Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://app.webform.io/form/535632628787

Overview

General Information

Sample URL:https://app.webform.io/form/535632628787
Analysis ID:1541072

Detection

Score:1
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Detected non-DNS traffic on DNS port
HTML body contains low number of good links
Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 6504 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 6944 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1964 --field-trial-handle=1968,i,12321488896780288524,6058748330190310277,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 6764 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://app.webform.io/form/535632628787" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: https://app.webform.io/form/535632628787HTTP Parser: Number of links: 0
Source: https://app.webform.io/form/535632628787HTTP Parser: No <meta name="author".. found
Source: https://app.webform.io/form/535632628787HTTP Parser: No <meta name="author".. found
Source: https://app.webform.io/form/535632628787HTTP Parser: No <meta name="copyright".. found
Source: https://app.webform.io/form/535632628787HTTP Parser: No <meta name="copyright".. found
Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\Chrome\Application\Dictionaries
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49715 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49717 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.149.20.212:443 -> 192.168.2.16:58667 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.149.20.212:443 -> 192.168.2.16:58669 version: TLS 1.2
Source: global trafficTCP traffic: 192.168.2.16:58666 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:58666 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:58666 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:58666 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:58666 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:58666 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:58666 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:58666 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:58666 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:58666 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:58666 -> 1.1.1.1:53
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: global trafficDNS traffic detected: DNS query: app.webform.io
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 58669 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 58667 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58667
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58669
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 58671
Source: unknownNetwork traffic detected: HTTP traffic on port 58671 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49715 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49717 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.149.20.212:443 -> 192.168.2.16:58667 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.149.20.212:443 -> 192.168.2.16:58669 version: TLS 1.2
Source: classification engineClassification label: clean1.win@17/12@6/142
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Program Files\Google\Chrome\Application\Dictionaries
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1964 --field-trial-handle=1968,i,12321488896780288524,6058748330190310277,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://app.webform.io/form/535632628787"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1964 --field-trial-handle=1968,i,12321488896780288524,6058748330190310277,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\Chrome\Application\Dictionaries
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
3
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
app.webform.io
188.114.96.3
truefalse
    unknown
    www.google.com
    142.250.185.132
    truefalse
      unknown
      NameMaliciousAntivirus DetectionReputation
      https://app.webform.io/form/535632628787false
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        142.250.186.67
        unknownUnited States
        15169GOOGLEUSfalse
        142.250.186.78
        unknownUnited States
        15169GOOGLEUSfalse
        142.250.185.206
        unknownUnited States
        15169GOOGLEUSfalse
