Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
http://www.choeshop.com

Overview

General Information

Sample URL:http://www.choeshop.com
Analysis ID:1478239

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected phishing page
Detected non-DNS traffic on DNS port
HTML body contains low number of good links
HTML body contains password input but no form action
HTML title does not match URL
Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 6256 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://www.choeshop.com/ MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 6024 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2052 --field-trial-handle=1992,i,4476504258579933822,5820281820356468864,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

Phishing

barindex
Source: https://choeshop.comLLM: Score: 9 brands: Waitrose Reasons: The URL 'choeshop.com' does not match the legitimate domain 'waitrose.com' associated with the brand Waitrose. The page prominently displays a login form, which is a common feature in phishing sites to capture user credentials. The domain name is suspicious as it does not relate to the brand name Waitrose. The use of a login form and the mismatch in domain names are strong indicators of social engineering techniques used in phishing attacks. Additionally, the presence of a suspicious link for registration further raises concerns. DOM: 15.4.pages.csv
Source: https://choeshop.comLLM: Score: 8 Reasons: The domain 'choeshop.com' is a misspelling of the legitimate domain 'waitrose.com', which raises concerns about the authenticity of the site. The design and layout of the webpage are consistent with a legitimate login page, but the discrepancy in the domain name suggests a potential phishing attempt. Users should be cautious and verify the domain name before proceeding with login to ensure their security and prevent potential identity theft or financial losses. DOM: 15.4.pages.csv
Source: https://choeshop.comLLM: Score: 9 brands: Waitrose Reasons: The URL 'choeshop.com' does not match the legitimate domain 'waitrose.com' associated with the Waitrose brand. The presence of a prominent login form on a domain that is not associated with the brand is a common phishing technique. Additionally, the use of the Waitrose logo and branding on an unrelated domain is suspicious. There is no captcha present, which is often used to add legitimacy to a login page. The combination of these factors strongly suggests that this is a phishing site. DOM: 15.8.pages.csv
Source: https://choeshop.comLLM: Score: 10 Reasons: The domain 'choeshop.com' is unusual for a Waitrose brand, which typically uses 'waitrose.com'. The domain does not appear to be associated with Waitrose. The webpage appears to be a phishing attempt using the Waitrose brand to trick users into entering their login credentials. The minimalistic design and use of a recognizable brand name are common tactics in phishing attempts. The lack of association between the domain and the brand, along with the suspicious URL, strongly suggests a phishing site with a high likelihood of being a phishing site (score: 10). DOM: 15.8.pages.csv
Source: https://www.choeshop.com/#/pages/login/indexHTTP Parser: Number of links: 0
Source: https://www.choeshop.com/#/pages/login/indexHTTP Parser: <input type="password" .../> found but no <form action="...
Source: https://www.choeshop.com/#/pages/login/indexHTTP Parser: Title: Iniciar Sesin does not match URL
Source: https://www.choeshop.com/#/pages/login/indexHTTP Parser: <input type="password" .../> found
Source: https://www.choeshop.com/#/pages/login/indexHTTP Parser: No <meta name="author".. found
Source: https://www.choeshop.com/#/pages/login/indexHTTP Parser: No <meta name="author".. found
Source: https://www.choeshop.com/#/pages/login/indexHTTP Parser: No <meta name="author".. found
Source: https://www.choeshop.com/#/pages/login/indexHTTP Parser: No <meta name="copyright".. found
Source: https://www.choeshop.com/#/pages/login/indexHTTP Parser: No <meta name="copyright".. found
Source: https://www.choeshop.com/#/pages/login/indexHTTP Parser: No <meta name="copyright".. found
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49737 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49752 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.127.169.103:443 -> 192.168.2.16:49779 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.85.23.206:443 -> 192.168.2.16:50149 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.127.169.103:443 -> 192.168.2.16:50150 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.85.23.86:443 -> 192.168.2.16:50151 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.85.23.86:443 -> 192.168.2.16:50152 version: TLS 1.2
Source: chrome.exeMemory has grown: Private usage: 17MB later: 28MB
Source: global trafficTCP traffic: 192.168.2.16:50148 -> 162.159.36.2:53
Source: global trafficTCP traffic: 192.168.2.16:50148 -> 162.159.36.2:53
Source: global trafficTCP traffic: 192.168.2.16:50148 -> 162.159.36.2:53
Source: global trafficTCP traffic: 192.168.2.16:50148 -> 162.159.36.2:53
Source: global trafficTCP traffic: 192.168.2.16:50148 -> 162.159.36.2:53
Source: global trafficTCP traffic: 192.168.2.16:50148 -> 162.159.36.2:53
Source: global trafficTCP traffic: 192.168.2.16:50148 -> 162.159.36.2:53
Source: global trafficTCP traffic: 192.168.2.16:50148 -> 162.159.36.2:53
Source: global trafficTCP traffic: 192.168.2.16:50148 -> 162.159.36.2:53
Source: global trafficTCP traffic: 192.168.2.16:50148 -> 162.159.36.2:53
Source: global trafficTCP traffic: 192.168.2.16:50148 -> 162.159.36.2:53
Source: global trafficTCP traffic: 192.168.2.16:50148 -> 162.159.36.2:53
Source: global trafficTCP traffic: 192.168.2.16:50148 -> 162.159.36.2:53
Source: global trafficTCP traffic: 192.168.2.16:50148 -> 162.159.36.2:53
Source: global trafficTCP traffic: 192.168.2.16:50148 -> 162.159.36.2:53
Source: global trafficTCP traffic: 192.168.2.16:50148 -> 162.159.36.2:53
Source: global trafficTCP traffic: 192.168.2.16:50148 -> 162.159.36.2:53
Source: global trafficTCP traffic: 192.168.2.16:50148 -> 162.159.36.2:53
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.choeshop.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficDNS traffic detected: DNS query: www.choeshop.com
Source: global trafficDNS traffic detected: DNS query: shuadan-img.s3.ap-southeast-1.amazonaws.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: shuadan-img-bak.s3.ap-southeast-1.amazonaws.com
Source: global trafficDNS traffic detected: DNS query: 206.23.85.13.in-addr.arpa
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50175
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50174
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50177
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50176
Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50179
Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50178
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50154 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50181
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50184
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50183
Source: unknownNetwork traffic detected: HTTP traffic on port 50211 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50234 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
Source: unknownNetwork traffic detected: HTTP traffic on port 50177 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
Source: unknownNetwork traffic detected: HTTP traffic on port 50194 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50165 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50186
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50185
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50188
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50187
Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50205 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50222 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50240 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50216 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50183 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50191
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50193
Source: unknownNetwork traffic detected: HTTP traffic on port 50159 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50192
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50195
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50194
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 50204 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 50227 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50195 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50172 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50197
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50196
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50199
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50198
Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50241 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50178 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50153 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
Source: unknownNetwork traffic detected: HTTP traffic on port 50210 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50235 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50170 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50193 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49786
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
Source: unknownNetwork traffic detected: HTTP traffic on port 50149 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
Source: unknownNetwork traffic detected: HTTP traffic on port 50187 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50221 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50161 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
Source: unknownNetwork traffic detected: HTTP traffic on port 50215 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50230 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50149
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
Source: unknownNetwork traffic detected: HTTP traffic on port 50209 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50226 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50151
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50150
Source: unknownNetwork traffic detected: HTTP traffic on port 50155 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50176 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
Source: unknownNetwork traffic detected: HTTP traffic on port 50166 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50153
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50152
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50155
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50154
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50157
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50156
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50159
Source: unknownNetwork traffic detected: HTTP traffic on port 50208 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50158
Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50242 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50160
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50162
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50161
Source: unknownNetwork traffic detected: HTTP traffic on port 50236 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
Source: unknownNetwork traffic detected: HTTP traffic on port 50203 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
Source: unknownNetwork traffic detected: HTTP traffic on port 50171 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50163
Source: unknownNetwork traffic detected: HTTP traffic on port 49786 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50166
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50165
Source: unknownNetwork traffic detected: HTTP traffic on port 50188 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50168
Source: unknownNetwork traffic detected: HTTP traffic on port 50220 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50167
Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50169
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50171
Source: unknownNetwork traffic detected: HTTP traffic on port 50160 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50170
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50173
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50172
Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50199 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
Source: unknownNetwork traffic detected: HTTP traffic on port 50214 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50231 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50216
Source: unknownNetwork traffic detected: HTTP traffic on port 50168 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50215
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50218
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50217
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50219
Source: unknownNetwork traffic detected: HTTP traffic on port 50174 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50151 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50210
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50212
Source: unknownNetwork traffic detected: HTTP traffic on port 50225 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50202 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50211
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50214
Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50213
Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50219 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50227
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50226
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50229
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50228
Source: unknownNetwork traffic detected: HTTP traffic on port 50186 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50221
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50220
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50223
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50222
Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50225
Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50224
Source: unknownNetwork traffic detected: HTTP traffic on port 50162 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50197 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50237 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50238
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50237
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50239
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50230
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50232
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50231
Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50234
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50233
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50236
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50235
Source: unknownNetwork traffic detected: HTTP traffic on port 50156 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50175 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50198 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50213 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50232 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50167 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50192 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50241
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50240
Source: unknownNetwork traffic detected: HTTP traffic on port 50150 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50242
Source: unknownNetwork traffic detected: HTTP traffic on port 50207 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50224 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50181 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50218 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50229 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50206 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50158 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50238 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50184 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50169 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50173 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50152 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50201 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50212 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50233 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50191 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50223 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50217 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50179 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50163 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50205
Source: unknownNetwork traffic detected: HTTP traffic on port 50228 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50204
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50207
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50196 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50206
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50209
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50208
Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50201
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50203
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50202
Source: unknownNetwork traffic detected: HTTP traffic on port 50157 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50239 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50185 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49737 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49752 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.127.169.103:443 -> 192.168.2.16:49779 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.85.23.206:443 -> 192.168.2.16:50149 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.127.169.103:443 -> 192.168.2.16:50150 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.85.23.86:443 -> 192.168.2.16:50151 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.85.23.86:443 -> 192.168.2.16:50152 version: TLS 1.2
Source: classification engineClassification label: mal48.phis.win@15/74@21/162
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://www.choeshop.com/
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2052 --field-trial-handle=1992,i,4476504258579933822,5820281820356468864,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2052 --field-trial-handle=1992,i,4476504258579933822,5820281820356468864,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
Extra Window Memory Injection
1
Extra Window Memory Injection
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
http://www.choeshop.com0%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://www.choeshop.com/0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
xra2swcz.n.cdn-sys.com
165.154.252.116
truefalse
    unknown
    www.google.com
    142.250.185.164
    truefalse
      unknown
      s3-r-w.ap-southeast-1.amazonaws.com
      3.5.149.102
      truefalse
        unknown
        shuadan-img-bak.s3.ap-southeast-1.amazonaws.com
        unknown
        unknownfalse
          unknown
          shuadan-img.s3.ap-southeast-1.amazonaws.com
          unknown
          unknownfalse
            unknown
            www.choeshop.com
            unknown
            unknownfalse
              unknown
              206.23.85.13.in-addr.arpa
              unknown
              unknownfalse
                unknown
                NameMaliciousAntivirus DetectionReputation
                http://www.choeshop.com/false
                • Avira URL Cloud: safe
                unknown
                https://www.choeshop.com/#/false
                  unknown
                  https://www.choeshop.com/#/pages/login/indexfalse
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    142.250.110.84
                    unknownUnited States
                    15169GOOGLEUSfalse
                    1.1.1.1
                    unknownAustralia
                    13335CLOUDFLARENETUSfalse
                    172.217.18.14
                    unknownUnited States
                    15169GOOGLEUSfalse
                    165.154.238.83
                    unknownCanada
                    7456INTERHOPCAfalse
                    216.58.206.67
                    unknownUnited States
                    15169GOOGLEUSfalse
                    52.219.37.39
                    unknownUnited States
                    16509AMAZON-02USfalse
                    142.250.185.238
                    unknownUnited States
                    15169GOOGLEUSfalse
                    3.5.149.102
                    s3-r-w.ap-southeast-1.amazonaws.comUnited States
                    16509AMAZON-02USfalse
                    3.5.147.181
                    unknownUnited States
                    16509AMAZON-02USfalse
                    165.154.252.116
                    xra2swcz.n.cdn-sys.comCanada
                    7456INTERHOPCAfalse
                    239.255.255.250
                    unknownReserved
                    unknownunknownfalse
                    142.250.185.196
                    unknownUnited States
                    15169GOOGLEUSfalse
                    142.250.185.164
                    www.google.comUnited States
                    15169GOOGLEUSfalse
                    52.219.124.191
                    unknownUnited States
                    16509AMAZON-02USfalse
                    165.154.254.46
                    unknownCanada
                    7456INTERHOPCAfalse
                    142.250.184.227
                    unknownUnited States
                    15169GOOGLEUSfalse
                    52.219.41.31
                    unknownUnited States
                    16509AMAZON-02USfalse
                    142.250.185.74
                    unknownUnited States
                    15169GOOGLEUSfalse
                    3.5.150.116
                    unknownUnited States
                    16509AMAZON-02USfalse
                    142.250.186.138
                    unknownUnited States
                    15169GOOGLEUSfalse
                    IP
                    192.168.2.16
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1478239
                    Start date and time:2024-07-22 12:12:17 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:defaultwindowsinteractivecookbook.jbs
                    Sample URL:http://www.choeshop.com
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:14
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • EGA enabled
                    Analysis Mode:stream
                    Analysis stop reason:Timeout
                    Detection:MAL
                    Classification:mal48.phis.win@15/74@21/162
                    • Exclude process from analysis (whitelisted): svchost.exe
                    • Excluded IPs from analysis (whitelisted): 142.250.184.227, 172.217.18.14, 142.250.110.84, 34.104.35.123
                    • Excluded domains from analysis (whitelisted): clients2.google.com, accounts.google.com, edgedl.me.gvt1.com, clientservices.googleapis.com, clients.l.google.com
                    • Not all processes where analyzed, report is missing behavior information
                    • VT rate limit hit for: http://www.choeshop.com
                    InputOutput
                    URL: https://www.choeshop.com/#/ Model: Perplexity: mixtral-8x7b-instruct
                    {"loginform": false,"urgency": false,"captcha": false,"reasons": ["The webpage does not contain a login form as there are no explicit requests for sensitive information such as passwords, email addresses, usernames, phone numbers or credit card numbers (CVV).","The text does not create a sense of urgency or interest as it does not contain any calls to action or incentives to click on links.","The webpage does not contain a CAPTCHA or any other anti-robot detection mechanism."]}
                    Title: Inicio OCR: Waitrose Espaiol  AliExpress Walmart Walmart AliExpress amazon TikTok Tik rok Amazon ha completado el del Vv'almart mercado ha completado el pedido del AliExpress mercado ha completado el pedido del Walmart mercado ha completado el del Tik Tok mercado ha completado el J*dido del Amazon mercado e 
                    URL: https://www.choeshop.com/#/ Model: Perplexity: mixtral-8x7b-instruct
                    {"loginform": false,"urgency": false,"captcha": false,"reasons": ["The webpage does not contain a login form, as there are no explicit requests for sensitive information such as passwords, email addresses, usernames, phone numbers, or credit card numbers.","The text does not create a sense of urgency, as there are no phrases that encourage the user to take immediate action, such as 'Click here to view document' or 'To view secured document click here'.","The webpage does not contain a CAPTCHA or any other anti-robot detection mechanism.","The text appears to be a random collection of words and phrases, with no clear meaning or purpose."]}
                    Title: Inicio OCR: Waitrose Espaiol  AliExpress Walmart Walmart AliExpress amazon TikTok Tik rok Amazon Walmart mercado ha completado el pedido del Tik Tok mercado ha completado el del Amazon mercado Felicitaciones:yw  jm@outlNk.com ha completado el Ikdido del Tik Tok mercado ha completado el del AliExpress mercado ha completado el ENdido del Tik Tok mercado e 
                    URL: https://www.choeshop.com/#/ Model: Perplexity: mixtral-8x7b-instruct
                    {"loginform": false,"urgency": false,"captcha": false,"reasons": ["The webpage does not contain a login form as there is no explicit request for sensitive information such as passwords, email addresses, usernames, phone numbers or credit card numbers (CVV).","The text does not create a sense of urgency or interest as it does not contain any calls to action like 'Click here to view document', 'To view secured document click here', or 'Open the link to see your invoice'.","The webpage does not contain a CAPTCHA or any other anti-robot detection mechanism."]}
                    Title: Inicio OCR: Waitrose Espaiol  AliExpress Walmart Walmart AliExpress amazon TikTok Tik rok Amazon ha completado el pedido del AliExpre ss mercado ha completado el pedido del Tik Tok ha completado el pedido del Walmart mercado ha completado el pedido del Walmart mercado ha completado el pedido del l.ilmart e 
                    URL: https://www.choeshop.com/#/pages/login/index Model: Perplexity: mixtral-8x7b-instruct
                    {"loginform": true,"urgency": false,"captcha": false,"reasons": ["The webpage contains a login form, as it explicitly requests sensitive information such as a 'Correo Electrnico' (email address) and 'Contrasea' (password).","The text does not create a sense of urgency, as it does not include phrases such as 'Click here to view document' or 'To view secured document click here'.","There is no CAPTCHA or anti-robot detection mechanism present on the webpage."]}
                    Title: Iniciar Sesin OCR: Wqifrose Inicio de Sesi de Usuiriff Correo Electrnico Por Favor, Introduzca Ia Contrasea -Ciar Sesiii GNO 
                    URL: https://choeshop.com Model: gpt-4o
                    ```json
                    {
                      "phishing_score": 9,
                      "brands": "Waitrose",
                      "phishing": true,
                      "suspicious_domain": true,
                      "has_prominent_loginform": true,
                      "has_captcha": false,
                      "setechniques": true,
                      "has_suspicious_link": true,
                      "legitmate_domain": "waitrose.com",
                      "reasons": "The URL 'choeshop.com' does not match the legitimate domain 'waitrose.com' associated with the brand Waitrose. The page prominently displays a login form, which is a common feature in phishing sites to capture user credentials. The domain name is suspicious as it does not relate to the brand name Waitrose. The use of a login form and the mismatch in domain names are strong indicators of social engineering techniques used in phishing attacks. Additionally, the presence of a suspicious link for registration further raises concerns."
                    }
                    URL: https://choeshop.com Model: custom
                    {"text_response":"{
                    \"phishing_score\": 8,
                    \"brand_name\": \"Waitrose\",
                    \"reasons\": \"The domain 'choeshop.com' is a misspelling of the legitimate domain 'waitrose.com', which raises concerns about the authenticity of the site. The design and layout of the webpage are consistent with a legitimate login page, but the discrepancy in the domain name suggests a potential phishing attempt. Users should be cautious and verify the domain name before proceeding with login to ensure their security and prevent potential identity theft or financial losses.\"}"}
                    URL: https://www.choeshop.com/#/ Model: Perplexity: mixtral-8x7b-instruct
                    {"loginform": false,"urgency": true,
                    Title: Inicio OCR: Waitrose Espaiol  AliExpress Walmart Walmart AliExpress amazon TikTok Tik rok Amazon ha completado el pedido del Amazon ha completado el pedido del Tik Tok m ercado ha completado el pedido del Tik Tok mercado ha completado el pedido del ha completado el pedido del AliExpre ss mercado Felicitaciones:mw***eg@zoho.com ha comoletado el Dedido del Tik Tok e 
                    URL: https://www.choeshop.com/#/ Model: Perplexity: mixtral-8x7b-instruct
                    {"loginform": false,"urgency": false,"captcha": false,"reasons": ["The title 'Inicio' and text 'Waitrose Espaiol  e' do not contain any login forms, elements that create a sense of urgency, or CAPTCHA mechanisms."]}
                    Title: Inicio OCR: Waitrose Espaiol  e 
                    URL: https://www.choeshop.com/#/pages/login/index Model: Perplexity: mixtral-8x7b-instruct
                    {"loginform": true,"urgency": false,"captcha": false,"reasons": ["The webpage contains a 'User Login' section which explicitly requests for a 'Email' and 'Please Enter Password'. This indicates the presence of a login form.","The text does not create a sense of urgency as it does not contain phrases such as 'Click here to view document', 'To view secured document click here', or 'Open the link to see your invoice.'","There is no evidence of a CAPTCHA or anti-robot detection mechanism on the webpage."]}
                    Title: Login OCR: Wqifrose User Login Email Please Enter Password No Account? 
