Edit tour

Windows Analysis Report
https://viewer.pandasuite.com/kBYRe1Qf

Overview

General Information

Sample URL:https://viewer.pandasuite.com/kBYRe1Qf
Analysis ID:1456922

Detection

HtmlDropper, HTMLPhisher
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected phishing page
Yara detected Html Dropper
Yara detected HtmlPhish10
Phishing site detected (based on image similarity)
Phishing site or detected (based on various text indicators)
HTML body contains low number of good links
HTML page contains hidden URLs or javascript code
HTML title does not match URL
Invalid 'sign-in options' or 'sign-up' link found
Stores files to the Windows start menu directory

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64_ra
  • chrome.exe (PID: 6372 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://viewer.pandasuite.com/kBYRe1Qf MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 3992 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1960,i,1790520402820376115,2995315890100160157,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
SourceRuleDescriptionAuthorStrings
7.12.pages.csvJoeSecurity_HtmlDropper_3Yara detected Html DropperJoe Security
    7.12.pages.csvJoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security
      No Sigma rule has matched
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results

      Phishing

      barindex
      Source: https://viewer.pandasuite.comLLM: Score: 8 brands: Microsoft Reasons: The URL 'https://viewer.pandasuite.com' does not match the legitimate domain 'microsoft.com' associated with the brand Microsoft, which is indicated by the logo on the page. The page uses social engineering techniques by displaying a message about a new document to view, which is a common phishing tactic to lure users into clicking a link. The 'Click to Read Messages' button is suspicious as it may lead to a phishing page. The domain 'pandasuite.com' is not related to Microsoft, raising further suspicion. There is no login form or captcha present on the page. DOM: 3.5.pages.csv
      Source: https://team.losenmalkshaps.collegeLLM: Score: 9 brands: Microsoft Reasons: The URL 'https://team.losenmalkshaps.college' is highly suspicious as it does not match the legitimate domain name 'microsoft.com' associated with Microsoft. The image resembles a legitimate Microsoft login page, which is a common tactic used in phishing attacks to mislead users. The presence of a login form asking for email or phone information further raises suspicion. Additionally, the domain name 'losenmalkshaps.college' is unusual and not associated with Microsoft, indicating a high likelihood of phishing. Social engineering techniques are evident in the attempt to mimic a legitimate Microsoft login page. DOM: 7.12.pages.csv
      Source: Yara matchFile source: 7.12.pages.csv, type: HTML
      Source: https://team.losenmalkshaps.college/67bdcd75a5cc8008d614956f841adf2d666b69d51ad61LOG67bdcd75a5cc8008d614956f841adf2d666b69d51ad62Matcher: Found strong image similarity, brand: MICROSOFT
      Source: Chrome DOM: 5.8OCR Text: : Verifying... CLOUDFLARE Microsoft
      Source: Chrome DOM: 6.10OCR Text: . Verifying... CLOUDFLARE Microsoft
      Source: https://team.losenmalkshaps.college/67bdcd75a5cc8008d614956f841adf2d666b69d51ad61LOG67bdcd75a5cc8008d614956f841adf2d666b69d51ad62HTTP Parser: Number of links: 0
      Source: https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/turnstile/if/ov2/av0/rcv0/0/wqwf3/0x4AAAAAAAcfS95GLj0rfuwZ/auto/normalHTTP Parser: Base64 decoded: http://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/turnstile/if/ov2/av0/rcv0/0/wqwf3/0x4AAAAAAAcfS95GLj0rfuwZ/auto/normal
      Source: https://team.losenmalkshaps.college/67bdcd75a5cc8008d614956f841adf2d666b69d51ad61LOG67bdcd75a5cc8008d614956f841adf2d666b69d51ad62HTTP Parser: Title: f4312395f688176bd23f43bc845620c9666b69d51ad49 does not match URL
      Source: https://team.losenmalkshaps.college/67bdcd75a5cc8008d614956f841adf2d666b69d51ad61LOG67bdcd75a5cc8008d614956f841adf2d666b69d51ad62HTTP Parser: Invalid link: get a new Microsoft account
      Source: https://data.pandasuite.com/viewer/2.27.28/666b1a299ecc316c00000ee9/?X-PS-Token=7c0c0f60-677d-4ccd-9329-ca2b24dd5c19HTTP Parser: No favicon
      Source: https://data.pandasuite.com/viewer/2.27.28/666b1a299ecc316c00000ee9/?X-PS-Token=7c0c0f60-677d-4ccd-9329-ca2b24dd5c19HTTP Parser: No favicon
      Source: https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/turnstile/if/ov2/av0/rcv0/0/wqwf3/0x4AAAAAAAcfS95GLj0rfuwZ/auto/normalHTTP Parser: No favicon
      Source: https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/turnstile/if/ov2/av0/rcv0/0/wqwf3/0x4AAAAAAAcfS95GLj0rfuwZ/auto/normalHTTP Parser: No favicon
      Source: https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/turnstile/if/ov2/av0/rcv0/0/wqwf3/0x4AAAAAAAcfS95GLj0rfuwZ/auto/normalHTTP Parser: No favicon
      Source: https://team.losenmalkshaps.college/67bdcd75a5cc8008d614956f841adf2d666b69d51ad61LOG67bdcd75a5cc8008d614956f841adf2d666b69d51ad62HTTP Parser: No favicon
      Source: https://team.losenmalkshaps.college/67bdcd75a5cc8008d614956f841adf2d666b69d51ad61LOG67bdcd75a5cc8008d614956f841adf2d666b69d51ad62HTTP Parser: No <meta name="author".. found
      Source: https://team.losenmalkshaps.college/67bdcd75a5cc8008d614956f841adf2d666b69d51ad61LOG67bdcd75a5cc8008d614956f841adf2d666b69d51ad62HTTP Parser: No <meta name="copyright".. found
      Source: unknownHTTPS traffic detected: 23.211.8.90:443 -> 192.168.2.16:49713 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 23.211.8.90:443 -> 192.168.2.16:49717 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 40.68.123.157:443 -> 192.168.2.16:49742 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 40.68.123.157:443 -> 192.168.2.16:49801 version: TLS 1.2
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownTCP traffic detected without corresponding DNS query: 2.23.209.149
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownTCP traffic detected without corresponding DNS query: 23.211.8.90
      Source: unknownTCP traffic detected without corresponding DNS query: 23.211.8.90
      Source: unknownTCP traffic detected without corresponding DNS query: 23.211.8.90
      Source: unknownTCP traffic detected without corresponding DNS query: 23.211.8.90
      Source: unknownTCP traffic detected without corresponding DNS query: 23.211.8.90
      Source: unknownTCP traffic detected without corresponding DNS query: 23.211.8.90
      Source: unknownTCP traffic detected without corresponding DNS query: 23.211.8.90
      Source: unknownTCP traffic detected without corresponding DNS query: 23.211.8.90
      Source: unknownTCP traffic detected without corresponding DNS query: 23.211.8.90
      Source: unknownTCP traffic detected without corresponding DNS query: 23.211.8.90
      Source: unknownTCP traffic detected without corresponding DNS query: 23.211.8.90
      Source: unknownTCP traffic detected without corresponding DNS query: 23.211.8.90
      Source: unknownTCP traffic detected without corresponding DNS query: 23.211.8.90
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
      Source: unknownTCP traffic detected without corresponding DNS query: 23.211.8.90
      Source: unknownTCP traffic detected without corresponding DNS query: 23.211.8.90
      Source: unknownTCP traffic detected without corresponding DNS query: 23.211.8.90
      Source: unknownTCP traffic detected without corresponding DNS query: 23.211.8.90
      Source: unknownTCP traffic detected without corresponding DNS query: 23.211.8.90
      Source: unknownTCP traffic detected without corresponding DNS query: 23.211.8.90
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
      Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
      Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
      Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
      Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
      Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
      Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
      Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
      Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
      Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
      Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
      Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
      Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
      Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
      Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
      Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
      Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
      Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
      Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
      Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
      Source: global trafficDNS traffic detected: DNS query: viewer.pandasuite.com
      Source: global trafficDNS traffic detected: DNS query: app.link
      Source: global trafficDNS traffic detected: DNS query: www.google.com
      Source: global trafficDNS traffic detected: DNS query: api2.branch.io
      Source: global trafficDNS traffic detected: DNS query: pandasuite.com
      Source: global trafficDNS traffic detected: DNS query: data.pandasuite.com
      Source: global trafficDNS traffic detected: DNS query: team.losenmalkshaps.college
      Source: global trafficDNS traffic detected: DNS query: code.jquery.com
      Source: global trafficDNS traffic detected: DNS query: challenges.cloudflare.com
      Source: global trafficDNS traffic detected: DNS query: a.nel.cloudflare.com
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
      Source: unknownNetwork traffic detected: HTTP traffic on port 49789 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49800 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49795 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
      Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
      Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
      Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
      Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
      Source: unknownNetwork traffic detected: HTTP traffic on port 49790 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
      Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49805 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
      Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
      Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
      Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49788
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49787
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49786
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
      Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49807 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49791 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
      Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49802 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
      Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
      Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
      Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49797 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49801 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
      Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
      Source: unknownNetwork traffic detected: HTTP traffic on port 49786 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
      Source: unknownNetwork traffic detected: HTTP traffic on port 49792 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
      Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49803 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49798 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49787 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49688 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49799
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49798
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49797
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49795
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49794
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49793
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49792
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49791
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49790
      Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49789
      Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49799 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49810 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49810
      Source: unknownNetwork traffic detected: HTTP traffic on port 49788 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49794 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49809
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49807
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49805
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49804
      Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49803
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49802
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49801
      Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49800
      Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49809 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49804 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
      Source: unknownHTTPS traffic detected: 23.211.8.90:443 -> 192.168.2.16:49713 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 23.211.8.90:443 -> 192.168.2.16:49717 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 40.68.123.157:443 -> 192.168.2.16:49742 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 40.68.123.157:443 -> 192.168.2.16:49801 version: TLS 1.2
      Source: classification engineClassification label: mal72.phis.troj.win@17/45@36/198
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
      Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://viewer.pandasuite.com/kBYRe1Qf
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1960,i,1790520402820376115,2995315890100160157,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1960,i,1790520402820376115,2995315890100160157,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: Window RecorderWindow detected: More than 3 window changes detected

      Data Obfuscation

      barindex
      Source: Yara matchFile source: 7.12.pages.csv, type: HTML
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
      Registry Run Keys / Startup Folder
      1
      Process Injection
      1
      Masquerading
      OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      Registry Run Keys / Startup Folder
      1
      Process Injection
      LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
      Non-Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      https://viewer.pandasuite.com/kBYRe1Qf0%Avira URL Cloudsafe
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      about:blank0%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      app.link
      18.239.18.118
      truefalse
        unknown
        a.nel.cloudflare.com
        35.190.80.1
        truefalse
          unknown
          data-prod.pandasuite.com
          35.181.135.186
          truefalse
            unknown
            code.jquery.com
            151.101.194.137
            truefalse
              unknown
              team.losenmalkshaps.college
              104.21.84.85
              truetrue
                unknown
                challenges.cloudflare.com
                104.17.2.184
                truefalse
                  unknown
                  pandasuite.com
                  15.188.182.174
                  truetrue
                    unknown
                    www.google.com
                    142.250.186.164
                    truefalse
                      unknown
                      api2.branch.io
                      108.156.60.103
                      truefalse
                        unknown
                        viewer.pandasuite.com
                        unknown
