Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
http://www.higgsproductionservices.com

Overview

General Information

Sample URL:http://www.higgsproductionservices.com
Analysis ID:1467201

Detection

Score:1
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Detected non-DNS traffic on DNS port
Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 400 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://www.higgsproductionservices.com/ MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 6180 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1948,i,15190370097038132531,15861380563715753945,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: unknownHTTPS traffic detected: 13.85.23.86:443 -> 192.168.2.16:52659 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.43.61.160:443 -> 192.168.2.16:52660 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.43.61.160:443 -> 192.168.2.16:52661 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.85.23.86:443 -> 192.168.2.16:52662 version: TLS 1.2
Source: global trafficTCP traffic: 192.168.2.16:52640 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:52640 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:52640 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:52640 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:52640 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:52640 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:52640 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:52640 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:52640 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:52640 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:52640 -> 1.1.1.1:53
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
Source: unknownTCP traffic detected without corresponding DNS query: 23.43.61.160
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.higgsproductionservices.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficDNS traffic detected: DNS query: www.higgsproductionservices.com
Source: global trafficDNS traffic detected: DNS query: cdn.gtranslate.net
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52653 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52647 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52643 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52662 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52648
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52649
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52646
Source: unknownNetwork traffic detected: HTTP traffic on port 52650 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52647
Source: unknownNetwork traffic detected: HTTP traffic on port 52648 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52641
Source: unknownNetwork traffic detected: HTTP traffic on port 52644 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52644
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52642
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52643
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52661 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52659 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52659
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52651 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52649 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52651
Source: unknownNetwork traffic detected: HTTP traffic on port 49702 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52652
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52650
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52653
Source: unknownNetwork traffic detected: HTTP traffic on port 52664 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52641 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
Source: unknownNetwork traffic detected: HTTP traffic on port 52652 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52662
Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52646 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52660
Source: unknownNetwork traffic detected: HTTP traffic on port 52660 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52661
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52664
Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52642 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49702
Source: unknownHTTPS traffic detected: 13.85.23.86:443 -> 192.168.2.16:52659 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.43.61.160:443 -> 192.168.2.16:52660 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.43.61.160:443 -> 192.168.2.16:52661 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.85.23.86:443 -> 192.168.2.16:52662 version: TLS 1.2
Source: classification engineClassification label: clean1.win@20/27@10/115
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://www.higgsproductionservices.com/
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1948,i,15190370097038132531,15861380563715753945,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1948,i,15190370097038132531,15861380563715753945,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
http://www.higgsproductionservices.com0%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://www.higgsproductionservices.com/0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
higgsproductionservices.com
3.225.20.255
truefalse
    unknown
    www.google.com
    172.217.18.4
    truefalse
      unknown
      cdn.gtranslate.net
      104.26.13.42
      truefalse
        unknown
        www.higgsproductionservices.com
        unknown
        unknownfalse
          unknown
          NameMaliciousAntivirus DetectionReputation
          http://www.higgsproductionservices.com/false
          • Avira URL Cloud: safe
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          142.250.181.227
          unknownUnited States
          15169GOOGLEUSfalse
          34.104.35.123
          unknownUnited States
          15169GOOGLEUSfalse
          1.1.1.1
          unknownAustralia
          13335CLOUDFLARENETUSfalse
          239.255.255.250
          unknownReserved
          unknownunknownfalse
          104.26.13.42
          cdn.gtranslate.netUnited States
          13335CLOUDFLARENETUSfalse
          172.217.18.4
          www.google.comUnited States
          15169GOOGLEUSfalse
          64.233.184.84
          unknownUnited States
          15169GOOGLEUSfalse
          172.217.18.110
          unknownUnited States
          15169GOOGLEUSfalse
          3.225.20.255
          higgsproductionservices.comUnited States
          14618AMAZON-AESUSfalse
          216.58.206.46
          unknownUnited States
          15169GOOGLEUSfalse
          IP
          192.168.2.16
          192.168.2.4
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1467201
          Start date and time:2024-07-03 20:59:17 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:defaultwindowsinteractivecookbook.jbs
          Sample URL:http://www.higgsproductionservices.com
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:14
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • EGA enabled
          Analysis Mode:stream
          Analysis stop reason:Timeout
          Detection:CLEAN
          Classification:clean1.win@20/27@10/115
          • Exclude process from analysis (whitelisted): svchost.exe
          • Excluded IPs from analysis (whitelisted): 142.250.181.227, 216.58.206.46, 64.233.184.84, 34.104.35.123
          • Excluded domains from analysis (whitelisted): clients2.google.com, accounts.google.com, edgedl.me.gvt1.com, clientservices.googleapis.com, clients.l.google.com
          • Not all processes where analyzed, report is missing behavior information
          • VT rate limit hit for: http://www.higgsproductionservices.com
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jul 3 17:59:42 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2673
          Entropy (8bit):3.9919308045597153
          Encrypted:false
          SSDEEP:
          MD5:D07815E01612E6BBC5BB33E9B811A5E4
          SHA1:718DDCBBFF47AADC75874F9680E49F438A65B83D
          SHA-256:2D88161E040BFF53958D536C6F2D1ECB649FEB8593F34600A97C47216DAD821A
          SHA-512:93D4F51D49ECAE66BF4111CC1FBAEA2F567169A459F0DF2171BEACF5DB3DBA2E3D9BEE04118236B2EF527DA8DFB94F2E5B8637F07573A07B9469C0F255A7BB44
          Malicious:false
          Reputation:unknown
          Preview:L..................F.@.. ...$+.,....<<.){...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.Xm.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Xt.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Xt.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Xt............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Xv............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............>.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jul 3 17:59:42 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2675
