Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://forms.office.com/r/kiNP3VZaGz

Overview

General Information

Sample URL:https://forms.office.com/r/kiNP3VZaGz
Analysis ID:1480611

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected phishing page
HTML page contains hidden javascript code
Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 7132 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://forms.office.com/r/kiNP3VZaGz MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 6252 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1972,i,12408988132910888562,11453107777740882672,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

Phishing

barindex
Source: https://office.comLLM: Score: 8 brands: Microsoft Reasons: The URL 'https://office.com' itself is legitimate and belongs to Microsoft. However, the image shows a message with a link that points to 'shared.outlook.inky.com' and 'doni2.r.ag.d.sendinb3.com', which are suspicious and not associated with Microsoft's legitimate domains. The message uses social engineering techniques by urging the user to click on a link to review documents, which is a common phishing tactic. The presence of a long, complex URL with multiple parameters is also indicative of phishing attempts. DOM: 0.1.pages.csv
Source: https://shared.outlook.inky.com/link?domain=doni2.r.ag.d.sendibm3.com&t=h.eJwdj81KxDAYAF9lyVny1zahe1oUllWx4knXW5Lvaxs2TTRNFRHf3XbPAzPML1lyIPsdGUv5mPeMQYpe0kzNQIHOGMHbqaIuTWy6MBdYz-aRPf-496_TckwCX0p-O_vXDs6PTw_sk6v7ruN3c3dbkZsduWzqiCXloS9CaqW0YJPxsWA00eFhxOyLGfDbFMyzB7ymGrCmRS0F11Aboa1ylXFN2wBY1UjOxMqk5rWoabt18LqAIaSD69EuPsCq21wbhZXGJYS_f-UASxs.MEYCIQCvCLlElZCkfwy7gPUs8GTivO-PmsCMFaKO0XbRFFD7ggIhAJWeoOoRYloZX-LYlNX7u2XpAXq8wfafAlFXcFle5uAdHTTP Parser: Base64 decoded: netorgft1276671/maintenance@heritagewaterside.com/5dba9e72107d4a17b6c3ac595ddb6520/1721270414.9
Source: https://shared.outlook.inky.com/link?domain=doni2.r.ag.d.sendibm3.com&t=h.eJwdj81KxDAYAF9lyVny1zahe1oUllWx4knXW5Lvaxs2TTRNFRHf3XbPAzPML1lyIPsdGUv5mPeMQYpe0kzNQIHOGMHbqaIuTWy6MBdYz-aRPf-496_TckwCX0p-O_vXDs6PTw_sk6v7ruN3c3dbkZsduWzqiCXloS9CaqW0YJPxsWA00eFhxOyLGfDbFMyzB7ymGrCmRS0F11Aboa1ylXFN2wBY1UjOxMqk5rWoabt18LqAIaSD69EuPsCq21wbhZXGJYS_f-UASxs.MEYCIQCvCLlElZCkfwy7gPUs8GTivO-PmsCMFaKO0XbRFFD7ggIhAJWeoOoRYloZX-LYlNX7u2XpAXq8wfafAlFXcFle5uAdHTTP Parser: No favicon
Source: https://shared.outlook.inky.com/link?domain=doni2.r.ag.d.sendibm3.com&t=h.eJwdj81KxDAYAF9lyVny1zahe1oUllWx4knXW5Lvaxs2TTRNFRHf3XbPAzPML1lyIPsdGUv5mPeMQYpe0kzNQIHOGMHbqaIuTWy6MBdYz-aRPf-496_TckwCX0p-O_vXDs6PTw_sk6v7ruN3c3dbkZsduWzqiCXloS9CaqW0YJPxsWA00eFhxOyLGfDbFMyzB7ymGrCmRS0F11Aboa1ylXFN2wBY1UjOxMqk5rWoabt18LqAIaSD69EuPsCq21wbhZXGJYS_f-UASxs.MEYCIQCvCLlElZCkfwy7gPUs8GTivO-PmsCMFaKO0XbRFFD7ggIhAJWeoOoRYloZX-LYlNX7u2XpAXq8wfafAlFXcFle5uAdHTTP Parser: No favicon
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49752 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49756 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.85.23.86:443 -> 192.168.2.16:49761 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.85.23.86:443 -> 192.168.2.16:49781 version: TLS 1.2
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: global trafficDNS traffic detected: DNS query: forms.office.com
Source: global trafficDNS traffic detected: DNS query: cdn.forms.office.net
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: lists.office.com
Source: global trafficDNS traffic detected: DNS query: c.office.com
Source: global trafficDNS traffic detected: DNS query: shared.outlook.inky.com
Source: global trafficDNS traffic detected: DNS query: cdnjs.cloudflare.com
Source: global trafficDNS traffic detected: DNS query: protection.inkyphishfence.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49752 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49756 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.85.23.86:443 -> 192.168.2.16:49761 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.85.23.86:443 -> 192.168.2.16:49781 version: TLS 1.2
Source: classification engineClassification label: mal48.phis.win@15/39@28/208
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://forms.office.com/r/kiNP3VZaGz
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1972,i,12408988132910888562,11453107777740882672,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1972,i,12408988132910888562,11453107777740882672,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
https://forms.office.com/r/kiNP3VZaGz0%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
analysis-web-prod-960355706.us-east-1.elb.amazonaws.com
54.175.99.137
truefalse
    unknown
    cdnjs.cloudflare.com
    104.17.24.14
    truefalse
      unknown
      protection.inkyphishfence.com
      35.83.61.177
      truefalse
        unknown
        www.google.com
        142.250.186.164
        truefalse
          unknown
          forms.office.com
          unknown
          unknownfalse
            unknown
            shared.outlook.inky.com
            unknown
            unknowntrue
              unknown
              c.office.com
              unknown
              unknownfalse
                unknown
                cdn.forms.office.net
                unknown
                unknownfalse
                  unknown
                  lists.office.com
                  unknown
                  unknownfalse
                    unknown
                    NameMaliciousAntivirus DetectionReputation
                    https://forms.office.com/pages/responsepage.aspx?id=KzFSwls1akG2vY_Td4f0tIqXLFZ3mMxIn7PVUdbeRcZURE9KTjRaUERTVTNNTkdDRVdIRjJZSDVLVS4ufalse
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      104.17.24.14
                      cdnjs.cloudflare.comUnited States
                      13335CLOUDFLARENETUSfalse
                      1.1.1.1
                      unknownAustralia
                      13335CLOUDFLARENETUSfalse
                      13.107.21.237
                      unknownUnited States
                      8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                      74.125.133.84
                      unknownUnited States
                      15169GOOGLEUSfalse
                      52.111.243.106
                      unknownUnited States
                      8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                      52.231.230.148
                      unknownUnited States
                      8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                      51.104.15.252
                      unknownUnited Kingdom
                      8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                      20.189.173.4
                      unknownUnited States
                      8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                      13.107.6.194
                      unknownUnited States
                      8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                      35.83.61.177
                      protection.inkyphishfence.comUnited States
                      237MERIT-AS-14USfalse
                      142.250.185.110
                      unknownUnited States
                      15169GOOGLEUSfalse
                      52.88.176.153
                      unknownUnited States
                      16509AMAZON-02USfalse
                      239.255.255.250
                      unknownReserved
                      unknownunknownfalse
                      142.250.185.195
                      unknownUnited States
                      15169GOOGLEUSfalse
                      80.67.82.187
                      unknownEuropean Union
                      20940AKAMAI-ASN1EUfalse
                      13.74.129.1
                      unknownUnited States
                      8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                      142.250.186.164
                      www.google.comUnited States
                      15169GOOGLEUSfalse
                      172.217.16.195
                      unknownUnited States
                      15169GOOGLEUSfalse
                      172.217.16.142
                      unknownUnited States
                      15169GOOGLEUSfalse
                      54.175.99.137
                      analysis-web-prod-960355706.us-east-1.elb.amazonaws.comUnited States
                      14618AMAZON-AESUSfalse
                      52.1.240.90
                      unknownUnited States
                      14618AMAZON-AESUSfalse
                      IP
                      192.168.2.16
                      Joe Sandbox version:40.0.0 Tourmaline
                      Analysis ID:1480611
                      Start date and time:2024-07-24 21:07:33 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:defaultwindowsinteractivecookbook.jbs
                      Sample URL:https://forms.office.com/r/kiNP3VZaGz
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:14
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • EGA enabled
                      Analysis Mode:stream
                      Analysis stop reason:Timeout
                      Detection:MAL
                      Classification:mal48.phis.win@15/39@28/208
                      • Exclude process from analysis (whitelisted): svchost.exe
                      • Excluded IPs from analysis (whitelisted): 142.250.185.195, 13.107.6.194, 74.125.133.84, 172.217.16.142, 34.104.35.123, 80.67.82.187, 173.222.108.211, 52.111.243.106, 13.74.129.1, 13.107.21.237, 204.79.197.237, 2.19.126.137, 52.231.230.148, 20.189.173.4
                      • Excluded domains from analysis (whitelisted): b-0039.b-msedge.net, fs.microsoft.com, accounts.google.com, c-msn-com-nsatc.trafficmanager.net, c-bing-com.dual-a-0034.a-msedge.net, cdn.forms.office.net.edgesuite.net, ctldl.windowsupdate.com, clientservices.googleapis.com, browser.events.data.trafficmanager.net, a1894.dscms.akamai.net, browser.events.data.microsoft.com, onedscolprdwus03.westus.cloudapp.azure.com, clients2.google.com, edgedl.me.gvt1.com, prod.lists.office.com.akadns.net, c.bing.com, dual-a-0034.a-msedge.net, clients.l.google.com, forms.office.com.b-0039.b-msedge.net
                      • Not all processes where analyzed, report is missing behavior information
                      • VT rate limit hit for: https://forms.office.com/r/kiNP3VZaGz
                      InputOutput
                      URL: https://forms.office.com/pages/responsepage.aspx?id=KzFSwls1akG2vY_Td4f0tIqXLFZ3mMxIn7PVUdbeRcZURE9KTjRaUERTVTNNTkdDRVdIRjJZSDVLVS4u Model: Perplexity: mixtral-8x7b-instruct
                      {"loginform": false,"urgency": true,
                      Title: You have received 4 documents for your review OCR: You have received 4 documents for your review This message was sent to you to protect sensitive information. To review the shared document, simply click on the link below. https://shared.outlook.inky.com/link? d oma n = don i2. r.eg .d.sendibm3 co h.eJwdj81 KxDAYAF91yyny1 ze he 1 oLlllWx4knXW 5Lvaxs2TTRN FRHf3XbPAzPML1 lylE sdGUvSmPeMQYpeOkzNQlHOGMHbqaluTVVv6M3dYz-aRPf-496 TckwCXOe O vXDs6PTw sk6v7ruN3c3dbkZsduWzqlCXloS9CaqWOYJPxsWAOOeFhKOyLGfDbFMZymGrCmRSOF11Aboa1ylXFN2wBY IUjOxMqkSrWoabt18LqAIaSD69EuPsCq21wbhZXGJYS f-UASxs.MEYClQCvCLIElZCkfv.yZgPUs8GTivO- PmsCMFaKOOXbRFFD7gqlhAJWeoOoRYloZX-LYlNX7u2XpAXq8wfefAlFXcFleSuAd 
                      URL: https://forms.office.com/pages/responsepage.aspx?id=KzFSwls1akG2vY_Td4f0tIqXLFZ3mMxIn7PVUdbeRcZURE9KTjRaUERTVTNNTkdDRVdIRjJZSDVLVS4u Model: Perplexity: mixtral-8x7b-instruct
                      {"loginform": false,"urgency": true,"captcha": false,"reasons": ["The webpage contains a message that creates a sense of urgency by stating it was sent to protect sensitive information.","The text instructs the user to review the shared document by clicking on a link, which is a common method used in phishing attacks."]}
                      Title: You have received 4 documents for your review OCR: Microsoft You have received 4 documents for your review This message was sent to you to protect sensitive information. To review the shared document, simply click on the link below. https://shared.autlook.inky.com/link? do ma in = don i2 r .ag .d.sendib m3 co m h.eJwdj81 Kx DAYAF91yVny1 za he 1 llWx4knXW5Lvaxs2TTRNFRHf3XbPAzPML 1 lyJ_e sdGUvSmPeMQYpeOkzNQIHOGMHbqaIuTWy6M8dYz-aRPf-496 TckwCXOe O vXDs6PTw sk6v7ruN3c3dbkZsduWzqiCXloS9CaqWOYJPxsWAOOeFhxOyLGfDbFMZymGrCmRSOF1 IAbca1ylXFN2wBY IUjOxMqk5rWoabt18LqAIaSD69EuPsCq21wbhZXGJYS f-UASxs.MEYClOCvCLIElZCkfwu7gPUs8GTivO- PmsCMFaKOOXbR+D7gqIhAJWeoOoRYlaZX-LYlNX7u2XpAXq8wfafAlFXcFleSuAd 
                      URL: https://office.com Model: gpt-4o
                      ```json
                      {
                        "phishing_score": 8,
                        "brands": "Microsoft",
                        "phishing": true,
                        "suspicious_domain": true,
                        "has_prominent_loginform": false,
                        "has_captcha": false,
                        "setechniques": true,
                        "has_suspicious_link": true,
                        "legitmate_domain": "office.com",
                        "reasons": "The URL 'https://office.com' itself is legitimate and belongs to Microsoft. However, the image shows a message with a link that points to 'shared.outlook.inky.com' and 'doni2.r.ag.d.sendinb3.com', which are suspicious and not associated with Microsoft's legitimate domains. The message uses social engineering techniques by urging the user to click on a link to review documents, which is a common phishing tactic. The presence of a long, complex URL with multiple parameters is also indicative of phishing attempts."
