Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://l.facebook.com/l.php?u=https%3A%2F%2Fnutramart.store%2F%3Flabel%3D5efe465a4dbe59fbb290a966697fc1cd%26utm_medium%3Dpaid%26utm_source%3Dfb%26utm_id%3D6599688580361%26utm_content%3D6599688599961%26utm_term%3D6599688590961%26utm_campaign%3D6599688580361%26fbclid%3DIwZXh0bgNhZW0BMAABHdzmJULh8TsQt

Overview

General Information

Sample URL:https://l.facebook.com/l.php?u=https%3A%2F%2Fnutramart.store%2F%3Flabel%3D5efe465a4dbe59fbb290a966697fc1cd%26utm_medium%3Dpaid%26utm_source%3Dfb%26utm_id%3D6599688580361%26utm_content%3D6599688599961%
Analysis ID:1482228

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected phishing page
Phishing site detected (based on favicon image match)
HTML page contains obfuscated javascript
Javascript checks online IP of machine
Form action URLs do not match main URL
Found iframes
HTML body contains low number of good links
HTML page contains hidden javascript code
HTML title does not match URL
Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 5812 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://l.facebook.com/l.php?u=https%3A%2F%2Fnutramart.store%2F%3Flabel%3D5efe465a4dbe59fbb290a966697fc1cd%26utm_medium%3Dpaid%26utm_source%3Dfb%26utm_id%3D6599688580361%26utm_content%3D6599688599961%26utm_term%3D6599688590961%26utm_campaign%3D6599688580361%26fbclid%3DIwZXh0bgNhZW0BMAABHdzmJULh8TsQt3pW_qnmIXPFdqLqBaBKW5T-aZYxDkCqac1lwtitUH-fNw_aem_UoCoKjZX08yMSHQS1Rk-lA&h=AT2Rbdo290L85DwdtmvCHSaYZeZQw6zVRZwOCmLUor4sXK9slv2_8Xz3sNHtiR9yk_5i3WV0TyI-vvISy2qX4eX89xJtn5joKswTFrWNikf-8BbcY1c3OSbcsV7ioNYHeRE&__tn__=%2CmH-R&c%5B0%5D=AT1zpbOywPCbT61x3IUZxcKH5NMmiyOktbAovmzxAnO3GQxZoE9RLlfDBYeXTFE8UxKMEzW4i7Rw_yO3qxx7WfbLZEKXf2a_gqDGEIqK5xACO326D8DwbL9YKGpFirOaXzMC_oPb4wgEghT5w108ehD0lVOUa18OX2Yna4VvaAaIUpPjAkk9gOhJw0AtcNc8dmXxzoPXiUwIYEI1VCwKUmK1G_lmEdu24Iq9UJ_ic75uGIJuxQwEttfLYZ0HqkC3D8EpDSqIjHE7T12pe_syL5VjKXEGR6hZ3F-YEVJbiZGhU5diMWZAvsPL2bUpvSMNWrEu14yqnXQK7Z-1xnZRSbLWmzHp53sdCj21 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
    • chrome.exe (PID: 6172 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1988,i,1234219138249571081,14427230395194930104,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
    • chrome.exe (PID: 8172 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4124 --field-trial-handle=1988,i,1234219138249571081,14427230395194930104,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
  • cleanup
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

Phishing

barindex
Source: https://qi7cfdo3mg0fby.azureedge.net/7720/?utm_medium=paid&utm_source=fb&utm_id=6599688580361&utm_content=6599688599961&utm_term=6599688590961&utm_campaign=6599688580361&fbclid=IwZXh0bgNhZW0BMAABHdzmJULh8TsQt3pW_qnmIXPFdqLqBaBKW5T-aZYxDkCqac1lwtitUH-fNw_aLLM: Score: 9 brands: Microsoft Reasons: The URL 'https://qi7cfdo3mg0fby.azureedge.net/7720/?utm_medium=paid&utm_source=fb&utm_id=6599688580361&utm_content=6599688599961&utm_term=6599688590961&utm_campaign=6599688580361&fbclid=IwZXh0bgNhZW0BMAABHdzmJULh8TsQt3pW_qnmIXPFdqLqBaBKW5T-aZYxDkCqac1lwtitUH-fNw_aem_UoCoKjZX08yMSHQS1Rk-lA' is suspicious as it does not match the legitimate domain 'microsoft.com' associated with the brand Microsoft. The page uses social engineering techniques such as alarming messages about threats and urging the user to contact support, which is a common tactic in phishing attacks. The presence of a suspicious link and the use of a subdomain that does not belong to the official Microsoft domain further indicate that this is likely a phishing site. DOM: 1.0.pages.csv
Source: https://qi7cfdo3mg0fby.azureedge.net/7720/?utm_medium=paid&utm_source=fb&utm_id=6599688580361&utm_content=6599688599961&utm_term=6599688590961&utm_campaign=6599688580361&fbclid=IwZXh0bgNhZW0BMAABHdzmJULh8TsQt3pW_qnmIXPFdqLqBaBKW5T-aZYxDkCqac1lwtitUH-fNw_aem_UoCoKjZX08yMSHQS1Rk-lALLM: Score: 10 Reasons: The URL 'qi7cfdo3mg0fby.azureedge.net' is not associated with Microsoft's official domains, and the domain appears suspicious due to its unusual format. The webpage displays a warning message about changes to the site, which is unusual for a legitimate Microsoft update. The presence of Microsoft Support and Security Support links is misleading, as these links are not associated with Microsoft's official domains. The webpage's attempt to trick users into downloading malware is a clear indication of phishing. DOM: 1.0.pages.csv
Source: https://qi7cfdo3mg0fby.azureedge.net/7720/?utm_medium=paid&utm_source=fb&utm_id=6599688580361&utm_content=6599688599961&utm_term=6599688590961&utm_campaign=6599688580361&fbclid=IwZXh0bgNhZW0BMAABHdzmJULh8TsQt3pW_qnmIXPFdqLqBaBKW5T-aZYxDkCqac1lwtitUH-fNw_aLLM: Score: 9 brands: Microsoft Reasons: The URL 'https://qi7cfdo3mg0fby.azureedge.net/7720/?utm_medium=paid&utm_source=fb&utm_id=6599688580361&utm_content=6599688599961&utm_term=6599688590961&utm_campaign=6599688580361&fbclid=IwZXh0bgNhZW0BMAABHdzmJULh8TsQt3pW_qnmIXPFdqLqBaBKW5T-aZYxDkCqac1lwtitUH-fNw_aem_UoCoKjZX08yMSHQS1Rk-lA' is suspicious because it uses a subdomain of 'azureedge.net' which is not directly associated with Microsofts primary domain 'microsoft.com'. The image shows multiple warning messages and prompts to contact a support number, which is a common social engineering technique used in phishing attacks. The presence of a prominent support contact number and alarming messages about a virus infection are indicative of phishing attempts. The site does not have a login form or CAPTCHA, but the overall presentation and URL are highly suspicious. DOM: 1.7.pages.csv
Source: https://qi7cfdo3mg0fby.azureedge.net/7720/?utm_medium=paid&utm_source=fb&utm_id=6599688580361&utm_content=6599688599961&utm_term=6599688590961&utm_campaign=6599688580361&fbclid=IwZXh0bgNhZW0BMAABHdzmJULh8TsQt3pW_qnmIXPFdqLqBaBKW5T-aZYxDkCqac1lwtitUH-fNw_aLLM: Score: 9 brands: Microsoft Reasons: The URL 'https://qi7cfdo3mg0fby.azureedge.net/7720/?utm_medium=paid&utm_source=fb&utm_id=6599688580361&utm_content=6599688599961&utm_term=6599688590961&utm_campaign=6599688580361&fbclid=IwZXh0bgNhZW0BMAABHdzmJULh8TsQt3pW_qnmIXPFdqLqBaBKW5T-aZYxDkCqac1lwtitUH-fNw_aem_UoCoKjZX08yMSHQS1Rk-lA#' is suspicious because it uses 'azureedge.net' which is not the primary domain for Microsoft. The image shows multiple warning messages designed to scare the user into calling a support number, a common social engineering technique. The legitimate domain for Microsoft is 'microsoft.com'. The site does not have a prominent login form or captcha, but it does use social engineering techniques and contains suspicious links. Therefore, it is highly likely to be a phishing site. DOM: 33.9.pages.csv
Source: https://qi7cfdo3mg0fby.azureedge.net/7720/?utm_medium=paid&utm_source=fb&utm_id=6599688580361&utm_content=6599688599961&utm_term=6599688590961&utm_campaign=6599688580361&fbclid=IwZXh0bgNhZW0BMAABHdzmJULh8TsQt3pW_qnmIXPFdqLqBaBKW5T-aZYxDkCqac1lwtitUH-fNw_aem_UoCoKjZX08yMSHQS1Rk-lALLM: Score: 9 Reasons: The domain 'qi7cfdo3mg0fby.azureedge.net' does not match the brand name 'Microsoft Windows Security Center', which is unusual for a legitimate Microsoft security site. The warning message and domain discrepancy suggest that this webpage may be a phishing attempt or a malicious site attempting to exploit the user's trust in Microsoft. Additionally, the presence of a pop-up message with links to 'Update your browser', 'Manage your settings', and 'Leave' is a common tactic used by phishing sites to trick users into divulging sensitive information or downloading malware. The 'Threat Detected' and 'Detected Virus' alerts are also suspicious, as they are often used by phishing sites to create a sense of urgency and panic in the user, leading them to take rash actions without verifying the authenticity of the site. Overall, the combination of these factors suggests a high likelihood of this webpage being a phishing site or a malicious site attempting to exploit the user's trust in Microsoft. DOM: 1.7.pages.csv
Source: https://qi7cfdo3mg0fby.azureedge.net/7720/?utm_medium=paid&utm_source=fb&utm_id=6599688580361&utm_content=6599688599961&utm_term=6599688590961&utm_campaign=6599688580361&fbclid=IwZXh0bgNhZW0BMAABHdzmJULh8TsQt3pW_qnmIXPFdqLqBaBKW5T-aZYxDkCqac1lwtitUH-fNw_aem_UoCoKjZX08yMSHQS1Rk-lA#LLM: Score: 9 Reasons: The webpage appears to be mimicking Microsoft's branding and design, which could be an attempt to trick users into thinking it's legitimate. The presence of a critical error message and a link to 'Microsoft Windows Security Center' is a common tactic used in phishing and malware attacks. The domain does not match Microsoft's typical domain structure, which is a red flag. The warning about a possible virus and the request for user input to update the browser are also common tactics used in phishing and malware attacks. Overall, the webpage appears to be a phishing attempt designed to trick users into providing sensitive information or downloading malware. DOM: 33.9.pages.csv
Source: https://qi7cfdo3mg0fby.azureedge.net/7720/?utm_medium=paid&utm_source=fb&utm_id=6599688580361&utm_content=6599688599961&utm_term=6599688590961&utm_campaign=6599688580361&fbclid=IwZXh0bgNhZW0BMAABHdzmJULh8TsQt3pW_qnmIXPFdqLqBaBKW5T-aZYxDkCqac1lwtitUH-fNw_aem_UoCoKjZX08yMSHQS1Rk-lAMatcher: Template: microsoft matched with high similarity
Source: https://qi7cfdo3mg0fby.azureedge.net/7720/?utm_medium=paid&utm_source=fb&utm_id=6599688580361&utm_content=6599688599961&utm_term=6599688590961&utm_campaign=6599688580361&fbclid=IwZXh0bgNhZW0BMAABHdzmJULh8TsQt3pW_qnmIXPFdqLqBaBKW5T-aZYxDkCqac1lwtitUH-fNw_aem_UoCoKjZX08yMSHQS1Rk-lA#Matcher: Template: microsoft matched with high similarity
Source: https://qi7cfdo3mg0fby.azureedge.net/7720/js/main.jsHTTP Parser: var _0x595f76=_0x1b87;function _0x1b87(_0x519841,_0x2b6dda){var _0x281ff6=_0x281f();return _0x1b87=f
Source: https://qi7cfdo3mg0fby.azureedge.net/7720/?utm_medium=paid&utm_source=fb&utm_id=6599688580361&utm_content=6599688599961&utm_term=6599688590961&utm_campaign=6599688580361&fbclid=IwZXh0bgNhZW0BMAABHdzmJULh8TsQt3pW_qnmIXPFdqLqBaBKW5T-aZYxDkCqac1lwtitUH-fNw_aem_UoCoKjZX08yMSHQS1Rk-lA#HTTP Parser: var t = new xmlhttprequest();t.onreadystatechange = function () {if (4 == this.readystate && 200 == this.status) {var a = json.parse(this.responsetext);ipadd = a.ip;city = a.city;country = a.country;isp = a.connection.isp;var b = new date();currtime = a.timezone.current_time;document.getelementbyid('ip_add').textcontent = 'address ip: ' + ipadd + ' ' + b.tolocalestring('en-us', currtime);document.getelementbyid('city').textcontent = 'location: ' + city + ', ' + country;document.getelementbyid('isp').textcontent = 'isp: ' + isp;}};t.open('get', 'https://ipwho.is/?lang=en', !0);t.send();
Source: https://qi7cfdo3mg0fby.azureedge.net/7720/?utm_medium=paid&utm_source=fb&utm_id=6599688580361&utm_content=6599688599961&utm_term=6599688590961&utm_campaign=6599688580361&fbclid=IwZXh0bgNhZW0BMAABHdzmJULh8TsQt3pW_qnmIXPFdqLqBaBKW5T-aZYxDkCqac1lwtitUH-fNw_aem_UoCoKjZX08yMSHQS1Rk-lAHTTP Parser: var t = new xmlhttprequest();t.onreadystatechange = function () {if (4 == this.readystate && 200 == this.status) {var a = json.parse(this.responsetext);ipadd = a.ip;city = a.city;country = a.country;isp = a.connection.isp;var b = new date();currtime = a.timezone.current_time;document.getelementbyid('ip_add').textcontent = 'address ip: ' + ipadd + ' ' + b.tolocalestring('en-us', currtime);document.getelementbyid('city').textcontent = 'location: ' + city + ', ' + country;document.getelementbyid('isp').textcontent = 'isp: ' + isp;}};t.open('get', 'https://ipwho.is/?lang=en', !0);t.send();
Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=ee272b19-4411-433f-8f28-5c13cb6fd407&redirect_uri=https%3A%2F%2Fsupport.microsoft.com%2Fsignin-oidc&response_type=code%20id_token&scope=openid%20profile%20offline_access&response_mode=form_post&nonce=638575230092483443.YmIyOGNmNmItNmMyYS00MTI2LWEzOGQtMzUzMTZkM2FkNDJjYTQxM2UyZWMtNzEwOS00MmYxLTk3MzMtYzliZjcxYzI1Yzhh&prompt=none&nopa=2&state=CfDJ8LWN6nmb9HBGpcIJvpEgkL2V0iuAG_zszOWjTsEAPLQG58mVLCMS-ch4pKdt1p3pOT-tmgqKXYa95wZNI5MjsRacxab1Lq32B4v-LcIvCev1Ri_Yr7-q4UH10-0xci6PP79TSArid0116p3DCNlI0sF40vplXoNJRAymdmPCUPKsh7OnC3rvMOUXDLvuYnA2VwkN085YVBgwq2XdnCakMx1MhGq8ovDpFKy486XIyyc8XKAaBuN3gycqg3KPopJt66oH2xxuLUtVXTJiBTRNONxG18DjCn9TfWaiHxBPr7zCIe-M8qqA-NcHdeOzE_murcyGUuAAbdgp4jwVZgH9s3DgCsxibOUgi0OFtUbgPrGS&x-client-SKU=ID_NET6_0&x-client-ver=6.35.0.0&sso_reload=trueHTTP Parser: Form action: https://support.microsoft.com/signin-oidc microsoftonline microsoft
Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=ee272b19-4411-433f-8f28-5c13cb6fd407&redirect_uri=https%3A%2F%2Fsupport.microsoft.com%2Fsignin-oidc&response_type=code%20id_token&scope=openid%20profile%20offline_access&response_mode=form_post&nonce=638575230092483443.YmIyOGNmNmItNmMyYS00MTI2LWEzOGQtMzUzMTZkM2FkNDJjYTQxM2UyZWMtNzEwOS00MmYxLTk3MzMtYzliZjcxYzI1Yzhh&prompt=none&nopa=2&state=CfDJ8LWN6nmb9HBGpcIJvpEgkL2V0iuAG_zszOWjTsEAPLQG58mVLCMS-ch4pKdt1p3pOT-tmgqKXYa95wZNI5MjsRacxab1Lq32B4v-LcIvCev1Ri_Yr7-q4UH10-0xci6PP79TSArid0116p3DCNlI0sF40vplXoNJRAymdmPCUPKsh7OnC3rvMOUXDLvuYnA2VwkN085YVBgwq2XdnCakMx1MhGq8ovDpFKy486XIyyc8XKAaBuN3gycqg3KPopJt66oH2xxuLUtVXTJiBTRNONxG18DjCn9TfWaiHxBPr7zCIe-M8qqA-NcHdeOzE_murcyGUuAAbdgp4jwVZgH9s3DgCsxibOUgi0OFtUbgPrGS&x-client-SKU=ID_NET6_0&x-client-ver=6.35.0.0&sso_reload=trueHTTP Parser: Iframe src: https://login.live.com/Me.htm?v=3
Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=ee272b19-4411-433f-8f28-5c13cb6fd407&redirect_uri=https%3A%2F%2Fsupport.microsoft.com%2Fsignin-oidc&response_type=code%20id_token&scope=openid%20profile%20offline_access&response_mode=form_post&nonce=638575230092483443.YmIyOGNmNmItNmMyYS00MTI2LWEzOGQtMzUzMTZkM2FkNDJjYTQxM2UyZWMtNzEwOS00MmYxLTk3MzMtYzliZjcxYzI1Yzhh&prompt=none&nopa=2&state=CfDJ8LWN6nmb9HBGpcIJvpEgkL2V0iuAG_zszOWjTsEAPLQG58mVLCMS-ch4pKdt1p3pOT-tmgqKXYa95wZNI5MjsRacxab1Lq32B4v-LcIvCev1Ri_Yr7-q4UH10-0xci6PP79TSArid0116p3DCNlI0sF40vplXoNJRAymdmPCUPKsh7OnC3rvMOUXDLvuYnA2VwkN085YVBgwq2XdnCakMx1MhGq8ovDpFKy486XIyyc8XKAaBuN3gycqg3KPopJt66oH2xxuLUtVXTJiBTRNONxG18DjCn9TfWaiHxBPr7zCIe-M8qqA-NcHdeOzE_murcyGUuAAbdgp4jwVZgH9s3DgCsxibOUgi0OFtUbgPrGS&x-client-SKU=ID_NET6_0&x-client-ver=6.35.0.0HTTP Parser: Number of links: 0
Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=ee272b19-4411-433f-8f28-5c13cb6fd407&redirect_uri=https%3A%2F%2Fsupport.microsoft.com%2Fsignin-oidc&response_type=code%20id_token&scope=openid%20profile%20offline_access&response_mode=form_post&nonce=638575230092483443.YmIyOGNmNmItNmMyYS00MTI2LWEzOGQtMzUzMTZkM2FkNDJjYTQxM2UyZWMtNzEwOS00MmYxLTk3MzMtYzliZjcxYzI1Yzhh&prompt=none&nopa=2&state=CfDJ8LWN6nmb9HBGpcIJvpEgkL2V0iuAG_zszOWjTsEAPLQG58mVLCMS-ch4pKdt1p3pOT-tmgqKXYa95wZNI5MjsRacxab1Lq32B4v-LcIvCev1Ri_Yr7-q4UH10-0xci6PP79TSArid0116p3DCNlI0sF40vplXoNJRAymdmPCUPKsh7OnC3rvMOUXDLvuYnA2VwkN085YVBgwq2XdnCakMx1MhGq8ovDpFKy486XIyyc8XKAaBuN3gycqg3KPopJt66oH2xxuLUtVXTJiBTRNONxG18DjCn9TfWaiHxBPr7zCIe-M8qqA-NcHdeOzE_murcyGUuAAbdgp4jwVZgH9s3DgCsxibOUgi0OFtUbgPrGS&x-client-SKU=ID_NET6_0&x-client-ver=6.35.0.0&sso_reload=trueHTTP Parser: Number of links: 0
Source: https://support.microsoft.com/en-us/windowsHTTP Parser: Base64 decoded: =G0AE
Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=ee272b19-4411-433f-8f28-5c13cb6fd407&redirect_uri=https%3A%2F%2Fsupport.microsoft.com%2Fsignin-oidc&response_type=code%20id_token&scope=openid%20profile%20offline_access&response_mode=form_post&nonce=638575230092483443.YmIyOGNmNmItNmMyYS00MTI2LWEzOGQtMzUzMTZkM2FkNDJjYTQxM2UyZWMtNzEwOS00MmYxLTk3MzMtYzliZjcxYzI1Yzhh&prompt=none&nopa=2&state=CfDJ8LWN6nmb9HBGpcIJvpEgkL2V0iuAG_zszOWjTsEAPLQG58mVLCMS-ch4pKdt1p3pOT-tmgqKXYa95wZNI5MjsRacxab1Lq32B4v-LcIvCev1Ri_Yr7-q4UH10-0xci6PP79TSArid0116p3DCNlI0sF40vplXoNJRAymdmPCUPKsh7OnC3rvMOUXDLvuYnA2VwkN085YVBgwq2XdnCakMx1MhGq8ovDpFKy486XIyyc8XKAaBuN3gycqg3KPopJt66oH2xxuLUtVXTJiBTRNONxG18DjCn9TfWaiHxBPr7zCIe-M8qqA-NcHdeOzE_murcyGUuAAbdgp4jwVZgH9s3DgCsxibOUgi0OFtUbgPrGS&x-client-SKU=ID_NET6_0&x-client-ver=6.35.0.0HTTP Parser: Title: Redirecting does not match URL
Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=ee272b19-4411-433f-8f28-5c13cb6fd407&redirect_uri=https%3A%2F%2Fsupport.microsoft.com%2Fsignin-oidc&response_type=code%20id_token&scope=openid%20profile%20offline_access&response_mode=form_post&nonce=638575230092483443.YmIyOGNmNmItNmMyYS00MTI2LWEzOGQtMzUzMTZkM2FkNDJjYTQxM2UyZWMtNzEwOS00MmYxLTk3MzMtYzliZjcxYzI1Yzhh&prompt=none&nopa=2&state=CfDJ8LWN6nmb9HBGpcIJvpEgkL2V0iuAG_zszOWjTsEAPLQG58mVLCMS-ch4pKdt1p3pOT-tmgqKXYa95wZNI5MjsRacxab1Lq32B4v-LcIvCev1Ri_Yr7-q4UH10-0xci6PP79TSArid0116p3DCNlI0sF40vplXoNJRAymdmPCUPKsh7OnC3rvMOUXDLvuYnA2VwkN085YVBgwq2XdnCakMx1MhGq8ovDpFKy486XIyyc8XKAaBuN3gycqg3KPopJt66oH2xxuLUtVXTJiBTRNONxG18DjCn9TfWaiHxBPr7zCIe-M8qqA-NcHdeOzE_murcyGUuAAbdgp4jwVZgH9s3DgCsxibOUgi0OFtUbgPrGS&x-client-SKU=ID_NET6_0&x-client-ver=6.35.0.0&sso_reload=trueHTTP Parser: Title: Redirecting does not match URL
Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=ee272b19-4411-433f-8f28-5c13cb6fd407&redirect_uri=https%3A%2F%2Fsupport.microsoft.com%2Fsignin-oidc&response_type=code%20id_token&scope=openid%20profile%20offline_access&response_mode=form_post&nonce=638575230092483443.YmIyOGNmNmItNmMyYS00MTI2LWEzOGQtMzUzMTZkM2FkNDJjYTQxM2UyZWMtNzEwOS00MmYxLTk3MzMtYzliZjcxYzI1Yzhh&prompt=none&nopa=2&state=CfDJ8LWN6nmb9HBGpcIJvpEgkL2V0iuAG_zszOWjTsEAPLQG58mVLCMS-ch4pKdt1p3pOT-tmgqKXYa95wZNI5MjsRacxab1Lq32B4v-LcIvCev1Ri_Yr7-q4UH10-0xci6PP79TSArid0116p3DCNlI0sF40vplXoNJRAymdmPCUPKsh7OnC3rvMOUXDLvuYnA2VwkN085YVBgwq2XdnCakMx1MhGq8ovDpFKy486XIyyc8XKAaBuN3gycqg3KPopJt66oH2xxuLUtVXTJiBTRNONxG18DjCn9TfWaiHxBPr7zCIe-M8qqA-NcHdeOzE_murcyGUuAAbdgp4jwVZgH9s3DgCsxibOUgi0OFtUbgPrGS&x-client-SKU=ID_NET6_0&x-client-ver=6.35.0.0HTTP Parser: No favicon
Source: https://login.microsoftonline.com/savedusers?appid=ee272b19-4411-433f-8f28-5c13cb6fd407&wreply=https%3A%2F%2Fsupport.microsoft.com%2Fsignin-oidc&uaid=618dd851-f488-4d70-ccf5-7c1fbd1d9220&partnerId=smcconvergence&idpflag=proxyHTTP Parser: No favicon
Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=ee272b19-4411-433f-8f28-5c13cb6fd407&redirect_uri=https%3A%2F%2Fsupport.microsoft.com%2Fsignin-oidc&response_type=code%20id_token&scope=openid%20profile%20offline_access&response_mode=form_post&nonce=638575230092483443.YmIyOGNmNmItNmMyYS00MTI2LWEzOGQtMzUzMTZkM2FkNDJjYTQxM2UyZWMtNzEwOS00MmYxLTk3MzMtYzliZjcxYzI1Yzhh&prompt=none&nopa=2&state=CfDJ8LWN6nmb9HBGpcIJvpEgkL2V0iuAG_zszOWjTsEAPLQG58mVLCMS-ch4pKdt1p3pOT-tmgqKXYa95wZNI5MjsRacxab1Lq32B4v-LcIvCev1Ri_Yr7-q4UH10-0xci6PP79TSArid0116p3DCNlI0sF40vplXoNJRAymdmPCUPKsh7OnC3rvMOUXDLvuYnA2VwkN085YVBgwq2XdnCakMx1MhGq8ovDpFKy486XIyyc8XKAaBuN3gycqg3KPopJt66oH2xxuLUtVXTJiBTRNONxG18DjCn9TfWaiHxBPr7zCIe-M8qqA-NcHdeOzE_murcyGUuAAbdgp4jwVZgH9s3DgCsxibOUgi0OFtUbgPrGS&x-client-SKU=ID_NET6_0&x-client-ver=6.35.0.0&sso_reload=trueHTTP Parser: No favicon
Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=ee272b19-4411-433f-8f28-5c13cb6fd407&redirect_uri=https%3A%2F%2Fsupport.microsoft.com%2Fsignin-oidc&response_type=code%20id_token&scope=openid%20profile%20offline_access&response_mode=form_post&nonce=638575230092483443.YmIyOGNmNmItNmMyYS00MTI2LWEzOGQtMzUzMTZkM2FkNDJjYTQxM2UyZWMtNzEwOS00MmYxLTk3MzMtYzliZjcxYzI1Yzhh&prompt=none&nopa=2&state=CfDJ8LWN6nmb9HBGpcIJvpEgkL2V0iuAG_zszOWjTsEAPLQG58mVLCMS-ch4pKdt1p3pOT-tmgqKXYa95wZNI5MjsRacxab1Lq32B4v-LcIvCev1Ri_Yr7-q4UH10-0xci6PP79TSArid0116p3DCNlI0sF40vplXoNJRAymdmPCUPKsh7OnC3rvMOUXDLvuYnA2VwkN085YVBgwq2XdnCakMx1MhGq8ovDpFKy486XIyyc8XKAaBuN3gycqg3KPopJt66oH2xxuLUtVXTJiBTRNONxG18DjCn9TfWaiHxBPr7zCIe-M8qqA-NcHdeOzE_murcyGUuAAbdgp4jwVZgH9s3DgCsxibOUgi0OFtUbgPrGS&x-client-SKU=ID_NET6_0&x-client-ver=6.35.0.0HTTP Parser: No <meta name="author".. found
Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=ee272b19-4411-433f-8f28-5c13cb6fd407&redirect_uri=https%3A%2F%2Fsupport.microsoft.com%2Fsignin-oidc&response_type=code%20id_token&scope=openid%20profile%20offline_access&response_mode=form_post&nonce=638575230092483443.YmIyOGNmNmItNmMyYS00MTI2LWEzOGQtMzUzMTZkM2FkNDJjYTQxM2UyZWMtNzEwOS00MmYxLTk3MzMtYzliZjcxYzI1Yzhh&prompt=none&nopa=2&state=CfDJ8LWN6nmb9HBGpcIJvpEgkL2V0iuAG_zszOWjTsEAPLQG58mVLCMS-ch4pKdt1p3pOT-tmgqKXYa95wZNI5MjsRacxab1Lq32B4v-LcIvCev1Ri_Yr7-q4UH10-0xci6PP79TSArid0116p3DCNlI0sF40vplXoNJRAymdmPCUPKsh7OnC3rvMOUXDLvuYnA2VwkN085YVBgwq2XdnCakMx1MhGq8ovDpFKy486XIyyc8XKAaBuN3gycqg3KPopJt66oH2xxuLUtVXTJiBTRNONxG18DjCn9TfWaiHxBPr7zCIe-M8qqA-NcHdeOzE_murcyGUuAAbdgp4jwVZgH9s3DgCsxibOUgi0OFtUbgPrGS&x-client-SKU=ID_NET6_0&x-client-ver=6.35.0.0&sso_reload=trueHTTP Parser: No <meta name="author".. found
Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=ee272b19-4411-433f-8f28-5c13cb6fd407&redirect_uri=https%3A%2F%2Fsupport.microsoft.com%2Fsignin-oidc&response_type=code%20id_token&scope=openid%20profile%20offline_access&response_mode=form_post&nonce=638575230092483443.YmIyOGNmNmItNmMyYS00MTI2LWEzOGQtMzUzMTZkM2FkNDJjYTQxM2UyZWMtNzEwOS00MmYxLTk3MzMtYzliZjcxYzI1Yzhh&prompt=none&nopa=2&state=CfDJ8LWN6nmb9HBGpcIJvpEgkL2V0iuAG_zszOWjTsEAPLQG58mVLCMS-ch4pKdt1p3pOT-tmgqKXYa95wZNI5MjsRacxab1Lq32B4v-LcIvCev1Ri_Yr7-q4UH10-0xci6PP79TSArid0116p3DCNlI0sF40vplXoNJRAymdmPCUPKsh7OnC3rvMOUXDLvuYnA2VwkN085YVBgwq2XdnCakMx1MhGq8ovDpFKy486XIyyc8XKAaBuN3gycqg3KPopJt66oH2xxuLUtVXTJiBTRNONxG18DjCn9TfWaiHxBPr7zCIe-M8qqA-NcHdeOzE_murcyGUuAAbdgp4jwVZgH9s3DgCsxibOUgi0OFtUbgPrGS&x-client-SKU=ID_NET6_0&x-client-ver=6.35.0.0HTTP Parser: No <meta name="copyright".. found
Source: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=ee272b19-4411-433f-8f28-5c13cb6fd407&redirect_uri=https%3A%2F%2Fsupport.microsoft.com%2Fsignin-oidc&response_type=code%20id_token&scope=openid%20profile%20offline_access&response_mode=form_post&nonce=638575230092483443.YmIyOGNmNmItNmMyYS00MTI2LWEzOGQtMzUzMTZkM2FkNDJjYTQxM2UyZWMtNzEwOS00MmYxLTk3MzMtYzliZjcxYzI1Yzhh&prompt=none&nopa=2&state=CfDJ8LWN6nmb9HBGpcIJvpEgkL2V0iuAG_zszOWjTsEAPLQG58mVLCMS-ch4pKdt1p3pOT-tmgqKXYa95wZNI5MjsRacxab1Lq32B4v-LcIvCev1Ri_Yr7-q4UH10-0xci6PP79TSArid0116p3DCNlI0sF40vplXoNJRAymdmPCUPKsh7OnC3rvMOUXDLvuYnA2VwkN085YVBgwq2XdnCakMx1MhGq8ovDpFKy486XIyyc8XKAaBuN3gycqg3KPopJt66oH2xxuLUtVXTJiBTRNONxG18DjCn9TfWaiHxBPr7zCIe-M8qqA-NcHdeOzE_murcyGUuAAbdgp4jwVZgH9s3DgCsxibOUgi0OFtUbgPrGS&x-client-SKU=ID_NET6_0&x-client-ver=6.35.0.0&sso_reload=trueHTTP Parser: No <meta name="copyright".. found
Source: unknownHTTPS traffic detected: 40.127.169.103:443 -> 192.168.2.17:49713 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.127.169.103:443 -> 192.168.2.17:49873 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.190.160.20:443 -> 192.168.2.17:49874 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.5.88:443 -> 192.168.2.17:49875 version: TLS 1.2
Source: unknownHTTPS traffic detected: 2.23.209.158:443 -> 192.168.2.17:49877 version: TLS 1.2
Source: unknownHTTPS traffic detected: 204.79.197.200:443 -> 192.168.2.17:49883 version: TLS 1.2
Source: chrome.exeMemory has grown: Private usage: 21MB later: 27MB
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.13
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.13
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.13
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: l.facebook.com
Source: global trafficDNS traffic detected: DNS query: nutramart.store
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: ipwho.is
Source: global trafficDNS traffic detected: DNS query: support.content.office.net
Source: global trafficDNS traffic detected: DNS query: c.s-microsoft.com
Source: global trafficDNS traffic detected: DNS query: js.monitor.azure.com
Source: global trafficDNS traffic detected: DNS query: aadcdn.msftauth.net
Source: global trafficDNS traffic detected: DNS query: mem.gfx.ms
Source: global trafficDNS traffic detected: DNS query: connect.facebook.net
Source: global trafficDNS traffic detected: DNS query: userstatics.com
Source: global trafficDNS traffic detected: DNS query: www.facebook.com
Source: global trafficDNS traffic detected: DNS query: login.microsoftonline.com
Source: global trafficDNS traffic detected: DNS query: logincdn.msftauth.net
Source: global trafficDNS traffic detected: DNS query: acctcdn.msftauth.net
Source: unknownNetwork traffic detected: HTTP traffic on port 49817 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 49800 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49875 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49878 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49803 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49852 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49856
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
Source: unknownNetwork traffic detected: HTTP traffic on port 49841 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49853
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49852
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49851
Source: unknownNetwork traffic detected: HTTP traffic on port 49837 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49850
Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
Source: unknownNetwork traffic detected: HTTP traffic on port 49869 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49844
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49842
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49841