                        unknowntrue
                          unknown
                          data.pandasuite.com
                          unknown
                          unknownfalse
                            unknown
                            NameMaliciousAntivirus DetectionReputation
                            https://viewer.pandasuite.com/kBYRe1Qf#!/true
                              unknown
                              https://data.pandasuite.com/viewer/2.27.28/666b1a299ecc316c00000ee9/?X-PS-Token=7c0c0f60-677d-4ccd-9329-ca2b24dd5c19false
                                unknown
                                https://viewer.pandasuite.com/kBYRe1Qf#!/publication?type=desktoptrue
                                  unknown
                                  https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/turnstile/if/ov2/av0/rcv0/0/wqwf3/0x4AAAAAAAcfS95GLj0rfuwZ/auto/normalfalse
                                    unknown
                                    https://team.losenmalkshaps.college/true
                                      unknown
                                      about:blankfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://team.losenmalkshaps.college/67bdcd75a5cc8008d614956f841adf2d666b69d51ad61LOG67bdcd75a5cc8008d614956f841adf2d666b69d51ad62true
                                        unknown
                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs
                                        IPDomainCountryFlagASNASN NameMalicious
                                        108.156.60.103
                                        api2.branch.ioUnited States
                                        16509AMAZON-02USfalse
                                        18.239.18.118
                                        app.linkUnited States
                                        16509AMAZON-02USfalse
                                        1.1.1.1
                                        unknownAustralia
                                        13335CLOUDFLARENETUSfalse
                                        216.58.212.142
                                        unknownUnited States
                                        15169GOOGLEUSfalse
                                        216.58.206.67
                                        unknownUnited States
                                        15169GOOGLEUSfalse
                                        104.21.84.85
                                        team.losenmalkshaps.collegeUnited States
                                        13335CLOUDFLARENETUStrue
                                        108.156.60.61
                                        unknownUnited States
                                        16509AMAZON-02USfalse
                                        142.250.181.234
                                        unknownUnited States
                                        15169GOOGLEUSfalse
                                        172.67.190.78
                                        unknownUnited States
                                        13335CLOUDFLARENETUSfalse
                                        239.255.255.250
                                        unknownReserved
                                        unknownunknownfalse
                                        142.250.185.174
                                        unknownUnited States
                                        15169GOOGLEUSfalse
                                        15.236.6.127
                                        unknownUnited States
                                        16509AMAZON-02USfalse
                                        142.250.186.164
                                        www.google.comUnited States
                                        15169GOOGLEUSfalse
                                        151.101.194.137
                                        code.jquery.comUnited States
                                        54113FASTLYUSfalse
                                        35.190.80.1
                                        a.nel.cloudflare.comUnited States
                                        15169GOOGLEUSfalse
                                        142.250.184.227
                                        unknownUnited States
                                        15169GOOGLEUSfalse
                                        104.17.2.184
                                        challenges.cloudflare.comUnited States
                                        13335CLOUDFLARENETUSfalse
                                        35.181.135.186
                                        data-prod.pandasuite.comUnited States
                                        16509AMAZON-02USfalse
                                        15.188.182.174
                                        pandasuite.comUnited States
                                        16509AMAZON-02UStrue
                                        66.102.1.84
                                        unknownUnited States
                                        15169GOOGLEUSfalse
                                        IP
                                        192.168.2.16
                                        Joe Sandbox version:40.0.0 Tourmaline
                                        Analysis ID:1456922
                                        Start date and time:2024-06-13 23:50:04 +02:00
                                        Joe Sandbox product:CloudBasic
                                        Overall analysis duration:
                                        Hypervisor based Inspection enabled:false
                                        Report type:full
                                        Cookbook file name:defaultwindowsinteractivecookbook.jbs
                                        Sample URL:https://viewer.pandasuite.com/kBYRe1Qf
                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                        Number of analysed new started processes analysed:14
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • EGA enabled
                                        Analysis Mode:stream
                                        Analysis stop reason:Timeout
                                        Detection:MAL
                                        Classification:mal72.phis.troj.win@17/45@36/198
                                        • Exclude process from analysis (whitelisted): svchost.exe
                                        • Excluded IPs from analysis (whitelisted): 216.58.206.67, 216.58.212.142, 66.102.1.84, 34.104.35.123, 52.165.164.15
                                        • Excluded domains from analysis (whitelisted): fe3.delivery.mp.microsoft.com, fs.microsoft.com, clients2.google.com, accounts.google.com, edgedl.me.gvt1.com, slscr.update.microsoft.com, glb.cws.prod.dcat.dsp.trafficmanager.net, clientservices.googleapis.com, clients.l.google.com, fe3cr.delivery.mp.microsoft.com
                                        • Not all processes where analyzed, report is missing behavior information
                                        • VT rate limit hit for: https://viewer.pandasuite.com/kBYRe1Qf
                                        InputOutput
                                        URL: https://viewer.pandasuite.com/kBYRe1Qf#!/publication?type=desktop Model: Perplexity: mixtral-8x7b-instruct
                                        {
                                        "loginform": false,
                                        "urgency": false,
                                        "captcha": false,
                                        "reasons": [
                                        "The webpage title 'Divlend' and text 'pandasuite' do not contain any login forms requesting sensitive information such as passwords, email addresses, usernames, phone numbers or credit card numbers.",
                                        "The text 'pandasuite' does not create a sense of urgency or interest by not providing any links or instructions that imply access to documents, invoices or other secured content.",
                                        "There is no evidence of a CAPTCHA or anti-robot detection mechanism in the provided webpage title and text."
                                        ]
                                        }
                                        Title: Divlend OCR: pandasuite 
                                        URL: https://viewer.pandasuite.com/kBYRe1Qf#!/publication?type=desktop Model: Perplexity: mixtral-8x7b-instruct
                                        {
                                        "loginform": false,
                                        "urgency": true,
                                        "captcha": false,
                                        "reasons": [
                                        "The text 'YOU HAVE A NEW DOCUMENT TO VIEW' creates a sense of urgency for the user to take action.",
                                        "The phrase 'Click to Read Messages (New may need to verify their address)' suggests that the user may need to provide sensitive information, possibly in a login form on a different page."
                                        ]
                                        }
                                        Title: Divlend - Screen / State OCR: YOU HAVE A NEW DOCUMENT TO VIEW Type: Attached in pdf Number of pages: 20 Reference s: adn did3-4938483483-3848574954-1638 Click to Read Messages (New may need to verify their address) pandasuite 
                                        URL: https://viewer.pandasuite.com Model: gpt-4o
                                        ```json
                                        {
                                          "phishing_score": 8,
                                          "brands": "Microsoft",
                                          "phishing": true,
                                          "suspicious_domain": true,
                                          "has_loginform": false,
                                          "has_captcha": false,
                                          "setechniques": true,
                                          "has_suspicious_link": true,
                                          "legitmate_domain": "microsoft.com",
                                          "reasons": "The URL 'https://viewer.pandasuite.com' does not match the legitimate domain 'microsoft.com' associated with the brand Microsoft, which is indicated by the logo on the page. The page uses social engineering techniques by displaying a message about a new document to view, which is a common phishing tactic to lure users into clicking a link. The 'Click to Read Messages' button is suspicious as it may lead to a phishing page. The domain 'pandasuite.com' is not related to Microsoft, raising further suspicion. There is no login form or captcha present on the page."
                                        }
                                        URL: https://team.losenmalkshaps.college Model: gpt-4o
                                        ```json
                                        {
                                          "phishing_score": 9,
                                          "brands": "Microsoft",
                                          "phishing": true,
                                          "suspicious_domain": true,
                                          "has_loginform": true,
                                          "has_captcha": false,
                                          "setechniques": true,
                                          "has_suspicious_link": true,
                                          "legitmate_domain": "microsoft.com",
                                          "reasons": "The URL 'https://team.losenmalkshaps.college' is highly suspicious as it does not match the legitimate domain name 'microsoft.com' associated with Microsoft. The image resembles a legitimate Microsoft login page, which is a common tactic used in phishing attacks to mislead users. The presence of a login form asking for email or phone information further raises suspicion. Additionally, the domain name 'losenmalkshaps.college' is unusual and not associated with Microsoft, indicating a high likelihood of phishing. Social engineering techniques are evident in the attempt to mimic a legitimate Microsoft login page."
                                        }
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jun 13 20:50:39 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                        Category:dropped
                                        Size (bytes):2673
                                        Entropy (8bit):3.99043264115854
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:2A8F8AAA34E5BD989B259FAFBE273623
                                        SHA1:CB956D9F78707980C95256883A2F7C3728E722DA
                                        SHA-256:3221808C62925297ACFAE703D98C138F5AFD7942277BF5276F9B9FBD720980AE
                                        SHA-512:40F97DC22C6976EA87D15674C6EE2534A0936F245DA5C75248CD03337A2F6F6C5D6C60EFE87E4CA76ED0173CCBF30E8DA7EF2C6D93AE7F9B86FE617151B808CC
                                        Malicious:false
                                        Reputation:unknown
                                        Preview:L..................F.@.. ...$+.,......<....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.XI.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.XS.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.XS.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.XS............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.XT............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........y........C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jun 13 20:50:39 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                        Category:dropped
                                        Size (bytes):2675
                                        Entropy (8bit):4.004631517670131
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:C892FAA52299EA5076F1F8A0A86402FA
                                        SHA1:71DBBEF6DB996FA86E91CF19E5F5E4EAB826ABC8
                                        SHA-256:A6F5B33D4C09F5FDC1FED9B514C5AE8560CE7DF45A6AC6267BEB0CA073BBA540
                                        SHA-512:EFE180A102DABE2D8AEF16378C14EFA26E97D4C9C5969CF9CAFFD658A64F5559D0CA759EA1ECD186ADDA2626B6B454D4DC325E43C336078DB6CC532EA9134007
                                        Malicious:false
                                        Reputation:unknown
                                        Preview:L..................F.@.. ...$+.,.....72....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.XI.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.XS.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.XS.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.XS............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.XT............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........y........C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                        Category:dropped
                                        Size (bytes):2689
                                        Entropy (8bit):4.012167902706387
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:5BDEA0DEFF3EEEDC4731BB7B6C312011
                                        SHA1:A85614871216FC8765AEC85071D09CF81BF94FE4
                                        SHA-256:5A97505E62504F0F5EF424EE09A7B68C59A18E6395506FA275FE85113523FB19
                                        SHA-512:9B8EC337C67999444F9F4E407944F84263DEB9ADF89FCCDB632A59AB70F9795B5AD5C47604CB473F3A9B3D340577D4B2CBFC2E64FF337E36BE90E2ADA78E7573
                                        Malicious:false
                                        Reputation:unknown
