                SHA1:82379456F3983D828EB04ACD0D526D25B04070C2
                SHA-256:E20FC1F71DDF594D85E5A6BD3164863C0C0363921726EB58821441A8609981EF
                SHA-512:E7E3F0585B2027C7571E238243527E441FFF90A70EB2B565F0AD161AE3AD7A08C6330186B0C4523D4866517EB300807D9C7D62F5FF4819D6B1E54385B73D58DE
                Malicious:false
                Reputation:unknown
                URL:https://static.concursolutions.com/nui/signin/master/main.sapCnqrThemedCss.__sap_fiori_3_hcw__.bundle.ca453d1d61af79632500.js
                Preview:(window.webpackJsonp=window.webpackJsonp||[]).push([[6],{1073:function(n,o,c){},1401:function(n,o,c){},266:function(n,o,c){},274:function(n,o,c){},284:function(n,o,c){}}]);.//# sourceMappingURL=main.sapCnqrThemedCss.__sap_fiori_3_hcw__.bundle.ca453d1d61af79632500.js.map
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:Web Open Font Format, TrueType, length 36128, version 1.0
                Category:downloaded
                Size (bytes):36128
                Entropy (8bit):7.986318378818125
                Encrypted:false
                SSDEEP:
                MD5:4CF1145EFC38B73EE116D1E4C2659889
                SHA1:D79867F0DCE0D76A80405B7646D18626074154D7
                SHA-256:978DEFEE472B643514989C409FE88FA5DB01B23F6CE9EBEB6FD2E4D1944A1FF5
                SHA-512:2F9B7BE82CA5953D46B146C6FBEC341B05E51C21F42CE2A866EA55E4CB192FA2C79765FEDDA693721696C641F50ECA0402B30C6029FEA74D4DA5C3C85DE0D0F0
                Malicious:false
                Reputation:unknown
                URL:https://static.concursolutions.com/static/fonts/OpenSans-Light-20150604.woff
                Preview:wOFF....... ......&X........................FFTM............l@.sGDEF.............'.yGPOS...........X..S.GSUB.......8...P.<.KOS/2.......^...`.w..cmap...p........TRB.cvt ...x...8...8....fpgm...........eS./.gasp...d............glyf...l..p....@MI.shead...\...3...6..4phhea.......!...$....hmtx..............kloca............f.Lmaxp....... ... ....name.......#....c...post............."uOprep...X.......;..}webf..............Up.........hU......B.......g....................r............x..{l.....O{J.R.4....GE@VY).`...c.Bi;ZO.].K.@..........x..m.\..S..mzT..c.1.......f....y.{J.\F....y.{...y.....'"i..I...{]r........d...K..?\.,..}.X.....w...A..w1)...jq.g..].k..*.+.5.Lj.......L..Tf\S....+SC.i.?..j.kzj..m..C..3....Ck.3...r....teF_.._.iUg.y.W..Wf:...kj..0k..dZC.5=.....pU6\....<+.~fBS...w.r4.2.JO...4\...+>...#..U2Wn.y...2Y..t.....bA..2...r...n..X.k.g..A.........w;s...v.S.4......0.........<../.K.*....5..i.=B{..o..>....8(...p.>b...1|._..n.T...-.].L..gS`*...r...m....p.