Source: unknownNetwork traffic detected: HTTP traffic on port 49844 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49873 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49850 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49831 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49838
Source: unknownNetwork traffic detected: HTTP traffic on port 49680 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49837
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49836
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49835
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49832
Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49831
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49797
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49796
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49794
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49791
Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49870 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49856 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49853 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49796 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49867 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49842 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49836 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49871 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49818
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49817
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49791 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49868 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49794 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49802 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49851 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49882 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49803
Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49802
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49801
Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49800
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
Source: unknownNetwork traffic detected: HTTP traffic on port 49838 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49883
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49882
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49877 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49797 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49801 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49883 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49878
Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49877
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49875
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49874
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49873
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49818 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49871
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49870
Source: unknownNetwork traffic detected: HTTP traffic on port 49835 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49874 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49832 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49869
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49868
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49867
Source: unknownHTTPS traffic detected: 40.127.169.103:443 -> 192.168.2.17:49713 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.127.169.103:443 -> 192.168.2.17:49873 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.190.160.20:443 -> 192.168.2.17:49874 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.5.88:443 -> 192.168.2.17:49875 version: TLS 1.2
Source: unknownHTTPS traffic detected: 2.23.209.158:443 -> 192.168.2.17:49877 version: TLS 1.2
Source: unknownHTTPS traffic detected: 204.79.197.200:443 -> 192.168.2.17:49883 version: TLS 1.2
Source: classification engineClassification label: mal64.phis.win@22/65@48/263
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://l.facebook.com/l.php?u=https%3A%2F%2Fnutramart.store%2F%3Flabel%3D5efe465a4dbe59fbb290a966697fc1cd%26utm_medium%3Dpaid%26utm_source%3Dfb%26utm_id%3D6599688580361%26utm_content%3D6599688599961%26utm_term%3D6599688590961%26utm_campaign%3D6599688580361%26fbclid%3DIwZXh0bgNhZW0BMAABHdzmJULh8TsQt3pW_qnmIXPFdqLqBaBKW5T-aZYxDkCqac1lwtitUH-fNw_aem_UoCoKjZX08yMSHQS1Rk-lA&h=AT2Rbdo290L85DwdtmvCHSaYZeZQw6zVRZwOCmLUor4sXK9slv2_8Xz3sNHtiR9yk_5i3WV0TyI-vvISy2qX4eX89xJtn5joKswTFrWNikf-8BbcY1c3OSbcsV7ioNYHeRE&__tn__=%2CmH-R&c%5B0%5D=AT1zpbOywPCbT61x3IUZxcKH5NMmiyOktbAovmzxAnO3GQxZoE9RLlfDBYeXTFE8UxKMEzW4i7Rw_yO3qxx7WfbLZEKXf2a_gqDGEIqK5xACO326D8DwbL9YKGpFirOaXzMC_oPb4wgEghT5w108ehD0lVOUa18OX2Yna4VvaAaIUpPjAkk9gOhJw0AtcNc8dmXxzoPXiUwIYEI1VCwKUmK1G_lmEdu24Iq9UJ_ic75uGIJuxQwEttfLYZ0HqkC3D8EpDSqIjHE7T12pe_syL5VjKXEGR6hZ3F-YEVJbiZGhU5diMWZAvsPL2bUpvSMNWrEu14yqnXQK7Z-1xnZRSbLWmzHp53sdCj21
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1988,i,1234219138249571081,14427230395194930104,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1988,i,1234219138249571081,14427230395194930104,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4124 --field-trial-handle=1988,i,1234219138249571081,14427230395194930104,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4124 --field-trial-handle=1988,i,1234219138249571081,14427230395194930104,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure1
Drive-by Compromise
Windows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
Extra Window Memory Injection
1
Extra Window Memory Injection
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
star-mini.c10r.facebook.com
157.240.0.35
truefalse
    unknown
    sni1gl.wpc.alphacdn.net
    152.199.21.175
    truefalse
      unknown
      s-part-0017.t-0009.t-msedge.net
      13.107.246.45
      truefalse
        unknown
        z-m.c10r.facebook.com
        157.240.0.37
        truefalse
          unknown
          s-part-0035.t-0009.t-msedge.net
          13.107.246.63
          truefalse
            unknown
            s-part-0039.t-0009.t-msedge.net
            13.107.246.67
            truefalse
              unknown
              s-part-0014.t-0009.t-msedge.net
              13.107.246.42
              truefalse
                unknown
                scontent.xx.fbcdn.net
                157.240.251.9
                truefalse
                  unknown
                  ipwho.is
                  195.201.57.90
                  truetrue
                    unknown
                    userstatics.com
                    188.114.97.3
                    truefalse
                      unknown
                      nutramart.store
                      188.114.97.3
                      truefalse
                        unknown
                        sni1gl.wpc.omegacdn.net
                        152.199.21.175
                        truefalse
                          unknown
                          www.google.com
                          216.58.206.36
                          truefalse
                            unknown
                            s-part-0032.t-0009.t-msedge.net
                            13.107.246.60
                            truefalse
                              unknown
                              js.monitor.azure.com
                              unknown
                              unknownfalse
                                unknown
                                www.facebook.com
                                unknown
                                unknownfalse
                                  unknown
                                  l.facebook.com
                                  unknown
                                  unknownfalse
                                    unknown
                                    aadcdn.msftauth.net
                                    unknown
                                    unknownfalse
                                      unknown
                                      logincdn.msftauth.net
                                      unknown
                                      unknownfalse
                                        unknown
                                        connect.facebook.net
                                        unknown
                                        unknownfalse
                                          unknown
                                          mem.gfx.ms
                                          unknown
                                          unknownfalse
                                            unknown
                                            c.s-microsoft.com
                                            unknown
                                            unknownfalse
                                              unknown
                                              support.content.office.net
                                              unknown
                                              unknownfalse
                                                unknown
                                                login.microsoftonline.com
                                                unknown
                                                unknownfalse
                                                  unknown
                                                  acctcdn.msftauth.net
                                                  unknown
                                                  unknownfalse
                                                    unknown
                                                    • No. of IPs < 25%
                                                    • 25% < No. of IPs < 50%
                                                    • 50% < No. of IPs < 75%
                                                    • 75% < No. of IPs
                                                    IPDomainCountryFlagASNASN NameMalicious
                                                    13.107.246.42
                                                    s-part-0014.t-0009.t-msedge.netUnited States
                                                    8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                    13.107.246.63
                                                    s-part-0035.t-0009.t-msedge.netUnited States
                                                    8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                    52.168.117.171
                                                    unknownUnited States
                                                    8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                    13.107.246.45
                                                    s-part-0017.t-0009.t-msedge.netUnited States
                                                    8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                    13.107.246.67
                                                    s-part-0039.t-0009.t-msedge.netUnited States
                                                    8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                    95.101.149.131
                                                    unknownEuropean Union
                                                    20940AKAMAI-ASN1EUfalse
                                                    172.217.18.14
                                                    unknownUnited States
                                                    15169GOOGLEUSfalse
                                                    95.101.148.110
                                                    unknownEuropean Union
                                                    20940AKAMAI-ASN1EUfalse
                                                    13.107.246.60
                                                    s-part-0032.t-0009.t-msedge.netUnited States
                                                    8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                    216.58.206.36
                                                    www.google.comUnited States
                                                    15169GOOGLEUSfalse
                                                    23.192.249.186
                                                    unknownUnited States
                                                    16625AKAMAI-ASUSfalse
                                                    20.189.173.17
                                                    unknownUnited States
                                                    8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                    142.251.168.84
                                                    unknownUnited States
                                                    15169GOOGLEUSfalse
                                                    184.28.89.233
                                                    unknownUnited States
                                                    16625AKAMAI-ASUSfalse
                                                    40.126.31.67
                                                    unknownUnited States
                                                    8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                    142.250.186.131
                                                    unknownUnited States
                                                    15169GOOGLEUSfalse
                                                    142.250.186.99
                                                    unknownUnited States
                                                    15169GOOGLEUSfalse
                                                    195.201.57.90
                                                    ipwho.isGermany
                                                    24940HETZNER-ASDEtrue
                                                    1.1.1.1
                                                    unknownAustralia
                                                    13335CLOUDFLARENETUSfalse
                                                    157.240.0.35
                                                    star-mini.c10r.facebook.comUnited States
                                                    32934FACEBOOKUSfalse
                                                    20.42.65.93
                                                    unknownUnited States
                                                    8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                    142.250.185.110
                                                    unknownUnited States
                                                    15169GOOGLEUSfalse
                                                    157.240.0.37
                                                    z-m.c10r.facebook.comUnited States
                                                    32934FACEBOOKUSfalse
                                                    157.240.251.9
                                                    scontent.xx.fbcdn.netUnited States
                                                    32934FACEBOOKUSfalse
                                                    142.250.186.106
                                                    unknownUnited States
                                                    15169GOOGLEUSfalse
                                                    23.54.142.31
                                                    unknownUnited States
                                                    20940AKAMAI-ASN1EUfalse
                                                    239.255.255.250
                                                    unknownReserved
                                                    unknownunknownfalse
                                                    188.114.97.3
                                                    userstatics.comEuropean Union
                                                    13335CLOUDFLARENETUSfalse
                                                    152.199.21.175
                                                    sni1gl.wpc.alphacdn.netUnited States
                                                    15133EDGECASTUSfalse
                                                    142.250.186.100
                                                    unknownUnited States
                                                    15169GOOGLEUSfalse
                                                    40.126.32.136
                                                    unknownUnited States
                                                    8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                    2.18.64.214
                                                    unknownEuropean Union
                                                    6057AdministracionNacionaldeTelecomunicacionesUYfalse
                                                    20.44.10.122
                                                    unknownUnited States
                                                    8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                    IP
                                                    192.168.2.17
                                                    Joe Sandbox version:40.0.0 Tourmaline
                                                    Analysis ID:1482228
                                                    Start date and time:2024-07-25 18:49:16 +02:00
                                                    Joe Sandbox product:CloudBasic
                                                    Overall analysis duration:
                                                    Hypervisor based Inspection enabled:false
                                                    Report type:full
                                                    Cookbook file name:defaultwindowsinteractivecookbook.jbs
                                                    Sample URL:https://l.facebook.com/l.php?u=https%3A%2F%2Fnutramart.store%2F%3Flabel%3D5efe465a4dbe59fbb290a966697fc1cd%26utm_medium%3Dpaid%26utm_source%3Dfb%26utm_id%3D6599688580361%26utm_content%3D6599688599961%26utm_term%3D6599688590961%26utm_campaign%3D6599688580361%26fbclid%3DIwZXh0bgNhZW0BMAABHdzmJULh8TsQt3pW_qnmIXPFdqLqBaBKW5T-aZYxDkCqac1lwtitUH-fNw_aem_UoCoKjZX08yMSHQS1Rk-lA&h=AT2Rbdo290L85DwdtmvCHSaYZeZQw6zVRZwOCmLUor4sXK9slv2_8Xz3sNHtiR9yk_5i3WV0TyI-vvISy2qX4eX89xJtn5joKswTFrWNikf-8BbcY1c3OSbcsV7ioNYHeRE&__tn__=%2CmH-R&c%5B0%5D=AT1zpbOywPCbT61x3IUZxcKH5NMmiyOktbAovmzxAnO3GQxZoE9RLlfDBYeXTFE8UxKMEzW4i7Rw_yO3qxx7WfbLZEKXf2a_gqDGEIqK5xACO326D8DwbL9YKGpFirOaXzMC_oPb4wgEghT5w108ehD0lVOUa18OX2Yna4VvaAaIUpPjAkk9gOhJw0AtcNc8dmXxzoPXiUwIYEI1VCwKUmK1G_lmEdu24Iq9UJ_ic75uGIJuxQwEttfLYZ0HqkC3D8EpDSqIjHE7T12pe_syL5VjKXEGR6hZ3F-YEVJbiZGhU5diMWZAvsPL2bUpvSMNWrEu14yqnXQK7Z-1xnZRSbLWmzHp53sdCj21
                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                    Number of analysed new started processes analysed:25
                                                    Number of new started drivers analysed:0
                                                    Number of existing processes analysed:0
                                                    Number of existing drivers analysed:0
                                                    Number of injected processes analysed:0
                                                    Technologies:
                                                    • EGA enabled
                                                    Analysis Mode:stream
                                                    Analysis stop reason:Timeout
                                                    Detection:MAL
                                                    Classification:mal64.phis.win@22/65@48/263
                                                    • Exclude process from analysis (whitelisted): SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, svchost.exe
                                                    • Excluded IPs from analysis (whitelisted): 142.250.186.131, 142.251.168.84, 142.250.185.110
                                                    • Excluded domains from analysis (whitelisted): fs.microsoft.com, clients2.google.com, accounts.google.com, clientservices.googleapis.com, clients.l.google.com
                                                    • Not all processes where analyzed, report is missing behavior information
                                                    • VT rate limit hit for: https://l.facebook.com/l.php?u=https%3A%2F%2Fnutramart.store%2F%3Flabel%3D5efe465a4dbe59fbb290a966697fc1cd%26utm_medium%3Dpaid%26utm_source%3Dfb%26utm_id%3D6599688580361%26utm_content%3D6599688599961%26utm_term%3D6599688590961%26utm_campaign%3D6599688580361%26fbclid%3DIwZXh0bgNhZW0BMAABHdzmJULh8TsQt3pW_qnmIXPFdqLqBaBKW5T-aZYxDkCqac1lwtitUH-fNw_aem_UoCoKjZX08yMSHQS1Rk-lA&h=AT2Rbdo290L85DwdtmvCHSaYZeZQw6zVRZwOCmLUor4sXK9slv2_8Xz3sNHtiR9yk_5i3WV0TyI-vvISy2qX4eX89xJtn5joKswTFrWNikf-8BbcY1c3OSbcsV7ioNYHeRE&__tn__=%2CmH-R&c%5B0%5D=AT1zpbOywPCbT61x3IUZxcKH5NMmiyOktbAovmzxAnO3GQxZoE9RLlfDBYeXTFE8UxKMEzW4i7Rw_yO3qxx7WfbLZEKXf2a_gqDGEIqK5xACO326D8DwbL9YKGpFirOaXzMC_oPb4wgEghT5w108ehD0lVOUa18OX2Yna4VvaAaIUpPjAkk9gOhJw0AtcNc8dmXxzoPXiUwIYEI1VCwKUmK1G_lmEdu24Iq9UJ_ic75uGIJuxQwEttfLYZ0HqkC3D8EpDSqIjHE7T12pe_syL5VjKXEGR6hZ3F-YEVJbiZGhU5diMWZAvsPL2bUpvSMNWrEu14yqnXQK7Z-1xnZRSbLWmzHp53sdCj21
                                                    InputOutput
                                                    URL: https://qi7cfdo3mg0fby.azureedge.net/7720/?utm_medium=paid&utm_source=fb&utm_id=6599688580361&utm_content=6599688599961&utm_term=6599688590961&utm_campaign=6599688580361&fbclid=IwZXh0bgNhZW0BMAABHdzmJULh8TsQt3pW_qnmIXPFdqLqBaBKW5T-aZYxDkCqac1lwtitUH-fNw_a Model: Perplexity: mixtral-8x7b-instruct
                                                    {"loginform": false,"urgency": true,"captcha": false,"reasons": ["The text creates a sense of urgency by warning the user that their changes may not be saved if they leave the site.","The use of phrases like 'Threat Detected' and 'Access has been blocked' are designed to scare the user into taking action.","The presence of a phone number for 'Microsoft Windows Support' suggests that this page may be trying to phish for sensitive information."]}
                                                    Title: Security center OCR: i Leave site? Microsoft Support Microsoft 365 365 All Microsoft Sign in Changes vou made may not be saved. C) Prevent this from additional dialogs Cancel W I your browser as as The following errors are also possible on outdated versions of the browr: Microsoft Windo x > Loss of personal and stored data Microsoft Windows Security Center Threat Detected: xxbc Detected Address 'P: 8.46.123.33 7/25/2024, PM Location: New York, United States O Irsullation & air DrWers ISP: Level with Access has been blocked  Contact Microsoft Windows Support: +1-833-890-7720 Microsoft Windows Continue Achieve more Microsoft Support +1-833-890-7720 Windows is the first PC platform to provide centralized A1 assistance. -e Microsoft Windows: Support Contact Security Note : is known to steal "firm amn 
                                                    URL: https://qi7cfdo3mg0fby.azureedge.net/7720/?utm_medium=paid&utm_source=fb&utm_id=6599688580361&utm_content=6599688599961&utm_term=6599688590961&utm_campaign=6599688580361&fbclid=IwZXh0bgNhZW0BMAABHdzmJULh8TsQt3pW_qnmIXPFdqLqBaBKW5T-aZYxDkCqac1lwtitUH-fNw_a Model: gpt-4o
                                                    ```json
                                                    {
                                                      "phishing_score": 9,
                                                      "brands": "Microsoft",
                                                      "phishing": true,
                                                      "suspicious_domain": true,
                                                      "has_prominent_loginform": false,
                                                      "has_captcha": false,
                                                      "setechniques": true,
                                                      "has_suspicious_link": true,
                                                      "legitmate_domain": "microsoft.com",
                                                      "reasons": "The URL 'https://qi7cfdo3mg0fby.azureedge.net/7720/?utm_medium=paid&utm_source=fb&utm_id=6599688580361&utm_content=6599688599961&utm_term=6599688590961&utm_campaign=6599688580361&fbclid=IwZXh0bgNhZW0BMAABHdzmJULh8TsQt3pW_qnmIXPFdqLqBaBKW5T-aZYxDkCqac1lwtitUH-fNw_aem_UoCoKjZX08yMSHQS1Rk-lA' is suspicious as it does not match the legitimate domain 'microsoft.com' associated with the brand Microsoft. The page uses social engineering techniques such as alarming messages about threats and urging the user to contact support, which is a common tactic in phishing attacks. The presence of a suspicious link and the use of a subdomain that does not belong to the official Microsoft domain further indicate that this is likely a phishing site."