          Entropy (8bit):4.006108900726382
          Encrypted:false
          SSDEEP:
          MD5:1673208E290DA3515A7E73B9A8AAC9A9
          SHA1:FFCE4580C7BDEF84C3E666A826690BB06AA453CF
          SHA-256:115D007EF6FE5A7B7769F70056C14E73F947A60FFEFF3F7100FDD1B2A2ED9B81
          SHA-512:1192CDDCAF43B06CDE425A2206402288FDE7A9F8E4F528A0550F9F0C5C3DC6A53878B13B89A239EB5E37AE43A73760B8179FB3D251BFCBBAFC4A7208D255E4C3
          Malicious:false
          Reputation:unknown
          Preview:L..................F.@.. ...$+.,....%*.){...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.Xm.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Xt.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Xt.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Xt............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Xv............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............>.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2689
          Entropy (8bit):4.0116764880659135
          Encrypted:false
          SSDEEP:
          MD5:8A90B282A2675D7064C8512DC3D3B998
          SHA1:BFE97712CC87A5B456FC09A98BE70D4E23AC4DF5
          SHA-256:6115311233847D1F260BFF69E8D1210C3B2292DF0A5335E3764ED14B76B88995
          SHA-512:A9744FE88EF76AA9D1EB402B46E5B54461B04E1E1F5F0806D19843EC7CCD15FCED011D961269E93EEBBC4F8FF5DC5394BBE371B57F87BDD39D2510D83F9A7E9C
          Malicious:false
          Reputation:unknown
          Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.Xm.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Xt.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Xt.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Xt............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............>.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jul 3 17:59:42 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2677
          Entropy (8bit):4.004177576053937
          Encrypted:false
          SSDEEP:
          MD5:AB4A1EE001E360454D7ED9605E769FDE
          SHA1:6C8B4D868FAF9ACAA75579B75F584C1544D5EE34
          SHA-256:7629929B187F7C6A455E49BE60651527579EF675E96BB4C937A1DDEFFB73066E
          SHA-512:4914E7FF7CC213C88684EC07AB8E9D28A68154175AB139AFBBD24F6A953E4DD68BB12FB59CD3F13C0C2E877BC2B49C8AC430756BBBDEF674BC3AD535962578B3
          Malicious:false
          Reputation:unknown
          Preview:L..................F.@.. ...$+.,.......){...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.Xm.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Xt.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Xt.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Xt............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Xv............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............>.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jul 3 17:59:42 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2677
          Entropy (8bit):3.9932687759541965
          Encrypted:false
          SSDEEP:
          MD5:0A29E6E09EF2C20B6496651A2A7ABE56
          SHA1:471B58F1E3858D037E98ECEB633CF05F6D4A34C7
          SHA-256:F92D1D6D6ECBF56E2B33C96B94F0E84943C78D9D217A1DE68DBD9C82FCD77BA1
          SHA-512:1BCE73D44A4836D270789537EB4117A2709CF9B5C9935EF7DDC27206968D2EC9E80A511A9AD16092823EE0109FC97D09990F8CF003B906050AE9A8550021EB72
          Malicious:false
          Reputation:unknown
          Preview:L..................F.@.. ...$+.,....L..){...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.Xm.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Xt.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Xt.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Xt............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Xv............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............>.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jul 3 17:59:42 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
          Category:dropped
          Size (bytes):2679
          Entropy (8bit):4.003250079754303
          Encrypted:false
          SSDEEP:
          MD5:CADCF9C1B813AAA936F2CD705C752577
          SHA1:BBF5BC9C1B3A4E766FC3222A730C3B5A029086AF
          SHA-256:582571487EE77322C62ED7209850935DC10DD7DB505A52A58BE1817EF6E4F16A
          SHA-512:B38358BE944E7957EA6C4F0E332A6470BE6AD3F7B4A624EE7F9F84A3B3D23BE7AA662D811C8E62C38FE6D4DD9EF33F25C0BC22DD52F6F69A6E36C6028C5FD115
          Malicious:false
          Reputation:unknown
          Preview:L..................F.@.. ...$+.,.......){...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.Xm.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Xt.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Xt.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Xt............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Xv............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............>.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:ASCII text, with very long lines (3973), with no line terminators
          Category:downloaded
          Size (bytes):3973
          Entropy (8bit):4.827282141653919
          Encrypted:false
          SSDEEP:
          MD5:E3218DE72735239F5FFCC82ED15BBBE4
          SHA1:244EC6786F61DCBF6505F2AC93005C9067B2D776
          SHA-256:1EF79B2072A9D3A6C2199DA997B413AEC7253BA10BBA96A0E2ABA96375AED28E
          SHA-512:D6B9B6B73D30179AB3F627726C4FB9E5B50141F161E58CFAFF4AB37FB5EFA52C1556FCBF8A8B1F0606C95EBCE701B52DDB52875DAE54CC496F08DFC3FEC3E514
          Malicious:false
          Reputation:unknown
          URL:https://www.higgsproductionservices.com/media/vendor/joomla-custom-elements/css/joomla-alert.min.css?0.2.0
          Preview:@charset "UTF-8";joomla-alert{--jui-alert-min-width:250px;--jui-alert-padding:.5rem 1.25rem;--jui-alert-margin:0 0 1rem 0;--jui-alert-border:1px solid transparent;--jui-alert-border-radius:.25rem;--jui-alert-animation-duration:.5s;--jui-alert-animation-timing-function:ease-in-out;--jui-alert-button-color-dark:#000;--jui-alert-button-color-light:#fff;--jui-alert-success-color:#234423;--jui-alert-success-background-color:#d9e6d9;--jui-alert-success-border-color:#cadcca;--jui-alert-success-link-color:#122212;--jui-alert-info-color:#0c5460;--jui-alert-info-background-color:#d1ecf1;--jui-alert-info-border-color:#bee5eb;--jui-alert-info-link-color:#062c33;--jui-alert-warning-color:#7d5a29;--jui-alert-warning-background-color:#fcefdc;--jui-alert-warning-border-color:#fbe8cd;--jui-alert-warning-link-color:#573e1c;--jui-alert-danger-color:#712b29;--jui-alert-danger-background-color:#f7dddc;--jui-alert-danger-border-color:#f4cfce;--jui-alert-danger-link-color:#4c1d1b;-webkit-animation-duration:v
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:RIFF (little-endian) data, Web/P image
          Category:downloaded
          Size (bytes):29886
          Entropy (8bit):7.988728968779729
          Encrypted:false
          SSDEEP:
          MD5:1A65ACA813254754A5CE6EC627A6DD93
          SHA1:D0166D206507D0FFED1D56BFE419474F5D97B220
          SHA-256:8392FC617382613BEB0B2B0BAF7BFEDD404BF0540CF097DCE1E41BBF8A1944A0
          SHA-512:7C76047F458A29A2FA7E97A5ECFB6EA2356DB2E0C80F0698D24515B72746413A3835FD82E2718AC516C486EED9FD4FBE58B471FACA56A5AE22860CAAAF21CFA7
          Malicious:false
          Reputation:unknown
          URL:https://www.higgsproductionservices.com/templates/yootheme/cache/b7/background-square-01-b71ea52d.webp
          Preview:RIFF.t..WEBPVP8X........W..W..ALPH.3....G.$9..:..p.3.".?..s..^...T..hN5O.l\..&..I..H...R....b... uB........s..m$)......D...a.W.<q..q....di....:...]..J].){-P....'.O.$Iv.0..........z..........v*.$|-].G......a....'.C#. ......h....".u.Yb......j;......k..).kY...u..eff.$s..W7..|..333.a.`p..B.....\..g&#B.m[U[..................y....y....y..X..J<.>.[..>..HY..?m..n2@.{.m`.L.8..f.{...P..:.....Ci.(.t.G.......W....2?.<(&&.....}4...Q......p2...(s...@.:..D..Zt...*t.j.b&.d.L_p...|S.'".....td..Y..n.7O...........4m....._...[J..x.s...Hz9C..3.....;#.....t.%9.x....X~.Y. .|.F.tR.....K....b4..\*?o.d.a.({....g,s...`.w...g.7..1..b.3.. B....1....\kt........#.........0........F.kw..5......nS#..!uY......er&6....j....E....W...c9nJ....F..LScT .m.% ..7....y.8A..N.4P...W.1G.....T?w`...F.a...1eO.B.a.@J.?.i..+f`.F..........L.d.b.LW.U7.]..fG..fU) .f...?n.p.u{>...x.H.'vQ.1...F......r2.....3?.W4.H={.....G..=^ .,4h... ...Q#......n^NP...)".3..).W.h.Q.....G.e......T,.4\._..C-q..D..u\.)..