                    URL: https://choeshop.com Model: gpt-4o
                    ```json
                    {
                      "phishing_score": 9,
                      "brands": "Waitrose",
                      "phishing": true,
                      "suspicious_domain": true,
                      "has_prominent_loginform": true,
                      "has_captcha": false,
                      "setechniques": true,
                      "has_suspicious_link": false,
                      "legitmate_domain": "waitrose.com",
                      "reasons": "The URL 'choeshop.com' does not match the legitimate domain 'waitrose.com' associated with the Waitrose brand. The presence of a prominent login form on a domain that is not associated with the brand is a common phishing technique. Additionally, the use of the Waitrose logo and branding on an unrelated domain is suspicious. There is no captcha present, which is often used to add legitimacy to a login page. The combination of these factors strongly suggests that this is a phishing site."
                    }
                    URL: https://choeshop.com Model: custom
                    {"text_response":"{
                    \"phishing_score\": 10,
                    \"brand_name\": \"Waitrose\",
                    \"reasons\": \"The domain 'choeshop.com' is unusual for a Waitrose brand, which typically uses 'waitrose.com'. The domain does not appear to be associated with Waitrose. The webpage appears to be a phishing attempt using the Waitrose brand to trick users into entering their login credentials. The minimalistic design and use of a recognizable brand name are common tactics in phishing attempts. The lack of association between the domain and the brand, along with the suspicious URL, strongly suggests a phishing site with a high likelihood of being a phishing site (score: 10).\"
                    }"}
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Jul 22 09:12:49 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2673
                    Entropy (8bit):3.992148487875049
                    Encrypted:false
                    SSDEEP:
                    MD5:A5B02D14E40C1CE57EBC4983E426FE86
                    SHA1:4078EC9BA39477168CD34102FBE6DF27AD686240
                    SHA-256:9664DFB9FD633CD80387AC8D19D8B9E5EFB43673C8B3A654FFB4E4A6A20F8A2B
                    SHA-512:9594C66FEC6C0F666EB40F3C276037BE41ABA72C10DB5E34E8C8B64E9BE96C99548D23C07E0548E2EA5D968259BA1A588F43F583C1C57C9F736C2734A56C574A
                    Malicious:false
                    Reputation:unknown
                    Preview:L..................F.@.. ...$+.,.....R......N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.Q....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.Q....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.Q....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.Q..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.Q...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........2.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Jul 22 09:12:49 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2675
                    Entropy (8bit):4.010637546845258
                    Encrypted:false
                    SSDEEP:
                    MD5:34F26D2FE59B4591C2FA1C6E320DB211
                    SHA1:6F832F85094F8D2B75DA8072F4607E4003DE50A6
                    SHA-256:02C87A305BD7AAA24F0B620C387FAE92F1F22FFABC15242130390D240F84BFD3
                    SHA-512:821DF6BF9301D3506362621503ABD5C2DC8D6F761DD12AEF4A31DABA1821FCF23D9BA481E54626E9AB78853732A150DD8805B188956E78E2E6D38F5C85725ECE
                    Malicious:false
                    Reputation:unknown
                    Preview:L..................F.@.. ...$+.,....`.......N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.Q....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.Q....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.Q....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.Q..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.Q...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........2.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2689
                    Entropy (8bit):4.01584826802336
                    Encrypted:false
                    SSDEEP:
                    MD5:C3709ACA7060CD267D6ADB8D887932EC
                    SHA1:1CB57B44A2E7CE06994080F82EEA7152669CE5AC
                    SHA-256:3B3881ADA4EC0363A3349EACEBE566EDCD23C43776437B4048EE5BE66CDFE164
                    SHA-512:8D4545AC7BB9DC4A6D6A298783B0B54F3F141EE041215A02981BF8F2A590FECC8E34F6119883C87CDD1E7D31705614548011303604D844DCFFC13BE8981F86ED
                    Malicious:false
                    Reputation:unknown
                    Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.Q....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.Q....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.Q....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.Q..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........2.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Jul 22 09:12:49 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2677
                    Entropy (8bit):4.00691922660659
                    Encrypted:false
                    SSDEEP:
                    MD5:C71ECE82FF4462BD1D4BBBCC2296F489
                    SHA1:140346A08361E3A5CF23F3C7B1AE38A46B5D87F9
                    SHA-256:9F9E2B8CA64733B5C607D0694783C93778B33C74F2F76C7A50BEA2661DB3690D
                    SHA-512:D61A0D394417BA5F754DB2A7EB4E83678EEA53637A4CFBEA26DBB1AC66B8381AD9DF043AEB593B02570E0CCF39C13035E93A0EB8F04F4335265BF3EDF31BB5F9
                    Malicious:false
                    Reputation:unknown
                    Preview:L..................F.@.. ...$+.,....(c.....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.Q....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.Q....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.Q....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.Q..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.Q...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........2.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Jul 22 09:12:49 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2677
                    Entropy (8bit):3.997631446706507
                    Encrypted:false
                    SSDEEP:
                    MD5:8C6B664F2BE77D315628784D4EAC74B9
                    SHA1:E3E346A59E9CDCF9A214729C4A080C28C6DF8A21
                    SHA-256:38FC5D35CF9160CDE81AB678F713AFF82195490367EE3E94D381784EB4586CE9
                    SHA-512:2A5973E4D4847068BE051D025158774C7CE66BF387B5BD83701733D71EC983EB55083A6DB56D961CB81AF593349DF3779C3EF6DC7EE31D7DE71636B40FDA08B7
                    Malicious:false
                    Reputation:unknown
                    Preview:L..................F.@.. ...$+.,.....q......N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.Q....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.Q....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.Q....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.Q..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.Q...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........2.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Jul 22 09:12:49 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2679
                    Entropy (8bit):4.00614631709028
                    Encrypted:false
                    SSDEEP:
                    MD5:738FCE4E908178964BCEFB3C72B131DC
                    SHA1:5A2933E10FCEB2F86A4FE35EC9B7ECEF8EB43620
                    SHA-256:12AB7B5DC953696132D513F18C58004FE679D5A981625AAFD4054E799E452873
                    SHA-512:59673F37F3382A359B524C8A5A77933EF8FCA665E33AD82BEED733DD06B364870E8168ED0C691E8D40663F35A4487B45933FEC85FF1EC02D4486BA39EDE19004
                    Malicious:false
                    Reputation:unknown
                    Preview:L..................F.@.. ...$+.,....k......N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.Q....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.Q....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.Q....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.Q..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.Q...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........2.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:PNG image data, 528 x 366, 8-bit/color RGBA, non-interlaced
                    Category:downloaded
                    Size (bytes):65032
                    Entropy (8bit):7.9866205313247205
                    Encrypted:false
                    SSDEEP:
                    MD5:893608AB7A6EAB6F5EB53C99EBD0FC32
                    SHA1:B5DF069BDEF9F04A3340D9637B6A309CADA93803
                    SHA-256:39C7E718ECD9C21EE82B5CD473164DFAB65913ED9DDC3E7A59D86061720B12FD
                    SHA-512:287E8978B75EFE8A3D613ACEEFE733E93CFB2E1C3976DC92EAA1D4C63F964533FE76CB9C6316792904B0574CCC5CE8C920CE01F55CD93459FED9D117881764EE
                    Malicious:false
                    Reputation:unknown
                    URL:https://shuadan-img-bak.s3.ap-southeast-1.amazonaws.com/images/44b706c8d852c2d8af3fd342cbc1a652.png
                    Preview:.PNG........IHDR.......n.......!.....pHYs..!8..!8.E.1`....sRGB.........gAMA......a.....IDATx....]U.?..)...^h.B......{G.....q,.X..e.2.^....bG.ElH..j0..!.%/..r..}....s..%......sr...S..{..Z..rdY...?..w...g.=/..}v.{W?..z;Z....T.sR..Y.v.wx.sm..g=.I.h.=..}......\....s{=..m...\.^.....+|..~....\.z.....y....y.uL..v....p.>.^......F....(*..].O.}~[...m..t..]m\=..s..........Ea{;.W.c....?.~...un=......V...\.O.c.u.4...}.._.^s..R.6.#.5...E......r...)n.=.]>s......<....+(v.]:.b..b..Q....9........6v.c..._.....?.5........:.|.Rx0v.A.....O..=..1..X......z...}..M=.K..n..lf`..qu..A..b@d..`U.....g}.o..vI;g,..K.......v...w.......~....k_...a\.?/^s..r.c.......B.......U]:.Y..:......V8NU<....y.{<....j.4...z..M......8...0.R<.n.`q...:.u.N....w=....q.gu..c.....N.[{.n.............P~..ge....w[..k.gn....Fz=...}..3...:..n..=..............z..........tT.>/|..Q...G....[G2G........gy.........R.F.7s=.=..u.....}..........u..}....^...u....m...m........P....q...m
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (4242)
                    Category:downloaded
                    Size (bytes):4243
                    Entropy (8bit):5.325960664540057
                    Encrypted:false
                    SSDEEP:
                    MD5:1F7F33B8DFC41AC6AF7428AEAD8509B1
                    SHA1:09D2FE4837D7E7446750E5C7EA1792DE0183EB13
                    SHA-256:E6F924637328E2C331DAB4DBF862F2A6369A1DFD4F7ACE7A19E0A7EDCA4C7214
                    SHA-512:9159EEA13AEA3EFE8A828E2E2EDB3BEA113C18FDDD9D61526EA0E889DB367C41B42C512BC53EDEE68232F9030FFF08A4055DE6FD1C78082C99F9E13AD2B01FB2
                    Malicious:false
                    Reputation:unknown
                    URL:https://www.choeshop.com/assets/index-e6f92463.css
                    Preview:.place-an-order-class .thumbnail-warp-class[data-v-d710f8b4]{display:flex;justify-content:center;align-items:center;width:100%}.place-an-order-class .thumbnail-warp-class .thumbnail[data-v-d710f8b4]{width:5.125rem;height:1.8125rem;flex-shrink:0}.place-an-order-class .types-class[data-v-d710f8b4]{display:grid;grid-template-columns:repeat(2,1fr);justify-content:center;align-items:center;justify-items:start;box-sizing:border-box;padding:0 1rem;gap:.5rem;margin-top:.625rem}.place-an-order-class .types-class .type-item-class[data-v-d710f8b4]{display:flex;justify-content:flex-start;align-items:center;-moz-column-gap:1rem;column-gap:1rem;border-radius:.9375rem;border:.03125rem solid rgba(60,60,67,.08);background:#fff;width:100%;height:3.375rem;padding:0px 1rem;box-sizing:border-box}.place-an-order-class .types-class .type-item-class .item-img-class[data-v-d710f8b4]{width:2rem;height:2rem}.place-an-order-class .types-class .type-item-class .item-label-class[data-v-d710f8b4]{color:#000;font-fam
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:Unicode text, UTF-8 text, with very long lines (8974)
                    Category:downloaded
                    Size (bytes):9307
                    Entropy (8bit):4.887637257006566
                    Encrypted:false
                    SSDEEP:
                    MD5:E97A14147E93DF4305C449F185E4A5F8
                    SHA1:1D66EAD03AC475E0C0DF3AF73F2B3E609B85DF16
                    SHA-256:F6DC360CE05D8B2573F6C27DBCD54EC6C0A02C4A819675A1A5AF06FEB798E621
                    SHA-512:2BCA0631B86E631216CB1E3DC6A0CD214A87AEE3C33E8BE1B5D10293754D0541EC362D233A482EC33DFECC1F9B78A9336CAC6D9F64627574DBBE6029208C43D8
                    Malicious:false
                    Reputation:unknown
                    URL:https://www.choeshop.com/assets/uni-icons-f6dc360c.css
                    Preview:.uniui-cart-filled[data-v-f3dc15da]:before{content:"."}.uniui-gift-filled[data-v-f3dc15da]:before{content:"."}.uniui-color[data-v-f3dc15da]:before{content:"."}.uniui-wallet[data-v-f3dc15da]:before{content:"."}.uniui-settings-filled[data-v-f3dc15da]:before{content:"."}.uniui-auth-filled[data-v-f3dc15da]:before{content:"."}.uniui-shop-filled[data-v-f3dc15da]:before{content:"."}.uniui-staff-filled[data-v-f3dc15da]:before{content:"."}.uniui-vip-filled[data-v-f3dc15da]:before{content:"."}.uniui-plus-filled[data-v-f3dc15da]:before{content:"."}.uniui-folder-add-filled[data-v-f3dc15da]:before{content:"."}.uniui-color-filled[data-v-f3dc15da]:before{content:"."}.uniui-tune-filled[data-v-f3dc15da]:before{content:"."}.uniui-calendar-filled[data-v-f3dc15da]:before{content:"."}.uniui-notification-filled[data-v-f3dc15da]:before{content:"."}.uniui-wallet-filled[data-v-f3dc15da]:before{content:"."}.uniui-medal-filled[data-v-f3dc15da]:before{content:"."}.uniui-fire-fill
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:JSON data
                    Category:downloaded
                    Size (bytes):813
                    Entropy (8bit):4.647751701947595
                    Encrypted:false
                    SSDEEP:
                    MD5:6C483E1A5CF401BA146C9702927A54DF
                    SHA1:820D37D5E48BB09FF08FB8E28B5CE15E484F1C6F
                    SHA-256:10A477179E15034931C0767C5BBD8464D56BF569C3B58B0104BB6F93F2BBBDFD
                    SHA-512:2193E28E00BF5E7F1B1FE4DD97F04EB95D352E4477959DFDA1F15EAB6BEB0E7C1E6E1CC5D10B27340B6F422DF0C939C8003D5F3ED9DABCC6C99341B61D219317
                    Malicious:false
                    Reputation:unknown
                    URL:https://www.choeshop.com/api/rolling_orders
                    Preview:{"code":1,"msg":"Success","data":["Congratulations:hr***xc@gmx.com has completed the order at AliExpress store","Congratulations:jz***le@web.de has completed the order at AliExpress store","Congratulations:ty***ka@fastmail.com has completed the order at Amazon store","Congratulations:nw***gy@icloud.com has completed the order at Tik Tok store","Congratulations:hu***kc@zoho.com has completed the order at Amazon store","Congratulations:di***xf@yahoo.com has completed the order at Tik Tok store","Congratulations:xd***cs@web.de has completed the order at AliExpress store","Congratulations:od***en@outlook.com has completed the order at AliExpress store","Congratulations:su***qj@gmx.com has completed the order at Amazon store","Congratulations:oj***ad@yandex.com has completed the order at AliExpress store"]}
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:PNG image data, 528 x 366, 8-bit/color RGBA, non-interlaced
                    Category:downloaded
                    Size (bytes):36364
                    Entropy (8bit):7.939613141985548
                    Encrypted:false
                    SSDEEP:
                    MD5:18ED6C86E284798AD5AD2C02A0FE6E3E
                    SHA1:C5B85A67C68C7D2E9D2F8BB845B0FBE8C2CB4335
                    SHA-256:7493B0E0BE1C0B2512702CD600C8CEB9379BCB2F28C725E6B9118DFB0EDF63CD
                    SHA-512:5914EC8F202FB7BC3FA25604B869E3140D0613544B5960A0095738F1CA3F56BD37727C498D9CE4091C009A655EE2F5DEF22116DA7CAA08B2E780E50D3A26E4E1
                    Malicious:false
                    Reputation:unknown
                    URL:https://shuadan-img-bak.s3.ap-southeast-1.amazonaws.com/images/a15e27ffe421fa2a0169098da4457279.png
                    Preview:.PNG........IHDR.......n.......!.....pHYs..!8..!8.E.1`....sRGB.........gAMA......a.....IDATx.....Wu....G...kdK.e.k.....qXB^l..$..`0.$.$...f.K.H"N.$.1K.?@....... ...X.fK...b[#[.....di.....{n..}....g.-......Zn...S...I.4.O8/.wl..i.N....:..z..7t<NuLI...:T.>a[Q.......)..z..Q}..#r...C8?,/g..9.WT.p[._....m....k...!\..~......#...3Lp.:...OP."../7r#........`.}..m.. ..T......>....I^.E.Vp.z.......k....&e:"..}...n...a.v~h.R........LG...[../{mE...q......r...9...A.&....":>.....7../|0.2..Q...*....A..u.o,...~.}.z......MXN.r.`.t.p.>.d.97c..........:.}..H=..+|.E..^.a..u{...+;...3.l...=.X..<......./$-......B=h......^@i ..7Kx..."&.$....o...:dn\...<.(V~Pn..:P.m....<....m....,..S[]".K"...F.;z.c..m.F....9o..*l...L...Z..;\?r.../(?<...h;7.9..3]F^...%./j...3jo.L...6S...)....*......vw.S......|......@l~8/..{#8.p~p.r.j..G...)..+.>0..V..X.(...G.;...P.C2..n..8beD..a..~g.....H...&v..9......C^......;<.....C.@.;..r#.I.~.....F...w....#.W.k..u..^.............]..........m.s.g.
