Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Welcome To Raise.eml

Overview

General Information

Sample name:Welcome To Raise.eml
Analysis ID:1568401
MD5:e4784d2d9be56433dc20d460c24febc6
SHA1:41cd4e3c731337cde84357884fa211cdd859acc6
SHA256:f569395095c5bee24b65c065a04764639c58676d2ae17f773feeb930c3401e10
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected phishing page
HTML body contains low number of good links
HTML body contains password input but no form action
Queries the volume information (name, serial number etc) of a device
Sigma detected: Office Autorun Keys Modification
Sigma detected: Suspicious Office Outbound Connections
Stores files to the Windows start menu directory
Stores large binary data to the registry
Suricata IDS alerts with low severity for network traffic
Uses Javascript AES encryption / decryption (likely to hide suspicious Javascript code)

Classification

  • System is w10x64_ra
  • OUTLOOK.EXE (PID: 428 cmdline: "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml "C:\Users\user\Desktop\Welcome To Raise.eml" MD5: 91A5292942864110ED734005B7E005C0)
    • ai.exe (PID: 7100 cmdline: "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "ADD05F58-D13C-479B-8319-C69A17B28CF0" "359C0734-F9B1-4D00-B27B-29C1B6A69881" "428" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx" MD5: EC652BEDD90E089D9406AFED89A8A8BD)
    • chrome.exe (PID: 6676 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://eu-west-1.protection.sophos.com/?d=raisetech.io&u=aHR0cHM6Ly9hcHAucmFpc2V0ZWNoLmlvL2F1dGgvbG9naW4=&p=m&i=NjBjYTgyOGE5ODM4MzQwZTVmNTJmYzk1&t=T0VzcmFQQVdqcC9EWEhKSGVqSE1Md0d2a1FSVkxGbWFZY3VrMFNLeHZ0TT0=&h=1cd637a0376e41e78af922b0e0e7274f&s=AVNPUEhUT0NFTkNSWVBUSVZYvxLCf6KfjkXyJEJz6YJArcsaAwFt6jVKVm0Ehc6Uz_BSiv8BBrnNy99NpAL7Zy3Nsd2XqSpxv98SGJtcqgcDNsHRZmSKrOfj2cWQzCypap5hAAQ1SIuK4d_mfOR8Mko MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 3816 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1800,i,18244539396293031315,16378364395311262870,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No yara matches
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE, ProcessId: 428, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Addins\OneNote.OutlookAddin\1
Source: Network ConnectionAuthor: X__Junior (Nextron Systems): Data: DestinationIp: 192.168.2.16, DestinationIsIpv6: false, DestinationPort: 49694, EventID: 3, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE, Initiated: true, ProcessId: 428, Protocol: tcp, SourceIp: 52.113.195.132, SourceIsIpv6: false, SourcePort: 443
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-12-04T15:31:18.459078+010020283713Unknown Traffic192.168.2.164969452.113.195.132443TCP

Click to jump to signature section

Show All Signature Results

Phishing

barindex
Source: https://app.raisetech.io/auth/loginJoe Sandbox AI: Score: 9 Reasons: The brand 'MICROSOFT' is a well-known technology company., The URL 'app.raisetech.io' does not match the legitimate domain 'microsoft.com'., The domain 'raisetech.io' is not associated with Microsoft., The presence of input fields for email and password on a non-Microsoft domain is suspicious., The URL does not contain any direct reference to Microsoft, which is a red flag. DOM: 1.1.pages.csv
Source: https://app.raisetech.io/auth/loginJoe Sandbox AI: Score: 9 Reasons: The brand 'Microsoft' is well-known and typically associated with the domain 'microsoft.com'., The provided URL 'app.raisetech.io' does not match the legitimate domain for Microsoft., The domain 'raisetech.io' does not have any known association with Microsoft., The presence of input fields for email and password on a non-Microsoft domain is suspicious., The URL does not contain any direct reference to Microsoft, which is unusual for a legitimate Microsoft service. DOM: 1.2.pages.csv
Source: https://app.raisetech.io/auth/loginHTTP Parser: Number of links: 0
Source: https://app.raisetech.io/auth/loginHTTP Parser: <input type="password" .../> found but no <form action="...
Source: https://app.raisetech.io/_next/static/chunks/app/layout-0f9b7601f18ec818.jsHTTP Parser: (self.webpackchunk_n_e=self.webpackchunk_n_e||[]).push([[3185,3257,5360,3196,490,2949,5536],{42480:function(){},58449:function(e,t,a){promise.resolve().then(a.bind(a,94580))},94580:function(e,t,a){"use strict";a.r(t),a.d(t,{default:function(){return el}});var s=a(57437);a(92390),a(62501),a(58877);var n=a(50280),i=a(60788),r=a(28720);function l(e){let{children:t}=e;return(0,s.jsx)(s.fragment,{children:t})}var d=a(56800),o=a.n(d),c=a(37545),u=a(2265);class m extends u.component{constructor(e){super(e),this.state={haserror:!1}}static getderivedstatefromerror(e){return{haserror:!0}}componentdidcatch(e,t){console.warn(e,t)}render(){return this.state.haserror&&console.warn("something went wrong."),this.props.children}}var p=a(58110),_=a(49714),f=a(22599),h=a.n(f),g=a(99078),x=a(51046),b=a.n(x),y=a(85360);function v(){return(0,s.jsxs)("footer",{classname:"flex flex-col md:flex-row md:gap-1 justify-center items-center text-skin-disabled bg-skin-disabled h-10 ","data-component":"organisms: footer: auth",children:[(0,s...