                      }
                      URL: https://office.com Model: custom
                      {"phishing_score": 2, "brand_name": "Microsoft", "reasons": "The webpage appears to be a legitimate Microsoft document review message, with a legitimate domain 'office.com'. However, the link provided to 'https://sharedoutlook.info.com' is not a typical Microsoft service, and the design and content seem professional but not entirely consistent with Microsoft's usual style. Further investigation is recommended to confirm the legitimacy of the webpage and the link provided."}
                      URL: https://shared.outlook.inky.com/link?domain=doni2.r.ag.d.sendibm3.com&t=h.eJwdj81KxDAYAF9lyVny1zahe1oUllWx4knXW5Lvaxs2TTRNFRHf3XbPAzPML1lyIPsdGUv5mPeMQYpe0kzNQIHOGMHbqaIuTWy6MBdYz-aRPf-496_TckwCX0p-O_vXDs6PTw_sk6v7ruN3c3dbkZsduWzqiCXloS9CaqW0YJPxsWA00eFhx Model: Perplexity: mixtral-8x7b-instruct
                      {"loginform": false,"urgency": false,"captcha": false,"reasons": ["The webpage does not contain a login form, so there is no explicit request for sensitive information.","The text does not create a sense of urgency or interest, as it does not prompt the user to view, open, or click on anything.","There is no CAPTCHA or anti-robot detection mechanism present on the webpage."]}
                      Title: INKY: Link Protection OCR: GoDaddy Link Protection Powered by INKY You clicked a link in an email processed by INKY. The link will take you to: https://doni2.r.ag.d.sendibm3.com/... This link appears in a message that was reported as a phishing email. Report a Problem Your company's policy settings prohibit you from continuing to the original link destination. Do Not Proceed Learn more about INKY Screenshot of linked site: Rendering... Having trouble with this link? Click here to submit a feedback report about the related message. Be sure to note the problem in the comment field. 
                      URL: https://shared.outlook.inky.com/link?domain=doni2.r.ag.d.sendibm3.com&t=h.eJwdj81KxDAYAF9lyVny1zahe1oUllWx4knXW5Lvaxs2TTRNFRHf3XbPAzPML1lyIPsdGUv5mPeMQYpe0kzNQIHOGMHbqaIuTWy6MBdYz-aRPf-496_TckwCX0p-O_vXDs6PTw_sk6v7ruN3c3dbkZsduWzqiCXloS9CaqW0YJPxsWA00eFhx Model: Perplexity: mixtral-8x7b-instruct
                      {"loginform": false,"urgency": false,"captcha": false,"reasons": ["The webpage does not contain a login form, as there is no explicit request for sensitive information such as passwords, email addresses, usernames, phone numbers, or credit card numbers.","The text does not create a sense of urgency or interest, as it does not contain phrases such as 'Click here to view document', 'To view secured document click here', or 'Open the link to see your invoice'.","The webpage does not contain a CAPTCHA or anti-robot detection mechanism, as there is no challenge response test or puzzle to verify the user is human.","The title and text of the webpage indicate that the link was reported as a phishing email and has been blocked for safety reasons, suggesting that the webpage is a security measure implemented by INKY."]}
                      Title: INKY: Link Protection OCR: GoDaddy Link Protection Powered by INKY You clicked a link in an email processed by INKY. The link will take you to: https://doni2.r.ag.d.sendibm3.com/. This link appears in a message that was reported as a phishing email. Report a Problem Your company's policy settings prohibit you from continuing to the original link destination. Do Not Proceed Learn more about INKY Screenshot of linked site: We have found some suspicious activity in this client's account link had been blocked for your safety. We apologise for any inconvenience caused. 
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jul 24 18:08:03 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                      Category:dropped
                      Size (bytes):2673
                      Entropy (8bit):3.9828315292992107
                      Encrypted:false
                      SSDEEP:
                      MD5:7098F909F330583AC8B5645C96C42B73
                      SHA1:6601E48411D6044A12BCE604498995A5B557013D
                      SHA-256:652CA656ECF8CCDFC020639EDED34026B991B406D58283ED9C183EE6CAF70F44
                      SHA-512:997F66B03E3BC679FD46782394138566BC11541B2ADF78F0321CB7DFD550C13D79B4313CC3FF7E32C4973AE407F52C3F8D5D74EC2ADFED80CB62D20F17E054D0
                      Malicious:false
                      Reputation:unknown
                      Preview:L..................F.@.. ...$+.,.....3......N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............8......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jul 24 18:08:03 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                      Category:dropped
                      Size (bytes):2675
                      Entropy (8bit):3.9986056155726675
                      Encrypted:false
                      SSDEEP:
                      MD5:22CC3A738D39CFA2D4747E209EDDB301
                      SHA1:3475879097CC2680F467D0F986FA2A09942F3C6E
                      SHA-256:6C7DD8DCD28DCB409D0CAEC56F424CA27D32A6D351E35ED02392BA8A92AEC2E0
                      SHA-512:EBD098E081938B0229916559ABC4C295C73D7E756EC24E93997882A3BAA1DAC4B1843337708A06A5F5CB7204215B04B390E4F6470FC886FFDE57E0D2BD38A6D6
                      Malicious:false
                      Reputation:unknown
                      Preview:L..................F.@.. ...$+.,.....;......N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............8......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                      Category:dropped
                      Size (bytes):2689
                      Entropy (8bit):4.003081824259727
                      Encrypted:false
                      SSDEEP:
                      MD5:FF056DF51F824472A093B801ED58E138
                      SHA1:4DDAC2474BF06C8E6BED02E08ED861E5647ADE44
                      SHA-256:EA9983A1C5B84AADD387FF0522691000B2476329D3B24E433750C95B2093F932
                      SHA-512:3F75B4CA1E3B64FC245DA1DF3FCF52094A35264213E1373E162C0868E28C214033BC689D994A3AC7890D463237E2F7645E4B00F3F736879F3CFC73FBAE71F88A
                      Malicious:false
                      Reputation:unknown
                      Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............8......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jul 24 18:08:03 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                      Category:dropped
                      Size (bytes):2677
                      Entropy (8bit):3.995797842166788
                      Encrypted:false
                      SSDEEP:
                      MD5:C2BAF6627C29F0EEBAB92BCD466B1150
                      SHA1:FB297DE7CAE2DA1556582BAE124FA09547AE625C
                      SHA-256:D157F0C3CB784FF1E41975E8D491914517C998535D0661375F39B8DF9A8B291F
                      SHA-512:F25715A7B10428C7916A0A058E7E89D2DECDC9C936BFCB8CEEA2BB1D4EA89C11F5DB54E2DC613AF307EA22BDADBA484F2A108D4E979BB72E7E5891C091C49798
                      Malicious:false
                      Reputation:unknown
                      Preview:L..................F.@.. ...$+.,....9s......N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............8......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jul 24 18:08:03 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                      Category:dropped
                      Size (bytes):2677
                      Entropy (8bit):3.9863567409157046
                      Encrypted:false
                      SSDEEP:
                      MD5:61F3E8DCB63422DE12456F632A8A4058
                      SHA1:92B58DB79248F62893D7A8704206D1F6D707370E
                      SHA-256:0FC688139226F8959CAF371CCB1FDB6E228930FCFC063D9F52783EE030C25B48
                      SHA-512:B2F4E22D9830CD11B1624C25859914A2605C0ED69DC0B7516682BAB30B9BF840BED37D76FAD4FEB6BA4BE3420824C7779E0592A89DBE1E8AD4378289543475FD
                      Malicious:false
                      Reputation:unknown
                      Preview:L..................F.@.. ...$+.,............N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............8......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Jul 24 18:08:02 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                      Category:dropped
                      Size (bytes):2679
                      Entropy (8bit):3.9959764685637555
                      Encrypted:false
                      SSDEEP:
                      MD5:B264D5714486E47D8E456CBAD110C898
                      SHA1:BFAC5DB818230D04F084CB26CB12BA89F6297B86
                      SHA-256:1FA60C1135CF17A2A2A07F29DD4A5B695D4B1DDA1902A754ECE768362A499CEC
                      SHA-512:B8E1DC4F2F62AD8C46EA366D951BBC24721B010C61593BBEA114C68E13953223221B0D19304FA86AAF9663C1886D03994A8757EF61EC4CEEBCAABD3BF1B10D60
                      Malicious:false
                      Reputation:unknown
                      Preview:L..................F.@.. ...$+.,....8.......N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............8......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:PNG image data, 490 x 180, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):5895
                      Entropy (8bit):7.720248605671278
                      Encrypted:false
                      SSDEEP:
                      MD5:311274C8C9C66E894F5AFA51FACD72CD
                      SHA1:386D1FA0B2924DF2C21545CF2FF1DDE2CD985D33
                      SHA-256:BC3C029408DAB6B5CB676B990B2E21BDD474E4B2E45DAF87E70210539390BF49
                      SHA-512:2117BC16AC878BCC307CEA0DEFA0638800715330E83E9C8C1CAD7398BBF207E9432391B851E004308FB75C20C2D6F587D015FA3FB13F8630FE3E0C7E194979FC
                      Malicious:false
                      Reputation:unknown
                      Preview:.PNG........IHDR.............[.o.....IDATx......U.....xi.#..l.%3J.t.D\If5h.......>.Ft.....].8f..A...(../....D..1b.%.9:1y.LD.3...~Y....?..........(.s....~.nh........................................................................................................................................................................@...6`.W.....z.m..z....@.:.`..e.agn..w[-..}O.L...Gf.h.V....Wlu......n.....ek...z...Z...lu..AMP..@P...........&... ..j..AMP..@P..............3f.X).K._.J..+....d...5A.t..c._...R6K.2....@P.6A=}...'O...WZ[[{....;~..w[..7.x9.....uR~-.....7GB..0a..e?.........S...R&.<..X.2..r..}.>.hii.]......Q.N.iL..]..>y.r.\.."..U.g..A......K....'....q.LP..o..O..-.l...{....{)...+.....\N...9...P.d..+....B.[.Z..d.....e>...#i~%D.8Y&.E...L..M.+..OX..J1...|.do&......9..+8.[......ady...P_.....m.....mA-.P...A......a.e.zW.w..EnbIX.3.j.....k....[..Y...q[.r4...xY.....+w.g....Sk\#F..;9&.....4....f...I.'X....n.r.$.APw.P.A....M..8=..).0_.h./...b.....g......e.S...