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text, with very long lines (28899)
                Category:downloaded
                Size (bytes):238699
                Entropy (8bit):5.180920582081812
                Encrypted:false
                SSDEEP:
                MD5:DB17887F43B86D709A961C12FA468B05
                SHA1:F39F7DB0B0D0327A49F6D17E697C05FC91D56ADA
                SHA-256:91E638FC89F2D7547941216244AD413915409BC7D93E6F52307F7941A919C0BF
                SHA-512:8627104AA9EB236D9F85283B36F2566ECEDA066685EAB9A9D716B0125C93BF6C5AEBDEC626FDF537B7A554FF4A7779A3C7C3C4CAE60797ADF95B12F6895D264B
                Malicious:false
                Reputation:unknown
                URL:https://static.concursolutions.com/nui/signin/master/vendor.68359358b46f42b5ce34.css
                Preview:.sapcnqr-modal{-webkit-overflow-scrolling:touch;background:none;border:0;bottom:0;box-sizing:border-box;color:#1d2d3e;color:var(--sapTextColor,#1d2d3e);display:block;font-family:"72-Customfull";font-family:var(--cnqrFontFamily_SansSerif,"72-Customfull");font-size:.875rem;font-size:var(--sapFontSize,.875rem);font-weight:400;left:0;line-height:1.42857143;margin:0;opacity:1;outline:0;overflow:hidden;overflow-x:hidden;overflow-y:auto;padding:0;position:fixed;right:0;text-shadow:none;text-transform:none;top:0;z-index:1050}.sapcnqr-modal:after,.sapcnqr-modal:before{box-sizing:inherit;content:none;font-size:inherit}.sapcnqr-modal__backdrop{background:none;border:0;bottom:0;box-sizing:border-box;color:#1d2d3e;color:var(--sapTextColor,#1d2d3e);font-family:"72-Customfull";font-family:var(--cnqrFontFamily_SansSerif,"72-Customfull");font-size:.875rem;font-size:var(--sapFontSize,.875rem);font-weight:400;left:0;line-height:1.42857143;margin:0;opacity:1;padding:0;right:0;text-shadow:none;text-transfo
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text, with no line terminators
                Category:downloaded
                Size (bytes):40
                Entropy (8bit):4.203055907333275
                Encrypted:false
                SSDEEP:
                MD5:7CEA8473B3BFC01D21303C22EC786306
                SHA1:3D42FF08E8249C97FEC82A6DB582C0331A26ECCA
                SHA-256:FFE55727CBBA3F51C294F5DED7C4464E4C23330EEE3A064592A8AE88ADF19DC6
                SHA-512:57649638CF412DF352A57A781267702D10605E45701D2087A63C6D4D3320F528E3DAD2B549627412B9E9E09A6CEDB659F71564895D2C1D22C34BACF7E57690F3
                Malicious:false
                Reputation:unknown
                URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISFwlTac6uz9CShBIFDcQ6yq0SBQ3OQUx6?alt=proto
                Preview:ChwKDQ3EOsqtGgQIVhgCIAEKCw3OQUx6GgQISxgC
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text
                Category:downloaded
                Size (bytes):271
                Entropy (8bit):5.298238253907056
                Encrypted:false
                SSDEEP:
                MD5:88A1B641F6A2816781E15B797B5B0079
                SHA1:B95D02F2C70422606FEC5520404BF5B944A60314
                SHA-256:C410BBEFE1D81514DA143AC140EA7AF93728FA4FE7F157F1A797E919490E1D5E
                SHA-512:E7451D5BAED8FA67646986C63958CDFBE5F2E179286134F2694970B00CD70C01D34F9EC1A2E09DEDE91427F9FEE65386BAFCFAE38C6316862FADD4F11B932F64
                Malicious:false
                Reputation:unknown
                URL:https://static.concursolutions.com/nui/signin/master/main.sapCnqrThemedCss.__sap_horizon_dark__.bundle.9a152ff43dfbf0c04e8f.js
                Preview:(window.webpackJsonp=window.webpackJsonp||[]).push([[8],{1075:function(n,o,c){},1403:function(n,o,c){},268:function(n,o,c){},276:function(n,o,c){},286:function(n,o,c){}}]);.//# sourceMappingURL=main.sapCnqrThemedCss.__sap_horizon_dark__.bundle.9a152ff43dfbf0c04e8f.js.map
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text, with very long lines (57516)
                Category:downloaded
                Size (bytes):1572008
                Entropy (8bit):5.596724765981732
                Encrypted:false
                SSDEEP:
                MD5:FFE6A229EEC7160C412B3C6FC97AF218
                SHA1:F39852C7A40357272ED81CF3A02FA95472D3BCAC