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with no line terminators
                    Category:downloaded
                    Size (bytes):16
                    Entropy (8bit):3.625
                    Encrypted:false
                    SSDEEP:
                    MD5:48DFA05375E7CF406F587B8C117B0655
                    SHA1:531401231316A87C49E4A09F93071BD1374DEB3A
                    SHA-256:EA4C44D08350A1B340BBAAAFAC3F3590BAED50B089605FC4FE8422F4E7317A43
                    SHA-512:53A305F18D4D817F715A9E75F6BF554815B536E19288AC0122E3E21C1DEC5009F746BC0A5266E7D050DD2C14F2F0A9FE4AD8D93BAEEC7B200BBEF1B37EF6A02F
                    Malicious:false
                    Reputation:unknown
                    URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISEAn-PW9iH-x2DhIFDYGQ8Xw=?alt=proto
                    Preview:CgkKBw2BkPF8GgA=
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:RIFF (little-endian) data, Web/P image, VP8 encoding, 900x600, Suserng: [none]x[none], YUV color, decoders should clamp
                    Category:dropped
                    Size (bytes):7006
                    Entropy (8bit):7.896329021783328
                    Encrypted:false
                    SSDEEP:
                    MD5:58977E6F646C4B48CE4CAAB7F22B9863
                    SHA1:700EC7B02F09427A5040E1FF58BBEF8C288E6BF0
                    SHA-256:88C10BA714100950E5B4D6B55344AE17B649E786C0A7658E0A127FBBDDAFD4CE
                    SHA-512:88E1E963119A6C431ED51E1E77211A3CF89AC912856646C19D1B19D93368509B0EAE69094A957E284EC00868FAAEE6255448FA8D73E992071CF643423D69B29C
                    Malicious:false
                    Reputation:unknown
                    Preview:RIFFV...WEBPVP8 J...p....*..X.>.Z.P'%#..3....gn.wa...I?...d..=..g.!...D7..Q.S.~..y.Q?.7.p.?.v....OM..d.r.\...k...~Q...O..)..-?./||.._._.....p)....I.Z".U/oK....../oK....../oK... ....f..vl...f..vl...f..vl...f..vl...f..vl...f..vl...f..vl...f..vl...f..vl...f..vl...f..vl...f..vl...f..vl...f..vl...f..vl...f..vl...f..vl...f..vl...f..vl...f..vl...f..vl...f..vl...f..vl...f..vl...f..vl...f..vl...f..vl...f..vl...f..vl...f..vl...f..vl..@..ec=...{.].....+..%vV3.J.g.......Q..X.q+....Wec=...{.].....+..%vV3...l...f.......S6.O.k...K.......^7.m...oU/oK....../oK....../mc..,.g....).r.t....R..Zs../..r..>....7..E7..K[..vl...f..vl...f..i.L(.p..Y........D.r.W#.....G.EQ......w3..[....\.j...{z^.....{z^...@..........@.J\Q#xe.....Y...j.82.....(k$e5^i.....b.../oK....../oK......".".....S.a..].W.0z..s.....I..b.A^.H.?.&.W>.X.IP.+....V.....6...`..;6...`..:.B.4a.........b"...,......<k...Mum.^0.wm.H.fx.g$.7..j...{z^.....{z^..1AC.\.&.q.=..F~o.....o.u...(.`CD..Z.
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:PNG image data, 28 x 28, 8-bit/color RGBA, non-interlaced
                    Category:dropped
                    Size (bytes):448
                    Entropy (8bit):7.206275834977566
                    Encrypted:false
                    SSDEEP:
                    MD5:B1615BF7DE2B4261C5C7A764B8AB1615
                    SHA1:19F4D67C395C66D811C6C54630442746533DAA6D
                    SHA-256:C1E9355B20BD14BF785F81EBEFF86F6396B08E834B345BF2C7FD7792BC7C543B
                    SHA-512:D3B00DF1C418149F365D91AEF430D953A3B1E84D94E26189CDF019E0DE0B1F8BBB868A89E2B4FD5CA609CE6AF545A350855B7E82C9D77597637464720D6B7E0A
                    Malicious:false
                    Reputation:unknown
                    Preview:.PNG........IHDR.............r......pHYs.................sRGB.........gAMA......a....UIDATx..?N.0.......0......E.X.'........[am+U=...'.{....?.g...R.H(..(v...9.m...P..h.e...u"..:.u..K..... &|.m.4".......+.I%bg...{..TFC...B5u;.q....a..G.hv40N(.......Ck.I.........I.....7s.R <V..<..=oF(..Z.M.s.}..>....p5.]}Td..B..F.q..;..6.F...VQ.".%'......|.C%a".u..`G..v5...'.%X@<Y..)....]..f...i...fx!.[..{.TC]p_i$....k.4.j.......Ae.wPk.....IEND.B`.
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:JSON data
                    Category:downloaded
                    Size (bytes):1081
                    Entropy (8bit):5.127047550707595
                    Encrypted:false
                    SSDEEP:
                    MD5:27A102B4A3F75D8775845663C2A22D50
                    SHA1:7A580D82B75983F84DBEB89FDE6A47F1C8186A71
                    SHA-256:3333F750AE35E10E3DBF6D4FCE7DB978D1D8BFB6A1BE22BED6258477B52CCDB7
                    SHA-512:9AD9D860EA412D0887A296B8CB5E42077E9B6FC30118C676ACD5905519FA1A3644643CD22CED4E37CB19654FA70CF6E92B86E17F7E091A0EE448EF3E543C5DCD
                    Malicious:false
                    Reputation:unknown
                    URL:https://www.choeshop.com/api/get-malls
                    Preview:{"code":1,"msg":"Success","data":[{"id":4,"name":"Walmart","cover_img":"https:\/\/shuadan-img-bak.s3.ap-southeast-1.amazonaws.com\/images\/a15e27ffe421fa2a0169098da4457279.png","logo_img":"https:\/\/shuadan-img-bak.s3.ap-southeast-1.amazonaws.com\/images\/5511375c49cdfe1125c245a71611376d.png"},{"id":3,"name":"AliExpress","cover_img":"https:\/\/shuadan-img-bak.s3.ap-southeast-1.amazonaws.com\/images\/44b706c8d852c2d8af3fd342cbc1a652.png","logo_img":"https:\/\/shuadan-img-bak.s3.ap-southeast-1.amazonaws.com\/images\/14061481bca94624a3eae5eb289f5b6e.png"},{"id":2,"name":"Tik Tok","cover_img":"https:\/\/shuadan-img-bak.s3.ap-southeast-1.amazonaws.com\/images\/69ef5a8e0a9333c3e1a9f32bd4716fb3.png","logo_img":"https:\/\/shuadan-img-bak.s3.ap-southeast-1.amazonaws.com\/images\/e1a954365e90e9d69e7682533bd34710.png"},{"id":1,"name":"Amazon","cover_img":"https:\/\/shuadan-img-bak.s3.ap-southeast-1.amazonaws.com\/images\/5d23fbd82cd55f430f41dc6915afdf99.png","logo_img":"https:\/\/shuadan-img-bak.
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:RIFF (little-endian) data, Web/P image, VP8 encoding, 536x268, Suserng: [none]x[none], YUV color, decoders should clamp
                    Category:downloaded
                    Size (bytes):6224
                    Entropy (8bit):7.961142584225104
                    Encrypted:false
                    SSDEEP:
                    MD5:547F5F64EC4188A1D0860D5600B2FA95
                    SHA1:1327AAD8A8A6F573F424AE908CF373CADDA7D279
                    SHA-256:7AC6D8B29FAF831559EF361134816EEAC317316CC6F6392BEDBF6AF3525C5B23
                    SHA-512:D0496E951A3D20DA0B3DE474F00F3EA229F40F0CE6D6B745650F5870B3E002B6E9071B804795F0A8683B6F8CB80120DDB160660781109F36AF680C36D613E74E
                    Malicious:false
                    Reputation:unknown
                    URL:https://www.choeshop.com/assets/en-7ac6d8b2.webp
                    Preview:RIFFH...WEBPVP8 <.......*....>.P.K'$.........dn.B.h<.}.?....M.m.<O..._n[.......C.o....C....xu#.....S.......?....6.U.../..^o.......?.\..<.L............o.E...,.'..............q..............._...........X..G........=...=...........^.b?r.......1.{..x..../..}...N]s]..Km..?..).x5...Q.6..L.z........H.....C..0_d....e..%...\....#.+...o...4.....fFn....&....+.dH|..IE..O.g....caRM......%.X..D...}..q[/Xf.}9.ee.P.......Y6..+:L......k.....G..df..~dL{...h...K....'....3..7.~.vV.#....j[)`.o.Bm...~Yw[..c.....Q....6..R...=Dv.;.*...;^.2 4Z...|x.....q.~'.....]...b,...O..s3..C.._Fn...^.Y...N...gjf.#.o..~.....J..........A...l.c..L./Ef5..pC.....S.......z.gL-...=t....|sG....V.l.`.UHIi.....v...4...Sk.f....R.U...pd*....S:DJ.). .K....]&..l..D-W..@O...6.....d.>..vW.D..l...).._m.R-...$.[e}.IH...h..D..$....#2....y.......n.....dN......#`.*.~?.."[....Xe..k./J..C...Sw.x'....A5O......P.2s.p@.?....D..).wvY.`.|>.....&Wm.j.{K-z.v......w..`\...h...Ab.\E..mp...j...I..l.g=...A....
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:Java source, ASCII text
                    Category:dropped
                    Size (bytes):218
                    Entropy (8bit):4.778345347476768
                    Encrypted:false
                    SSDEEP:
                    MD5:DCE5AE1CF1F30D870AE0B403315F6896
                    SHA1:A241BD12819345A79E9C2090385C3C2AEB52319E
                    SHA-256:9E414AC7EE1AFECC8D8D7D23C552EA67F6D51DC0EEF731EF40C8DFECCDE79DC9
                    SHA-512:DAA28552275C44BD4A7A574C3F7949F4D27BDC779594403814F40B024B6FD7D0F1809106E7DB10266CA4D03F2E71AC28EE74736B61322DD236515BF58CEA43D3
                    Malicious:false
                    Reputation:unknown
                    Preview:import{at as a,a4 as s,a9 as t,a8 as o,O as r,b1 as n}from"./vue.2c3f9308.js";function e(a,s){return"string"==typeof a?s:a}const f=t=>(o,r=s())=>{!n&&a(t,o,r)},i=f(t),p=f(o),u=f(r);export{i as a,u as b,p as o,e as r};.
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (2080)
                    Category:downloaded
                    Size (bytes):2081
                    Entropy (8bit):4.984007022644927
                    Encrypted:false
                    SSDEEP:
                    MD5:607FBB6B028D9B359EBC95A1D75E8EF1
                    SHA1:E9D2142111DDA2DAA9C83F4A7A23734B92459C8A
                    SHA-256:2E9AB1270AB27E821C2BB4F3BD8A884101C6DC300CBB0669BC69070BE2A88803
                    SHA-512:91D34B8FF1A33C116A6A49ED6D2540EEB07D96A24550C1E3BE8F2929DA1F5EF710875956F0AA39042D89BC8FC2805BBA29E45E18A880044BFC0E73477A7E672E
                    Malicious:false
                    Reputation:unknown
                    URL:https://www.choeshop.com/assets/uni-easyinput-2e9ab127.css
                    Preview:.uni-easyinput[data-v-b30b435b]{width:100%;flex:1;position:relative;text-align:left;color:#333;font-size:14px}.uni-easyinput__content[data-v-b30b435b]{flex:1;width:100%;display:flex;box-sizing:border-box;flex-direction:row;align-items:center;border-color:#fff;transition-property:border-color;transition-duration:.3s}.uni-easyinput__content-input[data-v-b30b435b]{width:auto;position:relative;overflow:hidden;flex:1;line-height:1;font-size:14px;height:35px}.uni-easyinput__content-input[data-v-b30b435b] ::-ms-reveal{display:none}.uni-easyinput__content-input[data-v-b30b435b] ::-ms-clear{display:none}.uni-easyinput__content-input[data-v-b30b435b] ::-o-clear{display:none}.uni-easyinput__placeholder-class[data-v-b30b435b]{color:#999;font-size:12px}.is-textarea[data-v-b30b435b]{align-items:flex-start}.is-textarea-icon[data-v-b30b435b]{margin-top:5px}.uni-easyinput__content-textarea[data-v-b30b435b]{position:relative;overflow:hidden;flex:1;line-height:1.5;font-size:14px;margin:6px 6px 6px 0;heig
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:Java source, Unicode text, UTF-8 text, with very long lines (7134)
                    Category:dropped
                    Size (bytes):7457
                    Entropy (8bit):4.952059862225274
                    Encrypted:false
                    SSDEEP:
                    MD5:7E6BB5949C0E43050989ACDA16C6ECAE
                    SHA1:502DE1C3F7E3D00CC6E8CCA2F66321FDEB8F808E
                    SHA-256:BE6BD5BDF913DDB00E7B3F092B999C826208FFD10693B03B29355208AE7124E4
                    SHA-512:F1FDF42826ACFED9DDA4B66780FCE5E10DDAD1CDAC81F30B770C07E159726CEDE47D857088FEFFB74E2233FF045C4C5FE3D9DC5E31C627E41798B2666311641F
                    Malicious:false
                    Reputation:unknown
                    Preview:import{a as o}from"./index-6a6b001f.js";import{o as s,k as n,l as c,j as l,aW as e,a_ as i}from"./vue.2c3f9308.js";import{_ as d}from"./_plugin-vue_export-helper.1b428a4d.js";const a=[{font_class:"arrow-down",unicode:"."},{font_class:"arrow-left",unicode:"."},{font_class:"arrow-right",unicode:"."},{font_class:"arrow-up",unicode:"."},{font_class:"auth",unicode:"."},{font_class:"auth-filled",unicode:"."},{font_class:"back",unicode:"."},{font_class:"bars",unicode:"."},{font_class:"calendar",unicode:"."},{font_class:"calendar-filled",unicode:"."},{font_class:"camera",unicode:"."},{font_class:"camera-filled",unicode:"."},{font_class:"cart",unicode:"."},{font_class:"cart-filled",unicode:"."},{font_class:"chat",unicode:"."},{font_class:"chat-filled",unicode:"."},{font_class:"chatboxes",unicode:"."},{font_class:"chatboxes-filled",unicode:"."},{font_class:"chatbubble",unicode:"."},{font_class:"chatbubble-filled",unicode:"."},{font_class:"checkbox",unicode
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, progressive, precision 8, 650x360, components 3
                    Category:downloaded
                    Size (bytes):37121
                    Entropy (8bit):7.980095309588419
                    Encrypted:false
                    SSDEEP:
                    MD5:388B860C5EA7FDEFDD684F32AC089AE9
                    SHA1:D6FAF2A164D8E6E5813C6AC39B68F17C2C0A86AB
                    SHA-256:ED6CE8D6738E06207003C54ACC9CF3F428CE6AF93B5DBAEBAE7167A79B7825CF
                    SHA-512:F2E425C9894F1677A1534133BB119D75628A1E58131EBCC3CD7847AF558160B468466D4A6CC672072A27CF7109E56D160A0AAE18D1DEB80B356CC2F8ECAF83E2
                    Malicious:false
                    Reputation:unknown
                    URL:https://shuadan-img-bak.s3.ap-southeast-1.amazonaws.com/images/535e59a574408d22bc04a2c894215f7a.jpg
                    Preview:......JFIF.....`.`.....C....................................................................C.......................................................................h...."..................................................................................F.m..[..4I$i]%<...O..I..H.y....s...{d....G+....U....^.k..^.6..OK....Y.[.ND|.t.C..4...]W%..Uq...^...q.#*...NT......I#....)..=.>w\g?.b=eD.(..Lr..}..S..r....g.O..RtKQ..*v.n.....Y.T.6. C......&|}4.e...r.....X....%`$.%u.|5..Xy..../.Z.46T...`.#.b..,R.*...t.5j0..xI..T..U.wH..M..$.9n........U^..7...C]%.L..bzkS"...XeH..l..#..V....._.+....[Dq.D.6'6.p.s.....q%.9..*....`..q.@"O.....9]...8..*..3.3z_.X....XT.ls]F.....X...1Y..j;.o;...[.e..T.5.`..>..m8).....=Fu/.e..........T. 4!........9....).&-.....%FI..3$c..r...Y.5...d6Q.d..p....6..".......B..x.c...F......!.....S..JM.}E..F7.3.m..Rg.*...L........d|.Cq..V4..b.U.sh...K..V.j.$.A*0,../Q....S..^YbT..h...<...^z.zY.Lz..%\]#*'wT.9.l.r.".R...>..{...f.... .......2.8.x....d.=...KE
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text
                    Category:downloaded
                    Size (bytes):56
                    Entropy (8bit):4.545372163788729
                    Encrypted:false
                    SSDEEP:
                    MD5:CC873A5E531718094139842AAD303396
                    SHA1:1573784A8F14B52425A18F4414565CD32A94A748
                    SHA-256:FD5FF11D0CB464EDE06C672D2834D33C3319525B83CFC7F63C5CF229D63D09DD
                    SHA-512:71426C68DB278FCE48E5BD7DD8EC3E0CED5071CE4D32E0E631DE4143A701D16BA884F5F33F0DE1E74B965D1B81876D18A25E6F3211C556E191CE50D96972A228
                    Malicious:false
                    Reputation:unknown
                    URL:https://www.choeshop.com/assets/nav-logo.12c53558.js
                    Preview:const s="/assets/nav-logo-662e942e.png";export{s as _};.
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text
                    Category:dropped
                    Size (bytes):222
                    Entropy (8bit):5.336986811165358
                    Encrypted:false
                    SSDEEP:
                    MD5:6FA7F3EF4BA55AAE8A51B739AEBA7F0A
                    SHA1:FB2A151A4439191916EAAD1EB0B44356CF87C8E4
                    SHA-256:7FC5F4D1AAFACCC231FB55CE384A3A5D28E78D20C1F460AC1D838A38656CA983
                    SHA-512:186CDCF017900A16345708CA8AFB06E83788C5A83DA36DCAAFC9E4DBBE2FF606744512CFA1B902984F72151C4733DFFC03661340E06C499827E8A9FDA15E6DD9
                    Malicious:false
                    Reputation:unknown
                    Preview:const A="data:image/webp;base64,UklGRngAAABXRUJQVlA4WAoAAAAQAAAACQAACQAAQUxQSC4AAAABT0CQbRs7wgw+hEVETIIbQBXZNvYhhBhKyKIB/1q8xK9CRP9Ted/h52TlwFYDVlA4ICQAAAAwAQCdASoKAAoAAoBCJaQAA3AA/vfQf/5en/yz//+qgYOAAAA=";export{A as _};.