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (65325)
                      Category:downloaded
                      Size (bytes):144879
                      Entropy (8bit):5.0500669044131135
                      Encrypted:false
                      SSDEEP:
                      MD5:3805916264DB554CBAF39C3E41EABBB8
                      SHA1:DC22511A3448492C214744C42F33684FA3040EFB
                      SHA-256:3AC95E1356F46C75A989981609EFF2CA248622336B5374A4D851D2AC73B79B40
                      SHA-512:0C51E8DB5073207293B222DF0F49F1BC8377C89E0635051F422A051BBC0A6502DB8C9572221E552D62C323D15E1B49738C67A98E9C01AD0C1638F0C1B3373C7F
                      Malicious:false
                      Reputation:unknown
                      URL:https://shared.outlook.inky.com/js/bootstrap/css/bootstrap.min.css
                      Preview:/*!. * Bootstrap v4.0.0 (https://getbootstrap.com). * Copyright 2011-2018 The Bootstrap Authors. * Copyright 2011-2018 Twitter, Inc.. * Licensed under MIT (https://github.com/twbs/bootstrap/blob/master/LICENSE). */:root{--blue:#007bff;--indigo:#6610f2;--purple:#6f42c1;--pink:#e83e8c;--red:#dc3545;--orange:#fd7e14;--yellow:#ffc107;--green:#28a745;--teal:#20c997;--cyan:#17a2b8;--white:#fff;--gray:#6c757d;--gray-dark:#343a40;--primary:#007bff;--secondary:#6c757d;--success:#28a745;--info:#17a2b8;--warning:#ffc107;--danger:#dc3545;--light:#f8f9fa;--dark:#343a40;--breakpoint-xs:0;--breakpoint-sm:576px;--breakpoint-md:768px;--breakpoint-lg:992px;--breakpoint-xl:1200px;--font-family-sans-serif:-apple-system,BlinkMacSystemFont,"Segoe UI",Roboto,"Helvetica Neue",Arial,sans-serif,"Apple Color Emoji","Segoe UI Emoji","Segoe UI Symbol";--font-family-monospace:SFMono-Regular,Menlo,Monaco,Consolas,"Liberation Mono","Courier New",monospace}*,::after,::before{box-sizing:border-box}html{font-family:sans
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (38720)
                      Category:downloaded
                      Size (bytes):495947
                      Entropy (8bit):5.468523278983575
                      Encrypted:false
                      SSDEEP:
                      MD5:659D299EB5C40524A1256F3947502D2A
                      SHA1:A7204AAC930097E65571091D5B235A94815BFB67
                      SHA-256:A4BB09710191F198AA5D20AFD53E20763E43517CDE5B9A6DB4CB0B2F78C33AC1
                      SHA-512:D4C97166618C7BA3C8FF39BDA37BA20ECEDE1775359F11E06B24C6E60A4A8E598EC0AFFFD16F65B39A4EC7898E5FDF86E4836E0FC62E0F8FE8D3BB825A5E4D50
                      Malicious:false
                      Reputation:unknown
                      URL:https://cdn.forms.office.net/forms/scripts/dists/light-response-page.min.d7db98c.js
                      Preview:!function(){var n,t,r,e,i,o={65690:function(n,t,r){"use strict";function e(n){o!==n&&(o=n)}function i(){return void 0===o&&(o="undefined"!=typeof document&&!!document.documentElement&&"rtl"===document.documentElement.getAttribute("dir")),o}var o;function u(){return{rtl:i()}}r.d(t,{Eo:function(){return u},ok:function(){return e}}),o=i()},36178:function(n,t,r){"use strict";r.d(t,{Y:function(){return c},q:function(){return o}});var e,i=r(59312),o={none:0,insertNode:1,appendChild:2},u="undefined"!=typeof navigator&&/rv:11.0/.test(navigator.userAgent),a={};try{a=window||{}}catch(n){}var c=function(){function n(n,t){var r,e,u,a,c,f;this._rules=[],this._preservedRules=[],this._counter=0,this._keyToClassName={},this._onInsertRuleCallbacks=[],this._onResetCallbacks=[],this._classNameToArgs={},this._config=(0,i.pi)({injectionMode:"undefined"==typeof document?o.none:o.insertNode,defaultPrefix:"css",namespace:void 0,cspSettings:void 0},n),this._classNameToArgs=null!==(r=null==t?void 0:t.classNameT
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):22
                      Entropy (8bit):3.6635327548042547
                      Encrypted:false
                      SSDEEP:
                      MD5:241E80D2B382F439094FB22EB80E20E2
                      SHA1:A116E2DF9B3901DB3A097DDBFD6EA31B2E357458
                      SHA-256:74BF058E89F4D51E6A860FBABEE81248F6F69A70CE57ED93188F85298C1CC5B9
                      SHA-512:65023D7263EDDBA56BA6A369F843EA80D6058F111187D0CB99ED6BC69D353022FA9F0E8BCEECF1DCC1012D9C4651D515B23FC22A5C44646AFA1BBE0C0C3361A3
                      Malicious:false
                      Reputation:unknown
                      Preview:405 Method Not Allowed
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:MS Windows icon resource - 3 icons, 32x32, 32 bits/pixel, 24x24, 32 bits/pixel
                      Category:dropped
                      Size (bytes):7886
                      Entropy (8bit):3.973130033666625
                      Encrypted:false
                      SSDEEP:
                      MD5:9425D8E9313A692BB3F022E8055FAB82
                      SHA1:EDDCF3EA767D4C3042D01AC88594D7E795D8615C
                      SHA-256:F2A1ABCF12EBD0F329E5B66B811B0BD76C8E954CB283CE3B61E72FBF459EF6F1
                      SHA-512:93B3EB3C4CE385D80D4A8F6902355BBD156AC1AA20B8869AF05C8E714E90E74C5630BB8DE34D5B8FC9F876AC44BE314F3A2A08B3163295ADADBC6DD7B8D23561
                      Malicious:false
                      Reputation:unknown
                      Preview:...... .... .....6......... ............... .h...f...(... ...@..... .........................................................................................................................................................................................................................................................................................................................pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..................................pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..................................pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..pl..................................ZV..ZV..ZV..ZV..ZV..ZV..ZV..ZV..^Z..pl..pl..pl..pl..................................|x..pl..pl..................................QN..QN..QN..QN..QN..QN..QN..QN..QN..c`..pl..pl..pl..................................|x..pl..pl............
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:HTML document, ASCII text, with very long lines (5844), with CRLF line terminators
                      Category:downloaded
                      Size (bytes):7914
                      Entropy (8bit):4.4735908000780045
                      Encrypted:false
                      SSDEEP:
                      MD5:56F9CD8A07135E776326431C8560F8F2
                      SHA1:FCFF27C475A9FB014661B045B59C8BB4799A0392
                      SHA-256:0E1D105D6EE902B7279AEFD9E8AF21AB3E5D0CF058332A2A0E53A351524C75E6
                      SHA-512:E75E2B65828CDE51CA880AEE30A74A3EE04B25B0FC0D2AF5B4BB675B62B592CF12D284771A0CE0A8174295F93C4D9007DA5C407C65229456EC0F1A18A6C8EE28
                      Malicious:false
                      Reputation:unknown
                      URL:https://forms.office.com/offline.aspx
                      Preview:<!DOCTYPE html>....<html xmlns="http://www.w3.org/1999/xhtml" lang="en-us">..<head>.. <meta charset="utf-8" />.. <meta name="viewport" content="width=device-width, initial-scale=1, viewport-fit=cover" />.. <title>Microsoft Forms</title>.. <style>.. * {.. box-sizing: border-box;.. }.... body {.. height: 100vh;.. margin: 0 auto;.. background-color: #f3f2f1;.. font-family: "Segoe UI", "Segoe UI Web (West European)", "Segoe UI", -apple-system, BlinkMacSystemFont, Roboto, "Helvetica Neue", sans-serif;.. }.... .content-root {.. height: 100%;.. display: flex;.. align-items: center;.. justify-content: center;.. padding: 20px;.. }.... .offline-message {.. max-width: 600px;.. }.... .offline-title {.. font-size: 32px;.. line-height: 40px;.. margin-top: 24px;.. }...