                SHA-256:82ACB48FBBDBF1F2479B618C579068F40E50F3BF0ACC85000E1D880F3773E179
                SHA-512:CE6CDB12E8EE13963ADCCF068803246F123FD37A7BA3D8B72272D3F0203138A3FF426548F2F951B1CDAA29CECF8A3F917A7EB6ACF1C6A73DE29631382C618C2C
                Malicious:false
                Reputation:unknown
                URL:https://static.concursolutions.com/nui/signin/master/vendor.bundle.234a78bb32483bba4161.js
                Preview:(window.webpackJsonp=window.webpackJsonp||[]).push([[11],[function(e,t,n){"use strict";e.exports=n(650)},function(e,t,n){e.exports=n(812)()},function(e,t){e.exports=function(e){return e&&e.__esModule?e:{default:e}},e.exports.__esModule=!0,e.exports.default=e.exports},function(e,t){e.exports=function(e){return e&&e.__esModule?e:{default:e}},e.exports.default=e.exports,e.exports.__esModule=!0},function(e,t,n){(function(e){e.exports=function(){"use strict";var t,r;function a(){return t.apply(null,arguments)}function o(e){return e instanceof Array||"[object Array]"===Object.prototype.toString.call(e)}function i(e){return null!=e&&"[object Object]"===Object.prototype.toString.call(e)}function l(e,t){return Object.prototype.hasOwnProperty.call(e,t)}function u(e){if(Object.getOwnPropertyNames)return 0===Object.getOwnPropertyNames(e).length;var t;for(t in e)if(l(e,t))return!1;return!0}function s(e){return void 0===e}function c(e){return"number"==typeof e||"[object Number]"===Object.prototype.t
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text
                Category:downloaded
                Size (bytes):270
                Entropy (8bit):5.298094706785343
                Encrypted:false
                SSDEEP:
                MD5:869A9EED04FC50E77669C4F7E9D302CD
                SHA1:621E097C4ED67579C2F5CEEFEC5DF217DFD35B13
                SHA-256:980005D8ED9262BBAA621A253567E40A7A2DA95C1F0F6463F07CAF38CF6DF36E
                SHA-512:B1E78628DB1188CB6C593F885FDC451415D1CA8F6CE7EC3FC80A40EB98BB45B0F25E21726F975617D6AB3EA4D823DB223CFB24B4C568789E5554B5B8C2C934F7
                Malicious:false
                Reputation:unknown
                URL:https://static.concursolutions.com/nui/signin/master/main.sapCnqrThemedCss.__sap_fiori_3_hcb__.bundle.42cf0e42dbd398e76178.js
                Preview:(window.webpackJsonp=window.webpackJsonp||[]).push([[5],{1072:function(n,o,c){},1400:function(n,o,c){},265:function(n,o,c){},273:function(n,o,c){},283:function(n,o,c){}}]);.//# sourceMappingURL=main.sapCnqrThemedCss.__sap_fiori_3_hcb__.bundle.42cf0e42dbd398e76178.js.map
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text
                Category:downloaded
                Size (bytes):136507
                Entropy (8bit):4.947420517878599
                Encrypted:false
                SSDEEP:
                MD5:E3852B935B2D19AF13DEA4C001B8589E
                SHA1:4DFE2754E162AB069A75BC77A31E45F591474F5C
                SHA-256:7A4738FCAB3845C0436CFE57D179BA76CAC857248E1D3D16E44F50B09E393B3C
                SHA-512:6AB9948CFD58D0432E4EC08606F8C6B3107BDCFE9464F74C85B0BA2976DC8E267738093E7FDA094E4FFD56F5C04327F679E39E56CE0E7D35D388B84ED021AD48
                Malicious:false
                Reputation:unknown
                URL:https://js-agent.newrelic.com/nr-spa-1210.js
                Preview:// prelude.js edited from: https://github.com/substack/browser-pack/blob/master/prelude.js..// modules are defined as an array.// [ module function, map of requires ].//.// map of requireuires is short require name -> numeric require.//.// anything defined in a previous bundle is accessed via the.// orig method which is the require for previous bundles..(function (modules, cache, entry) { // eslint-disable-line no-extra-parens. // Save the require from previous bundle to this closure if any. var previousRequire = typeof __nr_require === 'function' && __nr_require.. function newRequire (name, jumped) {. if (!cache[name]) {. if (!modules[name]) {. // if we cannot find the the module within our internal map or. // cache jump to the current global require ie. the last bundle. // that was added to the page.. var currentRequire = typeof __nr_require === 'function' && __nr_require. if (!jumped && currentRequire) return currentRequire(name, true)..
