Edit tour

Windows Analysis Report
https://url6.mailanyone.net/scanner?m=1sMSYE-000BpK-6P&d=4|mail%2F90%2F1719407400%2F1sMSYE-000BpK-6P|in6f|57e1b682|27541238|12528278|667C154A9FC5035AC9CA7C89E1832E0F&o=%2Fphto%3A%2Fftsi.rmeffcsogm.csPaeo%2Fss%2FRPoneepx.agisp%3FeaDjd%3DYe2aeLBLP0_KHDSveCCNtWEsw5cLUi9rqzRmk3Yg5UQYgNEQR0VD

Overview

General Information

Sample URL:https://url6.mailanyone.net/scanner?m=1sMSYE-000BpK-6P&d=4|mail%2F90%2F1719407400%2F1sMSYE-000BpK-6P|in6f|57e1b682|27541238|12528278|667C154A9FC5035AC9CA7C89E1832E0F&o=%2Fphto%3A%2Fftsi.rm
Analysis ID:1463578

Detection

Score:1
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Detected non-DNS traffic on DNS port
Stores files to the Windows start menu directory

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64_ra
  • chrome.exe (PID: 6300 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://url6.mailanyone.net/scanner?m=1sMSYE-000BpK-6P&d=4%7Cmail%2F90%2F1719407400%2F1sMSYE-000BpK-6P%7Cin6f%7C57e1b682%7C27541238%7C12528278%7C667C154A9FC5035AC9CA7C89E1832E0F&o=%2Fphto%3A%2Fftsi.rmeffcsogm.csPaeo%2Fss%2FRPoneepx.agisp%3FeaDjd%3DYe2aeLBLP0_KHDSveCCNtWEsw5cLUi9rqzRmk3Yg5UQYgNEQR0VDVNJRDEdK3yVQVYDFN1y0pVBSu4&s=xQfh3THJ7SCnoLxuZpxlTyFZIos MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 5744 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 --field-trial-handle=1884,i,16303438288282555975,9883259298025257231,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: unknownHTTPS traffic detected: 2.19.244.127:443 -> 192.168.2.16:49749 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.85.23.86:443 -> 192.168.2.16:49750 version: TLS 1.2
Source: unknownHTTPS traffic detected: 2.19.244.127:443 -> 192.168.2.16:49754 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.85.23.86:443 -> 192.168.2.16:49771 version: TLS 1.2
Source: chrome.exeMemory has grown: Private usage: 17MB later: 29MB
Source: global trafficTCP traffic: 192.168.2.16:49757 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49757 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49757 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49757 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49757 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49757 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49757 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49757 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49757 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49757 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49757 -> 1.1.1.1:53
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: global trafficDNS traffic detected: DNS query: url6.mailanyone.net
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: forms.office.com
Source: global trafficDNS traffic detected: DNS query: cdn.forms.office.net
Source: global trafficDNS traffic detected: DNS query: lists.office.com
Source: global trafficDNS traffic detected: DNS query: c.office.com
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
Source: unknownHTTPS traffic detected: 2.19.244.127:443 -> 192.168.2.16:49749 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.85.23.86:443 -> 192.168.2.16:49750 version: TLS 1.2
Source: unknownHTTPS traffic detected: 2.19.244.127:443 -> 192.168.2.16:49754 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.85.23.86:443 -> 192.168.2.16:49771 version: TLS 1.2
Source: classification engineClassification label: clean1.win@15/40@22/181
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://url6.mailanyone.net/scanner?m=1sMSYE-000BpK-6P&d=4%7Cmail%2F90%2F1719407400%2F1sMSYE-000BpK-6P%7Cin6f%7C57e1b682%7C27541238%7C12528278%7C667C154A9FC5035AC9CA7C89E1832E0F&o=%2Fphto%3A%2Fftsi.rmeffcsogm.csPaeo%2Fss%2FRPoneepx.agisp%3FeaDjd%3DYe2aeLBLP0_KHDSveCCNtWEsw5cLUi9rqzRmk3Yg5UQYgNEQR0VDVNJRDEdK3yVQVYDFN1y0pVBSu4&s=xQfh3THJ7SCnoLxuZpxlTyFZIos
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 --field-trial-handle=1884,i,16303438288282555975,9883259298025257231,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 --field-trial-handle=1884,i,16303438288282555975,9883259298025257231,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
Extra Window Memory Injection
1
Extra Window Memory Injection
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
https://url6.mailanyone.net/scanner?m=1sMSYE-000BpK-6P&d=4%7Cmail%2F90%2F1719407400%2F1sMSYE-000BpK-6P%7Cin6f%7C57e1b682%7C27541238%7C12528278%7C667C154A9FC5035AC9CA7C89E1832E0F&o=%2Fphto%3A%2Fftsi.rmeffcsogm.csPaeo%2Fss%2FRPoneepx.agisp%3FeaDjd%3DYe2aeLBLP0_KHDSveCCNtWEsw5cLUi9rqzRmk3Yg5UQYgNEQR0VDVNJRDEdK3yVQVYDFN1y0pVBSu4&s=xQfh3THJ7SCnoLxuZpxlTyFZIos0%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
url6.mailanyone.net0%VirustotalBrowse
www.google.com0%VirustotalBrowse
forms.office.com0%VirustotalBrowse
lists.office.com0%VirustotalBrowse
cdn.forms.office.net0%VirustotalBrowse
c.office.com0%VirustotalBrowse
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
www.google.com
142.250.185.164
truefalseunknown
url6.mailanyone.net
unknown
unknownfalseunknown
forms.office.com
unknown
unknownfalseunknown
c.office.com
unknown
unknownfalseunknown
cdn.forms.office.net
unknown
unknownfalseunknown
lists.office.com
unknown
unknownfalseunknown
NameMaliciousAntivirus DetectionReputation
https://url6.mailanyone.net/scanner?m=1sMSYE-000BpK-6P&d=4%7Cmail%2F90%2F1719407400%2F1sMSYE-000BpK-6P%7Cin6f%7C57e1b682%7C27541238%7C12528278%7C667C154A9FC5035AC9CA7C89E1832E0F&o=%2Fphto%3A%2Fftsi.rmeffcsogm.csPaeo%2Fss%2FRPoneepx.agisp%3FeaDjd%3DYe2aeLBLP0_KHDSveCCNtWEsw5cLUi9rqzRmk3Yg5UQYgNEQR0VDVNJRDEdK3yVQVYDFN1y0pVBSu4&s=xQfh3THJ7SCnoLxuZpxlTyFZIosfalse
    unknown
    https://forms.office.com/Pages/ResponsePage.aspx?id=ejLe2DaYP0SLvKHBD_CNwC5WEestUiRLmrqcz9Ygg3NUQkY5R0JQRDVENVdKVEYyVDQ3N1BFS0pDVy4ufalse
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      142.250.184.195
      unknownUnited States
      15169GOOGLEUSfalse
      1.1.1.1
      unknownAustralia
      13335CLOUDFLARENETUSfalse
      216.58.212.131
      unknownUnited States
      15169GOOGLEUSfalse
      74.125.133.84
      unknownUnited States
      15169GOOGLEUSfalse
      52.111.243.106
      unknownUnited States
      8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
      13.107.6.194
      unknownUnited States
      8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
      142.250.186.106
      unknownUnited States
      15169GOOGLEUSfalse
      20.50.201.200
      unknownUnited States
      8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
      104.18.10.14
      unknownUnited States
      13335CLOUDFLARENETUSfalse
      239.255.255.250
      unknownReserved
      unknownunknownfalse
      142.250.185.174
      unknownUnited States
      15169GOOGLEUSfalse
      142.250.185.164
      www.google.comUnited States
      15169GOOGLEUSfalse
      13.74.129.1
      unknownUnited States
      8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
      2.18.121.134
      unknownEuropean Union
      16625AKAMAI-ASUSfalse
      20.110.205.119
      unknownUnited States
      8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
      216.58.212.174
      unknownUnited States
      15169GOOGLEUSfalse
      204.79.197.237
      unknownUnited States
      8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
      13.69.116.107
      unknownUnited States
      8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
      IP
      192.168.2.16
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1463578
      Start date and time:2024-06-27 13:04:40 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:defaultwindowsinteractivecookbook.jbs
      Sample URL:https://url6.mailanyone.net/scanner?m=1sMSYE-000BpK-6P&d=4|mail%2F90%2F1719407400%2F1sMSYE-000BpK-6P|in6f|57e1b682|27541238|12528278|667C154A9FC5035AC9CA7C89E1832E0F&o=%2Fphto%3A%2Fftsi.rmeffcsogm.csPaeo%2Fss%2FRPoneepx.agisp%3FeaDjd%3DYe2aeLBLP0_KHDSveCCNtWEsw5cLUi9rqzRmk3Yg5UQYgNEQR0VDVNJRDEdK3yVQVYDFN1y0pVBSu4&s=xQfh3THJ7SCnoLxuZpxlTyFZIos
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:14
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • EGA enabled
      Analysis Mode:stream
      Analysis stop reason:Timeout
      Detection:CLEAN
      Classification:clean1.win@15/40@22/181
      • Exclude process from analysis (whitelisted): svchost.exe
      • Excluded IPs from analysis (whitelisted): 216.58.212.131, 104.18.10.14, 104.18.11.14, 142.250.185.174, 74.125.133.84, 34.104.35.123
      • Excluded domains from analysis (whitelisted): clients2.google.com, accounts.google.com, edgedl.me.gvt1.com, clientservices.googleapis.com, clients.l.google.com, url6.mailanyone.net.cdn.cloudflare.net
      • Not all processes where analyzed, report is missing behavior information
      InputOutput
      URL: https://forms.office.com/Pages/ResponsePage.aspx?id=ejLe2DaYP0SLvKHBD_CNwC5WEestUiRLmrqcz9Ygg3NUQkY5R0JQRDVENVdKVEYyVDQ3N1BFS0pDVy4u Model: Perplexity: mixtral-8x7b-instruct
      {"loginform": true,"urgency": false,"captcha": false,"reasons": ["The webpage contains a form that requests sensitive information such as full name, organizations name, email address, and justification for access, which are characteristics of a login form.","There is no language in the text that creates a sense of urgency.","There is no CAPTCHA or any other anti-robot detection mechanism present on the webpage."]}
      Title: Supplier Portal Access Request OCR: Supplier Portal Access Request By completing this form you are requesting access to the Kier Supplier Portal. If you already have access you do not need to complete this form again as you will be able to access the portal using the credentials you previously provided. Required 1. Please enter your full name. * Enter your answer 2. Please enter your organisations name. * Enter your answer 3. Please enter your email address that was provided to you by your organisation. * Enter your answer 4. Please provide justification of why you need access to the Kier Supplier Portal * Enter your answer 