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:Unicode text, UTF-8 text, with very long lines (64406), with no line terminators
                      Category:downloaded
                      Size (bytes):397837
                      Entropy (8bit):5.614558573543636
                      Encrypted:false
                      SSDEEP:
                      MD5:6042242CEEF71D8C7C66374DCDBF2FAD
                      SHA1:B2CAE240BE15E72C78814DFC573E60C074B461D2
                      SHA-256:7993B25DB315A3117DAF6B7AB134570D717F4A634736428642D805E94DB444EB
                      SHA-512:964A27F0F18D974EC89C1C7461529773EF91701100A3A2B597398ABB7506E6971695EF1FF728E5A5DF8EC440B632ED9489BC78209BF4983F12693253288A26A1
                      Malicious:false
                      Reputation:unknown
                      URL:https://cdn.forms.office.net/forms/scripts/dists/light-response-page.chunk.lrp_ext.0cdbb3d.js
                      Preview:(self.webpackChunk=self.webpackChunk||[]).push([[920],{86219:function(n,t,e){"use strict";e.d(t,{l:function(){return i}});var r=e(35852);function i(n){for(var t=[],e=1;e<arguments.length;e++)t[e-1]=arguments[e];for(var i=[],o=0,a=t;o<a.length;o++){var u=a[o];u&&i.push("function"==typeof u?u(n):u)}return 1===i.length?i[0]:i.length?r.m.apply(void 0,i):{}}},82699:function(n,t,e){"use strict";e.d(t,{j:function(){return a}});var r=e(65690),i=e(36178),o=e(49295);function a(n){var t=i.Y.getInstance(),e=(0,o.dH)((0,r.Eo)(),n);if(!t.classNameFromKey(e)){var a=t.getClassName();t.insertRule("@font-face{".concat(e,"}"),!0),t.cacheClassName(a,e,[],["font-face",e])}}},40011:function(n,t,e){"use strict";e.r(t),e.d(t,{AnimationClassNames:function(){return K},AnimationStyles:function(){return W},AnimationVariables:function(){return q},ColorClassNames:function(){return xn},DefaultEffects:function(){return kn.r},DefaultFontStyles:function(){return Y.i},DefaultPalette:function(){return nn.U},EdgeChromiumH
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:PNG image data, 486 x 100, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):13548
                      Entropy (8bit):7.926082430996069
                      Encrypted:false
                      SSDEEP:
                      MD5:E45781541C32B43B90FCEF23900ABA52
                      SHA1:88D0EE8606CB59803540BA73BF707B6ED38B4D62
                      SHA-256:142055983F2B5E55F6BEF9F2F1AD2E2E5BFEB08C28024102F192E8D9D18987B7
                      SHA-512:F230D3DB0568A05A19BA29A778802CE86788EAFD881E744EDBC9490C4914202D90C5ED1C6EDCC85A48A53D87E16EF5169F33D1948969CD450B67CC623EFB1A26
                      Malicious:false
                      Reputation:unknown
                      Preview:.PNG........IHDR.......d.....S.......iCCPICC profile..(.}.=H.P..OS....v.q.P.,..8j..P!...:.....4$)...k........... ......"%..Z.x.%...sx.>@hT.fu...n..dB..V..+..@....,cN.R.{...,..?._.[.....0m....M..O.e%Y%>'.3..\W<~.\tY..Q3..'.....V:..L.x.8.j:..Y.U.[..J....o...+.\.5.$...."..PF.6...I.........K.R.U.#.... .~.7.=[.09.%..@...|...].Yw..c.i...g.Jo...`..z[.......u[S....`..M....B.x?.g...[.w.[k...@.f......."e....sn......%.r.0......bKGD..............pHYs.........B(.x....tIME........Fd... .IDATx..}y..U..{nuOf&...=.....d..e.. ..VE.A?...A.....S....Y.@.U. ..."[.....I..V.L..t.=.?.....LUuUO...3O&I.[..=..{.=.!e.............y-"..`j..`.!".....W..g..O.......dm.....D...u...........e.o0.B.....Z?.y.000000..JC.I).&...'......p?3....J...9 R.-...`7.;.r...W..c..{...*....... =......Z...8...i~...Dt....P(|......'.y..i_..........a?.......sOO.Z.J.Dt4j..F..p'..+.n..14...|........~....<.3lh````..`......*j.......B...P....3fL.T*.g.S..3.t/'.s\.......Al..8.:.|-.]..{^%.o..{...0..8.1.....k2.o.V....
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:PNG image data, 192 x 192, 8-bit colormap, non-interlaced
                      Category:downloaded
                      Size (bytes):1779
                      Entropy (8bit):7.589819392147309
                      Encrypted:false
                      SSDEEP:
                      MD5:4150A5D4F2B0284A9E62D247929DD2AA
                      SHA1:97CA2D9ECE8F0855B2A93E6BFDFC4883685C51CB
                      SHA-256:F058653DCBA7E8B00D4BDB9409E06817F098AB18125CE5A5821520F04030D176
                      SHA-512:D034378E76D58A899047B4639115102CC8F89AEF3F300DDAF0C0B3EAE40C8381040D1656109632E9095ED3F399218F196087D070C099FD89B9605DFBC34FB585
                      Malicious:false
                      Reputation:unknown
                      URL:https://cdn.forms.office.net/forms/images/pwa/forms-pwa-logo-192.png
                      Preview:.PNG........IHDR.............e..5....PLTE....pp......@...pp......8...jp...:...lp...6..9......mp...8...kp...6..8...lp.lp7..7...mp...7...lp...7...lp.......lp.lp.lp7......mp...7...lp...6..7...68.;=.@B.AC.IL.NQ.SV.X[.DF.JM.NP.UX.X[.]`._b.ei.fj.hl.il.lp.pt.y}.z}....os.os.rv....uy....hl.x|.{.....{..~..............MP.......sx..............................................ch..........io.......ou... ..!..".."..#..#..#..$..%..%..&..'..'..'..(..(..)..*..*..*..*..+..,..,..,..-........0..0..1..1..2..2..3..3..4..4..4..5..5..6..6..6..6..7..B..b....................1tRNS..... 000@PPP````pp...........................hX....sIDATx....{.E....(.9T@n.V@@"r..jLDR9.TlK...J....J.G-.j...vj..KS...fvwv.......k........n...B.!..B(..xjs.mX.p..W..)..1...I._m..@.2.....0.#..9_.....`[.C..../...q..i............Umd".....b;.[{..H..V..g*\...0T`.z+..X..O._!.....U.F.P)0....X...q....J.q...L....J."....x.....".W}~.Q...b~...,..'.2.#gZU.Q....1gJ7.j..81......K7..?.......i......5......x.o.g...Q..V..SZ.xe-..}..
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (917)
                      Category:downloaded
                      Size (bytes):1151
                      Entropy (8bit):5.369908043108395
                      Encrypted:false
                      SSDEEP:
                      MD5:436A7BC82156A644ED0206BFBC3A67BD
                      SHA1:189C49265A47CBD4DDA7D86E785C9E9970C41F7E
                      SHA-256:5E18809EF5C2DFEB8B35CB5CD230ED8C64CD04A564090761F24E5FB8F628C6CA
                      SHA-512:CA54A7B2D60FC04D4E6D44287A1B5051DB9E843A10514142E1C79BA1091A9CB0DD1BBCCDFDEB5DF7BC845C648A5C0B798313D44A76ED48135BC64B0E1C0DEF35
                      Malicious:false
                      Reputation:unknown
                      URL:https://cdn.forms.office.net/forms/scripts/dists/light-response-page.chunk.sw.a6ac500.js
                      Preview:"use strict";(self.webpackChunk=self.webpackChunk||[]).push([[670],{70082:function(r,e,n){n.r(e),n.d(e,{register:function(){return f}});var t=n(59312),i=n(16586),s=n(9947),u=n(90710),c=n(55890),o=n(10836),a=n(78457);function f(r){return(0,t.mG)(this,void 0,void 0,(function(){var e,n;return(0,t.Jh)(this,(function(t){switch(t.label){case 0:return t.trys.push([0,5,,6]),(0,a.qI)()?(0,o.KA)("UnregisterServiceWorker")?[4,navigator.serviceWorker.getRegistrations().then((function(r){return Promise.all(r.map((function(r){return r.unregister()})))}))]:[3,2]:[2];case 1:return t.sent(),[2];case 2:return(0,o.KA)("ServiceWorkerEnabled")||"1"===(0,u.NW)().fsw?(e=r?"Business":(0,s.k0)().ring,[4,navigator.serviceWorker.register((0,i.wT)("/sw.js?ring=".concat(e)))]):[3,4];case 3:t.sent(),t.label=4;case 4:return[3,6];case 5:return n=t.sent(),(0,c.$U)("ServiceWorker.Registration.Error",n),[3,6];case 6:return[2]}}))}))}}}]);..//# sourceMappingURL=https://artifacts.dev.azure.com/office/_apis/symbol/symsrv/l
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (65381)
                      Category:downloaded
                      Size (bytes):1047888
                      Entropy (8bit):5.580139495979613
                      Encrypted:false
                      SSDEEP:
                      MD5:C564160411AAF965390196580F51A60B
                      SHA1:2245231919BB4411FD4113623B03AD9C7A2B2FA6
                      SHA-256:4DBAB4824E1E974F381FDC73684D543C3564516695E551E68ABB768D09926FEA
                      SHA-512:5B101E894DC840007708B92F05C3516B220ADC82BA6CD0758C5BFAA45BF820A96B98DBF60760668E939E4778C3B38CDFD592F2BD8CE393883D7722ED215DA8D2
                      Malicious:false
                      Reputation:unknown
                      URL:https://cdn.forms.office.net/forms/scripts/dists/light-response-page.chunk.officebrowserfeedback.3ea5581.js
                      Preview:(self.webpackChunk=self.webpackChunk||[]).push([[18],{55074:function(){./*! For license information please see officebrowserfeedback.min.js.LICENSE.txt */.!function(A){var t={};function n(e){if(t[e])return t[e].exports;var r=t[e]={i:e,l:!1,exports:{}};return A[e].call(r.exports,r,r.exports,n),r.l=!0,r.exports}n.m=A,n.c=t,n.d=function(A,t,e){n.o(A,t)||Object.defineProperty(A,t,{enumerable:!0,get:e})},n.r=function(A){"undefined"!=typeof Symbol&&Symbol.toStringTag&&Object.defineProperty(A,Symbol.toStringTag,{value:"Module"}),Object.defineProperty(A,"__esModule",{value:!0})},n.t=function(A,t){if(1&t&&(A=n(A)),8&t)return A;if(4&t&&"object"==typeof A&&A&&A.__esModule)return A;var e=Object.create(null);if(n.r(e),Object.defineProperty(e,"default",{enumerable:!0,value:A}),2&t&&"string"!=typeof A)for(var r in A)n.d(e,r,function(t){return A[t]}.bind(null,r));return e},n.n=function(A){var t=A&&A.__esModule?function(){return A.default}:function(){return A};return n.d(t,"a",t),t},n.o=function(A,t){r
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (48664)
                      Category:dropped
                      Size (bytes):48946
                      Entropy (8bit):5.272823656458363
                      Encrypted:false
                      SSDEEP:
                      MD5:F1CDBCDFF1110FD2CB4A7CA2E21A46C3