Source: https://app.raisetech.io/auth/loginHTTP Parser: <input type="password" .../> found
Source: https://app.raisetech.io/auth/loginHTTP Parser: No favicon
Source: https://app.raisetech.io/auth/loginHTTP Parser: No favicon
Source: https://app.raisetech.io/auth/loginHTTP Parser: No favicon
Source: https://app.raisetech.io/auth/loginHTTP Parser: No favicon
Source: https://app.raisetech.io/auth/loginHTTP Parser: No <meta name="author".. found
Source: https://app.raisetech.io/auth/loginHTTP Parser: No <meta name="author".. found
Source: https://app.raisetech.io/auth/loginHTTP Parser: No <meta name="author".. found
Source: https://app.raisetech.io/auth/loginHTTP Parser: No <meta name="author".. found
Source: https://app.raisetech.io/auth/loginHTTP Parser: No <meta name="copyright".. found
Source: https://app.raisetech.io/auth/loginHTTP Parser: No <meta name="copyright".. found
Source: https://app.raisetech.io/auth/loginHTTP Parser: No <meta name="copyright".. found
Source: https://app.raisetech.io/auth/loginHTTP Parser: No <meta name="copyright".. found
Source: unknownHTTPS traffic detected: 52.113.195.132:443 -> 192.168.2.16:49694 version: TLS 1.2
Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.16:49694 -> 52.113.195.132:443
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: eu-west-1.protection.sophos.com
Source: global trafficDNS traffic detected: DNS query: app.raisetech.io
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: widget.intercom.io
Source: global trafficDNS traffic detected: DNS query: js.intercomcdn.com
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
Source: unknownNetwork traffic detected: HTTP traffic on port 49817 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 49789 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49800 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49803 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49795 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49694
Source: unknownNetwork traffic detected: HTTP traffic on port 49812 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
Source: unknownNetwork traffic detected: HTTP traffic on port 49790 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49787 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49805 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49797
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49796
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49795
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49794
Source: unknownNetwork traffic detected: HTTP traffic on port 49694 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49793
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49792
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49791
Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49790
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49796 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49808 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49811 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49789
Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49788
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49787
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49786
Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
Source: unknownNetwork traffic detected: HTTP traffic on port 49813 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49810 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49817
Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49791 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49813
Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49812
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49811
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49810
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
Source: unknownNetwork traffic detected: HTTP traffic on port 49788 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49794 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49802 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49809
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49808
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49805
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49804
Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49803
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49802
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49801
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49800
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49797 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49801 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49809 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
Source: unknownNetwork traffic detected: HTTP traffic on port 49786 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49804 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
Source: unknownNetwork traffic detected: HTTP traffic on port 49792 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
Source: unknownHTTPS traffic detected: 52.113.195.132:443 -> 192.168.2.16:49694 version: TLS 1.2
Source: classification engineClassification label: mal48.phis.winEML@18/93@16/148
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\Documents\Outlook Files\~Outlook Data File - NoEmail.pst.tmp
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_16827_20130-20241204T0931120305-428.etl
Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml "C:\Users\user\Desktop\Welcome To Raise.eml"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "ADD05F58-D13C-479B-8319-C69A17B28CF0" "359C0734-F9B1-4D00-B27B-29C1B6A69881" "428" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "ADD05F58-D13C-479B-8319-C69A17B28CF0" "359C0734-F9B1-4D00-B27B-29C1B6A69881" "428" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://eu-west-1.protection.sophos.com/?d=raisetech.io&u=aHR0cHM6Ly9hcHAucmFpc2V0ZWNoLmlvL2F1dGgvbG9naW4=&p=m&i=NjBjYTgyOGE5ODM4MzQwZTVmNTJmYzk1&t=T0VzcmFQQVdqcC9EWEhKSGVqSE1Md0d2a1FSVkxGbWFZY3VrMFNLeHZ0TT0=&h=1cd637a0376e41e78af922b0e0e7274f&s=AVNPUEhUT0NFTkNSWVBUSVZYvxLCf6KfjkXyJEJz6YJArcsaAwFt6jVKVm0Ehc6Uz_BSiv8BBrnNy99NpAL7Zy3Nsd2XqSpxv98SGJtcqgcDNsHRZmSKrOfj2cWQzCypap5hAAQ1SIuK4d_mfOR8Mko
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1800,i,18244539396293031315,16378364395311262870,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://eu-west-1.protection.sophos.com/?d=raisetech.io&u=aHR0cHM6Ly9hcHAucmFpc2V0ZWNoLmlvL2F1dGgvbG9naW4=&p=m&i=NjBjYTgyOGE5ODM4MzQwZTVmNTJmYzk1&t=T0VzcmFQQVdqcC9EWEhKSGVqSE1Md0d2a1FSVkxGbWFZY3VrMFNLeHZ0TT0=&h=1cd637a0376e41e78af922b0e0e7274f&s=AVNPUEhUT0NFTkNSWVBUSVZYvxLCf6KfjkXyJEJz6YJArcsaAwFt6jVKVm0Ehc6Uz_BSiv8BBrnNy99NpAL7Zy3Nsd2XqSpxv98SGJtcqgcDNsHRZmSKrOfj2cWQzCypap5hAAQ1SIuK4d_mfOR8Mko
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1800,i,18244539396293031315,16378364395311262870,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: apphelp.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: c2r64.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: userenv.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: msasn1.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: kernel.appcore.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptsp.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: rsaenh.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: gpapi.dll
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\ClickToRun\REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{F959DBBB-3867-41F2-8E5F-3B8BEFAA81B3}\InprocServer32
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEWindow found: window name: SysTabControl32
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\Common
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\outlook\ConfigContextData 1
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile Volume queried: C:\Windows\SysWOW64 FullSizeInformation
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information queried: ProcessInformation
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeQueries volume information: C:\Program Files (x86)\Microsoft Office\root\Office16\AI\WordCombinedFloatieLreOnline.onnx VolumeInformation
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid AccountsWindows Management Instrumentation1
Scripting
1
Process Injection
1
Masquerading
OS Credential Dumping1
Process Discovery
Remote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
DLL Side-Loading
1
Modify Registry
LSASS Memory13
System Information Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
Registry Run Keys / Startup Folder
1
Registry Run Keys / Startup Folder
1
Process Injection
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Deobfuscate/Decode Files or Information
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
d35tlz0p71apkp.cloudfront.net
108.158.75.48
truefalse
    high
    raise-ui-productions.eba-suqkdnwu.eu-west-2.elasticbeanstalk.com
    13.42.249.188