        1.1.1.1
        unknownAustralia
        13335CLOUDFLARENETUSfalse
        142.250.185.234
        unknownUnited States
        15169GOOGLEUSfalse
        142.250.185.132
        www.google.comUnited States
        15169GOOGLEUSfalse
        142.251.168.84
        unknownUnited States
        15169GOOGLEUSfalse
        239.255.255.250
        unknownReserved
        unknownunknownfalse
        188.114.97.3
        unknownEuropean Union
        13335CLOUDFLARENETUSfalse
        142.250.185.163
        unknownUnited States
        15169GOOGLEUSfalse
        188.114.96.3
        app.webform.ioEuropean Union
        13335CLOUDFLARENETUSfalse
        IP
        192.168.2.16
        192.168.2.4
        192.168.2.23
        192.168.2.14
        Joe Sandbox version:41.0.0 Charoite
        Analysis ID:1541072
        Start date and time:2024-10-24 11:35:10 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:defaultwindowsinteractivecookbook.jbs
        Sample URL:https://app.webform.io/form/535632628787
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:13
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • EGA enabled
        Analysis Mode:stream
        Analysis stop reason:Timeout
        Detection:CLEAN
        Classification:clean1.win@17/12@6/142
        • Exclude process from analysis (whitelisted): svchost.exe
        • Excluded IPs from analysis (whitelisted): 142.250.186.67, 142.250.185.206, 142.251.168.84, 34.104.35.123
        • Excluded domains from analysis (whitelisted): fs.microsoft.com, clients2.google.com, accounts.google.com, edgedl.me.gvt1.com, clientservices.googleapis.com, clients.l.google.com
        • Not all processes where analyzed, report is missing behavior information
        • VT rate limit hit for: https://app.webform.io/form/535632628787
        InputOutput
        URL: https://app.webform.io/form/535632628787 Model: claude-3-haiku-20240307
        ```json
        {
          "contains_trigger_text": true,
          "trigger_text": "Microsoft Entra Multifactor Authentication (MFA)",
          "prominent_button_name": "Submit",
          "text_input_field_labels": [
            "Email Address",
            "Domain\\username",
            "Password"
          ],
          "pdf_icon_visible": false,
          "has_visible_captcha": false,
          "has_urgent_text": false,
          "has_visible_qrcode": false
        }
        URL: https://app.webform.io/form/535632628787 Model: claude-3-haiku-20240307
        ```json
        {
          "brands": [
            "Microsoft"
          ]
        }
        URL: https://app.webform.io/form/535632628787 Model: gpt-4o
        ```json{  "legit_domain": "microsoft.com",  "classification": "wellknown",  "reasons": [    "The brand 'Microsoft' is well-known and typically associated with the domain 'microsoft.com'.",    "The URL 'app.webform.io' does not match the legitimate domain for Microsoft.",    "The domain 'webform.io' is not commonly associated with Microsoft and could be a third-party service.",    "The presence of input fields for 'Email Address', 'Domain\\username', and 'Password' is typical for login forms, which are common targets for phishing.",    "The URL does not contain any direct reference to Microsoft, which is suspicious given the brand association."  ],  "riskscore": 8}
        Google indexed: True
        URL: app.webform.io
                    Brands: Microsoft
                    Input Fields: Email Address, Domain\username, Password
        URL: https://app.webform.io/form/535632628787 Model: claude-3-haiku-20240307
        ```json
        {
          "contains_trigger_text": true,
          "trigger_text": "Microsoft Entra Multifactor Authentication (MFA)",
          "prominent_button_name": "Submit",
          "text_input_field_labels": [
            "Email Address",
            "Domain\\username",
            "Password"
          ],
          "pdf_icon_visible": false,
          "has_visible_captcha": false,
          "has_urgent_text": false,
          "has_visible_qrcode": false
        }
        URL: https://app.webform.io/form/535632628787 Model: claude-3-haiku-20240307
        ```json
        {
          "brands": [
            "Microsoft"
          ]
        }
        URL: https://app.webform.io/form/535632628787 Model: gpt-4o