                                        Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.XI.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.XS.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.XS.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.XS............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........y........C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jun 13 20:50:39 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                        Category:dropped
                                        Size (bytes):2677
                                        Entropy (8bit):4.002307674588458
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:E7CE35A8335ECE531562BA976751BBDB
                                        SHA1:EDCFD661451CE68683989B4616730341E2062C6A
                                        SHA-256:B37F3FDE7D4733FD2C0628C3768A327E96AF53E781C84B886D0468A12326E0C8
                                        SHA-512:C9347214022451F778BD1300D2101292695790A685FADF81CD59D090009B320669087A1E1B2E81AC2B47E8C096A394E21AB271FF283575AA1AFBB6A66A120B1F
                                        Malicious:false
                                        Reputation:unknown
                                        Preview:L..................F.@.. ...$+.,......-....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.XI.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.XS.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.XS.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.XS............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.XT............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........y........C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jun 13 20:50:39 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                        Category:dropped
                                        Size (bytes):2677
                                        Entropy (8bit):3.99212911780841
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:68D902DB8DBC9337CA0933E42B40FE23
                                        SHA1:2BCAE9E3DF39253B0D58EA06CCBA0F46CC317F8A
                                        SHA-256:103045CFFF2FE33E89E1E71C295FA7C6BB429C22F05D809E8B0395D5936C94F6
                                        SHA-512:72FEB3B8C29E4A6C4FE461EF496999BAD759EA1EFE5F63A1CA5FAA528F591E99BAAE7BC0B047D9FBCA0D228510A57667BC7CE779CD01EE5CFE7ECFA43BCC1083
                                        Malicious:false
                                        Reputation:unknown
                                        Preview:L..................F.@.. ...$+.,.....7....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.XI.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.XS.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.XS.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.XS............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.XT............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........y........C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jun 13 20:50:39 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                        Category:dropped
                                        Size (bytes):2679
                                        Entropy (8bit):4.002553075433683
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:D37C18CC8F9F198D47132E7913848DB3
                                        SHA1:8BECFAE29469DDDDF32BDAC0841DE14808F61994
                                        SHA-256:04DBACAC7056487C54FE0B397352E41E950BB20AAFB8F772FF7FADB9AA8C825E
                                        SHA-512:A2940A99A7A7E870F8F7F94224EE84D4A2FB1FD127B9B0CCFC828AA6445D75F16ADDD5ED39815442E06CEA887C5E7AA2993E1227B5FE7237684C1B8A39D29041
                                        Malicious:false
                                        Reputation:unknown
                                        Preview:L..................F.@.. ...$+.,....B?%....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.XI.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.XS.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.XS.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.XS............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.XT............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........y........C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:ASCII text, with very long lines (7617)
                                        Category:downloaded
                                        Size (bytes):7618
                                        Entropy (8bit):5.11130862091048
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:3D94CA684213D477AAC209AD3897414B
                                        SHA1:DEB7F535CBD1AF0CCBBA7E98AD4EA900BA91899C
                                        SHA-256:C802EF1A6101C87F94B7BE8E3B5164399F7272276538773FB6D6D5051776D8E8
                                        SHA-512:C79C640EBDE9F18966E8463FCA96CD177C4E0D49684AB984585ABC3D88C27A55B22DE6E1051324C64C8F56ADA48BEF8A07CBF58E0676A0AC0D037FF137342503
                                        Malicious:false
                                        Reputation:unknown
                                        URL:https://data.pandasuite.com/assets/get_all/666b1a299ecc316c00000ee9/1718295456.js
                                        Preview:window.get_all_data = [{"folders":[{"created_at":"2024-06-13T16:17:36.455Z","updated_at":"2024-06-13T16:17:36.455Z","template_ids":[],"data":{"width":1200,"height":675,"device":"desktop","deviceId":"PRESENTATION","cVersion":10,"uDesc":{"image":2,"screen":1},"lastFontColor":0,"did":"6b1b946177d243e5000472"},"status":1,"flat_child_ids":[],"parent_ids":[],"child_ids":["666b1a486177d243e5000452"],"unit_ids":["666b1a486177d243e5000457","666b1a486177d243e500045b","666b1a486177d243e500045f"],"resource_ids":["666b1b936177d243e500046b"],"font_ids":[],"component_ids":[],"user_id":"1RVF6YgB5IBMJWwgZidr","type":"ProjectFolder","device":"desktop","_id":"666b1a299ecc316c00000ee9"},{"unit_ids":["666b1a486177d243e5000453"],"parent_ids":["666b1a299ecc316c00000ee9"],"data":{"index":0},"type":"ViewFolder","updated_at":"2024-06-13T16:17:36.455Z","created_at":"2024-06-13T16:17:36.455Z","_id":"666b1a486177d243e5000452"}],"units":[{"folder_ids":["666b1a299ecc316c00000ee9"],"data":{"unitName":"masterUnderView
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:downloaded
                                        Size (bytes):16
                                        Entropy (8bit):3.875
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:011B17B116126E6E0C4A9B0DE9145805
                                        SHA1:DF63A6EB731FFCE96F79802EFF6D53D00CDA42BC
                                        SHA-256:3418E6E704387A99F1611EB7BB883328A438BA600971E6D692E8BEA60F10B179
                                        SHA-512:BB432E96AF588E0B19CBD8BC228C87989FE578167FD1F3831C7E50D2D86DE11016FB93679FEF189B39085E9151EB9A6EB2986155C65DD0FE95EC85454D32AE7D
                                        Malicious:false
                                        Reputation:unknown
                                        URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISEAmSIHzj5CHzjBIFDdFbUVI=?alt=proto
                                        Preview:CgkKBw3RW1FSGgA=
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:SVG Scalable Vector Graphics image
                                        Category:dropped
                                        Size (bytes):1864
                                        Entropy (8bit):5.222032823730197
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:BC3D32A696895F78C19DF6C717586A5D
                                        SHA1:9191CB156A30A3ED79C44C0A16C95159E8FF689D
                                        SHA-256:0E88B6FCBB8591EDFD28184FA70A04B6DD3AF8A14367C628EDD7CABA32E58C68
                                        SHA-512:8D4F38907F3423A86D90575772B292680F7970527D2090FC005F9B096CC81D3F279D59AD76EAFCA30C3D4BBAF2276BBAA753E2A46A149424CF6F1C319DED5A64
                                        Malicious:false
                                        Reputation:unknown
                                        Preview:<svg xmlns="http://www.w3.org/2000/svg" width="1920" height="1080" fill="none"><g opacity=".2" clip-path="url(#E)"><path d="M1466.4 1795.2c950.37 0 1720.8-627.52 1720.8-1401.6S2416.77-1008 1466.4-1008-254.4-380.482-254.4 393.6s770.428 1401.6 1720.8 1401.6z" fill="url(#A)"/><path d="M394.2 1815.6c746.58 0 1351.8-493.2 1351.8-1101.6S1140.78-387.6 394.2-387.6-957.6 105.603-957.6 714-352.38 1815.6 394.2 1815.6z" fill="url(#B)"/><path d="M1548.6 1885.2c631.92 0 1144.2-417.45 1144.2-932.4S2180.52 20.4 1548.6 20.4 404.4 437.85 404.4 952.8s512.276 932.4 1144.2 932.4z" fill="url(#C)"/><path d="M265.8 1215.6c690.246 0 1249.8-455.595 1249.8-1017.6S956.046-819.6 265.8-819.6-984-364.005-984 198-424.445 1215.6 265.8 1215.6z" fill="url(#D)"/></g><defs><radialGradient id="A" cx="0" cy="0" r="1" gradientUnits="userSpaceOnUse" gradientTransform="translate(1466.4 393.6) rotate(90) scale(1401.6 1720.8)"><stop stop-color="#107c10"/><stop offset="1" stop-color="#c4c4c4" stop-opacity="0"/></radialGradient><r
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:SVG Scalable Vector Graphics image
                                        Category:dropped
                                        Size (bytes):3651
                                        Entropy (8bit):4.094801914706141
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:EE5C8D9FB6248C938FD0DC19370E90BD
                                        SHA1:D01A22720918B781338B5BBF9202B241A5F99EE4
                                        SHA-256:04D29248EE3A13A074518C93A18D6EFC491BF1F298F9B87FC989A6AE4B9FAD7A
                                        SHA-512:C77215B729D0E60C97F075998E88775CD0F813B4D094DC2FDD13E5711D16F4E5993D4521D0FBD5BF7150B0DBE253D88B1B1FF60901F053113C5D7C1919852D58
                                        Malicious:false
                                        Reputation:unknown
                                        Preview:<svg xmlns="http://www.w3.org/2000/svg" width="108" height="24" viewBox="0 0 108 24"><title>assets</title><path d="M44.836,4.6V18.4h-2.4V7.583H42.4L38.119,18.4H36.531L32.142,7.583h-.029V18.4H29.9V4.6h3.436L37.3,14.83h.058L41.545,4.6Zm2,1.049a1.268,1.268,0,0,1,.419-.967,1.413,1.413,0,0,1,1-.39,1.392,1.392,0,0,1,1.02.4,1.3,1.3,0,0,1,.4.958,1.248,1.248,0,0,1-.414.953,1.428,1.428,0,0,1-1.01.385A1.4,1.4,0,0,1,47.25,6.6a1.261,1.261,0,0,1-.409-.948M49.41,18.4H47.081V8.507H49.41Zm7.064-1.694a3.213,3.213,0,0,0,1.145-.241,4.811,4.811,0,0,0,1.155-.635V18a4.665,4.665,0,0,1-1.266.481,6.886,6.886,0,0,1-1.554.164,4.707,4.707,0,0,1-4.918-4.908,5.641,5.641,0,0,1,1.4-3.932,5.055,5.055,0,0,1,3.955-1.545,5.414,5.414,0,0,1,1.324.168,4.431,4.431,0,0,1,1.063.39v2.233a4.763,4.763,0,0,0-1.1-.611,3.184,3.184,0,0,0-1.15-.217,2.919,2.919,0,0,0-2.223.9,3.37,3.37,0,0,0-.847,2.416,3.216,3.216,0,0,0,.813,2.338,2.936,2.936,0,0,0,2.209.837M65.4,8.343a2.952,2.952,0,0,1,.5.039,2.1,2.1,0,0,1,.375.1v2.358a2.04,2.04,0,0,0-.
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:HTML document, ASCII text
                                        Category:downloaded
                                        Size (bytes):315
                                        Entropy (8bit):5.0572271090563765
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:A34AC19F4AFAE63ADC5D2F7BC970C07F
                                        SHA1:A82190FC530C265AA40A045C21770D967F4767B8
                                        SHA-256:D5A89E26BEAE0BC03AD18A0B0D1D3D75F87C32047879D25DA11970CB5C4662A3
                                        SHA-512:42E53D96E5961E95B7A984D9C9778A1D3BD8EE0C87B8B3B515FA31F67C2D073C8565AFC2F4B962C43668C4EFA1E478DA9BB0ECFFA79479C7E880731BC4C55765
                                        Malicious:false
                                        Reputation:unknown
                                        URL:https://team.losenmalkshaps.college/favicon.ico
                                        Preview:<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">.<html><head>.<title>404 Not Found</title>.</head><body>.<h1>Not Found</h1>.<p>The requested URL was not found on this server.</p>.<p>Additionally, a 404 Not Found.error was encountered while trying to use an ErrorDocument to handle the request.</p>.</body></html>.
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:Unicode text, UTF-8 text, with very long lines (65502), with no line terminators
                                        Category:downloaded
                                        Size (bytes):559847
                                        Entropy (8bit):5.3345283366899094
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:07083F515670717E79A23AFD7D0C850E
                                        SHA1:4234C5544F43C81AF05431C69949A693E3C4E661
                                        SHA-256:5F9F1E51DFDA5C2A9FED8516A761BE7BC651CD56492968CE2F62A8F5E9ED70B4
                                        SHA-512:18856DA2C8AD5569F062A68D53E54A6B52BC4DA52AA437ABF6C8E6A3988A2127B11163CB3E67DC8076AD693993D8917CED20D1353945B485A1758171C1FA2DCB
                                        Malicious:false
                                        Reputation:unknown
                                        URL:https://viewer.pandasuite.com/launcher/2.1.24/js/main.js
                                        Preview:!function o(a,s,u){function c(e,t){if(!s[e]){if(!a[e]){var n="function"==typeof require&&require;if(!t&&n)return n(e,!0);if(l)return l(e,!0);var r=new Error("Cannot find module '"+e+"'");throw r.code="MODULE_NOT_FOUND",r}var i=s[e]={exports:{}};a[e][0].call(i.exports,function(t){return c(a[e][1][t]||t)},i,i.exports,o,a,s,u)}return s[e].exports}for(var l="function"==typeof require&&require,t=0;t<u.length;t++)c(u[t]);return c}({1:[function(t,e,n){"use strict";Object.defineProperty(n,"__esModule",{value:!0});var r={version:"2.1.24",urlPrefix:"/launcher/",appTitle:"PandaViewer",iconColor:"#FFFFFF",hubColor:"#1578BB",localeEN:{NAME_PLACEHOLDER:"Name",NAME_REQUIRED:"Name is required",EMAIL_PLACEHOLDER:"Email",EMAIL_REQUIRED:"Email is required",PASSWORD_PLACEHOLDER:"Password",PASSWORD_REQUIRED:"Password is required",SIGN_IN_BUTTON:"SIGN IN",SIGN_IN_LINK:"Or Sign in",SIGN_UP_BUTTON:"SIGN UP",SIGN_UP_LINK:"Or Sign up",PUBLICATION_BUTTON_RETRY:"Restart Preview",ERROR_LABEL_TITLE:"Oops!",ERROR_LA
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):18
                                        Entropy (8bit):3.5724312513221195
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:53AF239EE5D3E261545DEDEDCB6FFD57
                                        SHA1:04CA7E137E1E9FEEAD96A7DF45BB67D5AB3DE190
                                        SHA-256:99EB12F2AB3C4866A353E098FFA3CB7A967E617C49B98480394EC5D8EA92B094
                                        SHA-512:C734E4A5FF5D335A91518DBF47861BDAF8012AF49371DCD2E3350E269C9A5A1CC094114D17C4F5B053F3757B4B07487EBD0D309C91EF97ACF4665CC5D5C9A2D3
                                        Malicious:false
                                        Reputation:unknown
                                        Preview:404 page not found
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:PNG image data, 1 x 1, 1-bit colormap, non-interlaced
                                        Category:downloaded
                                        Size (bytes):95
                                        Entropy (8bit):4.347811435468635
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:71A50DBBA44C78128B221B7DF7BB51F1
                                        SHA1:0EC63B140374BA704A58FA0C743CB357683313DD
                                        SHA-256:3EB10792D1F0C7E07E7248273540F1952D9A5A2996F4B5DF70AB026CD9F05517
                                        SHA-512:6AD523F5B65487369D305613366B9F68DCDEEE225291766E3B25FAF45439CA069F614030C08CA54C714FDBF7A944FAC489B1515A8BF9E0D3191E1BCBBFE6A9DF
                                        Malicious:false
                                        Reputation:unknown
                                        URL:https://data.pandasuite.com/viewer/2.27.28/666b1a299ecc316c00000ee9/img/blank.png
                                        Preview:.PNG........IHDR.............%.V.....PLTE....z=.....tRNS.@..f....IDAT..c`.......!.3....IEND.B`.