                      SHA1:26F6E550860C459873826C48C4AA328270F9E631
                      SHA-256:7576CE986913286EE1CB56870A6475578E891EF149F34F5846AA69CDED5BD9DF
                      SHA-512:30B5DC96A9B7E4D336AC442AF381DF22EDFC551032370A995763A79FB8DFFD93CC033E98DED6835C076B998EDE86D4FF260F27F502D3472B09D481EA190C1D71
                      Malicious:false
                      Reputation:unknown
                      Preview:/*!. * Bootstrap v4.0.0 (https://getbootstrap.com). * Copyright 2011-2018 The Bootstrap Authors (https://github.com/twbs/bootstrap/graphs/contributors). * Licensed under MIT (https://github.com/twbs/bootstrap/blob/master/LICENSE). */.!function(t,e){"object"==typeof exports&&"undefined"!=typeof module?e(exports,require("jquery"),require("popper.js")):"function"==typeof define&&define.amd?define(["exports","jquery","popper.js"],e):e(t.bootstrap={},t.jQuery,t.Popper)}(this,function(t,e,n){"use strict";function i(t,e){for(var n=0;n<e.length;n++){var i=e[n];i.enumerable=i.enumerable||!1,i.configurable=!0,"value"in i&&(i.writable=!0),Object.defineProperty(t,i.key,i)}}function s(t,e,n){return e&&i(t.prototype,e),n&&i(t,n),t}function r(){return(r=Object.assign||function(t){for(var e=1;e<arguments.length;e++){var n=arguments[e];for(var i in n)Object.prototype.hasOwnProperty.call(n,i)&&(t[i]=n[i])}return t}).apply(this,arguments)}e=e&&e.hasOwnProperty("default")?e.default:e,n=n&&n.hasOwnProp
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:Unicode text, UTF-8 text, with very long lines (36666), with no line terminators
                      Category:dropped
                      Size (bytes):36690
                      Entropy (8bit):4.7841273699103635
                      Encrypted:false
                      SSDEEP:
                      MD5:5135460DFF8069CB1B7A3197E1466AE6
                      SHA1:F345A7BB34BAA50E43260704701787ACDF63100B
                      SHA-256:8010D98B29A4FA40F4837B87DC6BE9F760929BB0E15B99794D3393991940EAF8
                      SHA-512:ED6E37E6F776ABDA9058FD0E95DC12E144C514FA826F9357CC256E055D06550077D54030F2E2DBC54A8F01752DBA92AABE52759E76F61C9A9255295D301CC72F
                      Malicious:false
                      Reputation:unknown
                      Preview:window.FormsLsMap = (window.FormsLsMap || {});window.FormsLsMap["en-us"]={"mdbicgo":"Required to answer","lbnbnjb":"Please share your comments here","jchpiio":"Help improve phishing detection","hkplpef":"It's not collecting sensitive info","lifjakb":"It needs to collect sensitive info","eackega":"Other","mnpehin":"Did this form trigger a false positive? Click to provide details.","amlalmd":"Why did you unblock this form?","acmngdo":"This user is not currently restricted from using Microsoft Forms. No further action is needed..","pdnfcop":"Correct","gplbmcp":"Print response","pfjnaob":"Required","dlogacb":"Pause background music","oancfdj":"Play background music","pjgjcee":"Pause live background","dplcjia":"Play live background","giamlmc":"Please select at least {0} options.","ggbmbok":"Please select at most {0} options.","mbpambh":"Please select {0} options.","dagpjbe":"1 - Poor","bcndghh":"2","oamcaon":"3","lhfhejf":"4","amdplne":"5 - Excellent","ifphmkc":"1 - Very dissatisfied","hh
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:Java source, ASCII text, with very long lines (17610)
                      Category:dropped
                      Size (bytes):110678
                      Entropy (8bit):5.425859733908257
                      Encrypted:false
                      SSDEEP:
                      MD5:07B98765F2550D83EEAEF5CB36A2E6A1
                      SHA1:4F5CB9D05789079FA605E58546015C8A6969FFA6
                      SHA-256:E86B0BF07871186DD32B20C7B4FD8E8729C717EABE73763847BE9CB091D348F7
                      SHA-512:BBB2F8EFC7C12DF1B01DE74DF607B4E86CD6A5BF6FA6EC90C5D824D0D76E675616613040B578FE099AF5BE6FE728B919F014CAEE0DFA0E47714558DFD7AEFDE2
                      Malicious:false
                      Reputation:unknown
                      Preview:"use strict";(self.webpackChunk=self.webpackChunk||[]).push([[641],{28165:function(n,r,t){t.d(r,{Z:function(){return kn}});var e,u=t(49577),i=t(71106),o=t(80403),f=t(39523),c=t(40154),a=t(61746),l=t(79966),v=t(8823),s=t(93626),d=t(42256),p="locale",h="ver",y="name",g=(0,d.cc)({UserExt:[0,"user"],DeviceExt:[1,"device"],TraceExt:[2,"trace"],WebExt:[3,"web"],AppExt:[4,"app"],OSExt:[5,"os"],SdkExt:[6,"sdk"],IntWebExt:[7,"intweb"],UtcExt:[8,"utc"],LocExt:[9,"loc"],CloudExt:[10,"cloud"],DtExt:[11,"dt"]}),m=(0,d.cc)({id:[0,"id"],ver:[1,h],appName:[2,y],locale:[3,p],expId:[4,"expId"],env:[5,"env"]}),S=(0,d.cc)({domain:[0,"domain"],browser:[1,"browser"],browserVer:[2,"browserVer"],screenRes:[3,"screenRes"],userConsent:[4,"userConsent"],consentDetails:[5,"consentDetails"]}),w=(0,d.cc)({locale:[0,p],louserd:[1,"louserd"],id:[2,"id"]}),C=(0,d.cc)({osName:[0,y],ver:[1,h]}),T=(0,d.cc)({ver:[0,h],seq:[1,"seq"],installId:[2,"installId"],epoch:[3,"epoch"]}),b=(0,d.cc)({msfpc:[0,"msfpc"],anid:[1,"anid"]
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (43713)
                      Category:downloaded
                      Size (bytes):43879
                      Entropy (8bit):5.333266774072824
                      Encrypted:false
                      SSDEEP:
                      MD5:AD31EBD0F122EDE0819AC000BE74928A
                      SHA1:5E91899E86D2344572302FFBB1144266D62FE31D
                      SHA-256:687B9467BE63F6953758932C144F4899FAA22C97A40F6048BB41BB4150C3BB29
                      SHA-512:A5C17A29305F47754D8D1B0325D56A1D1F4959D6EA41A7D38044C98635CE4C437FED35EEA58C697B4E38530812D3EE50DF6513ACC636AE9842BD6F1D611CA02C
                      Malicious:false
                      Reputation:unknown
                      URL:https://forms.office.com/sw.js?ring=Business
                      Preview:!function(){"use strict";var e={487:function(){try{self["workbox:core:6.1.0"]&&_()}catch(e){}},403:function(){try{self["workbox:expiration:6.4.0"]&&_()}catch(e){}},295:function(){try{self["workbox:core:6.4.0"]&&_()}catch(e){}},372:function(){try{self["workbox:navigation-preload:6.1.0"]&&_()}catch(e){}},815:function(){try{self["workbox:routing:6.1.0"]&&_()}catch(e){}},445:function(){try{self["workbox:strategies:6.1.0"]&&_()}catch(e){}}},t={};function n(r){var s=t[r];if(void 0!==s)return s.exports;var o=t[r]={exports:{}};return e[r](o,o.exports,n),o.exports}!function(){n(487);n(372);function e(){return Boolean(self.registration&&self.registration.navigationPreload)}const t=(e,...t)=>{let n=e;return t.length>0&&(n+=` :: ${JSON.stringify(t)}`),n};class r extends Error{constructor(e,n){super(t(e,n)),this.name=e,this.details=n}}const s={googleAnalytics:"googleAnalytics",precache:"precache-v2",prefix:"workbox",runtime:"runtime",suffix:"undefined"!=typeof registration?registration.scope:""},o=
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (15587)
                      Category:dropped
                      Size (bytes):15843
                      Entropy (8bit):5.462880458471394
                      Encrypted:false
                      SSDEEP:
                      MD5:0E7DE855FFF446AE488BA22CCD846DA7
                      SHA1:6E81D9DB48D5C0FBF8B3DE30E9C9AE6ED6DAAC59
                      SHA-256:4FC06DD568E14316505117B0363CA7A40C8C61B2F292DF7E4CB067F390546338
                      SHA-512:56366475D7D04AE8C940708D7735EC56994845E7938F42C97EC669BD8B6ACABD8478B16DB1A8FB1BA5BB36D49E7701A1C99D3412A66E8C443AA0E0835B424F0F
                      Malicious:false
                      Reputation:unknown
                      Preview:"use strict";(self.webpackChunk=self.webpackChunk||[]).push([[537],{85708:function(n,e,r){function t(){return Date.now||(Date.now=function(){return(new Date).getTime()}),Math.floor(Date.now())}r.d(e,{dg:function(){return t}})},38264:function(n,e,r){r.r(e),r.d(e,{BrandingFooter:function(){return M}});var t=r(59312),o=r(69686),i=r(69065),a=r(80820),u=r(46411),c=r(35995),l=r(80098),f=r(28729),s=r(36082),d=r(262),p=r(51710),$=r(39886),_=r(15463),g=r(82610),m=r(58926),v=r(6700),h=r(49303),w=r(1521),b=r(8083),k=function(n,e){return function(r,t){var o=t();return r((0,b.n)("Branding.Footer.M365.Click",{isShare:(0,g.ET)(o),isPreview:(0,g.qM)(o),fullScreen:n,isFormRuntime:(0,w.Lx)(o),pageType:e}))}},y=r(457),x=r(96926),R=r(48978),T=r(10282),C=function(n,e,r,o,i){var u;return[{$t:{background:r,width:"100%","@media print":{background:s.s.$g,color:s.s.$h},paddingTop:0},$a:{width:"100%"},$dh:{width:"100%",lineHeight:"1.3",fontSize:12,color:s.s.$h,marginTop:0,marginBottom:4},$kU:{display:"inline-blo
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (4247)
                      Category:dropped
                      Size (bytes):4277
                      Entropy (8bit):5.32823797886385
                      Encrypted:false
                      SSDEEP:
                      MD5:545405225C13B2F42AB103FCA31A49B1
                      SHA1:F91E2B661F4FEB976B5E260BDC2366763AD13562
                      SHA-256:3E27AA13441D103329A705EB4F349942BEAD5855F75B92A4C91572175CCDDDE8
                      SHA-512:36C0D07C15DEE0F427F05509CED4F7E8D5D08974229BC505601DDE2A67A2FB3FC4BF698C68D8049617314905A8AD89F7C32701DB3E25ED4F0157F90E2920E362
                      Malicious:false
                      Reputation:unknown