                                                    }
                                                    URL: https://qi7cfdo3mg0fby.azureedge.net/7720/?utm_medium=paid&utm_source=fb&utm_id=6599688580361&utm_content=6599688599961&utm_term=6599688590961&utm_campaign=6599688580361&fbclid=IwZXh0bgNhZW0BMAABHdzmJULh8TsQt3pW_qnmIXPFdqLqBaBKW5T-aZYxDkCqac1lwtitUH-fNw_a Model: custom
                                                    {"phishing_score": 10, "brand_name": "Microsoft", "reasons": "The URL 'qi7cfdo3mg0fby.azureedge.net' is not associated with Microsoft's official domains, and the domain appears suspicious due to its unusual format. The webpage displays a warning message about changes to the site, which is unusual for a legitimate Microsoft update. The presence of Microsoft Support and Security Support links is misleading, as these links are not associated with Microsoft's official domains. The webpage's attempt to trick users into downloading malware is a clear indication of phishing."}
                                                    URL: https://qi7cfdo3mg0fby.azureedge.net/7720/?utm_medium=paid&utm_source=fb&utm_id=6599688580361&utm_content=6599688599961&utm_term=6599688590961&utm_campaign=6599688580361&fbclid=IwZXh0bgNhZW0BMAABHdzmJULh8TsQt3pW_qnmIXPFdqLqBaBKW5T-aZYxDkCqac1lwtitUH-fNw_a Model: Perplexity: mixtral-8x7b-instruct
                                                    {"loginform": false,"urgency": true,"captcha": false,"reasons": ["The text creates a sense of urgency by instructing the user to take immediate action to avoid negative consequences such as data loss and confidential information leak.","The text implies that the user's device is infected with a dangerous ransomware and that a technician can help solve the problem.","The text includes a phone number for the user to contact Microsoft Windows Support.","The text includes a warning about potential data theft due to COVID-19 and outdated versions of the browser."]}Explanation:* The webpage does not contain a login form as there is no explicit request for sensitive information such as passwords, email addresses, usernames, phone numbers or credit card numbers.* The text creates a sense of urgency by instructing the user to take immediate action to avoid negative consequences such as data loss and confidential information leak.* The webpage does not contain a CAPTCHA or anti-robot detection mechanism.* The reasons provided in the array of strings are based on the analysis of the text and the potential impact on the user.
                                                    Title: Security center OCR: i Microsoft Support Microsoft 365 This Microsoft Windows is infected with trojan:SLocker, a dangerous ransomware 'vlicrosoft and it will lock your device! Virus must removed immediately! Please contact us immediately. A technician will help you solve the problem. version update your browser as sjn as possible. The following errors are also possible on outdated versions of the browser: How can > Loss of personal and stored data > Confidental ifirmation leak Microsoft Windows x > Browsers errors Microsoft Windows Security Center Irsullation & DrWers air Threat Detected: xxbc Detected Address 'P: 8.46.123.33 7/25/2024, PM Location: New York, United States ISP: Level with Access has been blocked  Contact Microsoft Windows Support: +1-833-890-7720 Microsoft Windows Continue Microsoft Support +1-833-890-7720 Achieve more with A1 in Windows -e Microsoft Windows: Support Contact Nme : Ma is krown to ste* information from yow aM use your identv to do makious transuus_ Due to COVID-19, data theft inddents via a Went that injects to our brokwer Win 
                                                    URL: https://qi7cfdo3mg0fby.azureedge.net/7720/?utm_medium=paid&utm_source=fb&utm_id=6599688580361&utm_content=6599688599961&utm_term=6599688590961&utm_campaign=6599688580361&fbclid=IwZXh0bgNhZW0BMAABHdzmJULh8TsQt3pW_qnmIXPFdqLqBaBKW5T-aZYxDkCqac1lwtitUH-fNw_a Model: Perplexity: mixtral-8x7b-instruct
                                                    {"loginform": false,"urgency": true,"captcha": false,"reasons": ["The text creates a sense of urgency by using phrases such as 'Virus must removed immediately!', 'A critical has due to the cwtdated Of the browser.', 'Threat Detected: xxbc Detected Address 'P: 8.46.123.33', 'Contact Microsoft Windows Support: +1-833-890-7720 immediately.', 'Due to COVID-19, data theft incidents via a ulent advertsement that injects to pur browser Microsoft Windows have increased by 624K Beca use of this.'","The webpage does not contain a login form, but it does ask the user to contact Microsoft Windows Support using a phone number.","The webpage does not contain a CAPTCHA or any other anti-robot detection mechanism."]}
                                                    Title: Security center OCR: i Microsoft Support Microsoft 365 This Microsoft Windows is infected with trojan:SLocker, a dangerous ransomware 'vlicrosoft and it will lock your device! Virus must removed immediately! Please contact us immediately. A technician will help you solve the problem. A critical has due to the cwtdated Of the browser. UENiate your browser as as Jxssible. The following are also possible on versions Of the browser: How can > Loss of Rrsonal and stored data > Confidental information leak Microsoft Windows x Browsers errors Microsoft Windows Security Center Irsullation & DrWers air Threat Detected: xxbc Detected Address 'P: 8.46.123.33 7/25/2024, PM Location: New York, United States ISP: Level with Access has been blocked  Contact Microsoft Windows Support: +1-833-890-7720 Microsoft Windows Continue Microsoft Support +1-833-890-7720 Achieve more with A1 in Windows -e Microsoft Windows: Support Contact your aM use your idenfity to do maficious transacus_ Due to COVID-19, data theft incidents via a ulent advertsement that injects to pur browser Microsoft Windows have increased by 624K Beca use of this. we recorn mend a 
                                                    URL: https://qi7cfdo3mg0fby.azureedge.net/7720/?utm_medium=paid&utm_source=fb&utm_id=6599688580361&utm_content=6599688599961&utm_term=6599688590961&utm_campaign=6599688580361&fbclid=IwZXh0bgNhZW0BMAABHdzmJULh8TsQt3pW_qnmIXPFdqLqBaBKW5T-aZYxDkCqac1lwtitUH-fNw_a Model: gpt-4o
                                                    ```json
                                                    {
                                                      "phishing_score": 9,
                                                      "brands": "Microsoft",
                                                      "phishing": true,
                                                      "suspicious_domain": true,
                                                      "has_prominent_loginform": false,
                                                      "has_captcha": false,
                                                      "setechniques": true,
                                                      "has_suspicious_link": true,
                                                      "legitmate_domain": "microsoft.com",
                                                      "reasons": "The URL 'https://qi7cfdo3mg0fby.azureedge.net/7720/?utm_medium=paid&utm_source=fb&utm_id=6599688580361&utm_content=6599688599961&utm_term=6599688590961&utm_campaign=6599688580361&fbclid=IwZXh0bgNhZW0BMAABHdzmJULh8TsQt3pW_qnmIXPFdqLqBaBKW5T-aZYxDkCqac1lwtitUH-fNw_aem_UoCoKjZX08yMSHQS1Rk-lA' is suspicious because it uses a subdomain of 'azureedge.net' which is not directly associated with Microsofts primary domain 'microsoft.com'. The image shows multiple warning messages and prompts to contact a support number, which is a common social engineering technique used in phishing attacks. The presence of a prominent support contact number and alarming messages about a virus infection are indicative of phishing attempts. The site does not have a login form or CAPTCHA, but the overall presentation and URL are highly suspicious."
                                                    }
                                                    URL: https://qi7cfdo3mg0fby.azureedge.net/7720/?utm_medium=paid&utm_source=fb&utm_id=6599688580361&utm_content=6599688599961&utm_term=6599688590961&utm_campaign=6599688580361&fbclid=IwZXh0bgNhZW0BMAABHdzmJULh8TsQt3pW_qnmIXPFdqLqBaBKW5T-aZYxDkCqac1lwtitUH-fNw_a Model: gpt-4o
                                                    ```json
                                                    {
                                                      "phishing_score": 9,
                                                      "brands": "Microsoft",
                                                      "phishing": true,
                                                      "suspicious_domain": true,
                                                      "has_prominent_loginform": false,
                                                      "has_captcha": false,
                                                      "setechniques": true,
                                                      "has_suspicious_link": true,
                                                      "legitmate_domain": "microsoft.com",
                                                      "reasons": "The URL 'https://qi7cfdo3mg0fby.azureedge.net/7720/?utm_medium=paid&utm_source=fb&utm_id=6599688580361&utm_content=6599688599961&utm_term=6599688590961&utm_campaign=6599688580361&fbclid=IwZXh0bgNhZW0BMAABHdzmJULh8TsQt3pW_qnmIXPFdqLqBaBKW5T-aZYxDkCqac1lwtitUH-fNw_aem_UoCoKjZX08yMSHQS1Rk-lA#' is suspicious because it uses 'azureedge.net' which is not the primary domain for Microsoft. The image shows multiple warning messages designed to scare the user into calling a support number, a common social engineering technique. The legitimate domain for Microsoft is 'microsoft.com'. The site does not have a prominent login form or captcha, but it does use social engineering techniques and contains suspicious links. Therefore, it is highly likely to be a phishing site."
                                                    }
                                                    URL: https://qi7cfdo3mg0fby.azureedge.net/7720/?utm_medium=paid&utm_source=fb&utm_id=6599688580361&utm_content=6599688599961&utm_term=6599688590961&utm_campaign=6599688580361&fbclid=IwZXh0bgNhZW0BMAABHdzmJULh8TsQt3pW_qnmIXPFdqLqBaBKW5T-aZYxDkCqac1lwtitUH-fNw_a Model: custom
                                                    {"phishing_score": 9, "brand_name": "Microsoft Windows Security Center", "reasons": "The domain 'qi7cfdo3mg0fby.azureedge.net' does not match the brand name 'Microsoft Windows Security Center', which is unusual for a legitimate Microsoft security site. The warning message and domain discrepancy suggest that this webpage may be a phishing attempt or a malicious site attempting to exploit the user's trust in Microsoft. Additionally, the presence of a pop-up message with links to 'Update your browser', 'Manage your settings', and 'Leave' is a common tactic used by phishing sites to trick users into divulging sensitive information or downloading malware. The 'Threat Detected' and 'Detected Virus' alerts are also suspicious, as they are often used by phishing sites to create a sense of urgency and panic in the user, leading them to take rash actions without verifying the authenticity of the site. Overall, the combination of these factors suggests a high likelihood of this webpage being a phishing site or a malicious site attempting to exploit the user's trust in Microsoft."}
                                                    URL: https://qi7cfdo3mg0fby.azureedge.net/7720/?utm_medium=paid&utm_source=fb&utm_id=6599688580361&utm_content=6599688599961&utm_term=6599688590961&utm_campaign=6599688580361&fbclid=IwZXh0bgNhZW0BMAABHdzmJULh8TsQt3pW_qnmIXPFdqLqBaBKW5T-aZYxDkCqac1lwtitUH-fNw_a Model: custom
                                                    {"phishing_score": 9, "brand_name": "Microsoft", "reasons": "The webpage appears to be mimicking Microsoft's branding and design, which could be an attempt to trick users into thinking it's legitimate. The presence of a critical error message and a link to 'Microsoft Windows Security Center' is a common tactic used in phishing and malware attacks. The domain does not match Microsoft's typical domain structure, which is a red flag. The warning about a possible virus and the request for user input to update the browser are also common tactics used in phishing and malware attacks. Overall, the webpage appears to be a phishing attempt designed to trick users into providing sensitive information or downloading malware."}
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:Unknown
                                                    Category:dropped
                                                    Size (bytes):2677
                                                    Entropy (8bit):3.998844560052032
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:C40006AE5D97EE4ECDBE887EDC82CBA6
                                                    SHA1:E620D8535E12530BEC473C4C85B84C5F63EEDC7C
                                                    SHA-256:F58C8EC0B9949756F701752B3E5F381E89C82E882A69D25779C8EC7076539661
                                                    SHA-512:BDAF434A0EA9C9904286E671125A5E2E6D919575D472DF7AB4059C384DC9BE360AC3060E05DA15C1B80D5A1DAF7BA3EB2D79A44E1823E6DBCC4F3E1CA7FAA43E
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:L..................F.@.. ...$+.,......{.........y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.I.X3.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X<.....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.V.X<.....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.V.X<............................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V.X@............................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............S......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 141492
                                                    Category:dropped
                                                    Size (bytes):49696
                                                    Entropy (8bit):7.995313044786981
                                                    Encrypted:true
                                                    SSDEEP:
                                                    MD5:3D5FBC4186EF45B04DE8BF8BA6861967
                                                    SHA1:EFB2759A486E84730182091A9710DCE3EDCD8F6F
                                                    SHA-256:099E7356BAE6752C1A7052BC9DE4AD113187EDA6A1385794E12955F7AE636D25
                                                    SHA-512:949516390D8CEA5A1057647B2487634CFCFBD2510D9571965DC714954723EA9FA1FA79C240671888613964D8D43C921DCA8BAE3802E15C98F127B82092E51126
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:............[.8.8...+.w..OL..hp._..nf.0$.......t....e .o?u.l.q.../g..J.T.*U.J..k.S......T.......T.~9:?.........h.........;?.L.......W..J.U.`.F.0r..W..o...$..+....O1N....(4...R..".r.F.s...C..j.o..J...3<.%. L.....G.M.%.Ee.x".<....?..8.$.H.........Uq#Q.ER..Qr..W..)k..3.........N....:.....:.e.`.\...V........p.[....n+.......Yu..o>N.n."z.&N......!+.W......s.6r.D.....{..q/.....*:z...3h....8.g31.....X...T*..a...W..Fsg....h..u.$.........>..7.p~;uch..+t...i.?..3...+.r6.A.*.....[g:..r.?S..............;.=6.&.`.....E=W.j.oaT}p..Vd.Np..\.i^[.....u'~..".M.:q.fF..._[..rM.F?....q.1.....S}.c_...\_./....y}6...._1-|p..l@..[q......*..k.?&.0^_.Cw:s.Rs^...IR5..Bv.yYX.....N.....O..epmF".GA...@...q..;...v`M.%3..#..,DMLTY+..g.........d+.>...{}.&N/..g-#FV.V.p.......Xs.(..{..]..-...!..F...XQge.X.MP.&.3....Re...b*23v..M.a...'......c.i...9...l..Z.`.F.._%>U.'.."..;.M......D$.}..~|....*u...ma.f:\......p..jy.<.r...cjG.N...{{}M_oEr8%...|.......d..nZ.S..H.Lx...x1t.
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (4873), with no line terminators
                                                    Category:downloaded
                                                    Size (bytes):4873
                                                    Entropy (8bit):5.2268236765669895
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:ED927CF0F8A1BE103DF48446270416EE
                                                    SHA1:F7B2BE7FC2B063AAC03E76DF9F3E19D615970213
                                                    SHA-256:EBDD298DFD39A35E5F54469F12953081A17CBEA55F3A4A79C0FD4997D804F7D5
                                                    SHA-512:FCA692C8C7B104FB00C2E6D90C1A0D52A0FF93CDA626338D8FA114A0E9DCE2504DF9282868F98A46648A6E616A96ACD14CAD0460D72477421C8F5EE8F7D34256
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://support.microsoft.com/css/MeControlCallout/teaching-callout.css?v=690pjf05o15fVEafEpUwgaF8vqVfOkp5wP1Jl9gE99U
                                                    Preview:.teachingCalloutPopover{position:absolute;z-index:10000;top:45px;width:336px;right:2vw;color:#000;background-color:#fff;border:1px solid #000;box-sizing:content-box}.teachingCalloutPopover .caretArrow{position:absolute;display:block;width:1rem;height:.5rem;margin:0 .3rem}.teachingCalloutPopover .caretArrow::before{position:absolute;display:block;content:"";border-color:transparent;border-style:solid}.teachingCalloutPopover .caretArrow::after{position:absolute;display:block;content:"";border-color:transparent;border-style:solid}.teachingCalloutPopover .caretArrowPosition{left:215px}.teachingCalloutPopover .win-icon{font-family:"Dev Center MDL2 Assets";font-style:normal;font-weight:normal;line-height:1;position:relative;top:1px;display:inline-block;vertical-align:baseline;-webkit-font-smoothing:antialiased;-moz-osx-font-smoothing:grayscale}#teachingCalloutDismiss,#teachingCalloutMessages{color:#000}.teachingCalloutHidden{visibility:hidden}.calloutMessageHidden{display:none}.caretArrowUp{
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (65536), with no line terminators
                                                    Category:dropped
                                                    Size (bytes):204055
                                                    Entropy (8bit):5.557201746049791
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:7B3A8EB2DF127E5D0870E11C116A5F8F
                                                    SHA1:3A7EC51120E9EC70911C3B5554DEC5AA5FD61168
                                                    SHA-256:6BFD174274D9ACE1C7E8B7B66F8AE0C33D263AF788ED989561E9E43D46622482
                                                    SHA-512:012FA37875CDDCC7AEF98397E45C4FB339C30E12E4F7929AC81E0076DBB2657A108822C3AD9332A81A4C34682A81F1AFE73A3598AF4403FB13EC68B2B274F441
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:MeControlDefine("meBoot",["exports","@mecontrol/web-inline"],function(t,S){"use strict";var c=function(){},i={},u=[],p=[];function O(t,e){var r,n,o,i,a=p;for(i=arguments.length;2<i--;)u.push(arguments[i]);for(e&&null!=e.children&&(u.length||u.push(e.children),delete e.children);u.length;)if((n=u.pop())&&void 0!==n.pop)for(i=n.length;i--;)u.push(n[i]);else"boolean"==typeof n&&(n=null),(o="function"!=typeof t)&&(null==n?n="":"number"==typeof n?n=String(n):"string"!=typeof n&&(o=!1)),o&&r?a[a.length-1]+=n:a===p?a=[n]:a.push(n),r=o;var s=new c;return s.nodeName=t,s.children=a,s.attributes=null==e?void 0:e,s.key=null==e?void 0:e.key,s}function T(t,e){for(var r in e)t[r]=e[r];return t}function d(t,e){t&&("function"==typeof t?t(e):t.current=e)}var e="function"==typeof Promise?Promise.resolve().then.bind(Promise.resolve()):setTimeout;var l=/acit|ex(?:s|g|n|p|$)|rph|ows|mnc|ntw|ine[ch]|zoo|^ord/i,r=[];function a(t){!t._dirty&&(t._dirty=!0)&&1==r.push(t)&&e(n)}function n(){for(var t;t=r.pop();)t
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (65536), with no line terminators
                                                    Category:dropped
                                                    Size (bytes):206554
                                                    Entropy (8bit):5.1526975086262405
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:6F9BA2F81662F1B1CB2445040C7278D4
                                                    SHA1:AF137F1DBEB8DCC4A1177DB8565508C8FAED59CB
                                                    SHA-256:BCAE4BA85A18B6D57F6CA6C515A028699C442424A4E7963337675F7D1D14AA8F
                                                    SHA-512:6D551A11DD0355B92A49E79D6E427F5E935D03960A42F858E975B349F7D5421641EF39AA808DDEDB4871A6663477F5A71E47D0E3355E2AE8F0AA84BB90E05E69
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:var _0x2a7f93=_0x4a8d;function _0x4a8d(_0x37b23f,_0x412632){var _0x36de8c=_0x36de();return _0x4a8d=function(_0x4a8da8,_0x3a31f6){_0x4a8da8=_0x4a8da8-0x188;var _0xa2d847=_0x36de8c[_0x4a8da8];return _0xa2d847;},_0x4a8d(_0x37b23f,_0x412632);}(function(_0x58cfba,_0x4a3804){var _0x19c23d=_0x4a8d,_0x4819dc=_0x58cfba();while(!![]){try{var _0x3ea422=-parseInt(_0x19c23d(0x1e4))/0x1*(-parseInt(_0x19c23d(0x409))/0x2)+parseInt(_0x19c23d(0x209))/0x3*(-parseInt(_0x19c23d(0x21c))/0x4)+parseInt(_0x19c23d(0x2e1))/0x5*(-parseInt(_0x19c23d(0x2c9))/0x6)+parseInt(_0x19c23d(0x34f))/0x7*(parseInt(_0x19c23d(0x2f7))/0x8)+parseInt(_0x19c23d(0x2ee))/0x9+-parseInt(_0x19c23d(0x2ed))/0xa*(parseInt(_0x19c23d(0x3f5))/0xb)+parseInt(_0x19c23d(0x2c8))/0xc;if(_0x3ea422===_0x4a3804)break;else _0x4819dc['push'](_0x4819dc['shift']());}catch(_0x299b4b){_0x4819dc['push'](_0x4819dc['shift']());}}}(_0x36de,0xdf15c),!function(_0x2728e9,_0x2a9c60){var _0x1bdeb4=_0x4a8d;_0x1bdeb4(0x32a)==typeof module&&_0x1bdeb4(0x32a)==typeof mod
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, comment: "CREATOR: gd-jpeg v1.0 (using IJG JPEG v62), quality = 95", baseline, precision 8, 180x39, components 3
                                                    Category:dropped
                                                    Size (bytes):2017
                                                    Entropy (8bit):7.520665392704271
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:C9370ACAA4F473A0D144B3F1325D0485
                                                    SHA1:B46404F4DC11AAFB88A8DBFF0F675253D65C91AA
                                                    SHA-256:D655A8BEDE783066D70BAB7AFB1B94AE2DD8C605101CBB9E3D9D3644D44AF6E0
                                                    SHA-512:5DC79ED5B7FC3D84D386CA17B38573EDE8816DF0D323ADC4EAAA9D289B9AA17C4A61077F7BDD076A243D4CE028527C79ABF9D98C637C6A5E241F008C6501C89A
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:......JFIF.....`.`.....;CREATOR: gd-jpeg v1.0 (using IJG JPEG v62), quality = 95....C....................................................................C.......................................................................'............................................2..............................1!Q."Aq.#2B.8CRX...................................8..........................!."1AQ...#2Ba.$3Rq.%bc..................?................./p.%.d.......{.... .rO..'%..].......2G....%.........d.I^[.....*..R*..^{P....'uW.B..8.P..Si....iq...3"y9"?@........]5.+OJ.X. ..Y...w[.$..c...Z.C..[qpe$..(...2..^.........P=Fukp.!.j.....-....>-P...d.C...R.#>9.<..E......F.K..........l........L.3...}.*9y..s(.^(..JtW]..).S..].w...e.R...$.vs.$...y...-WB.~.3.^]....;n...vs.k....[g......a.}/...W..P..D...z...R+..W...J...FI.C.kGvI.S..d..?*..n.......D...s.wf..K...$.kwbF...XI.mw.t.v..j..{.&.}T.kp.5..:.OK*m-:.d....)<..pd2.*j4...4T...UC..........B/{..W...[k.......1`......x.S.T.n...A....