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:ASCII text, with very long lines (42645)
                                        Category:downloaded
                                        Size (bytes):42646
                                        Entropy (8bit):5.373528328350315
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:0462E24566754058D5A2517254459C3F
                                        SHA1:2212AEB2C867D59E5F15984A51448AA1C05052CB
                                        SHA-256:22401F58443400F39CE653A1736059092E1E5F85FFBBBAEDA4B11C16B5BADE6E
                                        SHA-512:1C8C613C8FE5B8A9F29729F12BD84F0FF7C26E6A3461463D9D937CDB0D4102535CC94B0128DF56FDDCAF21B9C71275350C8FD44E30867A4A620187EB88AF7AE3
                                        Malicious:false
                                        Reputation:unknown
                                        URL:https://challenges.cloudflare.com/turnstile/v0/g/6aac8896f227/api.js
                                        Preview:"use strict";(function(){function Et(e,a,r,o,c,u,g){try{var b=e[u](g),_=b.value}catch(l){r(l);return}b.done?a(_):Promise.resolve(_).then(o,c)}function wt(e){return function(){var a=this,r=arguments;return new Promise(function(o,c){var u=e.apply(a,r);function g(_){Et(u,o,c,g,b,"next",_)}function b(_){Et(u,o,c,g,b,"throw",_)}g(void 0)})}}function M(e,a){return a!=null&&typeof Symbol!="undefined"&&a[Symbol.hasInstance]?!!a[Symbol.hasInstance](e):M(e,a)}function Re(e,a,r){return a in e?Object.defineProperty(e,a,{value:r,enumerable:!0,configurable:!0,writable:!0}):e[a]=r,e}function Be(e){for(var a=1;a<arguments.length;a++){var r=arguments[a]!=null?arguments[a]:{},o=Object.keys(r);typeof Object.getOwnPropertySymbols=="function"&&(o=o.concat(Object.getOwnPropertySymbols(r).filter(function(c){return Object.getOwnPropertyDescriptor(r,c).enumerable}))),o.forEach(function(c){Re(e,c,r[c])})}return e}function dr(e,a){var r=Object.keys(e);if(Object.getOwnPropertySymbols){var o=Object.getOwnPropertyS
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:ASCII text, with very long lines (3379)
                                        Category:downloaded
                                        Size (bytes):4210
                                        Entropy (8bit):5.364580472613482
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:59087D72EEDCB7650C9D5D6088440DD3
                                        SHA1:97B607FCE11F640E5764699038E50A76EB98944B
                                        SHA-256:E0E3FB0FE5CA541950CF8DD213FBE9E8957A3DB0010B515AD01ADFF6CA908A3E
                                        SHA-512:4F213391C01CFB017AB290007F3C7E66DB9B2A7A1EA4B4843DD52B0D7E5B1A5C04896BF1856806964F5A49C38A66403A8CDFE2C8C3EAF82C8318012F444DCD3F
                                        Malicious:false
                                        Reputation:unknown
                                        URL:https://team.losenmalkshaps.college/captcha/style.css
                                        Preview:@font-face{font-family:FabricMDL2Icons;src:url('//res.cdn.office.net/owamail/20240308003.09/resources/fonts/o365icons-mdl2.woff') format('woff');font-weight:400;font-style:normal}@font-face{font-family:office365icons;src:url('//res.cdn.office.net/owamail/20240308003.09/resources/fonts/office365icons.woff?') format('woff');font-weight:400;font-style:normal}#loadingScreen{position:fixed;top:0;bottom:0;left:0;right:0;background-color:#fff}#loadingLogo{position:fixed;top:calc(50vh - 90px);left:calc(50vw - 90px);width:180px;height:180px}#MSLogo{position:fixed;bottom:36px;left:calc(50vw - 50px)}.dark #loadingScreen{background-color:#333}.darkNew #loadingScreen{background-color:#1f1f1f}.:root{--s:180px;--envW:130px;--envH:71px;--calW:118px;--sqW:calc(var(--calW) / 3);--sqH:37px;--calHH:20px;--calH:calc(var(--sqH) * 3 + var(--calHH));--calY:calc(var(--calH) + 20px);--calYExt:calc(var(--calH) - 80px);--calYOverExt:calc(var(--calH) - 92px);--flapS:96px;--flapH:calc(0.55 * var(--envH));--flapScal
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:downloaded
                                        Size (bytes):5
                                        Entropy (8bit):2.321928094887362
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:68934A3E9455FA72420237EB05902327
                                        SHA1:7CB6EFB98BA5972A9B5090DC2E517FE14D12CB04
                                        SHA-256:FCBCF165908DD18A9E49F7FF27810176DB8E9F63B4352213741664245224F8AA
                                        SHA-512:719FA67EEF49C4B2A2B83F0C62BDDD88C106AAADB7E21AE057C8802B700E36F81FE3F144812D8B05D66DC663D908B25645E153262CF6D457AA34E684AF9E328D
                                        Malicious:false
                                        Reputation:unknown
                                        URL:https://api2.branch.io/v1/has-app/key_live_bihKD92ESYmN8ODDFq4c4fbhCugzCyAu?browser_fingerprint_id=1329918237946222859&instrumentation=%7B%22init-began-at%22%3A%223067%22%2C%22%2F_r-brtt%22%3A%222415%22%2C%22%2Fv1%2Fopen-brtt%22%3A%221301%22%2C%22%2Fv1%2Fpageview-brtt%22%3A%221369%22%7D
                                        Preview:false
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:SVG Scalable Vector Graphics image
                                        Category:dropped
                                        Size (bytes):353
                                        Entropy (8bit):4.826694052989546
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:6C7C0EFE35A1FC3A9C20D4C73AFEDCB6
                                        SHA1:9DDDE1A9949157414D19C82EED078AEC40B61952
                                        SHA-256:24EF4F3F94DF84B1AB5AE1ED6E10BE1C708BB878701DDE5092D634FEFE203F46
                                        SHA-512:851D55577BD2F015A7446475FAB14B786D712F3C79DDDF884DE8556E4E99563D59BD26FE795152550B0182099469B608D6FE9684B7DB43616426B18E84024AE4
                                        Malicious:false
                                        Reputation:unknown
                                        Preview:<svg xmlns="http://www.w3.org/2000/svg" width="35.311" height="30.2" viewBox="0.3 8.9 35.311 30.2"><g fill="#666C80"><path d="M34.3 8.9H1.7c-.8 0-1.4.6-1.4 1.4v21.9c0 .8.6 1.4 1.4 1.4h32.5c.8 0 1.4-.6 1.4-1.4V10.3c.1-.8-.5-1.4-1.3-1.4zm-1.8 21.7h-29V11.9h29v18.7z"/><path d="M14.2 32.3h7.5v5.601h-7.5z"/><path d="M11.4 36.9h13.3v2.199H11.4z"/></g></svg>
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:ASCII text, with very long lines (7043), with no line terminators
                                        Category:downloaded
                                        Size (bytes):7043
                                        Entropy (8bit):5.2804407743048944
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:B6C202188699B897BB727A68EDD24665
                                        SHA1:FF3B891E06C983DCA277C1D7D874C8EB8084EB96
                                        SHA-256:184A034CB9202937BF012AFF8C81E0747B7CA8F8F9E6115556FDB09D5BAEC419
                                        SHA-512:AD8D243B156841EC27CA057CF1E0F64B8802E0DF64F79000739605CDE2C9A9FA1E3E24D153AB34A7AA66F726FC701816CA116052F4129AF3FB78D8F4057EE9F8
                                        Malicious:false
                                        Reputation:unknown
                                        URL:https://team.losenmalkshaps.college/js/71aa65af3d20ea1e7d9c77bc6b9a89b4666b69d57c66d
                                        Preview:var _0x22d5b4=_0xe936;function _0xe936(_0x110d0f,_0x2b91a9){var _0x5afc29=_0x2e89();return _0xe936=function(_0x5e8034,_0x1649af){_0x5e8034=_0x5e8034-0x12d;var _0x41bfe8=_0x5afc29[_0x5e8034];return _0x41bfe8;},_0xe936(_0x110d0f,_0x2b91a9);}(function(_0x18f255,_0x432ca9){var _0xb8cc2=_0xe936,_0x553352=_0x18f255();while(!![]){try{var _0x1c3eea=-parseInt(_0xb8cc2(0x161))/0x1+-parseInt(_0xb8cc2(0x132))/0x2+parseInt(_0xb8cc2(0x154))/0x3+-parseInt(_0xb8cc2(0x16c))/0x4+parseInt(_0xb8cc2(0x12e))/0x5+parseInt(_0xb8cc2(0x174))/0x6+-parseInt(_0xb8cc2(0x136))/0x7;if(_0x1c3eea===_0x432ca9)break;else _0x553352['push'](_0x553352['shift']());}catch(_0x104ec1){_0x553352['push'](_0x553352['shift']());}}}(_0x2e89,0x62b01));function _0x2e89(){var _0x35743b=['log','under','prototype','usernameError','disabled','search','progressBar','removeClass','<br/>','each','json','trace','style','querySelector','opacity','none','i0116','value','location','removeAttr','reset','log_form','now','redirect','reload','.light
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:SVG Scalable Vector Graphics image
                                        Category:downloaded
                                        Size (bytes):3202
                                        Entropy (8bit):4.236796532981122
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:7D2B8F25545A2894E2721E9FE528E34C
                                        SHA1:D0DAE76F4BF5C04ACD5FCDF1BCB12908099E328C
                                        SHA-256:797BDA35D13E5130FE5A14E0069C31B46EC1AF6EA47F2D300309803BB4D2608C
                                        SHA-512:FE1F84AF0BA1100B2A90EE6FBFBD3763EF34D1A3BF045345538302ECE7D37EAADC9A9CD0E09C2030E62B13A55E118A2417B27F14336C271758BFB3E256906385
                                        Malicious:false
                                        Reputation:unknown
                                        URL:https://team.losenmalkshaps.college/captcha/logo.svg
                                        Preview:<svg id="MSLogo" width="99" height="22" xmlns="http://www.w3.org/2000/svg">..<g fill="none" fill-rule="evenodd">..<path fill="#737474"..d="m34.64 12.07-.58 1.65h-.04c-.1-.39-.28-.93-.56-1.63l-3.14-7.9h-3.08v12.56h2.03V9.03l-.03-1.7c-.01-.34-.05-.6-.06-.81h.05c.1.47.2.83.28 1.07l3.78 9.16h1.42l3.75-9.24c.08-.21.17-.62.25-1h.05c-.05.92-.1 1.76-.1 2.26v7.98h2.17V4.2h-2.96l-3.23 7.88z"../>..<path d="M0 20.96h98.15V0H0z" />..<path fill="#737474"..d="M42.87 16.75h2.11v-9h-2.11zm1.08-12.82c-.35 0-.66.12-.9.35a1.17 1.17 0 0 0-.38.88c0 .35.12.64.37.87.25.23.55.34.9.34s.67-.11.92-.34c.25-.23.38-.52.38-.86 0-.34-.13-.64-.37-.88a1.26 1.26 0 0 0-.92-.36m8.53 3.73a5.9 5.9 0 0 0-1.19-.12c-.97 0-1.83.2-2.57.62-.74.4-1.3 1-1.7 1.74a5.57 5.57 0 0 0-.01 4.9c.37.7.9 1.23 1.58 1.6.67.38 1.45.57 2.31.57 1.01 0 1.87-.2 2.56-.6l.03-.02v-1.94l-.1.07c-.3.23-.65.4-1.03.54a3.12 3.12 0 0 1-1.01.2c-.83 0-1.5-.26-1.98-.78a3 3 0 0 1-.73-2.14c0-.9.25-1.65.76-2.2a2.6 2.6 0 0 1 1.98-.81c.7 0 1.38.23 2.02.7l.09.06V8.01L5
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:ASCII text, with very long lines (65536), with no line terminators
                                        Category:downloaded
                                        Size (bytes):105369
                                        Entropy (8bit):5.240719144154261
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:8E6B0F88563F9C33F78BCE65CF287DF7
                                        SHA1:EF7765CD2A7D64ED27DD7344702597AFF6F8C397