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:Unicode text, UTF-8 text, with very long lines (42913)
                Category:downloaded
                Size (bytes):3709264
                Entropy (8bit):5.229471562795198
                Encrypted:false
                SSDEEP:
                MD5:EBBAC5D88A146F128D3E50A8EEB49B2C
                SHA1:8EE9A076DB5B57A5443A228A4D012D572A96799C
                SHA-256:B43C9E347AD551AD74418F6D44534977E09B92FFD6110D03AC90A4BE95CB09AD
                SHA-512:F98AAC51CC0030D62410D0E2BA46DC56ED13C9E5EA01F86574B3CBE9DCB58F0A6977DB4CA0208366DBD182AB36AD85DE869925708EA39A2F3C5BBD1AC2032759
                Malicious:false
                Reputation:unknown
                URL:https://static.concursolutions.com/coreui/ui-floorplans/ui-floorplans-v2.18.6/ui-floorplans-v2.18.6.js
                Preview:!function(e){function n(n){for(var a,c,s=n[0],t=n[1],o=0,i=[];o<s.length;o++)c=s[o],Object.prototype.hasOwnProperty.call(r,c)&&r[c]&&i.push(r[c][0]),r[c]=0;for(a in t)Object.prototype.hasOwnProperty.call(t,a)&&(e[a]=t[a]);for(p&&p(n);i.length;)i.shift()()}var a={},r={34:0};function c(n){if(a[n])return a[n].exports;var r=a[n]={i:n,l:!1,exports:{}};return e[n].call(r.exports,r,r.exports,c),r.l=!0,r.exports}c.e=function(e){var n=[],a=r[e];if(0!==a)if(a)n.push(a[2]);else{var s=new Promise((function(n,c){a=r[e]=[n,c]}));n.push(a[2]=s);var t,o=document.createElement("script");o.charset="utf-8",o.timeout=120,c.nc&&o.setAttribute("nonce",c.nc),o.src=function(e){return c.p+""+({0:"translations/ui-floorplans-en",1:"translations/ui-floorplans-bg",2:"translations/ui-floorplans-cs",3:"translations/ui-floorplans-da",4:"translations/ui-floorplans-de",5:"translations/ui-floorplans-el",6:"translations/ui-floorplans-en-gb",7:"translations/ui-floorplans-es",8:"translations/ui-floorplans-es-la",9:"transla
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:JPEG image data, Exif Standard: [\012- TIFF image data, big-endian, direntries=3], baseline, precision 8, 1200x800, components 3
                Category:dropped
                Size (bytes):160109
                Entropy (8bit):7.886851529396097
                Encrypted:false
                SSDEEP:
                MD5:74A6B3AFA8EB2D1E946F479295BF63EC
                SHA1:E50131BB02033799B167CE67A5C7B32DC82D91BF
                SHA-256:A753141268763162F3C9ADD173173366713DC3416A48BB8ABA1EB12FD4F1CD1A
                SHA-512:205E68A4B75D21AD04F2D045BC549384A3552B1F8678C29DB9DB440F2EBA06B79B3FF9AA02204519201A1BAA647B3D6E54399F1C0F2D85B14137B9E028FDC74E
                Malicious:false
                Reputation:unknown
                Preview:......Adobe.d.........Exif..MM.*.......i.........>.......$...^...........2..............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:Web Open Font Format, TrueType, length 44808, version 1.0
                Category:downloaded
                Size (bytes):44808
                Entropy (8bit):6.461977890832103
                Encrypted:false
                SSDEEP:
                MD5:1AC12AD7F4D8619A4B5E88BFC6B43CE5
                SHA1:86F09FA3A96792490581AC6ABE230A514984604E
                SHA-256:A319C6EEBC9B024DDC6D2AF65905731520B8F3DDA2C0634C2A1A51BCFBE7D125
                SHA-512:9B52F37C85A04D10FF9BC9B295E01F4DC10841283AC262AFD0F719848025A5C95B4ABE9F80568573940FDE066E580C7FA91482712BE81DC0852E3F8D3C425CDF
                Malicious:false
                Reputation:unknown
                URL:https://static.concursolutions.com/static/fonts/concur-icons-20220929.woff
                Preview:wOFF........................................OS/2.......`...`...Ocmap...h...d...d...`gasp................glyf.............Kc.head...x...6...641.yhhea.......$...$....hmtx.......,...,?.W.loca...............maxp....... ... ...Gname............Dl..post....... ... .......$.......................3...................................@.........@...@............... .................................H............. ............... .............. . ...........................................79..................79..................79...........[.../.7.;.J.S.v...............<.@.D...7..38.9.2654&'..5463:.32......'1"..........#"&'..3.#'#.73'#..32........+...32654&+..47>.7632.....#"....3267...#"'..'&5.47>.7632............#"'..'&5!4&#"....3.65..3.>.712...#.4&#...1.%47>.7632.....#"....3267...#*.#1"&5..3...3>.71.3.#5...1"&5..3.>.3:.3#3."&#...#.%"&54632..17..#"............32671'..#8.9.7"....326514&#.!.!..!.._.Q3+8;8L.q\...Cq".W.J,(*=7K.lw\v ...w..*.,L.A..H.[...B**+Q.U:10;V.1..F//6ki.w.12@DEA26.u.nk8//E......