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:ASCII text, with very long lines (7659)
          Category:downloaded
          Size (bytes):7660
          Entropy (8bit):5.386822664151063
          Encrypted:false
          SSDEEP:
          MD5:83F2C90A1BC4C508EF4EEFD77F349A3A
          SHA1:31D0DCA380CBE56AD668C122489879BA8225D9A0
          SHA-256:507276C7E9FAC25912525081ED364FA1DDAFA8FD3DF8BE517AC8EA749DCBF06A
          SHA-512:C8A7B36C6393FC35A29233584DEED3FC42856E3BDD794BE996E550A47032F0D6C7F471487C0A8C591118E15BD491D615FE652411D756983F008C1D94576652FA
          Malicious:false
          Reputation:unknown
          URL:https://www.higgsproductionservices.com/media/system/js/core.min.js?83f2c9
          Preview:function _extends(){return _extends=Object.assign?Object.assign.bind():function(r){for(var a=1;a<arguments.length;a++){var t=arguments[a];for(var e in t)Object.prototype.hasOwnProperty.call(t,e)&&(r[e]=t[e])}return r},_extends.apply(this,arguments)}const uriAttributes=new Set(["background","cite","href","itemtype","longdesc","poster","src","xlink:href"]),SAFE_URL_PATTERN=/^(?!javascript:)(?:[a-z0-9+.-]+:|[^&:/?#]*(?:[/?#]|$))/i,allowedAttribute=(r,a)=>{const t=r.nodeName.toLowerCase();return a.includes(t)?uriAttributes.has(t)?!!SAFE_URL_PATTERN.test(r.nodeValue):!0:a.filter(e=>e instanceof RegExp).some(e=>e.test(t))};function sanitizeHtml(r,a,t){if(!r.length)return r;if(t&&typeof t=="function")return t(r);const s=new window.DOMParser().parseFromString(r,"text/html"),n=[].concat(...s.body.querySelectorAll("*"));for(const l of n){const i=l.nodeName.toLowerCase();if(!Object.keys(a).includes(i)){l.remove();continue}const o=[].concat(...l.attributes),u=[].concat(a["*"]||[],a[i]||[]);for(con
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:ASCII text, with very long lines (3934)
          Category:downloaded
          Size (bytes):5598
          Entropy (8bit):5.038772089011134
          Encrypted:false
          SSDEEP:
          MD5:7A516911B85FDAB5112F9684D8B6046D
          SHA1:7F7AA28AC8E8D42145850E8B45B3BC82FF9A6411
          SHA-256:251B55C8DBD66154C2163EE5E53808C394678405276D6AD5758E848CCD1D37BE
          SHA-512:5E77989E1FD16E50CFD40A1B5BC870A39AEAA3665F5B3D719F43238598D6DDAADE4F1450E743B36E942AF79F42A27151594B41004C2A7BCF3ADF0B1FB95DBC25
          Malicious:false
          Reputation:unknown
          URL:https://www.higgsproductionservices.com/media/system/js/messages.min.js?7a5169
          Preview:class AlertElement extends HTMLElement{constructor(){super(),this.close=this.close.bind(this),this.destroyCloseButton=this.destroyCloseButton.bind(this),this.createCloseButton=this.createCloseButton.bind(this),this.onMutation=this.onMutation.bind(this),this.observer=new MutationObserver(this.onMutation),this.observer.observe(this,{attributes:!1,childList:!0,subtree:!0}),this.addEventListener("animationend",t=>{t.animationName==="joomla-alert-fade-in"&&t.target===this&&(this.dispatchEvent(new CustomEvent("joomla.alert.shown")),this.style.removeProperty("animationName"))}),this.addEventListener("animationend",t=>{t.animationName==="joomla-alert-fade-out"&&t.target===this&&(this.dispatchEvent(new CustomEvent("joomla.alert.closed")),this.remove())})}static get observedAttributes(){return["type","role","dismiss","auto-dismiss","close-text"]}get type(){return this.getAttribute("type")}set type(t){this.setAttribute("type",t)}get role(){return this.getAttribute("role")}set role(t){this.setAttr
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:RIFF (little-endian) data, Web/P image, VP8 encoding, 150x100, Suserng: [none]x[none], YUV color, decoders should clamp
          Category:dropped
          Size (bytes):2950
          Entropy (8bit):7.943786492390303
          Encrypted:false
          SSDEEP:
          MD5:0695311B1FDA53F52FDCF584C5DC7486
          SHA1:F794FD13D1F1B56F024E7E7146C73EC6FA1D5836
          SHA-256:BE8E7D6A24D70C77B1C133EABF3905E96726237F26340EB0F41CFB4A02AC14F3
          SHA-512:559E5CDA8A6A2718EBEE641A62323078CBA418FF933A1AB53DC2669520600D1E8F49EC0E9B20AF44E6D0E0B80D741EB3DF488D1AA7AA843C6BE61D3E11DFD62E
          Malicious:false
          Reputation:unknown
          Preview:RIFF~...WEBPVP8 r....2...*..d.>Q&.F#.!!"Vk.p..e.@...N.._*.5./)G....G....y.9.N.k....}.C.....?.....z@..._..na..#z.0U9...WQ..:}'(._%.dS4...O{...s.......<........x.............'P..x..o...~KQ.+.E.....+.eh.j...-v>]...l.J......3....@g......0...UZ.$U...w.....6....l..9Tdr>g.N.!......T)..^U.kw..n(.{...Q.pV.....~...P._..>k......o......xU.pS.;o.=.]....i.^..3n.D|......>..ym.0...2a........c0.l.K..q..."..........=.1>....@f../..H.3.S....?...).......*q.?n..}.4[..7.p...\3.m.. ...#`...gp..uy...7t.v...@.7.....ga....l.'M.j.v.....w.$..(........e.O.H..n......7s.SOp.....!Z......$..$...."...uT.Sw.Q.........b....H..za.Aoc.JdoJ...!..;.......W0".p.,.$}N.*%8$C..*.........).......*....HQ..HEb......\w......85..3p......h..q..(k.x....r..U.u#.o.....O..o....ZU.)..x).m..M.J".)A.f....c.7..cxe.M.}.U....Lm.!._+.....j1.4M[....0.......i.Y.wPE..._^?..p.f........2S....P...~.........,.,..7s. ..8..x.[...vkc+.../a...._..]K/"K.k>.........*fJ....S.?:.ILe.T........7...*.l......M........D..j.$..P.