    truefalse
      unknown
      widget.intercom.io
      108.158.75.116
      truefalse
        high
        s-0005.s-dc-msedge.net
        52.113.195.132
        truefalse
          high
          www.google.com
          142.250.181.36
          truefalse
            high
            js.intercomcdn.com
            108.158.75.4
            truefalse
              high
              eu-west-1.protection.sophos.com
              unknown
              unknownfalse
                high
                app.raisetech.io
                unknown
                unknowntrue
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  https://app.raisetech.io/auth/logintrue
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    52.109.89.18
                    unknownUnited States
                    8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                    142.250.181.131
                    unknownUnited States
                    15169GOOGLEUSfalse
                    20.42.65.84
                    unknownUnited States
                    8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                    108.158.75.48
                    d35tlz0p71apkp.cloudfront.netUnited States
                    16509AMAZON-02USfalse
                    23.218.208.109
                    unknownUnited States
                    6453AS6453USfalse
                    108.158.75.52
                    unknownUnited States
                    16509AMAZON-02USfalse
                    142.250.181.136
                    unknownUnited States
                    15169GOOGLEUSfalse
                    64.233.164.84
                    unknownUnited States
                    15169GOOGLEUSfalse
                    23.32.239.16
                    unknownUnited States
                    2828XO-AS15USfalse
                    2.20.68.201
                    unknownEuropean Union
                    37457Telkom-InternetZAfalse
                    108.158.75.116
                    widget.intercom.ioUnited States
                    16509AMAZON-02USfalse
                    172.217.17.42
                    unknownUnited States
                    15169GOOGLEUSfalse
                    1.1.1.1
                    unknownAustralia
                    13335CLOUDFLARENETUSfalse
                    172.217.17.78
                    unknownUnited States
                    15169GOOGLEUSfalse
                    108.158.75.4
                    js.intercomcdn.comUnited States
                    16509AMAZON-02USfalse
                    13.42.249.188
                    raise-ui-productions.eba-suqkdnwu.eu-west-2.elasticbeanstalk.comUnited States
                    7018ATT-INTERNET4USfalse
                    172.217.19.234
                    unknownUnited States
                    15169GOOGLEUSfalse
                    52.113.195.132
                    s-0005.s-dc-msedge.netUnited States
                    8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                    239.255.255.250
                    unknownReserved
                    unknownunknownfalse
                    18.134.234.85
                    unknownUnited States
                    16509AMAZON-02USfalse
                    142.250.181.36
                    www.google.comUnited States
                    15169GOOGLEUSfalse
                    142.250.181.14
                    unknownUnited States
                    15169GOOGLEUSfalse
                    142.250.181.99
                    unknownUnited States
                    15169GOOGLEUSfalse
                    52.109.76.243
                    unknownUnited States
                    8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                    172.217.17.72
                    unknownUnited States
                    15169GOOGLEUSfalse
                    IP
                    192.168.2.16
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1568401
                    Start date and time:2024-12-04 15:30:42 +01:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:defaultwindowsinteractivecookbook.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:18
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • EGA enabled
                    Analysis Mode:stream
                    Analysis stop reason:Timeout
                    Sample name:Welcome To Raise.eml
                    Detection:MAL
                    Classification:mal48.phis.winEML@18/93@16/148
                    Cookbook Comments:
                    • Found application associated with file extension: .eml
                    • Exclude process from analysis (whitelisted): dllhost.exe, backgroundTaskHost.exe, svchost.exe
                    • Excluded IPs from analysis (whitelisted): 52.109.89.18, 23.218.208.109, 52.109.76.243, 23.32.239.16, 23.32.239.83, 2.19.198.18, 2.19.198.17, 2.20.68.201, 2.20.68.210
                    • Excluded domains from analysis (whitelisted): omex.cdn.office.net, weu-azsc-config.officeapps.live.com, a767.dspw65.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, eur.roaming1.live.com.akadns.net, neu-azsc-000.roaming.officeapps.live.com, ecs-office.s-0005.s-msedge.net, roaming.officeapps.live.com, login.live.com, e16604.g.akamaiedge.net, officeclient.microsoft.com, prod.fs.microsoft.com.akadns.net, wu-b-net.trafficmanager.net, a1864.dscd.akamai.net, ecs.office.com, fs.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, prod.configsvc1.live.com.akadns.net, ctldl.windowsupdate.com, prod.roaming1.live.com.akadns.net, s-0005-office.config.skype.com, download.windowsupdate.com.edgesuite.net, config.officeapps.live.com, osiprod-neu-buff-azsc-000.northeurope.cloudapp.azure.com, ecs.office.trafficmanager.net, omex.cdn.office.net.akamaized.net, europe.configsvc1.live.com.akadns.net
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtQueryAttributesFile calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                    • VT rate limit hit for: Welcome To Raise.eml
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:data
                    Category:modified
                    Size (bytes):338
                    Entropy (8bit):3.459997039905481
                    Encrypted:false
                    SSDEEP:
                    MD5:0FC466FE2897743DB119E6EEA9F01702
                    SHA1:5EFD8CE8D17BE9ED7353D96CABD0A758CEC08DB6
                    SHA-256:71D6C47B46D4DC83BB57FD0B084BEBE8CF740AB491C90DB902892FFF91EA326E
                    SHA-512:2DFA368908274142F0B61549DB36C66FEBB578321E3117177A593110F68AFC2A2D25445EEE2D7BC91A114B97D6C4AF83144A2199CE258B558960459BF3D0939C
                    Malicious:false
                    Reputation:unknown
                    Preview:p...... .........1./YF..(..................................................^SZ.. .........p.........$...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.d.i.s.a.l.l.o.w.e.d.c.e.r.t.s.t.l...c.a.b...".7.4.6.7.8.7.a.3.f.0.d.9.1.:.0."...
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):231348
                    Entropy (8bit):4.378482198946309
                    Encrypted:false
                    SSDEEP:
                    MD5:B9F861B20D351F56DE094F4360B0A1C1
                    SHA1:B0272B32B2DF8E268DE370ADAB12D647E8229DCE
                    SHA-256:2E8AA0FABEF86C3F8A601CE6D2293868B963391DD62EC17AF1063EFAC6A431E7
                    SHA-512:7E84CBAD6B77048DCCE34CC0F3CDDF14A66384C00B09BEF35E572259E7355BD5EE47F2C86B5382E3596742BCC2E25553126E154DF0F6015522341EBA9EB37D8F
                    Malicious:false
                    Reputation:unknown
                    Preview:TH02...... . #."YF......SM01X...,...@Z."YF..........IPM.Activity...........h...............h............H..h.s...........h.........&..H..h\cal ...pDat...h....0... .s....h}.h............h........_`Pk...h..h.@...I.lw...h....H...8.Uk...0....T...............d.........2h...............k..D...........!h.............. h}..k....8.s...#h....8.........$h.&......8....."h8e.......c....'h..............1h}.h.<.........0h....4....Uk../h....h.....UkH..h.l..p....s...-h .......d.s...+h..h.......s......... ...... ..............F7..............FIPM.Activity....Form....Standard....Journal Entry...IPM.Microsoft.FolderDesign.FormsDescription................F.k..........1122110020000000....Microsoft...This form is used to create journal entries.........kf...... ..........&...........(.......(... ...@.....................................................................................................................fffffffff........wwwwwwww.p....pp..............p...............pw..............pw..DDDDO..
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:XML 1.0 document, ASCII text, with very long lines (2286), with no line terminators
                    Category:dropped
                    Size (bytes):2286
                    Entropy (8bit):5.075485638370862
                    Encrypted:false