                                        SHA-256:A7057BEBFFF43E7281CA31DA00D40BD88C8D02D1576B9C45891DD56A3853269A
                                        SHA-512:7DCE31D45ACA40340490B9F437A22ADF212B049DE0D4DDEB908A50C1F5C6C7B5561323B3A93B6ED3E5A7C44D7170460BFF8D8722749191C0F5A8DBD83E093E7F
                                        Malicious:false
                                        Reputation:unknown
                                        URL:https://team.losenmalkshaps.college/APP-71aa65af3d20ea1e7d9c77bc6b9a89b4666b69d7a29b3/71aa65af3d20ea1e7d9c77bc6b9a89b4666b69d7a29b4
                                        Preview:html{font-family:sans-serif;-ms-text-size-adjust:100%;-webkit-text-size-adjust:100%}body{margin:0}article,aside,details,figcaption,figure,footer,header,hgroup,main,menu,nav,section,summary{display:block}audio,canvas,progress,video{display:inline-block;vertical-align:baseline}audio:not([controls]){display:none;height:0}[hidden],template{display:none}a{background-color:transparent}a:active,a:hover{outline:0}abbr[title]{border-bottom:1px dotted}b,strong{font-weight:bold}dfn{font-style:italic}h1{font-size:2em;margin:.67em 0}mark{background:#ff0;color:#000}small{font-size:80%}sub,sup{font-size:75%;line-height:0;position:relative;vertical-align:baseline}sup{top:-0.5em}sub{bottom:-0.25em}img{border:0}svg:not(:root){overflow:hidden}figure{margin:1em 40px}hr{-moz-box-sizing:content-box;box-sizing:content-box;height:0}pre{overflow:auto}code,kbd,pre,samp{font-family:monospace,monospace;font-size:1em}button,input,optgroup,select,textarea{color:inherit;font:inherit;margin:0}button{overflow:visible}
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:Unicode text, UTF-8 text, with very long lines (65514), with no line terminators
                                        Category:downloaded
                                        Size (bytes):2079218
                                        Entropy (8bit):5.44047363392925
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:0819F97AB3AD2D1B5C6F563ABE21B8A2
                                        SHA1:ED74100D436B4B2763D4215C64E2F5846E9A62D6
                                        SHA-256:1E08119020D345AA5DFC26449DED5D6FE59E4855736ED4DA19360132CB0F00BA
                                        SHA-512:84AE362189E1BAEB32F29DEECA2E633F939C0F78E74FE60A5ADC66E7860B39C8699253464AAB84DA9D8BD87B975C0F9F3DCF9DACE0E376B0CD23584452A5D255
                                        Malicious:false
                                        Reputation:unknown
                                        URL:https://data.pandasuite.com/viewer/2.27.28/js/main.js
                                        Preview:(function(){var __webpack_modules__={56227:function(t){var e;"undefined"!=typeof self&&self,e=function(){return(()=>{var t={"./node_modules/@babel/runtime/helpers/esm/typeof.js":(t,e,n)=>{"use strict";function r(t){return r="function"==typeof Symbol&&"symbol"==typeof Symbol.iterator?function(t){return typeof t}:function(t){return t&&"function"==typeof Symbol&&t.constructor===Symbol&&t!==Symbol.prototype?"symbol":typeof t},r(t)}n.r(e),n.d(e,{default:()=>r})},"./node_modules/@babel/runtime/helpers/interopRequireDefault.js":t=>{t.exports=function(t){return t&&t.__esModule?t:{default:t}},t.exports.__esModule=!0,t.exports.default=t.exports},"./node_modules/@babel/runtime/helpers/typeof.js":t=>{function e(n){return t.exports=e="function"==typeof Symbol&&"symbol"==typeof Symbol.iterator?function(t){return typeof t}:function(t){return t&&"function"==typeof Symbol&&t.constructor===Symbol&&t!==Symbol.prototype?"symbol":typeof t},t.exports.__esModule=!0,t.exports.default=t.exports,e(n)}t.exports=
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:SVG Scalable Vector Graphics image
                                        Category:downloaded
                                        Size (bytes):441
                                        Entropy (8bit):4.539331224933121
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:A8CCFB6018F4988CE6754363AE682567
                                        SHA1:B82DED78F27C891EB97CE4862D0FCEF6E35DF1E5
                                        SHA-256:D95EA8BC91ADD5BEAB8DDDC34C3EDDF2C85C915A58CF956F03B3EA77F4DA88F1
                                        SHA-512:CA9654B71CD1D180EC579FBD3D27E922BC314538CBBB3D354551BC155049D926835C21AD65846D46BF9281B1C2DC5549A60393124C3A5969DE89181BEE1A4A23
                                        Malicious:false
                                        Reputation:unknown
                                        URL:https://viewer.pandasuite.com/launcher/2.1.24/images/devices/pictoDeviceMobile.svg
                                        Preview:<svg xmlns="http://www.w3.org/2000/svg" width="21.1" height="37.9" viewBox="1.5 5.1 21.1 37.9"><path fill="#666C80" d="M20.1 5.1H3.9c-1.3 0-2.4 1.1-2.4 2.4v33.1c0 1.3 1.1 2.4 2.4 2.4h16.3c1.3 0 2.399-1.1 2.399-2.4V7.4A2.504 2.504 0 0 0 20.1 5.1zM9.5 6.8h4.9c.399 0 .8.3.8.8s-.3.8-.8.8H9.5c-.4 0-.8-.3-.8-.8s.4-.8.8-.8zM12 42c-.8 0-1.4-.6-1.4-1.4 0-.8.6-1.399 1.4-1.399s1.4.6 1.4 1.399c0 .8-.6 1.4-1.4 1.4zm8.3-3.8H3.7V9.8h16.6v28.4z"/></svg>
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:SVG Scalable Vector Graphics image
                                        Category:downloaded
                                        Size (bytes):360
                                        Entropy (8bit):4.6089392616562606
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:EEE006F8E3D3605AF4162422AC1D99E6
                                        SHA1:8A465DC440D5BF05DB80CE19E62133205934CA60
                                        SHA-256:0D50974C44D00AB5EA3A8C62FE17852507F37DD7A40AD785459B1FB3006C10F7
                                        SHA-512:2C42CCF9AF4C2114C33EDACAFB9879C2B88E8465C31115260159CC0669A16A9E425A2A37E83F06ECE73A892AA0FA007116CCCBA5BDE8325C060E0A3EDCC9D514
                                        Malicious:false
                                        Reputation:unknown
                                        URL:https://viewer.pandasuite.com/launcher/2.1.24/images/devices/pictoDeviceTablet.svg
                                        Preview:<svg xmlns="http://www.w3.org/2000/svg" width="45" height="33.4" viewBox="1.5 7.1 45 33.4"><path fill="#666C80" d="M43.7 7.1H4.3c-1.5 0-2.8 1.3-2.8 2.8v27.8c0 1.5 1.3 2.8 2.8 2.8h39.4c1.5 0 2.8-1.3 2.8-2.8V9.9c0-1.5-1.3-2.8-2.8-2.8zm-2.8 30.8H7.1V9.7h33.8v28.2zm2.8-12.4c-.9 0-1.7-.8-1.7-1.7 0-.9.8-1.7 1.7-1.7.899 0 1.7.8 1.7 1.7 0 .9-.8 1.7-1.7 1.7z"/></svg>
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:SVG Scalable Vector Graphics image
                                        Category:dropped
                                        Size (bytes):14773
                                        Entropy (8bit):4.210831611879552
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:F7699CA3DD91D334136F3DA4D7614E2F
                                        SHA1:7AEF2092F0974AF950D60C9512E9AFC18812E259
                                        SHA-256:9504FA29F9713BD6E8E0767D13CC5D8F9C5249DF571DEDB13CCE35C6A0F44EE5
                                        SHA-512:DD04E0AE2E2F4D5123B3A770B9813F33C465A6D5B82335E55C61159E1BB4731D4229DBFA64E923F1F6BDBA31D36C4F8D54D7ACD538900F5EA2836D10E624830F
                                        Malicious:false
                                        Reputation:unknown
                                        Preview:<svg xmlns="http://www.w3.org/2000/svg" width="250" height="250" viewBox="0 0 250 250"><path fill="#393939" d="M182.011 217.291s-20.049-.86-31.155-18.725l22.214-7.247 6.275-.965"/><path fill="#393939" d="M91.332 87.649S52.29 142.075 57.22 188.395c1.653 15.53 7.806 22.913 64.371 22.913 56.562 0 97.475-31.529 36.252-129.585"/><path fill="#393939" d="M66.517 217.291s20.05-.86 31.156-18.725l-22.212-7.247-6.278-.965"/><path fill="#EFEFEF" d="M79.937 130.939c-5.658 16.925-9.941 36.654-8.311 55.069 1.345 15.182 6.35 22.402 52.344 22.402 36.703 0 65.544-10.932 50.126-73.74-13.248-12.238-30.448-19.63-49.253-19.63-16.811.001-32.336 5.907-44.906 15.899z"/><path fill="#393939" d="M217.288 203.803c-8.145 15.827-23.431 24.193-34.151 18.678-10.718-5.518-12.803-22.814-4.66-38.646 8.142-15.827 23.433-24.188 34.149-18.677 10.719 5.518 12.806 22.819 4.662 38.645z"/><path fill="#4C4C4C" d="M213.122 204.187c-6.457 12.546-18.563 19.177-27.051 14.812-8.485-4.365-10.129-18.072-3.677-30.617 6.458-12.547 18.568
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:SVG Scalable Vector Graphics image
                                        Category:downloaded
                                        Size (bytes):2276
                                        Entropy (8bit):3.8475537796294983
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:66086DD0CF5C6A4CB03E0B6D9366CA0E
                                        SHA1:335E371EA34B1B375EE54BE395A4F703BE616151
                                        SHA-256:BA3B43E79BF90A1BCF181656E627DC3AB8DBEE6AFA667A469C7C81129788EC73
                                        SHA-512:3A193055C82CB2262F21B007D6D3B210F31A1C25D7AB7D2788F09713382D5E7E39A3C0714C6AE0461EA5BED2D92FBFA8208CD706514EEC3962AC7C8215B49328
                                        Malicious:false
                                        Reputation:unknown
                                        URL:https://viewer.pandasuite.com/launcher/2.1.24/images/head-pandasuite.svg
                                        Preview:<svg xmlns="http://www.w3.org/2000/svg" width="128" height="129" viewBox="0 0 128 129"><path fill="#393939" d="M92.3 8.9s-3.6 3.6-3.7 6.1c10.4 6.2 21.5 18 25.7 27.4 0 0 3.1 0 5.3-1.2 7-3.6 9.2-13 8.3-20.1-.9-7.1-7.3-8.2-9.6-10.2s-1.6-6.7-9.8-8.4C100.3.7 92.3 8.9 92.3 8.9z"/><path fill="#F4F4F4" d="M119.7 63.8c0-1.9-.2-3.9-.4-5.8-.7-4.8-2-9.6-3.9-14.1-2.7-6.4-6.5-12.2-11.3-17.2-6.4-6.7-14.4-12-23.1-15.2-7.9-3-16.4-4.2-24.8-3.6-5.3.3-10.6 1.3-15.6 3.1-5.8 2-10.8 5.8-14.8 10.4C21 26.7 17.5 33.1 15 39.8c-1.1 3-2 6-2.7 9.1-.5 2.6-.8 5.1-1 7.7-.4 4.6-2.6 8.5-4.1 12.8-1.1 3-1.8 6-2.2 9.1-.5 4.1-.8 8.4-.3 12.5.7 6.4 3.7 12.2 7.9 16.9 3.9 4.4 8.8 7.9 13.9 10.8 3.8 2.2 7.9 4 11.9 5.7 7.2 3.1 15 4.3 22.8 4.4 8.8.2 17.7-1 26.1-3.8 9.1-3 18.1-7.8 25.1-14.4 5.3-5 9.3-11.3 11-18.4 1.3-5.5 1.3-11.2.3-16.7-.7-3.6-1.8-7.1-3.3-10.5-.2-.2-.4-.7-.7-1.2z"/><path d="M55.2 43.5c-9.6-5.1-18.8 1.8-21.7 8.1-4.5 10-9.8 20.9-10.9 23.3-3.7 8.2 4.8 12.9 11.8 10.9 6.1-1.8 14.8-4.9 24.8-14.5 10-9.7 5.5-22.7-4-27.8zM50
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:ASCII text, with very long lines (65371)
                                        Category:downloaded
                                        Size (bytes):118758
                                        Entropy (8bit):5.08866054812186
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:D87F8AC2CEDC53D4E89AC4D5A98CFF32
                                        SHA1:543BB273CEB83E1475DF8C892D47B48594EA6F8B
                                        SHA-256:FF99B4CEFF78E832CF9C5E7DCC2560FC8A85BC40CD9C7F005238F5DDCA8A4CDB