      URL: https://forms.office.com/Pages/ResponsePage.aspx?id=ejLe2DaYP0SLvKHBD_CNwC5WEestUiRLmrqcz9Ygg3NUQkY5R0JQRDVENVdKVEYyVDQ3N1BFS0pDVy4u Model: Perplexity: mixtral-8x7b-instruct
      {"loginform": true,"urgency": false,"captcha": false,"reasons": ["The webpage contains a form that requests sensitive information such as full name, organizations name, and email address. This meets the criteria for a login form.","The text does not create a sense of urgency as it is a standard request for access to a supplier portal.","There is no CAPTCHA or anti-robot detection mechanism present on the webpage."]}
      Title: Supplier Portal Access Request OCR: "KIE Supplier Portal Access Request By completing this form you are requesting access to the Kier Supplier Portal. If you already have access you do not need to complete this form again as you will be able to access the portal using the credentials you previously provided. k Required 1. Please enter your full name. * knter your answer 2. Please enter your organisations name. k Enter your answer 3. Please enter your email address that was provided to you by your organisation. * Enter your answer 4. Please provide justification of why you need access to the Kier Supplier Portal -k Enter your answer 
      URL: https://forms.office.com Model: gpt-4o
      ```json{  "phishing_score": 2,  "brands": "Kier",  "phishing": false,  "suspicious_domain": false,  "has_prominent_loginform": false,  "has_captcha": false,  "setechniques": false,  "has_suspicious_link": false,  "legitmate_domain": "forms.office.com",  "reasons": "The URL 'https://forms.office.com' is a legitimate domain associated with Microsoft Office forms, which is commonly used for creating and sharing forms. The webpage appears to be a form requesting access to the Kier Supplier Portal, which aligns with the brand 'Kier' identified in the image. There are no prominent login, password, or email fields that are typically used in phishing attacks. The form does not use social engineering techniques to mislead the user, and there are no suspicious links present. Based on the analysis, the site appears to be legitimate."}
      URL: https://forms.office.com Model: gpt-4o
      ```json{  "phishing_score": 1,  "brands": "Microsoft Office",  "phishing": false,  "suspicious_domain": false,  "has_prominent_loginform": false,  "has_captcha": false,  "setechniques": false,  "has_suspicious_link": false,  "legitmate_domain": "office.com",  "reasons": "The URL 'https://forms.office.com' is a legitimate domain associated with Microsoft Office. The page appears to be a form for accessing a supplier portal, which is a typical use case for Microsoft Forms. There are no prominent login, password, or email fields that would typically be targeted in phishing attacks. Additionally, there are no captchas or suspicious links present. The overall design and URL do not exhibit common social engineering techniques used in phishing attacks. Therefore, the site is determined to be legitimate."}
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jun 27 10:05:11 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
      Category:dropped
      Size (bytes):2673
      Entropy (8bit):3.9886486365773304
      Encrypted:false
      SSDEEP:
      MD5:B52EA76B585FA56E700F73198651F0DD
      SHA1:0CE289233B0899D3B78F13EE30114097437DBAEB
      SHA-256:4B4BDABDC31C36C0864EFE6DA68A4C89E2188E0893941D99494C4A700F31E612
      SHA-512:842FE2207B0A5325BAD0D06C8706C757D9279A23F27795ABAF5DA0BDAB5317B03648904074C811EAB7DA403005EF24B0AD7E0A76D05BCA09787B6A99329CD4B0
      Malicious:false
      Reputation:unknown
      Preview:L..................F.@.. ...$+.,...........N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.X....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.X....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.X....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.X..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.X...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............^......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jun 27 10:05:11 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
      Category:dropped
      Size (bytes):2675
      Entropy (8bit):4.006964124025951
      Encrypted:false
      SSDEEP:
      MD5:A615C44DAF84E15E99EC13D9A4BA1FF2
      SHA1:52F89D337241BFED995CBF0984D35130E8BEE23A
      SHA-256:B7DA4267BE4A57086347368EBE731C11AD090B2D89C24F4804F06BB3E99F2DAF
      SHA-512:53E6A4D81456C14A1CCD3312F0AD8E48E0F70EFEA82C5F753B3E79E7A0C2F9C02454ED8B8B76268738CC2A7DCDE12823FB6BDEB8B2550A9C1C64A377D9EFE8DF
      Malicious:false
      Reputation:unknown
      Preview:L..................F.@.. ...$+.,....}.......N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.X....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.X....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.X....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.X..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.X...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............^......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
      Category:dropped
      Size (bytes):2689
      Entropy (8bit):4.0123799818298735
      Encrypted:false
      SSDEEP:
      MD5:F3C6037518A848F067ADEB4F9AF63B9F
      SHA1:B167AAF7D90E810BB38D1785B162BB2BF58A693B
      SHA-256:034E441D1D53BA638DA38485F68962A9F2BC0C00292A7A7D6EA92E46CB4303BC
      SHA-512:154C8E187CB297A75141EE44006B0C541ABC5E30E478A515345A1247E69C1F1159B051A964624F47BDBD8B87983FE966EC381BDCA62F0307E6025F1334C7EDF8
      Malicious:false
      Reputation:unknown
      Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.X....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.X....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.X....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.X..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............^......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jun 27 10:05:11 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
      Category:dropped
      Size (bytes):2677
      Entropy (8bit):4.002983381036569
      Encrypted:false
      SSDEEP:
      MD5:F1624B880D47A995CE75F23736073C97
      SHA1:671338363C27D25A4B75259718F52ABBB9ECF1A6
      SHA-256:6EC9EE0D318B65DA37E1995AD865FE4F0C17FB313C61155D4C79A59C3198AD67
      SHA-512:8845634B294B90DD3CB89E0B4FF9D70AFDA3AD6C6658A3DD05296DDDB0F6DB46509A936340DFE02188A9D3AF3C4FFB927D7A02605269F71C8AD547903F725D93
      Malicious:false
      Reputation:unknown
      Preview:L..................F.@.. ...$+.,....RP......N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.X....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.X....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.X....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.X..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.X...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............^......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jun 27 10:05:11 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
      Category:dropped
      Size (bytes):2677
      Entropy (8bit):3.9896061521316875
      Encrypted:false
      SSDEEP:
      MD5:05DEAB8DB00544C01EB392F9E941CF93
      SHA1:01CEA25B3FCBE63CC4715232D9E7DC661D18BB89
      SHA-256:DA7021E4D4D8C5E1F9130250819F1CB291EAB2A55965CFD0A305A9A487DE021E
      SHA-512:FCA86F87A564D9EC92EB58B4BD01CBDB11A19E0F0B9664B8F8BFB2554042A8AD8FA28D525BD37D9DFAD9E119648ADA2FF1D87B8045BD6D62A3E7B5D92F14E4F1
      Malicious:false
      Reputation:unknown
      Preview:L..................F.@.. ...$+.,...........N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.X....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.X....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.X....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.X..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.X...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............^......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Jun 27 10:05:11 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
      Category:dropped
      Size (bytes):2679
      Entropy (8bit):4.0024238873863425
      Encrypted:false
      SSDEEP:
      MD5:3638E05FFEA4CA9614E691A5F5FD532E
      SHA1:CEEC0213DFFD9A77E57A3D2F5A1E64D7274FE307
      SHA-256:E16AAA9E87706322F09D994AA13A221558655E12953651868711C209684DFF15
      SHA-512:B22BFCD18A85013C8D58FB13D435A1ECD9C673FC97A81528BAE8EBDE0863486C94C929CB21AE119A8225AFE410B8645CE4B227E7F2EFA2586F1AE94166AB0E02
      Malicious:false
      Reputation:unknown
      Preview:L..................F.@.. ...$+.,.....`......N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.X....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.X....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.X....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.X..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.X...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............^......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:ASCII text, with no line terminators
      Category:downloaded
      Size (bytes):52
      Entropy (8bit):4.159305766459983
      Encrypted:false
      SSDEEP:
      MD5:8A4ADCC5962B14EEE0C61ED1B1BC32BD
      SHA1:C6EE57BD59D388DCF741A519A0A4660DC180D7FB
      SHA-256:CB5646453D12242F68D8475456B171FA849A1D2B2B6115348FF9FBE7DBCC4363
      SHA-512:24B41D52BC7E48D3F1D53338DF892DAB7A6F38767E5A1E1080F1B2F7649BBCC628F016690BC4EE7C0201F8F41CECB76CA5D7B6F75D0C8DCEA052F1937FC43D1E
      Malicious:false
      Reputation:unknown
      URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISJQk-A7o77eGOhBIFDZFhlU4SBQ2RYZVOEgUNkWGVThIFDQbtu_8=?alt=proto
      Preview:CiQKBw2RYZVOGgAKBw2RYZVOGgAKBw2RYZVOGgAKBw0G7bv/GgA=
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:ASCII text, with very long lines (4962)
      Category:downloaded
      Size (bytes):5010
      Entropy (8bit):5.3247438309708635
      Encrypted:false
      SSDEEP:
      MD5:49864A8E125D378BCB2C452E5F949AB9
      SHA1:16813CF45B19A19293AE85ECC3D7E6E18F95E75C
      SHA-256:0ED4CE10806A4CFFBC0A283BEF8AD076EDF2D070A3F72979F825595790966EEE
      SHA-512:B375DFE76BDB7DC954CC68A451EE7AA166709A0735970DCFAA2B60EEEA3C7C83C1040288D96318131716A3B573DF2D1BD1A0803115784BD6E428F7EF2C97975A
      Malicious:false
      Reputation:unknown
      URL:https://url6.mailanyone.net/static/js/main.fbcc4ef1.chunk.js
      Preview:(this["webpackJsonpvp-webapp-clicksmart"]=this["webpackJsonpvp-webapp-clicksmart"]||[]).push([[0],{134:function(n,t,e){"use strict";function c(n){window.location.href=n}e.d(t,"a",(function(){return c})),e.d(t,"b",(function(){return r})),e.d(t,"c",(function(){return s}));var o=e(0),a=e(97);function r(n,t){Object(o.useEffect)((function(){!function(n,t){var e=a.a.t("URL Protection"),c=a.a.t("VIPRE Email Security");document.title="".concat(null!==n&&void 0!==n?n:e," | ").concat(null!==t&&void 0!==t?t:c)}(n,t)}),[n,t])}function s(n,t){var e=Object(o.useRef)(),c=Object(o.useRef)((function(){}));return Object(o.useEffect)((function(){e.current=n}),[n]),Object(o.useEffect)((function(){if(null!==t){var n=setInterval((function(){e.current&&e.current()}),t),o=function(){clearInterval(n)};return c.current=o,o}}),[t]),{clear:c.current}}},138:function(n,t,e){"use strict";var c;e.d(t,"a",(function(){return c})),function(n){n.INFO="INFO",n.WARNING="WARNING",n.DANGER="DANGER"}(c||(c={}))},207:function(
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:ASCII text, with very long lines (32830)
      Category:downloaded
      Size (bytes):33092
      Entropy (8bit):5.520365385545837
      Encrypted:false
      SSDEEP:
      MD5:9C6216C6DD941F047BDD850C9F1B1858
      SHA1:102070EC2CAF8522E1910967E24B7940B23FD032
      SHA-256:7C682C4C791C272EDE20B9224B7B3775815B4A2618F5C8A4D832BCFBFA5901E1
      SHA-512:4722D76A519AEF4CF5F575077B0C121C1964AC297C46EE57DC615D9D0502E25BE312DF28574E299DAC1B0C52F322F5323F8FFB0734249F010BCA3D5A44E552CA
      Malicious:false
      Reputation:unknown
      URL:https://cdn.forms.office.net/forms/scripts/dists/light-response-page.chunk.lrp_saveresponse.ec0e54a.js
      Preview:"use strict";(self.webpackChunk=self.webpackChunk||[]).push([[852],{61029:function(n,e,i){i.d(e,{iF:function(){return o}});var t=i(94290),r=i(48186);function o(n){var e=n.redirectURLAfterSignIn,i=n.idp,o=n.origin,a=n.authProvider,u=n.enableEmailHrd,d=void 0===u||u,s=window.location.origin,c=[];if(e){var l=encodeURIComponent(e);c.push("redirecturl=".concat(l))}(0,r.l)(i)||c.push("idp=".concat(i)),(0,r.l)(o)||c.push("origin=".concat(o)),(0,r.l)(a)||c.push("".concat(t.gx,"=").concat(a));var f=c.length?"/?".concat(c.join("&")):"";return d?"".concat(s).concat(f,"#Login=True"):"".concat(s).concat(f)}},92658:function(n,e,i){i.d(e,{b:function(){return r}});var t=i(68289),r=function(n){var e=void 0===n?{}:n,i=e.$tx,r=e.$rI,o=e.$sI,a=e.$fY,u=e.$hY,d=e.$hZ,s=e.$oO,c=e.$jq,l=e.$nz,f=e.$kD,g=e.$ut,p=e.$mR,_=e.$jQ,h=[];return i&&h.push("CollectionId=".concat(i)),r&&h.push("GroupId=".concat(r)),o&&h.push("Token=".concat(o)),c&&h.push("ResponseTime=".concat(c)),a&&h.push("SaveResponseFormId=".concat(a
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:ASCII text, with very long lines (15410)
      Category:downloaded
      Size (bytes):15666
      Entropy (8bit):5.457785849203604
      Encrypted:false
      SSDEEP:
      MD5:437BD08528316880055B3932EA44A98B
      SHA1:C1EBC6F5FE0FF8300BAE425747FEF199BFE0251E
      SHA-256:5B5C243367F22084728BB9399C500C47CFCD3309117834998006F666437E0FDE
      SHA-512:C86C70B8A843395A0C98272F985D10959E804D85005E3188BC7379F66B1086A61B03F51644644658AFC9EBA27B8ADFB8797C407C88E029C46C847F2725653CC3
      Malicious:false
      Reputation:unknown
      URL:https://cdn.forms.office.net/forms/scripts/dists/light-response-page.chunk.lrp_post.boot.abe0324.js
      Preview:"use strict";(self.webpackChunk=self.webpackChunk||[]).push([[537],{85708:function(n,e,r){function t(){return Date.now||(Date.now=function(){return(new Date).getTime()}),Math.floor(Date.now())}r.d(e,{dg:function(){return t}})},38264:function(n,e,r){r.r(e),r.d(e,{BrandingFooter:function(){return M}});var t=r(59312),o=r(69686),i=r(69065),a=r(80820),u=r(46411),c=r(35995),l=r(80098),f=r(28729),s=r(36082),d=r(262),p=r(51710),$=r(39886),_=r(15463),m=r(82610),g=r(58926),v=r(6700),h=r(49303),w=r(1521),b=r(8083),k=function(n,e){return function(r,t){var o=t();return r((0,b.n)("Branding.Footer.M365.Click",{isShare:(0,m.ET)(o),isPreview:(0,m.qM)(o),fullScreen:n,isFormRuntime:(0,w.Lx)(o),pageType:e}))}},y=r(457),x=r(96926),R=r(48978),N=r(10282),C=function(n,e,r,o,i){var u;return[{$r:{background:r,width:"100%","@media print":{background:s.s.$g,color:s.s.$h},paddingTop:0},$a:{width:"100%"},$cV:{width:"100%",lineHeight:"1.3",fontSize:12,color:s.s.$h,marginTop:0,marginBottom:4},$ka:{display:"inline-blo
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=24, height=2000, bps=0, PhotometricIntepretation=RGB, manufacturer=Canon, model=Canon EOS 5D Mark IV, orientation=upper-left, width=3000], baseline, precision 8, 3000x2000, components 3
      Category:downloaded
      Size (bytes):3611987
      Entropy (8bit):7.961280141407616
      Encrypted:false
      SSDEEP:
      MD5:83744CED106928C764E122466073FC82
      SHA1:5E21CA9564946CE45A127DEAC8CEE5755249CA60
      SHA-256:25665E5EC65C36F3D74DE2396426ECE141CEC0B211D0F03256C60A78765440E3
      SHA-512:900A729F63640A5C23CE8E477791288A709EE209118BA2C67432B582689BFB463418605EE604CFCE0C3C41424F4B5403726F06A771DCD5C10E8E21C0633BB2D1
      Malicious:false
      Reputation:unknown
      URL:https://lists.office.com/Images/d8de327a-9836-443f-8bbc-a1c10ff08dc0/eb11562e-522d-4b24-9aba-9ccfd6208373/TBF9GBPD5D5WJTF2T477PEKJCW/2d5cb202-71d3-44d4-9a71-fb5e67b6d803
      Preview:......JFIF.....,.,......Adobe.d.........Exif..MM.*.................................................................4...........:...................................P...........X.(...........1.....!...`.2...........;...........i...........0...........2...............................................1...........2.........$.4.........D.5.........V...b......Canon.Canon EOS 5D Mark IV...,.......,......Adobe Photoshop 23.5 (Macintosh)............................."...........'..................0231..............................................................................................................90..........90...................................................................................................................................h....!...........................2......................+01:00..+00:00..+00:00..343037001341.....2.......2....................EF50mm f/1.2L USM.0000408bf5.........................................(.........................................H......
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:ASCII text, with very long lines (35840)
      Category:downloaded
      Size (bytes):36078
      Entropy (8bit):5.315439343613727
      Encrypted:false
      SSDEEP:
      MD5:49C3B54BB2CF3D0E1FD6520AD8DFE210
      SHA1:40B4BA012D478CC9A26E952433E341D7C83DA98C
      SHA-256:2034C639A38F3180EF0C6ED04DB7A9C21B8E377DD25C0910C7C53EAF7DFCBC22
      SHA-512:6A282E5710E2EDFCE73242B9872ADD05B826DE852AA511F93304EFCA9B31D318D389094E2984E7CB30CBA662A99068424E5790BDF1C41B223586FA3007C7D033
      Malicious:false
      Reputation:unknown
      URL:https://cdn.forms.office.net/forms/scripts/dists/light-response-page.chunk.utel.ff9eaa5.js
      Preview:"use strict";(self.webpackChunk=self.webpackChunk||[]).push([[824],{85768:function(e,t,n){n.r(t),n.d(t,{initializeTelemetryLogger:function(){return be}});var i,a=n(92560),r=n(63061),s=n(60211),u=n(5809),o=function(e){for(var t=[],n=1;n<arguments.length;n++)t[n-1]=arguments[n]},l=n(73546),_=n(5699),m=n(59312),b=n(26261);!function(e){e.DataClassification={EssentialServiceMetadata:1,AccountData:2,SystemMetadata:4,OrganizationIdentifiableInformation:8,EndUserIdentifiableInformation:16,CustomerContent:32,AccessControl:64,PublicNonPersonalData:128,EndUserPseudonymousInformation:256,PublicPersonalData:512,SupportData:1024,DirectMeasurementData:2048,Everything:65535},e.DataFieldType={String:0,Boolean:1,Int64:2,Double:3,Guid:4},e.SamplingPolicy={NotSet:0,Measure:1,Diagnostics:2,CriticalBusinessImpact:191,CriticalCensus:192,CriticalExperimentation:193,CriticalUsage:194},e.PersistencePriority={NotSet:0,Normal:1,High:2},e.CostPriority={NotSet:0,Normal:1,High:2},e.DataCategories={NotSet:0,SoftwareS
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:JSON data
      Category:dropped
      Size (bytes):72
      Entropy (8bit):4.241202481433726
      Encrypted:false
      SSDEEP:
      MD5:9E576E34B18E986347909C29AE6A82C6
      SHA1:532C767978DC2B55854B3CA2D2DF5B4DB221C934
      SHA-256:88BDF5AF090328963973990DE427779F9C4DF3B8E1F5BADC3D972BAC3087006D
      SHA-512:5EF6DCFFD93434D45760888BF4B95FF134D53F34DA9DC904AD3C5EBEDC58409073483F531FEA4233869ED3EC75F38B022A70B2E179A5D3A13BDB10AB5C46B124
      Malicious:false
      Reputation:unknown
      Preview:{"Message":"The requested resource does not support http method 'GET'."}
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:ASCII text, with very long lines (785)
      Category:downloaded
      Size (bytes):1037
      Entropy (8bit):5.4582851873317955
      Encrypted:false
      SSDEEP:
      MD5:01EA5B9ACC3847601A8D0F1781AFE86E
      SHA1:4DD7F682FEC3AC077DCF8EF54096E38D0A08971E
      SHA-256:5E1396F3BCD0D5429B2709590895560F2DF7A39A1FBE9D9EF04E7884792AB09D