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (10387), with no line terminators
                                                    Category:downloaded
                                                    Size (bytes):10930
                                                    Entropy (8bit):4.777922581824855
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:509E44BDCA06692FD924908DE96BE75B
                                                    SHA1:2B68EABA6109F02706D13775CBC357CA40785ABE
                                                    SHA-256:37D8CC7CC2283BFB3B3804CDD23E4B62A98EF4C0AA1C38DFA5A515D91B9A132F
                                                    SHA-512:44E648E2433C01B879CF952AD1ACBAEE97EF82C18F846429019EF343E5272B568BE3BD9CC530E244E1E282D7CF42A1D215E79756968A4D82B845F0E242551ACF
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://support.microsoft.com/css/glyphs/glyphs.css?v=N9jMfMIoO_s7OATN0j5LYqmO9MCqHDjfpaUV2RuaEy8
                                                    Preview:..icon-fluent{font-family:Support Fluent Icons;font-style:normal;font-weight:normal;line-height:1px;display:inline-block;vertical-align:baseline;-webkit-font-smoothing:antialiased;-moz-osx-font-smoothing:grayscale}.supTabControlHeader .supTabControlHeaderActive .icon-fluent{font-weight:900;color:#000}.supTabControlHeader .icon-fluent{color:gray;font-size:.9em;padding-right:5px}html[dir=rtl] .supTabControlHeader .icon-fluent{padding-left:5px}.icon-mdl2{font-family:Support MDL2 Assets;font-style:normal;font-weight:normal;line-height:1px;display:inline-block;vertical-align:baseline;-webkit-font-smoothing:antialiased;-moz-osx-font-smoothing:grayscale}.supTabControlHeader .supTabControlHeaderActive .icon-mdl2{font-weight:900;color:#000}.supTabControlHeader .icon-mdl2{color:gray;font-size:.9em;padding-right:5px}html[dir=rtl] .supTabControlHeader .icon-mdl2{padding-left:5px}.icon-accept:before{content:"."}.icon-actioncenter:before{content:"."}.icon-actioncenternotification:before{conten
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (2974), with no line terminators
                                                    Category:downloaded
                                                    Size (bytes):2974
                                                    Entropy (8bit):5.078147905018725
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:8C4035FBAA828A7E23B8584328FE8F88
                                                    SHA1:F222869596F1E3E94C131DE6E85BF233ED1EC511
                                                    SHA-256:0F4950468225BC51D24014536FE8004392A415EF01F0DB92A258818E74F9C59E
                                                    SHA-512:74D807189427397E2C8FC35D986616C1104E9125B39F885F61D9A1AA225D566AB3474061B39C64FF69886E5AEA8D6B4C9F28B4DCC9CB6F552D90DB0C651582DB
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://support.microsoft.com/css/sitewide/articleCss-overwrite.css?v=D0lQRoIlvFHSQBRTb-gAQ5KkFe8B8NuSoliBjnT5xZ4
                                                    Preview:div.shimmer-effect{display:flex;width:100%;height:300px}.shimmer-line-container{display:flex;flex-direction:column;width:100%;height:100%}.shimmer-line{background-color:#edebe9;position:relative}.banded-wrapper-reversed:nth-child(odd) .shimmer-line{background-color:#d7d4d2;position:relative}.banded-wrapper-reversed:nth-child(odd) .shimmer-line::before{content:"";width:50%;height:100%;position:absolute;top:0;left:0;background:linear-gradient(to right, #d7d4d2 0%, #b9b9b9 50%, #d7d4d2 100%);animation:shimmer 2s ease-out infinite}.banded-wrapper:nth-child(even) .shimmer-line{background-color:#d7d4d2;position:relative}.banded-wrapper:nth-child(even) .shimmer-line::before{content:"";width:50%;height:100%;position:absolute;top:0;left:0;background:linear-gradient(to right, #d7d4d2 0%, #b9b9b9 50%, #d7d4d2 100%);animation:shimmer 2s ease-out infinite}.shimmer-image-container{position:absolute;right:0;width:50%;top:5%}.banded-wrapper-reversed:nth-child(odd) .shimmer-image{position:relative;heig
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:JSON data
                                                    Category:dropped
                                                    Size (bytes):72
                                                    Entropy (8bit):4.241202481433726
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:9E576E34B18E986347909C29AE6A82C6
                                                    SHA1:532C767978DC2B55854B3CA2D2DF5B4DB221C934
                                                    SHA-256:88BDF5AF090328963973990DE427779F9C4DF3B8E1F5BADC3D972BAC3087006D
                                                    SHA-512:5EF6DCFFD93434D45760888BF4B95FF134D53F34DA9DC904AD3C5EBEDC58409073483F531FEA4233869ED3EC75F38B022A70B2E179A5D3A13BDB10AB5C46B124
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:{"Message":"The requested resource does not support http method 'GET'."}
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (2674)
                                                    Category:downloaded
                                                    Size (bytes):2728
                                                    Entropy (8bit):5.253272384445131
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:468D4ACC570CFFC7101AC8A63514AD31
                                                    SHA1:6983E89B6EC798B5B8C2B3B76D9311808437B572
                                                    SHA-256:B4B342F2025799CA602A75590B324E7493B0903726720BCE4CA793207C83255C
                                                    SHA-512:9042A219E8511FF281B9F680B3577CE3EAE29E881F24BE1D2B46C89D1F0013E30AA890C1A0181FF83975E125F62C0C6E896D3B8515067221143D9A3290B42865
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://support.microsoft.com/js/MeControlCallout.Main.min.js?v=tLNC8gJXmcpgKnVZCzJOdJOwkDcmcgvOTKeTIHyDJVw
                                                    Preview:!function(){"use strict";var t,e,n=function(t){try{return sessionStorage.getItem(t)}catch(t){}return null};!function(t){t.EXPANDED="meControlAccountSelectorExpanded",t.COLLAPSED="meControlAccountSelectorCollapsed",t.SWITCHTYPE="meControlSwitchAccountType",t.SWITCHMSA="meControlSwitchMSAAccount",t.SWITCHAAD="meControlSwitchAADAccount"}(t||(t={})),function(t){t.REMOVE="teachingCalloutRemove",t.SHOWN="teachingCalloutShown",t.TIMEOUT="teachingCalloutTimeout"}(e||(e={}));var o,i,a=$("#meControl"),l=$("#smcTeachingCalloutPopover"),c=$("#teachingCalloutDismiss"),r="teachingCalloutShown";function d(t,e){var n,o={isAuto:!1,content:{contentId:e},behavior:t};null===(n=window.analytics)||void 0===n||n.captureContentUpdate(o)}$((function(){l&&l.length>0&&(function(t,e){if(t.length&&e.length){var n=t.offset().top;i=window.setInterval((function(){var o=e.offset().top;t.offset({top:n+o})}),15)}}(l,a),window.document.addEventListener("displayTeachingCallout",(function(t){try{if(null===n(r)&&null!=t.det
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:HTML document, ASCII text, with very long lines (3437), with CRLF line terminators
                                                    Category:downloaded
                                                    Size (bytes):3439
                                                    Entropy (8bit):5.12253249098629
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:6635D7000669B3B00D3577DB7EE58F5D
                                                    SHA1:7DB793D847EDC78B731185C85AD93BA4761D139B
                                                    SHA-256:4E52043A45804E7CDB6C9D09A0F64A4293082E6F32BB3D689BE4822A6E18BACB
                                                    SHA-512:FE3D01776B8D98E975D4DB6E956196B0D5602563E0252BD960A5A739D591F3AC96F5F2EF48EF6B49286822D80106932C104B324BD355EBE1D2FEFCB124D5866B
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://login.live.com/Me.htm?v=3
                                                    Preview:<script type="text/javascript">!function(t,e){for(var s in e)t[s]=e[s]}(this,function(t){function e(n){if(s[n])return s[n].exports;var i=s[n]={exports:{},id:n,loaded:!1};return t[n].call(i.exports,i,i.exports,e),i.loaded=!0,i.exports}var s={};return e.m=t,e.c=s,e.p="",e(0)}([function(t,e){function s(t){for(var e=f[S],s=0,n=e.length;s<n;++s)if(e[s]===t)return!0;return!1}function n(t){if(!t)return null;for(var e=t+"=",s=document.cookie.split(";"),n=0,i=s.length;n<i;n++){var a=s[n].replace(/^\s*(\w+)\s*=\s*/,"$1=").replace(/(\s+$)/,"");if(0===a.indexOf(e))return a.substring(e.length)}return null}function i(t,e,s){if(t)for(var n=t.split(":"),i=null,a=0,r=n.length;a<r;++a){var c=null,S=n[a].split("$");if(0===a&&(i=parseInt(S.shift()),!i))return;var l=S.length;if(l>=1){var p=o(i,S[0]);if(!p||s[p])continue;c={signInName:p,idp:"msa",isSignedIn:!0}}if(l>=3&&(c.firstName=o(i,S[1]),c.lastName=o(i,S[2])),l>=4){var f=S[3],d=f.split("|");c.otherHashedAliases=d}if(l>=5){var h=parseInt(S[4],16);h&&(c.
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (65460)
                                                    Category:dropped
                                                    Size (bytes):566945
                                                    Entropy (8bit):5.427445847196822
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:0848B540E7CEFA19B6B90711E600470E
                                                    SHA1:15A6D705E861BDBD6E4620F3982C4CDD6581BCD5
                                                    SHA-256:5E8CB94E51F938396C62AAB378E9CCEB8D94C008730084188AAC207E8151697E
                                                    SHA-512:6A33F5B167EBDB7ED2C21D1061603D61577A366B833155400A687CBD83E108910A4A58E29B36CAE96B51828E4D0D7C4BD714B4BF2C8C6834225839A5287288B5
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:/*! For license information please see ucsCreativeService.js.LICENSE.txt */.!function(){var e={646:function(e,t,n){"use strict";function r(e){o.length||(i(),!0),o[o.length]=e}e.exports=r;var i,o=[],a=0,u=1024;function c(){for(;a<o.length;){var e=a;if(a+=1,o[e].call(),a>u){for(var t=0,n=o.length-a;t<n;t++)o[t]=o[t+a];o.length-=a,a=0}}o.length=0,a=0,!1}var l="undefined"!==typeof n.g?n.g:self,s=l.MutationObserver||l.WebKitMutationObserver;function f(e){return function(){var t=setTimeout(r,0),n=setInterval(r,50);function r(){clearTimeout(t),clearInterval(n),e()}}}i="function"===typeof s?function(e){var t=1,n=new s(e),r=document.createTextNode("");return n.observe(r,{characterData:!0}),function(){t=-t,r.data=t}}(c):f(c),r.requestFlush=i,r.makeRequestCallFromTimer=f},2277:function(e,t){var n;!function(){"use strict";var r={}.hasOwnProperty;function i(){for(var e=[],t=0;t<arguments.length;t++){var n=arguments[t];if(n){var o=typeof n;if("string"===o||"number"===o)e.push(n);else if(Array.isArra
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:Web Open Font Format, TrueType, length 26288, version 0.0
                                                    Category:downloaded
                                                    Size (bytes):26288
                                                    Entropy (8bit):7.984195877171481
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:D0263DC03BE4C393A90BDA733C57D6DB
                                                    SHA1:8A032B6DEAB53A33234C735133B48518F8643B92
                                                    SHA-256:22B4DF5C33045B645CAFA45B04685F4752E471A2E933BFF5BF14324D87DEEE12
                                                    SHA-512:9511BEF269AE0797ADDF4CD6F2FEC4AD0C4A4E06B3E5BF6138C7678A203022AC4818C7D446D154594504C947DA3061030E82472D2708149C0709B1A070FDD0E3
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://www.microsoft.com/mwf/_h/v3.54/mwf.app/fonts/mwfmdl2-v3.54.woff
                                                    Preview:wOFF......f........D........................OS/2...X...H...`JM.FVDMX.............^.qcmap.............*.9cvt ...4... ...*....fpgm...T.......Y...gasp...D............glyf...P..U5.......head..]....2...6...Chhea..]........$$...hmtx..]..........ye'loca..^............Gmaxp..`.... ... ./..name..`....8....]..Rpost..f........ .Q.wprep..f$........x...x.c`.Pf......:....Q.B3_dHc..`e.bdb... .`@..`......./9.|...V...)00...-.Wx...S......._..m.m.m.m.m;e..y.~.......<p..a.0t.&...a.pa.0B.1..F...Q.ha.0F.3.....q.xa.0A.0L.&...I.da.0E.2L....i.ta.0C.1..f...Y.la.0G.3.....y.|a..@X0,.....E.ba.DX2,....e.ra..BX1..V...U.ja..FX3.....u.za..A.0l.6...M.fa.E.2l....m.va..C.1..v...].na..G.3......}.~a.p@80......C.a..pD82.....c.q..pB81..N...S.i..pF83.....s.y..pA.0\.....K.e..pE.2\....k.u..pC.1..n...[.m..pG.3......{.}...@x0<.....G.c...Dx2<....g.s...Bx1..^...W.k...Fx3.....w.{...A.0|.>...O.g...E.2|....o.w...C.1..~..._.o..08........?..0$........x...mL.U.............9.x.`[...&BF@X...V.h.Z..h......`n....[..U
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (65451)
                                                    Category:downloaded
                                                    Size (bytes):89476
                                                    Entropy (8bit):5.2896589255084425
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:DC5E7F18C8D36AC1D3D4753A87C98D0A
                                                    SHA1:C8E1C8B386DC5B7A9184C763C88D19A346EB3342
                                                    SHA-256:F7F6A5894F1D19DDAD6FA392B2ECE2C5E578CBF7DA4EA805B6885EB6985B6E3D
                                                    SHA-512:6CB4F4426F559C06190DF97229C05A436820D21498350AC9F118A5625758435171418A022ED523BAE46E668F9F8EA871FEAB6AFF58AD2740B67A30F196D65516
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://support.microsoft.com/lib/jquery/dist/jquery.min.js?v=9_aliU8dGd2tb6OSsuzixeV4y_faTqgFtohetphbbj0
                                                    Preview:/*! jQuery v3.5.1 | (c) JS Foundation and other contributors | jquery.org/license */.!function(e,t){"use strict";"object"==typeof module&&"object"==typeof module.exports?module.exports=e.document?t(e,!0):function(e){if(!e.document)throw new Error("jQuery requires a window with a document");return t(e)}:t(e)}("undefined"!=typeof window?window:this,function(C,e){"use strict";var t=[],r=Object.getPrototypeOf,s=t.slice,g=t.flat?function(e){return t.flat.call(e)}:function(e){return t.concat.apply([],e)},u=t.push,i=t.indexOf,n={},o=n.toString,v=n.hasOwnProperty,a=v.toString,l=a.call(Object),y={},m=function(e){return"function"==typeof e&&"number"!=typeof e.nodeType},x=function(e){return null!=e&&e===e.window},E=C.document,c={type:!0,src:!0,nonce:!0,noModule:!0};function b(e,t,n){var r,i,o=(n=n||E).createElement("script");if(o.text=e,t)for(r in c)(i=t[r]||t.getAttribute&&t.getAttribute(r))&&o.setAttribute(r,i);n.head.appendChild(o).parentNode.removeChild(o)}function w(e){return null==e?e+"":"o
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:JSON data
                                                    Category:downloaded
                                                    Size (bytes):710
                                                    Entropy (8bit):5.079895988191637
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:8DE99092C082D416E27333351CA0422F
                                                    SHA1:43010405486A66EB07D31BE01E7354422B0D6A4D
                                                    SHA-256:AB700CEEC94015327ADF3DA6311287BD364F5250CB68E593A3AEB95D15D7483E
                                                    SHA-512:0705C495914EBA8F9BB0E313CA2FCA3AB2FA35722BF1BCF0864DD26C9ADE30DE45B7C2C2B8DA04C620DC647B582C0BF66C9DC329C2CD4FC7B12017812EB916BB
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://ipwho.is/?lang=en
                                                    Preview:{"ip":"8.46.123.33","success":true,"type":"IPv4","continent":"North America","continent_code":"NA","country":"United States","country_code":"US","region":"New York","region_code":"NY","city":"New York","latitude":40.7127837,"longitude":-74.0059413,"is_eu":false,"postal":"10000","calling_code":"1","capital":"Washington D.C.","borders":"CA,MX","flag":{"img":"https:\/\/cdn.ipwhois.io\/flags\/us.svg","emoji":"\ud83c\uddfa\ud83c\uddf8","emoji_unicode":"U+1F1FA U+1F1F8"},"connection":{"asn":3356,"org":"Centurylink Communications, LLC","isp":"Level","domain":"lumen.com"},"timezone":{"id":"America\/New_York","abbr":"EDT","is_dst":true,"offset":-14400,"utc":"-04:00","current_time":"2024-07-25T12:50:04-04:00"}}
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:PNG image data, 47 x 46, 4-bit colormap, non-interlaced
                                                    Category:downloaded
                                                    Size (bytes):339
                                                    Entropy (8bit):5.897486060869664
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:3E9865CE8D82D14AC2C55CF52AC3822B
                                                    SHA1:4BB9D786C322534852B8DEA9FBB6EE7B54219736
                                                    SHA-256:522C393A4880E4EAD803EC283EF7253E96BB1C58666241A8726AEEB80C8999FC
                                                    SHA-512:3C3368F30756ABF60861A54C33AC041A909ACCEDBE690541B85FD420F0E681A6C9565796490802EDE654809697EC1943DEF7F537745A202CFF6179E391C1FA1A
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://qi7cfdo3mg0fby.azureedge.net/7720/images/microsoft.png
                                                    Preview:.PNG........IHDR.../.........JU]:....gAMA......a.... cHRM..z&..............u0...`..:....p..Q<....PLTE.R%................N......bKGD...-.....pHYs..........+......tIME........I.....)IDAT8.c`@.A%.0`.....K.b...%\.@0...F%F%...d.!!*.....%tEXtdate:create.2024-05-07T14:26:12+02:00j..g...%tEXtdate:modify.2024-05-07T14:26:12+02:00.......IEND.B`.
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:PNG image data, 33 x 31, 8-bit colormap, non-interlaced
                                                    Category:downloaded
                                                    Size (bytes):905
                                                    Entropy (8bit):7.349171035595985
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:1EE5242F089011987FB85C4B24C1BED7
                                                    SHA1:11DDEAE609DC7ED7F19448F7C71F92B7F49EC7DA
                                                    SHA-256:7769B2B556DFBEE61D91D193A4F957C0C9058AD14564E1A75B69B159BB193AEE
                                                    SHA-512:80C781C1A46F8A730BFDA97C4D447BE94C9E399160EBAED076B2E98374DB92083588325F43A34D210B4DFA76BDFEC1DEF7328E49296F6C7E2C93A7DDD6BF74CB
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://qi7cfdo3mg0fby.azureedge.net/7720/images/nOxp-sett.png
                                                    Preview:.PNG........IHDR...!.........^JT.....gAMA......a.... cHRM..z&..............u0...`..:....p..Q<...;PLTE..........WWW.........iii......444........................~~~......###.........GGG..............................{{{........................PPPRRRKKKIII...OOO9xD.........*.=.......]........b. .4:.K..........3......+.>................W.fHHH..............................5.GzzzVVV/n:......a.T.c....?....9.K..Q....bKGD....H....pHYs..........+......tIME........I.....6IDAT8...WS.1....{.(MtQ...!......6..../p.Q.G..3.d&.....[....PP..L..W.V.i.......a..dWD.Bd4.O@..(...$...j..B.....P..4.0......9....L6.c.l..2.4....tZ{..q..........M.g."b..B...2N.....^,Y,(.7.)/-WVV...R..]w]WJ..P>.'.n....*..&vv}P...*!.....O..g.R..s.\.....R$(x[....A....~nx^...E...k..yR..........'..-W&Mx......%tEXtdate:create.2024-05-07T14:26:12+02:00j..g...%tEXtdate:modify.2024-05-07T14:26:12+02:00.......IEND.B`.