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:MS Windows icon resource - 4 icons, 64x64, 32 bits/pixel, 32x32, 32 bits/pixel
                Category:dropped
                Size (bytes):32988
                Entropy (8bit):2.947399306406421
                Encrypted:false
                SSDEEP:
                MD5:C2F393E30106EA192E2D833F508BAB61
                SHA1:6C906E5B343C8F8334C956F0D63F5225BF903E85
                SHA-256:28A6DC2C81D62175BDE8BCC417D63DF4AE5DF90DFBF9400729F95B9D99C4ACF8
                SHA-512:8002CF550BB1FE82D03D1D3478818E97B181F74EB78EEB2B013189BFAA56531C0A2A3C6C86AA996A2E686E827E1AE7D8CFA2317459125CE67ECA261B3FB9E13A
                Malicious:false
                Reputation:unknown
                Preview:......@@.... .(@..F... .... .(...n@........ .(....P........ .(....Y..(...@......... ...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text, with very long lines (48259), with no line terminators
                Category:downloaded
                Size (bytes):48259
                Entropy (8bit):5.290989491522736
                Encrypted:false
                SSDEEP:
                MD5:F5577B21BCAA2F6780837EF7D48575A7
                SHA1:7330E0CF6425E0A1F673CCE6A83B2F1EAF359848
                SHA-256:42BD8913EA079A6C55E100741AF59BCB2CD7E6BD9847425965A98103323E4F33
                SHA-512:22E6652A6C4D399C27115229042A91E9D5A51467D5B33F4720908983F2AD746129EF71A083630FC35C687E703356190D0299AFB50BA47C630DBD4D0F23E2BB49
                Malicious:false
                Reputation:unknown
                URL:https://static.concursolutions.com/newrelic/spa/1210/loader.js
                Preview:var nrbElement=document.getElementById("__nrb");if(nrbElement){var nrb=JSON.parse(nrbElement.innerText)}window.CNQREUM=window.CNQREUM||nrb||{};CNQREUM.agentLocation=CNQREUM.agentLocation||"static.concursolutions.com/newrelic";CNQREUM.beacon=CNQREUM.beacon||"eum.concursolutions.com";CNQREUM.errorBeacon=CNQREUM.errorBeacon||CNQREUM.errBeacon||"eum.concursolutions.com";window.NREUM=window.NREUM||{};NREUM.init=NREUM.init||{distributed_tracing:{enabled:CNQREUM.distributedTracing||false,cors_use_newrelic_header:CNQREUM.corsNewrelicHeader||false,cors_use_tracecontext_headers:CNQREUM.corsTraceContextHeaders||false,allowed_origins:CNQREUM.allowedOrigins?CNQREUM.allowedOrigins.split(","):[]},privacy:{cookies_enabled:CNQREUM.cookiesEnabled||false}};window.NREUM||(NREUM={});__nr_require=function(modules,cache,entry){function newRequire(name){if(!cache[name]){var m=cache[name]={exports:{}};modules[name][0].call(m.exports,function(x){var id=modules[name][1][x];return newRequire(id||x)},m,m.exports)}
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text, with very long lines (24642)
                Category:downloaded
                Size (bytes):24712
                Entropy (8bit):4.902219803697988
                Encrypted:false
                SSDEEP:
                MD5:AF24311372E75B409D9C31EFC1889BE3
                SHA1:8304EE2010FF86C5445B6F4EED92CD1E734C197E
                SHA-256:B3E05409E18DBC9731007462E718202F1BBD9CC9BAFBC9D22625B4171B8C21CB
                SHA-512:5A256DDE286F6BC8C1AEE4ED19D843436C0FF885BCD674D3ACCB550033F5063D0D9365C5D476E56D296DC0406B78CD6503E4D9F4AEF3E4149FEBEBA3E6E1A8B8
                Malicious:false
                Reputation:unknown