      SHA-512:64D3E083718EFDEB57573D9C3D513382E637104F0B135776AB7328B60804B8E771E38E29C7D413E1A3B91945E6DCCF8733B525C6D67F789B401B538484564A75
      Malicious:false
      Reputation:unknown
      URL:https://cdn.forms.office.net/forms/scripts/dists/light-response-page.chunk.lrp_copilot.0670f0f.js
      Preview:"use strict";(self.webpackChunk=self.webpackChunk||[]).push([[871],{56916:function(n,r,t){t.r(r),t.d(r,{LearningAssistantButton:function(){return A}});var u=t(69686),i=t(81762),e=t(15463),f=t(6700),c=t(58926),o=t(86353),l=t(90710),a=t(78435),s=t(82610),v=function(n){return!((0,l.t2)().testenv||(0,s.W7)(n)||(0,a.uV)())&&function(n){var r=(0,l.t2)();return r.copexp?"1"===r.copexp?1:"2"===r.copexp?2:"3"===r.copexp?3:"4"===r.copexp?4:0:n.$c.$g_?(0,o.Tl)().FormsCopilotExp:0}(n)>0},d=function(n){var r=function(n){var r=(0,l.t2)();return r.copilotlicense?"1"===r.copilotlicense:n.$pK.$kZ.$gC}(n);return r&&v(n)},g=function(n){return(0,c.hE)(n)&&d(n)&&n.$c.$bT},A=function(n){var r=(0,e.x)(f.$Q);return(0,e.x)(g)?u.createElement("div",null,u.createElement(i.z,null,r.pbacega)):null}}}]);..//# sourceMappingURL=https://artifacts.dev.azure.com/office/_apis/symbol/symsrv/light-response-page.chunk.lrp_copilot.0670f0f.js.map/1ec46c77f7dd58784e4d3a59e6fe3d4f6558a1d9839f6faf14a689e8f7930af7/light-response-
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:ASCII text, with very long lines (65536), with no line terminators
      Category:downloaded
      Size (bytes):72205
      Entropy (8bit):5.496014756937847
      Encrypted:false
      SSDEEP:
      MD5:0FAA99A885B63BF8324816AF1D7A175B
      SHA1:F1BBF3942411FB3C8B80C6A1DA8812304FC5B530
      SHA-256:A79A2C26A0354AB50476B0C741A347FA26889039A63CFE818C808ABAB09B216C
      SHA-512:38B2FFEA7EA16CA3EC00F97195E0F0682162F8FA4C0456669D862922F3760E932186389CFBF333CB9FC45F3966909494328B76CA05A48B1C412DE3F8817C0616
      Malicious:false
      Reputation:unknown
      URL:https://cdn.forms.office.net/forms/scripts/dists/light-response-page.chunk.lrp_cover.22fade3.js
      Preview:"use strict";(self.webpackChunk=self.webpackChunk||[]).push([[376],{86219:function(e,t,n){n.d(t,{l:function(){return o}});var i=n(35852);function o(e){for(var t=[],n=1;n<arguments.length;n++)t[n-1]=arguments[n];for(var o=[],r=0,_=t;r<_.length;r++){var a=_[r];a&&o.push("function"==typeof a?a(e):a)}return 1===o.length?o[0]:o.length?i.m.apply(void 0,o):{}}},82699:function(e,t,n){n.d(t,{j:function(){return _}});var i=n(65690),o=n(36178),r=n(49295);function _(e){var t=o.Y.getInstance(),n=(0,r.dH)((0,i.Eo)(),e);if(!t.classNameFromKey(n)){var _=t.getClassName();t.insertRule("@font-face{".concat(n,"}"),!0),t.cacheClassName(_,n,[],["font-face",n])}}},41633:function(e,t,n){n.d(t,{x:function(){return r}});var i={},o=void 0;try{o=window}catch(e){}function r(e,t){if(void 0!==o){var n=o.__packages__=o.__packages__||{};if(!n[e]||!i[e])i[e]=t,(n[e]=n[e]||[]).push(t)}}r("@fluentui/set-version","6.0.0")},20660:function(e,t,n){n.r(t),n.d(t,{AnimationClassNames:function(){return Y},AnimationStyles:functio
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:PNG image data, 490 x 180, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):5895
      Entropy (8bit):7.720248605671278
      Encrypted:false
      SSDEEP:
      MD5:311274C8C9C66E894F5AFA51FACD72CD
      SHA1:386D1FA0B2924DF2C21545CF2FF1DDE2CD985D33
      SHA-256:BC3C029408DAB6B5CB676B990B2E21BDD474E4B2E45DAF87E70210539390BF49
      SHA-512:2117BC16AC878BCC307CEA0DEFA0638800715330E83E9C8C1CAD7398BBF207E9432391B851E004308FB75C20C2D6F587D015FA3FB13F8630FE3E0C7E194979FC
      Malicious:false
      Reputation:unknown
      Preview:.PNG........IHDR.............[.o.....IDATx......U.....xi.#..l.%3J.t.D\If5h.......>.Ft.....].8f..A...(../....D..1b.%.9:1y.LD.3...~Y....?..........(.s....~.nh........................................................................................................................................................................@...6`.W.....z.m..z....@.:.`..e.agn..w[-..}O.L...Gf.h.V....Wlu......n.....ek...z...Z...lu..AMP..@P...........&... ..j..AMP..@P..............3f.X).K._.J..+....d...5A.t..c._...R6K.2....@P.6A=}...'O...WZ[[{....;~..w[..7.x9.....uR~-.....7GB..0a..e?.........S...R&.<..X.2..r..}.>.hii.]......Q.N.iL..]..>y.r.\.."..U.g..A......K....'....q.LP..o..O..-.l...{....{)...+.....\N...9...P.d..+....B.[.Z..d.....e>...#i~%D.8Y&.E...L..M.+..OX..J1...|.do&......9..+8.[......ady...P_.....m.....mA-.P...A......a.e.zW.w..EnbIX.3.j.....k....[..Y...q[.r4...xY.....+w.g....Sk\#F..;9&.....4....f...I.'X....n.r.$.APw.P.A....M..8=..).0_.h./...b.....g......e.S...
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:Unicode text, UTF-8 text, with very long lines (36802), with no line terminators
      Category:downloaded
      Size (bytes):36826
      Entropy (8bit):4.784953255851495
      Encrypted:false
      SSDEEP:
      MD5:83C5167228BD89135F9397462EB03D3F
      SHA1:B86A808A28F0EB68D3B32B7372C21588D3703AF1
      SHA-256:AC23890CF57171832DDE373895120A6141AC209931C2125F2B5DB7A32344D1F8
      SHA-512:DA5D56881ECD009DA56CAB73E52CC2F8AA95A6E9133FE5BB41A2B783D5A7EFA5AF0705C5773096FE2F9FA2A83FD82799C1C83215901EFC81F6EC8319B39189C1
      Malicious:false
      Reputation:unknown
      URL:https://cdn.forms.office.net/forms/scripts/dists/ls-response.en-us.5ed4bb200.js
      Preview:window.FormsLsMap = (window.FormsLsMap || {});window.FormsLsMap["en-us"]={"mdbicgo":"Required to answer","lbnbnjb":"Please share your comments here","jchpiio":"Help improve phishing detection","hkplpef":"It's not collecting sensitive info","lifjakb":"It needs to collect sensitive info","eackega":"Other","mnpehin":"Did this form trigger a false positive? Click to provide details.","amlalmd":"Why did you unblock this form?","acmngdo":"This user is not currently restricted from using Microsoft Forms. No further action is needed..","pdnfcop":"Correct","gplbmcp":"Print response","pfjnaob":"Required","dlogacb":"Pause background music","oancfdj":"Play background music","pjgjcee":"Pause live background","dplcjia":"Play live background","giamlmc":"Please select at least {0} options.","ggbmbok":"Please select at most {0} options.","mbpambh":"Please select {0} options.","dagpjbe":"1 - Poor","bcndghh":"2","oamcaon":"3","lhfhejf":"4","amdplne":"5 - Excellent","ifphmkc":"1 - Very dissatisfied","hh
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:ASCII text, with very long lines (34041)
      Category:downloaded
      Size (bytes):101666
      Entropy (8bit):5.420011181790742
      Encrypted:false
      SSDEEP:
      MD5:69B53C08ACFD81CB8659BB5193E96BBA
      SHA1:439AE06C71C6CE8C01AF6599E3F7CEB7C96900CF
      SHA-256:78537CEE7626C092BBB0ABE5749C3D07FC0C03FDDB3ECF770EBFDA6EAE395BD6
      SHA-512:0DDD047F0C8420A819971CAB5927EC6D3AD9939A79CADADBAEA44D410BF6F86AD83A1EC6DE82CE5353A021C6B5C7E2FABEF8749574CBA61300301665B7EED000
      Malicious:false
      Reputation:unknown
      URL:https://cdn.forms.office.net/forms/scripts/dists/light-response-page.chunk.utel_1ds.6255456.js
      Preview:"use strict";(self.webpackChunk=self.webpackChunk||[]).push([[173],{79966:function(n,t,r){r.d(t,{Z:function(){return L}});var e=r(49577),u=r(71106),i=r(40154),o=r(80403),f=r(39523),c=r(61746),a=r(18449),l=r(72480),v=r(52863),s=r(86969),d=r(90962),h=r(58398),p=500;function y(n,t,r){t&&(0,f.kJ)(t)&&t[l.R5]>0&&(t=t.sort((function(n,t){return n[s.yi]-t[s.yi]})),(0,f.tO)(t,(function(n){n[s.yi]<p&&(0,f._y)("Channel has invalid priority - "+n[l.pZ])})),n[l.MW]({queue:(0,f.FL)(t),chain:(0,d.jV)(t,r[l.TC],r)}))}var g=r(47151),m=r(45480),S=r(66450),T=function(n){function t(){var r,e,u=n.call(this)||this;function o(){r=0,e=[]}return u.identifier="TelemetryInitializerPlugin",u.priority=199,o(),(0,a.Z)(t,u,(function(n,t){n.addTelemetryInitializer=function(n){var t={id:r++,fn:n};return e[l.MW](t),{remove:function(){(0,f.tO)(e,(function(n,r){if(n.id===t.id)return e[l.cb](r,1),-1}))}}},n[s.hL]=function(t,r){for(var u=!1,o=e[l.R5],a=0;a<o;++a){var v=e[a];if(v)try{if(!1===v.fn[l.ZV](null,[t])){u=!0;brea
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:ASCII text, with very long lines (4357)
      Category:downloaded
      Size (bytes):4613
      Entropy (8bit):5.402120760063149
      Encrypted:false
      SSDEEP:
      MD5:241978B0B4C8BCABDA8FF326F467C8D1
      SHA1:73EAC513A8DCB62BFC73BE8545E39BB1E7FBB36F
      SHA-256:4215C5A8F72CB5FF5E97CF546D8E70DB0AE4E5AD4C5EFD165F10271EF6B30B96
      SHA-512:5929C7965113C40B978B1D3AD6D88D1DD96D7D8017FB33C0FBA041BC829E71342354C1AFCB14A4B4CD3FADDA9E66446F4747B5855EFD5FC8301B977CF9375E0C
      Malicious:false
      Reputation:unknown
      URL:https://cdn.forms.office.net/forms/scripts/dists/light-response-page.chunk.lrp_groupnote.dc3680c.js
      Preview:"use strict";(self.webpackChunk=self.webpackChunk||[]).push([[341],{64289:function(e,t,n){n.r(t),n.d(t,{GroupNoteResponsesView:function(){return w}});var i=n(59312),a=n(69686),o=n(35995),l=n(36082),r=n(51710),s=n(6700),c=n(40374),d=n(82610),p=n(56498),u=n(89397),_=n(39886),f=n(68258),h=function(e){var t=e.$rW,n=void 0===t?[]:t,i=e.$iE,r=void 0===i?[]:i,s=e.$_g,d=e.$pj,p=(0,o.d)((function(e){return{$a:{},$qL:{display:"block",width:e?"calc(100% - 30px)":"calc(100% - 40px)",margin:e?"0 15px":"0 20px"},$cf:{display:"block",width:"100%"},$qM:{display:"flex",justifyContent:"space-between",alignItems:"center",fontSize:12,fontWeight:600,lineHeight:"20px",color:l.s.$h,background:l.s.$B,height:e?25:32,width:"100%"},$pT:{width:"100%",padding:"0 10px",textOverflow:"ellipsis",whiteSpace:"nowrap",overflow:"hidden"},$to:{background:l.s.$g,maxHeight:e?90:120,overflowY:"auto",display:"block","::-webkit-scrollbar":{width:2},"::-webkit-scrollbar-thumb":{background:"#adadad",borderRadius:2}},$tR:{display:
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:ASCII text, with very long lines (33677)