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (2230), with no line terminators
                                                    Category:downloaded
                                                    Size (bytes):2230
                                                    Entropy (8bit):5.1220413514345156
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:4D56AF8ACF934242A6D0C2D5FD5785E1
                                                    SHA1:9D58373C57C53221C4762B87BDC186F6E38384D0
                                                    SHA-256:6F26F0CC605A8C789C557B2956CE78D147D5D2CC16D2F09B3A606306BCA3F4DE
                                                    SHA-512:1ECA9E9FEF9757337739BC530C87AAA8B9209A14C16F570FC8041618274330E3649F6D0A7E9FA97DC45DC8BB8FDE61A18E06F98E8A48E7BC5F22D4D53CC217A3
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://support.microsoft.com/css/SearchBox/search-box.css?v=bybwzGBajHicVXspVs540UfV0swW0vCbOmBjBryj9N4
                                                    Preview:.searchBox .searchBoxForm{position:relative;margin:0}.searchBox .searchBoxForm .searchBoxInput{width:100%;height:3.1875rem;font-family:"Segoe UI","Segoe UI Web","wf_segoe-ui_normal","Helvetica Neue","BBAlpha Sans","S60 Sans",Arial,sans-serif;font-size:1rem;padding-left:1.125rem;padding-right:3.625rem;border:.0625rem solid #a3a3a3;border-radius:.125rem;box-sizing:border-box;outline:0}html[dir=rtl] .searchBox .searchBoxForm .searchBoxInput{padding-left:3.625rem;padding-right:1.125rem}.searchBox .searchBoxForm .searchBoxButton{position:absolute;font-family:"Segoe UI","Segoe UI Web","wf_segoe-ui_normal","Helvetica Neue","BBAlpha Sans","S60 Sans",Arial,sans-serif;cursor:pointer;padding:0 .25rem;top:0;right:0;width:3.125rem;height:3.1875rem;background-color:transparent;border:none}html[dir=rtl] .searchBox .searchBoxForm .searchBoxButton{left:0;right:auto;transform:scaleX(-1)}.searchBox .searchBoxForm .searchBoxButton .searchBoxIconContainer{display:flex;color:#0078d4;justify-content:center}.
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:PNG image data, 2080 x 2080, 8-bit/color RGB, non-interlaced
                                                    Category:downloaded
                                                    Size (bytes):315645
                                                    Entropy (8bit):7.9372664185608155
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:F777E3DF1D8DCAB951947F2857D2BF54
                                                    SHA1:EACC9AC2A757A0769F73FB7BE9E9EEBFB49FAE13
                                                    SHA-256:91C76EB2DC2ACD92523DAD291CBC4A2D655271BEFFE355155098275386792C12
                                                    SHA-512:F10DEABA019CA2861302E219D61D975843E6799F9052C6EB37DECFBEDAC4C2761257A3066C10038940F3A3680F95B7F3CCBFDED00B02A9BF0E20614F81AB89E4
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://qi7cfdo3mg0fby.azureedge.net/7720/images/cross.png
                                                    Preview:.PNG........IHDR... ... .....u4B.....gAMA......a.... cHRM..z&..............u0...`..:....p..Q<....bKGD..............pHYs..........+......tIME........I......IDATx....s\.'.~s.... HJ...")R.,...I.e.9....7.#..}....p,.'.@.F..Db.a...|?.*..(q....~....F,@...)f.""""""""""".;...............................1..DDDDDDDDDDDt..0.............c.@DDDDDDDDDDDw...............1..DDDDDDDDDDDt..0.............c.@DDDDDDDDDDDw...............1..DDDDDDDDDDDt..0.............c.@DDDDDDDDDDDw...............1..DDDDDDDDDDDt..0..............{.........Dnqo...DDDDDDDDDD....y.f.S..pa...d4.......w.:C.'[.m.D....................Tk......G..0|W......j....lb.m.A..5..j..8..;...Nx.........v..L..f.......bBJ.l9.fd.*.I..........AB...j.C.....w.y....#.0..X.A.u..K6..^Os....e..M.0..@..5...$."8..{q..#x......I..G............blV.h..`U.Ju.u..5E..rS..k..8c.8.....w..V...j.NG...Zx.q...&.<B._...4.@..<.d..U..J.....q........O.Q....I....~9.76>a........V!.......J....05.N.33.h.....#s..........v....ZkS.k.....0..f?m..`..2W
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 800x450, components 3
                                                    Category:downloaded
                                                    Size (bytes):37493
                                                    Entropy (8bit):7.973614005243885
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:3662E8423DBF93ECBB554A07F3E99EB3
                                                    SHA1:F3B749D5D61F5924942FA6C8DEBC82459461CD1F
                                                    SHA-256:56E33BDB5B225FF31A5CA86D04B08D483D60D7078C2254818DD7FF96CC7933E3
                                                    SHA-512:B1DF65BCE7D7C4FD3A67D118E431C1A31A3BFB7CB2D1396B1BC6B5903A416C1686B18412DEDB5A57F67E65A2A9C9C24FE3400FD170BE71E2BE5ACABEF4983B0A
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://support.content.office.net/en-us/media/82ffd042-9c3d-41ff-b7f4-56bfb0d0f94d.jpg
                                                    Preview:......JFIF...........................................+......+&.%#%.&D5//5DNB>BN_UU_wqw................................+......+&.%#%.&D5//5DNB>BN_UU_wqw........... .."..........5...................................................................v.g.3<..1.....3.0....I4.Q..^.3..C..m.qF.Td....;kk...6.".......e.m.q.mm7..4v~.l&.....J.&4e@.1.]...f.8.. .9N.D.... t..TB0..u.ZH*I..(N.'.....9k..."t.SL.a...H.F.&.i..;.b.a".HLh..`rUk.:..8..&...^ .Hh7..Io.p....5.!..p....9...H.>..........XgX.r...Ty..a..WH.....g?.'-.\.n.}...^..O..7.aUS.qo.>=..K.z....z.;z.. Z6.l.sq..A....^!..,.sWi.SD?=.(...Z.)..Nw...*J}NDT.b..(....cy[.].Z*fi.N...I...... ,.0.......Qv..:!...GQ...C...0..XB.f.VL.'H"HL.b...g`...f*w1...B`.....k.R.5..E..c.k...|.ow[g...'....S...z./H.P.xu.-....3s...D.3....U.`M4.@..Tx3.E....s4..<..uy...4....!".:.9...6.HT.f...(...\/.k....Gd.>...."7...1..@.......-c...A.+.....rg`.SH2F..`.l8r#.rq.D.....K.T..........V.%.......J..7....%.m.J[.2..'r..OX.$..6.A...#E..HRi..p.......,
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (65513), with no line terminators
                                                    Category:downloaded
                                                    Size (bytes):98793
                                                    Entropy (8bit):5.2339709898099205
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:F5DE9206FA994D1694A192E4F5DC5E0A
                                                    SHA1:E729CF7ABB7B3DB0CE4DA8181CDFE773AF534B88
                                                    SHA-256:2BCCD68274D04786E929D36C50458F89EEE309ACA5FD18449C1C397E23E26334
                                                    SHA-512:8350C2AEB8E66780CB529D7E15778C11B9444B283E1CC5B17B04D732B126ECE616FB4465E59F54A404F1E6C207AA7AD223D1AFCD4BCAB8530D9DB94667166EF5
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://support.microsoft.com/css/Article/article.css?v=K8zWgnTQR4bpKdNsUEWPie7jCayl_RhEnBw5fiPiYzQ
                                                    Preview:.html[dir=rtl] .supHomeAndLandingPageSearchButton{right:auto;left:0}html[dir=rtl] .supHomeAndLandingPageSearchBox{padding:0 18px 0 50px}.supHomeAndLandingPageSearchBoxForm{margin:auto;position:relative;max-width:748px}.supHomeAndLandingPageSearchBoxForm .supSuggestionList{margin:0;padding:0;list-style:none}.supHomeAndLandingPageSearchBoxForm .supAutoSuggestContainer{width:100%}.supHomeAndLandingPageSearchBoxForm .supSuggestionItem{text-indent:0;padding-left:18px}.supHomeAndLandingPageSearchBoxContainer{position:relative}.supHomeAndLandingPageSearchBox{width:100%;height:51px;font-size:1rem;padding:0 50px 0 18px;border:1px solid #a9a9a9;outline:0;font-family:"Segoe UI","Segoe UI Web","wf_segoe-ui_normal","Helvetica Neue","BBAlpha Sans","S60 Sans",Arial,sans-serif}.supHomeAndLandingPageSearchBox::-webkit-input-placeholder,.supHomeAndLandingPageSearchBox:-ms-input-placeholder,.supHomeAndLandingPageSearchBox::-moz-placeholder,.supHomeAndLandingPageSearchBox::-moz-placeholder{color:#505050
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:PNG image data, 66 x 68, 8-bit colormap, non-interlaced
                                                    Category:downloaded
                                                    Size (bytes):1121
                                                    Entropy (8bit):7.587674264909976
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:B9AF5939ACAA3C62D32B520CF55C0511
                                                    SHA1:6D8C320D4754AC97DD2D843DF3F1DA2636E09D48
                                                    SHA-256:E3028B38CFECB37D6E22DD90F2548B40D19A60ED6E83F532DEDE0FBF4704056B
                                                    SHA-512:9933DDFBA83B907B4D2ED98E4D6339C251398022595BFB397BDC4547554B6120B2DB0E31D58508C92674946E40B00661C31A93DF7F1F6398CCE3E5C67C85BDB1
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://qi7cfdo3mg0fby.azureedge.net/7720/images/kxFy-clip.png
                                                    Preview:.PNG........IHDR...B...D.............gAMA......a.... cHRM..z&..............u0...`..:....p..Q<....PLTE......$...x.V.....L...x..z..}...b...z..y..y..z.1....z...|.H.....{..|.I......y./....`..>...}.|..o..J..#...z."..,..5.....}.=..u..h..c..(....-....^..g..n....6...{...E.....y.......r.....~..}...~..{...K....?....D....bKGD....H....pHYs..........+......tIME........I.....nIDATX..i..0...!..........Ku..q.............>._....mrC.s-..N..9.o.|,.s'.p./I.R.....nDR1.@ &nN..&..c./.$!fi...Q,..@-2.Z..@+......J..V.3..+..Ia0..7D.$....`DjNlTdm.m?.&..3q.....D.B`'e...B*.....l...SFsP0.!n...~O*..U.:..(u....T._o..kD.8..bZ..F..-..P.{f.!+...g.(.........F...8 ....x.P.........O...?....S[w.3 ...<;r+..[....7`[T...t....S.h.'x..+S.......e..P...?.......a.B...rX.af.W@.55.@.L..,.I...........O?.>.^t"^....u.....7...^..a..y..y+.OS.c-...>hB.....Q.\..B.Q.<?i...{...n.e}&.5VB....n.e]|E>.d....*.j../].3]...9.`..ex.qGWBJ...l/P...._.v.......AZ.jE..!.5.8.X.......Z..Y........X.W..V...LfU..DC.UN.H.}s.
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:HTML document, ASCII text, with very long lines (404)
                                                    Category:downloaded
                                                    Size (bytes):550
                                                    Entropy (8bit):4.7246490609414895
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:69659E71AEB6127E6EF0DFE864D5ECD5
                                                    SHA1:3CF318479957B4FC4F0FDF6AF070A15D7DBD25EE
                                                    SHA-256:7D9AB165076915BC3854BAB91E080FE05DA9CCD8C9AE9058A3F1CF5FB09134C9
                                                    SHA-512:49CC8685AF0001243F02675C2C81BF3E4D780427F9AECB9351F16C53B1C2A6FD47D5F8FB562A6505C344A3E8BA5E245D585B650122D66CD1DE61159D6341F7CD
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://qi7cfdo3mg0fby.azureedge.net/7720/images/bg2.jpg
                                                    Preview:<html><head><title>404 Not Found</title></head>.<body>.<center><h1>404 Not Found</h1></center>.<hr><center>nginx/1.18.0 (Ubuntu)</center>.........</body></html> a padding to disable MSIE and Chrome friendly error page --> a padding to disable MSIE and Chrome friendly error page --> a padding to disable MSIE and Chrome friendly error page --> a padding to disable MSIE and Chrome friendly error page --> a padding to disable MSIE and Chrome friendly error page --> a padding to disable MSIE and Chrome friendly error page -->
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 288x288, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=7, orientation=upper-left, xresolution=98, yresolution=106, resolutionunit=2, software=Adobe Photoshop 25.3 (Windows), datetime=2024:02:17 10:56:03], baseline, precision 8, 2185x1385, components 3
                                                    Category:dropped
                                                    Size (bytes):348778
                                                    Entropy (8bit):7.915324175795365
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:622AA5ED875082C460281748711ABACE
                                                    SHA1:4CC18F586B9C08EEEF360CA5071ECF245C8B7947
                                                    SHA-256:BC56340B6642491A6928D7FBF5877FF1BC112877A0E2FBD2934E81052A031210
                                                    SHA-512:3A787813149B2F4CC6ED49070673B4C4DE521B30DB1B934CECC3DADDE2430B847D500BD0569DA3F6266B81AF7A257F932F026A92E2F4AEC5B14E53EF7D7BF12C
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:......JFIF..... . .....,Exif..MM.*.............................b...........j.(...........1.........r.2...........i...............+....'..+....'.Adobe Photoshop 25.3 (Windows)..2024:02:17 10:56:03...................................................................... ...........(.(.....................0...................H.......H.........C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222......e....!............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..e..Un..^|.Q.O...|5e"..4......6.b..^...+..y...1.wWR9X..CU.p
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):21727
                                                    Entropy (8bit):5.232101618468897
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:C49C34EE38F103BCB82F58DED32F57DB
                                                    SHA1:757C8CE6D92102903F636C20B70E414A5E9A2E20
                                                    SHA-256:BDBBDA3BD97031FF5BCB76B427D2ECD9C4617922C3860F662E51FB18AC5CC591
                                                    SHA-512:5C5307784F8B7D3CF479154CADF3525D1D1BF05216D72BB32ABEF6E25183E26FB4D84DB7B14AA2868B11F54E23284D02BFE0309EE4D560AC79A507F762DBC219
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:/*! Copyright (C) Microsoft. All rights reserved. */....(function ($) {...'use strict';...(function smartFeedback() {....var activatedStarRatingValue = null;....var activatedStarRatingLabel = null;....var userSelectionIsInfoHelpful = null;......var checkBoxSelected = false;....var starRatingSelected = false;....var verbatimEntered = false;....var $spanDisplayElementsForStarCheckbox = $(".translationRatingStar, .checkboxTick");....var $extendedFeedbackStarCheckboxElements = $(".translationRatingStar, .articleExperienceOptionsCheckbox");......var $extendedFeedback = $("#extendedFeedback");....var $extendedFeedbackForm = $("#extendedFeedbackForm");....var $feedbackWrapper = $('#supWrapperToPreventFeedbackFlickering');....var $starRatingDescription = $("#starRatingDescription");....var $supDisableStickyFeedbackButton = $("#supDisableStickyFeedbackButton");....var isEnableStarRating = $feedbackWrapper.data("enableStarRating") ? $feedbackWrapper.data("enableStarRating").toLowerCase() === "tr
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (65394)
                                                    Category:dropped
                                                    Size (bytes):91802
                                                    Entropy (8bit):5.3603423050848615
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:CF5CC7F4B57526CC37893DCB83DED031
                                                    SHA1:E953783BE0A7894585778455AAE3D0DF094D6F29
                                                    SHA-256:3A790B6C0D26D7A4D292CB27F992EAFAFF42C37E9318B2AB704207039127FCB8
                                                    SHA-512:2320F9D7811CD773C1E5C2E95A31B39E9FF62A2FA7CA431975873DAB57AE42A75BA720D15AEB47FA2EA127D0766EB5AA15040CFFD04BF7A8CB8BCD7236069C40
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:/*!. * 1DS JS SDK Shared Analytics, 3.2.18. * Copyright (c) Microsoft and contributors. All rights reserved.. * (Microsoft Internal Only). */.!function(e,n){var t,r={},i="__ms$mod__",o={},a=o.esm_ms_shared_analytics_mectrl_3_2_18={},u="3.2.18",c="oneDsMeControl3",s=(s=e)[c]=s[c]||{},l=(l=e)[c="oneDsMeControl"]=l[c]||{},e=s[i]=s[i]||{},f=e.v=e.v||[],c=l[i]=l[i]||{},d=c.v=c.v||[];for(t in(c.o=c.o||[]).push(o),n(r),r)s[t]=r[t],f[t]=u,l[t]=r[t],d[t]=u,(a.n=a.n||[]).push(t)}(this,function(e){"use strict";!function(e,n,t){var r=Object.defineProperty;if(r)try{return r(e,n,t)}catch(i){}typeof t.value!==undefined&&(e[n]=t.value)}(e,"__esModule",{value:!0});var y="function",m="object",se="undefined",C="prototype",I="hasOwnProperty",b=Object,S=b[C],x=b.assign,w=b.create,n=b.defineProperty,_=S[I],T=null;function O(e){e=!1===(e=void 0===e||e)?null:T;return e||((e=(e=(e=typeof globalThis!==se?globalThis:e)||typeof self===se?e:self)||typeof window===se?e:window)||typeof global===se||(e=global),T=e),e
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (3637)
                                                    Category:dropped
                                                    Size (bytes):3690
                                                    Entropy (8bit):5.141541571595828
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:A249B03B72AB5E7B60E7806457B9BE61
                                                    SHA1:FF0B5F4FB91A9DBF147262AD59B292C6C2DFE122
                                                    SHA-256:48FF8C6449BEF199F206C7A1C49403E10DC6341A9D4A1F8946B042DDE66E315F
                                                    SHA-512:29F204E3813972DC76FCE3DD6715093646EB0DA52DEDAC5E7E09B618E5CF8703CDE95D463727EB29F90D461D0C5A73B5701EC39B994A268103A06306144A6F34
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:!function(){"use strict";var n;!function(n){n.PromotionBanner=".PromotionBanner",n.TopPageBanner=".TopPageBanner",n.AboveUhfBanner=".AboveUhfBanner",n.RailBanner=".RailBanner",n.NpsRailBanner=".NpsRailBanner",n.RailSecondaryCtaBanner=".RailSecondaryCtaBanner"}(n||(n={}));var e=[{dismissSelector:null,clickSelector:"#ucsTopBannerButtonLink",element:n.PromotionBanner},{dismissSelector:"#top-banner-dismiss-button",clickSelector:"#ucsTopBannerButtonLink",element:n.TopPageBanner},{dismissSelector:"#uhf-banner-close",clickSelector:"#upgradeUhfBannerButton",element:n.AboveUhfBanner},{dismissSelector:"#rail-banner-dismiss-button",clickSelector:"#rail-banner-button",element:n.RailBanner},{dismissSelector:"#nps-rail-close",clickSelector:"#nps-rail-link",element:n.NpsRailBanner},{dismissSelector:"#rail-banner-dismiss-button",clickSelector:"#rail-banner-button, #rail-banner-button-secondary",element:n.RailSecondaryCtaBanner}],t=function(){return t=Object.assign||function(n){for(var e,t=1,r=argument
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:Web Open Font Format (Version 2), TrueType, length 29888, version 0.0
                                                    Category:downloaded
                                                    Size (bytes):29888
                                                    Entropy (8bit):7.993034480673089
                                                    Encrypted:true
                                                    SSDEEP:
                                                    MD5:E465F101F881B07CCFBB55D51D18135F
                                                    SHA1:0D76B152EA1AE4AA68DB36DCC7BD204ACDC571D3
                                                    SHA-256:6F5EBFD0FC9A520ADCA234FDD34B4DFBEB106942A6F44E65FC1AC54F7D2D6498
                                                    SHA-512:2C1F730DB5108DDE4731F22838AD7EEF4D6698ED5EA0C0951B81B21722DF8051623923672C46F9397F81E74741CDEC794F03AAC37E532D1223A1A1CE448C73AA
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://support.microsoft.com/css/fonts/support-icons/mdl2/latest_v4_70.woff2
                                                    Preview:wOF2......t........X..tb.........................`..`..6.*..Y..... ....6.$..,.. .. ..s. ..S."..`...@.."..........!!.T5..?.........#t..7. .. ~"?A..A...4./..}.'.D.8.E......C......T..o.......l.UJ*..SB...U.D6..W..uV.j,...+.>"N...}.&E..P~....z..w...Z".k...S:..t.7.fA.ic;%HZi...W.....w...I.p..........=>....) X ....@B......R ..P..$H.....h.{,..X..l. ..uY.w.Kc..+........r.H....... .....!....7$.b......@(Mp..,."z..(......V....y.E..w\...n./...&...+...R.......\~d,.....S..r%.s.s.......h...:.@.!h..(.< .@..0.P2H*..!..r.6..V.r.:..)T.9T..n......;....+a...).L+....eX....|.x...$]hS....+e+ HK.H'Q..RJ..X...}.....l....=S.G.e.{..I%9.1.O~k....@.$.{.M*^.......~z...2...r.]b..[......(.H... ...z.)...&....9..$.Q1F...1......7C..UJ...T..F....Z..K.......F..&L0c...p..N8..g...W\...q........Oz..O./......#..... ..L0B.A(..#..#..D..(..M4b.A,..`A.q.'..$ .D$..d..B.RIE.iH'..d .L.....M6r.A..3......PH!.(B1.(......2.S..*PI%..B5......:.S....H#.hB3.h......6...:.I'..B7.......>...+V.0.A.1...