                    SSDEEP:
                    MD5:364CA88B249F9D5FCA0E7BA9C36B6A76
                    SHA1:6F6FC6ED260FF05E5D2792C9506A3CEF1AF2707B
                    SHA-256:973076576B51E62B76B36144DC1AA4BD1F282A4CF2E08E8E148E55824B0DF0F2
                    SHA-512:5AD4A1589C0AA573A9B5920DC880FCF1BE4C1F719A43F328D6061537E9315F818A2F5C3B83FE93FFB700D51A349B579873888840062B3303E04A8143E70E156B
                    Malicious:false
                    Reputation:unknown
                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?><root><version>1</version><Count>15</Count><Resource><Id>Aptos_26215680</Id><LAT>2023-10-06T09:25:29Z</LAT><key>29939506207.ttf</key><folder>Aptos</folder><type>4</type></Resource><Resource><Id>Aptos_45876480</Id><LAT>2023-10-06T09:25:29Z</LAT><key>27160079615.ttf</key><folder>Aptos</folder><type>4</type></Resource><Resource><Id>Aptos Narrow_26215424</Id><LAT>2023-10-06T09:25:29Z</LAT><key>31558910439.ttf</key><folder>Aptos Narrow</folder><type>4</type></Resource><Resource><Id>Aptos Display_26215680</Id><LAT>2023-10-06T09:25:29Z</LAT><key>23001069669.ttf</key><folder>Aptos Display</folder><type>4</type></Resource><Resource><Id>Aptos Narrow_45876224</Id><LAT>2023-10-06T09:25:29Z</LAT><key>24153076628.ttf</key><folder>Aptos Narrow</folder><type>4</type></Resource><Resource><Id>Aptos Display_45876480</Id><LAT>2023-10-06T09:25:29Z</LAT><key>30264859306.ttf</key><folder>Aptos Display</folder><type>4</type></Resource><Resource><Id>Aptos_
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:JSON data
                    Category:dropped
                    Size (bytes):521377
                    Entropy (8bit):4.9084889265453135
                    Encrypted:false
                    SSDEEP:
                    MD5:C37972CBD8748E2CA6DA205839B16444
                    SHA1:9834B46ACF560146DD7EE9086DB6019FBAC13B4E
                    SHA-256:D4CFBB0E8B9D3E36ECE921B9B51BD37EF1D3195A9CFA1C4586AEA200EB3434A7
                    SHA-512:02B4D134F84122B6EE9A304D79745A003E71803C354FB01BAF986BD15E3BA57BA5EF167CC444ED67B9BA5964FF5922C50E2E92A8A09862059852ECD9CEF1A900
                    Malicious:false
                    Reputation:unknown
                    Preview:{"MajorVersion":4,"MinorVersion":40,"Expiration":14,"Fonts":[{"a":[4294966911],"f":"Abadi","fam":[],"sf":[{"c":[1,0],"dn":"Abadi","fs":32696,"ful":[{"lcp":983041,"lsc":"Latn","ltx":"Abadi"}],"gn":"Abadi","id":"23643452060","p":[2,11,6,4,2,1,4,2,2,4],"sub":[],"t":"ttf","u":[2147483651,0,0,0],"v":197263,"w":26215680},{"c":[1,0],"dn":"Abadi Extra Light","fs":22180,"ful":[{"lcp":983042,"lsc":"Latn","ltx":"Abadi Extra Light"}],"gn":"Abadi Extra Light","id":"17656736728","p":[2,11,2,4,2,1,4,2,2,4],"sub":[],"t":"ttf","u":[2147483651,0,0,0],"v":197263,"w":13108480}]},{"a":[4294966911],"f":"ADLaM Display","fam":[],"sf":[{"c":[536870913,0],"dn":"ADLaM Display Regular","fs":140072,"ful":[{"lcp":983040,"lsc":"Latn","ltx":"ADLaM Display"}],"gn":"ADLaM Display","id":"31965479471","p":[2,1,0,0,0,0,0,0,0,0],"sub":[],"t":"ttf","u":[2147491951,1107296330,0,0],"v":131072,"w":26215680}]},{"a":[4294966911],"f":"Agency FB","fam":[],"sf":[{"c":[536870913,0],"dn":"Agency FB Bold","fs":54372,"ful":[{"lcp":9830
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:TrueType Font data, 16 tables, 1st "GPOS", 30 names, Macintosh, Copyright (c) 2011-2015 by tyPoland Lukasz Dziedzic (http://www.typoland.com/) with Reserved Fon
                    Category:dropped
                    Size (bytes):656568
                    Entropy (8bit):6.571486522102043
                    Encrypted:false
                    SSDEEP:
                    MD5:8D72101CAD1547BED5BA3105041EEEAE
                    SHA1:29EB192629B0BBB41A7B7F49AB2AEC82D4261921
                    SHA-256:D636E4683231F931EDA222D588E944D082BFD3BDBA02F928BEE461C0F185B251
                    SHA-512:BE6667E1F6A50E23ADA324B52FB614CA82848600A82F6EDC4EC881A3C5F5D9F0477580AF2421F42B94E1B529E07DDDA7D2D9231B128D93056B4A327D63FE7222
                    Malicious:false
                    Reputation:unknown
                    Preview:............GPOS.l.?......6rGSUBl..x...L..$lOS/2j..........`cmapP.....1$....cvt :(....R ....fpgm......E.....gasp............glyfBd.....H....head...........6hhea.......D...$hmtx...%....../<loca+.....S.../@maxp...j...h... name.I`.........post.1.Y....... prepo.i:..Qd..............._.<...........y.....a.d.....}.m...................V.........}...................................P.`.w.............T.......x.......x.......Y.&................P......!....tyPL.........V.....W .............. ...'.-.........J...H...E.......8._.8._.................k.....^.........0...1.b.M...-....... .......A...........A.^.A.^...`.........A._.....=.B.=.B.......-.........J.................5...A...A.J.D.`.....T...T. .T...T.z.T.|.T.`.V.`.V.a.W.l.R. .S. .S.../.$./.../.3./.../.../.y.1.y.1.x.1.y.1.x.1.y.1.x.1.x.1.y.1...1.../...1...1...1...1...1...1...1.y.1...1.../.2.1...1.../.Y./...1...>.`.V.\...\...\.....q...=.......c.................i.+.....m...\...\...n.T.m.K...T.a...a...`.V.....b.C.b.C.8.C.9.C.....8.1...+...)....._.+
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:TrueType Font data, digitally signed, 16 tables, 1st "DSIG", 15 names, Microsoft, language 0x409, Copyright 2010 The Raleway Project Authors (impallari@gmail.com), with Reserved Font Name "Ralew
                    Category:dropped
                    Size (bytes):132000
                    Entropy (8bit):6.307953222297145
                    Encrypted:false
                    SSDEEP:
                    MD5:021809F6E395F4EED97110E63F90FFCA
                    SHA1:C7A8AF9895615A7132CBB94047A2DE3658C06C58
                    SHA-256:CB70F8815EECD850263D54FA59286377B1D7362BEC612E981155A00039D8B513
                    SHA-512:2F45AA5BD1D26BCFCB06B9F96FFA94A27B5BA2DC44810B4260149550AC10B8378D6CB44D2A755ACF3951A7AABB045F7C1410D7885E3E18539A37D2FA3CA878A6
                    Malicious:false
                    Reputation:unknown
                    Preview:............DSIG............GDEF.o....$(...ZGPOS..@*..&.....GSUB8$..........OS/2..gI.......`cmap...D.......Vgasp......$ ....glyf......%`...Jhead.h.d.......6hhea.......D...$hmtx)...........loca._.........^maxp.>.....h... name...7........post&.ZA...h..#.preph...................Ipa._.<...........^#.....+v!.(. ...u.......................?.(.M...........................f...j.......................E.........X...K...X...^.2.9................P. [........NONE................ .............. ...`.2...............................................................................................................Y...*...*...*...*...*...*...*...Y..."...Y..."...Y...Y.a.Y.a.Y.a.Y.a.Y.a.Y.a.Y.a.Y.a.Y.a.Y.a.Y.a.Y.a.Y.a.Y.a.Y.a.Y.a.Y.a.Y.a.Y.a.Y.a.Y.a.Y.a.Y.a.Y.M.Y...*...*...*...*...*...*...*...Y...,...Y...Y...Y...Y...Y.......................Y...Y.......3...........!...............Y...Y.G.Y.G.Y.G.Y.G.Y.G.Y.G.Y.G.Y.N...m.Y.m.Y...Y...Y...Y...Y...Y...Y...Y...Y...Y...*...*...*...*...*...*...*...*...*...*...*...*
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:TrueType Font data, digitally signed, 16 tables, 1st "DSIG", 15 names, Microsoft, language 0x409, Copyright 2010 The Raleway Project Authors (impallari@gmail.com), with Reserved Font Name "Ralew
                    Category:dropped
                    Size (bytes):137952
                    Entropy (8bit):6.275824739490365
                    Encrypted:false
                    SSDEEP:
                    MD5:7C262F7DDCAF8800B0C3380B882CD444
                    SHA1:D95FFB535F26EA952D007064407CAFC923806328
                    SHA-256:6894481AB1C298E9C66F23455ECF05CCB25393D719A6B2D63428358C0409D2D0
                    SHA-512:B3ADD716DAEFAD1379426233DFF888C9A2826646CCF14968B41B1AE903AE5765FD05C7B0A3858D7E4DD6A306F246B9F3D76D76D07DD2391FC546543675C88EF5
                    Malicious:false
                    Reputation:unknown
                    Preview:............DSIG............GDEF.o.........ZGPOS.Q.2..".....GSUB8$..........OS/2..gC.......`cmap...D.......Vgasp............glyf......%`....head...K.......6hhea.......D...$hmtx...........loca.-.........^maxp.>.....h... name.F.....T....post&.ZA......#.preph...................^..._.<...........^#.....+v..6...1.h.......................O.6...1.........................a...c.......................\.........X...K...X...^.2.:................P. [........NONE................ .............. ...`.2...............................................................................................................J...............................J.......J.......J...J.Y.J.Y.J.Y.J.Y.J.Y.J.Y.J.Y.J.Y.J.Y.*.Y.J.Y.J.Y.J.Y.J.Y.J.Y.J.Y.J.Y.J.Y.J.Y.J.Y.J.Y.J.Y.J.Y.J.>.J... ... ... ... ... ... ... ...J.......J...J...J...J...J.......................J...J.......3...........3...............J...J.H.J.H.J.H.J.H.J.H.J.H.J.H.J.R...a.J.a.J...J...J...J...J...J...J...J...J...J................................................