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:Unicode text, UTF-8 text, with very long lines (56112), with no line terminators
                    Category:downloaded
                    Size (bytes):442351
                    Entropy (8bit):6.072229195895805
                    Encrypted:false
                    SSDEEP:
                    MD5:4401A7D9745CD9E4420BBCDC355E63D9
                    SHA1:76328C5E0A7E15BE831000114AA0B0BD95A07428
                    SHA-256:7602185D8741E44A0DA39D1B921E40E9462353997AE93FE4FFAE4C99265C3A04
                    SHA-512:ABAD14017FC77BA07C8D47D40C4C61244140A22EEF070BFDA8B388081B939AFE49917AAD713BA72FE85B37F8B8881D848ACDC0804848DD1C5C600E09D4C73184
                    Malicious:false
                    Reputation:unknown
                    URL:https://www.choeshop.com/assets/index-6a6b001f.js
                    Preview:import{s as e,i as t,u as n,a,n as r,d as o,r as i,c as s,h as l,p as u,b as c,w as d,e as p,f as h,m as f,g,j as m,F as v,o as b,k as y,l as T,q as C,t as _,v as w,x as S,y as A,z as E,A as x,O as k,B as P,C as L,S as N,D as M,E as I,G as O,H as B,U as R,I as D,J as F,K as V,L as z,M as q,N as H,P as U,Q as W,W as $,R as j,T as K,V as G,X,Y,Z,_ as J,$ as Q,a0 as ee,a1 as te,a2 as ne,a3 as ae,a4 as re,a5 as oe,a6 as ie,a7 as se,a8 as le,a9 as ue,aa as ce,ab as de,ac as pe,ad as he,ae as fe,af as ge,ag as me,ah as ve,ai as be,aj as ye,ak as Te,al as Ce,am as _e,an as we,ao as Se,ap as Ae,aq as Ee,ar as xe,as as ke,at as Pe,au as Le,av as Ne,aw as Me,ax as Ie,ay as Oe,az as Be,aA as Re,aB as De,aC as Fe,aD as Ve,aE as ze,aF as qe,aG as He,aH as Ue,aI as We,aJ as $e,aK as je,aL as Ke,aM as Ge,aN as Xe,aO as Ye,aP as Ze,aQ as Je,aR as Qe,aS as et,aT as tt,aU as nt,aV as at}from"./vue.2c3f9308.js";!function(){const e=document.createElement("link").relList;if(!(e&&e.supports&&e.supports("mod
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:PNG image data, 528 x 366, 8-bit/color RGBA, non-interlaced
                    Category:dropped
                    Size (bytes):43819
                    Entropy (8bit):7.972849689948068
                    Encrypted:false
                    SSDEEP:
                    MD5:CE0DE79C7B4FBB274DD858ED675ECF36
                    SHA1:D4EDB5763AAC17BEDD0CADED711BE7CE8460128F
                    SHA-256:CF82ACF73083B03F7A2A57BE924CFF3C1EC7DE3E33391C3812574E4F6DE45AAE
                    SHA-512:7A39119500C7C2BD4C46FAE0F50E2CE650BB3B0A78BB889378AA7EB7B4E70697A48A23CB98ED64A0AB12352DC18DA12FE580DDD1987621AF81502F17FB89DBF1
                    Malicious:false
                    Reputation:unknown
                    Preview:.PNG........IHDR.......n.......!.....pHYs..!8..!8.E.1`....sRGB.........gAMA......a.....IDATx...`.W...<5K.$.l+nr.4;q...&..J..5.B6....-..,..,,..eY`.!..I.......t;M...,K.,....|..u...}3OO..d..=.y..=s*.$'....?..w.4........{...o...c.g .)H:Wn^*r....B.H...O.X.H.....K._....V.....yo..Wh..ey{c..M..O...qn.z..ic=.......>%....:.....uN...`..0..........J.Q....S..{s..+..Zh\...p...l(....-..P.....'.....o...I{Q.I.d..O.>..7..~.xy...bX6J...X.j..mQ.....'nO.w.3.K...q.....?u.S.[...K5....>c....l..!u....*b...c/!....>......7..../...=.)_..1..!......`S..}..!.aI..d....k.m.mS.~.~.t~}..9...H^#.&..ar..x.3HY..4y..............o..h.u.n_...........i..#, \...9W..........7y/.....o7Hx...l..X..}..3..UN...?....$.f...F.~.76.7*A..3v,..P...'.%.o...;.)/...s.O._.|.\......^..._2I.3%mS^....<.ar#.t....g%..H:.I]..=s..#..I{..-....J;...t.....?....M.~...o.r...y..?bHxQ...%.t...%....#.ER..J....n..'....y.|A.u.:.e.=.)..$........~........L.<....,...s/.Mr;.l.:..C).=S..f.Zg.y.x....{.....X...U..|.....1..
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:PNG image data, 528 x 366, 8-bit/color RGBA, non-interlaced
                    Category:dropped
                    Size (bytes):38800
                    Entropy (8bit):7.953251838034477
                    Encrypted:false
                    SSDEEP:
                    MD5:1E1F050916AA07E276EE182D53C9E184
                    SHA1:A07D89501572896070905C21CDA260C1F66056B9
                    SHA-256:713002EBFB89B6326F14109AED4C9346A0255AA66C02EA515256261523B2BCD4
                    SHA-512:E5ECB070B1186B0825927B4A052EB01CA3C7A8C21BA50F31FF2704825B312FE35155146E8E3828B0B1ED01BF8A804D8948BFD81FF724CCFD57E26C0D2A56A168
                    Malicious:false
                    Reputation:unknown
                    Preview:.PNG........IHDR.......n.......!.....pHYs..!8..!8.E.1`....sRGB.........gAMA......a....%IDATx....]E...{g.d2.u....[..eu...O..|*...+........(>...w..\...kD.D......L..:3......S.o.....R...l}..k.....8J.....m9.....P..J..W....uF...u....y...H[.rNQ.c...{~..B.]c..*.^.|.w..b...K.+U....O=....e}...R.s....u.;..|.........../.0..(.@"..x..a..B/x...BT...V.k.u..=..b.-.Qx.<...P.....C.......=k.N..u.z'.....9...C...J..y.)...R....cA.........;...m...X'..~..S.9.J..T.?x...S......8..].C.2.(.1.#._...O........_...}/...?..Q...p...?..t..9.t,...wJQ..8.;6..W....Q..s.+.KA'.....w...<......w...P..._W.o.}c..%.N=.|...E........U.*"\...=....(..U..Gn.........7.....l..X...s..3..o...c.. ./3..`.......S..?..k.>.b.?....<.].^..h._..<_.~.<..D.......dB.3...O`...[.;..;.....#t.C%p.i.\....#i....gl....K|...-.|.....6...8.. .Y...H[?i..P....._:H~...}......y...>l.e.u\...O...DZ....)....?....l]..e..O...?v.s...s.B?..f9.....8.o..b.P.}..<.T...d....R.B.....4...)...K.vJ....C.|....{.Y....
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:PNG image data, 246 x 87, 8-bit/color RGBA, non-interlaced
                    Category:dropped
                    Size (bytes):3958
                    Entropy (8bit):7.90939407055675
                    Encrypted:false
                    SSDEEP:
                    MD5:17B9FF35FF4CF784C007BE6DD7F9100A
                    SHA1:D04A7E775CAA185DACD3C457CCB0A098CEDF95C3
                    SHA-256:65DA2819CFBDF6350B044E2815EA743B26978A42C6BD58F3E8DD7E468BE5B304
                    SHA-512:757C35B9549D623735110F6E2A3C43E511971E946FE2AD7F2D60EE0CF45BD07F51A8F6F9F7303EA65C238C4ED2FB6F0EC7484F1EBF3AFC6E360C3DBF930658CB
                    Malicious:false
                    Reputation:unknown
                    Preview:.PNG........IHDR.......W.....7R......pHYs..!8..!8.E.1`....sRGB.........gAMA......a.....IDATx...tSU.../Ii)..Y...QQ(.."...U..+.z...p.#.Gq.q;Z.A.+ ........l#2....U..]........fy......K.I.~.....<^......`..a..a..a..a..a..a..a..a..a..a..a..a..a..a..a.....Y........W0L....u.e. .M.0L.bB..g...Y.&........t(o..f#.&D.}a..O..t....M"a..&d,l&d0.....+...`...Q.{9N..`....0!D..........d.{..&Dh......Ee.U<........i.~.8...d.o....X....#f'l.aB..v%$ni$2.4>....0L."F...7[...Z....8..0L.%.....+..c.`....v8~..I.....<6.....oj.*K...d...\EgR.0........F.1..A.sk?S[.f..D.JXz....._..5l...2.s..&....~.A6..g8Y1Y4.x(Cb.d..>..w!.Y...d..{.=..b!{....dZ.R..6.....[.....,...+(..|Cv.K.`...f....ua[.....?.../....!D..cG.T~...;..../*.G.RQW.*...!...W4..;.X....@r.....C3..|j.~..6.Q...v....../.. .#.....Fz....Z......`."..-.l......=.E-gI.....; ....o..].p..3.W.2p...a1|.3.)...|...&...|..c..........!?...,.:.t..,*..0\...|..RI..H..%.9.Z.KX.....=..F...(..B..7..g.<......@w]..r,.bO.%..#.A.h.|..*...:..7..y.......a....E
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (1612)
                    Category:downloaded
                    Size (bytes):1613
                    Entropy (8bit):4.942067737870373
                    Encrypted:false
                    SSDEEP:
                    MD5:728B42EDEC27AC4930FCE2360CE85C4E
                    SHA1:1EFF3EFCBBD339FBE1E0131C2DF1B4D34A576B94
                    SHA-256:3ADF708788B5E8B0257E760C648195B0753ECC64CE253B0966B32A111FC8591F
                    SHA-512:26F6A50897CC571604713D35D067A0D61D37266AD0F009493712A10021B51AC64525B9E07BD4028AED1E859B071D3E92B2B7C140D6B845888D0CE4EEE4E7EC8A
                    Malicious:false
                    Reputation:unknown
                    URL:https://www.choeshop.com/assets/uni-nav-bar-3adf7087.css
                    Preview:.uni-status-bar[data-v-3c0630f1]{height:20px}.uni-nav-bar-text[data-v-e5f44f57]{font-size:14px}.uni-nav-bar-right-text[data-v-e5f44f57]{font-size:12px}.uni-navbar__content[data-v-e5f44f57]{position:relative;background-color:transparent}.uni-navbar-btn-text[data-v-e5f44f57]{display:flex;flex-direction:column;justify-content:flex-start;align-items:center;line-height:12px}.uni-navbar__header[data-v-e5f44f57]{display:flex;padding:0 10px;flex-direction:row;height:44px;font-size:12px}.uni-navbar__header-btns[data-v-e5f44f57]{overflow:hidden;display:flex;flex-wrap:nowrap;flex-direction:row;width:3.75rem;justify-content:center;align-items:center;cursor:pointer}.uni-navbar__header-btns-left[data-v-e5f44f57]{display:flex;width:3.75rem;justify-content:flex-start;align-items:center}.uni-navbar__header-btns-right[data-v-e5f44f57]{display:flex;flex-direction:row;justify-content:flex-end;align-items:center}.uni-navbar__header-container[data-v-e5f44f57]{display:flex;flex:1;padding:0 10px;overflow:hidd
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:RIFF (little-endian) data, Web/P image, VP8 encoding, 600x400, Suserng: [none]x[none], YUV color, decoders should clamp
                    Category:dropped
                    Size (bytes):9296
                    Entropy (8bit):7.972927679205179
                    Encrypted:false
                    SSDEEP:
                    MD5:3283E9833407E00175C3DBAFEC2F9FFC
                    SHA1:537AB8EC222CB7A548E1ADBEADD65788FBFD5B91
                    SHA-256:387E248EC62CD71029AF4C030EECBF6ECAE3AC356B7198A10BF2901454622396
                    SHA-512:910CE811465B02A207A2295BAB6A60A4BE7C684F760FC45191EE48BEF91CFC7518A84A0A72089E4CD62A1434DE1E6305BE1282D8D130AE3668F82A0403259747
                    Malicious:false
                    Reputation:unknown
                    Preview:RIFFH$..WEBPVP8 <$......*X...>.Z.O'%$"#8.x...cn.v..3.........@|.U..W......f.U.%....{h...s..............~...z......c.....'.o.r..B........o...1./..._...G...k.............O.W{.....K...U9o....s...z.{o..dv..[.+...........?........a.O._`...a....}q......M.k.._...@.a.1..!..9g,..r.Y.9g-.<.).1.0....c.a.1.}.p.......\.f...r.......c.a.1.0....s...6...SjmM..6..z....|O..>'..... '3.x..2.5.[}.}..!oj....*@.I.....|O..>'......}......r..G-a.3+...%.p7.>...w%1.0....c.^...G}8t...V3.................7{.o..Y..7.V..9.e.X.q>'.....|!x3....".T(.O..%'...-p4$Hi.;..?...4j.......3..#..+.{.L..p.......XRUW.U.%.m..l*..M.%........$.\..3(..R...~s...|O..>'..i&...Y...".....`^.@...v.IU.'.r..A.d.R...?..<C.$U..><?.].k.!<.....c.a.0.%....`.5zr.a..4OT@d....<....B.}7!..}.+".b...Pk...G....]bH....T...]...\...S.k9.&...rnM...t.;.3'...^./.x..Z.c.M.......H...hJ..!s?.G?.c.8..zg.I<...c.a.1.0.[......,..8.4.r.B.4..#..KcE.~2nN@....;..+....=[.u.*.gu?..>'.....|O@.v..F....<m..Q.s.f..|...`.^..(...3d.>.K
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, progressive, precision 8, 375x156, components 3
                    Category:downloaded
                    Size (bytes):11075
                    Entropy (8bit):7.943686661991724
                    Encrypted:false
                    SSDEEP:
                    MD5:C0FF9E09C0617D06BEA5736BEC87004C
                    SHA1:03FFEF298C316D4633EEEAC671D9164997BF6290
                    SHA-256:F944857F442224A71E327B856EB0FC96F7314545B8CC83A9BEB85A671CA1BA82
                    SHA-512:671D555C30CC0547B175BCD2CC5ED5334A8F0FF8DB392FB777AEF93B5A5A459F1E19FAFE4300D988D709AB0B2DC8F1BB0DBA4B258BD707DC0EDD031EBFC5DEEE
                    Malicious:false
                    Reputation:unknown
                    URL:https://shuadan-img-bak.s3.ap-southeast-1.amazonaws.com/images/0baf85e233a2d566ead9f254d4ffb6e1.jpg
                    Preview:......JFIF.....`.`.....C....................................................................C.........................................................................w.."................................................................................_...$,...I.....,...!JR... <..p...M..<........y.'>k..=1.sw;.y...}|.Z(E*...s..\.io8S.HD.:|.L..$.P0...$.G..l..C..x..x...M. .8.h.s.b.Fqk...7q.W....~^..F.....a......x].{..s...%.......Pc...v4.14n6.,.-c...z.iju......v{....0I./.........a...^bf..:Z..^M..../W7}_i...`.fcw...dq=.J8...-...].0.....J...U5..V}..12:c].]..S2*..zU.-.e.....3.....r..MQ2.51..W.#T.\.].|7y.i.i.LGg5.(..C.y...a.I...Z.6<. xG.v.......K.u.m4sq........+,.4.W...j.{...Fr..$]Zd;F."..cN}.......n.a..e...YH..3...F.4..4.c[d..T...t....F.....x0..&G....!....=.W....{.fV.}M....hz.Y..cc..t.Y~....s..976:......X...........r.+2.....8...&..Sr...N......<..F.......ix..).m.=._...\.2......a..O#..u.s.{.H...7.y...K4..^fK..N../)..&....|.....5.d....e......i.H...mv<...-
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text
                    Category:dropped
                    Size (bytes):91
                    Entropy (8bit):4.447578488877479
                    Encrypted:false
                    SSDEEP:
                    MD5:41BF66D156AAC38DBF7A45B53CB4DB18
                    SHA1:4AA693A2AFCC34B6A577E1BFC4BE3EF5A458DCE0
                    SHA-256:A7DBB0EAED9DE79041D555C4563BE4BB0514099B8D169A2B548AB2D07102CB55
                    SHA-512:64E1A5C2939052C93692338BF78B66723AE6673121D2915A9FB0848449E4B2657C1A31C8940BC7C9EC77554FD4C04FFAE1B787297F0FBA23983A987E85CAEE15
                    Malicious:false
                    Reputation:unknown
                    Preview:const o=(o,t)=>{const c=o.__vccOpts||o;for(const[s,n]of t)c[s]=n;return c};export{o as _};.
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:PNG image data, 22 x 22, 8-bit/color RGBA, non-interlaced
                    Category:downloaded
                    Size (bytes):434
                    Entropy (8bit):7.210271749795109
                    Encrypted:false
                    SSDEEP:
                    MD5:CBD0355CC95D53C0EC8904AE9B49E6FF
                    SHA1:8CE4F335DF7FA48772282761D33A8F796833895D
                    SHA-256:4F40587540F771B7FC57F2625FBAA76C1C52C6C775EAA5B53142C4F2AF9BA5CD
                    SHA-512:F25F12F7759E1B02313BBC99160A9E25B2CDD79755FBA61E0ADAEE11D4B4D44A6E9E2EBCAE8EED3917C0E4C3297EEC7F2B3B9910EFCA5F44883716AE4B32BC01
                    Malicious:false
                    Reputation:unknown
                    URL:https://www.choeshop.com/static/tabBar/tab4.png
                    Preview:.PNG........IHDR..............l;....pHYs.................sRGB.........gAMA......a....GIDATx...J.@.@g.........L......bz.z3~....M..@/... B. G.9.Ji.YD...f.@..&.....B.......=g.Jc.I.I..8......<..E.3.9.8}.....H.2..f*K(a.Z....w]Lh..p.I....-.....P...k$..Q;.l..&p......Bm....fs9..d...H..!I.S...D.vXvH.\`>...vO.R....f:?...`=...W...N^..8..ta;.bi.W.n.^S.....ba_%.$..[.....m3-.Kyz.y#..OP/cA.....\.T..tv.+8.R\.1Df..>d.CU......IEND.B`.
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:RIFF (little-endian) data, Web/P image, VP8 encoding, 750x1624, Suserng: [none]x[none], YUV color, decoders should clamp
                    Category:dropped
                    Size (bytes):55448
                    Entropy (8bit):7.996420401407852
                    Encrypted:true
                    SSDEEP:
                    MD5:BC0E9F804064A5BB221E2690F8663732
                    SHA1:71C9E65D6324C531FEB80DB0604474E28AC9A91E
                    SHA-256:2F2BD17F85A2D76B258DDD513B6E9A52984D49CB4536D3583BBA40A9668EC838
                    SHA-512:06652B69E101B81A7777CD0887224C43A5176D5BDAD0F838A20213046BC7A72704B02B7BDAC7D71E13D19A1145DD53BBAA8C04424BDD763B644CE650C7EA6C24
                    Malicious:false
                    Reputation:unknown
                    Preview:RIFF....WEBPVP8 ....0Z...*..X.>.T.N'$./$P.2...gn|]}...........y......_.|...._tt.i..~....w4...2....~...+.9.....7........I..vo....../....r.........7.....q.../~.z.......}=x.}...Y........?...{t..,...).X*..4.Q~c.J5N....+l..oG...b.Uz........e..5..75._.6.K..g.[....R_%..-]..xQB...j..*...A..c}..&Lp.S.2~..iF.CHo...E....{D.j........I..5O.,mo..,R..../...).`..%.7.0.Y/..;0.q..1.....x.>G.P.@,N.....j..W,pW.C:?...j.K.`.vP...UJ.[..e..Q\....TJ.C>...T<..&m[....>....G...?....IFp....<.}J.@.Y..P.Y0.!..9..oD.+.....TH...L...8O}.}....CEb...,....7.b.2)Q......d..d..kA.c}/..,...~.....6.>...0....]...l^.......+..Y.d.XJ./S\.....ic..+....N....&.,x...L.d+......y.N.%..Ku(-.n.!..<.]D[......z.....H...y..0...].S..{..f\...aW=l)..K..[..H&=.bTN.......khJ...w.....t"..x..M....'...........H.k.o.......O...`Ab.+.....s........m.CU.'..UC.... ..uO...`.'..q..fr.m.x..C)..B@e".e^...{Tm..!\8.e^..K..0>_.B$.........T....v..m..*.QmE......zp...%<.n..v.&.p.|.?..,u..D.y.\.TR.}Fo|L|Y..y....V...3..$...
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, progressive, precision 8, 650x360, components 3
                    Category:dropped
                    Size (bytes):45089
                    Entropy (8bit):7.987163434156169
                    Encrypted:false
                    SSDEEP:
                    MD5:43588742394E8019CD501DD59560C0F7
                    SHA1:34D466F1C6535C0324D78C516DBBFF22BE871DA1
                    SHA-256:ED51C6211CBBFB924D19A1AB519FF271265D13E5769FCD581F6F6D398B782715
                    SHA-512:32BF36312744C716801B841D76EBA484B5C6884982F25F29D9768FD6E30A8EDF6C892886903EEEA4B8526413EFF59EF55BBDF375270C9095DDE09D0DB84DBC99
                    Malicious:false
                    Reputation:unknown
                    Preview:......JFIF.....`.`.....C....................................................................C.......................................................................h...."..................................................................................+....\.....[yRe36.....B..K...m...lWi.AX.+......\,..M..../[....."D.o."....i....Z.&....A..M#>.v3G.-.u.&.h..)PY!AL..v...8..#.mR.$..I.-.5.KI........:.84..>N.._/...D..J......=!F..5.\...;G.dunq.Y*{..i.Bo.8.g......K.7..-....v...Pl..t..|.v?2....>.....".B......f...z..=_'c%).........f..2.I..qH\.4....@...Hm."(.H!.0./9....9<.d.{.q...$h.&.,.9..[Yw.a.e!r....._j..x.....V..g.:+).m...[..|...u.g.Z.7.QI.s9].k..QPRwsy..[....I.<"..#."v1...j.f#-..xk.+s/.:m.s6.Y.]....j.af ..RX".(.`.'.K(.I.`..&.....#..+...V#.G..I..]2N9...I`..$....X.$hf4..c.t.55.....;.^....^...L[.|......]..}4.q^K./26....U.?..k...P.o2r.M...@....... .6.>...d.......b....Q......e..D.fy.....^..x"z).'F.....B...#.;Z........dBD.Z%.R.F.dy..J..b.9....D........+U..