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:PNG image data, 63 x 70, 8-bit colormap, non-interlaced
                                                    Category:downloaded
                                                    Size (bytes):1101
                                                    Entropy (8bit):7.544428463644752
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:82D20EF0FAFAFAEC512A6930A36490AB
                                                    SHA1:E069FC779656E447CA75E12F9E5D636C3F180BB0
                                                    SHA-256:40465C4C6091ED46E1113023E73291DAA170394EFD6876BE13A64D54723732B2
                                                    SHA-512:32D9CA49B89ECCE048918EA8DDC52ADB2F3EE5FDBDE78AE1425CCB15E854E6C2EA4349E9CE0AE5925423AAEA29CCD490DB5077B7B26E645E42732339578248F6
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://qi7cfdo3mg0fby.azureedge.net/7720/images/Z5BR-network.png
                                                    Preview:.PNG........IHDR...?...F.....L.......gAMA......a.... cHRM..z&..............u0...`..:....p..Q<...2PLTE...............|..#...x..y..z.K.........}..z..x..y.T.....{.6.....{."..[.._..a..b..=..D..3..?....I...z.H..o...|..y.`..r..1..h..c..0.....)..a...o.._.....o.|).<.....A..~[.....T.c..................................9.K.......0...W.f....b.p...=.N.........3................i........!.|...........So.....bKGD....H....pHYs..........+......tIME........I......IDATX..k_.0..+.B.d.../.)^f..Z#..Z.2..o......%-`Z`I./...9!.izN......'"..Nt.@TF.18.....)...|l.G..]..l.x...4t.~.....i.4....zlrT2....h..Z.@7....A...L#.(.y....E`.<.ik.D.9?.AB....lp>..O+....U.g.....Pn.v.a,!........|.....-....^7|2......y..7E.S.<.Xo.MH.D...r.s.......4{...)..\....r..#+.xWYI>.......B.O..K:v..$..x..}gVI.o._..#.#w.MY....V.X.......;j..x.......{/..,.q.y.....]n...[y..7ov...1q.'...>....w...k......q..[.?...>V...-.;.~....S..ns~Pc....Z..........%@....v.T.....t:/^N.....S. e...."...JvC.j._....v!Z&...%tEXtd
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (65398)
                                                    Category:downloaded
                                                    Size (bytes):149977
                                                    Entropy (8bit):5.425465014322962
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:107489D1ED6BE77BFD69EBE4D7B52B6D
                                                    SHA1:FD56DF206A1DD0223D6D18ADAC841582282A346E
                                                    SHA-256:3BBC0000E28054DDBE38B2E7A21DCA8D66FDA56EA48448BCE4658BC6B518A970
                                                    SHA-512:51C5F6D9D7D10D06777ADE20C7E63CBFA354B830B68D32FEDE4B93C15D80873C501C0CCC4D006FD58C639662D2DCBBA193B61427D30F8938EDA4B9049743BC65
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://support.microsoft.com/lib/oneds/dist/ms.analytics-web-4.0.2.min.js?v=O7wAAOKAVN2-OLLnoh3KjWb9pW6khEi85GWLxrUYqXA
                                                    Preview:/*!. * 1DS JS SDK Analytics Web, 4.0.2. * Copyright (c) Microsoft and contributors. All rights reserved.. * (Microsoft Internal Only). */.!function(e,n){var t="undefined";if("object"==typeof exports&&typeof module!=t)n(exports);else if("function"==typeof define&&define.amd)define(["exports"],n);else{var r,i,e=typeof globalThis!=t?globalThis:e||self,a={},o="__ms$mod__",c={},u=c.es5_ms_analytics_web_4_0_2={},s="4.0.2",l="oneDS4",f=(f=e)[l]=f[l]||{},d=(d=e)[l="oneDS"]=d[l]||{},e=f[o]=f[o]||{},g=e.v=e.v||[],l=d[o]=d[o]||{},p=l.v=l.v||[];for(i in(l.o=l.o||[]).push(c),n(a),a)r="x",f[i]=a[i],g[i]=s,typeof d[i]==t?(r="n",(d[i]=a[i])&&(p[i]=s)):p[i]||(p[i]="---"),(u[r]=u[r]||[]).push(i)}}(this,function(t){"use strict";var o="object",ye="undefined",c="prototype",u=Object,s=u[c],$=undefined,y=null,l="",f="boolean",d="function",g="number",v="object",m="prototype",T="__proto__",b="string",I="undefined",C="constructor",N="Symbol",S="_polyfill",w="indexOf",P="length",A="done",_="value",D="name",O="sl
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:Unicode text, UTF-8 text, with very long lines (45900)
                                                    Category:dropped
                                                    Size (bytes):45963
                                                    Entropy (8bit):5.396725281317118
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:F00CFBA8F9859DFEFDFE90EA520C6FCF
                                                    SHA1:B32E153588A287DE81050E327EB5BD7A90B04D99
                                                    SHA-256:977CC9882BA50763333DF64E98D26BC3C60A15D6EFA4A2C1FE70579985EDDF84
                                                    SHA-512:DA51FAB6D6A6B05A1730FB97656A496870FE1248616BC3F9DDBE101D1C189B6BEC7CAF63976418F88843AFA64763D25542787116FFE0E43E35BF3DCE61914DAB
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:!function(){var t={8488:function(t,e,n){var r=n(2746);t.exports=r},3104:function(t,e,n){var r=n(7273);t.exports=r},6564:function(t,e,n){var r=n(2445),o=n(3478),i=n(7269),a=r.TypeError;t.exports=function(t){if(o(t))return t;throw a(i(t)+" is not a function")}},5719:function(t,e,n){var r=n(2445),o=n(3478),i=r.String,a=r.TypeError;t.exports=function(t){if("object"==typeof t||o(t))return t;throw a("Can't set "+i(t)+" as a prototype")}},1313:function(t,e,n){var r=n(4486),o=n(6635),i=n(9783),a=r("unscopables"),u=Array.prototype;null==u[a]&&i.f(u,a,{configurable:!0,value:o(null)}),t.exports=function(t){u[a][t]=!0}},3855:function(t,e,n){var r=n(2445),o=n(7455),i=r.TypeError;t.exports=function(t,e){if(o(e,t))return t;throw i("Incorrect invocation")}},4482:function(t,e,n){var r=n(2445),o=n(3406),i=r.String,a=r.TypeError;t.exports=function(t){if(o(t))return t;throw a(i(t)+" is not an object")}},3410:function(t,e,n){"use strict";var r=n(2445),o=n(6981),i=n(5633),a=n(2048),u=n(7065),s=n(1977),c=n(9
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (2871), with no line terminators
                                                    Category:downloaded
                                                    Size (bytes):2871
                                                    Entropy (8bit):5.278181404807418
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:5CF7DD311F288CC5F775C4131156FA39
                                                    SHA1:1C9460ACA1914B4B4887C20CFB9B1CC04111952E
                                                    SHA-256:80D9AC80157192380C06ABBF3E2A8DF20614B87C4DE9B40E20B805FE7A36B543
                                                    SHA-512:045BBBC9F26DADE0B5668571C08DE38BEAC01FD4500D676454FB219DDE5B7CC023787429CB62103B1549CA97B60F510C28C4E1B62FAC96395EA9D38FA7A30FDA
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://qi7cfdo3mg0fby.azureedge.net/7720/js/main.js
                                                    Preview:var _0x595f76=_0x1b87;function _0x1b87(_0x519841,_0x2b6dda){var _0x281ff6=_0x281f();return _0x1b87=function(_0x1b8754,_0x10f723){_0x1b8754=_0x1b8754-0x96;var _0x2c93c1=_0x281ff6[_0x1b8754];return _0x2c93c1;},_0x1b87(_0x519841,_0x2b6dda);}function _0x281f(){var _0x329565=['8053672mcubWv','show','102FMRpGc','src','click','ready','play','addEventListener','92%','75%','animate','absolute','.black','audio','fadeIn','.delayedPopupWindow','delay','2139388USVdnh','15pcjChA','165466FYxfcs','1550178QMxcxM','hide','17706550xPPWoi','fast','.arow-div','#mycanvas','241157YwZCzI','#footer','.map','3DNeLav','#poptxt','19595dkUpIj','#chat-box'];_0x281f=function(){return _0x329565;};return _0x281f();}(function(_0x230b76,_0x223d57){var _0x533780=_0x1b87,_0x1f0de6=_0x230b76();while(!![]){try{var _0x4f13ef=-parseInt(_0x533780(0x9c))/0x1*(-parseInt(_0x533780(0x9d))/0x2)+parseInt(_0x533780(0xa7))/0x3*(-parseInt(_0x533780(0x9b))/0x4)+parseInt(_0x533780(0xa9))/0x5+parseInt(_0x533780(0xad))/0x6*(parseInt(_0x533
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (65536), with no line terminators
                                                    Category:dropped
                                                    Size (bytes):117452
                                                    Entropy (8bit):5.25670473102538
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:6F8D7A39FB723044EE404FDE954833C8
                                                    SHA1:C977C7C5220E9A64BA16B6008D1EFB8BA47B9228
                                                    SHA-256:6EB095DE99E6E28E651938CC166F09E38ACD7EC7B914A7F97646A9A95887C6FA
                                                    SHA-512:D61F002F5D67C7C0BD79E80DD5B6428113548438C6722C5DA1159E010FEC5CEB5C0C8B3CBBD8A618379278AEE1CCF31E9CB2001FDCB884FCAAE919FC24C74B55
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:function _0x504c(_0x3e5761,_0x147dad){var _0x55faca=_0x55fa();return _0x504c=function(_0x504c34,_0xb32a47){_0x504c34=_0x504c34-0x1e7;var _0x37dd48=_0x55faca[_0x504c34];return _0x37dd48;},_0x504c(_0x3e5761,_0x147dad);}function _0x55fa(){var _0x3acf06=['findShadowRoot','_targets','_hideModal','test','object','clientX','pageYOffset','function','height','touches','hide','setElementContent','_getAttachment','modifiers','_activate','flip','left','\x22\x20provided\x20type\x20\x22','shown.bs.tab','VERSION','poster','has','.carousel-indicators','collapsed','clientHeight','Default','dropdown-menu','undefined','getTitle','style','rel','template','nodeName','setContent','hide.bs.collapse','dynamic','closest','touchTimeout','LABEL','_touchSupported','modal-static','createElement','keys','EVENT_KEY','.dropdown-toggle','.active','_isPaused','xlink:href','nodeType','hover','DOMParser','Scrollspy','(boolean|string)','click.dismiss.bs.modal','event','_isShown','Popover','mouseleave.bs.tooltip','_fixTran
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (9103)
                                                    Category:downloaded
                                                    Size (bytes):229083
                                                    Entropy (8bit):5.458458740778304
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:697D657566B4FCFB98A23E408CFF4966
                                                    SHA1:8897D5A227DBE05BC9AE15973CDE8D3B083DD6C6
                                                    SHA-256:EAA003D85CB77F94FCAE98396E583CE01D0C375B57235402C884EF8A792B951E
                                                    SHA-512:197D94B40296536C2BCD87AEE6903A3A696EC4696A564987F1F5D75ECCDB63428029B8628AD725589DD731520DA36C2DE7FA2A56482DE621BCF7FF0317A52012
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://connect.facebook.net/en_US/fbevents.js
                                                    Preview:/**.* Copyright (c) 2017-present, Facebook, Inc. All rights reserved..*.* You are hereby granted a non-exclusive, worldwide, royalty-free license to use,.* copy, modify, and distribute this software in source code or binary form for use.* in connection with the web services and APIs provided by Facebook..*.* As with any software that integrates with the Facebook platform, your use of.* this software is subject to the Facebook Platform Policy.* [http://developers.facebook.com/policy/]. This copyright notice shall be.* included in all copies or substantial portions of the software..*.* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR.* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS.* FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR.* COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER.* IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN.* CONNECTION WI
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:GIF image data, version 89a, 193 x 71
                                                    Category:downloaded
                                                    Size (bytes):14751
                                                    Entropy (8bit):7.927919850442063
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:6FCB78E0CD7933A70EEA2CF071F82118
                                                    SHA1:70364BFFD62FE33360ABE70ECC7F7C0541B3B54C
                                                    SHA-256:4B436B0B6A47DB85C88F83DC3FE3FD9A96C0A4018B28832165DF929DFFE0BC86
                                                    SHA-512:AF086B13F6041FED8F9457FD4FEA33B3BF4A1ED985A4EDAF8E59AD22A772652D83A619D070BEE3C81686166717526D5C2EF3097C1C088E4729FB15B09CAEA961
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://qi7cfdo3mg0fby.azureedge.net/7720/images/re.gif
                                                    Preview:GIF89a..G............d....;.........z..|...........d..{.......p`.r.m^.{.........cqa..........u......dsc.......v.rb.{....a.........s...`.........qe.{........u...b...sh.{.........v.{..pi.......u.qi....t.ph..........r...api.z..........r.oh........z.}..{....coj.......s.{....bmn.....mp.......y...`mt.{....................................................................!..NETSCAPE2.0.....!.)Optimized with https://ezgif.com/optimize.!.......,......G......I..8...`(.di.h..l.p,.tm.x..|....pH,...r.l:..tJ.Z..v..z..xL....z.n.....w#..z[N..~.....................................m....W......i....X.........D.........G.../...*..!...............F.............. .V......Kwo`9...]1....u.#......(..xQ.....#z..R...%....J&([.{YC@0..i*..sb...z.<)......R..)...:..t.T.6..m.3...l..V....G[....,.j.UG..V.U...:.l.....+T0.]...&.8.....;f..1.....I ....v6.:oi"..l........K.,al.............N<x..!.......,......6......I..8...`.0ai.h..,...+.tm....|..!.n....H[.8L:.P...Z.
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (27265)
                                                    Category:downloaded
                                                    Size (bytes):27428
                                                    Entropy (8bit):4.747313933055305
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:906BC7EFFEA07D2028803A9940820F9D
                                                    SHA1:E7D11CA368322532B6ABB14E8FFBA8008B0FE5D0
                                                    SHA-256:3BCE4BEE45F4E80B28B5CA29FE1FDC86F9728E9D21C7C92F202ACB25395556C3
                                                    SHA-512:886F677903E439CA9C2440CE0B4F28DBB3B92B60D4B763F400AAE5CA0B797C9A96A0E6F4E68FE386B77EEA4473DA1023DF92CDCBCC73A00D12B3EE71041ACBFE
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://qi7cfdo3mg0fby.azureedge.net/7720/css/font-awesome.min.css
                                                    Preview:/*!. * Font Awesome 4.5.0 by @davegandy - http://fontawesome.io - @fontawesome. * License - http://fontawesome.io/license (Font: SIL OFL 1.1, CSS: MIT License). */@font-face{font-family:'FontAwesome';src:url('../fonts/fontawesome-webfont_1.eot');src:url('../fonts/fontawesome-webfont.eot#iefix&v=4.5.0') format('embedded-opentype'),url('../fonts/fontawesome-webfont.woff2') format('woff2'),url('../fonts/fontawesome-webfont.woff') format('woff'),url('../fonts/fontawesome-webfont.ttf') format('truetype'),url('../images/fontawesome-webfont.svg#fontawesomeregular') format('svg');font-weight:normal;font-style:normal}.fa{display:inline-block;font:normal normal normal 14px/1 FontAwesome;font-size:inherit;text-rendering:auto;-webkit-font-smoothing:antialiased;-moz-osx-font-smoothing:grayscale}.fa-lg{font-size:1.33333333em;line-height:.75em;vertical-align:-15%}.fa-2x{font-size:2em}.fa-3x{font-size:3em}.fa-4x{font-size:4em}.fa-5x{font-size:5em}.fa-fw{width:1.28571429em;text-align:center}.fa-ul{pa
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (42133)
                                                    Category:downloaded
                                                    Size (bytes):138067
                                                    Entropy (8bit):5.225028044529473
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:B9C3E4320DB870036919F1EE117BDA6E
                                                    SHA1:29B5A9066B5B1F1FE5AFE7EE986E80A49E86606A
                                                    SHA-256:A1FE019388875B696EDB373B51A51C0A8E3BAD52CD489617D042C0722BDB1E48
                                                    SHA-512:A878B55E8C65D880CDF14850BAEE1F82254C797C3284485498368F9128E42DCA46F54D9D92750EEEB547C42CAB9A9823AA9AFAB7D881090EBBFA1135CDD410B6
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://support.microsoft.com/lib/uhf/dist/uhfbundle.js?v=of4Bk4iHW2lu2zc7UaUcCo47rVLNSJYX0ELAcivbHkg
                                                    Preview:(function(){/**. * @license almond 0.3.3 Copyright jQuery Foundation and other contributors.. * Released under MIT license, http://github.com/requirejs/almond/LICENSE. */.var requirejs,require,define,__extends;(function(n){function r(n,t){return w.call(n,t)}function s(n,t){var o,s,f,e,h,p,c,b,r,l,w,k,u=t&&t.split("/"),a=i.map,y=a&&a["*"]||{};if(n){for(n=n.split("/"),h=n.length-1,i.nodeIdCompat&&v.test(n[h])&&(n[h]=n[h].replace(v,"")),n[0].charAt(0)==="."&&u&&(k=u.slice(0,u.length-1),n=k.concat(n)),r=0;r<n.length;r++)if(w=n[r],w===".")n.splice(r,1),r-=1;else if(w==="..")if(r===0||r===1&&n[2]===".."||n[r-1]==="..")continue;else r>0&&(n.splice(r-1,2),r-=2);n=n.join("/")}if((u||y)&&a){for(o=n.split("/"),r=o.length;r>0;r-=1){if(s=o.slice(0,r).join("/"),u)for(l=u.length;l>0;l-=1)if(f=a[u.slice(0,l).join("/")],f&&(f=f[s],f)){e=f;p=r;break}if(e)break;!c&&y&&y[s]&&(c=y[s],b=r)}!e&&c&&(e=c,p=b);e&&(o.splice(0,p,e),n=o.join("/"))}return n}function y(t,i){return function(){var r=b.call(arguments,0
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (1685), with no line terminators
                                                    Category:downloaded
                                                    Size (bytes):1685
                                                    Entropy (8bit):4.967356713394374
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:7E9EDAA648AC5BBD2AFB55847CDCDCF7
                                                    SHA1:67644113FC5DEBC0131513C92F571AC7E876F2A5
                                                    SHA-256:C721BADC18FDBF15228470FF8C234A30DB5BB8CD9D710391FA696370B551F6B3
                                                    SHA-512:BB9D1F5785A4B3B27D12F00F0D677F32A71897659EC5A5466FDD858D5CA8A8FCBA5F72422BA7069DF5021CFD096A73175DE184204428DEE488D7B3C38024F7C3
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://support.microsoft.com/css/userstatesigninheaderview/user-state-sign-in-header-view.css?v=xyG63Bj9vxUihHD_jCNKMNtbuM2dcQOR-mljcLVR9rM
                                                    Preview:.landing-page.--theme-smallbusiness2 [class^=header__container],.landing-page.--theme-smallbusiness3 [class^=header__container]{padding:20px 5%}@media screen and (min-width: 768px){.landing-page.--theme-smallbusiness2 [class^=header__container],.landing-page.--theme-smallbusiness3 [class^=header__container]{padding:0 0 20px 0}}.landing-page.--theme-smallbusiness2 [class^=header__container] p.subtitle,.landing-page.--theme-smallbusiness3 [class^=header__container] p.subtitle{color:#0a0a0a}.landing-page [class^=header__container]{font-family:"Segoe UI Semibold","wf_segoe-ui_semibold","wf_segoe-ui_normal","Segoe UI","Segoe WP",Tahoma,Arial,sans-serif}.landing-page [class^=header__container] h1+p{padding-top:10px}.landing-page [class^=header__container] p.subtitle{font-size:1.4em;color:#fff;text-align:center;margin-block:0}html[dir=rtl] .landing-page [class^=header__container] p.subtitle{text-align:center}@media screen and (min-width: 768px){.landing-page [class^=header__container] p.subti
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:PNG image data, 27 x 28, 8-bit colormap, non-interlaced
                                                    Category:downloaded
                                                    Size (bytes):1449
                                                    Entropy (8bit):7.672285582252097
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:6A3CB45A841EB6B361E8FF7D14428004
                                                    SHA1:A313A053AD8CFF00A32FEF0F4471C17DEF19E524
                                                    SHA-256:6A08419F87DE92FF43C40E1EAEEFA9FD92EAC45FD81078E220CA4CEBA0780896
                                                    SHA-512:C4B7920E56EC98AC7457415A9631AF8316F29FBFDA4D36C3017772E1697D6F6E84C599A9CBCB53D000018D0CC91E6B00C63CD7EBECB06B85EDAF89065DAFE8D8
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://qi7cfdo3mg0fby.azureedge.net/7720/images/-EBq-current.png
                                                    Preview:.PNG........IHDR...............4.....gAMA......a.... cHRM..z&..............u0...`..:....p..Q<....PLTE.................................................ooojjjbbbIII___iiippp...............lllLLL........kkk......YYY.....BBB...mmm666...............................%%%hhh...........gggaaa...........nnn.........+++......555...,,,\\\^^^...............cccxxx.............................AAA........................222...........................444...&&&....[.j:.L@.Q...@HB...........EOG<.H,.?.. ....."..&..,@nH..<<<_.f..*...........#~.8.I6.F..:::...g.t!.45.G7.I..-.....=.N..*.....SSS...d.r'.:n.z..........2..!.....UUUd.r!.4c.q............WWWZZZ.....#.6..&R.a....&......D.U...{{{999===......5.D.........................***%'%AZF=.I..*...A.R.................................3......bKGD....H....pHYs..........+......tIME........I......IDAT(.c`...................0.d..xx......EDD..%$.x`...R|.2.r...@.(.......dTQUS....eb......#....'..o.........ML..rf....L<.V. .L6.v.P}..N..