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:RIFF (little-endian) data, Web/P image, VP8 encoding, 150x100, Suserng: [none]x[none], YUV color, decoders should clamp
          Category:downloaded
          Size (bytes):3928
          Entropy (8bit):7.947382461055483
          Encrypted:false
          SSDEEP:
          MD5:EF0C809CB3B825AB1C492FAB29CEDE48
          SHA1:93C945E39A293018A67D072C34EF6394F986C9AC
          SHA-256:EBB5CE2AF2BC8D7D26699020E5E223B97305FB02EF4EBF0B6BA8A0E5319E51DE
          SHA-512:4A87C5B8C3449A46B15DD90963FDC3130A1D579884E14470291B7B43FB930E2FFD9970ABF1FD5AB8055837F1AFCDB5D0AEEF08D0F15BBE4A60AB8CDA1D05D62C
          Malicious:false
          Reputation:unknown
          URL:https://www.higgsproductionservices.com/templates/yootheme/cache/22/photo-1635424709870-cdc6e64f0e20-225af2ac.webp
          Preview:RIFFP...WEBPVP8 D....=...*..d.>Q$.D..!....8....e.+.......x.*_1...E...'..././..v.........`....E.K................{.o.6"...{...'...U...;...!...^.>.}...g....O...Op..?..{.....k...'.?co.<..I...........v..z9~....Q...?D}cx..%3V.YJ.....@.3}.2....VU..$e...2.2 ....w..........70_....&].C.9.....T..nM8.....co7.g.D.wy..8.....4.{L<E.....:....n.......Y.}{IS.+........i........N............Ng.;,@..e;..x.;."...q?l2.}.o..3%%Z..e$7.|......Y(.zo..O.j3+..x.Z......Lw.]..[H'.]..t..G"..eR^.#..v..I...P!......&7.<.<.]......'.$5..J.?..k.^..+.uIW%<...-..xRU..0.["... ..$X'...>EK....F...oF.Z.Q..+W.~Sw.@D....m.p........8"..t{s....e..7;]....O C]..J:...'.....y.L....j~d..x]......N..u.h:....o.e....Z&y..2..5..93kO..|.S.aL.....G..n.C.]&..9..]....tb\.j..Q...$..`.5IW.J.s}..A./.0.p..m.RO. ...B.q.6`.5K.../...np.\..wo5r.?"./.%.S((..>..+..w....c?Z .Hn.7uxf.!....y<..j..g.H.... ..V~.. ..+w..H...e.m..Mc..U....(..<J<....NB.'.D..[....HCk..![|....m.Z..".3.+8X..U..i..bU.l...5.;!....e .'
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:RIFF (little-endian) data, Web/P image, VP8 encoding, 150x100, Suserng: [none]x[none], YUV color, decoders should clamp
          Category:dropped
          Size (bytes):6470
          Entropy (8bit):7.969910728831528
          Encrypted:false
          SSDEEP:
          MD5:4CB59F3F1E309D49A1D9F19957FE7E55
          SHA1:A963FDAA1A39E53E2575481AA628F6EC404F9549
          SHA-256:03EE5C7C5F00FD7B7A309584CE942947F811D2B06C3F9BB98D74234CC09ED56A
          SHA-512:3EAB0125C5106BABC93222F8B1E71EFCB952D2BD11FD2287FC3EFA970949F9A18FDC352233BB64707DA8CEFE95865275861AF1F490DDF4E01ED7A9B5D946E57E
          Malicious:false
          Reputation:unknown
          Preview:RIFF>...WEBPVP8 2...PM...*..d.>E..D".....`(.D..`i.k>K.....5..&.g.}......7..H...DN._....T.)........V..z......?..[.S.....=i........E/........{C.....<w5....p.._...z....K.?....u...K......?..D...w..._...?........+.....w.+...8....V+.!.7.D..I~a;A...-\y...t.x?.!...O........e.\..S.]2i...t..V......-i...|.w.~.W.^...j%.d..K...M...<n.^.Q....5..............3.G1..E..K.o...........j.....v..L7....?..nQ....^.......RQ+s.U2R+.6...|..I*.Q.e..Y{...9M..n..s.Gw....e.......k3c..0*W..Fk.:.FN....^6..Y....G).%...4w..A.*..Ni>i...Y}..S64....-O.Q#H..M......t.4.V..M!.........W.^.A1..}5....F}dH...+jy..~.d.\.u.8U.Kf..t....x..={.?-.e.w.....A-.. aw....L.g{.....@m.F....P.....y`Fx.^...t^.>..'../@6.+..|......>.D..m....D>...+[|.d..as........"6S...bl...{.2.....^.9.<.5..@..#p.mt.....f..9m.)%.....-u....~...N.c.q.5W..Z.QT..h.4F.n....b......@(..)t....5.......(..L*]..J.......A.].7[.aX.>.=..e1..k.0>x..._.....mw(.....|hE.Q.<1..|g.[...,....r..r.. au....7.....B...z.....:.(....Si.m
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:ASCII text, with very long lines (65536), with no line terminators
          Category:downloaded
          Size (bytes):71309
          Entropy (8bit):4.938028861996599
          Encrypted:false
          SSDEEP:
          MD5:1A20887E5A03A3B4F2BC022B4B2093AE
          SHA1:DAA0FFEA010238B6B5D21623031FA7698B467985
          SHA-256:1A93CD401023529D2E62A3590ABD3634BCE5B0428023B66E34373F4BB2EE3CE3
          SHA-512:A5E5A45A0E51CAA71CD1816ACA5ADEE2688A01663EB8BDBC2039808AFFFCC6C466370BF83F906D3C497CF4EE89A54C9DDFAA05FB2134DFC9F522809E74D20D9E
          Malicious:false
          Reputation:unknown
          URL:https://www.higgsproductionservices.com/templates/yootheme/vendor/assets/uikit/dist/js/uikit-icons-devstack.min.js?4.4.5
          Preview:/*! UIkit 3.21.6 | https://www.getuikit.com | (c) 2014 - 2024 YOOtheme | MIT License */(function(t,e){typeof exports=="object"&&typeof module<"u"?module.exports=e():typeof define=="function"&&define.amd?define("uikitdevstack",e):(t=typeof globalThis<"u"?globalThis:t||self,t.UIkitDevstack=e())})(this,function(){"use strict";function t(e){t.installed||e.icon.add({"500px":'<svg width="20" height="20" viewBox="0 0 20 20"><path d="M9.624,11.866c-0.141,0.132,0.479,0.658,0.662,0.418c0.051-0.046,0.607-0.61,0.662-0.664c0,0,0.738,0.719,0.814,0.719 c0.1,0,0.207-0.055,0.322-0.17c0.27-0.269,0.135-0.416,0.066-0.495l-0.631-0.616l0.658-0.668c0.146-0.156,0.021-0.314-0.1-0.449 c-0.182-0.18-0.359-0.226-0.471-0.125l-0.656,0.654l-0.654-0.654c-0.033-0.034-0.08-0.045-0.124-0.045 c-0.079,0-0.191,0.068-0.307,0.181c-0.202,0.202-0.247,0.351-0.133,0.462l0.665,0.665L9.624,11.866z"/><path d="M11.066,2.884c-1.061,0-2.185,0.248-3.011,0.604c-0.087,0.034-0.141,0.106-0.15,0.205C7.893,3.784,7.919,3.909,7.982,4.066 c0.05,
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:PNG image data, 170 x 30, 8-bit/color RGBA, non-interlaced
          Category:downloaded
          Size (bytes):9184
          Entropy (8bit):7.949087413636123
          Encrypted:false
          SSDEEP:
          MD5:378ACE51BCDDB2367AB66F5E3C4C9DAC
          SHA1:D83DCA4DD6168D473EEDD9796C1B033418C8D802
          SHA-256:4A3FB45101B18554DD2F0E6D2D5BFCAB9A738E198C7CC74EF32CCD3CCF444CE6
          SHA-512:F96BD998891D2E0F48E3616CF3679A2E43CBF61D2F03823607878A3AF4D604CF3C951E431E0836EABFCDDADAAFD50DEFA9977C4879F1BF8FB1980D43D66620D3
          Malicious:false
          Reputation:unknown