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:JSON data
                    Category:dropped
                    Size (bytes):602
                    Entropy (8bit):5.114005678092201
                    Encrypted:false
                    SSDEEP:
                    MD5:74B37D695F85BFE5814A6BA9F04F6893
                    SHA1:8F235D58D2B91B0E3F44C6FB1806883CA6AC6AC3
                    SHA-256:A3E7FB3F746B18FA635843BDE4C6163196F1E8EC1B16F88A12C5E436A3A5F2BC
                    SHA-512:3D1AD254DA272ED7B680630795CFA146B6EC3B62A89E071348846244C28D2717F6479087A280DF20E2D7CDC2E5B2E6B9408C1795335F51F444C6D4580CC6E804
                    Malicious:false
                    Reputation:unknown
                    Preview:{"code":1,"msg":"\u00e9xito","data":[{"id":4,"name":"Alimentos","logo":"https:\/\/shuadan-img-bak.s3.ap-southeast-1.amazonaws.com\/files\/b2f18c1082b2b7b6db957d60cf9e4e44.svg"},{"id":3,"name":"\u00datiles","logo":"https:\/\/shuadan-img-bak.s3.ap-southeast-1.amazonaws.com\/files\/c4797052fc72ed98708f177831117a8f.svg"},{"id":2,"name":"Ropa","logo":"https:\/\/shuadan-img-bak.s3.ap-southeast-1.amazonaws.com\/files\/5c9f5b4b70178f73e28d46b4aa3130f6.svg"},{"id":1,"name":"Electr\u00f3nica","logo":"https:\/\/shuadan-img-bak.s3.ap-southeast-1.amazonaws.com\/files\/527ab001d2ce2a21e8a329c3de2c435d.svg"}]}
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:JSON data
                    Category:downloaded
                    Size (bytes):592
                    Entropy (8bit):5.1046245462148025
                    Encrypted:false
                    SSDEEP:
                    MD5:F393C7546E44E0F6F2045B18577A6068
                    SHA1:ED25AB52D3EC5D47B77221C3771AC29E32955CE7
                    SHA-256:B142FB4E6646EB9CF724B08B270CB95C79E303E3BDD1683E7082DACE957F93EA
                    SHA-512:67109CB890AEF2B310AA9E0237639211AC71892FF4780E03C7B92759879A56B919E661FFA2AE3F9057CA992AA1F32435E6A85E46417A70953EC5FA4AB6296D9F
                    Malicious:false
                    Reputation:unknown
                    URL:https://www.choeshop.com/api/get-categories?mall_id=2
                    Preview:{"code":1,"msg":"Success","data":[{"id":4,"name":"Food","logo":"https:\/\/shuadan-img-bak.s3.ap-southeast-1.amazonaws.com\/files\/b2f18c1082b2b7b6db957d60cf9e4e44.svg"},{"id":3,"name":"Essentials","logo":"https:\/\/shuadan-img-bak.s3.ap-southeast-1.amazonaws.com\/files\/c4797052fc72ed98708f177831117a8f.svg"},{"id":2,"name":"Clothing","logo":"https:\/\/shuadan-img-bak.s3.ap-southeast-1.amazonaws.com\/files\/5c9f5b4b70178f73e28d46b4aa3130f6.svg"},{"id":1,"name":"Electronics","logo":"https:\/\/shuadan-img-bak.s3.ap-southeast-1.amazonaws.com\/files\/527ab001d2ce2a21e8a329c3de2c435d.svg"}]}
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:JSON data
                    Category:downloaded
                    Size (bytes):519
                    Entropy (8bit):4.854731301781744
                    Encrypted:false
                    SSDEEP:
                    MD5:BCD0D5B3F741F830573E13C240877B35
                    SHA1:F3D4C8E686C10727EC72DB1D8F43A294DAD17E2E
                    SHA-256:132028E6145DBD14E7CBBAD8D8BD41016E6792B47EAEF68D2A5404193D4EA340
                    SHA-512:9AF35DE5A0BC4664F278DE761E142EA6747CD985A3D8D1C2C83A34122E387D0E713B180F020C46B12FB25A3B1BFA7067AA46CCD97FA617EAF7A2DB1999E4FE02
                    Malicious:false
                    Reputation:unknown
                    URL:https://www.choeshop.com/api/news
                    Preview:{"code":1,"msg":"Success","data":{"current_page":1,"data":[],"first_page_url":"https:\/\/127.0.0.1:88\/api\/news?page=1","from":null,"last_page":1,"last_page_url":"https:\/\/127.0.0.1:88\/api\/news?page=1","links":[{"url":null,"label":"&laquo; Previous","active":false},{"url":"https:\/\/127.0.0.1:88\/api\/news?page=1","label":"1","active":true},{"url":null,"label":"Next &raquo;","active":false}],"next_page_url":null,"path":"https:\/\/127.0.0.1:88\/api\/news","per_page":10,"prev_page_url":null,"to":null,"total":0}}
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (65536), with no line terminators
                    Category:downloaded
                    Size (bytes):76442
                    Entropy (8bit):5.241158954256853
                    Encrypted:false
                    SSDEEP:
                    MD5:323894F0F17F3D376CDB791A1454880E
                    SHA1:A511BE6486AA414DC65E6CA22AE3728538136324
                    SHA-256:0AC20E2F74C927DE91F0CB990ADB0CAF5691D36CF6D1F8DF5A109421336F0E6E
                    SHA-512:D042EAEE8E5065BC275B0EABD1B3CF1722F5DE877AEE790076294EB72139D43040AE1D56EF75867A0FEBA10B4CB62A0122E495CF48310EE700408AC51F157D28
                    Malicious:false
                    Reputation:unknown
                    URL:https://www.choeshop.com/assets/vue.2c3f9308.js
                    Preview:function e(e,t){const n=Object.create(null),o=e.split(",");for(let r=0;r<o.length;r++)n[o[r]]=!0;return t?e=>!!n[e.toLowerCase()]:e=>!!n[e]}const t={},n=[],o=()=>{},r=()=>!1,s=e=>111===e.charCodeAt(0)&&110===e.charCodeAt(1)&&(e.charCodeAt(2)>122||e.charCodeAt(2)<97),i=e=>e.startsWith("onUpdate:"),l=Object.assign,c=(e,t)=>{const n=e.indexOf(t);n>-1&&e.splice(n,1)},a=Object.prototype.hasOwnProperty,u=(e,t)=>a.call(e,t),f=Array.isArray,p=e=>"[object Map]"===x(e),d=e=>"[object Set]"===x(e),h=e=>"[object Date]"===x(e),g=e=>"function"==typeof e,v=e=>"string"==typeof e,m=e=>"symbol"==typeof e,_=e=>null!==e&&"object"==typeof e,y=e=>(_(e)||g(e))&&g(e.then)&&g(e.catch),b=Object.prototype.toString,x=e=>b.call(e),C=e=>x(e).slice(8,-1),w=e=>"[object Object]"===x(e),S=e=>v(e)&&"NaN"!==e&&"-"!==e[0]&&""+parseInt(e,10)===e,k=e(",key,ref,ref_for,ref_key,onVnodeBeforeMount,onVnodeMounted,onVnodeBeforeUpdate,onVnodeUpdated,onVnodeBeforeUnmount,onVnodeUnmounted"),E=e=>{const t=Object.create(null);return n
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (1425)
                    Category:downloaded
                    Size (bytes):1426
                    Entropy (8bit):5.980150982380464
                    Encrypted:false
                    SSDEEP:
                    MD5:E3FC3E6DFFCFAEC435CD18A3F4ACC51E
                    SHA1:F753E25419A3B0D9231CAABCE9704046239E36C8
                    SHA-256:6875E807D18AD505BEC0D48B69D13CC3835F1CE78AD422583083F1CFB8F4A3EF
                    SHA-512:2B76CC462B46538D8D6D690B36CAF1E082D4F4A9CBE7EFE371DEA043695437758D8CD19C8D85FD4CE3D9032E59691DE74559C9230CFFC1C0ECDF9FCF5C3C1760
                    Malicious:false
                    Reputation:unknown
                    URL:https://www.choeshop.com/assets/mycenter-pop-language.f2e3bebb.js
                    Preview:const A="data:image/webp;base64,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
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:PNG image data, 96 x 96, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):2924
                    Entropy (8bit):7.859359112324575
                    Encrypted:false
                    SSDEEP:
                    MD5:7270C6EEA0829472083A613F95A3F1F2
                    SHA1:C18C899E0D04D599C099C5D32C40CA4C5AF142E4
                    SHA-256:75DA8AD0AD5931610FD120FB4A6BF4A7962A78C2E6B5EC5BF3AAE01698F515F2
                    SHA-512:DB5689D41CCDEAB92FA9DFA2EC4A1BFA815CB6358116DAA477A4667C0FED9C70B912F9076781DC0EABAD58B075C4BA9591100CB30985418DF96E7822437BD142
                    Malicious:false
                    Reputation:unknown
                    Preview:.PNG........IHDR...`...`.....m..o....sRGB........DeXIfMM.*.......i.......................................`...........`.....3_N....IDATx..\Yl.....m.o.)..,..%.-G....p.......R .._Z..)..m..?M..7@.h...(...kWF...l.6......(..H...C.h....<.1...w.{...y.D....".l..x.&............1 ..,x..........1 ..,x........1.$eh..f...y......C.l..3..b(.._8....X2..*.A..'.:....O.._ki...1.K_..........|b.........e..p..]..M.D".V..n:.V..M.d..+o.,]j...x2......w..=......:...&.....tX.P...~......4.,9...1o*.e.......Dj..Ko..H.Wj}T......jl....D,.u...\Y..="h..F.b6].K....}?8.-...zC..G#.g.I.H......3==..F.4..gp..U.\~+..`c.......Jd..;... MC.r.......G=...\fo.....y....>R8{F....h...h..;r..eu.\....K.>..y.7. $Z.;....X.Wo.sH...m+.i.O...I..V.a...s3.....]....W...4..b8....EF.d..I...8.6..S!...%..(..Ur.7.........S>..(X...CFQ..7..\...^..m.`.L..6j......mO..2...R=.B.~.H.m.N.WK....$.....R%.....WO...Fa!."K9..}q..7....%....m.{y........a..q:..?.]..C.F.p`.`..|j}.^Q......Nv.B....a.D.H8.......\C. .i.g=.2
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:JSON data
                    Category:dropped
                    Size (bytes):528
                    Entropy (8bit):4.772422128285041
                    Encrypted:false
                    SSDEEP:
                    MD5:1D9D42AE9DB3DE7E707C3425D76209E0
                    SHA1:0CA547E46CD78A4CC13DF512BE2C96F8BBD1CC74
                    SHA-256:1C09FD7F4EDE6BF362297F836823F8143832FF682242AA9607023E7702CB56A9
                    SHA-512:A796C2FB37BBC190457B61CB81A379961544D76F2860F3C046F9228DCF0688277F156C379706D2088B24878EC9C09E97A5FBEBF24E538B8677B9521B6A34FCCD
                    Malicious:false
                    Reputation:unknown
                    Preview:{"code":1,"msg":"\u00e9xito","data":{"current_page":1,"data":[],"first_page_url":"https:\/\/127.0.0.1:88\/api\/news?page=1","from":null,"last_page":1,"last_page_url":"https:\/\/127.0.0.1:88\/api\/news?page=1","links":[{"url":null,"label":"pagination.previous","active":false},{"url":"https:\/\/127.0.0.1:88\/api\/news?page=1","label":"1","active":true},{"url":null,"label":"pagination.next","active":false}],"next_page_url":null,"path":"https:\/\/127.0.0.1:88\/api\/news","per_page":10,"prev_page_url":null,"to":null,"total":0}}
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:HTML document, Unicode text, UTF-8 text
                    Category:dropped
                    Size (bytes):1011
                    Entropy (8bit):5.216432800278142
                    Encrypted:false
                    SSDEEP:
                    MD5:AEFC8130206B1E0798A9502B0E5D0B40
                    SHA1:90AF264A5A206098161E5617C24CBEBFF32E0F63
                    SHA-256:2155D18ADEC13FEC19324318C2223075A2EDDBFDF4908407A6314FA6808A79A5
                    SHA-512:9EC6E7571CDD5CDDD60C4BE0C84F413A92FB58CEF4ACF6DDCF36090F9077A16AA16C5CF15531FFC5C99BB5F8B402DC00ADADEE1D1EA1927B6B5BF923E73C8809
                    Malicious:false
                    Reputation:unknown
                    Preview:<!DOCTYPE html>.<html lang="en">.<head>. <meta charset="UTF-8" />. <meta name="robots" content="noindex,nofollow,noarchive" />. <title>An Error Occurred: Method Not Allowed</title>. <link rel="icon" href="data:image/svg+xml,<svg xmlns=%22http://www.w3.org/2000/svg%22 viewBox=%220 0 128 128%22><text y=%221.2em%22 font-size=%2296%22>.</text></svg>" />. <style>body { background-color: #fff; color: #222; font: 16px/1.5 -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, "Helvetica Neue", Arial, sans-serif; margin: 0; }..container { margin: 30px; max-width: 600px; }.h1 { color: #dc3545; font-size: 24px; }.h2 { font-size: 18px; }</style>.</head>.<body>.<div class="container">. <h1>Oops! An Error Occurred</h1>. <h2>The server returned a "405 Method Not Allowed".</h2>.. <p>. Something is broken. Please let us know what you were doing when this error occurred.. We will fix it as soon as possible. Sorry for any inconvenience caused.. </p>.</div>.</bo
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (16909)
                    Category:downloaded
                    Size (bytes):16910
                    Entropy (8bit):5.009413474647694
                    Encrypted:false
                    SSDEEP:
                    MD5:8825AEB18539069164C52CEE3933DD44
                    SHA1:48FE08317F897472C13F18037C64081EC3C24609
                    SHA-256:4DC8CCA1CD2C99A98ADE8DF4F75D487388599D512BFDC19BE4A8E4AFE6412C99
                    SHA-512:AFFA9CBD5AC1530532900F9B541E108DD9CE8EDFBE8DADAD7564CCE5F9BB33A2090B2B5BD7C0E55826855C6E3E0BEB07309CEA9703C53FA898A6E81E92E54D38
                    Malicious:false
                    Reputation:unknown
                    URL:https://www.choeshop.com/assets/uni.4dc8cca1.css
                    Preview:uni-button{position:relative;display:block;margin-left:auto;margin-right:auto;padding-left:14px;padding-right:14px;box-sizing:border-box;font-size:18px;text-align:center;text-decoration:none;line-height:2.55555556;border-radius:5px;-webkit-tap-highlight-color:transparent;overflow:hidden;color:#000;background-color:#f8f8f8;cursor:pointer}uni-button[hidden]{display:none!important}uni-button:after{content:" ";width:200%;height:200%;position:absolute;top:0;left:0;border:1px solid rgba(0,0,0,.2);transform:scale(.5);transform-origin:0 0;box-sizing:border-box;border-radius:10px}uni-button[native]{padding-left:0;padding-right:0}uni-button[native] .uni-button-cover-view-wrapper{border:inherit;border-color:inherit;border-radius:inherit;background-color:inherit}uni-button[native] .uni-button-cover-view-inner{padding-left:14px;padding-right:14px}uni-button uni-cover-view{line-height:inherit;white-space:inherit}uni-button[type=default]{color:#000;background-color:#f8f8f8}uni-button[type=primary]{co
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:TrueType Font data, 11 tables, 1st "GSUB", 18 names, Macintosh, Created by iconfontuniiconsRegularuniiconsuniiconsVersion 1.0uniiconsGenerated by svg2ttf from F
                    Category:downloaded
                    Size (bytes):35824
                    Entropy (8bit):6.4657721627733595
                    Encrypted:false
                    SSDEEP:
                    MD5:2579C7DA7E5CB4418F36E17C71125128
                    SHA1:DE4AAD75292F9386525B52AE801F9B2252EA07C4
                    SHA-256:32E978A546182BE7BE788EBF4DBCE57B8CC8B6F4D9DA0C9D3A46A5E030BC1EFC
                    SHA-512:690B27E2D6C53EB6BFF5FFBA83B69CD03496C78C546AA79705639EA4526F89F85A1FB4CA0B7352D8C8A9428C07F14D5F61CBDC8C2C45156EE815095FD0504181
                    Malicious:false
                    Reputation:unknown
                    URL:https://www.choeshop.com/assets/uniicons-32e978a5.ttf
                    Preview:...........0GSUB .%z...8...TOS/2<<I........`cmap..o....h....glyf.......4..q.head&3|........6hhea... .......$hmtx|..........|loca...........@maxp........... name7.E........gpost...y...<.............\...................................z.._.<...........N......N...........................................................0.>..DFLT..latn............................liga.........................................................2..............................PfEd...'..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:PNG image data, 28 x 28, 8-bit/color RGBA, non-interlaced
                    Category:dropped
                    Size (bytes):646
                    Entropy (8bit):7.447418451376055
                    Encrypted:false
                    SSDEEP:
                    MD5:056F8397B7D53136082695254702B291
                    SHA1:8274E1AC492FF611F5EA7A0B2BCF3E9A481CF809
                    SHA-256:BD6AF231FA7E7CC133785159FCE9247A9AB8DDAA0DA698EAEFFB3294B2DA6BDE
                    SHA-512:D9DE1873D384691D94270F23A176403471C508833DB8BE8771E88665056E17C85E065ADC4847F8AAD806693C1B22D2078E6811FB490AC7351F3A6A3784D0B37B
                    Malicious:false
                    Reputation:unknown
                    Preview:.PNG........IHDR.............r......pHYs.................sRGB.........gAMA......a.....IDATx...N.A..g........B...J;,L.F-L..'P...D..k.R..O .&R..%V..[..;.c.n=..O67.........K....:...rJ.......v....r..a.'..P.....q.W..ww....X(.e..[%.)..$}..........tj..7A.....>8J.@..tLX...K..h.X<..D.T..J...+m.&,^.~h...Sj.&....,....!oj......zv\Q....$...nq.!..}...meru.J....}q.....&...o.R.r.B...@..*.>.;+D......./.I..+..Q..s..67..........E^..V5.m.....y..>;;....+v3....3A...fQ..p....(.(......}...>b...5.F.h...4g4q........ir.X\.C.........S....Z.4....&..C3..3..j........ET.....[........%j....K./......{x...vM.].=l{M.~...>..r.......IEND.B`.