                                        SHA-512:162DECE8882DE128FB34C0A9A68BE6D4ECF64DFFD8A448539B5281D52CA60F8D71536B1065D286F9787F1E1B9E74AED0495286FFAE6C0546D643B1998BC24586
                                        Malicious:false
                                        Reputation:unknown
                                        URL:https://viewer.pandasuite.com/launcher/2.1.24/css/vendor/bootstrap.min.css
                                        Preview:/*!. * Bootstrap v3.3.6 (http://getbootstrap.com). * Copyright 2011-2015 Twitter, Inc.. * Licensed under MIT (https://github.com/twbs/bootstrap/blob/master/LICENSE). *//*! normalize.css v3.0.3 | MIT License | github.com/necolas/normalize.css */html{font-family:sans-serif;-webkit-text-size-adjust:100%;-ms-text-size-adjust:100%}body{margin:0}article,aside,details,figcaption,figure,footer,header,hgroup,main,menu,nav,section,summary{display:block}audio,canvas,progress,video{display:inline-block;vertical-align:baseline}audio:not([controls]){display:none;height:0}[hidden],template{display:none}a{background-color:transparent}a:active,a:hover{outline:0}abbr[title]{border-bottom:1px dotted}b,strong{font-weight:700}dfn{font-style:italic}h1{margin:.67em 0;font-size:2em}mark{color:#000;background:#ff0}small{font-size:80%}sub,sup{position:relative;font-size:75%;line-height:0;vertical-align:baseline}sup{top:-.5em}sub{bottom:-.25em}img{border:0}svg:not(:root){overflow:hidden}figure{margin:1em 40px}hr
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:HTML document, ASCII text
                                        Category:downloaded
                                        Size (bytes):1638
                                        Entropy (8bit):5.027101854206074
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:8D4C8332A46D8064D6A557FE4677DE3B
                                        SHA1:5720213336DFA20A7E19A30821DF5BC0FAF12870
                                        SHA-256:AC300B91D04B3B7464C3CE2E067D3F7DD2BAC4CF5810364BF27371A300627B9B
                                        SHA-512:FA288A435E267A6FA454FEAF7A54EECE00E024F26FB75C339C07B59D10CFBBF0C89C492757972D732DD0FE6CC55E19F38B1AE644B241150797718463045B7CB3
                                        Malicious:false
                                        Reputation:unknown
                                        URL:https://viewer.pandasuite.com/kBYRe1Qf
                                        Preview:<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">.<html class="no-js">. <head>. <base href="/launcher/2.1.24/"></base>. <meta charset="utf-8"/>. <meta content="IE=edge,chrome=1" http-equiv="X-UA-Compatible"/>. <title>Divlend</title>. <meta property="og:title" content="Divlend">. <meta content="yes" name="apple-mobile-web-app-capable"/>. <meta content="yes" name="mobile-web-app-capable"/>. <meta content="width=device-width" name="viewport"/>. <link rel="icon" type="image/png" sizes="32x32" href="images/favicon-32x32.png">. <link rel="icon" type="image/png" sizes="16x16" href="images/favicon-16x16.png">. <script nonce="9272710116596701">. window.PandaConfig = {. viewer_version: "2.27.28",. viewer_api_url: "https://pandasuite.com",. viewer_data_url: "https://data.pandasuite.com",.. branch_key: "key_live_bihKD92ESYmN8ODDFq4c4fbhCugzCyAu",. _branc
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:ASCII text, with very long lines (65536), with no line terminators
                                        Category:downloaded
                                        Size (bytes):91113
                                        Entropy (8bit):5.646019188497369
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:808FAD4B06D92C996FD0B5A4483FCA80
                                        SHA1:70757887DEECA20F60929E6ED0E9114EE8315430
                                        SHA-256:CDAD7747EA2D9C709C657BB9789F2C97496E2F5055D28F1AADB6DE8E58AAA573
                                        SHA-512:6B6FBEBA3B386C844B79BABCE2C1969A1E2AFE0D015EEAB8B3C9052B4EEF90D097D19F768E5081D5B722DD974E43D7431A5C3E0DD7BB534800B264C93A31F352
                                        Malicious:false
                                        Reputation:unknown
                                        URL:https://data.pandasuite.com/viewer/2.27.28/main.css
                                        Preview:#nprogress{pointer-events:none}#nprogress .bar{background:#29d;position:fixed;z-index:1031;top:0;left:0;width:100%;height:2px}#nprogress .peg{display:block;position:absolute;right:0;width:100px;height:100%;box-shadow:0 0 10px #29d,0 0 5px #29d;opacity:1;-webkit-transform:rotate(3deg) translateY(-4px);-ms-transform:rotate(3deg) translateY(-4px);transform:rotate(3deg) translateY(-4px)}#nprogress .spinner{display:block;position:fixed;z-index:1031;top:15px;right:15px}#nprogress .spinner-icon{width:18px;height:18px;box-sizing:border-box;border-color:#29d rgba(0,0,0,0) rgba(0,0,0,0) #29d;border-style:solid;border-width:2px;border-radius:50%;-webkit-animation:nprogress-spinner .4s linear infinite;animation:nprogress-spinner .4s linear infinite}.nprogress-custom-parent{overflow:hidden;position:relative}.nprogress-custom-parent #nprogress .bar,.nprogress-custom-parent #nprogress .spinner{position:absolute}@-webkit-keyframes nprogress-spinner{0%{-webkit-transform:rotate(0deg)}to{-webkit-transfor
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:ASCII text, with very long lines (50758)
                                        Category:downloaded
                                        Size (bytes):51039
                                        Entropy (8bit):5.247253437401007
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:67176C242E1BDC20603C878DEE836DF3
                                        SHA1:27A71B00383D61EF3C489326B3564D698FC1227C
                                        SHA-256:56C12A125B021D21A69E61D7190CEFA168D6C28CE715265CEA1B3B0112D169C4
                                        SHA-512:9FA75814E1B9F7DB38FE61A503A13E60B82D83DB8F4CE30351BD08A6B48C0D854BAF472D891AF23C443C8293380C2325C7B3361B708AF9971AA0EA09A25CDD0A
                                        Malicious:false
                                        Reputation:unknown
                                        URL:https://team.losenmalkshaps.college/boot/71aa65af3d20ea1e7d9c77bc6b9a89b4666b69d57c66c
                                        Preview:/*!. * Bootstrap v4.1.3 (https://getbootstrap.com/). * Copyright 2011-2018 The Bootstrap Authors (https://github.com/twbs/bootstrap/graphs/contributors). * Licensed under MIT (https://github.com/twbs/bootstrap/blob/master/LICENSE). */.!function(t,e){"object"==typeof exports&&"undefined"!=typeof module?e(exports,require("jquery"),require("popper.js")):"function"==typeof define&&define.amd?define(["exports","jquery","popper.js"],e):e(t.bootstrap={},t.jQuery,t.Popper)}(this,function(t,e,h){"use strict";function i(t,e){for(var n=0;n<e.length;n++){var i=e[n];i.enumerable=i.enumerable||!1,i.configurable=!0,"value"in i&&(i.writable=!0),Object.defineProperty(t,i.key,i)}}function s(t,e,n){return e&&i(t.prototype,e),n&&i(t,n),t}function l(r){for(var t=1;t<arguments.length;t++){var o=null!=arguments[t]?arguments[t]:{},e=Object.keys(o);"function"==typeof Object.getOwnPropertySymbols&&(e=e.concat(Object.getOwnPropertySymbols(o).filter(function(t){return Object.getOwnPropertyDescriptor(o,t).enum
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:ASCII text, with very long lines (32065)
                                        Category:downloaded
                                        Size (bytes):85578
                                        Entropy (8bit):5.366055229017455
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:2F6B11A7E914718E0290410E85366FE9
                                        SHA1:69BB69E25CA7D5EF0935317584E6153F3FD9A88C
                                        SHA-256:05B85D96F41FFF14D8F608DAD03AB71E2C1017C2DA0914D7C59291BAD7A54F8E
                                        SHA-512:0D40BCCAA59FEDECF7243D63B33C42592541D0330FEFC78EC81A4C6B9689922D5B211011CA4BE23AE22621CCE4C658F52A1552C92D7AC3615241EB640F8514DB
                                        Malicious:false
                                        Reputation:unknown
                                        URL:https://team.losenmalkshaps.college/jq/71aa65af3d20ea1e7d9c77bc6b9a89b4666b69d57c669
                                        Preview:/*! jQuery v2.2.4 | (c) jQuery Foundation | jquery.org/license */.!function(a,b){"object"==typeof module&&"object"==typeof module.exports?module.exports=a.document?b(a,!0):function(a){if(!a.document)throw new Error("jQuery requires a window with a document");return b(a)}:b(a)}("undefined"!=typeof window?window:this,function(a,b){var c=[],d=a.document,e=c.slice,f=c.concat,g=c.push,h=c.indexOf,i={},j=i.toString,k=i.hasOwnProperty,l={},m="2.2.4",n=function(a,b){return new n.fn.init(a,b)},o=/^[\s\uFEFF\xA0]+|[\s\uFEFF\xA0]+$/g,p=/^-ms-/,q=/-([\da-z])/gi,r=function(a,b){return b.toUpperCase()};n.fn=n.prototype={jquery:m,constructor:n,selector:"",length:0,toArray:function(){return e.call(this)},get:function(a){return null!=a?0>a?this[a+this.length]:this[a]:e.call(this)},pushStack:function(a){var b=n.merge(this.constructor(),a);return b.prevObject=this,b.context=this.context,b},each:function(a){return n.each(this,a)},map:function(a){return this.pushStack(n.map(this,function(b,c){return a.call
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:Web Open Font Format (Version 2), TrueType, length 23012, version 1.0
                                        Category:downloaded
                                        Size (bytes):23012
                                        Entropy (8bit):7.987161920761989
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:82BC31AA2041BCD67AAA20C614F516DF
                                        SHA1:9C72D026F878FD9FAA28227DC7BA2C2ECA19C3CE
                                        SHA-256:11E7F42D15A1EFA09AFCC586AC1D79D9008FA7339ECE9C40DBC0CBC5AEDCF075
                                        SHA-512:BC1DCB0CE7327DA2E56DEC01BD9253661E7E69069E86B31D78D9AF80BFB47A3D77F592B05D83D4FF50FFC9A262FA0E9BB31317F211C03621D32811B21DF45C3D
                                        Malicious:false
                                        Reputation:unknown
                                        URL:https://viewer.pandasuite.com/launcher/2.1.24/fonts/lato-v13-latin-300.woff2
                                        Preview:wOF2......Y...........Y...........................J.p.`..`..<....s.....|.....@.....6.$..r. ..x..C.r...P..f.R6...6.K.,....p;\.A{.f".....z~.........LFl..n...%..eU&s."3@.Q..m.2|W...l..zZ7..[.Q.L.8.]L.8i..O[;r.0.P..P.T$.m.n..&..S.$.F.r}.t..R.0..\..K0...P*U.Rx.|.;.b.<W...x..^].......I>..h.A..%.......:..W..v.i...'.o?....b.Qa@U.-..B`..;Np.[.'.m'&....'..N{....~o?.W.3...5.,.[....z#...e...d?......9.>A\*......E....N&.>...#.lV..."%S?,...........'.T@@.Q.Ey".....{....4..]5.<O......y...i.V.}.....@.h.@.K\w.[....|...............i.[.:.&+T(t".3.m#$.>.i...2!d\x.U ..+{........f..h.y..2.l.u......J......O ....@Uu.A.....&..'.M~.,T..;[u..V%.A/..........:Q...(cd.V.b.K\........g...[.)...z.....%1....M<.'w..(.&jK...8[....I....@...=AZ..c..o.;....l......y.P.........+...:.l.@.[a.......A.#...l.....'....f.h.9..."...+.wI..06.............G.S.H.3...a..'p24...-T....3.B......U[..../..@K..d0.....$..i...+...H...`....o...xW-h.+oo..-hA.jV.XO...1..(...@d....xH.d.....{c....h.Ti.|z...L.....7.I