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:TrueType Font data, 10 tables, 1st "OS/2", 7 names, Microsoft, language 0x409, \251 2018 Microsoft Corporation. All Rights Reserved.msofp_4_40RegularVersion 4.40;O365
                    Category:dropped
                    Size (bytes):773040
                    Entropy (8bit):6.55939673749297
                    Encrypted:false
                    SSDEEP:
                    MD5:4296A064B917926682E7EED650D4A745
                    SHA1:3953A6AA9100F652A6CA533C2E05895E52343718
                    SHA-256:E04E41C74D6C78213BA1588BACEE64B42C0EDECE85224C474A714F39960D8083
                    SHA-512:A25388DDCE58D9F06716C0F0BDF2AEFA7F68EBCA7171077533AF4A9BE99A08E3DCD8DFE1A278B7AA5DE65DA9F32501B4B0B0ECAB51F9AF0F12A3A8A75363FF2C
                    Malicious:false
                    Reputation:unknown
                    Preview:........... OS/29....(...`cmap.s.,.......pglyf..&....|....head2..........6hheaE.@v.......$hmtx...........@loca.U.....8...Dmaxp........... name.P+........post...<...... .........b~1_.<...........<......r......Aa...................Q....Aa....Aa.........................~...................................................3..............................MS .@.......(...Q................. ...........d...........0...J.......8.......>..........+a..#...,................................................/...K.......z...............N......*...!...-...+........z.......h..%^..3...&j..+...+%..'R..+..."....................k......$A...,.......g...&...=.......X..&........*......&....B..(B...............#.......j...............+...P...5...@...)..........#...)Q...............*...{.. ....?..'...#....N...7......<...;>.............. ]...........5......#....s.......$.......$.......^..................+...>....H.......%...7.......6.......O...V...........K......"........c...N......!...............$...&...*p..
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:ASCII text, with very long lines (65536), with no line terminators
                    Category:dropped
                    Size (bytes):322260
                    Entropy (8bit):4.000299760592446
                    Encrypted:false
                    SSDEEP:
                    MD5:CC90D669144261B198DEAD45AA266572
                    SHA1:EF164048A8BC8BD3A015CF63E78BDAC720071305
                    SHA-256:89C701EEFF939A44F28921FD85365ECD87041935DCD0FE0BAF04957DA12C9899
                    SHA-512:16F8A8A6DCBAEAEFB88C7CFF910BCCC71B76A723CF808B810F500E28E543112C2FAE2491D4D209569BD810490EDFF564A2B084709B02963BCAF6FDF1AEEC59AC
                    Malicious:false
                    Reputation:unknown
                    Preview:51253fe60063c31af0d295afb42228b0:v2:2:1:1590:2:8479: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
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:ASCII text, with no line terminators
                    Category:dropped
                    Size (bytes):10
                    Entropy (8bit):2.6464393446710157
                    Encrypted:false
                    SSDEEP:
                    MD5:53F173F781C1E1A003896545FDDBB10A
                    SHA1:E8729D8C5514CADD2DAD1109E66664751B946B35
                    SHA-256:795F75B14F6EC3893F794B11957FD19260628D2067B8F277D70CF7CC76D46C01
                    SHA-512:D643C8A4A9B051A1B5351575A3202C18A2C492EDC7B62D08B061336DE47DC4F0CA43CB6734277F8144CE6EB723886905FFBEF7DA8D4DF13B9ED74D7AB90F0351
                    Malicious:false
                    Reputation:unknown
                    Preview:1733322680
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):181859
                    Entropy (8bit):5.295303530475348
                    Encrypted:false
                    SSDEEP:
                    MD5:77B8BE7953657082D87AEA3406C80978
                    SHA1:2A6D31ABF45E8E456C9AAE54C67BECA00DCEDB97
                    SHA-256:C05598BD9668929B2A7B9D39F9515C97ED7728332B1475FFD57D1A84D0542E40
                    SHA-512:3DB052BFB1ADE472D920D5CA37E36560D3EFBC5B1B8404E8DCB0BD246DBD0C9822FE4EC221D4C29FDD1B4FC89339B2104C4B67445F96731B38352E9B05B0F155
                    Malicious:false
                    Reputation:unknown
                    Preview:<?xml version="1.0" encoding="utf-8"?>..<o:OfficeConfig xmlns:o="urn:schemas-microsoft-com:office:office">.. <o:services o:GenerationTime="2024-12-04T14:31:15">.. Build: 16.0.18312.40138-->.. <o:default>.. <o:ticket o:headerName="Authorization" o:headerValue="{}" />.. </o:default>.. <o:service o:name="Research">.. <o:url>https://word-edit.officeapps.live.com/we/rrdiscovery.ashx</o:url>.. </o:service>.. <o:service o:name="ORedir">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ORedirSSL">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ClViewClientHelpId" o:authentication="1">.. <o:url>https://[MAX.BaseHost]/client/results</o:url>.. <o:ticket o:policy="MBI_SSL_SHORT" o:idprovider="1" o:target="[MAX.AuthHost]" o:headerValue="Passport1.4 from-PP='{}&amp;p='" />.. <o:ticket o:idprovider="3" o:headerValue="Bearer {}" o:resourceId="[
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:SQLite 3.x database, last written using SQLite version 3023002, writer version 2, read version 2, file counter 2, database pages 1, cookie 0, schema 0, largest root page 1, unknown 0 encoding, version-valid-for 2
                    Category:dropped
                    Size (bytes):4096
                    Entropy (8bit):0.09216609452072291
                    Encrypted:false
                    SSDEEP:
                    MD5:F138A66469C10D5761C6CBB36F2163C3
                    SHA1:EEA136206474280549586923B7A4A3C6D5DB1E25
                    SHA-256:C712D6C7A60F170A0C6C5EC768D962C58B1F59A2D417E98C7C528A037C427AB6
                    SHA-512:9D25F943B6137DD2981EE75D57BAF3A9E0EE27EEA2DF19591D580F02EC8520D837B8E419A8B1EB7197614A3C6D8793C56EBC848C38295ADA23C31273DAA302D9
                    Malicious:false
                    Reputation:unknown
                    Preview:SQLite format 3......@ .......................................................................... .....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:SQLite Rollback Journal
                    Category:dropped
                    Size (bytes):4616
                    Entropy (8bit):0.13214265071536652
                    Encrypted:false
                    SSDEEP:
                    MD5:EC4DE42A0C02DA7B31A78F921C4D9594
                    SHA1:2E71C7F5F8C1A81DBC70EB240012B0FC8CEC8B4D
                    SHA-256:881E31D82B414957BD2DBDD839143E4794E2C6599FD3E746BB9A72DDE9A94971
                    SHA-512:8BBAF982230DD79AA871A2F4097BF2C6C414A8FB2F7D0C768BC77D6333CEF270A5DDFBD080C644E837724CE9F789096E9431796D48A056E219FC2A0297B07983
                    Malicious:false
                    Reputation:unknown
                    Preview:.... .c.......N.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................SQLite format 3......@ .......................................................................... .................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):32768
                    Entropy (8bit):0.04482848510499482
                    Encrypted:false
                    SSDEEP:
                    MD5:34FAD435847919C6754D5945D62FE0AD