                URL:https://static.concursolutions.com/nui/signin/master/translations/main.bundle.3275a9b5d17d705928cb.en.30299.js
                Preview:!function(){window.NUI_TRANSLATIONS=window.NUI_TRANSLATIONS||{};var e={"Branding.LogoForCompany":{text:"Logo for {0}",legacyId:"branding.logoforcompany"},"Common.Add":{text:"Add",legacyId:"common.add"},"Common.Back":{text:"Back",legacyId:"common.back"},"Common.Cancel":{text:"Cancel",legacyId:"common.cancel"},"Common.Close":{text:"Close",legacyId:"common.close"},"Common.Delete":{text:"Delete",legacyId:"common.delete"},"Common.DisplayFullNameLouserzed":{text:"{1} {2} {0}",legacyId:"common.displayfullnamelouserzed"},"Common.Error":{text:"Error",legacyId:"common.error"},"Common.ErrorID":{text:"Error ID: {errorId}",legacyId:"companyadmin.common.errorid"},"Common.Expand":{text:"Expand",legacyId:"common.expand"},"Common.Next":{text:"Next",legacyId:"common.next"},"Common.OK":{text:"OK",legacyId:"common.ok"},"Common.PleaseCorrect":{text:"Please correct the errors above",legacyId:"login.resetpassword.pleasecorrect"},"Common.PleaseWait":{text:"Please wait...",legacyId:"travelavailabilityjs.please
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text
                Category:downloaded
                Size (bytes):270
                Entropy (8bit):5.304531888599377
                Encrypted:false
                SSDEEP:
                MD5:8A39B1F481CA920A3AC2D09D15556B75
                SHA1:0F9117E607B42445EE7BC69EA55E8592447CD5CB
                SHA-256:F4A89ECC7875627B3DA0AEED6B6CDE46FBF061EF8BA7ACCA87F8A97BA2DBBA29
                SHA-512:5AFF0EEFB94C014158D1A97CA7EB05E44080A26F70661E8ADF79BB301569849388CE36F144CFAADA6F9E4ED7D3103A891D6C94C0AA4067C33F4C0034D4B25341
                Malicious:false
                Reputation:unknown
                URL:https://static.concursolutions.com/nui/signin/master/main.sapCnqrThemedCss.__sap_horizon_hcb__.bundle.6aaf89d4b33511f4ae60.js
                Preview:(window.webpackJsonp=window.webpackJsonp||[]).push([[9],{1076:function(n,o,c){},1404:function(n,o,c){},269:function(n,o,c){},277:function(n,o,c){},287:function(n,o,c){}}]);.//# sourceMappingURL=main.sapCnqrThemedCss.__sap_horizon_hcb__.bundle.6aaf89d4b33511f4ae60.js.map
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text
                Category:downloaded
                Size (bytes):271
                Entropy (8bit):5.264885960617427
                Encrypted:false
                SSDEEP:
                MD5:732021CA4D774DC93DF80B7972AC88CE
                SHA1:30123FC51CF9ADE7735AAF5741EB60F091F71607
                SHA-256:EC56EC178BDF6D833009B28286CFF9FD804BA4CA81A956F532997C8046F7CADB
                SHA-512:D3299989E641F6B018E30667F742C835CCEAA37EC05B08957F138C5C47E547C5267B09BA20DA7F782A207A9234E3A0007502BEAA74E65A7FB95F4B22C602A7C9
                Malicious:false
                Reputation:unknown
                URL:https://static.concursolutions.com/nui/signin/master/main.sapCnqrThemedCss.__sap_horizon_hcw__.bundle.33edda1b502c1bdee3c9.js
                Preview:(window.webpackJsonp=window.webpackJsonp||[]).push([[10],{1077:function(n,o,c){},1405:function(n,o,c){},270:function(n,o,c){},278:function(n,o,c){},288:function(n,o,c){}}]);.//# sourceMappingURL=main.sapCnqrThemedCss.__sap_horizon_hcw__.bundle.33edda1b502c1bdee3c9.js.map
                No static file info