                      Preview:// http://spin.js.org/#v2.3.2.!function(a,b){"object"==typeof module&&module.exports?module.exports=b():"function"==typeof define&&define.amd?define(b):a.Spinner=b()}(this,function(){"use strict";function a(a,b){var c,d=document.createElement(a||"div");for(c in b)d[c]=b[c];return d}function b(a){for(var b=1,c=arguments.length;c>b;b++)a.appendChild(arguments[b]);return a}function c(a,b,c,d){var e=["opacity",b,~~(100*a),c,d].join("-"),f=.01+c/d*100,g=Math.max(1-(1-a)/b*(100-f),a),h=j.substring(0,j.indexOf("Animation")).toLowerCase(),i=h&&"-"+h+"-"||"";return m[e]||(k.insertRule("@"+i+"keyframes "+e+"{0%{opacity:"+g+"}"+f+"%{opacity:"+a+"}"+(f+.01)+"%{opacity:1}"+(f+b)%100+"%{opacity:"+a+"}100%{opacity:"+g+"}}",k.cssRules.length),m[e]=1),e}function d(a,b){var c,d,e=a.style;if(b=b.charAt(0).toUpperCase()+b.slice(1),void 0!==e[b])return b;for(d=0;d<l.length;d++)if(c=l[d]+b,void 0!==e[c])return c}function e(a,b){for(var c in b)a.style[d(a,c)||c]=b[c];return a}function f(a){for(var b=1;b<argu
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (4357)
                      Category:downloaded
                      Size (bytes):4613
                      Entropy (8bit):5.4143059450904705
                      Encrypted:false
                      SSDEEP:
                      MD5:9D4BF31F49BDD6CB3552D381479237F9
                      SHA1:E3FE5F574ACC987FE6E22339C651A2379D8D3908
                      SHA-256:182D9F8393689F954CA36AE4BAA3EEC4E8B038C3EDE238D19A2F93EC1BBEB21A
                      SHA-512:B4E704E447CC6F2EA5AF371E40DE8AE484E68032978E07BB19B2BEF3880B0E893EC4D617C8E4DCFD4DBD52DE7A3C844E7581CD5484F691A072A341913794FA58
                      Malicious:false
                      Reputation:unknown
                      URL:https://cdn.forms.office.net/forms/scripts/dists/light-response-page.chunk.lrp_groupnote.0a8673f.js
                      Preview:"use strict";(self.webpackChunk=self.webpackChunk||[]).push([[341],{64289:function(e,t,n){n.r(t),n.d(t,{GroupNoteResponsesView:function(){return w}});var i=n(59312),a=n(69686),o=n(35995),l=n(36082),r=n(51710),s=n(6700),c=n(40374),d=n(82610),p=n(56498),u=n(89397),_=n(39886),f=n(68258),h=function(e){var t=e.$va,n=void 0===t?[]:t,i=e.$jg,r=void 0===i?[]:i,s=e.$_n,d=e.$qH,p=(0,o.d)((function(e){return{$a:{},$sQ:{display:"block",width:e?"calc(100% - 30px)":"calc(100% - 40px)",margin:e?"0 15px":"0 20px"},$dY:{display:"block",width:"100%"},$sR:{display:"flex",justifyContent:"space-between",alignItems:"center",fontSize:12,fontWeight:600,lineHeight:"20px",color:l.s.$h,background:l.s.$C,height:e?25:32,width:"100%"},$rF:{width:"100%",padding:"0 10px",textOverflow:"ellipsis",whiteSpace:"nowrap",overflow:"hidden"},$yF:{background:l.s.$g,maxHeight:e?90:120,overflowY:"auto",display:"block","::-webkit-scrollbar":{width:2},"::-webkit-scrollbar-thumb":{background:"#adadad",borderRadius:2}},$Af:{display:
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):72
                      Entropy (8bit):4.241202481433726
                      Encrypted:false
                      SSDEEP:
                      MD5:9E576E34B18E986347909C29AE6A82C6
                      SHA1:532C767978DC2B55854B3CA2D2DF5B4DB221C934
                      SHA-256:88BDF5AF090328963973990DE427779F9C4DF3B8E1F5BADC3D972BAC3087006D
                      SHA-512:5EF6DCFFD93434D45760888BF4B95FF134D53F34DA9DC904AD3C5EBEDC58409073483F531FEA4233869ED3EC75F38B022A70B2E179A5D3A13BDB10AB5C46B124
                      Malicious:false
                      Reputation:unknown
                      Preview:{"Message":"The requested resource does not support http method 'GET'."}
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):5848
                      Entropy (8bit):5.4748289538456145
                      Encrypted:false
                      SSDEEP:
                      MD5:86D5CB33BF79D9817A20F8C30AF47B57
                      SHA1:559C1C94DEF702F1054A92C53BFF22820C942F0F
                      SHA-256:96C90425F45544EB8A03840A33F2A87C26E46B946621783CB709745BF363A260
                      SHA-512:1B8C1FCDE2E4A2003708C7386DB328090248A39E5961EDF7703DA852041702A477FCC3292F0C1AB403D65CF3678449BDEA2A91D1F06B63BBE4F69F2C2380DBE6
                      Malicious:false
                      Reputation:unknown
                      Preview:{"responses":null,"form":{"description":null,"onlineSafetyLevel":0,"reputationTier":1,"background":{"altText":null,"contentType":null,"fileIdentifier":null,"originalFileName":null,"resourceId":null,"resourceUrl":null,"height":null,"width":null,"size":null},"header":{"altText":null,"contentType":null,"fileIdentifier":null,"originalFileName":null,"resourceId":null,"resourceUrl":null,"height":null,"width":null,"size":null},"logo":{"altText":"","contentType":"image/png","fileIdentifier":"af8c81e3-a9f3-43b0-8a96-db652918c1c7","originalFileName":"7e6b53cf-54d0-43ef-9500-a597610b12cd","resourceId":"8291bd42-5126-460c-93af-fc0fed82e3a2","resourceUrl":"https://lists.office.com/Images/c252312b-355b-416a-b6bd-8fd37787f4b4/562c978a-9877-48cc-9fb3-d551d6de45c6/TDOJN4ZPDSU3MNGCEWHF2YH5KU/8291bd42-5126-460c-93af-fc0fed82e3a2","height":null,"width":null,"size":null},"tableId":"TDOJN4ZPDSU3MNGCEWHF2YH5KU","otherInfo":"{\"LogoInfo\":{\"Size\":\"Small\",\"NaturalHeight\":58,\"NaturalWidth\":206}}","runti
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:HTML document, ASCII text, with very long lines (908)
                      Category:downloaded
                      Size (bytes):5164
                      Entropy (8bit):5.238553990827548
                      Encrypted:false
                      SSDEEP:
                      MD5:34F4B64EA3213F7B1E964D5B904EB746
                      SHA1:D0AAE1D5920EC217A14855ABCC04C6F9CA5DD924
                      SHA-256:41574BB62ABB4EAD70C9A5532AC0FBB9E2BD2123597EB69B5C9E415CE3399BF6
                      SHA-512:4CF699DA4399D8C239E5DBA5C77C88416AC9BB0506697C37E9ACCF846666694209EDDE8EF33F1493EDC80F1752802D0036A0C867016808523036E211FA3FD7DD
                      Malicious:false
                      Reputation:unknown
                      URL:https://shared.outlook.inky.com/link?domain=doni2.r.ag.d.sendibm3.com&t=h.eJwdj81KxDAYAF9lyVny1zahe1oUllWx4knXW5Lvaxs2TTRNFRHf3XbPAzPML1lyIPsdGUv5mPeMQYpe0kzNQIHOGMHbqaIuTWy6MBdYz-aRPf-496_TckwCX0p-O_vXDs6PTw_sk6v7ruN3c3dbkZsduWzqiCXloS9CaqW0YJPxsWA00eFhxOyLGfDbFMyzB7ymGrCmRS0F11Aboa1ylXFN2wBY1UjOxMqk5rWoabt18LqAIaSD69EuPsCq21wbhZXGJYS_f-UASxs.MEYCIQCvCLlElZCkfwy7gPUs8GTivO-PmsCMFaKO0XbRFFD7ggIhAJWeoOoRYloZX-LYlNX7u2XpAXq8wfafAlFXcFle5uAd
                      Preview:<!DOCTYPE html>.<html>.<head>.<meta charset="UTF-8">.<meta name="viewport" content="initial-scale=1">.<meta name="robots" content="noindex, nofollow">.<title>INKY: Link Protection</title>. <link rel="stylesheet" type="text/css" href="addin/style.css" />-->.<link rel="stylesheet" href="js/bootstrap/css/bootstrap.min.css" />.<link rel="stylesheet" href="landing.css" />.<link rel="icon" href="cropped-Inky-512x512_trans-1-32x32.png" sizes="32x32">.<link rel="icon" href="cropped-Inky-512x512_trans-1-192x192.png" sizes="192x192">.<link rel="stylesheet" type="text/css" href="https://cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/font-awesome.min.css">.<script src="js/jquery.min.js"></script>.<script src="js/spin.min.js"></script>.<script src="js/bootstrap/js/bootstrap.min.js"></script>.<script>. function renderScreenshotAsync(id, encoded_url, retry) {. setTimeout(function () {. if (retry) {. $('#'+id).html('');. }.. var spinner = new Spi
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text
                      Category:downloaded
                      Size (bytes):2248
                      Entropy (8bit):4.855097993715528
                      Encrypted:false
                      SSDEEP:
                      MD5:258D0078D05E1F233EE9DCDB613318E3
                      SHA1:F725E7BDD571236F25D1F0EFAAD956B579855C02
                      SHA-256:0805F54332D2A9FF169AD53F078E8E0D01DE25FAF84DE3EC9064F58F06E32ADB
                      SHA-512:1E00644766960A1EF5D0B1F91BC75196E1AD131F2B3398BA6BAABBDC6C955335EE418A30A96E66F73D6D9B41C71D36304A65E043A9A7BC16FAEAD947E469DE93
                      Malicious:false
                      Reputation:unknown
                      URL:https://shared.outlook.inky.com/landing.css
                      Preview:body {. -webkit-font-smoothing: antialiased;.}...optional-line-break {. display: inline;.}.@media (max-width:576px) {. .optional-line-break {. display: block;. }.}...vertical-spacer-1 {. height: 8px;.}..vertical-spacer-2 {. height: 16px;.}..vertical-spacer-3 {. height: 24px;.}...form-wrapper {. text-align: left;.}...narrower {. max-width: 650px;. margin: 0 auto;.}...centered {. text-align: center;.}...align-left {. text-align: left;.}...breakword {. word-break: break-word;.}...report-link a {. color: black;. text-decoration: underline;.}...left-aligned-centered {. text-align: left;. margin: 0 auto;. display: inline-block;. max-width: 576px;.}..@media (max-width:576px) {. .inky-label-button {. margin-bottom:15px;. }.}../* lighter buttons..btn-danger {. color: #721c24;. background-color: #f8d7da;. border-color: #f5c6cb;.}..btn-success {. color: #155724;. background-color: #d4edda;. border-color: #c3e6cb;.}..btn-warning {. color: #856404;. backgr
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (32014)
                      Category:downloaded
                      Size (bytes):86351
                      Entropy (8bit):5.367752216095235
                      Encrypted:false
                      SSDEEP:
                      MD5:05E51B1DB558320F1939F9789CCF5C8F
                      SHA1:C72C1735B4D903D90DD51225EBEFB8C74EBBC51F
                      SHA-256:702B9E051E82B32038FFDB33A4F7EB5F7B38F4CF6F514E4182D8898F4EB0B7FB
                      SHA-512:AB3AD9A98FE431508461EBBF8029BC536F34D16CFEF8B4C62B8A62B56FE2B30A426E3C3186C994C2578BD585DA1C89A9B421C6D2F27053B2F2ED13B0DD9428C3