          URL:https://www.higgsproductionservices.com/images/icons/5-stars.png
          Preview:.PNG........IHDR..............-......tEXtSoftware.Adobe ImageReadyq.e<..."iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.0-c060 61.134777, 2010/02/12-17:32:00 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CS5 Macintosh" xmpMM:InstanceID="xmp.iid:FD6F50FA07FD11ED996EA0F98BD1DAC1" xmpMM:DocumentID="xmp.did:FD6F50FB07FD11ED996EA0F98BD1DAC1"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:FD6F50F807FD11ED996EA0F98BD1DAC1" stRef:documentID="xmp.did:FD6F50F907FD11ED996EA0F98BD1DAC1"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>x..... TIDATx.|.....{..U.U}T.}J...B..,..8.x.1..).c....`<..^{.ywv....c.a........`0...@.@`.. .!t.}TWwW.g...;..jQ.B.nef
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:RIFF (little-endian) data, Web/P image, VP8 encoding, 150x100, Suserng: [none]x[none], YUV color, decoders should clamp
          Category:dropped
          Size (bytes):4024
          Entropy (8bit):7.944624519042679
          Encrypted:false
          SSDEEP:
          MD5:8476AD771658986B386D1366EEEA8D66
          SHA1:C62E6D4CDCDB57306DD4342FE7785CF60AD1EF76
          SHA-256:C4CE3F61C983947FD7099444BBE6A42E14D6BA897E23A3239EC4482CFEC12479
          SHA-512:3BDB4BCD2B94537BE46B41A107B96189B53FD8B328D3BB3A3533745C12D3E258792C57433FD667CDCD9D660B4DC9AD2CAA1B49FB374991CE86D38FBAB4DD6467
          Malicious:false
          Reputation:unknown
          Preview:RIFF....WEBPVP8 ....p<...*..d.>Q$.E#.!!&.Kxp..Mho...@;. ....S.EW...^.!....../......................W.....nw...G.g*.|..W.|......_.=@.m............5&kz._.g...~..`.....^.?..p...e...Io.h.Q.p~.u+.R....|....Q.4&...Tq..?e...f'..y.B.9...(ku....%e./...Y.R...i.\.I.e....X..d.N.l.k.<... +$?`....y.C..WfVQ[.&.hy@.u.....+1|.q......R&..2.|'..|......=.^:.Zx.D.a!....5*r..b....[m...{.H...+r.....t.]. .T...J.W..8.8}yv.../..|.nk/qt..I-.....uB......`N..}..........k.F..I"k..7..R. .V..?%.0v.....f.+.....g..3.$.......2....>...;.q'.#..x.......K......r<g?.:.|........{..s.B4.M.@......awY;n.."...Vf..._U1.W..0J....%. ,.8.%.....Mb....x8:)..V6.. ...$......d.2-...k.vo....^e..hO.*C?.....F.+.V.... '....a.@.q?.5.MUT...H_8..).......C.a.K2a..>.F.y..1.#J.&.\..J;..xu{......-.....i.@...f......nh[..?l.......v.....A....R...Z...:l.G.O..z../.....$.P.9....K....4.....E....on.,...F.r.9(..y\Y...,..l.U-P....V:....!.Rj...O....N.)Ov .W..Z........e.b. ~.....Fnka0.C...]\C3bq..7....,~..(S.x.........Q
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:Unicode text, UTF-8 text, with very long lines (60771)
          Category:downloaded
          Size (bytes):473113
          Entropy (8bit):5.126567665817001
          Encrypted:false
          SSDEEP:
          MD5:63216CE0714BC57A5C9EBFB95DA24117
          SHA1:8C9FD7CF0E6ED743FFC9DE06972A3A3C1A77B102
          SHA-256:FF3D1BA093789EC2BCE14014D800147849690AFFE382CCD75B37186BB99CB34F
          SHA-512:33F0EB480C618BF2088FD277F4C8870804AE9D388BFECFD1C95A32371F94A29D309BE4143876C1A4161767A14B830AE3CF782077140D0EF63DDD1E607C2624C4
          Malicious:false
          Reputation:unknown
          URL:https://www.higgsproductionservices.com/templates/yootheme/css/theme.12.css?1719921704
          Preview:/* YOOtheme Pro v4.4.5 compiled on 2024-07-02T12:01:44+00:00 */.@font-face {font-family: 'Manrope'; font-style: normal; font-weight: 500; unicode-range: U+0460-052F, U+1C80-1C88, U+20B4, U+2DE0-2DFF, U+A640-A69F, U+FE2E-FE2F; src: url(../fonts/manrope-fae4d24b.woff2) format('woff2'); }.@font-face {font-family: 'Manrope'; font-style: normal; font-weight: 500; unicode-range: U+0301, U+0400-045F, U+0490-0491, U+04B0-04B1, U+2116; src: url(../fonts/manrope-339072c9.woff2) format('woff2'); }.@font-face {font-family: 'Manrope'; font-style: normal; font-weight: 500; unicode-range: U+0370-0377, U+037A-037F, U+0384-038A, U+038C, U+038E-03A1, U+03A3-03FF; src: url(../fonts/manrope-2ebfc1da.woff2) format('woff2'); }.@font-face {font-family: 'Manrope'; font-style: normal; font-weight: 500; unicode-range: U+0102-0103, U+0110-0111, U+0128-0129, U+0168-0169, U+01A0-01A1, U+01AF-01B0, U+0300-0301, U+0303-0304, U+0308-0309, U+0323, U+0329, U+1EA0-1EF9, U+20AB; src: url(../fonts/manrope-b4057821.woff2)
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:RIFF (little-endian) data, Web/P image
          Category:downloaded
          Size (bytes):6538
          Entropy (8bit):7.955008152781417
          Encrypted:false
          SSDEEP:
          MD5:3D162D72178818946ABF7E5A3F4FD150
          SHA1:919392491FBCFF74EF8D03B85F41F28058898FF2
          SHA-256:8E104A3DE55D86A591C40E8A227F8C2B960C974D0C55EB37BB8880DAE5884F93
          SHA-512:166580659C6A85A8923B75163074E05BDA8A8FCF74C24C7227516644230C670041CDBE6F3DE5D593E3BB0B9F1EB0C737A7F28D4C4815389FC3CAA9E2AB2755E9
          Malicious:false
          Reputation:unknown
          URL:https://www.higgsproductionservices.com/templates/yootheme/cache/06/higgs-logo-wide-web-06313c7a.webp
          Preview:RIFF....WEBPVP8X........%..E..ALPH......Gl....8.8"".........................*S3.S5.53SS355Q5U5_SUUQUQS.....q.......9'...........:...g.....G.!.q..0DV....<....?Q|.xWw...kx^.\.+..M.`s...Wx...5../;...o[<..j2.h<..(".5..G...`{<n..7...x.Ek..-.ooQ]..D..>w(.h.t:.^o..t:.^..z:.N.<..I..E.......b...0o..%"....%...w.Q.../.E.........y......I..x.........b..s.....}..}.N..+D..E.N.w..t:....R.t:.n.w.....N.eD..#.!".F`...X...w...W..:Ca~...4CanPt..[......OA2V@.E..nQ.0..."=..#=n...D....D.e+.O-D.K.h9b....kD..0@..........Kz.m3...*@..%.....J^x.`;..Z.......Zm`..G".(.Xl.o.%+..6.6}.\N.\.]..+..x......5...y..1..x.H........""....9..>.X...FZ......A...#.<......^....t.n*N.+5...F..`....Z.d..{.#...#8..AD4.....^.l.s...........%l.B9R...../.MR.t..ED.%.7......W..b.......Y(#...>...Y.]q.&............w..6.Y..'.CD.g..>Bp...\.ur.[y.'G....Mr..?..X.u}...u].8.$|..G...=_..N...{..Av.....g..qR.%.^.3..Dv.!g...O...t"=m58W..N..t .4..}....[.7..".3...L.p..T.f.h#YF.3a...R......3.U ..S4.....s b.c..