        ```json{  "legit_domain": "microsoft.com",  "classification": "wellknown",  "reasons": [    "The brand 'Microsoft' is well-known and typically associated with the domain 'microsoft.com'.",    "The URL 'app.webform.io' does not match the legitimate domain for Microsoft.",    "The domain 'webform.io' is not commonly associated with Microsoft and could be a third-party service.",    "The presence of input fields for email, domain/username, and password is typical for phishing attempts targeting login credentials.",    "The URL does not contain any direct reference to Microsoft, which is suspicious given the brand association."  ],  "riskscore": 8}
        Google indexed: True
        URL: app.webform.io
                    Brands: Microsoft
                    Input Fields: Email Address, Domain\username, Password
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 24 08:35:45 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
        Category:dropped
        Size (bytes):2673
        Entropy (8bit):3.9842942213851384
        Encrypted:false
        SSDEEP:
        MD5:69D78EDBA4A6E4CF063E0B882DA185E1
        SHA1:9A0FB5060DE6A0DE186C79B31B0B98BACA17D577
        SHA-256:46D1ABB6EEF6BB04A497EEDDFF0687DB51CB1E2632B70B201B18DA70BA39D7D3
        SHA-512:EF698076C0EA9B0AEB1E0E6D0344978C3AB812BA9300435656CC088FF1D4D126FD65CD29D0CA2619017B14BD59392B535FE5A6917BC31663D07584C8CEEB42DD
        Malicious:false
        Reputation:unknown
        Preview:L..................F.@.. ...$+.,....G....%..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IXYlL....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VXYvL....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VXYvL....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VXYvL..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VXYwL...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............%.h.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 24 08:35:45 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
        Category:dropped
        Size (bytes):2675
        Entropy (8bit):4.0021131317745855
        Encrypted:false
        SSDEEP:
        MD5:DACDF7EC31A790D4588E95D8B10403E5
        SHA1:D8B1870282A3E2E1F7D872029F292315D8EC00A8
        SHA-256:9995687F1881B610183BF43F541C118E8D6C9245AA40CC946EA97D639C6349F1
        SHA-512:D03498C3D7DF183796173E285A8635E50691E76C05F3B1FD0322DFC3B25EC80A89A3543D69920F54A0B4A3AEFCCB99ADD0BD10F0EE1CC7B1F9C2FBEB773612AD
        Malicious:false
        Reputation:unknown
        Preview:L..................F.@.. ...$+.,.........%..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IXYlL....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VXYvL....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VXYvL....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VXYvL..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VXYwL...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............%.h.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
        Category:dropped
        Size (bytes):2689
        Entropy (8bit):4.005196623374422
        Encrypted:false
        SSDEEP:
        MD5:26EBAFE0D11611984207BB3B3CDAD411
        SHA1:58FD35B47DEF87E63603C57CC7B5EEEB667EDCB6
        SHA-256:3F8F9AB2FA53DB1ABBD54BE54C1A40D0863A12B9682F12A9EFD32B9961D5C135
        SHA-512:34587059A4E4476D1BAED0FFBE1E5AC9639F7919D85EC2844B0096FABE8525AC9C0A28FE359FF37F84211633F78E8D5850CFA577889663618B938A4A54FDF55F
        Malicious:false
        Reputation:unknown
        Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IXYlL....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VXYvL....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VXYvL....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VXYvL..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............%.h.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 24 08:35:45 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
        Category:dropped
        Size (bytes):2677
        Entropy (8bit):3.996096400209987
        Encrypted:false
        SSDEEP:
        MD5:070694707348ADC2C534A38623AFA6D2
        SHA1:4EFADB059A0626224FA893AA27358F6A8A5A2F30
        SHA-256:21A073013FB422E7A4DA816ECD3CB3F2CF79D8948BCBA20C080BFE11EE47C698
        SHA-512:DCA1191B0418F7F648C77D9F84DBDD1D47CC61E0A86F7D752E2D81CC2558F195F0992D55B60757B9D2A29B5E0AD586B9D0ED64F9FDF2CD8F3ED6024182F9D671