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, progressive, precision 8, 650x360, components 3
                    Category:dropped
                    Size (bytes):33093
                    Entropy (8bit):7.982246480404509
                    Encrypted:false
                    SSDEEP:
                    MD5:32B6D3A9BAF885CAB5F7F673BFC7BCE6
                    SHA1:65F8A5513BCA636AA67142EFD3E8EF1A4E0C194B
                    SHA-256:1E30E09CEA0643440CF93C5A38525F8A9E146C801F3B1AB7DB9D627F61821851
                    SHA-512:9DF0FC03F41BBA4F3A94C3727335453F9F347D23FC49AA4470BA009F524E4BAC3EE8DE43E0C916DEE5B1AF2ED015560A54AF30CFE9AFFD4165E2BF5A97E296C4
                    Malicious:false
                    Reputation:unknown
                    Preview:......JFIF.....`.`.....C....................................................................C.......................................................................h....".................................................................................+.{...r.$]...J.....q..#v..YJ.V.........eQ.......h...Rs-..[J..iQ..H...JH....U..>.s.^]1..'0........."d9.C..="s1.R...V..5.(.T...Zw.l.+.......E.....0.!.. D.d.OBZ..ZH.h (.....4sG.L.V..M.3..r..]..eX...2.aB..h#^.j=.....@Bm..3;k....I...K.j.[Af......Iil.cct...f."6..X.Z........og.Z.....p.. q.AF..^...g?L.2.b....R......h.5..a....Y.vJ...,..P.B..3Zj......(..[..J;ePV..7~z[+=..dX_J..iCE..5..\..?M..~Y...k.F.+.l#".g/.b.zY.j........U.'F..#..1wcF5.V~......'Uj...u.f[=c.B0$!s$#(...'!Q.F."D.A..*K..f\..T....H.]....Z.s...l....k(S.x.5.<4,..5>....SG.R..,k^n~.O`p.W.k....F\.g=..;gS....2*.....L.c.T.hc..C.m.....Z.h..7qR.Z..vV.v..d..;.\..Ddo..+....p,..,.(Vp..5.S,H.?..y.I,X.$NKD.n...Y.^.o+ny.c...Z.=.c.%.v......h...q.....ckp.G=...U.\...f.`
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:Unicode text, UTF-8 text, with very long lines (22286)
                    Category:dropped
                    Size (bytes):22414
                    Entropy (8bit):5.5904522338241
                    Encrypted:false
                    SSDEEP:
                    MD5:E6982ED38EFB5736CC8792A53A3ABA57
                    SHA1:6FE853E30B3880E63B2EA71674DFB6BF9DE6301B
                    SHA-256:3776C5AC677E0997211B16A52772F4BFD03CC117A129CD5E3904B857BE014B9C
                    SHA-512:09DEED71C833159F611002646FCB9B4F59B0B73A6792BDEBA64596AE7C0F71C4DB89C9C830596663E6C9449DFC3FB1CA0481E5D183D19E47A069F1D93E1F5F13
                    Malicious:false
                    Reputation:unknown
                    Preview:import{t as e,i as r,b as n,e as t}from"./index-6a6b001f.js";import{_ as i}from"./uni-nav-bar.bba0a6fe.js";import{b as s,c as o,o as l,k as u,l as a,f as c,aX as f,aY as h,F as p,a6 as g,a$ as d,b0 as m,am as v,a_ as w}from"./vue.2c3f9308.js";import{o as b,r as N}from"./uni-app.es.34d80716.js";import{_ as y}from"./uni-easyinput.c540b38d.js";import{t as O}from"./useI18n.db639818.js";import{_}from"./_plugin-vue_export-helper.1b428a4d.js";import"./uni-icons.bf90b853.js";var E=/^-?(?:\d+(?:\.\d*)?|\.\d+)(?:e[+-]?\d+)?$/i,A=Math.ceil,S=Math.floor,x="[BigNumber Error] ",P=x+"Number primitive has more than 15 significant digits: ",R=1e14,T=14,B=9007199254740991,D=[1,10,100,1e3,1e4,1e5,1e6,1e7,1e8,1e9,1e10,1e11,1e12,1e13],L=1e7,C=1e9;function I(e){var r=0|e;return e>0||e===r?r:r-1}function U(e){for(var r,n,t=1,i=e.length,s=e[0]+"";t<i;){for(r=e[t++]+"",n=T-r.length;n--;r="0"+r);s+=r}for(i=s.length;48===s.charCodeAt(--i););return s.slice(0,i+1||1)}function k(e,r){var n,t,i=e.c,s=r.c,o=e.s,l=r.s
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:Unicode text, UTF-8 text, with very long lines (11886)
                    Category:dropped
                    Size (bytes):11893
                    Entropy (8bit):5.377460322315222
                    Encrypted:false
                    SSDEEP:
                    MD5:8B6F44B8F48DCC5026782045B6B1D2B8
                    SHA1:878FBA4CAE9A5498A15B43055285F87994902623
                    SHA-256:6039A4EBE8918ED78C80EF5DB074BB74A6B43F36AB1A5447E8F900C9D0925853
                    SHA-512:A70ABE079347D8408C2640186E7A01B9E11AE7AF54F6EFDE69DC17BD67052812848F9BEDE5DF04B1F8364D2485779C8A8F022C3D8495DF5251567C4CBE731DFD
                    Malicious:false
                    Reputation:unknown
                    Preview:import{i as e,a as t,c as o,t as s,g as l,l as i,n as a,b as n,S as r,m as c,d}from"./index-6a6b001f.js";import{_ as u}from"./uni-nav-bar.bba0a6fe.js";import{o as h,k as m,l as p,j as g,aW as f,aX as _,F as b,aY as y,aZ as k,a_ as w,f as x,a6 as C,a$ as v,am as S,w as B,b0 as I,b as z,c as $}from"./vue.2c3f9308.js";import{r as j,o as A,a as M}from"./uni-app.es.34d80716.js";import{_ as D}from"./_plugin-vue_export-helper.1b428a4d.js";import{_ as G}from"./uni-icons.bf90b853.js";import{_ as F}from"./nav-logo.12c53558.js";import{_ as T}from"./lang-up.f21353af.js";const W=D({name:"UniSwiperDot",emits:["clickItem"],props:{info:{type:Array,default:()=>[]},current:{type:Number,default:0},dotsStyles:{type:Object,default:()=>({})},mode:{type:String,default:"default"},field:{type:String,default:""}},data:()=>({dots:{width:6,height:6,bottom:10,color:"#fff",backgroundColor:"rgba(0, 0, 0, .3)",border:"1px rgba(0, 0, 0, .3) solid",selectedBackgroundColor:"#333",selectedBorder:"1px rgba(0, 0, 0, .9) so
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:RIFF (little-endian) data, Web/P image, VP8 encoding, 750x500, Suserng: [none]x[none], YUV color, decoders should clamp
                    Category:dropped
                    Size (bytes):7894
                    Entropy (8bit):7.950286426280436
                    Encrypted:false
                    SSDEEP:
                    MD5:53706BD2EC1267D667ECCBB9DDD64EFE
                    SHA1:D7856BB1DF386C8459AB7E2F70C2198F198EA2D5
                    SHA-256:5626B7DA54D8DA74801B7135E058F4FB94698267D0128A22774ED7DA73C6CEE7
                    SHA-512:C9B92FFE8DFF382DAA316940B13F1F7E1EDFAA2A199A313E76439CD6020F5509007D0EB5F466722169B037CC34A374DAB2FDABE93DD6733882B99780DBAE870C
                    Malicious:false
                    Reputation:unknown
                    Preview:RIFF....WEBPVP8 ....P....*....>.Z.O.%$"!......en.v..CO.y...^.....?.:....l~f...)._.....?..............}..._.......>.......?..........e........~.?..k...{f...~.w.>.~Gj...3..........O|_.B..?...I%M..6...SjmM..6...SjmM..6...SjmM..6...SjmM..6...SjmM..6...SjmM..6...SjmM..6...SjmM..6...SjmM..6...SjmM..6...SjmM..6...SjmM..6...SjmM..6.....p...Q.j8MG...5.&...p...Q.j8MG...5.&...p...Q.j8MG...5.'?.".#.~Z.IM.......Sr2,.9w.....0.\t..rnG...q.%....\K.q.%....%.C...V.mW.7_....S.bLI.1&$...bLI..L.h\.O..f(.yG.....!....&....I...u!...A..O.,U.1.0....c.a.1.0...(8..[.a....P^..e..L...;5.T..V.CT.w....?.G...x...\K.q.%....=.1.F.(..p.Op"./..O\+P...Lkn....<.e..\%,v. ...2.]A...\K.q.%.......=B.J..p..k..y1..-...A.{.z.U{Q..m..s.o.f.j......cw......\K.q.%.......G...".....~...gDf...;..;Z.W...<gM.2;..5...2.\K.q.%....Z.c..=..aF..l..S.R.MvU..R^.K5t<5..S..zMoB~n'B........A..U._..a....o7....bLI.1&$...!..c...............p.`..2U...........!.\5AYa.."...SoY=...5Go9&...u...B.7&...rnM.
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (1538)
                    Category:downloaded
                    Size (bytes):1539
                    Entropy (8bit):5.127983953007245
                    Encrypted:false
                    SSDEEP:
                    MD5:97EDAAFD505E9F217963F9B08FF148AF
                    SHA1:C2026888433388467E2AD1E02BFB444F0E5B34CD
                    SHA-256:E8C7C07111A9F12521304F514250583FADE0EF788C8ADCCD4274A3E78F5D8A11
                    SHA-512:D2270948DA99A4005677876CDFB4E13B781684236C1481E2DD9AC224273F38ED58CADF32E21709275543E67B6A558B71EFECDF7F1AB47A356B2C31169CEC7662
                    Malicious:false
                    Reputation:unknown
                    URL:https://www.choeshop.com/assets/index-e8c7c071.css
                    Preview:.content[data-v-7ba1c349]{background-image:url(/assets/loginbg-2f2bd17f.webp);background-size:100% 100%;background-repeat:no-repeat;width:23.4375rem;height:100vh}.content[data-v-7ba1c349] .uni-easyinput__content-input{height:3.125rem!important}.content[data-v-7ba1c349] .uni-easyinput__placeholder-class,.content[data-v-7ba1c349] .uni-input-input{font-weight:bolder}.content .lang-warp-class[data-v-7ba1c349]{display:flex;justify-content:space-between;padding-left:.625rem;padding-top:.625rem;padding-right:.625rem}.content .lang-warp-class .lang-class[data-v-7ba1c349]{width:1.5625rem;height:1.5625rem;background:#fff;display:flex;justify-content:center;align-items:center;border-radius:100%;padding:.3125rem;z-index:9999}.content .logo-warp-class[data-v-7ba1c349]{display:flex;justify-content:center;align-items:center;padding-top:2.5rem;padding-bottom:2.5rem}.content .logo-warp-class .logo-class[data-v-7ba1c349]{width:13.75rem;height:3.75rem}.content .title-class[data-v-7ba1c349]{font-size:1.25
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (1757)
                    Category:downloaded
                    Size (bytes):1758
                    Entropy (8bit):5.001656650555467
                    Encrypted:false
                    SSDEEP:
                    MD5:E3F2C627FC069EEBE7AFA66672030EE0
                    SHA1:39AB34237E9A4D496DA62192B54C7FAFE43DFC1C
                    SHA-256:FF2F20D36F3C5B5FA592E032D494F61D8751C25775148B5797661A3286BF332B
                    SHA-512:6F1BF04755A97B4FD68A70636314F99A871B29823D45834EEB850E7FDD588F2F701F584B873E7CCC92EA2D5675ACF9B3B7F4C8401AAEDE1C5B8CCEA59CA215CA
                    Malicious:false
                    Reputation:unknown
                    URL:https://www.choeshop.com/assets/uni-forms-ff2f20d3.css
                    Preview:.uni-forms-item[data-v-8d93742d]{position:relative;display:flex;margin-bottom:22px;flex-direction:row}.uni-forms-item__label[data-v-8d93742d]{display:flex;flex-direction:row;align-items:center;text-align:left;font-size:14px;color:#606266;height:36px;padding:0 12px 0 0;vertical-align:middle;flex-shrink:0;box-sizing:border-box}.uni-forms-item__label.no-label[data-v-8d93742d]{padding:0}.uni-forms-item__content[data-v-8d93742d]{position:relative;font-size:14px;flex:1;box-sizing:border-box;flex-direction:row}.uni-forms-item .uni-forms-item__nuve-content[data-v-8d93742d]{display:flex;flex-direction:column;flex:1}.uni-forms-item__error[data-v-8d93742d]{color:#f56c6c;font-size:12px;line-height:1;padding-top:4px;position:absolute;top:100%;left:0;transition:transform .3s;transform:translateY(-100%);opacity:0}.uni-forms-item__error .error-text[data-v-8d93742d]{color:#f56c6c;font-size:12px}.uni-forms-item__error.msg--active[data-v-8d93742d]{opacity:1;transform:translateY(0)}.uni-forms-item.is-dire
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:Java source, Unicode text, UTF-8 text, with very long lines (2378)
                    Category:dropped
                    Size (bytes):2441
                    Entropy (8bit):5.505635214477187
                    Encrypted:false
                    SSDEEP:
                    MD5:7CF682AD8296AEC8DDE4EA26B64186F0
                    SHA1:06EA7BEABFAD0FC8FB226A337930CBF9A7248EE4
                    SHA-256:BDB55572131DD69748FD058227B3A15AFD97CA6EDCB734FAF1E9A378B0B56CF6
                    SHA-512:F81AED2656DE7BBE2A1D229EE08A3855C23708F8F64A838BCF9D2250CD78E937E5223E26ECCAC77B04CC05344D2C814DB613B2810D12CEF7A7EE170D7874D5F2
                    Malicious:false
                    Reputation:unknown
                    Preview:import{i as a,t as l,s,n as e,b as t,e as o}from"./index-6a6b001f.js";import{_ as u,a as r}from"./uni-forms.f34535eb.js";import{b as n,o as i,k as p,l as c,f as d,a6 as m,a$ as f,b0 as _,am as g}from"./vue.2c3f9308.js";import{o as v,r as j}from"./uni-app.es.34d80716.js";import{_ as x}from"./uni-easyinput.c540b38d.js";import{_ as k}from"./mycenter-pop-language.f2e3bebb.js";import{_ as $}from"./nav-logo.12c53558.js";import{t as h}from"./useI18n.db639818.js";import{_ as y}from"./_plugin-vue_export-helper.1b428a4d.js";import"./uni-icons.bf90b853.js";const V=y({__name:"index",setup(y){const V=n(""),b=n(""),w=()=>{if(!V.value)return void l.toast(h("....."));if(!b.value)return void l.toast(h("....."));const a={email:V.value,password:b.value};l.request("/api/login","POST",a).then((a=>{l.setToken(a.data.token),s({url:"/pages/tabBar/main"})}))},I=()=>{e({url:"/pages/reg/index"})},B=()=>{e({url:"/pages/languageset/index"})};return n(""),v((()=>{})),(l,s)=>{const e=t,n=a,v=j(g(
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:Java source, ASCII text, with very long lines (7487)
                    Category:dropped
                    Size (bytes):7488
                    Entropy (8bit):5.265586966261359
                    Encrypted:false
                    SSDEEP:
                    MD5:C1EFA059D498E1064CF68D235FCE12CB
                    SHA1:52D0E7F4FA0779B4B745B0B4D73A123AC2849254
                    SHA-256:CAE0F65C2FA99E41B69AEAE5F9B4259A252BD18735AA243415A79A03CF8D84AA
                    SHA-512:2C29ECB1A7E31518A746C6B63C77846F281D464BD014740FE65211493D4E3AF7B40AF008A6C3D12F2F54AF4317D5B79AA147D914BA937D373E4B7808B000C26E
                    Malicious:false
                    Reputation:unknown
                    Preview:import{_ as e}from"./uni-icons.bf90b853.js";import{am as t,o,k as s,l as i,f as l,a_ as a,aW as r,aZ as n,j as c,aX as u,F as h}from"./vue.2c3f9308.js";import{r as d}from"./uni-app.es.34d80716.js";import{a3 as p,I as m,i as f}from"./index-6a6b001f.js";import{_ as y}from"./_plugin-vue_export-helper.1b428a4d.js";function g(e){let t="";for(let o in e){t+=`${o}:${e[o]};`}return t}const b=y({name:"uni-easyinput",emits:["click","iconClick","update:modelValue","input","focus","blur","confirm","clear","eyes","change","keyboardheightchange"],model:{prop:"modelValue",event:"update:modelValue"},options:{virtualHost:!0},inject:{form:{from:"uniForm",default:null},formItem:{from:"uniFormItem",default:null}},props:{name:String,value:[Number,String],modelValue:[Number,String],type:{type:String,default:"text"},clearable:{type:Boolean,default:!1},autoHeight:{type:Boolean,default:!1},placeholder:{type:String,default:" "},placeholderStyle:String,focus:{type:Boolean,default:!1},disabled:{type:Boolean,defau
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:Java source, Unicode text, UTF-8 text, with very long lines (3375)
                    Category:dropped
                    Size (bytes):3528
                    Entropy (8bit):5.637330906244018
                    Encrypted:false
                    SSDEEP:
                    MD5:77BBE51FD5FABF68B56F4134B85E0AB8
                    SHA1:C8A1C436C40FC2D565F5A63C4ACCAE3B968D7113
                    SHA-256:0DEDDFED4F7E2CFECD04B32399E92C3700B36160EE197A37ACA3BA04C4D303FA
                    SHA-512:9001E58D08F57299214BF8C9BDEC3AAE727706BB7F00DA02EC52368A54F6AB05534B2F1AD2E096D51ECAF5120A47C261A9090942BF083B79CF8CBE16AD7E838F
                    Malicious:false
                    Reputation:unknown
                    Preview:import{i as l,t as a,s as e,r as s,n as t,b as o,e as u}from"./index-6a6b001f.js";import{_ as r,a as n}from"./uni-forms.f34535eb.js";import{b as i,o as d,k as p,l as c,f as m,b0 as f,a6 as v,a$ as _,am as g}from"./vue.2c3f9308.js";import{o as V,r as x}from"./uni-app.es.34d80716.js";import{_ as $}from"./uni-easyinput.c540b38d.js";import{_ as h}from"./mycenter-pop-language.f2e3bebb.js";import{_ as j}from"./nav-logo.12c53558.js";import{t as k}from"./useI18n.db639818.js";import{_ as w}from"./_plugin-vue_export-helper.1b428a4d.js";import"./uni-icons.bf90b853.js";const y=w({__name:"index",setup(w){i("");const y=i(""),I=i("");i(""),i("");const B=i(""),b=i("");b.value="";const z=()=>{if(!B.value)return void a.toast(k("....."));if(l=B.value,!/^[a-zA-Z0-9._%+-]+@[a-zA-Z0-9.-]+\.[a-zA-Z]{2,}$/.test(l))return void a.toast(k("........"));var l,s;if(!y.value)return void a.toast(k("....."));if(s=y.value,!/^[A-Za-z0-9]{6,20}$/.test(s))return void a.toast(k("...