      Category:downloaded
      Size (bytes):33722
      Entropy (8bit):5.505158473326853
      Encrypted:false
      SSDEEP:
      MD5:0A3A58F308CD683A742C13B16D3BC35B
      SHA1:1C175D968B6892D6B431B5F40309C844E654D580
      SHA-256:B0DDAAD28F9246458C037B59F4BA5620A8432C6BE41B10B235E36B42B665ECFA
      SHA-512:F7335935529D9517B1934E907B1F62AE7577AB091341F590B808D936AB610839F7D945CFCAC7A33FFA0ABEFCA91ADE98014BDF8259C180F8B328EC1F3C5BF0EC
      Malicious:false
      Reputation:unknown
      URL:https://url6.mailanyone.net/static/js/4.2245794f.chunk.js
      Preview:(this["webpackJsonpvp-webapp-clicksmart"]=this["webpackJsonpvp-webapp-clicksmart"]||[]).push([[4],{443:function(e,t,n){"use strict";var a=n(460);n.d(t,"AnalysisErrorCode",(function(){return a.a}));var c=n(461);n.o(c,"ScannerStep")&&n.d(t,"ScannerStep",(function(){return c.ScannerStep})),n.o(c,"Verdict")&&n.d(t,"Verdict",(function(){return c.Verdict}));var r=n(462);n.o(r,"ScannerStep")&&n.d(t,"ScannerStep",(function(){return r.ScannerStep})),n.o(r,"Verdict")&&n.d(t,"Verdict",(function(){return r.Verdict}));var i=n(463);n.o(i,"ScannerStep")&&n.d(t,"ScannerStep",(function(){return i.ScannerStep})),n.o(i,"Verdict")&&n.d(t,"Verdict",(function(){return i.Verdict}));var s=n(464);n.o(s,"ScannerStep")&&n.d(t,"ScannerStep",(function(){return s.ScannerStep})),n.o(s,"Verdict")&&n.d(t,"Verdict",(function(){return s.Verdict}));var o=n(465);n.d(t,"ScannerStep",(function(){return o.a}));var l=n(466);n.d(t,"Verdict",(function(){return l.a}))},460:function(e,t,n){"use strict";var a;n.d(t,"a",(function()
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:ASCII text, with very long lines (65536), with no line terminators
      Category:downloaded
      Size (bytes):81132
      Entropy (8bit):5.268395104711514
      Encrypted:false
      SSDEEP:
      MD5:A5AF6842BF26FC8A4BCB71E4FA55C0CA
      SHA1:6D297D38D8291F5BFC5582C6032597449ECC9250
      SHA-256:22F86A3F92002829B79768B323C877434B256A0B49C10CF370EA22B3B9336B36
      SHA-512:F293A29DF6F16839CB6BE585E887242AF7516D4F6067B66707F3926FDE8E81CC711444124C6659B1867AA6E5BF4D659753CAFCD1F101F24C89D3F8F3F5FC8AEB
      Malicious:false
      Reputation:unknown
      URL:https://url6.mailanyone.net/static/js/3.51e54426.chunk.js
      Preview:(this["webpackJsonpvp-webapp-clicksmart"]=this["webpackJsonpvp-webapp-clicksmart"]||[]).push([[3],{442:function(e,t,n){"use strict";var r=n(451),o=Object.prototype.toString;function a(e){return"[object Array]"===o.call(e)}function i(e){return"undefined"===typeof e}function s(e){return null!==e&&"object"===typeof e}function c(e){if("[object Object]"!==o.call(e))return!1;var t=Object.getPrototypeOf(e);return null===t||t===Object.prototype}function u(e){return"[object Function]"===o.call(e)}function l(e,t){if(null!==e&&"undefined"!==typeof e)if("object"!==typeof e&&(e=[e]),a(e))for(var n=0,r=e.length;n<r;n++)t.call(null,e[n],n,e);else for(var o in e)Object.prototype.hasOwnProperty.call(e,o)&&t.call(null,e[o],o,e)}e.exports={isArray:a,isArrayBuffer:function(e){return"[object ArrayBuffer]"===o.call(e)},isBuffer:function(e){return null!==e&&!i(e)&&null!==e.constructor&&!i(e.constructor)&&"function"===typeof e.constructor.isBuffer&&e.constructor.isBuffer(e)},isFormData:function(e){return"unde
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:HTML document, ASCII text, with very long lines (5844), with CRLF line terminators
      Category:downloaded
      Size (bytes):7914
      Entropy (8bit):4.4735908000780045
      Encrypted:false
      SSDEEP:
      MD5:56F9CD8A07135E776326431C8560F8F2
      SHA1:FCFF27C475A9FB014661B045B59C8BB4799A0392
      SHA-256:0E1D105D6EE902B7279AEFD9E8AF21AB3E5D0CF058332A2A0E53A351524C75E6
      SHA-512:E75E2B65828CDE51CA880AEE30A74A3EE04B25B0FC0D2AF5B4BB675B62B592CF12D284771A0CE0A8174295F93C4D9007DA5C407C65229456EC0F1A18A6C8EE28
      Malicious:false
      Reputation:unknown
      URL:https://forms.office.com/offline.aspx
      Preview:<!DOCTYPE html>....<html xmlns="http://www.w3.org/1999/xhtml" lang="en-us">..<head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1, viewport-fit=cover" />.. <title>Microsoft Forms</title>.. <style>.. * {.. box-sizing: border-box;.. }.... body {.. height: 100vh;.. margin: 0 auto;.. background-color: #f3f2f1;.. font-family: "Segoe UI", "Segoe UI Web (West European)", "Segoe UI", -apple-system, BlinkMacSystemFont, Roboto, "Helvetica Neue", sans-serif;.. }.... .content-root {.. height: 100%;.. display: flex;.. align-items: center;.. justify-content: center;.. padding: 20px;.. }.... .offline-message {.. max-width: 600px;.. }.... .offline-title {.. font-size: 32px;.. line-height: 40px;.. margin-top: 24px;.. }...
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:JSON data
      Category:downloaded
      Size (bytes):10268
      Entropy (8bit):5.344182812246649
      Encrypted:false
      SSDEEP:
      MD5:FADFFC64ABB9AE9CA111A9618F5411E1
      SHA1:F6D5357DA0214186406DA5F38C77A3672083146C
      SHA-256:44537C7E7D4C9820703A12BBA70F2C160DBFFCAED0BF75D728CFF92D3E3411A1
      SHA-512:5CCD67312513877857E15532C6D146913A00A26C672B81F9B84FE93F020B4FC330EA3FFE91CB10209ED8401999CBC0D99C4B41F73DDA3248797C292EC3373853
      Malicious:false
      Reputation:unknown
      URL:https://forms.office.com/formapi/api/d8de327a-9836-443f-8bbc-a1c10ff08dc0/users/eb11562e-522d-4b24-9aba-9ccfd6208373/light/runtimeFormsWithResponses('ejLe2DaYP0SLvKHBD_CNwC5WEestUiRLmrqcz9Ygg3NUQkY5R0JQRDVENVdKVEYyVDQ3N1BFS0pDVy4u')?$expand=questions($expand=choices)&$top=1
      Preview:{"responses":null,"form":{"description":"By completing this form you are requesting access to the Kier Supplier Portal. If you already have access you do not need to complete this form again as you will be able to access the portal using the credentials you previously provided.","onlineSafetyLevel":0,"reputationTier":1,"background":{"altText":"","contentType":"image/jpeg","fileIdentifier":"b19727c9-3802-4926-89bc-f1c993e3b350","originalFileName":"efae0c8e-4b52-47ef-afdb-c7628218315d","resourceId":"2d5cb202-71d3-44d4-9a71-fb5e67b6d803","resourceUrl":"https://lists.office.com/Images/d8de327a-9836-443f-8bbc-a1c10ff08dc0/eb11562e-522d-4b24-9aba-9ccfd6208373/TBF9GBPD5D5WJTF2T477PEKJCW/2d5cb202-71d3-44d4-9a71-fb5e67b6d803","height":null,"width":null,"size":null},"header":{"altText":null,"contentType":null,"fileIdentifier":null,"originalFileName":null,"resourceId":null,"resourceUrl":null,"height":null,"width":null,"size":null},"logo":{"altText":"","contentType":"image/png","fileIdentifier":"6
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:Unicode text, UTF-8 text, with very long lines (64406), with no line terminators
      Category:downloaded
      Size (bytes):403048
      Entropy (8bit):5.6117217283310845
      Encrypted:false
      SSDEEP:
      MD5:BF066D342AFC4B047FD505D2906F6083
      SHA1:EEB36AF2B285E7D508ED604568FA960C7FD39A4A
      SHA-256:E1A83A0B6A4FB947476ACD58268489B7F0A7AA2F23F0E7626E0466BD117637D5
      SHA-512:EA94BC8AF43332A27935993F889AF844A8E984502505BD4C0AC88B63CFDEEAC86D1931E314FE52944C4B7505104AB78D319E138B4C6FAB305B8947B3053985BB
      Malicious:false
      Reputation:unknown
      URL:https://cdn.forms.office.net/forms/scripts/dists/light-response-page.chunk.lrp_ext.8ec314f.js
      Preview:(self.webpackChunk=self.webpackChunk||[]).push([[920],{86219:function(n,t,e){"use strict";e.d(t,{l:function(){return i}});var r=e(35852);function i(n){for(var t=[],e=1;e<arguments.length;e++)t[e-1]=arguments[e];for(var i=[],o=0,a=t;o<a.length;o++){var u=a[o];u&&i.push("function"==typeof u?u(n):u)}return 1===i.length?i[0]:i.length?r.m.apply(void 0,i):{}}},82699:function(n,t,e){"use strict";e.d(t,{j:function(){return a}});var r=e(65690),i=e(36178),o=e(49295);function a(n){var t=i.Y.getInstance(),e=(0,o.dH)((0,r.Eo)(),n);if(!t.classNameFromKey(e)){var a=t.getClassName();t.insertRule("@font-face{".concat(e,"}"),!0),t.cacheClassName(a,e,[],["font-face",e])}}},41633:function(n,t,e){"use strict";e.d(t,{x:function(){return o}});var r={},i=void 0;try{i=window}catch(n){}function o(n,t){if(void 0!==i){var e=i.__packages__=i.__packages__||{};if(!e[n]||!r[n])r[n]=t,(e[n]=e[n]||[]).push(t)}}o("@fluentui/set-version","6.0.0")},20660:function(n,t,e){"use strict";e.r(t),e.d(t,{AnimationClassNames:funct
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:PNG image data, 800 x 299, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):27824
      Entropy (8bit):7.948905952079778
      Encrypted:false
      SSDEEP:
      MD5:050D03A66EC693F75AA599FD9259EC10
      SHA1:BDEB94C1C29451D8C41BC8477C74B3652E0E42F4
      SHA-256:407D9E82A1913AA8238EB4F53427BA7413C93D66229FE987C7FAACFE72001676
      SHA-512:E20C4CCE52CA093B949DAB6623945AEE8130EB08CB94668B99A94401608B973AD9F2927CF46A29D5F8FD0B6D638CA74EC93F2505B03CA262C53C1F9F089E895B
      Malicious:false
      Reputation:unknown
      Preview:.PNG........IHDR... ...+.....&(.....sRGB.........gAMA......a.....pHYs...%...%.IR$...lEIDATx^...V........... .t7.( J(..............tX( J..t( ..%0Cw....#.`.yN..Y....9.}.9g.}.{G..y..EQTP....$d,$..*.....B.!.&]"^..EQA...U.do.[....."..BH.a....`J.....e_....5.."..BH.a.....I..=.|.|.\k.+B.!.D.f@(...........rz.:]Q...%..BH.`.....)i......B.!.D......!k.y.;.e>.. ..B...`Q....*!.QV....|.B.!Q.......2.....w..6....B.!Q.........M_@.U.[N... ..B...P...M.|(.q..J"..BH...(.{Y...8g>8..B.I.p..EQ.._.c.&S..B.!$....EQ..2...U...!....3 .Ey#L8.R....3...*..B.!i.f@(.r_.|\y......T?..B.I..P..,.q]U9..2..p.I..BHZ.C.(.rM....U...m..!..BHZ.......9.QMN...Yf=.!..4.3 .E9/=..Z..Su9s......!....a...(g.....|....T5..B.!I0.BQ.#..@.......d.e..B.!.@.BQ.#.2..nE.#.|.B.!....`Q...........B.!.....EQ.I..k..xP...e..B.!..{...(*..2...R...!..ri...(*f.|.......;k.]{.j.N8'..B.%...(*f%.-+{`>.Jf>.!..BR..`Q......|.NH.I.. ..BH.a.......vuw.......B.!).....R.s..d...B.!....EQ......=....rN.!..Xa....K.s>........