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:ASCII text, with very long lines (6062)
          Category:downloaded
          Size (bytes):12801
          Entropy (8bit):5.378856184955765
          Encrypted:false
          SSDEEP:
          MD5:BB40C34EBD8E61AABC75B77D89D8E3BA
          SHA1:8DD3E0D256B2581CF1C29109B8659AEF876667C3
          SHA-256:088D5EDAB48BF8865B33D6AFA8000EDB94A4FBCD67E7737E0A151A6989C8CAD8
          SHA-512:A197BF259E735BA91BDF31EA91D6B889DFFF23A2A46A39F67B7B2BE5F29260F8F386CDF7F3AABEB18CA82A19AF0549A7C0FE73442913914C82CC238E712D6D77
          Malicious:false
          Reputation:unknown
          URL:https://cdn.gtranslate.net/widgets/latest/flags.js
          Preview:/*!Copyright (C) GTranslate Inc.*/(function(){var gt=window.gtranslateSettings||{};gt=gt[document.currentScript.getAttribute('data-gt-widget-id')]||gt;var lang_array_english={"af":"Afrikaans","sq":"Albanian","am":"Amharic","ar":"Arabic","hy":"Armenian","az":"Azerbaijani","eu":"Basque","be":"Belarusian","bn":"Bengali","bs":"Bosnian","bg":"Bulgarian","ca":"Catalan","ceb":"Cebuano","ny":"Chichewa","zh-CN":"Chinese (Simplified)","zh-TW":"Chinese (Traditional)","co":"Corsican","hr":"Croatian","cs":"Czech","da":"Danish","nl":"Dutch","en":"English","eo":"Esperanto","et":"Estonian","tl":"Filipino","fi":"Finnish","fr":"French","fy":"Frisian","gl":"Galician","ka":"Georgian","de":"German","el":"Greek","gu":"Gujarati","ht":"Haitian Creole","ha":"Hausa","haw":"Hawaiian","iw":"Hebrew","hi":"Hindi","hmn":"Hmong","hu":"Hungarian","is":"Icelandic","ig":"Igbo","id":"Indonesian","ga":"Irish","it":"Italian","ja":"Japanese","jw":"Javanese","kn":"Kannada","kk":"Kazakh","km":"Khmer","ko":"Korean","ku":"Kurdi
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:ASCII text, with very long lines (1537)
          Category:downloaded
          Size (bytes):1589
          Entropy (8bit):5.107924281483348
          Encrypted:false
          SSDEEP:
          MD5:4D3138C6FDEE5F6F304F6A2A535E8A25
          SHA1:AF6574AF4A6C31B1A887143CA540D96A5AA5F436
          SHA-256:407C2CFED9D00C70A2107D1680E5A5D7FBECCAFDE7E290EAF99C3BE29BEA09C6
          SHA-512:F848C800108842BAF28BB70EC3FF19E96CF20E5D2ABD9E0E3707BB5AA8A2B9B7495F537E389ACAA7F4363D502E15EB2B6C04007CD29F8489134E477F61976A6F
          Malicious:false
          Reputation:unknown
          URL:https://www.higgsproductionservices.com/templates/yootheme/js/theme.js?4.4.5
          Preview:/*! YOOtheme Pro v4.4.5 | https://yootheme.com */..(function(o,e){"use strict";const r={computed:{section:{get:()=>e.$('.tm-header ~ [class*="uk-section"], .tm-header ~ * > [class*="uk-section"]'),observe:()=>".tm-page"}},watch:{section(){this.$emit()}}},a={mixins:[r],computed:{anchor:{get(){return this.section&&!e.matches(this.section,"[tm-header-transparent-noplaceholder]")&&(e.$(".uk-grid,.uk-panel:not(.uk-container)",this.section)||e.$(".tm-main > *"))}}},observe:[{observe:e.observeResize,handler(){this.$emit()}}],watch:{anchor(){this.$emit()},section(s,t){t&&this.$update()}},update:[{read(){return{height:this.$el.offsetHeight}},write({height:s}){if(!s||!this.anchor){e.remove(this.placeholder);return}this.placeholder||(this.placeholder=e.$('<div class="tm-header-placeholder uk-margin-remove-adjacent">')),this.anchor.previousElementSibling!==this.placeholder&&e.before(this.anchor,this.placeholder),e.css(this.placeholder,{height:s})}}]},i={mixins:[r],update:{read(){return this.sectio
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:RIFF (little-endian) data, Web/P image
          Category:dropped
          Size (bytes):4500
          Entropy (8bit):7.925688905244098
          Encrypted:false
          SSDEEP:
          MD5:F647427F06BB3069A475C5B5D1AD0630
          SHA1:2D93116C880FE69D37D3DCD73CB0527B0B093E23
          SHA-256:9DBE762EE79CBA2069E4F0E44E90B70EF70E9976BC0C0F8F2FE7E976143AFE84
          SHA-512:DE8A16DE9064A8D4845AC1EBCDC834042754E0BC8906BD4B1B41A58D8BB6DD5ABDAFB567508D9C98714919055C94ACAFC9E682F77701E5ABF8118F88EAC7093D
          Malicious:false
          Reputation:unknown
          Preview:RIFF....WEBPVP8X...........1..ALPHB.....Fl......RJ.R"""JDDL.....EDk.#.G.2DDk.."..yFDDD...9.""Z.6?c..ZDDD..-.E.V"..RJ..a.1.1...f;.E......b.~.=.9.._.. ..~.kB..%u.........}.d.U.:X......[.[........D.,.H,5....D.Hx"i.........L..H..#.........Q...s)..Hpt.d.^i.i\N$..e./ .H$.##.DbB.?.[0....e .X7.H$>..}.W.|..N...DbTd1.......E.......Rg..<...(_w.D.P..Ih.eaD...e.|h.4..E.q....D..^........k6N.{.{\.m...E_.q........`.Ct.BU.e.rE.....J.....uY.J.`OFm0..q....(..a.........m..+..:*0P.+...8..2..l.Zg[$.....z..^.U..H...K.X....`...D.ci(..s..x(;.F7`7;.o..s..-`'..&./....&.*......o..P...]o.6.`o......M....x...x.|..nj.2...B.R.......:.;..).&.I..V$.,..^..".....f.Q.y.K............7.T.c x.hr.m.;..x...U.....u..&.B....A.......b\a.y.m..vy.....*..........#......%`..,....Zv..o..[...Q..L.* .D..j.d.=E......l...&.^.+90}..6\....W+>333T.o....t......f9Z.PT.Y....e9+;;;;........<.a..(..^._x...k9....*.C....{..Oo.....J]U:..P..v.h.G6....zsGa....cy.\..a)K;.{Z.3.lj...+.eyyf)D.s......DQj..&....Uk~kkk.