        Malicious:false
        Reputation:unknown
        Preview:L..................F.@.. ...$+.,.....j...%..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IXYlL....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VXYvL....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VXYvL....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VXYvL..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VXYwL...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............%.h.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 24 08:35:45 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
        Category:dropped
        Size (bytes):2677
        Entropy (8bit):3.9858531971003193
        Encrypted:false
        SSDEEP:
        MD5:34339D912C9DA32FC80DDA7B23456126
        SHA1:8CE503088D21A425BD17A0E207FBE196997C5A9E
        SHA-256:2CA4B41C0EABC822B9D4D681183176FFA227BD95A2E277855031959EB0491AAF
        SHA-512:6A49785498D5220F152BA8BF7B42ED68FC438689A3FEEBA1C2456EC682634AC9E37226C3FA0F01AB9EA758EBCAE0FC72AD33860A930BDAEBC0702DE8D4848786
        Malicious:false
        Reputation:unknown
        Preview:L..................F.@.. ...$+.,....A....%..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IXYlL....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VXYvL....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VXYvL....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VXYvL..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VXYwL...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............%.h.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 24 08:35:45 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
        Category:dropped
        Size (bytes):2679
        Entropy (8bit):3.995579210162721
        Encrypted:false
        SSDEEP:
        MD5:79C9D9B871AC7FED23A1C7634A9E7B7C
        SHA1:64B2523FFB2140D65A076777E15752DBF666976C
        SHA-256:BF63FDE79D26AEF77ABF7B4A4DADA3DD4D30D179B960DD2CB60CBC9C702F8995
        SHA-512:CD458315335C6BE4807C3AE834481AD2A65EE8F9996705983FB8B5F8DA1DE49A398A9EA4DF80F708BBE3F66744572BE833AFF91A57CB11000E7B64A578A8BF05
        Malicious:false
        Reputation:unknown
        Preview:L..................F.@.. ...$+.,.....B...%..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IXYlL....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VXYvL....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VXYvL....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VXYvL..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VXYwL...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............%.h.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:PNG image data, 200 x 200, 8-bit/color RGBA, non-interlaced
        Category:downloaded
        Size (bytes):2713
        Entropy (8bit):7.783940598237623
        Encrypted:false
        SSDEEP:
        MD5:C9AEBA3CF669AC413B8FF8CCEAF1E9C7
        SHA1:EF211CA55E7CA647D5B56E8F4B94735954ACDA09
        SHA-256:58B561FB9D5E175DB158AAA4081BC3BB923740EF51F169373FD381D52585BB3F
        SHA-512:AB85F42BB48AFCF562A97E7518265B2EA20501FC186E3D607FA5FAAF5335DC8A94DE59F8D6E360085A80BBDAAAA717B9A36D6DA476D60D4355296B2834EA0DC2
        Malicious:false
        Reputation:unknown
        URL:https://app.webform.io/form/logoBlackWF.png
        Preview:.PNG........IHDR..............X......pHYs.................sRGB.........gAMA......a.....IDATx.....6....7.~{.,...U....*0...U.J.v*.SA..V..v..+.S.F....../I. ...L&K..%<.@B.........(....]m......)..o;.6.}...M..)...\.....)....4.f.l.8..'`F.......!.L.#......xo5N8..[W.....9.=.O.......[.(......o\W......T^8...s...[.(.S.X.U.z..[......Hj.).x...B..d.>L!...._#..C@...m"5.....T..R....S_2^.kmnT..R..Q.U..._.......).Z...Y.T..R./..1H.F...." u.Y+O,Pt.0Y?....&.........d..z.....Aq.lZU.....f6.........A..l.R..H=.ec....,kU..R.....S.].*..F@..t>...q.i..E..N[.(..1..;......:8.Y.D.....;.A....;....# .ZlB.J.! .Z, t.P..o....w.....d...)..X.Q." up:..Y....d........*..V@@0.....E@0..._T(..!........];.......e...8.....<.f}.EMm?...].*y.{....{..^..$.....\+...hA.Gh=N.......5|..F.GF...5l@\..k......X..6.>.<..[... .c...tCY.(..= ;N.p|.P(.~.q..cV.}?.Crz....+.V..%=L#Y....vS~.....7...S.... K...........s..h..V.P......F..GJ.jt>^...N.#v..8Aq...-K...yi.}.%|.E=.....~...........).4|.h5~..+~."W.F...