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:HTML document, ASCII text, with very long lines (3999), with no line terminators
      Category:downloaded
      Size (bytes):3999
      Entropy (8bit):5.384768440412467
      Encrypted:false
      SSDEEP:
      MD5:CAB6057F3FB0BD14FDB154C9636F2ACD
      SHA1:DEE42B01B6C0C8C4244309249BED3DAC8A875CAF
      SHA-256:48CC5FBCA021072CF7BE4F476DDF522623AA9ABF483623E1722A92F074644324
      SHA-512:7363C7604577AB5FFFE08D60BCD92852FB9724B8B95A08D8CD910859EC17EE7C57ADFB7AA39B54344CA89C830E0EDD94776DA47D924AA389C48FEF5C6C7D814E
      Malicious:false
      Reputation:unknown
      URL:https://url6.mailanyone.net/scanner?m=1sMSYE-000BpK-6P&d=4%7Cmail%2F90%2F1719407400%2F1sMSYE-000BpK-6P%7Cin6f%7C57e1b682%7C27541238%7C12528278%7C667C154A9FC5035AC9CA7C89E1832E0F&o=%2Fphto%3A%2Fftsi.rmeffcsogm.csPaeo%2Fss%2FRPoneepx.agisp%3FeaDjd%3DYe2aeLBLP0_KHDSveCCNtWEsw5cLUi9rqzRmk3Yg5UQYgNEQR0VDVNJRDEdK3yVQVYDFN1y0pVBSu4&s=xQfh3THJ7SCnoLxuZpxlTyFZIos
      Preview:<!doctype html><html lang="en"><head><meta charset="utf-8"/><link rel="icon" href="/favicon.ico"/><meta name="viewport" content="width=device-width,initial-scale=1"/><meta name="theme-color" content="#000000"/><meta name="description" content="VIPRE Email Security URL Protection"/><title>URL Protection | VIPRE Email Security</title><link href="/static/css/main.2768b4bf.chunk.css" rel="stylesheet"></head><body><noscript>You need to enable JavaScript to run this app.</noscript><div id="root"></div><script>!function(e){function t(t){for(var n,o,c=t[0],i=t[1],l=t[2],f=0,p=[];f<c.length;f++)o=c[f],Object.prototype.hasOwnProperty.call(a,o)&&a[o]&&p.push(a[o][0]),a[o]=0;for(n in i)Object.prototype.hasOwnProperty.call(i,n)&&(e[n]=i[n]);for(s&&s(t);p.length;)p.shift()();return u.push.apply(u,l||[]),r()}function r(){for(var e,t=0;t<u.length;t++){for(var r=u[t],n=!0,o=1;o<r.length;o++){var i=r[o];0!==a[i]&&(n=!1)}n&&(u.splice(t--,1),e=c(c.s=r[0]))}return e}var n={},o={1:0},a={1:0},u=[];function c
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:PNG image data, 192 x 192, 8-bit colormap, non-interlaced
      Category:dropped
      Size (bytes):1779
      Entropy (8bit):7.589819392147309
      Encrypted:false
      SSDEEP:
      MD5:4150A5D4F2B0284A9E62D247929DD2AA
      SHA1:97CA2D9ECE8F0855B2A93E6BFDFC4883685C51CB
      SHA-256:F058653DCBA7E8B00D4BDB9409E06817F098AB18125CE5A5821520F04030D176
      SHA-512:D034378E76D58A899047B4639115102CC8F89AEF3F300DDAF0C0B3EAE40C8381040D1656109632E9095ED3F399218F196087D070C099FD89B9605DFBC34FB585
      Malicious:false
      Reputation:unknown
      Preview:.PNG........IHDR.............e..5....PLTE....pp......@...pp......8...jp...:...lp...6..9......mp...8...kp...6..8...lp.lp7..7...mp...7...lp...7...lp.......lp.lp.lp7......mp...7...lp...6..7...68.;=.@B.AC.IL.NQ.SV.X[.DF.JM.NP.UX.X[.]`._b.ei.fj.hl.il.lp.pt.y}.z}....os.os.rv....uy....hl.x|.{.....{..~..............MP.......sx..............................................ch..........io.......ou... ..!..".."..#..#..#..$..%..%..&..'..'..'..(..(..)..*..*..*..*..+..,..,..,..-........0..0..1..1..2..2..3..3..4..4..4..5..5..6..6..6..6..7..B..b....................1tRNS..... 000@PPP````pp...........................hX....sIDATx....{.E....(.9T@n.V@@"r..jLDR9.TlK...J....J.G-.j...vj..KS...fvwv.......k........n...B.!..B(..xjs.mX.p..W..)..1...I._m..@.2.....0.#..9_.....`[.C..../...q..i............Umd".....b;.[{..H..V..g*\...0T`.z+..X..O._!.....U.F.P)0....X...q....J.q...L....J."....x.....".W}~.Q...b~...,..'.2.#gZU.Q....1gJ7.j..81......K7..?.......i......5......x.o.g...Q..V..SZ.xe-..}..
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:ASCII text, with very long lines (917)
      Category:downloaded
      Size (bytes):1151
      Entropy (8bit):5.369908043108395
      Encrypted:false
      SSDEEP:
      MD5:436A7BC82156A644ED0206BFBC3A67BD
      SHA1:189C49265A47CBD4DDA7D86E785C9E9970C41F7E
      SHA-256:5E18809EF5C2DFEB8B35CB5CD230ED8C64CD04A564090761F24E5FB8F628C6CA
      SHA-512:CA54A7B2D60FC04D4E6D44287A1B5051DB9E843A10514142E1C79BA1091A9CB0DD1BBCCDFDEB5DF7BC845C648A5C0B798313D44A76ED48135BC64B0E1C0DEF35
      Malicious:false
      Reputation:unknown
      URL:https://cdn.forms.office.net/forms/scripts/dists/light-response-page.chunk.sw.a6ac500.js
      Preview:"use strict";(self.webpackChunk=self.webpackChunk||[]).push([[670],{70082:function(r,e,n){n.r(e),n.d(e,{register:function(){return f}});var t=n(59312),i=n(16586),s=n(9947),u=n(90710),c=n(55890),o=n(10836),a=n(78457);function f(r){return(0,t.mG)(this,void 0,void 0,(function(){var e,n;return(0,t.Jh)(this,(function(t){switch(t.label){case 0:return t.trys.push([0,5,,6]),(0,a.qI)()?(0,o.KA)("UnregisterServiceWorker")?[4,navigator.serviceWorker.getRegistrations().then((function(r){return Promise.all(r.map((function(r){return r.unregister()})))}))]:[3,2]:[2];case 1:return t.sent(),[2];case 2:return(0,o.KA)("ServiceWorkerEnabled")||"1"===(0,u.NW)().fsw?(e=r?"Business":(0,s.k0)().ring,[4,navigator.serviceWorker.register((0,i.wT)("/sw.js?ring=".concat(e)))]):[3,4];case 3:t.sent(),t.label=4;case 4:return[3,6];case 5:return n=t.sent(),(0,c.$U)("ServiceWorker.Registration.Error",n),[3,6];case 6:return[2]}}))}))}}}]);..//# sourceMappingURL=https://artifacts.dev.azure.com/office/_apis/symbol/symsrv/l
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:ASCII text, with very long lines (38720)
      Category:downloaded
      Size (bytes):492095
      Entropy (8bit):5.466650931231049
      Encrypted:false
      SSDEEP:
      MD5:21F734FCCA629262D15AAD29FD86222F
      SHA1:442210A2C49AC2C58D5CDE2BCB4B5FAF73A782E2
      SHA-256:7915056F793C3D1AC628CB659D1FA9502C30F3E540FE77CCA5CA6306490F4C37
      SHA-512:1F350C9778E3FC95CD63C38E91988E9B5C61DF645BFAD29B8CFB71C9FB357F2EBC11A70A94F857102350A428FE3EC39894F253CD3F98C3291050DF9CAECA8BA2
      Malicious:false
      Reputation:unknown
      URL:https://cdn.forms.office.net/forms/scripts/dists/light-response-page.min.1637ff3.js
      Preview:!function(){var n,t,r,e,i,o={65690:function(n,t,r){"use strict";function e(n){o!==n&&(o=n)}function i(){return void 0===o&&(o="undefined"!=typeof document&&!!document.documentElement&&"rtl"===document.documentElement.getAttribute("dir")),o}var o;function u(){return{rtl:i()}}r.d(t,{Eo:function(){return u},ok:function(){return e}}),o=i()},36178:function(n,t,r){"use strict";r.d(t,{Y:function(){return c},q:function(){return o}});var e,i=r(59312),o={none:0,insertNode:1,appendChild:2},u="undefined"!=typeof navigator&&/rv:11.0/.test(navigator.userAgent),a={};try{a=window||{}}catch(n){}var c=function(){function n(n,t){var r,e,u,a,c,f;this._rules=[],this._preservedRules=[],this._counter=0,this._keyToClassName={},this._onInsertRuleCallbacks=[],this._onResetCallbacks=[],this._classNameToArgs={},this._config=(0,i.pi)({injectionMode:"undefined"==typeof document?o.none:o.insertNode,defaultPrefix:"css",namespace:void 0,cspSettings:void 0},n),this._classNameToArgs=null!==(r=null==t?void 0:t.classNameT
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:MS Windows icon resource - 3 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
      Category:downloaded
      Size (bytes):15406
      Entropy (8bit):2.932954551863506
      Encrypted:false
      SSDEEP:
      MD5:9D62DCC244C0F3D88367A943BA4D4FED
      SHA1:5FC5EC953D4344422EB686B9FC61EA31CAED360E
      SHA-256:FDDF75D3376BB911DB3189AA149F508317799B10611438B23D688B89DB208DA7
      SHA-512:78CD9A7A2CDAFCC378A3CB1215325BE78D54A4459D5C4C7271DE617A272AAD10A951BD7F2EFE15EBF4E70A059420D988AC093C481AF02C788D864AA9E316DF22
      Malicious:false
      Reputation:unknown
      URL:https://url6.mailanyone.net/favicon.ico
      Preview:............ .h...6... .... .(.......00.... .h&......(....... ..... .....................................................................................................................C!!.........................................................U**.G%..H% Y....................................................I%..G$..G%..UU..............................................F##.H$..G$..H$..N''.............................................H%..G$..G$..H%..............................................G&!6H$..G$..H$..L"".............................................H$..G$..G$..H%..%q.%r.%r.'o.'............................G'.VG$..G$..G%..U**.$q.~$q..$q..$q..3f..........................H$..G$..G$..I$.b.... ...$q..$q..$q..&q.s........................G$..G$..H$..UU..........$q.M$q..$q..$q..'l......................H% YG$..G#.A................%r.$q..$q..$r..................`..f.V2$\.q..q..q..q..q.>|.)$r..$q..$q..%s.>........j..j..j..j..j..j..j..j..j..k.(s.$q..$q..%q..@....jv.j..