                    SHA1:D346D82EB663AF564F038705C7B724F6B275C3A7
                    SHA-256:47E33D81638EC717950F2CD5D5627C715EE0ECFBD082FDF812FEBCC4A06F79F0
                    SHA-512:C3908AE929615F4C17D351B527213BAFD34617F45A22BBA950E06FED5A4BD8D5EBACA442ABB31D69AD401330EB63B363191F746C6147D0C9835FAE492A4588A4
                    Malicious:false
                    Reputation:unknown
                    Preview:..-......................lP `......]-......;.u..-......................lP `......]-......;.u........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:SQLite Write-Ahead Log, version 3007000
                    Category:dropped
                    Size (bytes):45352
                    Entropy (8bit):0.39443299411092825
                    Encrypted:false
                    SSDEEP:
                    MD5:978804EC60730AACEBEC2D61987F3313
                    SHA1:279333A2211C8B05D7D02616EEAA5FB66C9DC969
                    SHA-256:3BB2D458EAFDC44F55FE33D10A2F75CF7C45347DE9A6FE4D679E197EA55EF9D3
                    SHA-512:F0207E8C7A0B9297FC663C2A4371801F4DBFCEF617152B67FCBEAB26A21A2B433073F56AA8391806EFCE45E7A6F8058E3AB330B699DB6A28A45A5E6F2D5A29F2
                    Malicious:false
                    Reputation:unknown
                    Preview:7....-.............]-.[...!)...........]-.8......SQLite format 3......@ .......................................................................... .............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):2278
                    Entropy (8bit):3.84881144380561
                    Encrypted:false
                    SSDEEP:
                    MD5:E4044FDE31DEDB6F9EBF720E1B6724AE
                    SHA1:345ECC9A96DEFC1C4D1CCE843774B1B60EB06A19
                    SHA-256:F91B450CD0BD153C54FA2E06B3911C9442A062AF22CCADB1C8E5C20378710EFA
                    SHA-512:F721B56124C83D470068DFC0D9189F4B87636F9B310F8B9BEAEC390D04949899655055D1FD452C2BF60DA8D2803E3ED03F229A4C2184C55F763466524B6A556F
                    Malicious:false
                    Reputation:unknown
                    Preview:{.".T.B.D.a.t.a.S.t.o.r.e.O.b.j.e.c.t.".:.{.".H.e.a.d.e.r.".:.{.".O.b.j.e.c.t.T.y.p.e.".:.".T.o.k.e.n.R.e.s.p.o.n.s.e.".,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.a.j.o.r.".:.2.,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.i.n.o.r.".:.1.}.,.".O.b.j.e.c.t.D.a.t.a.".:.{.".S.y.s.t.e.m.D.e.f.i.n.e.d.P.r.o.p.e.r.t.i.e.s.".:.{.".R.e.q.u.e.s.t.I.n.d.e.x.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".C.J.1.m.u.g.S.o.z.s.S.9.x.S.Z./.Q.v.O.c.+.E.J.4.u.2.c.=.".}.,.".E.x.p.i.r.a.t.i.o.n.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".A.D.r.a.j.m.F.G.2.w.E.=.".}.,.".S.t.a.t.u.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".A.A.A.A.A.A.=.=.".}.,.".R.e.s.p.o.n.s.e.B.y.t.e.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.t.r.u.e.,.".V.a.l.u.e.".:.".A.Q.A.A.A.N.C.M.n.d.8.B.F.d.E.R.j.H.o.A.w.E./.C.l.+.s.B.A.A.A.A.V.4.K.q.O.1.
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):2684
                    Entropy (8bit):3.9039710141062547
                    Encrypted:false
                    SSDEEP:
                    MD5:0C2AEAD9F057020CCEB85C29F54E81F0
                    SHA1:ED50F5A3A2534ACCF5FC277AA148E4E0C0EC3FF8
                    SHA-256:3E9DF0A99AE857D612E09E213758AB3C161CEB8283F71BD45DB7A2D5AA2C90D9
                    SHA-512:F280A217E5FB46698C5C288731552B2124764E6D015BEA8938C28C97E04C4885E75343C6171BF7FD727C3CD173B25793A7250FE74BD9865D27ED903E4E635E8E
                    Malicious:false
                    Reputation:unknown
                    Preview:{.".T.B.D.a.t.a.S.t.o.r.e.O.b.j.e.c.t.".:.{.".H.e.a.d.e.r.".:.{.".O.b.j.e.c.t.T.y.p.e.".:.".T.o.k.e.n.R.e.s.p.o.n.s.e.".,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.a.j.o.r.".:.2.,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.i.n.o.r.".:.1.}.,.".O.b.j.e.c.t.D.a.t.a.".:.{.".S.y.s.t.e.m.D.e.f.i.n.e.d.P.r.o.p.e.r.t.i.e.s.".:.{.".R.e.q.u.e.s.t.I.n.d.e.x.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".V.H.X.L.G.R.5.H.j.D.k.3.C.i.F.b.L.a.m.K.N.+.n.c.g.T.0.=.".}.,.".E.x.p.i.r.a.t.i.o.n.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".c.p.c.u.p.i.p.l.3.A.E.=.".}.,.".S.t.a.t.u.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".A.A.A.A.A.A.=.=.".}.,.".R.e.s.p.o.n.s.e.B.y.t.e.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.t.r.u.e.,.".V.a.l.u.e.".:.".A.Q.A.A.A.N.C.M.n.d.8.B.F.d.E.R.j.H.o.A.w.E./.C.l.+.s.B.A.A.A.A.V.4.K.q.O.1.
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):4542
                    Entropy (8bit):4.001985525272684
                    Encrypted:false
                    SSDEEP:
                    MD5:F8C6550227B47AE14B42ADCE4A816329
                    SHA1:D94B64231C0F84327BDF0E2CE0103E53A4584FDA
                    SHA-256:0A5E168432BA254F537C837D2B552B32879B873F24131289AA83049A8FF7FBE9
                    SHA-512:FD40BC257BEB2E14D016F8E5AB69DF17B4065064065B1F89A13C689B425F646E88EF547978DC5C65F00597643CAB04FF66C2D19DD6699D2691C86BB594A6F287
                    Malicious:false
                    Reputation:unknown
                    Preview:{.".T.B.D.a.t.a.S.t.o.r.e.O.b.j.e.c.t.".:.{.".H.e.a.d.e.r.".:.{.".O.b.j.e.c.t.T.y.p.e.".:.".T.o.k.e.n.R.e.s.p.o.n.s.e.".,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.a.j.o.r.".:.2.,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.i.n.o.r.".:.1.}.,.".O.b.j.e.c.t.D.a.t.a.".:.{.".S.y.s.t.e.m.D.e.f.i.n.e.d.P.r.o.p.e.r.t.i.e.s.".:.{.".R.e.q.u.e.s.t.I.n.d.e.x.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".V.q.Y.a.6.3.X.Y.9.b.4.Y.b.C.Z.g.f.0.u.y.E.6.v.n.x.e.w.=.".}.,.".E.x.p.i.r.a.t.i.o.n.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".s.O.O.4.d.F.l.G.2.w.E.=.".}.,.".S.t.a.t.u.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".A.w.A.A.A.A.=.=.".}.,.".R.e.s.p.o.n.s.e.B.y.t.e.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.t.r.u.e.,.".V.a.l.u.e.".:.".A.Q.A.A.A.N.C.M.n.d.8.B.F.d.E.R.j.H.o.A.w.E./.C.l.+.s.B.A.A.A.A.V.4.K.q.O.1.
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:PNG image data, 46 x 46, 8-bit/color RGBA, non-interlaced
                    Category:dropped
                    Size (bytes):523
                    Entropy (8bit):7.372122325972518
                    Encrypted:false
                    SSDEEP:
                    MD5:9AF4E0B18293FA329CD9F9BFAF716C02
                    SHA1:4ADA4852CAFC55256DA37E26DAA4BD350FE417DE
                    SHA-256:3C7D4FA6FC19816C22B48C6B91384F362C039131C11B38294F44B5EE77DAD279
                    SHA-512:C5B9396E9656408F9CAD317527F2E2C5D95E6618C47BDBF27F90C7CF058941219BC68CE60B76885F57A403606EC67DE9EBE5A68F66A5B6124B87CBDBF9D81343
                    Malicious:false
                    Reputation:unknown
                    Preview:.PNG........IHDR.............W.+7....pHYs..!8..!8.E.1`....sRGB.........gAMA......a.....IDATx...M.0.._W..#x.F......lPF......4#...L@60w.H..?.*..H'...y.]......s.$....bD.`.....L.VH.....6..Cm.(.F...~.....~..f.3e*\!..5A.I.q..`A.0..<.F........P..7A"9std.d[....~.q.^..4'.NB..5m..X.6....u4..|Or........{...N..y|..|.S.:.n..WOz."%..,i....T$....\!3V.....b.[..i:.un..N..".."..9...3L.f.0u`..ZRJ87m..)..2...N.2.A.PQd._.I.y...J..8/.....%..&...kK.O=.|.&..w..c.9...d...i.s....M...&<7Mxn..".#>.s}L...*..7O..W..dz....IEND.B`.