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:ASCII text, with no line terminators
        Category:downloaded
        Size (bytes):40
        Entropy (8bit):4.3275671571169285
        Encrypted:false
        SSDEEP:
        MD5:4B5BA3C3EECF9CBBE94087D14A9F5422
        SHA1:AB9A8FB6D25F84EAC7726B9D83D73BFCEE84514E
        SHA-256:A8D0AB872A96683146B9A21C76AC69BFEFBD2F49957326B63D9F55146C0CF78E
        SHA-512:3B8E7005ADE0C9FD5B402AFBD6E6542A081B3D12320266D39526FFB6B6D80FE998E6825A6FF0413131C6B4C728028CD01A93E113F49DDC6D386884B369DDD792
        Malicious:false
        Reputation:unknown
        URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISHgkXCQr4dVDHuRIFDRmVQUwSBQ2FWs0aEgUN2Ua2Cg==?alt=proto
        Preview:ChsKBw0ZlUFMGgAKBw2FWs0aGgAKBw3ZRrYKGgA=
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:JSON data
        Category:downloaded
        Size (bytes):4309
        Entropy (8bit):4.870487035618273
        Encrypted:false
        SSDEEP:
        MD5:7A85D5DE3F3A2500DEC4F0F58C146A82
        SHA1:82DEBE9240997C8959A668BD2D27CE8E907F40D1
        SHA-256:3D5710E7BFDE52700476372FC52F13A8EFD052C3515146D45B06B85F31A3A64A
        SHA-512:2E0A985F90A406C52E66017C322E02572A2CB06AAB298B69584715EF155DB3F5DDC7AF33BCD5E5FAC90CFAABB948DE15801FE4F07BAAF0402AB017D37D6672F8
        Malicious:false
        Reputation:unknown
        URL:https://app.webform.io/api/v1/get/535632628787?preview=
        Preview:{"success":true,"data":{"id":930,"workSpaceId":771,"userId":551,"name":"multifactor authentication","formType":"Contact form","formLayout":1,"banner":"","logo":"","publishStatus":"1","publishId":"535632628787","thankYouTitle":"Thank you for submitting this form.","thankYouDescription":"You may now close this window.","thankYouBtnText":"Create your own form","thankYouLink":"https://app.webform.io/","style":{"submitButtonText":"Submit","buttonIcon":"0","nextButtonText":"Next","previousButtonText":"Previous","globalTextColor":"#000000","globalLabelColor":"#303030","globalBg":"#f1f1f1","globalPlaceColor":"#c2c2c2","globalDescColor":"#616161","globalErrorColor":"#8e1f0b","buttonTextColor":"#ffffff","buttonBg":"#3d99f5","buttonPosition":"center","logoPosition":"left","bannerPosition":"top","bannerSize":"container","formSize":"medium","formDirection":"ltr","fontFamily":""},"planType":1,"branding":"0","formFields":{"1":[{"id":9530,"step":1,"style":{"alignment":"center","text_color":"#3973f9","
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:HTML document, ASCII text
        Category:downloaded
        Size (bytes):476
        Entropy (8bit):4.878270007280884
        Encrypted:false
        SSDEEP:
        MD5:944E4787D2DC48704774450440068BAC
        SHA1:0A45217858245838604F852B238B3CE3ECBFDD08
        SHA-256:86D717A8C6466003FD8CF52340F29ACE7EE0C0F835F26DF7095AA0CBB41B6E2E
        SHA-512:83785443B5FFA32D1F7324A1F95588B03973B49F59338140179DFAEF8EB20C828968D734F26ABE8575863E755ACFCB962198CC61C99C12FCE88A93EAAA4F9B76
        Malicious:false
        Reputation:unknown
        URL:https://app.webform.io/form/535632628787
        Preview:<!doctype html>.<html lang="en">. <head>. <meta charset="UTF-8" />. <link rel="icon" type="image/svg+xml" href="/form/logoBlackWF.png" />. <meta name="viewport" content="width=device-width, initial-scale=1.0" />. <title>WebForm</title>. <script type="module" crossorigin src="/form/assets/index-Dhk1hABw.js"></script>. <link rel="stylesheet" crossorigin href="/form/assets/index-CpUiBssq.css">. </head>. <body>. <div id="root"></div>. </body>.</html>.