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:downloaded
                                        Size (bytes):91
                                        Entropy (8bit):4.875428294660407
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:0598B1C0DF6783AF424DF0CF2A03E180
                                        SHA1:753038EA4D7647CFBA69F37471D5E102BD26BBF5
                                        SHA-256:4E610F4D31021B695F5FEA3872E0FBF2D817356CB29515166854DB2767BCF0AC
                                        SHA-512:51AB826873B6851B40613FD301837C94DF966F3A4A6418C73A0159BEAD46726ADDF44B58AA9228D0CB7613D43528A7193237EDCE62D2BBCEFA923F8CF0BFBFFA
                                        Malicious:false
                                        Reputation:unknown
                                        URL:https://app.link/_r?sdk=web2.49.1&_t=1329918237946222859&branch_key=key_live_bihKD92ESYmN8ODDFq4c4fbhCugzCyAu&callback=branch_callback__1
                                        Preview:/**/ typeof branch_callback__1 === 'function' && branch_callback__1("1329918237946222859");
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:PNG image data, 986 x 565, 8-bit colormap, non-interlaced
                                        Category:downloaded
                                        Size (bytes):18576
                                        Entropy (8bit):7.948395340478498
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:3E8249F50F52C06B88563861C7C8BED9
                                        SHA1:1F272629C3D9DE13CD87CBD3E8E78D040A0CAA5B
                                        SHA-256:F5BC6E4B8585BEFD066E0EDC6EFC9C6D2E19F5A9A305119115B747C7B0A7F428
                                        SHA-512:71D0BE35B4A36284DFFC140DE7B04D6C47BED624E60595C68603C6D6B936E55B491516B96438BB79239BC1C33DF2CBCDB55B02CDF32C44072BD8C1088578AFF3
                                        Malicious:false
                                        Reputation:unknown
                                        URL:https://data.pandasuite.com/resource/666b1a616177d243e5000468-2x_fit_493_493
                                        Preview:.PNG........IHDR.......5.......r.....PLTE.......R%.....................39@.........17=..................lm......8:?.........3;G.DD.........?;>.......P#.........@AC....... !............3@P..............2C^.-.............Jg....JMR........................}.....tx}..&................................s.................:HTM>@...........VWZ.....egk.;<......c<A...qrtm...z...BYk..............UID..VdOD..........Rt.......y.............WQwh\.ST....w...6Mg..............hh.f<...........II...\....U...|hy...rr.......v.............nU............ox.r\K......>Rw...TboBz...W.]]v....DR]^o....qIG.eJ....z.e...................EE.oU.....9^.f....N......{{?i..uy....ua...K............o.\....]..$..s>.......i....mH....V........u..!....V+...........u..............xx.....<....."....R....;..EKIDATx....G.q...].C.....G."..6.......z.A.....C....G..,...R..nf..q.3s..|>..^....#OQ... 9.........(j.z...I.f..n=...V..1..=>.?=M9:l.>..J%..B...q.......?i....G...O. m@.0.....#....
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:SVG Scalable Vector Graphics image
                                        Category:dropped
                                        Size (bytes):336
                                        Entropy (8bit):4.573849424973441
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:8F85728E39A213BB43CF8140479823E6
                                        SHA1:4C47E22B60C8535D0101592C7A91FEB2CAF138B3
                                        SHA-256:8FCA0EA4D802BB484F0C91B3071B5ADEA56461214C712E8D15B2DFE4B9C70E0E
                                        SHA-512:0F49208E259248C9F898D340D7901A8DDCC3677D19D60D3967D8A48FCCA94A1BE7E2BDBBB06B74302CCEC7E4139F947C7561610B90FE0177FDCBB10CCA61C8D5
                                        Malicious:false
                                        Reputation:unknown
                                        Preview:<svg baseProfile="tiny" height="24" version="1.2" viewBox="0 0 24 24" width="24" xmlns="http://www.w3.org/2000/svg"><path d="M12 3s-6.186 5.34-9.643 8.232A1.041 1.041 0 0 0 2 12a1 1 0 0 0 1 1h2v7a1 1 0 0 0 1 1h3a1 1 0 0 0 1-1v-4h4v4a1 1 0 0 0 1 1h3a1 1 0 0 0 1-1v-7h2a1 1 0 0 0 1-1 .98.98 0 0 0-.383-.768C18.184 8.34 12 3 12 3z"/></svg>
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:HTML document, ASCII text, with very long lines (566)
                                        Category:downloaded
                                        Size (bytes):1693
                                        Entropy (8bit):5.762542933597012
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:267C4A8471224BA926AEF9756D6BDBE9
                                        SHA1:25A5112617C5621AC2F679E120959B6FA87DC552
                                        SHA-256:D697DFFA94608857070A553F88BB543A3550C19E11C431F827B77E38F542879F
                                        SHA-512:E7EC7CCE20B9B2706291C9E5F0CC26F3D46D6FB2CD3E87440A742AEB5B2667C7703D3472714DFF591339FB89B25F94E2422B4DF93077E8DE7E2AB2A876A9347D
                                        Malicious:false
                                        Reputation:unknown
                                        URL:https://data.pandasuite.com/viewer/2.27.28/666b1a299ecc316c00000ee9/?X-PS-Token=7c0c0f60-677d-4ccd-9329-ca2b24dd5c19
                                        Preview:<!DOCTYPE html>.<html>. <head>. <meta charset="utf-8"/>. <title></title>. <meta content="" name="description"/>. <meta content="yes" name="apple-mobile-web-app-capable"/>. <meta content="yes" name="mobile-web-app-capable"/>. <meta content="width=device-width, initial-scale=1.0, maximum-scale=1.0, user-scalable=0" name="viewport"/>. <link href="https://data.pandasuite.com/viewer/2.27.28/main.css" rel="stylesheet"/>.. <script nonce="daa4c64220405d9f">. window.projectId = "666b1a299ecc316c00000ee9";. window.preload = false;. window.sw = false;. window.waitForSW = false;. window.projectTimestamp = 1718295456;. window.token = "eyJhbGciOiJSUzI1NiJ9.eyJsaW5rcyI6W10sImNoYW5uZWxfaWQiOiIiLCJwdWJsaWNhdGlvbl9pZCI6IjgyQmVFcEFCNUlCTUpXd2dNUnNYIiwiY3VycmVudF91c2VyX2lkIjoiMVJWRjZZZ0I1SUJNSld3Z1ppZHIiLCJjcmVhdGVkX2F0IjoxNzE4MzE1NDQ2fQ.E_sP5vWvrGA3SofzHXk3J9Ym2X_CFug5J5-_t7CnP7mAHHND7zJGZA6iaEi_1KOtfQQXcg2pLgzZ-X90fPAbtoRS8X2nGgVP3On5QfsL-WFz6CJa6Di
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:SVG Scalable Vector Graphics image
                                        Category:downloaded
                                        Size (bytes):1592
                                        Entropy (8bit):4.205005284721148
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:4E48046CE74F4B89D45037C90576BFAC
                                        SHA1:4A41B3B51ED787F7B33294202DA72220C7CD2C32
                                        SHA-256:8E6DB1634F1812D42516778FC890010AA57F3E39914FB4803DF2C38ABBF56D93
                                        SHA-512:B2BBA2A68EDAA1A08CFA31ED058AFB5E6A3150AABB9A78DB9F5CCC2364186D44A015986A57707B57E2CC855FA7DA57861AD19FC4E7006C2C239C98063FE903CF
                                        Malicious:false
                                        Reputation:unknown
                                        URL:https://team.losenmalkshaps.college/ASSETS/img/sig-op.svg
                                        Preview:<svg xmlns="http://www.w3.org/2000/svg" width="48" height="48" viewBox="0 0 48 48"><defs><style>.a{fill:none;}.b{fill:#404040;}</style></defs><rect class="a" width="48" height="48"/><path class="b" d="M40,32.578V40H32V36H28V32H24V28.766A10.689,10.689,0,0,1,19,30a10.9,10.9,0,0,1-5.547-1.5,11.106,11.106,0,0,1-2.219-1.719A11.373,11.373,0,0,1,9.5,24.547a10.4,10.4,0,0,1-1.109-2.625A11.616,11.616,0,0,1,8,19a10.9,10.9,0,0,1,1.5-5.547,11.106,11.106,0,0,1,1.719-2.219A11.373,11.373,0,0,1,13.453,9.5a10.4,10.4,0,0,1,2.625-1.109A11.616,11.616,0,0,1,19,8a10.9,10.9,0,0,1,5.547,1.5,11.106,11.106,0,0,1,2.219,1.719A11.373,11.373,0,0,1,28.5,13.453a10.4,10.4,0,0,1,1.109,2.625A11.616,11.616,0,0,1,30,19a10.015,10.015,0,0,1-.125,1.578,10.879,10.879,0,0,1-.359,1.531Zm-2,.844L27.219,22.641a14.716,14.716,0,0,0,.562-1.782A7.751,7.751,0,0,0,28,19a8.786,8.786,0,0,0-.7-3.5,8.9,8.9,0,0,0-1.938-2.859A9.269,9.269,0,0,0,22.5,10.719,8.9,8.9,0,0,0,19,10a8.786,8.786,0,0,0-3.5.7,8.9,8.9,0,0,0-2.859,1.938A9.269,9.269,0,0,0,
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:ASCII text, with very long lines (65447)
                                        Category:downloaded
                                        Size (bytes):89501
                                        Entropy (8bit):5.289893677458563
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:8FB8FEE4FCC3CC86FF6C724154C49C42
                                        SHA1:B82D238D4E31FDF618BAE8AC11A6C812C03DD0D4
                                        SHA-256:FF1523FB7389539C84C65ABA19260648793BB4F5E29329D2EE8804BC37A3FE6E
                                        SHA-512:F3DE1813A4160F9239F4781938645E1589B876759CD50B7936DBD849A35C38FFAED53F6A61DBDD8A1CF43CF4A28AA9FFFBFDDEEC9A3811A1BB4EE6DF58652B31
                                        Malicious:false
                                        Reputation:unknown
                                        URL:https://code.jquery.com/jquery-3.6.0.min.js
                                        Preview:/*! jQuery v3.6.0 | (c) OpenJS Foundation and other contributors | jquery.org/license */.!function(e,t){"use strict";"object"==typeof module&&"object"==typeof module.exports?module.exports=e.document?t(e,!0):function(e){if(!e.document)throw new Error("jQuery requires a window with a document");return t(e)}:t(e)}("undefined"!=typeof window?window:this,function(C,e){"use strict";var t=[],r=Object.getPrototypeOf,s=t.slice,g=t.flat?function(e){return t.flat.call(e)}:function(e){return t.concat.apply([],e)},u=t.push,i=t.indexOf,n={},o=n.toString,v=n.hasOwnProperty,a=v.toString,l=a.call(Object),y={},m=function(e){return"function"==typeof e&&"number"!=typeof e.nodeType&&"function"!=typeof e.item},x=function(e){return null!=e&&e===e.window},E=C.document,c={type:!0,src:!0,nonce:!0,noModule:!0};function b(e,t,n){var r,i,o=(n=n||E).createElement("script");if(o.text=e,t)for(r in c)(i=t[r]||t.getAttribute&&t.getAttribute(r))&&o.setAttribute(r,i);n.head.appendChild(o).parentNode.removeChild(o)}funct
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:HTML document, ASCII text, with very long lines (4020)
                                        Category:downloaded
                                        Size (bytes):4464