                      Malicious:false
                      Reputation:unknown
                      URL:https://shared.outlook.inky.com/js/jquery.min.js
                      Preview:/*! jQuery v3.1.0 | (c) jQuery Foundation | jquery.org/license */.!function(a,b){"use strict";"object"==typeof module&&"object"==typeof module.exports?module.exports=a.document?b(a,!0):function(a){if(!a.document)throw new Error("jQuery requires a window with a document");return b(a)}:b(a)}("undefined"!=typeof window?window:this,function(a,b){"use strict";var c=[],d=a.document,e=Object.getPrototypeOf,f=c.slice,g=c.concat,h=c.push,i=c.indexOf,j={},k=j.toString,l=j.hasOwnProperty,m=l.toString,n=m.call(Object),o={};function p(a,b){b=b||d;var c=b.createElement("script");c.text=a,b.head.appendChild(c).parentNode.removeChild(c)}var q="3.1.0",r=function(a,b){return new r.fn.init(a,b)},s=/^[\s\uFEFF\xA0]+|[\s\uFEFF\xA0]+$/g,t=/^-ms-/,u=/-([a-z])/g,v=function(a,b){return b.toUpperCase()};r.fn=r.prototype={jquery:q,constructor:r,length:0,toArray:function(){return f.call(this)},get:function(a){return null!=a?a<0?this[a+this.length]:this[a]:f.call(this)},pushStack:function(a){var b=r.merge(this.con
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (38720)
                      Category:dropped
                      Size (bytes):473563
                      Entropy (8bit):5.456702624303043
                      Encrypted:false
                      SSDEEP:
                      MD5:D73166AF44AB92ADE8452FE236EFD687
                      SHA1:7485D63D31B97F895ACFC41AA7295DD91F11D11B
                      SHA-256:469FAF28C6390DFFD00C3E4C40BD276A17DCCC3219E13D5E8EF53D173AB142EC
                      SHA-512:9B32B103D1A61A79F17A8842994962EEE9273A434E75E61D77F65FC9C98D74D4ECB91499C28E66A495C635D2E2731893BDB2B19C1D4645522CD68B52D6600B31
                      Malicious:false
                      Reputation:unknown
                      Preview:!function(){var n,t,r,e,i,o={65690:function(n,t,r){"use strict";function e(n){o!==n&&(o=n)}function i(){return void 0===o&&(o="undefined"!=typeof document&&!!document.documentElement&&"rtl"===document.documentElement.getAttribute("dir")),o}var o;function u(){return{rtl:i()}}r.d(t,{Eo:function(){return u},ok:function(){return e}}),o=i()},36178:function(n,t,r){"use strict";r.d(t,{Y:function(){return c},q:function(){return o}});var e,i=r(59312),o={none:0,insertNode:1,appendChild:2},u="undefined"!=typeof navigator&&/rv:11.0/.test(navigator.userAgent),a={};try{a=window||{}}catch(n){}var c=function(){function n(n,t){var r,e,u,a,c,f;this._rules=[],this._preservedRules=[],this._counter=0,this._keyToClassName={},this._onInsertRuleCallbacks=[],this._onResetCallbacks=[],this._classNameToArgs={},this._config=(0,i.pi)({injectionMode:"undefined"==typeof document?o.none:o.insertNode,defaultPrefix:"css",namespace:void 0,cspSettings:void 0},n),this._classNameToArgs=null!==(r=null==t?void 0:t.classNameT
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
                      Category:downloaded
                      Size (bytes):1445
                      Entropy (8bit):7.83536675587621
                      Encrypted:false
                      SSDEEP:
                      MD5:A2BCA4739E79E0E57D930A8728D06BD0
                      SHA1:183F7E34CA8CD3FBE83D7A0CD7556837409A73C6
                      SHA-256:0906229B33EE20295BDE3BBB2403FAB330C85952FE0463353A18D82FAAA12995
                      SHA-512:268D483F2897CD13005CB98DB6368100C75AAA0910F7C8FC1D539F0708055D3DCF21EE5C7FE19B6DE735CE5CFB7669C58941B5F95A35F2964D39E0180BD70156
                      Malicious:false
                      Reputation:unknown
                      URL:https://shared.outlook.inky.com/cropped-Inky-512x512_trans-1-32x32.png
                      Preview:.PNG........IHDR... ... .....szz....lIDATX..{lSu..?..v..e+c..p.u. S.#..n$..Y.1.BL..M.JL..3...Q4Q... .53,..C.A..c.U..dl.......{....R..;...=..~..;...Gb.d.9$....+..=n...........@'~..u...)...v..f....J..bm..!......q;.<..V.#...x....9.&. .....8...P...^.."...K#,U.K.]"b#.FRn.....w....@.x.^P.`5[..>.k j..6..+.S.x2...9.Y &......-.Z...........m.~.6.......p?#%..`N...(..i.X..@.pr..Xm.5P8....Lq..q..8`..%.s@..i5.7.gd.e.."+ROo.x.&i...<.4..b..`Pn4[..>.K.t..&.a..k.....$.X.t.........(Q+_4....q%.&........}..g.......E.jsh.-../xz.[+..X.$+2.....d..Z::}Q)O...v|.....e9..h..r..ny....M...a.....@Z.......hl.-}SQ...Ve..vi.%<..Q.~wUT...p^`.5Y...JN.qaMMbM.R..B......C...$.HI.OKJ.cs...}w..Q/..w...#..)i...._B.....Z.. ...R'%...*.:.n... 3\.h...y;..F..z-Z..?..a4..U...V........@..ZMR.Yil...x.F...H...rW...F#.cM.....>.$Aqa>.>?...7l0.Tu...RS..h....Rb...Q7..........VoW........c0......E.....P`T..P]......#.i..z...[...^.h....4...-_o..CGNgny.LY.o..{..H.08.._.G].Gj.KK..v}.A....l$+3M.x.S..
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (33074)
                      Category:downloaded
                      Size (bytes):33336
                      Entropy (8bit):5.517616514967548
                      Encrypted:false
                      SSDEEP:
                      MD5:7DE3BF00D6E44156D0BE916CC9677F13
                      SHA1:929F96F0C803DB83808821CE0411B59C49EA703E
                      SHA-256:67A04D6630D09A58788994316B79CED4A20DC25EB4223E7AEB5A81B0C94E8D50
                      SHA-512:5C86FDE3CA1EF5B620BFE203E9315D5D712D6ACFAA4215B47A9C90F425F800D923574A67AB9C95F70E31D0F8C078D9B1B61AA6C3FB2D7485818C8ABCC384AA55
                      Malicious:false
                      Reputation:unknown
                      URL:https://cdn.forms.office.net/forms/scripts/dists/light-response-page.chunk.lrp_saveresponse.3773376.js
                      Preview:"use strict";(self.webpackChunk=self.webpackChunk||[]).push([[852],{61029:function(n,e,i){i.d(e,{iF:function(){return o}});var t=i(94290),r=i(48186);function o(n){var e=n.redirectURLAfterSignIn,i=n.idp,o=n.origin,a=n.authProvider,u=n.enableEmailHrd,d=void 0===u||u,s=window.location.origin,c=[];if(e){var l=encodeURIComponent(e);c.push("redirecturl=".concat(l))}(0,r.l)(i)||c.push("idp=".concat(i)),(0,r.l)(o)||c.push("origin=".concat(o)),(0,r.l)(a)||c.push("".concat(t.gx,"=").concat(a));var f=c.length?"/?".concat(c.join("&")):"";return d?"".concat(s).concat(f,"#Login=True"):"".concat(s).concat(f)}},92658:function(n,e,i){i.d(e,{b:function(){return r}});var t=i(68289),r=function(n){var e=void 0===n?{}:n,i=e.$yP,r=e.$uw,o=e.$xf,a=e.$gs,u=e.$iv,d=e.$iw,s=e.$pX,c=e.$jY,l=e.$ox,f=e.$lw,g=e.$BA,p=e.$nO,_=e.$kF,h=[];return i&&h.push("CollectionId=".concat(i)),r&&h.push("GroupId=".concat(r)),o&&h.push("Token=".concat(o)),c&&h.push("ResponseTime=".concat(c)),a&&h.push("SaveResponseFormId=".concat(a
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (65536), with no line terminators
                      Category:downloaded
                      Size (bytes):72290
                      Entropy (8bit):5.49417306372281
                      Encrypted:false
                      SSDEEP:
                      MD5:5B55CA1CE9FF902F93D0D0BF7D4DFD35
                      SHA1:23C0CD40286A936C4C79597BF473664A8A464794
                      SHA-256:15BC21210C103D576300BC2E1360C88C8067BBEB280F7C2F6BCBD3A1D1F40D74
                      SHA-512:29F538048CC5C2908C8D60336B492091095F316D7874C1DC3B389343F28A6597780EF069FE506DC83F2BBBD5DA17EFF75F17261C8890F5A0A9D9E47F650A178F
                      Malicious:false
                      Reputation:unknown
                      URL:https://cdn.forms.office.net/forms/scripts/dists/light-response-page.chunk.lrp_cover.53bbc72.js
                      Preview:"use strict";(self.webpackChunk=self.webpackChunk||[]).push([[376],{86219:function(e,t,n){n.d(t,{l:function(){return o}});var i=n(35852);function o(e){for(var t=[],n=1;n<arguments.length;n++)t[n-1]=arguments[n];for(var o=[],r=0,_=t;r<_.length;r++){var a=_[r];a&&o.push("function"==typeof a?a(e):a)}return 1===o.length?o[0]:o.length?i.m.apply(void 0,o):{}}},82699:function(e,t,n){n.d(t,{j:function(){return _}});var i=n(65690),o=n(36178),r=n(49295);function _(e){var t=o.Y.getInstance(),n=(0,r.dH)((0,i.Eo)(),e);if(!t.classNameFromKey(n)){var _=t.getClassName();t.insertRule("@font-face{".concat(n,"}"),!0),t.cacheClassName(_,n,[],["font-face",n])}}},40011:function(e,t,n){n.r(t),n.d(t,{AnimationClassNames:function(){return J},AnimationStyles:function(){return P},AnimationVariables:function(){return G},ColorClassNames:function(){return be},DefaultEffects:function(){return Se.r},DefaultFontStyles:function(){return Q.i},DefaultPalette:function(){return ee.U},EdgeChromiumHighContrastSelector:functi
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (16094)
                      Category:downloaded
                      Size (bytes):38124
                      Entropy (8bit):5.310312368406633
                      Encrypted:false
                      SSDEEP:
                      MD5:F85DF0DB3B351E61F18DD9CA98A3C999
                      SHA1:055AB43C220151E0C8B521A39D40DC54C50F988D
                      SHA-256:5BEA34A1B8999FB53F5B3B8541BE6A2C6F8C75A8932BCB7A05E3FD5B91D78608
                      SHA-512:1FB8F1989F9DD1F6C0C327F5B4808465F679793697EC486A7B18F2345DCF8DECDDCCFEEC65CC586B0F51E62BDD9C2EB035CE9C6CC23165F791181F4E0EB0DF0C
                      Malicious:false
                      Reputation:unknown
                      URL:https://cdn.forms.office.net/forms/scripts/dists/dll-dompurify.min.bcf1a85.js