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:Unicode text, UTF-8 text, with very long lines (63106), with no line terminators
          Category:downloaded
          Size (bytes):131296
          Entropy (8bit):4.920675732772563
          Encrypted:false
          SSDEEP:
          MD5:A20B32D2D0D0F2FC10F5834AE6E04D3D
          SHA1:67F4FB9A894CB95D7BA2FD9F90291C2222B3D7B8
          SHA-256:01B57DF2819777B302FB1FCABD9E4C8CD6D72443F950D47314DF62CB1C0D59F7
          SHA-512:2A36F7B94679E9733F96971CCDB10FC93EC70C8F61EF0646A3C866AE98793C92FE328B9730B7D2347A278488BD811FCC536BAEB2115EAF9CDBBCF5A41F9CC4E0
          Malicious:false
          Reputation:unknown
          URL:https://www.higgsproductionservices.com/media/system/css/joomla-fontawesome.min.css?ver=4.4.5
          Preview:@charset "UTF-8";.fa{font-family:var(--fa-style-family,"Font Awesome 6 Free");font-weight:var(--fa-style,900)}.fa,.fa-classic,.fa-sharp,.fas,[class^=icon-],[class*=\ icon-],.fa-solid,.far,.fa-regular,.fab,.icon-joomla,.fa-brands{-moz-osx-font-smoothing:grayscale;-webkit-font-smoothing:antialiased;display:var(--fa-display,inline-block);font-variant:normal;text-rendering:auto;font-style:normal;line-height:1}.fas,[class^=icon-],[class*=\ icon-],.fa-classic,.fa-solid,.far,.fa-regular{font-family:"Font Awesome 6 Free"}.fab,.icon-joomla,.fa-brands{font-family:"Font Awesome 6 Brands"}.icon-joomla,[class^=icon-],[class*=\ icon-]{-webkit-font-smoothing:antialiased;-moz-osx-font-smoothing:grayscale;font-variant:normal;font-style:normal;font-weight:400;line-height:1;display:inline-block}.fa-1x{font-size:1em}.fa-2x{font-size:2em}.fa-3x{font-size:3em}.fa-4x{font-size:4em}.fa-5x{font-size:5em}.fa-6x{font-size:6em}.fa-7x{font-size:7em}.fa-8x{font-size:8em}.fa-9x{font-size:9em}.fa-10x{font-size:10em}.
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:ASCII text, with very long lines (65536), with no line terminators
          Category:downloaded
          Size (bytes):146711
          Entropy (8bit):5.284476795914741
          Encrypted:false
          SSDEEP:
          MD5:9A534D34E9BFC649D8B97EDF865F1653
          SHA1:D01F38D8C7C503FB64D471C8E854B24C5724C034
          SHA-256:10B67B120B82A80ED88D69CEBC00955A094AEDE9922057BC5FB094D86B3FA09A
          SHA-512:EF6510026E79962C91C501F777FFE71D99430D476FF5CAB152D695D030267B8A8F9FDB18BC4C515522FC3D3D03A184ED7FB70D4052032EF61DE2D963576E41D1
          Malicious:false
          Reputation:unknown
          URL:https://www.higgsproductionservices.com/templates/yootheme/vendor/assets/uikit/dist/js/uikit.min.js?4.4.5
          Preview:/*! UIkit 3.21.6 | https://www.getuikit.com | (c) 2014 - 2024 YOOtheme | MIT License */(function($e,ye){typeof exports=="object"&&typeof module<"u"?module.exports=ye():typeof define=="function"&&define.amd?define("uikit",ye):($e=typeof globalThis<"u"?globalThis:$e||self,$e.UIkit=ye())})(this,function(){"use strict";const{hasOwnProperty:$e,toString:ye}=Object.prototype;function pt(t,e){return $e.call(t,e)}const nr=/\B([A-Z])/g,Dt=ht(t=>t.replace(nr,"-$1").toLowerCase()),or=/-(\w)/g,ke=ht(t=>(t.charAt(0).toLowerCase()+t.slice(1)).replace(or,(e,i)=>i.toUpperCase())),kt=ht(t=>t.charAt(0).toUpperCase()+t.slice(1));function gt(t,e){var i;return(i=t==null?void 0:t.startsWith)==null?void 0:i.call(t,e)}function Qt(t,e){var i;return(i=t==null?void 0:t.endsWith)==null?void 0:i.call(t,e)}function v(t,e){var i;return(i=t==null?void 0:t.includes)==null?void 0:i.call(t,e)}function wt(t,e){var i;return(i=t==null?void 0:t.findIndex)==null?void 0:i.call(t,e)}const{isArray:G,from:Zt}=Array,{assign:ft}=Ob
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:RIFF (little-endian) data, Web/P image, VP8 encoding, 1366x911, Suserng: [none]x[none], YUV color, decoders should clamp
          Category:downloaded
          Size (bytes):117276
          Entropy (8bit):7.998120661494903
          Encrypted:true
          SSDEEP:
          MD5:F6807E14C122277F207F34A263421A89
          SHA1:9FBBFB0F4FFC10C0A4F218A9F31BB0FD347DC741
          SHA-256:74930F36D010B892D6BC0191D53C1A4C0FA0BCE7FEB02D3755AB611B002CF3C6
          SHA-512:6898E3C9EB7CF786AEB2E00F3F30EAA7479819FABD94A4CE19F71B8411560DB045BCAD3BC226A7DD13EEA154DF8654400CA5C1B4E87E679366ED99725ADD0843
          Malicious:false
          Reputation:unknown
          URL:https://www.higgsproductionservices.com/templates/yootheme/cache/fd/photo-1635424709870-cdc6e64f0e20-fd2bf145.webp
          Preview:RIFF....WEBPVP8 ....0....*V...>Q&.E..!*%2.@..en....?i......M.r..2.1...v..//.......X|.........../..........j|.........?....B......}........G...+.?...~...........f.....u....._..W.._...|.........?..8.=/..>..Y......?....o.w.....b.........?........=../...?.o......X._...O.......yx.....;.....o.?.b.....n<w.S.Y..Q.......%=rn...2......x.......,.......X...../..C._'1..).Y..l.-.~e.8nc2...t...7|..0`".a....\.$.IX}.1o..32&..2&....cn..>....Y...}.8..79......#.6.~.7.7w.z3.5..cw..c.gI...*i...Y..cw..tl.:....cx....~_.b...]....W.~e.9!.2..]`..0O...D.9.t.c]...3......0.Y...Rs.a..\..?2......k.....Y..c2q_...C....5Dl.....=.&[...:rC.fJ...p.|..2....8..r......dK..G$=.(*X.w.p)7..$....Mw#E5`.t.-.~e.9!.4..)..2...!#w....d..7....._...s3....;t..A....t...."`...9L..3"`..:...K..6g...GmB.../.......V..cDf.._.~e.9!.7y. ..h..0d.dL..gKN............d..L..g.-@.Y7..e.9!.3'...{.....:rC.n..7K../_....9*G.Y..^H....3Xd.o..,....r...a..A.)..2&...$>.7..H.W.8m.;.>.`YXU...Y..cw..B....?.r.