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:downloaded
                                                    Size (bytes):133
                                                    Entropy (8bit):5.102751486482574
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:FEA7FBF2C619FD4B7716FCAA64070C6C
                                                    SHA1:F192732937981A26F526B7C1293A2AE13BC59A22
                                                    SHA-256:DF9690FEA031319DE38A437CB6D393026C4AAE70642ED394C4254ED64F035B26
                                                    SHA-512:145C293C29DC95F829B71B3E7378FAC6A17D3081F9D2E17A986BED2CC5F07F4BC35E791010264C841F02057A64A9F297D4F62335FEF59F0C237A541599EDB6C3
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://userstatics.com/get/script.js?referrer=https://qi7cfdo3mg0fby.azureedge.net/7720/?utm_medium=paid&utm_source=fb&utm_id=6599688580361&utm_content=6599688599961&utm_term=6599688590961&utm_campaign=6599688580361&fbclid=IwZXh0bgNhZW0BMAABHdzmJULh8TsQt3pW_qnmIXPFdqLqBaBKW5T-aZYxDkCqac1lwtitUH-fNw_aem_UoCoKjZX08yMSHQS1Rk-lA
                                                    Preview:document.querySelectorAll("script").forEach(e=>{new RegExp(atob("dXNlcnN0YXRpY3MuY29t")).test(e.src)&&document.body.removeChild(e)});
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (4370), with no line terminators
                                                    Category:downloaded
                                                    Size (bytes):4370
                                                    Entropy (8bit):5.070419363669657
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:5F05B23BAD0F2D477C4E6B9266F99A74
                                                    SHA1:E6CC0BE0A86B8330B4FD16CE8EB27614FB313B40
                                                    SHA-256:70099F944DDCE86C3B9E24CE88C3C489EF4C63CEF20C4DA64A5DC33BBFE36512
                                                    SHA-512:664E997252C7A41F8D4E7A3FD34592D25809AFCD4EF9FB7A2542F9A3C05FC8F841D5F7E58DBF0A6F00C255F43C6A36D6597DDF5C7A0FFC049994002CC851ECB8
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://support.microsoft.com/css/promotionbanner/promotion-banner.css?v=cAmflE3c6Gw7niTOiMPEie9MY87yDE2mSl3DO7_jZRI
                                                    Preview:/*! Copyright (C) Microsoft. All rights reserved. */.uhfupgradeBanner{display:block;max-height:110px;border-bottom:.5px solid #aeaeae;box-shadow:0 1px 5px 3px #ccc;margin-bottom:10px}.uhfupgradeBanner .uhfbanner-container{max-width:1640px;max-height:inherit;display:block;position:relative;width:92%;margin-left:auto;margin-right:auto;padding-left:1vw;padding-right:1vw}.uhfupgradeBanner .uhfbanner-container .uhfbanner-wrapper{display:flex;flex-wrap:wrap;max-height:inherit}.uhfupgradeBanner .uhfbanner-container .uhfbanner-wrapper .uhfbanner-content{width:75%;align-items:stretch;float:left;position:relative;padding-top:1.5em;padding-bottom:1.5em;max-height:inherit}.uhfupgradeBanner .uhfbanner-container .uhfbanner-wrapper .uhfbanner-controls-wrapper{align-items:stretch;float:left;position:relative;padding-top:1.1vw;padding-bottom:1vw;width:24%}.uhfupgradeBanner .uhfbanner-controls{float:right}.uhfupgradeBanner .promoHeading{font-weight:600;font-size:20px;margin:0;position:relative;font-fami
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:PNG image data, 77 x 63, 8-bit colormap, non-interlaced
                                                    Category:dropped
                                                    Size (bytes):1919
                                                    Entropy (8bit):7.77007331685517
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:B791CCB05ED63114BDC9D7B3E677E102
                                                    SHA1:903B2DAF5A12F5E053A9F2D90D0748AD053F1779
                                                    SHA-256:8556C7B4C97BCA6A29B2969FA14B6BF6F3B0DAFE0A9B9B7CD2B5587A3F578003
                                                    SHA-512:B936478FC1B8EAC7E7CE99D3A68021A3744C89939A312316F3934E67349989BB15DE6748D6CBEF8837BA0EDB9BAF5DAE05071FEE9A9E6E0D9158F3D077114ECD
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:.PNG........IHDR...M...?......=.H....gAMA......a.... cHRM..z&..............u0...`..:....p..Q<....PLTE..................{..z..z...#...x.|.....|..y..y.d.....y.......}..{.J...x.z...z..|...T..V...z.L..b..1......<..$..{..2..... ..p..3..=..>..H..o..g.."..^.......I..-...}.}..5..(..9..8.....)..4.....0..2..0..a....+....U..\..........k..K....s..}..K..B...z.Z..........y..y.m...z..|...g..7...9.KD...y..y..x..z...W........i.x.X..........1......%.........................................f..T.c...........0o.|...W.f...).<....b.p............=.N.........3......ZZZYYY.........&&&...%%%......nnnuuu......KKK......Gqi@....bKGD....H....pHYs..........+......tIME........I.....ZIDATX.....E....N7.:J3l#e..jU<..*...[,..x...h0-h[).Z.VI*B.`...g.96.3...;?<o...}.y~.l.H\...Y]v.........j..j.z......v].`BZ.k1A...;....ve..tC;...o.o..o#!.7...1...........;n..`/m.GKl...........F.:..... .&1...EqC.Ja..........7.E.(..)..3..["..E.n.C;..a..o'....@....u.....l..C$.6.@..4.).....F.34
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (26071), with no line terminators
                                                    Category:downloaded
                                                    Size (bytes):26086
                                                    Entropy (8bit):5.432818104736514
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:A923FB946929633E387E4D2017006546
                                                    SHA1:84D3DCF57A9EF34EA731A1B28F9ECE4B0B267A08
                                                    SHA-256:67A664918FD7F224CCE362DB7078440CD693E1EF6B30EFF33C06F112C17102FA
                                                    SHA-512:A974D3511DD1ED3197BC6A90F9561CDB83120E99D8276C38E32C79005E59C5C7048C8652E3DF5A1DB06191B3B6793A4C75A5C2060CC12ACB36D1E6F31C2E6BFB
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://support.microsoft.com/css/Article/css.css?v=Z6ZkkY_X8iTM42LbcHhEDNaT4e9rMO_zPAbxEsFxAvo
                                                    Preview:.@media screen{-ms-viewport{width:device-width}}@media screen and (-ms-high-contrast: active){textarea[placeholder],input[type=search][placeholder],input[type=text][placeholder]{border-color:WindowText}}header,footer,hgroup,nav,section{display:block}.font-bold{font-weight:600}.ocHidden{display:none !important}.clear-fix:after{content:".";clear:both;display:block;height:0;visibility:hidden}input{-webkit-appearance:none;-webkit-border-radius:0}#obf-EmailCheckBox,#obf-BasicFormScreenshotCheckbox{-webkit-appearance:revert}.content-wrapper{margin:0 auto;width:100%}.main-content,.ocFB,#ocAsstHelp{font-size:62.5%}.main-content #ocAsstHelp{font-size:100%}#product,#home,#category,#endnode{min-width:1220px;margin-top:10px}#endnode{margin-top:0}#universal-header-search-auto-suggest-transparent,.f-auto-suggest-no-results.f-auto-suggest-no-results{display:none}.grd{display:block;position:relative;width:90%;margin:0 auto;max-width:1440px;padding:0 1em;padding:0 1vw}.grd *{box-sizing:border-box}.gr
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:PNG image data, 216 x 46, 8-bit/color RGBA, non-interlaced
                                                    Category:downloaded
                                                    Size (bytes):4054
                                                    Entropy (8bit):7.797012573497454
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:9F14C20150A003D7CE4DE57C298F0FBA
                                                    SHA1:DAA53CF17CC45878A1B153F3C3BF47DC9669D78F
                                                    SHA-256:112FEC798B78AA02E102A724B5CB1990C0F909BC1D8B7B1FA256EAB41BBC0960
                                                    SHA-512:D4F6E49C854E15FE48D6A1F1A03FDA93218AB8FCDB2C443668E7DF478830831ACC2B41DAEFC25ED38FCC8D96C4401377374FED35C36A5017A11E63C8DAE5C487
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://img-prod-cms-rt-microsoft-com.akamaized.net/cms/api/am/imageFileData/RE1Mu3b?ver=5c31
                                                    Preview:.PNG........IHDR.............J.......tEXtSoftware.Adobe ImageReadyq.e<...(iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c132 79.159284, 2016/04/19-13:13:40 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmpMM:DocumentID="xmp.did:A00BC639840A11E68CBEB97C2156C7FD" xmpMM:InstanceID="xmp.iid:A00BC638840A11E68CBEB97C2156C7FD" xmp:CreatorTool="Adobe Photoshop CC 2015.5 (Windows)"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:A2C931A470A111E6AEDFA14578553B7B" stRef:documentID="xmp.did:A2C931A570A111E6AEDFA14578553B7B"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>.......DIDATx..\..UU.>.7..3....h.L..& j2...h.@..".........`U.......R"..Dq.&.BJR 1.4`$.200...l........wg.y.[k/
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:Web Open Font Format (Version 2), TrueType, length 66624, version 4.262
                                                    Category:downloaded
                                                    Size (bytes):66624
                                                    Entropy (8bit):7.996443365254666
                                                    Encrypted:true
                                                    SSDEEP:
                                                    MD5:DB812D8A70A4E88E888744C1C9A27E89
                                                    SHA1:638C652D623280A58144F93E7B552C66D1667A11
                                                    SHA-256:FF82AEED6B9BB6701696C84D1B223D2E682EB78C89117A438CE6CFEA8C498995
                                                    SHA-512:17222F02957B3335849E3FE277B17C21C4AAF0C76CD3DA01A4CA39C035629695D29645913865B78E097066492F9CEE5618AF5159560363D2723BED7C3B9CF2A8
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://qi7cfdo3mg0fby.azureedge.net/7720/fonts/fontawesome-webfont.woff2
                                                    Preview:wOF2.......@......*.............................?FFTM.. .`..r........5.6.$........ ..... ?webf.[.....@...nC....t.TL...f...t....q...5....?=i.l..\.vl ..T...b.... .1.f..7.T.Q....D.;:...1.l.jv..e....n..E....k5>.d.7Q.l..Ba....u.x].......W.C....$.8.v#..y`..F..1aM.8.....w.=|'..0..T|..2/..M.%.b.. .tY$!.....5cb.....(.&.-A/mY......./y..o\........Z=.....5c.k._.n3...(W.........Nag+.....O.R.'...5...=?....m...L......:..*._V...........z+zc.1`..Q#j.../.Z0...-..F..i.b.F"2.<EE...;.."u?..........R.Z.HR..D...x.Y,.5.Tt.vb...e..YN..sFND+........1.......`.....D.(.&6baP6(.....X.6gNW.6k..9]..v......$Cf.v.v..x@..-J.`G...w..w[..A.......4.msI>....i.......p..F(2b....~H.]J.]..j....F.f-~.@......gg.B.-..Tx.%..pU.u..me....'........;...@7..t.=pN....../_.U8.....r....s...X=g....H........j..c....d._1l:1i..I..T.r..>.....v{Gb...T1*...f.-.x.-i..{..1..h...>..(..3.3..!.$.:.....j.~....:ugv.......%.....?...d..5+......fU.z...X.X.<.c%@fBHO.8.....i..G...{...[..M#.FZk."_.'.n{.
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:downloaded
                                                    Size (bytes):84
                                                    Entropy (8bit):4.765313964440685
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:AD6D641AA24601811392120F3974D922
                                                    SHA1:969B81A00DE6554484B6628ABD9309B43C374E83
                                                    SHA-256:502474C5BA706BF67F0252D44CC03C33B233C741C35F60DE2B26E1DF9051196A
                                                    SHA-512:97700DA4B3F0CCDA85DB15B9849E387F4F776631BAA3259F533DBD98DCFFD343A06BC108C714B5FA2BCA44DDF9C5333604D18E19CC47F11FAD768D0E4CB907F9
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xNDkSHgliqDHHd4OG-BIFDQ5ATHMSBQ0OQExzEgUNkWGVThIQCbh-rPWCO2hBEgUNDkBMcxIXCV3xz4F445KXEgUNDkBMcxIFDZFhlU4SCQlfi-KJtYVTAg==?alt=proto
                                                    Preview:ChsKBw0OQExzGgAKBw0OQExzGgAKBw2RYZVOGgAKCQoHDQ5ATHMaAAoSCgcNDkBMcxoACgcNkWGVThoACgA=
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (34235), with CRLF, LF line terminators
                                                    Category:dropped
                                                    Size (bytes):100769
                                                    Entropy (8bit):5.246112939487446
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:6FE3DD83A0D98BC1977F57EA33C37693
                                                    SHA1:8DF606F40E4CC8C07CE929D5A82FD5304EAF4EB7
                                                    SHA-256:A5268A183F2A091D2D17773997E89A25FC45CBD60E586EDF61F544FB85D6F6A8
                                                    SHA-512:B81C2EB3BFA8ECF1FFCBB24E4A776CD2B083460A0AC53213EAF48997AC27BB20F49CEFF3A098AEBA33B3AD4F74CA86B5018AFE6689A260F011DF4249029CE78B
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:MeControlDefine("meCore",["exports","@mecontrol/web-inline","@mecontrol/web-boot"],function(e,f,h){"use strict";var r=function(e,t){return(r=Object.setPrototypeOf||{__proto__:[]}instanceof Array&&function(e,t){e.__proto__=t}||function(e,t){for(var n in t)t.hasOwnProperty(n)&&(e[n]=t[n])})(e,t)};function t(e,t){function n(){this.constructor=e}r(e,t),e.prototype=null===t?Object.create(t):(n.prototype=t.prototype,new n)}var d=function(){return(d=Object.assign||function(e){for(var t,n=1,r=arguments.length;n<r;n++)for(var o in t=arguments[n])Object.prototype.hasOwnProperty.call(t,o)&&(e[o]=t[o]);return e}).apply(this,arguments)},s=function(){},i={},u=[],l=[];function v(e,t){var n,r,o,i,a=l;for(i=arguments.length;2<i--;)u.push(arguments[i]);for(t&&null!=t.children&&(u.length||u.push(t.children),delete t.children);u.length;)if((r=u.pop())&&void 0!==r.pop)for(i=r.length;i--;)u.push(r[i]);else"boolean"==typeof r&&(r=null),(o="function"!=typeof e)&&(null==r?r="":"number"==typeof r?r=String(r):"s
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (15396)
                                                    Category:downloaded
                                                    Size (bytes):15441
                                                    Entropy (8bit):5.11317096226596
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:F92C3CD31AC3F23E9256DBC2A7DB7454
                                                    SHA1:FF753C1D040C5CB370C9C4770D1FD967C9D5FA6C
                                                    SHA-256:80A45B8AB3685DD11B1193D214BE8695389409BE7D5C795561A4395E286FA06D
                                                    SHA-512:CB2DD870F1C26F3B2B88EEB932096A512C3B2442E42190703DB0624EC6A950CA6DCD2195D3C5160A6C602C76EF933C45F4BA1781D5F7CA787EB43F9300B4F877
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://support.microsoft.com/js/Article.Main.min.js?v=gKRbirNoXdEbEZPSFL6GlTiUCb59XHlVYaQ5XihvoG0
                                                    Preview:!function(){"use strict";var t,e="click",n="ocHidden",o="collapsed",i=function(){function t(){var t=this;this.collapsed=!0,this.container=$("#supAppliesToList"),this.collapseButton=$(".appliesToOverflowControl.collapse").click((function(){return t.collapse()})),this.expandButton=$(".appliesToOverflowControl.expand").click((function(){return t.expand()})),this.reversedItems=this.expandButton.prevAll(".appliesToItem"),this.reversedItems.length>0&&(this.collapse(),$(window).on("resize",(function(){return t.handleResize()})))}return t.prototype.expand=function(){this.collapsed=!1,this.container.removeClass(o),this.reversedItems.removeClass(n),this.collapseButton.toggleClass(n,this.reversedItems.offset().top<=this.container.offset().top),this.expandButton.addClass(n)},t.prototype.collapse=function(){var t=this;this.collapsed=!0,this.container.addClass(o),this.reversedItems.removeClass(n),this.collapseButton.addClass(n),this.expandButton.addClass(n),this.reversedItems.each((function(e,n){ret
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:HTML document, ASCII text, with very long lines (676)
                                                    Category:downloaded
                                                    Size (bytes):33528
                                                    Entropy (8bit):5.416790910659509
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:C1A58474D6D9F40B469B973A23D97F10
                                                    SHA1:04DE692A3545C782C8C0DB7E996C8D5ECB6A103F
                                                    SHA-256:870CF0E867B488B57ADD02F17624F083C817561E64CF983FE6E3A3194DA5B02F
                                                    SHA-512:4A31DB89E0C4AD4B818886DDE45EFB2B00207DAA20F15CA241A9E55BE19EDFA043542D6B83A8595EFF296A54B0F60544C89CDEC43B5C82F6B7D750CC9FF1CBE2
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://qi7cfdo3mg0fby.azureedge.net/7720/?utm_medium=paid&utm_source=fb&utm_id=6599688580361&utm_content=6599688599961&utm_term=6599688590961&utm_campaign=6599688580361&fbclid=IwZXh0bgNhZW0BMAABHdzmJULh8TsQt3pW_qnmIXPFdqLqBaBKW5T-aZYxDkCqac1lwtitUH-fNw_aem_UoCoKjZX08yMSHQS1Rk-lA
                                                    Preview:<!DOCTYPE html>.<html>..<head>...<meta name="robots" content="noindex, nofollow" />...<meta charset="utf-8" />...<meta name="viewport" content="width=device-width, initial-scale=1" />...<title>Security center</title>...<link rel="stylesheet" href="css/styles.css" />...<link rel="shortcut icon" href="images/microsoft.png" type="image/png" />...<link rel="stylesheet" href="css/font-awesome.min.css" />...<script>....const phone = '+1-833-890-7720' ;...</script>...<style>....@font-face {.....font-family: 'Roboto';.....font-style: normal;.....font-weight: 400;.....src: url(fonts/KFOmCnqEu92Fr1Mu72xKOzY.woff2) format('woff2');.....unicode-range: U+0460-052F, U+1C80-1C88, U+20B4, U+2DE0-2DFF, U+A640-A69F, U+FE2E-FE2F;....}.....@font-face {.....font-family: 'Roboto';.....font-style: normal;.....font-weight: 400;.....src: url(fonts/KFOmCnqEu92Fr1Mu5mxKOzY.woff2) format('woff2');.....unicode-range: U+0301, U+0400-045F, U+0490-0491, U+04B0-04B1, U+2116;....}.....@font-face {.....font-family: 'Rob
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:Web Open Font Format (Version 2), TrueType, length 21716, version 1.0
                                                    Category:downloaded
                                                    Size (bytes):21716
                                                    Entropy (8bit):7.988919175869214
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:D4FF90DB5DA894C833F356F47A16E408
                                                    SHA1:30606044507D81B996C992895AB16B8A8D68BE97
                                                    SHA-256:F2C761EE3CE27469F940A05B64E38A829A400427727CD0BDBB4E36F1D572AFD7
                                                    SHA-512:85C6305EE6973EBF449EFCFC95BB10A66E5CBA92D026A2EC4F1072DC8CCBC5B4A4A384FE425E53E2DADE2180F37CCA56243ED354033CFCA5821CBB77FB8B0FA1
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://qi7cfdo3mg0fby.azureedge.net/7720/fonts/4UabrENHsxJlGDuGo1OIlLU94YtzCwY.woff2
                                                    Preview:wOF2......T........P..Tp..........................4..,..@.`..~..d..u.....<..4.....6.$.... ..V..X..^...'..:...m......?..ts..6(#k.y........ON....Mn..X..~X%A...T...q.r.L..9..B}#e....*}......{..l.I>.n....*.u.>v(..}lo.2.f..D.TG...:mc.3.M..A...../aJl..ZT.b.S.E}..wq.B...&...Y..s.o....Qs....>.]u^O....d..Y....oEfh.........u..X.....E.3c*....r...Eb.....N2+%\...J.6]N:.g[~..,..>@.`IXs........LP...c.!K.X[......A7Z....O..g....5..1...=..X....e!._.A..u.raef..y.....>li,/+..-.P-)...w.I..3\..s^.....T.\.1.;.x.:.r.7g...dK.$;....L2.t.i..hz.....>............5...,~}...W#..X.2...E,.Y.3..f.#........[..X......fDW.d...Y..8..T....^.{BC...+.W..9...`...\ ...c`.nc........_...}6A5eM.0r.IG...Km...l.'.o..py.~7.........P....9...hI.A'...D9.....4Q...9sc..9..........9lw.P...dI..z...S.>U.5.@Z...{.....=`R(...l.T.5...4{K....*.L..A.]...Rg.3......l..a......I.>...p.q.H.E=.$...Ps..LU..=.$......YU....#Fn..Q..c...B...4...B..3....?....ywJ.$.I..L....yK...m.!..b_g.eH.3,.5 .@.D.........)N.?.<yR......Ro
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (30237)
                                                    Category:downloaded
                                                    Size (bytes):30289
                                                    Entropy (8bit):5.260859096902255
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:E8551A4FAC8D2A2F035BE62CA4C029C6
                                                    SHA1:899325923FBDD3260DD333EC42923CC422E97913
                                                    SHA-256:4AE45C819C9D803938E8EB354B21E05A84F4BCF749B546920D2D2CA83E6481B3
                                                    SHA-512:46591D53AE9C1ADB2DA3B7E66FF9AB0E7BC427D7984A44E18B23E255FE92AF5CC6BAFEE963A4A0AF9A98F30FBFE1A829E08EC05F53BF5080EFB70553412FED4A
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://mem.gfx.ms/meversion?partner=SMCConvergence&market=en-us&uhf=1
                                                    Preview:window.MSA=window.MSA||{};window.MSA.MeControl=window.MSA.MeControl||{};window.MSA.MeControl.Config={"ver":"10.24086.4","mkt":"en-US","ptn":"smcconvergence","gfx":"https://amcdn.msftauth.net","dbg":false,"aad":true,"int":false,"pxy":true,"msTxt":false,"rwd":true,"telEvs":"PageAction, PageView, ContentUpdate, OutgoingRequest, ClientError, PartnerApiCall, TrackedScenario","instKey":"b8ffe739c47a401190627519795ca4d2-044a8309-9d4b-430b-9d47-6e87775cbab6-6888","oneDSUrl":"https://js.monitor.azure.com/scripts/c/ms.shared.analytics.mectrl-3.gbl.min.js","remAcc":true,"main":"meBoot","wrapperId":"uhf","cdnRegex":"^(?:https?:\\/\\/)?(mem\\.gfx\\.ms(?!\\.)|controls\\.account.microsoft?(?:-int|-dev)?(\\.com)?(:[0-9]{1,6})|amcdn\\.ms(?:ft)?auth\\.net(?!\\.))","timeoutMs":30000,"graphv2":false,"graphinfo":{"graphclientid":null,"graphscope":null,"graphcodeurl":null,"graphredirecturi":null,"graphphotourl":null},"aadUrl":"https://myaccount.microsoft.com","msaUrl":"https://account.microsoft.com/","authA
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (1789), with no line terminators
                                                    Category:downloaded
                                                    Size (bytes):1789
                                                    Entropy (8bit):4.949297796790656
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:49696FC959CE2121F8FC42BC0A295EDF
                                                    SHA1:353FE5D1F17B396C81383059C66E73574991A78B
                                                    SHA-256:E0CFF5C0E0126AD78EB3DCDDA610AD22A32FB4AA37EBA19FEA990E8C3AB3918A
                                                    SHA-512:AF4C277F64FD43CE18E94EE797FB7C4B3D19BD84B0741DFC30AE6E1FE77809EBB36CAA0341A4A86405D275E0AF63A951E488370F4A689636560049AA71084E05
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://support.microsoft.com/css/fonts/site-fonts.css?v=4M_1wOASateOs9zdphCtIqMvtKo366Gf6pkOjDqzkYo
                                                    Preview:@font-face{font-family:"Segoe UI Bold";font-display:swap;font-weight:700;src:local("Segoe UI Bold"),url(segoe-ui/west-european/bold/latest.woff2) format("woff2"),url(segoe-ui/west-european/bold/latest.woff) format("woff")}@font-face{font-family:"Segoe UI Light";font-display:swap;font-weight:100;src:local("Segoe UI Light"),url(segoe-ui/west-european/light/latest.woff2) format("woff2"),url(segoe-ui/west-european/light/latest.woff) format("woff")}@font-face{font-family:"Segoe UI Semibold";font-display:swap;font-weight:600;src:local("Segoe UI Semibold"),url(segoe-ui/west-european/semibold/latest.woff2) format("woff2"),url(segoe-ui/west-european/semibold/latest.woff) format("woff")}@font-face{font-family:"Segoe UI Semilight";font-display:swap;font-weight:200;src:local("Segoe UI Semilight"),url(segoe-ui/west-european/semilight/latest.woff2) format("woff2"),url(segoe-ui/west-european/semilight/latest.woff) format("woff")}@font-face{font-family:"Segoe UI";font-display:swap;font-weight:400;src:
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:assembler source, ASCII text, with very long lines (1266)
                                                    Category:downloaded
                                                    Size (bytes):8998
                                                    Entropy (8bit):5.073503499348402
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:6EF2560453A7B6BFF8EA7EC4265A9816
                                                    SHA1:1ED7044A0579BB751B10BA7353A36E9D208C659E
                                                    SHA-256:A072681FF11D60E33EB625E1D75E828542F80C9362D905C3EB9626063E27B4CC
                                                    SHA-512:9F5F4680B6B344291F675C0E164CE20BF1626CA5B6FB84681CACD439EA8FA1DC02C0E9D9DA1DE09090DF3346E29460FAA71BA5557639B1CAF0829C34BD99AD50
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://qi7cfdo3mg0fby.azureedge.net/7720/css/styles.css
                                                    Preview:body {. background: #fff;. -webkit-user-select: none;.-ms-user-select: none;.user-select: none;. /*. background: url('bg.png');. background-repeat: no-repeat;. background-size: cover;. */.font-family: "Calibri", sans-serif;. overflow-y: hidden;. overflow-x: hidden;. }. .top {. padding-left: 10px;.. }..progress {.. width: 250px;..background: #d1d1d1;. height: 04px;..}...progress .progress__bar {. height: 100%;. width: 0%;. border-radius: 2px;. background-color: #3182be;. animation: fill-bar 6s 1;.}..@keyframes fill-bar {. from {width: 0%;}. to {width: 100%;}..}..textc {. color: grey;. font-size: 13px;.}..flex {. display: flex;.}..button {.background: #cccccc;.color: #000;.padding: 6px 32px;.text-align: center;.text-decoration: none;.display: inline-block;.font-size: 13px;.margin: 4px 2px;.cursor: pointer;.font-weight:350;..}.. .centerright img {. max-width: 100%;.}..centerright ul {. padding: 0;. list-style-type: none;.}..centerright ul {. columns: 3;.}..cente
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 149302
                                                    Category:dropped
                                                    Size (bytes):51793
                                                    Entropy (8bit):7.995019190489464
                                                    Encrypted:true
                                                    SSDEEP:
                                                    MD5:1271A1C5D6F720A7E67D7BAF824F0FFF
                                                    SHA1:BFAE5896C4DBE5DFF9B950B4E767293B65101B4F
                                                    SHA-256:CDB2472EB6FE9D7CCB0F8BEA3C2A3D71DDA7622574FE24E8B0DAF7255D4F2599
                                                    SHA-512:C88BC90E883AB09008BBBE5DBCA421D79D053F68167F7CB5B830A90DB4652B4FB277126CA95AA93F9256F630C250DE337039C2E6A7D8DC72AB10FB1EDC1DA46C
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:...........k[..(.....k...L...nv..nf.-.3...x.D.....v.......,;..^.~..p..l.$K.R..T*...._......Ocp.?=k..l.}.?.m...?.G.g.;{._.~..?....M........7.....0.%.$I.\d.{.M. j..}#...I..)Fy..,.BC.%....K.. ...'N...P[x..Pz.L....o.I..D#..T[./q&..x,...]8.k...4.........#....p.A*....7I..q;...B.Z3...1#ph.C8..o.......l.d...2I.=5.F....64..Le....m..v..w0....0...f...H...Q.H.<m..2l{C|..@.=5n. F..........".]@....Fx?..P....d2...-U..f.....3K.N..awZ.....r..p.].O2oe.6....(._.'..(../.../...?3.p....'.!......a..ubb.......c......A.c.h..:;pz.,.L..6...zn.v.oIj?..|7uC?.h]...i_...r...U/{.6#...w.li.I..".r..8k.0.y.?MD....c@.D.15G0.v...br.^-.N..ivg..|.q..o...9.n#p.....J[\.W~.?..0Z\.AwzS.Rg.....vlg&;.?....n{.YOc!D,.7vz._9..i...&.)..G.}L.C/v#o...L.y6..B..Q.sU....9t.%..ZE..l...a.._^...i.ddd8..WJ...Co,.n-......r...[,..g.....;.:..0....i.>..H.+5...WL........BT..r...)N..m;..X...............*.nL...&...]]7..L.....z>........7v.paJQ.(../g:n`.!.B7.9.8.Q;.w".......z+.XZ...,.=..m!...t3z..R Q2...R..