                      Preview:var _dll_dompurify_e7d452d73246f470bc6d;(()=>{var t={699:function(t){./*! @license DOMPurify | (c) Cure53 and other contributors | Released under the Apache license 2.0 and Mozilla Public License 2.0 | github.com/cure53/DOMPurify/blob/2.2.2/LICENSE */.t.exports=function(){"use strict";function t(t){if(Array.isArray(t)){for(var e=0,n=Array(t.length);e<t.length;e++)n[e]=t[e];return n}return Array.from(t)}var e=Object.hasOwnProperty,n=Object.setPrototypeOf,o=Object.isFrozen,r=Object.freeze,i=Object.seal,s=Object.create,a="undefined"!=typeof Reflect&&Reflect,c=a.apply,l=a.construct;c||(c=function(t,e,n){return t.apply(e,n)}),r||(r=function(t){return t}),i||(i=function(t){return t}),l||(l=function(e,n){return new(Function.prototype.bind.apply(e,[null].concat(t(n))))});var u=T(Array.prototype.forEach),p=T(Array.prototype.pop),d=T(Array.prototype.push),f=T(String.prototype.toLowerCase),m=T(String.prototype.match),h=T(String.prototype.replace),y=T(String.prototype.indexOf),w=T(String.prototype
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:JSON data
                      Category:downloaded
                      Size (bytes):530
                      Entropy (8bit):4.860983185588505
                      Encrypted:false
                      SSDEEP:
                      MD5:4D945878F36DCBBF35C41B5BB6E5513E
                      SHA1:786EDE7740452B1C38B1FFA47C28F4E70140EC5F
                      SHA-256:19DADB739E9886DBDDC79E9E916B753AC53A2C8C1A9560EF14AF28B400C234E0
                      SHA-512:37E16ACE0F5DF65065C150FB05E7968A5B3AA828F66EFDEF29DD78EF4C2D4B29D0C4F81502CDA069F1EFB0B0329FA69BC309579D74A447E2B7FE9E27AC9CCD99
                      Malicious:false
                      Reputation:unknown
                      URL:https://forms.office.com/pwa/en-us/app.webmanifest
                      Preview:{"lang":"en-us","name":"Microsoft Forms","short_name":"Forms","icons":[{"src":"https://cdn.forms.office.net/forms/images/pwa/forms-pwa-logo-192.png","sizes":"192x192","type":"image/png"},{"src":"https://cdn.forms.office.net/forms/images/pwa/forms-pwa-logo-256.png","sizes":"256x256","type":"image/png"},{"src":"https://cdn.forms.office.net/forms/images/pwa/forms-pwa-logo-512.png","sizes":"512x512","type":"image/png"}],"scope":"/","start_url":"/?pwa=1","display":"minimal-ui","theme_color":"#03787c","background_color":"#ffffff"}
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:SVG Scalable Vector Graphics image
                      Category:dropped
                      Size (bytes):1795
                      Entropy (8bit):5.2687859815811
                      Encrypted:false
                      SSDEEP:
                      MD5:DF1CD3F2DAAEE5F629C10FBC609CAC35
                      SHA1:7C4EADD1001AFA795442C3CA06B645CFC4831BC8
                      SHA-256:C04BC4EE3D822B90BA1A8562DF69FC44E199E8E36D2FDAD3F3787FCF9C5163DD
                      SHA-512:3F69A1B5B192C741167622A810A9CF59C071674C8014464A29E08E4BFB9546B33246D9E72CFD3E8AB5178FFF91749013B78E4BCD7A044FF309C2255425D578F6
                      Malicious:false
                      Reputation:unknown
                      Preview:<svg width="1366" height="768" viewBox="0 0 1366 768" fill="none" xmlns="http://www.w3.org/2000/svg">..<g clip-path="url(#clip0_1395_123507)">..<path d="M-30 1060.71V411.179C326.5 316.179 440.5 774.207 852 532.207C1181.2 338.607 1397.5 429.207 1464.5 498.707V1060.71H-30Z" fill="white" fill-opacity="0.15" stroke="url(#paint0_linear_1395_123507)" stroke-opacity="0.4" stroke-width="3"/>..<path d="M-125 1066.76V504.755C53.5 613.255 334 418.255 529 415.755C724 413.255 846 471.255 1069 574.255C1247.4 656.655 1384.33 608.589 1430.5 574.255V1080.76L-125 1066.76Z" fill="white" fill-opacity="0.2" stroke="url(#paint1_linear_1395_123507)" stroke-opacity="0.4" stroke-width="3"/>..<path d="M-81 1256.47V701C277 467 360.5 747.652 683 540.47C1005.5 333.288 1317.67 573.97 1472.5 625.47L1491 1256.47H-81Z" fill="white" fill-opacity="0.2" stroke="url(#paint2_linear_1395_123507)" stroke-opacity="0.4" stroke-width="3"/>..</g>..<defs>..<linearGradient id="paint0_linear_1395_123507" x1="-104.5" y1="895.178" x2
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (34041)
                      Category:dropped
                      Size (bytes):138732
                      Entropy (8bit):5.441090560276903
                      Encrypted:false
                      SSDEEP:
                      MD5:BB9CFB60CC848DE6935C7946746384A9
                      SHA1:80EAC837659DF274D11E522791A2EA6176B6B878
                      SHA-256:37D2CA4B5A57981020034743EE9871C2B004E2B773808D1C9E308E733127A8C8
                      SHA-512:F662515271B0BA79A635AE291A8309B65FB0FBEC719A85007AAB9F6585A2F8AE608FAB222110801D5848970F583289DC968C081E349B27F1D5649DA71C30410F
                      Malicious:false
                      Reputation:unknown
                      Preview:"use strict";(self.webpackChunk=self.webpackChunk||[]).push([[824],{79966:function(n,e,t){t.d(e,{Z:function(){return M}});var r=t(49577),i=t(71106),u=t(40154),o=t(80403),a=t(39523),f=t(61746),c=t(18449),s=t(72480),l=t(52863),v=t(86969),d=t(90962),m=t(58398),p=500;function _(n,e,t){e&&(0,a.kJ)(e)&&e[s.R5]>0&&(e=e.sort((function(n,e){return n[v.yi]-e[v.yi]})),(0,a.tO)(e,(function(n){n[v.yi]<p&&(0,a._y)("Channel has invalid priority - "+n[s.pZ])})),n[s.MW]({queue:(0,a.FL)(e),chain:(0,d.jV)(e,t[s.TC],t)}))}var y=t(47151),b=t(45480),h=t(66450),g=function(n){function e(){var t,r,i=n.call(this)||this;function o(){t=0,r=[]}return i.identifier="TelemetryInitializerPlugin",i.priority=199,o(),(0,c.Z)(e,i,(function(n,e){n.addTelemetryInitializer=function(n){var e={id:t++,fn:n};return r[s.MW](e),{remove:function(){(0,a.tO)(r,(function(n,t){if(n.id===e.id)return r[s.cb](t,1),-1}))}}},n[v.hL]=function(e,t){for(var i=!1,o=r[s.R5],c=0;c<o;++c){var l=r[c];if(l)try{if(!1===l.fn[s.ZV](null,[e])){i=!0;brea
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:ASCII text, with very long lines (30837)
                      Category:downloaded
                      Size (bytes):31000
                      Entropy (8bit):4.746143404849733
                      Encrypted:false
                      SSDEEP:
                      MD5:269550530CC127B6AA5A35925A7DE6CE
                      SHA1:512C7D79033E3028A9BE61B540CF1A6870C896F8
                      SHA-256:799AEB25CC0373FDEE0E1B1DB7AD6C2F6A0E058DFADAA3379689F583213190BD
                      SHA-512:49F4E24E55FA924FAA8AD7DEBE5FFB2E26D439E25696DF6B6F20E7F766B50EA58EC3DBD61B6305A1ACACD2C80E6E659ACCEE4140F885B9C9E71008E9001FBF4B
                      Malicious:false
                      Reputation:unknown
                      URL:https://cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/font-awesome.min.css
                      Preview:/*!. * Font Awesome 4.7.0 by @davegandy - http://fontawesome.io - @fontawesome. * License - http://fontawesome.io/license (Font: SIL OFL 1.1, CSS: MIT License). */@font-face{font-family:'FontAwesome';src:url('../fonts/fontawesome-webfont.eot?v=4.7.0');src:url('../fonts/fontawesome-webfont.eot?#iefix&v=4.7.0') format('embedded-opentype'),url('../fonts/fontawesome-webfont.woff2?v=4.7.0') format('woff2'),url('../fonts/fontawesome-webfont.woff?v=4.7.0') format('woff'),url('../fonts/fontawesome-webfont.ttf?v=4.7.0') format('truetype'),url('../fonts/fontawesome-webfont.svg?v=4.7.0#fontawesomeregular') format('svg');font-weight:normal;font-style:normal}.fa{display:inline-block;font:normal normal normal 14px/1 FontAwesome;font-size:inherit;text-rendering:auto;-webkit-font-smoothing:antialiased;-moz-osx-font-smoothing:grayscale}.fa-lg{font-size:1.33333333em;line-height:.75em;vertical-align:-15%}.fa-2x{font-size:2em}.fa-3x{font-size:3em}.fa-4x{font-size:4em}.fa-5x{font-size:5em}.fa-fw{width:1.
                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                      File Type:PNG image data, 206 x 58, 8-bit/color RGBA, non-interlaced
                      Category:downloaded
                      Size (bytes):24532
                      Entropy (8bit):7.964334220735629
                      Encrypted:false
                      SSDEEP:
                      MD5:FEFA2B103737887F3ED6FDE7E449E499
                      SHA1:F3E0CDDE45D6FD735E3ED6CC961221C360D21A6B
                      SHA-256:D514AA1BF3E028EF40CB35BB0879CD2560427F7522F2C6C66B3D6AD33C1DB0E8
                      SHA-512:EDD2D2400D0B1129170BDB9B90F6E295B3CDCC32F6B5BA0F89F17B3E95AC81E8A882698D9DDE7E5AE12850C369765CA3D1C26B878F1490F3E220022663481EB6
                      Malicious:false
                      Reputation:unknown
                      URL:https://lists.office.com/Images/c252312b-355b-416a-b6bd-8fd37787f4b4/562c978a-9877-48cc-9fb3-d551d6de45c6/TDOJN4ZPDSU3MNGCEWHF2YH5KU/8291bd42-5126-460c-93af-fc0fed82e3a2
                      Preview:.PNG........IHDR.......:.......f.....gAMA....|.Q.... cHRM...........y..|...o*......<......H....>iCCPICC Profile..X.WgTS..>.$!....H..."5...Z...FH...c ..A....l....;bgPl.....8..]y'.,3..[.....g.o.{n.....D9.:...|ql.?}\r.....@.d....n............7.5.k.R..........8..... .x.W$...(.M..I1.@K...x..g.q.....^.M|,..V..T8.q...W..^......;.y.!...On.....[C...R~F.w<.?p..sr8..X..L...y...........K8T2.!..a.neO..b....i.Q.kB.^...C.R2%!.r{...5.:.;.8.a..@.$..W....Al...A.......B........,.....6..YL..<G,.+..@...T......jaf|...........B......[.....Kb..C.........tqP..47o(_ls.......3.C...Z..Y.0..._.L................q....|.X.Z.".V....`...b...8.Z<1.nH9?.......fqB.....A8`..@..8.......}.}.J>..8@.2...+4C+.d3Bx....O.. ox..l......V~......l...\..r.D.J8.-.<...?.s...xs.....~H.M..p.F2.6dI.$..C.AD.\.....px...g..Cy|.'<%t...n....'...?E... ....i........?...!3....{...a..+..qK.B.........;.#.%. ....^.j..:."......6\o.....Y.U...a?[b....9..v.;.5.:v.k..cR<....v..XY<.G...CwVZ.<.Z.^...|.t.;..
                      No static file info