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:PNG image data, 55 x 46, 8-bit/color RGBA, non-interlaced
                    Category:dropped
                    Size (bytes):841
                    Entropy (8bit):7.6484413052259335
                    Encrypted:false
                    SSDEEP:
                    MD5:17930BDD2B45EF3C926F6856EB2E2EAE
                    SHA1:43567A4DD6DFDF7EECEEA850D16086D6ACE33824
                    SHA-256:A0C8B5F5F308062EBCD04FB0A5D94B695D1A857E33D873C02DEABAD488A5045F
                    SHA-512:584D0A030712B00E24BA984BFF08D2683764EFE058DA95A149D71C73A18F42B2C7204C243D78C48B5F4ADF446B2A1C6B9F6794ECBCB857A4947EE10D39B7DBFD
                    Malicious:false
                    Reputation:unknown
                    Preview:.PNG........IHDR...7.................pHYs..!8..!8.E.1`....sRGB.........gAMA......a.....IDATx...u.0....._oP<A...7....M&.;A....I&.. t....Np...lK.%......F....D....).R..$I.S..ed[...)..-.C.pC..=By.V......V.O....><h.{}c.0kzB...y..n,\.n.?.....3qp...{.$.@..E.aKU.<.T|...hS..hH...8.:).."{".B.)3V......Xcx..R...G.q..u...R...WP.@.O.[....E.z.6..i..l.Sd..a.M..~..Ol.-.+...L..c..)..]H.vd.e(.C5,....=.3.#S.^...3.. ......7..EjXN..0.V..}`..{.1mJ.J.a.P../d..5L....=]..)I.w..-.MqJ....M.+L..........=r..lA..=.t8.!.f.a....x1...S..iC..c.#....^..Y.O*r..ta.t..>p.......4zNGy..d.2j.....n.n.....A..t..51m.9..#./...K\.;.`q......A.cA.o....A.!...n $(wgB.=.(...S.3..@.o.>DT.q...$...!p..P.(^.-1.bpaJT.}.>..u]...t^2/0<..{."U.7....2>...I.9....#.....s.....~...T.p..*.p.\......en..e..q......../..P...:~....z..?....K..4... .r<7*.....IEND.B`.
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:PNG image data, 25 x 49, 8-bit/color RGBA, non-interlaced
                    Category:dropped
                    Size (bytes):327
                    Entropy (8bit):6.906459346842359
                    Encrypted:false
                    SSDEEP:
                    MD5:BEEED64FF27BC70643D965928738B53F
                    SHA1:58C381163EDFEA8E812FA4AD6071134B6F6F6812
                    SHA-256:BAA61E92FAFA37EA5BE78ADAA8F2DBCC6DD7C9C2335A08FEF1EDC92B0ECC1F97
                    SHA-512:A924BD2945F5246BBBBC291A4F832A96FA672EE6F7D97B66A96FF6F5C2CF389927F3EB61CBB00BB0651EFF00A7E8F4AF68AD6303B5B735CAA07CCFC057699AC4
                    Malicious:false
                    Reputation:unknown
                    Preview:.PNG........IHDR.......1...../..8....pHYs..!8..!8.E.1`....sRGB.........gAMA......a.....IDATx..... .@........n.#t.Wq.]..p.v...yDj.!.8...^r...>..@.|.D.....c.............).2.\......$.+.0..K......#..f...u./....&z!p.h@......|.pVw.B.....P..H..O.|G........4`f..........q..bXX....P..6_7^%*Q.JT..uJr....!6.......}.....IEND.B`.
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:PNG image data, 352 x 108, 8-bit/color RGBA, non-interlaced
                    Category:dropped
                    Size (bytes):5425
                    Entropy (8bit):7.947211950032477
                    Encrypted:false
                    SSDEEP:
                    MD5:CC28555EA8A30162C31B793A02BD9D21
                    SHA1:FBC939BBFD2AB488D392B14BAE8F84B7AFC9FAE9
                    SHA-256:3966C9B479F984F4B4854534C532D07E1D85CA0E11580A30BDC40B50C9926E1F
                    SHA-512:891D31261CCC5BAA9765414231B382D84248D32C15CBBAAAC041F0380DF15843D56815BB88BD9370ACD9A891DC5B02AB998D161413DD66CCECE4FE38641BB566
                    Malicious:false
                    Reputation:unknown
                    Preview:.PNG........IHDR...`...l.....T.h.....pHYs...%...%.IR$.....sRGB.........gAMA......a.....IDATx............8...0..h...'.p.....7...eH.,.x...'.m...D.......c.UR....<:.....}.*.J%.0&H..}9........//`..a.D|.k...8(....k..D.0.cG|.....}^...&.a,.;..Y./.uK..}9...].....<...>..O".oy?..Vm.....&.*G..0}~H!./..........ED.......<@.....S.a..P.[..o.l|....7..@I|S`"lD....A..~.m`.I...a"lD.T....R.@*...o...1...-./k?.N`....D......40.x4&(..&......]./k.Or0rC.....G0..1..n._.y.....%....LG...>r..8....a..3.]..>.p(....Ic..\..C+....UF.d...R.....y......~....E....%..Y.\...`.)#.sA.F......$^....F._;.n.`.|8.Z?0FA...%gR.5......a....W..q..P...>5..H........F..C.w}d...D.........-....a...a$FK......!.7...,.c......Fq.f.C........k......jd..a..h.-.L.}..I..xb.0.B.m....Z...h..;...0...."..U@!n..S..a.d1.1z'...Q....0..,.$...s.z..0......TG.'\.0.c.K...C.Z!G..6.c...`..|...X8.a.CXr6.5.p0..8....l.5...T..q0..e.s.....2g)5.....?...............tp(.v.%...%.y..{..._}..W.~i\D(*l..I.5.'..W...B{n.....`.~.c......Vo
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):12180
                    Entropy (8bit):3.5069793221863863
                    Encrypted:false
                    SSDEEP:
                    MD5:6232AA4E81F6E89AAAE97045D02547F2
                    SHA1:070CC67B1A77A7011EBABB59A0CC067A737FB098
                    SHA-256:D77FF8E1A2B10F06CFF3398A4E6BA7B4120EB31DB467F617039C065F7F4D2A5C
                    SHA-512:B40809FFCCFACA34F8C8634572E3D5F7A9A7152EC3393C20741AD8340873762EDB9325E3F134D75D6DE772D62931251D7B1D12D2F33B8D2226AFD12033C16DD4
                    Malicious:false
                    Reputation:unknown
                    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................2...@...\...."...)...............................................................................................................................................................................................................................................................................................................-D@.M.......BC................d.........dF........d ...*...$..$.If........!v..h.#v....:V.......t.....6......5.......4........4.