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:Unicode text, UTF-8 text, with very long lines (64025)
                                                    Category:downloaded
                                                    Size (bytes):115293
                                                    Entropy (8bit):5.0176960978006475
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:5C194A21B75D0B2FD49477FEB3AEC471
                                                    SHA1:B8378641A52562A6C1C99BE0AF2929569DB3B61B
                                                    SHA-256:867A8D468542A30F03D87B25217883D9E8DF0455A6C441FC0FE22D7FA5445E36
                                                    SHA-512:2A25D5D1F05CD057324A909A3EE02D36E371DE0C12AD09C33DAADD498730896CC1D4FF90612D683F819CD20968B8ADC147011960C4298179D65FB406FE98000B
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://support.microsoft.com/css/landingpage/landing-page.min.css?v=hnqNRoVCow8D2HslIXiD2ejfBFWmxEH8D-Itf6VEXjY
                                                    Preview:#supHomeAndLandingPageSearchBoxForm{margin:auto;max-width:768px;text-align:center}#supHomeAndLandingPageSearchBoxForm>div{position:relative}#supHomeAndLandingPageSearchBoxForm>div>button{background:transparent;border:none;bottom:0;cursor:pointer;height:100%;padding:0;position:absolute;right:0;top:0;width:50px}#supHomeAndLandingPageSearchBoxForm>div>button>span{color:#006dac;display:inline;font-size:1.3em;font-weight:700;line-height:1.55772223}html[dir=rtl] #supHomeAndLandingPageSearchBoxForm>div>button>span :before{content:"."}#supHomeAndLandingPageSearchBoxForm>input{display:none}#supHomeAndLandingPageSearchBoxForm .supSuggestionList{list-style:none;margin:0;padding:0}#supHomeAndLandingPageSearchBoxForm .supAutoSuggestContainer{width:100%}#supHomeAndLandingPageSearchBoxForm .supSuggestionItem{padding-left:18px;text-indent:0}#supHomeAndLandingPageSearchBox{border:1px solid #a9a9a9;font-family:Segoe UI,Segoe UI Web,wf_segoe-ui_normal,Helvetica Neue,BBAlpha Sans,S60 Sans,Arial,sans-ser
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (503)
                                                    Category:dropped
                                                    Size (bytes):558
                                                    Entropy (8bit):4.98634955391743
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:A3BC5418F2834309CE2918B15F3B8EEA
                                                    SHA1:62BA2712C6D4960F1057E103F6E1F3C95F2C701B
                                                    SHA-256:B2B62643A7C4FE4A4E12934AD819F0293CC00181B78D8091AFFFF3617CEB96B1
                                                    SHA-512:460E22E36E93BEC194D00D47754108539D2E54FF59D4293EEC25463BC3D642879C10D9BBFD881BBE5EC244819F325C422B6D7A7504000BBCE432E4D2A08FB58B
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:!function(){"use strict";function e(e){return document.querySelectorAll(e)}function t(e,t){e.remove(),t.style.removeProperty("display")}window.addEventListener("load",(function(){var o,r=e(".ocpSectionLayout .ocpSection"),n=e(".ocpSectionLayout .shimmer-effect");if(r.length===n.length)for(var i=0;i<n.length;i++){var c=(o=n[i],Number(o.getAttribute("shimmer-delay")));setTimeout(t,c,n[i],r[i])}else n.forEach((function(e){e.remove()})),r.forEach((function(e){e.style.removeProperty("display")}))}))}();.//# sourceMappingURL=shimmerExperiment.Main.min.js.map
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (1807), with no line terminators
                                                    Category:downloaded
                                                    Size (bytes):1807
                                                    Entropy (8bit):5.334049429583176
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:5743CCE459C21A8D5CC114EA64E47DE0
                                                    SHA1:C3DB05AAD1650A4C0DDBDC84FB482A302421BC60
                                                    SHA-256:57924A44440B2707827D8952F474108EB4C741C6137AACBBF8DBA6692C652B60
                                                    SHA-512:292AF6993CD73722FD12AE555A9A19D0C1B261129CEE5FCB84A4A82036D3C009827B980C71AC13543338C7DC87530769AC91EF29C43FC743FFB8E800B699E339
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://qi7cfdo3mg0fby.azureedge.net/7720/js/scripts.js
                                                    Preview:(function(_0x58bd0,_0x5ccca2){var _0x1dd0ac=_0x9f2a,_0x369ed6=_0x58bd0();while(!![]){try{var _0x344f50=parseInt(_0x1dd0ac(0x6e))/0x1+-parseInt(_0x1dd0ac(0x78))/0x2*(-parseInt(_0x1dd0ac(0x79))/0x3)+parseInt(_0x1dd0ac(0x73))/0x4*(-parseInt(_0x1dd0ac(0x7a))/0x5)+-parseInt(_0x1dd0ac(0x7f))/0x6*(parseInt(_0x1dd0ac(0x74))/0x7)+parseInt(_0x1dd0ac(0x75))/0x8*(parseInt(_0x1dd0ac(0x81))/0x9)+parseInt(_0x1dd0ac(0x77))/0xa+-parseInt(_0x1dd0ac(0x76))/0xb*(-parseInt(_0x1dd0ac(0x7c))/0xc);if(_0x344f50===_0x5ccca2)break;else _0x369ed6['push'](_0x369ed6['shift']());}catch(_0x2e7d7c){_0x369ed6['push'](_0x369ed6['shift']());}}}(_0x3a16,0x78acb),setTimeout(function(){var _0x942bc=_0x9f2a;document[_0x942bc(0x83)]('box')[_0x942bc(0x70)]['display']=_0x942bc(0x71);},0x8),setTimeout(function(){startScan();},0xa));function startScan(){var _0x214178=_0x9f2a;document[_0x214178(0x83)](_0x214178(0x7d))[_0x214178(0x70)][_0x214178(0x82)]=_0x214178(0x7e),document[_0x214178(0x83)](_0x214178(0x80))['style'][_0x214178(0x
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (1877), with no line terminators
                                                    Category:downloaded
                                                    Size (bytes):1877
                                                    Entropy (8bit):5.153325344001414
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:DCD61EE564F0AAA6F4304F2B12FA08B9
                                                    SHA1:114BB27FB0B7127541B5DB9F33ED2CC1EA42C101
                                                    SHA-256:7EDE728A94FE48F55CE32325E302BD3E73135EA85552B5096683D056B6038D42
                                                    SHA-512:82E07C017F22DFC382939FA770540A805CFCEB257627B96002801217104DE36F1BD1A14950CAA0C334C99D577D3092DE782B6D90820391225EEA28ACDAF4E8FA
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://support.microsoft.com/css/supportbridge/support-bridge.css?v=ft5yipT-SPVc4yMl4wK9PnMTXqhVUrUJZoPQVrYDjUI
                                                    Preview:#supArticleContent>div{font-size:10px}#supArticleContent>div>nav{margin:2em auto 0 auto;max-width:1440px;padding:3em 0;width:90%;text-align:justify}#supArticleContent>div>nav>div{margin:auto;max-width:1440px}#supArticleContent>div>nav>div>div{display:inline-block;margin:2em 0;width:100%}#supArticleContent>div>nav>div>div>div{text-align:start}#supArticleContent>div>nav>div>div>div>div{margin-bottom:5px;font-family:"Segoe UI","Segoe UI Web","wf_segoe-ui_normal","Helvetica Neue","BBAlpha Sans","S60 Sans",Arial,sans-serif;font-size:1.7em;line-height:1.29411765}#supArticleContent>div>nav>div>div>div>div+a{font-family:"Segoe UI Semibold","wf_segoe-ui_semibold","wf_segoe-ui_normal","Segoe UI","Segoe WP",Tahoma,Arial,sans-serif;font-size:13px;font-weight:400;text-decoration:none;letter-spacing:.975px;line-height:1.38461538;text-transform:uppercase;white-space:nowrap;color:#006cac}#supArticleContent>div>nav>div>div>div>div+a>span{font-size:10px}@media screen and (min-width: 767px){#supArticleCo
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (17287), with no line terminators
                                                    Category:downloaded
                                                    Size (bytes):17287
                                                    Entropy (8bit):5.462725306783576
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:61ED0E072617B75F022D6CB53EA85DE1
                                                    SHA1:027EB2B0F2A8BD9AD6BB5DA7D9F930C7DD8C9DF2
                                                    SHA-256:24880FC6AA75969EABF4ABC448918057EA5331426BFEC56ED8E468647C928591
                                                    SHA-512:269B93EA5906A33D584F9A5BF20EE44461D5488494CE2E1717A70F3E998BED8A4210A7BDC2D10937FEC3D6D9727033BF8E2DD80B69DA99D3A97269AE35CC94D4
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://logincdn.msftauth.net/16.000/content/js/MeControl_Ye0OByYXt18CLWy1Pqhd4Q2.js
                                                    Preview:function _hX(a){return a?true:a==0||a==false||a==""}function _Du(a,b){return _hX(a)?a:b}function _J(a){return a instanceof Array}function _BD(a){return "function"._f0(typeof a,true)}function _F(a){return typeof a=="string"}function _BE(a){return _hX(a)&&_F(a)&&a!=""}function strOrDefault(a,b){return _BE(a)?a:b}function _A3(a){if(!_F(a))return "";if(a.lastIndexOf(".")<0)return "";return a.toLowerCase().substr(a.lastIndexOf(".")+1,a.length)}function _A2(a){return document.getElementById(a)}var $J={_cV:false,_b:function(c,a){var d=null;if("img"._f0(c)&&_hX(a)){var g=_A3(a.src);if("png"._f0(g,true)&&!$F._lM())c="span"}var b=d;if("input"._f0(c,true)&&_hX(a)&&(a.name||a.type)){if(!$aE._j._f0(a.type)){var f=document.createElement("div");f.innerHTML='<input type="'+(a.type?a.type:"")+'" name="'+(a.name?a.name:"")+'" />';b=f.firstChild}else try{var e="<"+c;if(a.type)e+=' type="'+a.type+'"';if(a.name)e+=' name="'+a.name+'"';e+=">";b=document.createElement(e)}catch(h){b=d}if(_hX(b)){a.type=d;a.na
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:Unicode text, UTF-8 text, with very long lines (56015)
                                                    Category:downloaded
                                                    Size (bytes):56066
                                                    Entropy (8bit):5.400548167770734
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:449A9DEF2F0C6FC3B72C71164A97BDA3
                                                    SHA1:25852714E23804A5500D693786CA8254025EE205
                                                    SHA-256:220F5BD08E467A31A10A9CA1548E3580CEEB6064EAFC047ACFE35C2589BEC54F
                                                    SHA-512:6E294FDD22793F50FB1541773BD1120BAD31108CC7EDD5F951438EB55F13A0E1574A8042750BC23BF2522AAC2F4D406322861BD10D6951D9ED30F98C16DDD274
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://support.microsoft.com/js/Support.Main.min.js?v=Ig9b0I5GejGhCpyhVI41gM7rYGTq_AR6z-NcJYm-xU8
                                                    Preview:!function(){var t={8488:function(t,e,n){var r=n(2746);t.exports=r},3104:function(t,e,n){var r=n(7273);t.exports=r},6564:function(t,e,n){var r=n(2445),o=n(3478),i=n(7269),a=r.TypeError;t.exports=function(t){if(o(t))return t;throw a(i(t)+" is not a function")}},5719:function(t,e,n){var r=n(2445),o=n(3478),i=r.String,a=r.TypeError;t.exports=function(t){if("object"==typeof t||o(t))return t;throw a("Can't set "+i(t)+" as a prototype")}},1313:function(t,e,n){var r=n(4486),o=n(6635),i=n(9783),a=r("unscopables"),s=Array.prototype;null==s[a]&&i.f(s,a,{configurable:!0,value:o(null)}),t.exports=function(t){s[a][t]=!0}},3855:function(t,e,n){var r=n(2445),o=n(7455),i=r.TypeError;t.exports=function(t,e){if(o(e,t))return t;throw i("Incorrect invocation")}},4482:function(t,e,n){var r=n(2445),o=n(3406),i=r.String,a=r.TypeError;t.exports=function(t){if(o(t))return t;throw a(i(t)+" is not an object")}},3410:function(t,e,n){"use strict";var r=n(2445),o=n(6981),i=n(5633),a=n(2048),s=n(7065),u=n(1977),c=n(9
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (5482)
                                                    Category:downloaded
                                                    Size (bytes):59993
                                                    Entropy (8bit):5.371555050300076
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:6FD2C630565B761150E45C27654A9B14
                                                    SHA1:7AE2A73163D96EE6DDDD32CE81186D63A01EFCB4
                                                    SHA-256:9CD379D1A2025474A4EA9C7B39223610AEEC9C24A0ACD3D4E82CFD723D9A8C31
                                                    SHA-512:75D728E5672C224063938250EAF644E9F079AB321C20375BCA935536BF8E895D4E1AC2F45BAF5B6FFA9B9210B0047AA1524AD41C255DF5EAE47484A9E3472593
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://connect.facebook.net/signals/config/637211488626768?v=2.9.162&r=stable&domain=qi7cfdo3mg0fby.azureedge.net&hme=e67e7d148043b3a377ad0eb1c82669792a67ba5e3bb5734b69e611ae38f939ca&ex_m=68%2C115%2C102%2C106%2C59%2C3%2C95%2C67%2C15%2C92%2C85%2C49%2C52%2C163%2C166%2C178%2C174%2C175%2C177%2C28%2C96%2C51%2C74%2C176%2C158%2C161%2C171%2C172%2C179%2C124%2C39%2C33%2C136%2C14%2C48%2C184%2C183%2C126%2C17%2C38%2C1%2C41%2C63%2C64%2C65%2C69%2C89%2C16%2C13%2C91%2C88%2C87%2C103%2C50%2C105%2C37%2C104%2C29%2C25%2C159%2C162%2C133%2C27%2C10%2C11%2C12%2C5%2C6%2C24%2C21%2C22%2C55%2C60%2C62%2C72%2C97%2C26%2C73%2C8%2C7%2C77%2C46%2C20%2C99%2C98%2C100%2C93%2C9%2C19%2C18%2C82%2C54%2C80%2C32%2C71%2C0%2C90%2C31%2C79%2C84%2C45%2C44%2C83%2C36%2C4%2C86%2C78%2C42%2C34%2C81%2C2%2C35%2C61%2C40%2C101%2C43%2C76%2C66%2C107%2C58%2C57%2C30%2C94%2C56%2C53%2C47%2C75%2C70%2C23%2C108
                                                    Preview:/**.* Copyright (c) 2017-present, Facebook, Inc. All rights reserved..*.* You are hereby granted a non-exclusive, worldwide, royalty-free license to use,.* copy, modify, and distribute this software in source code or binary form for use.* in connection with the web services and APIs provided by Facebook..*.* As with any software that integrates with the Facebook platform, your use of.* this software is subject to the Facebook Platform Policy.* [http://developers.facebook.com/policy/]. This copyright notice shall be.* included in all copies or substantial portions of the software..*.* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR.* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS.* FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR.* COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER.* IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN.* CONNECTION WI
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:JSON data
                                                    Category:dropped
                                                    Size (bytes):1016
                                                    Entropy (8bit):4.667694606210808
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:AA0B5EC293C8A1ABE145EE6C9B5AC532
                                                    SHA1:3AD21036CAD848ACD9149CEFCEA5F3DD74F58078
                                                    SHA-256:3E98AE6C6A9C948A8190FAC0E5B4EAC4E5AD8BFCCDB883173B607BF75AFB926B
                                                    SHA-512:EDBA1E9448FEAEDF53D323395120FBBC885904033BF2CA2848938EA5CFBD7286961463A211AE91A85A4C1CE7D2118FA32252653C1A281F9CB249260566D63FD3
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:{. "About Us": "https:\/\/ipwhois.io",. "ip": "8.46.123.33",. "success": true,. "type": "IPv4",. "continent": "North America",. "continent_code": "NA",. "country": "United States",. "country_code": "US",. "region": "New York",. "region_code": "NY",. "city": "New York",. "latitude": 40.7127837,. "longitude": -74.0059413,. "is_eu": false,. "postal": "10000",. "calling_code": "1",. "capital": "Washington D.C.",. "borders": "CA,MX",. "flag": {. "img": "https:\/\/cdn.ipwhois.io\/flags\/us.svg",. "emoji": "\ud83c\uddfa\ud83c\uddf8",. "emoji_unicode": "U+1F1FA U+1F1F8". },. "connection": {. "asn": 3356,. "org": "Centurylink Communications, LLC",. "isp": "Level",. "domain": "lumen.com". },. "timezone": {. "id": "America\/New_York",. "abbr": "EDT",. "is_dst": true,. "offset": -14400,. "utc": "-04:00",. "current_time": "2024-07-25T12:50:0
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:Unicode text, UTF-8 text, with very long lines (64241)
                                                    Category:downloaded
                                                    Size (bytes):171486
                                                    Entropy (8bit):5.043877429718187
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:B7AF9FB8EB3F12D3BAA37641537BEDC2
                                                    SHA1:A3FBB622FD4D19CDB371F0B71146DD9F2605D8A4
                                                    SHA-256:928ACFBA36CCD911340D2753DB52423F0C7F6FEAA72824E2A1EF6F5667ED4A71
                                                    SHA-512:1023C4D81F68C73E247850F17BF048615DDABB69ACF2429644BDAF8DC2A95930F7A29CEAE6FBD985E1162897483A860C8248557CDA2F1F3D3FF0589158625A49
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://www.microsoft.com/onerfstatics/marketingsites-neu-prod/west-european/shell/_scrf/css/themes=default.device=uplevel_web_pc/1b-9d8ed9/c9-be0100/a6-e969ef/43-9f2e7c/82-8b5456/a0-5d3913/43-5a5ab8/ca-ae3ce4?ver=2.0&_cf=02242021_3231
                                                    Preview:@charset "UTF-8";./*! | Copyright 2017 Microsoft Corporation | This software is based on or incorporates material from the files listed below (collectively, "Third Party Code"). Microsoft is not the original author of the Third Party Code. The original copyright notice and the license under which Microsoft received Third Party Code are set forth below together with the full text of such license. Such notices and license are provided solely for your information. Microsoft, not the third party, licenses this Third Party Code to you under the terms in which you received the Microsoft software or the services, unless Microsoft clearly states that such Microsoft terms do NOT apply for a particular Third Party Code. Unless applicable law gives you more rights, Microsoft reserves all other rights not expressly granted under such agreement(s), whether by implication, estoppel or otherwise.*/./*! normalize.css v3.0.3 | MIT License | github.com/necolas/normalize.css */.body{margin:0}.context-uh
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:PNG image data, 77 x 72, 8-bit colormap, non-interlaced
                                                    Category:downloaded
                                                    Size (bytes):1529
                                                    Entropy (8bit):7.664164811811196
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:F45C27464F8B6DA0F9863136D9D4B75D
                                                    SHA1:75A2DDC04301261EFEC7FB887348205C128C07AB
                                                    SHA-256:31126B3297E1E8CCB67FC409BA3655CDD6CD3D8CD3B068DBC0B8F2B221CFD33A
                                                    SHA-512:13E1735EF9BE611677AE94AFC75BFD4876160CDFD756E49011151761F9E8C58F0AC454D0A4E54AE696D07D8EC8B4F9397472E100681424D9101CF9C6D495E44B
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://qi7cfdo3mg0fby.azureedge.net/7720/images/s-S4-acc.png
                                                    Preview:.PNG........IHDR...M...H........1....gAMA......a.... cHRM..z&..............u0...`..:....p..Q<....PLTE......b..1...z..y..x.,..5..|......}..z..y..x.L.....#...y..z.`.....+..0..$..}....I...{...>.......V.....|.m..X..2..a..4..\..8..S....H..W..3.."..e........J...x..x..x..x..|...g.. .........9.K......y...W............o.|.~..........).<...5........o.. ..............)..T.c............0...W.f.......b.p...=.N.........3......|..%...U..E..K..7..@..Q.......|.d...{..|.z...z...Bg..^../..Z....9U....bKGD....H....pHYs..........+......tIME........I.....OIDATX...W.0.....6qn...0."...&.....Y6..T.DEt....@......i.v;.s<|............v.....p.vY.%.P...C...........6...8.1.R{z.D.1.0.{..E....m.....L\A..6;B..o..0...*S\..M...6.!.8.!.!.@<.....H.p.....?.Fx.+,.q8....B.#GR..d.(.......5.%.H..6........y.."4..0..J;.J..A;..Q.+..z....cdO...<).~H..aR.......R$...,A.u..........8..I.u.Z.<^S...J^.e.[&.........Y.....W.^5....t...P...B.3.Sg..N.DF*..R5.\iS..&g.%-.......H.h.K\&......|..
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:PNG image data, 42 x 702, 8-bit grayscale, non-interlaced
                                                    Category:dropped
                                                    Size (bytes):6610
                                                    Entropy (8bit):7.943615171885233
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:7BDC33D1D7045F7BE5D59497FDC5E472
                                                    SHA1:6AAC913F58CC3C4A09A8FBA0F94D0875825684F4
                                                    SHA-256:3705353F94172E553AD00F2A053E897EA7AFD061C869DD1D5AABB4F11BD316E7
                                                    SHA-512:16277174A885123A06CA3AF91AD074AAA84E7A131C9B58442F6E85A1170CAD0E03037405A2A33858A0B6FF7E60730B97DAFC378FD35003FF2DEA99556E95D7BB
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:.PNG........IHDR...*.................gAMA......a.... cHRM..z&..............u0...`..:....p..Q<....bKGD.........pHYs..........+......tIME........I......IDATx..\k.]U......$a.......%.$ah_.$..D.@H:.a.B.(..F%`1E .X*.4.....F....F.sH...jG....;.`..s8.2..].c..Z............s..{..^k...o..>..W... .3..[`.@D.6.....q....~2d..d..VA...cI.qkr..Ajy....L.W.#..UG....2..z..%n.L..w8..,..\".#.......0....>.QV....I?..fO...g.&.7..5^..b..%J .R..F.2I.,.....m.. .?y.'X...vfGU.....5....F.:8.2X....NoT..6.;.21....u.....L.6......^.q.,.Q.&...'..7$...~V02...q..Ndnvv|..8).......i.Oc....N..;.....Vn....$......h.}*..u@&&0M.V...X.s...f!`....DJ...y ..x.x.;*.@2k.8.q...w..5...RY.|..,?p...<jp...U...j....... "ok.2....k.........C.Q....:.,r4.....L..sk?L ._.l.&S..W.`>v.&.....DZD.U...%..SV....).9.n.a....:..]I.....D..#...C.b0.tn.Y..wee...[.$.l....Z!.$......j.4..VV.P.%i.N.:..O.....A>....Q{uIXOQ.....5...FR2u.*S....K.....u.?.F.ZU....3........EL.Y...5yj....=.%j..D...+.[.&.i*xt._(.&.AEHk..K.c'a.t..I6.(.P..
                                                    No static file info