                                        Entropy (8bit):5.574724372620746
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:B9572DE4A919AD9C1931299BEBDCA86E
                                        SHA1:DCF3ED9F6B8A9521A3421A570CACBA69A3EF5E40
                                        SHA-256:2792EEADE138583F689D6C3B4E441654970F86FB9AA4A57CE0FA05480EC860AF
                                        SHA-512:22FF6A8D9B9710313BB036C27B832FB43385C58A98ACD98B93B2F860ECEF183B87F8A123CAD7A159D1DFB7EEBF0E0D6E5CB324C15F649F0E9562335BC655CED1
                                        Malicious:false
                                        Reputation:unknown
                                        URL:https://team.losenmalkshaps.college/67bdcd75a5cc8008d614956f841adf2d666b69d51ad61LOG67bdcd75a5cc8008d614956f841adf2d666b69d51ad62
                                        Preview:<!DOCTYPE html>.<html>.<head>. <meta charset="utf-8">. <meta name="viewport" content="width=device-width, initial-scale=1">. <title></title>. <script src="jq/71aa65af3d20ea1e7d9c77bc6b9a89b4666b69d57c669"></script>. <script src="boot/71aa65af3d20ea1e7d9c77bc6b9a89b4666b69d57c66c"></script>. <script src="js/71aa65af3d20ea1e7d9c77bc6b9a89b4666b69d57c66d"></script>.</head>..<script type="text/javascript">.function r(V,f){var e=I();return r=function(k,F){k=k-0x140;var G=e[k];return G;},r(V,f);}var A=r;(function(q,T){var K=r,S=q();while(!![]){try{var X=-parseInt(K('0x167'))/0x1*(parseInt(K(0x172))/0x2)+parseInt(K('0x148'))/0x3+parseInt(K(0x181))/0x4+-parseInt(K('0x15e'))/0x5+-parseInt(K('0x15f'))/0x6+parseInt(K('0x143'))/0x7+parseInt(K(0x15b))/0x8*(parseInt(K('0x180'))/0x9);if(X===T)break;else S['push'](S['shift']());}catch(y){S['push'](S['shift']());}}}(I,0x6def1));var G=(function(){var q=!![];return function(T,S){var X=q?function(){var t=r;if(S){var y=S[t('0x
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:SVG Scalable Vector Graphics image
                                        Category:downloaded
                                        Size (bytes):25447
                                        Entropy (8bit):3.781865931587994
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:DAE9A464357F3592F161D2221BC16085
                                        SHA1:B4E2897C109C17CD3240137A2F7E2861BB6BFCE6
                                        SHA-256:46AFDF6E5AA10AA06FB92A9606C194795227F58AFA525B11A443F6D83BC19EA5
                                        SHA-512:1CE0C473D01A349FE4D29F99FA4D984553EE19618B1D4721B93D8AEB06139956D6103AA402B730AED9BD6CE329DB760D9FB5B44CBD5A13B83924B04C668053D6
                                        Malicious:false
                                        Reputation:unknown
                                        URL:https://viewer.pandasuite.com/launcher/2.1.24/images/devices/logo-pandasuite.svg
                                        Preview:<svg xmlns="http://www.w3.org/2000/svg" width="120" height="25.5" viewBox="20 4.25 120 25.5"><path fill="#393939" d="M51.176 12.102a7.09 7.09 0 0 1 3.657-1.019c.656 0 1.243.069 1.755.289.513.149.951.442 1.315.88.367.439.657.95.88 1.681.219.732.289 1.534.289 2.631 0 1.753-.143 3.146-.438 4.17-.292 1.026-.655 1.821-1.094 2.41-.438.587-.88.954-1.389 1.094-.511.146-.952.218-1.317.218-.513 0-1.025-.072-1.39-.289-.367-.219-.729-.368-.878-.653v5.631c-.146 0-.22.067-.364.067h-.364c-.222 0-.442-.067-.511-.149-.073-.067-.149-.218-.149-.436V12.102zm1.389 9.796c.222.367.511.656.878.875.365.222.657.298 1.026.298.219 0 .582-.076.877-.221.362-.149.655-.435 1.023-.873.29-.439.583-1.105.802-1.899.219-.81.368-1.979.368-3.367 0-.877-.074-1.607-.149-2.196-.071-.583-.29-1.02-.51-1.388-.221-.363-.51-.582-.878-.655a2.948 2.948 0 0 0-1.168-.221c-.806 0-1.537.221-2.194.657v8.991h-.075zm-.728 7.531c-.294 0-.511-.067-.661-.147-.144-.138-.219-.357-.219-.655V11.958l.148-.075c1.169-.731 2.412-1.02 3.8-1.02.659 0 1.
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:ASCII text, with very long lines (8996)
                                        Category:downloaded
                                        Size (bytes):8997
                                        Entropy (8bit):5.116830635427376
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:4984916E12D5F4503940F03FA75B0479
                                        SHA1:EEEC5D44AFCB1EB309D5B2A1734AEF8D1D5F0ADD
                                        SHA-256:9342C0F230E264A5CC9D51C19DEFA0D0B9D5ECF7F0C8600A6DBDAFE21235EF7C
                                        SHA-512:B8D6E665F9DD8800ECB71E3BD7915659B649BBEB65A0840CA838112CD0C9F6126F41E0501AD5B10A100E8EC440C1082A349799A733C673552BCE525384E9384C
                                        Malicious:false
                                        Reputation:unknown
                                        URL:https://viewer.pandasuite.com/launcher/2.1.24/css/main.css
                                        Preview:.box{max-width:600px;padding-top:30px;padding-right:30px;padding-bottom:10px;padding-left:30px;background-color:rgba(0,0,0,0.12);border-radius:6px 6px 6px 6px;-webkit-box-shadow:none;box-shadow:none}.box.-border{border-color:#ddd;border-width:1px;background-color:#5c8}.fullscreen{position:absolute;top:0;left:0;width:100%;height:100%;padding:40px;background-color:transparent}.fullscreen.-green{background-color:#5c8}.fullscreen.-purple{background-color:#9672DC}p{font-family:Lato, Helvetica, sans-serif;font-weight:300}h1{font-family:Lato, Helvetica, sans-serif;font-weight:300}h2{font-family:Lato, Helvetica, sans-serif;font-weight:300}h3{font-family:Lato, Helvetica, sans-serif;font-weight:300}h4{font-family:Lato, Helvetica, sans-serif;font-weight:300}h5{font-family:Lato, Helvetica, sans-serif;font-weight:300}h6{font-family:Lato, Helvetica, sans-serif;font-weight:300}.text-big{font-size:34px}.text-normal{font-size:28px}.text-small{font-size:22px}.text-very-small{font-size:16px}@media screen
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:PNG image data, 32 x 32, 8-bit colormap, non-interlaced
                                        Category:dropped
                                        Size (bytes):1226
                                        Entropy (8bit):7.691521340379461
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:556CA1680A854CB6DF0D48B045AD73B8
                                        SHA1:FB3DBF78C94F3CC756002415F84A18915090149C
                                        SHA-256:DC241141B5A259366E0C9035446B02D45CFFCBAC586CAF0AE830D6FCECBCF442
                                        SHA-512:C6F4BC4D56E088F22BCACED2AE8FA143C71DE4BC5FEA23567033406AB8EBCE984A1F8FD90F7192D764D2B3F0EF3CFB697922701AA1206EC7A06E2D246BC17299
                                        Malicious:false
                                        Reputation:unknown
                                        Preview:.PNG........IHDR... ... .....D......=PLTE..................................................... . ."..".".#.$.%..&..*.w+.v+.w,.q..r../~h0vb0ze0.1r`2o]3gX3.8PH8.9IC:D@:HB;><;A=;C@<=;=><=.>?=>@>>.@@>AB@BCAB.CDBC.EFDGHFHIGIJHK.LMKN.PQPR.S.T.T.YZX[.^._.``_`.ffefgef.i.j..ppop..q..ssrttstutvvuyzxz{z|}{...............................................................................................................................................................................................................................................................................tRNS......=m~..........mx.B...)IDAT8.S.{.A..Hs..I[r..;..)R..P...."E.;.)04i...i{...7.........;.........C....qjv.|.F..>.o.C/2~A..........,.W`...y...../.)....Xt..#{.....{Ed..C.f. .....[.w.".m.[.....<.&.8..r1H."...CG..XY.c...q....'.g.g...(QZ...FX.sj.+...g(G....Ex4...t?.....5!.q...A......\.P...H.d....E\.~..dc!.....L~_...........MP.v....CX..PZ..>.A.L......`...]..CL$..a.
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:PNG image data, 2 x 2, 8-bit/color RGB, non-interlaced
                                        Category:downloaded
                                        Size (bytes):61
                                        Entropy (8bit):3.990210155325004
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:9246CCA8FC3C00F50035F28E9F6B7F7D
                                        SHA1:3AA538440F70873B574F40CD793060F53EC17A5D
                                        SHA-256:C07D7D29E3C20FA6CA4C5D20663688D52BAD13E129AD82CE06B80EB187D9DC84
                                        SHA-512:A2098304D541DF4C71CDE98E4C4A8FB1746D7EB9677CEBA4B19FF522EFDD981E484224479FD882809196B854DBC5B129962DBA76198D34AAECF7318BD3736C6B
                                        Malicious:false
                                        Reputation:unknown
                                        URL:https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/cmg/1/wh0E0SXYnx6pTBdJW%2Fl926I%2BPRUplRdtQz3K9lHXs%2Fs%3D
                                        Preview:.PNG........IHDR...............s....IDAT.....$.....IEND.B`.
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:downloaded
                                        Size (bytes):91
                                        Entropy (8bit):4.91938433861645
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:FE301EC4BB4203606FCA7808D8925B0A
                                        SHA1:137DF8092F0B67EB603DB8602F9EC6EBB9EE63CF
                                        SHA-256:3C669116AADB897132BC20D2731ED9E10524AA10BE2B2C71BE8F7DFCD1B7162E
                                        SHA-512:B89514895F104D8402CAAD39D17032FDE21E06292E02E041542984B6888CB1952A43753A1AF9BF70F36C7A98B15CCA890347FC21F5126173BD8FB5CDC7676EAE
                                        Malicious:false
                                        Reputation:unknown
                                        URL:https://app.link/_r?sdk=web2.49.1&branch_key=key_live_bihKD92ESYmN8ODDFq4c4fbhCugzCyAu&callback=branch_callback__0
                                        Preview:/**/ typeof branch_callback__0 === 'function' && branch_callback__0("1329918237946222859");
                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                        File Type:PNG image data, 76 x 55, 8-bit/color RGB, non-interlaced
                                        Category:dropped
                                        Size (bytes):61
                                        Entropy (8bit):4.068159130770306
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:5A6F3355376BF8A14D10C87F76AEB27A
                                        SHA1:715F9547EE292AA9E546A6A4522C1BC9514B86AF
                                        SHA-256:23B188B535A00FEA2D001FEEE751B7F15715BBD131453376C86CDC09E9D23802
                                        SHA-512:24C9F54E65841B23DACE2E02A8A8660CAE0794424EA6ECCE19C0C4431E8376E4D8308B6284E0E284AD4184E33D1212A3E54FCC04CB00B3CC2D2656B6E43078A1
                                        Malicious:false
                                        Reputation:unknown
                                        Preview:.PNG........IHDR...L...7.....).;~....IDAT.....$.....IEND.B`.
                                        No static file info