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:Java source, ASCII text, with very long lines (17610)
      Category:downloaded
      Size (bytes):110678
      Entropy (8bit):5.425859733908257
      Encrypted:false
      SSDEEP:
      MD5:07B98765F2550D83EEAEF5CB36A2E6A1
      SHA1:4F5CB9D05789079FA605E58546015C8A6969FFA6
      SHA-256:E86B0BF07871186DD32B20C7B4FD8E8729C717EABE73763847BE9CB091D348F7
      SHA-512:BBB2F8EFC7C12DF1B01DE74DF607B4E86CD6A5BF6FA6EC90C5D824D0D76E675616613040B578FE099AF5BE6FE728B919F014CAEE0DFA0E47714558DFD7AEFDE2
      Malicious:false
      Reputation:unknown
      URL:https://cdn.forms.office.net/forms/scripts/dists/light-response-page.chunk.1ds.a8079b3.js
      Preview:"use strict";(self.webpackChunk=self.webpackChunk||[]).push([[641],{28165:function(n,r,t){t.d(r,{Z:function(){return kn}});var e,u=t(49577),i=t(71106),o=t(80403),f=t(39523),c=t(40154),a=t(61746),l=t(79966),v=t(8823),s=t(93626),d=t(42256),p="locale",h="ver",y="name",g=(0,d.cc)({UserExt:[0,"user"],DeviceExt:[1,"device"],TraceExt:[2,"trace"],WebExt:[3,"web"],AppExt:[4,"app"],OSExt:[5,"os"],SdkExt:[6,"sdk"],IntWebExt:[7,"intweb"],UtcExt:[8,"utc"],LocExt:[9,"loc"],CloudExt:[10,"cloud"],DtExt:[11,"dt"]}),m=(0,d.cc)({id:[0,"id"],ver:[1,h],appName:[2,y],locale:[3,p],expId:[4,"expId"],env:[5,"env"]}),S=(0,d.cc)({domain:[0,"domain"],browser:[1,"browser"],browserVer:[2,"browserVer"],screenRes:[3,"screenRes"],userConsent:[4,"userConsent"],consentDetails:[5,"consentDetails"]}),w=(0,d.cc)({locale:[0,p],louserd:[1,"louserd"],id:[2,"id"]}),C=(0,d.cc)({osName:[0,y],ver:[1,h]}),T=(0,d.cc)({ver:[0,h],seq:[1,"seq"],installId:[2,"installId"],epoch:[3,"epoch"]}),b=(0,d.cc)({msfpc:[0,"msfpc"],anid:[1,"anid"]
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:ASCII text, with very long lines (43631)
      Category:downloaded
      Size (bytes):43797
      Entropy (8bit):5.3330082676730814
      Encrypted:false
      SSDEEP:
      MD5:72BC74DBD7E2D7EC8098628569C7C8D1
      SHA1:CF83D74066EF9F807DB72B7985522E44A9DBE68E
      SHA-256:6DD99733E4AF8728ABF32904C57D8B884D75D3424011EC2C9AA255D942A8BFF6
      SHA-512:CA933824BE7CB9863946B247B79CCDAF8168A7C9982336DB25A5A2FE8376DA69F1C9B88E8D8A770AD6049BA388579704D49383B7190325518906908BF3F68BF2
      Malicious:false
      Reputation:unknown
      URL:https://forms.office.com/sw.js?ring=Business
      Preview:!function(){"use strict";var e={487:function(){try{self["workbox:core:6.1.0"]&&_()}catch(e){}},403:function(){try{self["workbox:expiration:6.4.0"]&&_()}catch(e){}},295:function(){try{self["workbox:core:6.4.0"]&&_()}catch(e){}},372:function(){try{self["workbox:navigation-preload:6.1.0"]&&_()}catch(e){}},815:function(){try{self["workbox:routing:6.1.0"]&&_()}catch(e){}},445:function(){try{self["workbox:strategies:6.1.0"]&&_()}catch(e){}}},t={};function n(r){var s=t[r];if(void 0!==s)return s.exports;var o=t[r]={exports:{}};return e[r](o,o.exports,n),o.exports}!function(){n(487);n(372);function e(){return Boolean(self.registration&&self.registration.navigationPreload)}const t=(e,...t)=>{let n=e;return t.length>0&&(n+=` :: ${JSON.stringify(t)}`),n};class r extends Error{constructor(e,n){super(t(e,n)),this.name=e,this.details=n}}const s={googleAnalytics:"googleAnalytics",precache:"precache-v2",prefix:"workbox",runtime:"runtime",suffix:"undefined"!=typeof registration?registration.scope:""},o=
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:ASCII text, with very long lines (65381)
      Category:downloaded
      Size (bytes):998085
      Entropy (8bit):5.576577939716588
      Encrypted:false
      SSDEEP:
      MD5:09DA9BB121DA542023B5F979B2563EC9
      SHA1:0F7A6451BF5C787D2192733D47EFC834D0C03520
      SHA-256:C6ACA8412967F8FD804A0E4362A68C11822916E6F3A552956B8912D52A137A7F
      SHA-512:65184C7B988AEE7E9755FC8DE6D515527A240DF3E7DDAA247C1044AC1C6B28CEB22812545C0D2E6F03B3BA4803F58F21A14F9B3F1789D706A4500026C4A70BFF
      Malicious:false
      Reputation:unknown
      URL:https://cdn.forms.office.net/forms/scripts/dists/light-response-page.chunk.officebrowserfeedback.8d1c3f5.js
      Preview:(self.webpackChunk=self.webpackChunk||[]).push([[18],{55074:function(){./*! For license information please see officebrowserfeedback.min.js.LICENSE.txt */.!function(A){var t={};function n(r){if(t[r])return t[r].exports;var e=t[r]={i:r,l:!1,exports:{}};return A[r].call(e.exports,e,e.exports,n),e.l=!0,e.exports}n.m=A,n.c=t,n.d=function(A,t,r){n.o(A,t)||Object.defineProperty(A,t,{enumerable:!0,get:r})},n.r=function(A){"undefined"!=typeof Symbol&&Symbol.toStringTag&&Object.defineProperty(A,Symbol.toStringTag,{value:"Module"}),Object.defineProperty(A,"__esModule",{value:!0})},n.t=function(A,t){if(1&t&&(A=n(A)),8&t)return A;if(4&t&&"object"==typeof A&&A&&A.__esModule)return A;var r=Object.create(null);if(n.r(r),Object.defineProperty(r,"default",{enumerable:!0,value:A}),2&t&&"string"!=typeof A)for(var e in A)n.d(r,e,function(t){return A[t]}.bind(null,e));return r},n.n=function(A){var t=A&&A.__esModule?function(){return A.default}:function(){return A};return n.d(t,"a",t),t},n.o=function(A,t){r
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:MS Windows icon resource - 3 icons, 32x32, 32 bits/pixel, 24x24, 32 bits/pixel
      Category:downloaded
      Size (bytes):7886
      Entropy (8bit):3.973130033666625
      Encrypted:false
      SSDEEP:
      MD5:9425D8E9313A692BB3F022E8055FAB82
      SHA1:EDDCF3EA767D4C3042D01AC88594D7E795D8615C
      SHA-256:F2A1ABCF12EBD0F329E5B66B811B0BD76C8E954CB283CE3B61E72FBF459EF6F1
      SHA-512:93B3EB3C4CE385D80D4A8F6902355BBD156AC1AA20B8869AF05C8E714E90E74C5630BB8DE34D5B8FC9F876AC44BE314F3A2A08B3163295ADADBC6DD7B8D23561
      Malicious:false
      Reputation:unknown
      URL:https://cdn.forms.office.net/forms/images/favicon.ico
      Preview:...... .... .....6......... ............... .h...f...(... ...@..... .........................................................................................................................................................................................................................................................................................................................pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..................................pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..................................pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..................................ZV..ZV..ZV..ZV..ZV..ZV..ZV..ZV..^Z..pl..pl..pl..pl..................................|x..pl..pl..................................QN..QN..QN..QN..QN..QN..QN..QN..QN..c`..pl..pl..pl..................................|x..pl..pl............