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:Java source, ASCII text, with very long lines (4540)
                    Category:downloaded
                    Size (bytes):4541
                    Entropy (8bit):5.323043061883623
                    Encrypted:false
                    SSDEEP:
                    MD5:980446CEA243C8CF11AD8454D471C866
                    SHA1:ABB287D268C4BD7FAEE1E3D36D4342E2E11C2944
                    SHA-256:9F11649DE82B3972CB9BCCF354F29B503402F03E68BE95F1C3E36C3FE0A1085F
                    SHA-512:407104B0305CC24F05ACB915C4F04030EFF5C47FAC61E23034D312B8C4EEF9046A41502DC9C061111C33EA6FAB512D158F55424CA5A625A7077BD8106846B40C
                    Malicious:false
                    Reputation:unknown
                    URL:https://www.choeshop.com/assets/uni-nav-bar.bba0a6fe.js
                    Preview:import{_ as t}from"./uni-icons.bf90b853.js";import{o as e,k as a,l,j as i,aW as r,aT as n,am as s,f as o,a_ as u,aZ as h,a6 as c,a$ as d}from"./vue.2c3f9308.js";import{r as f}from"./uni-app.es.34d80716.js";import{E as g,i as _,a as y}from"./index-6a6b001f.js";import{_ as p}from"./_plugin-vue_export-helper.1b428a4d.js";const b=t=>"number"==typeof t?t+"px":t;const k=p({name:"UniNavBar",components:{statusBar:p({name:"UniStatusBar",data:()=>({statusBarHeight:20}),mounted(){this.statusBarHeight=g().statusBarHeight+"px"}},[["render",function(t,n,s,o,u,h){const c=_;return e(),a(c,{style:r({height:u.statusBarHeight}),class:"uni-status-bar"},{default:l((()=>[i(t.$slots,"default",{},void 0,!0)])),_:3},8,["style"])}],["__scopeId","data-v-3c0630f1"]])},emits:["clickLeft","clickRight","clickTitle"],props:{dark:{type:Boolean,default:!1},title:{type:String,default:""},leftText:{type:String,default:""},rightText:{type:String,default:""},leftIcon:{type:String,default:""},rightIcon:{type:String,default:
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:JSON data
                    Category:dropped
                    Size (bytes):1084
                    Entropy (8bit):5.129628452240206
                    Encrypted:false
                    SSDEEP:
                    MD5:76EC18A78789C0C919E3DAC076FFB809
                    SHA1:84C0075C3B9636B7BC4278D7F4D52B1BEDEE4B81
                    SHA-256:3589061303A9520285C7184D8A9C793BD35B2F04F3BAFE0709D6E28934409ED9
                    SHA-512:89CC1DBF52116E906D9545E963D39F12A72F1F5FA5A0AA1894657CB6AC42AEE206DCF8A29C589E83C1AE9A474A27A17C3FE475D5296ED03D097B0640796E2860
                    Malicious:false
                    Reputation:unknown
                    Preview:{"code":1,"msg":"\u00e9xito","data":[{"id":4,"name":"Walmart","cover_img":"https:\/\/shuadan-img-bak.s3.ap-southeast-1.amazonaws.com\/images\/a15e27ffe421fa2a0169098da4457279.png","logo_img":"https:\/\/shuadan-img-bak.s3.ap-southeast-1.amazonaws.com\/images\/5511375c49cdfe1125c245a71611376d.png"},{"id":3,"name":"AliExpress","cover_img":"https:\/\/shuadan-img-bak.s3.ap-southeast-1.amazonaws.com\/images\/44b706c8d852c2d8af3fd342cbc1a652.png","logo_img":"https:\/\/shuadan-img-bak.s3.ap-southeast-1.amazonaws.com\/images\/14061481bca94624a3eae5eb289f5b6e.png"},{"id":2,"name":"Tik Tok","cover_img":"https:\/\/shuadan-img-bak.s3.ap-southeast-1.amazonaws.com\/images\/69ef5a8e0a9333c3e1a9f32bd4716fb3.png","logo_img":"https:\/\/shuadan-img-bak.s3.ap-southeast-1.amazonaws.com\/images\/e1a954365e90e9d69e7682533bd34710.png"},{"id":1,"name":"Amazon","cover_img":"https:\/\/shuadan-img-bak.s3.ap-southeast-1.amazonaws.com\/images\/5d23fbd82cd55f430f41dc6915afdf99.png","logo_img":"https:\/\/shuadan-img-b
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (4255)
                    Category:downloaded
                    Size (bytes):4256
                    Entropy (8bit):5.066881815666626
                    Encrypted:false
                    SSDEEP:
                    MD5:C0D8D0539ABAFF92599EC9915764C8C9
                    SHA1:68E2994705188CC1FAC60EDEA3C0F3DDB7D8E63F
                    SHA-256:6637D1073A86F863A40C0F284B18AF1E9A84AF953FC1561B2F3B9DAFD1475570
                    SHA-512:7B57C949C67363B8BBA2CE8B88A90F20F65DAD1AA51EC9AE20D825EF4448A2F8F993AC4BBD2FCC34BD1F58824D19DCDB69BDDAC3EA2C624F0977C9A15F5F0EAD
                    Malicious:false
                    Reputation:unknown
                    URL:https://www.choeshop.com/assets/main-6637d107.css
                    Preview:.uni-swiper__warp[data-v-8c2d195d]{display:flex;flex:1;flex-direction:column;position:relative;overflow:hidden}.uni-swiper__dots-box[data-v-8c2d195d]{position:absolute;bottom:10px;left:0;right:0;display:flex;flex:1;flex-direction:row;justify-content:center;align-items:center}.uni-swiper__dots-item[data-v-8c2d195d]{width:8px;border-radius:100px;margin-left:6px;background-color:rgba(0,0,0,.4);cursor:pointer}.uni-swiper__dots-item[data-v-8c2d195d]:first-child{margin:0}.uni-swiper__dots-default[data-v-8c2d195d]{border-radius:100px}.uni-swiper__dots-long[data-v-8c2d195d],.uni-swiper__dots-bar[data-v-8c2d195d]{border-radius:50px}.uni-swiper__dots-nav[data-v-8c2d195d]{bottom:0px;padding:8px 0;display:flex;flex:1;flex-direction:row;justify-content:flex-start;align-items:center;background-color:rgba(0,0,0,.2)}.uni-swiper__dots-nav-item[data-v-8c2d195d]{font-size:14px;color:#fff;margin:0 15px}.uni-swiper__dots-indexes[data-v-8c2d195d]{display:flex;justify-content:center;align-items:center}.uni-s
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (1997)
                    Category:downloaded
                    Size (bytes):1998
                    Entropy (8bit):5.173400178172375
                    Encrypted:false
                    SSDEEP:
                    MD5:0E123EE872B39A77F4A6EA12A250F11E
                    SHA1:DBB221BD657AC27B61C5001B04F318477168D6F1
                    SHA-256:42EEE67E430FE0246F7355D6EA0ADDE56B5D458C73FF1DBE315830424088313A
                    SHA-512:D7A1B4EDE8A251BF4B0B2CA91E4DE3CBB00343CC83C61B4346A33E9A645A55D78915FA09A3ADD107ECAD3FF511C06A0920496EE437173ABE42817A293F80BBDE
                    Malicious:false
                    Reputation:unknown
                    URL:https://www.choeshop.com/assets/index-42eee67e.css
                    Preview:.content[data-v-f185490b]{background-image:url(/assets/loginbg-2f2bd17f.webp);background-size:100% 100%;background-repeat:no-repeat;width:23.4375rem;height:100vh}.content[data-v-f185490b] .uni-easyinput__content-input{height:3.125rem!important}.content[data-v-f185490b] .uni-easyinput__placeholder-class,.content[data-v-f185490b] .uni-input-input{font-weight:bolder}.content .lang-warp-class[data-v-f185490b]{display:flex;justify-content:flex-end;padding-top:.625rem;padding-right:.625rem}.content .lang-warp-class .lang-class[data-v-f185490b]{width:1.5625rem;height:1.5625rem;background:#fff;display:flex;justify-content:center;align-items:center;border-radius:100%;padding:.3125rem;z-index:9999}.content .logo-warp-class[data-v-f185490b]{display:flex;justify-content:center;align-items:center;padding-top:2.5rem;padding-bottom:2.5rem}.content .logo-warp-class .logo-class[data-v-f185490b]{width:13.75rem;height:3.75rem}.content .title-class[data-v-f185490b]{font-size:1.25rem;font-weight:500;color:
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:PNG image data, 246 x 87, 8-bit/color RGBA, non-interlaced
                    Category:dropped
                    Size (bytes):7015
                    Entropy (8bit):7.95669668841205
                    Encrypted:false
                    SSDEEP:
                    MD5:F58E26B7E0A9235D4A2DE760C10D41E3
                    SHA1:D56037485B2906E69E981A4D2B7EEEDB68A5EA26
                    SHA-256:3CC0ED3E90B05161A34699D3BD522458DB81786B6E36359A99FF6CA010A9D44D
                    SHA-512:E5565086C00D9419752E5940402070D2B65ED6A5C9B8C25A8BBB11CCD444C3FDDCE857FD83737A1F7C95952C8589E86ED0F541D96FF426A0529634F0CAD7761D
                    Malicious:false
                    Reputation:unknown
                    Preview:.PNG........IHDR.......W.....7R......pHYs..!8..!8.E.1`....sRGB.........gAMA......a.....IDATx....M....5.L...D.[.T\%..!.+C/z.F!.o.h..\....V..e..&.."..2f.....[...=w...9g.s.{.....={.....Y..-J...e..J...>....d0$.>......|fX......r.. ....d..7..lSx[.[..W....G..l0.e&cc....H\.; ....d..?....Y.}...`.@'.G.o].`0..I9,.9".............C..`.PC.N#.r..n..6..;.<.3....#...3.....W.w...,...P.....2.%O..gl..Adli..K.y..C1..`..d..Lv..`..$...V5.J...4.:...CN.(........W|..pG$.F...\.G...k.6Bm0.*>.R..*.D...2.2.!.....7;..c.BZF......,:.(.....6....n.X..x....n.....vv...4c.Yf..`H, .#t;(.;..'..`HDRu*..*nB[..Y.T..v!0..FF...D'X.$..f..l......B.pGZ..Ni.`.=z.6o.L+V..u....;i.]t...*Y.$U.P....b..+.K....G...N...'Of.{....@..JMff&...v.Zy..b.t..S.j.....6l...c......k.EU.V...$.......Mk.....]..={..#T.hQ:..s.z...|..e..w...q..Ay.^P.pa*R.HD..8p.6n.H......O...%JP.....J.*E|O......*..o...k..C^.C.d........\..v..?di.D....L.B#F..E..I.......;..~.J.*.t..@...K?....?:E...!..2..........w...4o.|:
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:JSON data
                    Category:downloaded
                    Size (bytes):2358
                    Entropy (8bit):5.0968217517547085
                    Encrypted:false
                    SSDEEP:
                    MD5:94966F032E4AD1151A3D31780B1E6120
                    SHA1:6BBAD0E5D47009BD211618A1ECD9C855B872B92D
                    SHA-256:A8E271D3E4B63F1542AF54FE0B83378CFC3B94DAF0191270414D260B840E8324
                    SHA-512:F2CB1E3EAE321731936C22A9D2ABD2770E877BF5C45F176C6BD6DA0C716FD5D73426D5A3B04DD698D4745FD5D073F6D4AF476DECBDB7AFE94B59346DBBE7EC70
                    Malicious:false
                    Reputation:unknown
                    URL:https://www.choeshop.com/api/get-goods-list?cate_ids=
                    Preview:{"code":1,"msg":"Success","data":[{"id":36,"cover_img":"https:\/\/shuadan-img-bak.s3.ap-southeast-1.amazonaws.com\/images\/46a5a7ccbd59487eb39839d30c8aa084.webp","name":"unknow"},{"id":13,"cover_img":"https:\/\/shuadan-img-bak.s3.ap-southeast-1.amazonaws.com\/images\/a3dd7737bb5ce1c19b81a74de0d565ee.webp","name":"unknow"},{"id":193,"cover_img":"https:\/\/shuadan-img-bak.s3.ap-southeast-1.amazonaws.com\/images\/10f87bfd9d3b2d9655cee94de1aa2b2a.webp","name":"unknow"},{"id":136,"cover_img":"https:\/\/shuadan-img-bak.s3.ap-southeast-1.amazonaws.com\/images\/7db76a8d6feeaf8fb3a2182469295784.webp","name":"unknow"},{"id":159,"cover_img":"https:\/\/shuadan-img-bak.s3.ap-southeast-1.amazonaws.com\/images\/c74028ea73d3d1c6d4596884a26e2531.webp","name":"unknow"},{"id":35,"cover_img":"https:\/\/shuadan-img-bak.s3.ap-southeast-1.amazonaws.com\/images\/97e1529a3cdd49f5c01f92625f9a2b92.webp","name":"unknow"},{"id":85,"cover_img":"https:\/\/shuadan-img-bak.s3.ap-southeast-1.amazonaws.com\/images\/8dee
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:JSON data
                    Category:dropped
                    Size (bytes):822
                    Entropy (8bit):4.522857302286948
                    Encrypted:false
                    SSDEEP:
                    MD5:9B9721317757D8CDD4A2B2AF7C1BE9D1
                    SHA1:3928AA94146FF586FF8AD1E56523A3270DC71B7E
                    SHA-256:E1B5BA0A3E5DCAAA7564D73A19BD7B601AE6FC036AA04F4162E6AFB51DC6251F
                    SHA-512:F56990791D5DBD16F08783BCCA4FFA720D5C1A94C699BC2F1F329D7A5C1678E39BEC0617A545FC040DE99E86EEDBD9FDF4FAEED145E3C302EF858D1A682FBB51
                    Malicious:false
                    Reputation:unknown
                    Preview:{"code":1,"msg":"\u00e9xito","data":["Felicitaciones:xw***po@aol.com ha completado el pedido del Walmart mercado","Felicitaciones:sn***dm@mail.ru ha completado el pedido del Tik Tok mercado","Felicitaciones:ld***mi@gmail.com ha completado el pedido del Walmart mercado","Felicitaciones:ke***au@web.de ha completado el pedido del AliExpress mercado","Felicitaciones:pm***dw@gmx.com ha completado el pedido del Tik Tok mercado","Felicitaciones:ly***qi@mail.ru ha completado el pedido del Walmart mercado","Felicitaciones:ek***ms@outlook.com ha completado el pedido del Amazon mercado","Felicitaciones:ti***um@fastmail.com ha completado el pedido del Amazon mercado","Felicitaciones:zu***ts@aol.com ha completado el pedido del AliExpress mercado","Felicitaciones:ok***cv@gmx.com ha completado el pedido del Tik Tok mercado"]}
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:Java source, ASCII text, with very long lines (3376)
                    Category:downloaded
                    Size (bytes):3377
                    Entropy (8bit):6.165979401703253
                    Encrypted:false
                    SSDEEP:
                    MD5:A0FDCE26B16C9A96216D830F870073FF
                    SHA1:E34D8B09FF2D26F8C74406E44534FF5728D668F3
                    SHA-256:24682593943ABD68CC329BB01D4979BC6D0A1FAA35F3BD987FC3314A0C1AB732
                    SHA-512:D554382E24C72BDD46CE7762CD4C12B6DC6AF01A1CE46526EFFBE30937C69F974CBFB54633CAE53579C0C667AA240B452A3402F3F1659635A9B0E7AADC9FF713
                    Malicious:false
                    Reputation:unknown
                    URL:https://www.choeshop.com/assets/pages-languageset-index.49dd6547.js
                    Preview:import{i as a,l as s,g as e,h as l,j as u,k as n,o as A,m as o,b as t,p as c,q as d}from"./index-6a6b001f.js";import{_ as i,a as f}from"./uni-forms.f34535eb.js";import{c as r,o as v,k as p,l as m,f as g,aX as q,aY as I,F as D,am as R,a6 as j,a$ as B}from"./vue.2c3f9308.js";import{r as h}from"./uni-app.es.34d80716.js";import{_ as w}from"./_plugin-vue_export-helper.1b428a4d.js";const G=w({__name:"index",setup(w){new URL("data:image/webp;base64,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
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, progressive, precision 8, 650x360, components 3
                    Category:downloaded
                    Size (bytes):46362
                    Entropy (8bit):7.983288931969534
                    Encrypted:false
                    SSDEEP:
                    MD5:62AF4E5B33D9F7E3883542A2E37F27FF
                    SHA1:C7F9465CBA0AC5194F1DEB940BBCD807AE3171F5
                    SHA-256:3F0314A77D160E545A54C606751FBF1D38D9339FF92D3503B02BFE91F89784B7
                    SHA-512:FB96C1C14F1C6E9581FCF6262682A9422BB3F28C819A70C4233287B132B9CCB09E8C5D9C51ED0715FABF1DE169DEDEF3C4E290E70EE118B2B2D701FF255AA5B6
                    Malicious:false
                    Reputation:unknown
                    URL:https://shuadan-img-bak.s3.ap-southeast-1.amazonaws.com/images/64be5ed7d1fad2f74b727ad5ce2b276b.jpg
                    Preview:......JFIF.....`.`.....C....................................................................C.......................................................................h...."..................................................................................,!..\8.w.*}m.i*.....h.fk..d.7..{RX.T.n..eI....P..W!..u..Rzc"..%S.j.4......$..N....a%a..Y2..lXJ...d..;.C.%........4Zyy.......*.K!$)*......."2.....[vg.f..L...R&...uPsu7...qs..'...b....Qi1cX.n..5+8..N..3.LV.gD8......q...e..).A...i.K..S8!..K.f\t..^i.%..q-.xb.u...u.^.r,.......@...&`@..Ii........U.(.2.PG._....mzf.w..*Pa..O@..-!.7..E"fJZ.9....Kp...[H.rn.H."....\c..^D.W..}...v0G8.Qq...sB^...lPd...mZ$.7..*g|....r..+.....~WY...@.....0.....D...."6q$..w..*,`..b..T.:PQg.Q.p.n......^...5.%.N........2.E..T.%M)........}..d...g.........,*lGf.|...7...........%E.L.h..mC..K............`.@..P.B.........90.P.....'.....1.A .($.....Ns....J...#...lnrV\.7dE:..0Z.p..)..*i@....q{.6H...*..s`..9.Y.......Sq...@'.