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:RIFF (little-endian) data, Web/P image
          Category:dropped
          Size (bytes):70932
          Entropy (8bit):7.991574697853631
          Encrypted:true
          SSDEEP:
          MD5:06B148A36DFF22B8A37D986D5DDE4CF2
          SHA1:AFFA67F893CFDDB7553811012349CC4142F449A8
          SHA-256:6955227AD59BFA58CC575A34CAE6048292D565D144EF9EC5404319F156D2AE11
          SHA-512:8D4850CFDBC40C8CBC81AF842C7A30108EAC4E7E5A466FE262F3C1B6EA0DCBC555E69DB5C27779378E137AD28181B133E9F674F4ED8A3736418420A7CF893C77
          Malicious:false
          Reputation:unknown
          Preview:RIFF....WEBPVP8X..............ALPH@........M.v.v...X.G.......4...4.+m|...x.4.q........vU..Z.....ok.^.Z..I......FR.`O..&...V+2.@...'.p.~._r..@....k..S.P.m#..%...D.I......;I..@......F...#..Y..';8I.....4....`f..w...%.$Y.$...K....\.xn.*",b*.j0...@...mC.......s.Rr...m[.m..Hu....bf.hp.e.)...L.U.5Z-..>.}..gE.5.z..<.%T(...4M:...A.....u..j.Q0..a...\...:.9..X.jr..<.s.9.r.9.&XG..<;A;GG.R.h.......@...~..@.."..l[U.k+......6.$.../.............~.o?..........ve6.o.>.D.*....j......g.{E..gU...W5........^..]....(9.j.l.U...yW3`.-D.C.......H..Lrzy2..K.zc....7.(....f....'..nd@.m..!.m~.L.;.r.=v.....&dz...G.9..x.]....x..$..........r....P........k..C>dz...9.......C.R...e.. .]Y...F.;...C../E..9......<QzT;..x..j.....r.(3.R*......>..cK.C.,.*..#.)...-. .y..H....6O.S~.....r.p...]...!e@.M...r.N..#?.?`.i.v.5HAX..z..d^.:..X..:..9...@.Ez(J.k.u.....t_........Hk$Y.~.>...$.`..B]....F..J...@.I..s ..(.K.Q0..% ...d.bz..."..().....HP<)...*E....{...X...U\.j.Ow..W...o....
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:RIFF (little-endian) data, Web/P image
          Category:downloaded
          Size (bytes):72318
          Entropy (8bit):7.991466764545473
          Encrypted:true
          SSDEEP:
          MD5:91C0F87685ABABAD9AE66A85DE0BBCBA
          SHA1:6A89C7C632764CCE526BDE522A349A06BB366B04
          SHA-256:6D46C4C9977CB6F33E5DAB2CD214E83922EF16F3CC562634F29C79BAA6F2ABD4
          SHA-512:7F2D745CDE40E21D0D2EBB3ECF59B9DB5CF1687202ACCFDEB168E10A296524A337D5376C53B4B747000D040B0B927C3D52E3DB6586C7E07B0E1414B8A47FF18C
          Malicious:false
          Reputation:unknown
          URL:https://www.higgsproductionservices.com/templates/yootheme/cache/6c/background-square-02-6c592bbd.webp
          Preview:RIFFv...WEBPVP8X........K..K..ALPH.......m$9...................E..*......,.y%.7.VZn.+.*.kD.J.F<..%i@....p..x;$%.....(..s%..;T)\w.r..U.oq...8..[.r..4x.?.$Ir..k..i..H^..1.P.p*.....:..5.$.LxY9...$...;n.._Z.....~7...>..Tp..[u@.P.....3.h?.T.."~A....;g.../..:.0.*....5L.z.p_..N @.&Q]\....H.<4s..f.+.3u.....%I.$I.u}.......$..p....x... .....L.PIt!......e.m.._.....1"...H.V..7w..oI.,I.l......g2.DXX-.T.!"dA...M..w..t......oI.,I.l.#!{f..[o....&|.5.......I.%I.lyfy.Y..E.U.#2+....?Gn..~S*..%h..hY&.2M....9.s.9.s.9|._....].9g{s^A8.+..!.i.j~.......3=.}... ...J.<....G..QX....Q.......?..?..?..?..?..?..?..?..?..?..?..i.3.[..._...#@pF........U..O]..=.rx.Z.}..Vy..].T5.......E.......H...!.N.DK.8.]...xr...V..u.6W.F.q....ZW...=U...W.T.7A.........,t..X.o..R...=S.....e"....B..,..d.PV..U..v.v......PL..N.:.*J.l."e=....R6#...........i.Z..8..A.....g:.{....u.k`Q...\F..6+..P.G..... *..p..&.P..h....-.0...8....|.1hkF6.6....be.w..#..P.K..9...-...m..e...}.......J.)..
          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
          File Type:RIFF (little-endian) data, Web/P image
          Category:dropped
          Size (bytes):43614
          Entropy (8bit):7.989112032815702
          Encrypted:false
          SSDEEP:
          MD5:72C6BF089709FAE96EFF38F5D0A5E8C0
          SHA1:192ADC0E796BEDC89D6FA2B3A57FD11EAFD7A9EF
          SHA-256:67EB6C7B04A74DF87DE9DA41BC7B421ACDB272D8AFB80B0FFB4D4466D4B2AF35
          SHA-512:AB5F4309A69CD97536F3669B8BB92ADCD316BFBB4DA33797271166DCCFC37E32EF48EF6D18790BBBADECE2CAC32CB33E18A35ACC3883A2DB02F6443775CFA81D
          Malicious:false
          Reputation:unknown
          Preview:RIFFV...WEBPVP8X..............ALPH.V.....m.H.c=......6........v...n....T64..y..ea..D,./....$Qo1.6nWDxnTT....A'..0h.HRR.....;..1.T...U.?...>I.(.d.Q;.>...V...F..BW.E.2......$I.$I.e....U..77.....j."&..$[a[I.[.....=.+.~.'I.$.%......w.s....|.>......&L......'"h.U..h.%....Q......Wn.......`0.p..a..fh....i......{O.sU.z.n.ioq.&.Z[..&{..Vv..0.C..A....s~......9...E.V.Z.n*.g...zV.....................%.....S.v..N.....t..].CPt4t.].C.......Hw*ra.....-RwV@=R.g.*...W.....+%.Kkp.L.>..n...>..# .n$".9DwKA.E...../..t."...N..HA.t...\.X......<.I...QP$.);p?.dy(.;.4.%R....#a.Pd.B. ..........4.B#.S..V.....D.G.%.....T.|...*....%.$.:\.(...........)...[7jj'.YO^....a@.~)....J........c...:..l....r E..........r.0.M/...p...$...'..5."~..gI.......3....YQ/.....Q.....iZ...'P\z..M...P....C~q1j....4..U...Xc<a+%(O$..Dk!.....\.........+.(.....8.P.]j._O..7C9"Q....$IM#..:N8Y#.W.._....o9.^.!......9....D..`..C..C.=J..W S...bO.v&.s.A...~e....Q ........ .'..k,.:..Qz;.Nf.9h.B.."6.bD.%.8.z.
          No static file info