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:Unicode text, UTF-8 text, with very long lines (65533), with no line terminators
      Category:downloaded
      Size (bytes):89423
      Entropy (8bit):5.054632846981616
      Encrypted:false
      SSDEEP:
      MD5:5ED8A5EC7C2F3373DAB40F406BE4E1E6
      SHA1:B28BAF01ED6D1017AACF302343E6C0C675D8127D
      SHA-256:E3526F688F0037EB9818B78E5096B7ED43AEC8D0A9A1CBEA6C7FEA39D812291D
      SHA-512:E6278C8F3961C16FBF963B4293C22FA504258112BFA3DF108B04BD5366E758515E268D5766493A684708854B6E02F0948D983C29E536FBC54E757D8649C4C27B
      Malicious:false
      Reputation:unknown
      URL:https://url6.mailanyone.net/static/css/main.2768b4bf.chunk.css
      Preview:.Toast_ToastContainer__3e1f-{position:fixed;z-index:2}.Toast_ToastContainer__3e1f- .Toast_Toast__1Ovpv{position:fixed;top:3.66rem;right:1rem;width:16.25rem;background-color:#ba2d0c;color:#fff;border-radius:0;border:0}.Toast_ToastContainer__3e1f- .Toast_ToastBody__JebBI{display:-webkit-flex;display:flex;padding:.625rem}.Toast_ToastContainer__3e1f- .Toast_Message__2sc2J{-webkit-flex:1 1;flex:1 1;font-size:.75rem;letter-spacing:-.011rem;text-align:left}.Toast_ToastContainer__3e1f- .Toast_CircleIcon__2DqTx{margin:.2rem .313rem}.Toast_ToastContainer__3e1f- .Toast_Close__2qAvD{display:-webkit-inline-flex;display:inline-flex;margin:.2rem .313rem;font-size:.74rem;padding:0;color:#fff;line-height:1rem;border:0}.Toast_ToastContainer__3e1f- .Toast_Close__2qAvD:hover{color:#fff;text-decoration:none}:root{--blue:#407198;--indigo:#6610f2;--purple:#6f42c1;--pink:#e83e8c;--red:#ba2d0c;--orange:#fd7e14;--yellow:#dd9600;--green:#3bb273;--teal:#20c997;--cyan:#17a2b8;--white:#fff;--gray:#6c757d;--gray-dar
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:ASCII text, with very long lines (6557)
      Category:downloaded
      Size (bytes):6602
      Entropy (8bit):4.8912701294467755
      Encrypted:false
      SSDEEP:
      MD5:8C2305C32BD61A9B135A4DCF8586132C
      SHA1:9A62FA2529608706730408FEDC64B61C9678F73C
      SHA-256:077674C2AD26D48610CA9886B0DD80373495ED8949965C3CB0D6B6F266162C0E
      SHA-512:2CBA5A610B9B9DA57137D8C4395DE88FBF55318E2E5C60C989A4384401291E0539746FB5A2E39CEC97442FD2634A80773461EE0BCC32AEA390E4286EFAB05492
      Malicious:false
      Reputation:unknown
      URL:https://url6.mailanyone.net/static/js/7.39b294be.chunk.js
      Preview:(this["webpackJsonpvp-webapp-clicksmart"]=this["webpackJsonpvp-webapp-clicksmart"]||[]).push([[7],{437:function(e){e.exports=JSON.parse('{"Ads":"Ads","Always navigate to a website by searching for the website\u2019s legitimate address rather than clicking a link in an email message.":"Always navigate to a website by searching for the website\u2019s legitimate address rather than clicking a link in an email message.","An error ocurred":"An error ocurred","and":"and","Blogs":"Blogs","Business":"Business","Categories Associated with this Website":"Categories Associated with this Website","Computers and Software":"Computers and Software","Connecting to server":"Connecting to server","Dating":"Dating","Deny Entry":"Deny Entry","Drugs":"Drugs","Education":"Education","Entertainment":"Entertainment","Error":"Error","Error: Invalid URL":"Error: Invalid URL","Error: URL Scanner is unavailable":"Error: URL Scanner is unavailable","Expanding link":"Expanding link","Extracting page features":"Extr
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:ASCII text, with very long lines (65462)
      Category:downloaded
      Size (bytes):423046
      Entropy (8bit):5.438572506520833
      Encrypted:false
      SSDEEP:
      MD5:FED72784CBCB19D9375B283B432D7B3B
      SHA1:3012BE15099BEE5AFC416D150C4616A0A418A8D0
      SHA-256:A9DBEF011641348EC3C7A812DD3EB4871E6C971A66870630D8641C56DE39AF69
      SHA-512:DDC9DCF5C63468694A1CD752DB8B1E2B2A7562DCF6BBEBFCEABEDFB2848FDA4496EFFC6923BA86BD5F0BB3A32B6044292167A97AC8E9330F84D42BF991160015
      Malicious:false
      Reputation:unknown
      URL:https://url6.mailanyone.net/static/js/2.fde2ca04.chunk.js
      Preview:/*! For license information please see 2.fde2ca04.chunk.js.LICENSE.txt */.(this["webpackJsonpvp-webapp-clicksmart"]=this["webpackJsonpvp-webapp-clicksmart"]||[]).push([[2],[function(e,t,n){"use strict";e.exports=n(420)},function(e,t,n){var r=n(3),o=n(18).f,i=n(24),a=n(20),u=n(106),c=n(147),s=n(68);e.exports=function(e,t){var n,l,f,p,d,h=e.target,v=e.global,g=e.stat;if(n=v?r:g?r[h]||u(h,{}):(r[h]||{}).prototype)for(l in t){if(p=t[l],f=e.noTargetGet?(d=o(n,l))&&d.value:n[l],!s(v?l:h+(g?".":"#")+l,e.forced)&&void 0!==f){if(typeof p===typeof f)continue;c(p,f)}(e.sham||f&&f.sham)&&i(p,"sham",!0),a(n,l,p,e)}}},function(e,t){e.exports=function(e){try{return!!e()}catch(t){return!0}}},function(e,t,n){(function(t){var n=function(e){return e&&e.Math==Math&&e};e.exports=n("object"==typeof globalThis&&globalThis)||n("object"==typeof window&&window)||n("object"==typeof self&&self)||n("object"==typeof t&&t)||function(){return this}()||Function("return this")()}).call(this,n(56))},function(e,t,n){e.ex
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:ASCII text, with very long lines (16094)
      Category:downloaded
      Size (bytes):38124
      Entropy (8bit):5.310312368406633
      Encrypted:false
      SSDEEP:
      MD5:F85DF0DB3B351E61F18DD9CA98A3C999
      SHA1:055AB43C220151E0C8B521A39D40DC54C50F988D
      SHA-256:5BEA34A1B8999FB53F5B3B8541BE6A2C6F8C75A8932BCB7A05E3FD5B91D78608
      SHA-512:1FB8F1989F9DD1F6C0C327F5B4808465F679793697EC486A7B18F2345DCF8DECDDCCFEEC65CC586B0F51E62BDD9C2EB035CE9C6CC23165F791181F4E0EB0DF0C
      Malicious:false
      Reputation:unknown
      URL:https://cdn.forms.office.net/forms/scripts/dists/dll-dompurify.min.bcf1a85.js
      Preview:var _dll_dompurify_e7d452d73246f470bc6d;(()=>{var t={699:function(t){./*! @license DOMPurify | (c) Cure53 and other contributors | Released under the Apache license 2.0 and Mozilla Public License 2.0 | github.com/cure53/DOMPurify/blob/2.2.2/LICENSE */.t.exports=function(){"use strict";function t(t){if(Array.isArray(t)){for(var e=0,n=Array(t.length);e<t.length;e++)n[e]=t[e];return n}return Array.from(t)}var e=Object.hasOwnProperty,n=Object.setPrototypeOf,o=Object.isFrozen,r=Object.freeze,i=Object.seal,s=Object.create,a="undefined"!=typeof Reflect&&Reflect,c=a.apply,l=a.construct;c||(c=function(t,e,n){return t.apply(e,n)}),r||(r=function(t){return t}),i||(i=function(t){return t}),l||(l=function(e,n){return new(Function.prototype.bind.apply(e,[null].concat(t(n))))});var u=T(Array.prototype.forEach),p=T(Array.prototype.pop),d=T(Array.prototype.push),f=T(String.prototype.toLowerCase),m=T(String.prototype.match),h=T(String.prototype.replace),y=T(String.prototype.indexOf),w=T(String.prototype
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:JSON data
      Category:downloaded
      Size (bytes):530
      Entropy (8bit):4.860983185588505
      Encrypted:false
      SSDEEP:
      MD5:4D945878F36DCBBF35C41B5BB6E5513E
      SHA1:786EDE7740452B1C38B1FFA47C28F4E70140EC5F
      SHA-256:19DADB739E9886DBDDC79E9E916B753AC53A2C8C1A9560EF14AF28B400C234E0
      SHA-512:37E16ACE0F5DF65065C150FB05E7968A5B3AA828F66EFDEF29DD78EF4C2D4B29D0C4F81502CDA069F1EFB0B0329FA69BC309579D74A447E2B7FE9E27AC9CCD99
      Malicious:false
      Reputation:unknown
      URL:https://forms.office.com/pwa/en-us/app.webmanifest
      Preview:{"lang":"en-us","name":"Microsoft Forms","short_name":"Forms","icons":[{"src":"https://cdn.forms.office.net/forms/images/pwa/forms-pwa-logo-192.png","sizes":"192x192","type":"image/png"},{"src":"https://cdn.forms.office.net/forms/images/pwa/forms-pwa-logo-256.png","sizes":"256x256","type":"image/png"},{"src":"https://cdn.forms.office.net/forms/images/pwa/forms-pwa-logo-512.png","sizes":"512x512","type":"image/png"}],"scope":"/","start_url":"/?pwa=1","display":"minimal-ui","theme_color":"#03787c","background_color":"#ffffff"}
      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
      File Type:ASCII text, with very long lines (8127)
      Category:downloaded
      Size (bytes):8176
      Entropy (8bit):5.354303077210023
      Encrypted:false
      SSDEEP:
      MD5:131871CE596EE77AA51129C134336F00
      SHA1:9BE571424EA29C4EA834981098C3924B6C19453A
      SHA-256:92C546D42EA275C73117FA125AF64A342BAC8E0E921EC11280861D905719BEB8
      SHA-512:C60FBC5BB31A6ACAD2FDFF5BC366E83FC772493B43B49A4A9AA4F4AF213673BB0F04781134A6ACDF11456DF6841A705DCCD5FB0979A94F7E75C09A89D487EBE5
      Malicious:false
      Reputation:unknown
      URL:https://url6.mailanyone.net/static/css/4.6f882ee5.chunk.css
      Preview:.FloatingCircle_FloatingCircleContainer__13Pwx{height:0}.FloatingCircle_FloatingCircle__1mZQc,.FloatingCircle_FloatingCircleContainer__13Pwx{display:-webkit-flex;display:flex;-webkit-justify-content:center;justify-content:center}.FloatingCircle_FloatingCircle__1mZQc{position:relative;overflow:hidden;border-radius:50%;box-shadow:0 3px 6px rgba(0,0,0,.161);z-index:1}.FloatingCircle_FloatingCircle__MD__3w-8L{top:-2.333rem;height:4.666rem;width:4.666rem}.FloatingCircle_FloatingCircle__LG__2ewqP{top:-3rem;height:6rem;width:6rem}.FloatingCircle_FloatingCircle__Icon__3stnW{display:-webkit-flex;display:flex;-webkit-align-items:center;align-items:center}.FloatingCircle_FloatingCircle__Icon__MD__2UABm{font-size:2.333rem}.FloatingCircle_FloatingCircle__Icon__LG__3JGnf{font-size:3rem}.FloatingCircle_FloatingCircleDanger__3anuh{background-color:#f2d9d3}.FloatingCircle_FloatingCircleDanger__3anuh .FloatingCircle_FloatingCircle__Icon__3stnW{color:#ba2d0c}.FloatingCircle_FloatingCircleWarning__3JlQ0{b
      No static file info