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:JSON data
                    Category:downloaded
                    Size (bytes):1571
                    Entropy (8bit):5.000384814168815
                    Encrypted:false
                    SSDEEP:
                    MD5:6031C515942D70C70AA6B0911D5BA7AB
                    SHA1:9DC4090D8E134BFC2717293112499B564FF853E6
                    SHA-256:74C1CD9F678FC94AA03E6E1BD3857487BEE6F79A117D2FFF44A6C3A7F04D924D
                    SHA-512:9ADEF7FB1E61FA534F68A90E2632D68DF8BBB525A3111D0E7E067DE4A4735398AD8333BD030839B425CC294764E5F5BD3DE0AE0C084F714ECD433730EFCC562B
                    Malicious:false
                    Reputation:unknown
                    URL:https://www.choeshop.com/api/banners
                    Preview:{"code":1,"msg":"Success","data":[{"id":2,"title":null,"image":"https:\/\/shuadan-img-bak.s3.ap-southeast-1.amazonaws.com\/images\/0baf85e233a2d566ead9f254d4ffb6e1.jpg","url":null,"sort":0,"lang":"es","status":"active","created_at":"2024-06-04 06:14:58","updated_at":"2024-06-04 06:14:58"},{"id":5,"title":null,"image":"https:\/\/shuadan-img-bak.s3.ap-southeast-1.amazonaws.com\/images\/1df016c3620f9e1845e59fbe4d20a909.jpg","url":null,"sort":0,"lang":"es","status":"active","created_at":"2024-06-05 13:55:15","updated_at":"2024-06-05 13:55:15"},{"id":6,"title":null,"image":"https:\/\/shuadan-img-bak.s3.ap-southeast-1.amazonaws.com\/images\/01c8869509d846f335dfe147d59971b7.jpg","url":null,"sort":0,"lang":"es","status":"active","created_at":"2024-06-05 13:55:26","updated_at":"2024-06-05 13:55:26"},{"id":7,"title":null,"image":"https:\/\/shuadan-img-bak.s3.ap-southeast-1.amazonaws.com\/images\/64be5ed7d1fad2f74b727ad5ce2b276b.jpg","url":null,"sort":0,"lang":"es","status":"active","created_at":
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:Unicode text, UTF-8 text, with very long lines (15958)
                    Category:downloaded
                    Size (bytes):16241
                    Entropy (8bit):5.508427536615876
                    Encrypted:false
                    SSDEEP:
                    MD5:043BF9A6DFFE9EF79A2BD46401C2C6D9
                    SHA1:A22F0F322F975B81F1A476D59B8016C0B72BBE4A
                    SHA-256:B3FBBCFE1320C90AE424F8D8B8E47C6B720D46C13207A1978065818972455C75
                    SHA-512:774249989D92B4898F08F906A676F00D03E3FF0AC82881D5715F39E3D3DA32405958AD61C38EBCA5154F6587C1BBF10968F5E5E6452997DCE32D28FDDBE0EE02
                    Malicious:false
                    Reputation:unknown
                    URL:https://www.choeshop.com/assets/uni-forms.f34535eb.js
                    Preview:import{y as e,R as t,a as r,i as a,a1 as i,a2 as l}from"./index-6a6b001f.js";import{o as s,k as n,l as o,j as u,f as m,a_ as h,aW as d,a6 as f,aZ as c,a$ as g}from"./vue.2c3f9308.js";import{_ as b}from"./_plugin-vue_export-helper.1b428a4d.js";const p=b({name:"uniFormsItem",options:{virtualHost:!0},provide(){return{uniFormItem:this}},inject:{form:{from:"uniForm",default:null}},props:{rules:{type:Array,default:()=>null},name:{type:[String,Array],default:""},required:{type:Boolean,default:!1},label:{type:String,default:""},labelWidth:{type:[String,Number],default:""},labelAlign:{type:String,default:""},errorMessage:{type:[String,Boolean],default:""},leftIcon:String,iconColor:{type:String,default:"#606266"}},data:()=>({errMsg:"",userRules:null,localLabelAlign:"left",localLabelWidth:"70px",localLabelPos:"left",border:!1,isFirstBorder:!1}),computed:{msg(){return this.errorMessage||this.errMsg}},watch:{"form.formRules"(e){this.init()},"form.labelWidth"(e){this.localLabelWidth=this._labelWidth
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:HTML document, ASCII text
                    Category:downloaded
                    Size (bytes):2845
                    Entropy (8bit):4.976764545784006
                    Encrypted:false
                    SSDEEP:
                    MD5:ADBBAADAA465D29B88A5B44A8530C74D
                    SHA1:4F2F01B4064B387FA8D094C2EC82894D549BB098
                    SHA-256:7BEE8B58B52CA4CB9FF6110F2E424AB253366C5FEFEC26FC6BEAC7C03FA4A188
                    SHA-512:1E61FD5806D8E222FE2FE6760839ED0F5E8AA26BC7D849F334C17EF20E6AA89CD66F94FD7ECC3EE9D83D09AA8BBDAA4C323271CCA344796BC21FEFFA9974BB58
                    Malicious:false
                    Reputation:unknown
                    URL:https://www.choeshop.com/
                    Preview:<!DOCTYPE html>.<html lang="en">..<head>. <link rel="stylesheet" href="/assets/uni.4dc8cca1.css">.. <meta charset="UTF-8" />. <link id="linkicon" rel="icon" href="./static/logo.png">. DNS Prefetch -->. <link rel="dns-prefetch" href="//shuadan-img.s3.ap-southeast-1.amazonaws.com">. Preconnect -->. <link rel="preconnect" href="https://shuadan-img.s3.ap-southeast-1.amazonaws.com">. <script>. var coverSupport = 'CSS' in window && typeof CSS.supports === 'function' && (CSS.supports('top: env(a)') ||. CSS.supports('top: constant(a)')). document.write(. '<meta name="viewport" content="width=device-width, user-scalable=no, initial-scale=1.0, maximum-scale=1.0, minimum-scale=1.0' +. (coverSupport ? ', viewport-fit=cover' : '') + '" />'). </script>. <title></title>. preload-links-->. app-context-->. <style>. body::after {. content: none;. }.. #app {. max-width: 23.4375rem;. margin: 0 auto;. }.. .loading {. pos
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (12103)
                    Category:downloaded
                    Size (bytes):12104
                    Entropy (8bit):5.636508535504618
                    Encrypted:false
                    SSDEEP:
                    MD5:2DA1EA029907D86BFF75D709783A5C90
                    SHA1:8A56013D90CE17A76BA25BC30DB643A059A66F2C
                    SHA-256:4CA91A4A214F72675FE8D5A116B5AB21904588D20BC7C70DBE13BB57D010DEE9
                    SHA-512:B6ACE602BAE1CE7EF8C6BC7E7A5A34B38B9FAC2EA8F5C1E9717C3B4C73ADDAD72228FC3087FA2BCF27E159EDB16D1326507BB83903131677316FDD58234D66B6
                    Malicious:false
                    Reputation:unknown
                    URL:https://www.choeshop.com/assets/index-4ca91a4a.css
                    Preview:*{margin:0;-webkit-tap-highlight-color:transparent}html,body{-webkit-user-select:none;-moz-user-select:none;user-select:none;width:100%;height:100%}body{overflow-x:hidden;font-size:16px}uni-app,uni-page,uni-page-wrapper,uni-page-body{display:block;box-sizing:border-box;width:100%}uni-page-wrapper{position:relative}#app,uni-app,uni-page,uni-page-wrapper{height:100%}.uni-mask{position:fixed;z-index:999;top:0;right:0;left:0;bottom:0;background:rgba(0,0,0,.5)}.uni-fade-enter-active,.uni-fade-leave-active{transition-duration:.25s;transition-property:opacity;transition-timing-function:ease}.uni-fade-enter-from,.uni-fade-leave-active{opacity:0}.uni-loading,uni-button[loading]:before{background-color:transparent;background-image:url(data:image/svg+xml;base64,\ PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIHdpZHRoPSIxMjAiIGhlaWdodD0iMTIwIiB2aWV3Qm94PSIwIDAgMTAwIDEwMCI+PHBhdGggZmlsbD0ibm9uZSIgZD0iTTAgMGgxMDB2MTAwSDB6Ii8+PHJlY3Qgd2lkdGg9IjciIGhlaWdodD0iMjAiIHg9IjQ2LjUiIHk9IjQwIiBmaWxsPSIjR
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:JSON data
                    Category:dropped
                    Size (bytes):2363
                    Entropy (8bit):5.106179322001029
                    Encrypted:false
                    SSDEEP:
                    MD5:3E236DBFC8E299050AF97549D49DD3CD
                    SHA1:1899F365318E560674696ECAE0E62310AAFD0DC2
                    SHA-256:9F3B414FF6E7096CA7CAEAB20DADF8C93A21BFFF5F736E141AE8E974CD753912
                    SHA-512:8D49E280E074DF8E4B1DC852B1BE04E4435AAD61D47640E5DE2B2CC88D8FFF0549A3FAB51C32F004E82AB6867E483C2F8DA4181DA963CC3657DCFEEDF690E3C0
                    Malicious:false
                    Reputation:unknown
                    Preview:{"code":1,"msg":"\u00e9xito","data":[{"id":54,"cover_img":"https:\/\/shuadan-img-bak.s3.ap-southeast-1.amazonaws.com\/images\/34c108a86ea4f121cee608f407157b77.webp","name":"unknow"},{"id":79,"cover_img":"https:\/\/shuadan-img-bak.s3.ap-southeast-1.amazonaws.com\/images\/ae094761cd2d6a8536fdd59a805fe9f6.webp","name":"unknow"},{"id":62,"cover_img":"https:\/\/shuadan-img-bak.s3.ap-southeast-1.amazonaws.com\/images\/8ed44491419dcf023b148c9d873cfa3f.webp","name":"unknow"},{"id":51,"cover_img":"https:\/\/shuadan-img-bak.s3.ap-southeast-1.amazonaws.com\/images\/ad91541bc9a514f93b905e9e0af2caaa.webp","name":"unknow"},{"id":81,"cover_img":"https:\/\/shuadan-img-bak.s3.ap-southeast-1.amazonaws.com\/images\/d8e47109a34a2bf7d80a1bfaf5332a77.webp","name":"unknow"},{"id":34,"cover_img":"https:\/\/shuadan-img-bak.s3.ap-southeast-1.amazonaws.com\/images\/c0506537956103094bc54b96caebb336.webp","name":"unknow"},{"id":33,"cover_img":"https:\/\/shuadan-img-bak.s3.ap-southeast-1.amazonaws.com\/images\/b96d
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:JSON data
                    Category:dropped
                    Size (bytes):1574
                    Entropy (8bit):5.001582244894649
                    Encrypted:false
                    SSDEEP:
                    MD5:5C49624F954DF8566C66963D91DFF295
                    SHA1:D1BEBE90D64E8F3F5C4E55F65F74EF5CDE101B49
                    SHA-256:17065E0C925A4B24070861F85E4562359581F2E9CA9A71CDEBB305FE75D4102F
                    SHA-512:AEF55E418E41B0A25B0452C872D3A158E189F3C5CFA19EEE94C0D7A8B36CB5CDCDF3560BAA9804FBCF85976E82E4DC3279096C56AA00DC08EFF3F71C5D174EBB
                    Malicious:false
                    Reputation:unknown
                    Preview:{"code":1,"msg":"\u00e9xito","data":[{"id":2,"title":null,"image":"https:\/\/shuadan-img-bak.s3.ap-southeast-1.amazonaws.com\/images\/0baf85e233a2d566ead9f254d4ffb6e1.jpg","url":null,"sort":0,"lang":"es","status":"active","created_at":"2024-06-04 06:14:58","updated_at":"2024-06-04 06:14:58"},{"id":5,"title":null,"image":"https:\/\/shuadan-img-bak.s3.ap-southeast-1.amazonaws.com\/images\/1df016c3620f9e1845e59fbe4d20a909.jpg","url":null,"sort":0,"lang":"es","status":"active","created_at":"2024-06-05 13:55:15","updated_at":"2024-06-05 13:55:15"},{"id":6,"title":null,"image":"https:\/\/shuadan-img-bak.s3.ap-southeast-1.amazonaws.com\/images\/01c8869509d846f335dfe147d59971b7.jpg","url":null,"sort":0,"lang":"es","status":"active","created_at":"2024-06-05 13:55:26","updated_at":"2024-06-05 13:55:26"},{"id":7,"title":null,"image":"https:\/\/shuadan-img-bak.s3.ap-southeast-1.amazonaws.com\/images\/64be5ed7d1fad2f74b727ad5ce2b276b.jpg","url":null,"sort":0,"lang":"es","status":"active","created_a
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with no line terminators
                    Category:downloaded
                    Size (bytes):52
                    Entropy (8bit):4.262845727714871
                    Encrypted:false
                    SSDEEP:
                    MD5:ABC765C462AE36BBEEC01B52808F1A0E
                    SHA1:D7B40D03320D1014E86410CA807A1CCA0B44EA5C
                    SHA-256:91DF4CD3C4D01E188282E4530B1299537F3A3CC59C1D1090C58DEE81727B4110
                    SHA-512:6A6C191F0A16B0AD5D177758C3BD6999834249DBB60DA452E6FC17CC2D755ED918DD04BE81A63813F38197CB74F2BD1BF42B114FADF2B587196D1C4FEB57EACF
                    Malicious:false
                    Reputation:unknown
                    URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISJQnJ9knZdBb1ixIFDZFhlU4SBQ01hlQcEgUNNYZUHBIFDZFhlU4=?alt=proto
                    Preview:CiQKBw2RYZVOGgAKBw01hlQcGgAKBw01hlQcGgAKBw2RYZVOGgA=
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, progressive, precision 8, 650x360, components 3
                    Category:downloaded
                    Size (bytes):42286
                    Entropy (8bit):7.983974096476048
                    Encrypted:false
                    SSDEEP:
                    MD5:ABE72E77ADEFE39571C1E3AB4164B25F
                    SHA1:863F6DBE427E21FD90C7278BC6D687C1C795296C
                    SHA-256:99CF5F77F4C350BD6F45CCDA14B897E97D890863BCD79308B764C7BA9A585241
                    SHA-512:25B8FE9BAD1856168179A0F5BEAD16A4E9EB31CB81F860E9ABBF045E6C03FA0364AC604838F2EDB06333FF6567442C67DF880503CCC0806E65FD5BC1AAD23EE4
                    Malicious:false
                    Reputation:unknown
                    URL:https://shuadan-img-bak.s3.ap-southeast-1.amazonaws.com/images/1df016c3620f9e1845e59fbe4d20a909.jpg
                    Preview:......JFIF.....`.`.....C....................................................................C.......................................................................h....".................................................................................?........B.u..Q..NnkCYuq..F......!....8."Ow....m..P.f.O...%.T....]m....'...(cK..u..7........}..,.lE.(s\@.^.1..'..6.rB%.......Dr(..:.(t.J..{cA..[&q.<.].;......0..I.Z....iXN.....sM..dT.....d`..ZD..iPX.ETK`...lX.v.~es$.X...8.F7..L...F....2..j.......E%..3....K...G....`x...{..y#.s.&<..p.........:...".tn..u.7I..0d.2.S&..Gxj.i....!......ET..u.aH..PJe9.cK.[."\a.....H0......%.....S...L. L.J:2.....rN.t;M.H.0.B.,........K.T.L..7....O......F#2l.2Wt.F..+.%...L...7...#...J.!..>...,l.....D.s#...#0G.] %>..^..?.....YW..+.d..u.|.8.f...I.S#X......p..)v..e.kcQ.......]C..0#2H..z|......,.....^....+'d..b....#.8.O.Co{c...4...!.`B..nkS}..D..:..46.N..r...iP.b.q.R.....XX...w4.D.....!...)J.s.3@Pm.5..S._.6......<.$s.&]*+
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (407)
                    Category:downloaded
                    Size (bytes):408
                    Entropy (8bit):5.003150765445905
                    Encrypted:false
                    SSDEEP:
                    MD5:E56CFD4693BB177A7A5982E7EAE50A8F
                    SHA1:77C40C5819729021104DC492A250012B5BACFBF0
                    SHA-256:1B78F6FD9E49115FCF4E0F9593B5E41ED0A39FD34F4DCF94BB8CC6BB94977EF5
                    SHA-512:E1886A21DD6727DE027AC82D8BED0E2A95B30A3CD23065ACDFB4FBD314F93B992B860BDE7BFD40822A5F792ECC6D269D202FBF208BCF73950508338614F5670D
                    Malicious:false
                    Reputation:unknown
                    URL:https://www.choeshop.com/assets/index-1b78f6fd.css
                    Preview:.languageset[data-v-52f7f086]{padding:.9375rem .9375rem 0}.languageset .row-class[data-v-52f7f086]{display:flex;justify-content:flex-start;align-items:center;-moz-column-gap:.625rem;column-gap:.625rem}.languageset .row-class .right-class[data-v-52f7f086]{flex:1;display:flex;justify-content:space-between;align-items:center}.languageset .row-class .logo-class[data-v-52f7f086]{width:1.875rem;height:1.25rem}.
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:PNG image data, 300 x 72, 8-bit/color RGBA, non-interlaced
                    Category:dropped
                    Size (bytes):14663
                    Entropy (8bit):7.981434136638635
                    Encrypted:false
                    SSDEEP:
                    MD5:DF631CA00CBB2BFCCB88411DA52BF80C
                    SHA1:9813D2E53B20FE0E9EBDE7527E17000533101557
                    SHA-256:662E942E7C36400CDAC1470EE01CF0FC7EFF4B198CFD938D3AF8866845C43E06
                    SHA-512:80BB228C15F400EDDB692396FF0CC8675E0EE502AAAA336D2591807FDE45F55775149A913C375A23466D00922FAC32CC4A87F3F02BA117B8E911DEF35EB73056
                    Malicious:false
                    Reputation:unknown
                    Preview:.PNG........IHDR...,...H.....Lo.....pHYs..!8..!8.E.1`....sRGB.........gAMA......a...8.IDATx..}.`].....U==UK.m....`.....t..!$..,N6.M%.n.]^6..O.M...6...$+'..B.M....rE.m..z.......EO..n...\$.w..o......r.!..r.!..r.!..r.!..r.!..r.!..r.......H..b..3.B&....p/...".....j..Z..<....!..>v8%.....3.T:...@...?K..0......o......6x..".`C.9....NX.?.J(3>..~.@.!B.B..X.sH...D.. ....b$.6.b%U.3n..5.....C...(.........N(...0.R.G..(P..X....tK...R./..1B.Hb...Hh.....C.....O..C.9|..YX.5......~.]=........................U..w_...!h{.C..iP...Z\.V.w.2....w.s ..........\.{HQK.C....>.!..>.......!^\jR.(@.......=...[..J...D.,.cWC.9...'.....b..~9.B..G..6.....*.... n&........[.C..a.|..2...E.H..~..#Yw..i."....... $..5..5...C.9|.q.-,0].$3.H....N.f.G0GK..s.hE.Cp...S....>.Df...d&.....o...Ek]..c..nay.U.*.....i?......(.'..<.UC..G...Yz...9`(..i.5.p...J.5r.c.t....!...Z...U.+..B.ch..h.)...9....Y...J .s8KW..s.RP....b.....'?y....+39....R].......s..1......1n.<..#..\.v%B.....8........
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with no line terminators
                    Category:downloaded
                    Size (bytes):28
                    Entropy (8bit):4.307354922057605
                    Encrypted:false
                    SSDEEP:
                    MD5:A2432DC721D79CB02E73D270CE7E1EAA
                    SHA1:5A3C7BE77E9108ACA1B39E6BCD336EAAE6A51080
                    SHA-256:CE43C8C02C05A92B3E20FAB138AAD31B9FD54B92848913449D09924E839BB80E
                    SHA-512:0091B8D2F943169BDF1DD01D07A31F683F3B353D4EAADF1F7973AA79A989E349F53D6518AC612A856D89AB1539923C9FFAABB13E7CF8BEDF450E128342FF3298
                    Malicious:false
                    Reputation:unknown
                    URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISFwnyekzACS2g3BIFDZFhlU4SBQ01hlQc?alt=proto
                    Preview:ChIKBw2RYZVOGgAKBw01hlQcGgA=
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:Java source, ASCII text
                    Category:dropped
                    Size (bytes):82
                    Entropy (8bit):4.890714505380352
                    Encrypted:false
                    SSDEEP:
                    MD5:69FD2407A12C77F4DE4FAED17B90B598
                    SHA1:C216E696E58C3FA79B31DCD9B7F9E3024C7CFF6A
                    SHA-256:6BEE0F247A1BF784EA72B13DAF4226FFE2EED223A62002B3A68E8E4CC79E534A
                    SHA-512:80821E5099F15789834AE804E946D05D8D7CD1AC407E1827EABED2D0D32608A520DD1DE95516E312ED161E65C536EA5076A99BD1FC090873E3148FB3073BA66A
                    Malicious:false
                    Reputation:unknown
                    Preview:import{j as o}from"./index-6a6b001f.js";const t=(t,r)=>o.global.t(t,r);export{t};.
                    No static file info