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:ASCII text, with very long lines (37550)
        Category:downloaded
        Size (bytes):1004088
        Entropy (8bit):5.616731517515313
        Encrypted:false
        SSDEEP:
        MD5:A783CE4018D0F2CF94D8424509B6FC0B
        SHA1:5DA683E193B343BC0FFEDF9B746D1B6F9DB61C38
        SHA-256:842E761E5A27F950957C6889BFD71EED8974F4EBA8D731BD6830F947E764C284
        SHA-512:7BE0EF3383CF0F9C5D3470AADF0A94DC03C548710785C36A6BA397380D2F78EDEB0B2B40225843DE2F4A1B6EA108084D588DF5F7C5886204E0446304457673DC
        Malicious:false
        Reputation:unknown
        URL:https://app.webform.io/form/assets/index-Dhk1hABw.js
        Preview:var A$=(e,t)=>()=>(t||e((t={exports:{}}).exports,t),t.exports);var cX=A$((wX,au)=>{function R$(e,t){for(var n=0;n<t.length;n++){const r=t[n];if(typeof r!="string"&&!Array.isArray(r)){for(const o in r)if(o!=="default"&&!(o in e)){const i=Object.getOwnPropertyDescriptor(r,o);i&&Object.defineProperty(e,o,i.get?i:{enumerable:!0,get:()=>r[o]})}}}return Object.freeze(Object.defineProperty(e,Symbol.toStringTag,{value:"Module"}))}(function(){const t=document.createElement("link").relList;if(t&&t.supports&&t.supports("modulepreload"))return;for(const o of document.querySelectorAll('link[rel="modulepreload"]'))r(o);new MutationObserver(o=>{for(const i of o)if(i.type==="childList")for(const a of i.addedNodes)a.tagName==="LINK"&&a.rel==="modulepreload"&&r(a)}).observe(document,{childList:!0,subtree:!0});function n(o){const i={};return o.integrity&&(i.integrity=o.integrity),o.referrerPolicy&&(i.referrerPolicy=o.referrerPolicy),o.crossOrigin==="use-credentials"?i.credentials="include":o.crossOrigin=
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:Unicode text, UTF-8 text, with very long lines (40285)
        Category:downloaded
        Size (bytes):94539
        Entropy (8bit):5.076382818418581
        Encrypted:false
        SSDEEP:
        MD5:CD73479131DB1FC18B16BB12B7C4D855
        SHA1:6D7E33D12E6D5D1C8B175D79F8936F4D25DDD3D2
        SHA-256:35F9BF99699734AEDEB2FE16DA187292A696B172CB5B969C787F2581492EF0DA
        SHA-512:B27D52975070D6520DE03A395F6BDB25F379124F4D9DC7AED4E823765273F028C58FE0DE8DA6312BD7C78632FFDFBF489F1B030FAEB5F46F24DE727AEDB22C08
        Malicious:false
        Reputation:unknown
        URL:https://app.webform.io/form/assets/index-CpUiBssq.css
        Preview:@charset "UTF-8";.react-datepicker__year-read-view--down-arrow,.react-datepicker__month-read-view--down-arrow,.react-datepicker__month-year-read-view--down-arrow,.react-datepicker__navigation-icon:before{border-color:#ccc;border-style:solid;border-width:3px 3px 0 0;content:"";display:block;height:9px;position:absolute;top:6px;width:9px}.react-datepicker-wrapper{display:inline-block;padding:0;border:0}.react-datepicker{font-family:Helvetica Neue,helvetica,arial,sans-serif;font-size:.8rem;background-color:#fff;color:#000;border:1px solid #aeaeae;border-radius:.3rem;display:inline-block;position:relative;line-height:initial}.react-datepicker--time-only .react-datepicker__time-container{border-left:0}.react-datepicker--time-only .react-datepicker__time,.react-datepicker--time-only .react-datepicker__time-box{border-bottom-left-radius:.3rem;border-bottom-right-radius:.3rem}.react-datepicker-popper{z-index:1;line-height:0}.react-datepicker-popper .react-datepicker__triangle{stroke:#aeaeae}.r
        No static file info