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:ASCII text, with very long lines (858), with CRLF line terminators
                    Category:dropped
                    Size (bytes):20971520
                    Entropy (8bit):0.020009622108225128
                    Encrypted:false
                    SSDEEP:
                    MD5:7CFFBECCBA501CABE68A1837F320ADF7
                    SHA1:71E64F017B91B6DD939AB1CB822473250E850797
                    SHA-256:CA9B54E417BBBC068EFE262580DEA1A1FE714D211BD80588D80D0A0AA6B4DA11
                    SHA-512:B67A07B0FB68ACACFBCFCA9E8120E38084E2DE7D9BC58E38C35C73878DD7B0E81516888014A0FF80D37496E7B6025C98F41F3F7B0243C9CF28277AAFE9709316
                    Malicious:false
                    Reputation:unknown
                    Preview:Timestamp.Process.TID.Area.Category.EventID.Level.Message.Correlation..12/04/2024 14:31:12.512.OUTLOOK (0x1AC).0x3DC.Microsoft Outlook.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.System.GracefulExit.GracefulAppExitDesktop","Flags":33777014402039809,"InternalSequenceNumber":17,"Time":"2024-12-04T14:31:12.512Z","Data.PreviousAppMajor":16,"Data.PreviousAppMinor":0,"Data.PreviousAppBuild":16827,"Data.PreviousAppRevision":20130,"Data.PreviousSessionId":"B2D6BA76-715A-4179-AF93-4E4E66E94430","Data.PreviousSessionInitTime":"2024-12-04T14:30:57.386Z","Data.PreviousSessionUninitTime":"2024-12-04T14:31:00.776Z","Data.SessionFlags":2147483652,"Data.InstallMethod":0,"Data.OfficeUILang":1033,"Data.PreviousBuild":"Unknown","Data.EcsETag":"\"\"","Data.ProcessorArchitecture":"x64"}...12/04/2024 14:31:12.544.OUTLOOK (0x1AC).0x1A6C.Microsoft Outlook.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.Telemetry.LoadXmlRules","Flags":33777014401990913,"InternalSequenceNumber":22,"T
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):20971520
                    Entropy (8bit):0.0
                    Encrypted:false
                    SSDEEP:
                    MD5:8F4E33F3DC3E414FF94E5FB6905CBA8C
                    SHA1:9674344C90C2F0646F0B78026E127C9B86E3AD77
                    SHA-256:CD52D81E25F372E6FA4DB2C0DFCEB59862C1969CAB17096DA352B34950C973CC
                    SHA-512:7FB91E868F3923BBD043725818EF3A5D8D08EBF1059A18AC0FE07040D32EEBA517DA11515E6A4AFAEB29BCC5E0F1543BA2C595B0FE8E6167DDC5E6793EDEF5BB
                    Malicious:false
                    Reputation:unknown
                    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:data
                    Category:modified
                    Size (bytes):204800
                    Entropy (8bit):4.8674246830562184
                    Encrypted:false
                    SSDEEP:
                    MD5:56FB6F6469559B3215755AA049B8364F
                    SHA1:51F5C69B32813E16B6F785481C1B6F5F961EACE7
                    SHA-256:4C91B41AE4EEDCC3326BE4ABF83A11562574154C4F5D60E5A4AADFAC6D506C73
                    SHA-512:ADB44097A6A10569A91ADABB8ED547D0AEB0FA899CDCB669D7FB4278FAA19EAC080381B2B6AB0B01E1C781792DB8366098E179BEA9D3706E1496F565851002F7
                    Malicious:false
                    Reputation:unknown
                    Preview:............................................................................\...........Q..*YF..................eJ..............Zb..2...................................,...@.t.z.r.e.s...d.l.l.,.-.1.1.2.......................................................@.t.z.r.e.s...d.l.l.,.-.1.1.1...........................................................@.!`.Y..........Q..*YF..........v.2._.O.U.T.L.O.O.K.:.1.a.c.:.6.0.7.3.a.0.4.9.6.d.3.2.4.b.5.7.b.d.4.0.2.a.7.b.3.d.8.a.2.8.5.b...C.:.\.U.s.e.r.s.\.c.a.l.i.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.O.u.t.l.o.o.k. .L.o.g.g.i.n.g.\.O.U.T.L.O.O.K._.1.6._.0._.1.6.8.2.7._.2.0.1.3.0.-.2.0.2.4.1.2.0.4.T.0.9.3.1.1.2.0.3.0.5.-.4.2.8...e.t.l...........P.P.........Q..*YF..........................................................................................................................................................................................................................................................................................................
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):30
                    Entropy (8bit):1.2389205950315936
                    Encrypted:false
                    SSDEEP:
                    MD5:D6462F6656EF7490171173FB76F6BAC9
                    SHA1:E065EDEA428AC53C83BBF2DFF0DFF737ADB81458
                    SHA-256:E30BCA10C99DE96F2DC15A01CD0F58A572CBDCD324BEBDD3068427A3B95140C0
                    SHA-512:544788771EE77F6FDFD7984C324456849E6C5FE9FF6868A10B562165E43EA326F5039DB56EC6F21CA708CD9DCD9BF75EA4CAE59687D7C4CFD9EC6126A882FA7A
                    Malicious:false
                    Reputation:unknown
                    Preview:..............................
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:Composite Document File V2 Document, Cannot read section info
                    Category:dropped
                    Size (bytes):16384
                    Entropy (8bit):0.6691669561247716
                    Encrypted:false
                    SSDEEP:
                    MD5:48EBFE6B7D0A65701B387C8FD1FAA2DB
                    SHA1:28D556FA89FE5EF0EC9C72D228931B69DADDC292
                    SHA-256:24AC286DBE85F734DEC1F991A8BFC75185E90FBF0E32D8A4615CDED1B23ABE23
                    SHA-512:CDBECD8DA9D66577CDD39FE338B6BF372FBB9EAF9ADB41AEB9795667F86BE395351250C24F9B9FCA57CD0AA7D8E9DE6C280838BBED370E5CC337022CE5CC6B5B
                    Malicious:false
                    Reputation:unknown
                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Dec 4 13:32:22 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2673
                    Entropy (8bit):3.9826349939307772
                    Encrypted:false
                    SSDEEP:
                    MD5:ECB8B7FB245ECDC5703EFB7F6CA82050
                    SHA1:18C213AFDD2C6091F4E73E08B0E993E8D59691EF
                    SHA-256:7635E27AEFB64557091509B3FAF9CB63C523CBF4DA598863D0E0786A881B4478
                    SHA-512:FE4B3F7F03D7D6513AF4871D56D0167D839E97293A5D62FCD7D922B839CA998526AD9EC1DC27AAA8E2413ABD944D2EA83FC26E9FFC7250A3C2CCD161E67356D3
                    Malicious:false
                    Reputation:unknown
                    Preview:L..................F.@.. ...$+.,...._,.TYF..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.Y.s....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Y.t....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Y.t....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Y.t..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Y.t...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........2*......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Dec 4 13:32:22 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2675
                    Entropy (8bit):3.999252565043908
                    Encrypted:false
                    SSDEEP:
                    MD5:0C31E9ACC38C2BF141A7C19985348789
                    SHA1:059E6784FA7275371B11C24A5B4BD72F6B8E8E28
                    SHA-256:42FCE05DF944F7ED0F3E584E7B91C02B600A1F5D1B13E9CE3FB4016E97D2EAA5
                    SHA-512:7A22CC021EA9A92536B3AB9EEF8DED2AF03069FD690E044EB4DC684C922893BB5B52FA0069851D47B4B34D81F1753D1FF966E70256F946AC2C10C682819E2EA0
                    Malicious:false
                    Reputation:unknown
                    Preview:L..................F.@.. ...$+.,.....M.TYF..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.Y.s....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Y.t....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Y.t....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Y.t..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Y.t...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........2*......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2689
                    Entropy (8bit):4.010083334538397
                    Encrypted:false
                    SSDEEP:
                    MD5:ADA551FD9ED8DDE794B686AF9C9E56FA
                    SHA1:2C1A95801EB115349293DD533DB90A9607DAFF13
                    SHA-256:65FE3D5945B3875A8A1FE8943CC1E7235A863BC19AB3D96AD2C38F55FC69037F
                    SHA-512:DBA81E4C333FE2D388EA2AD1865AD02069C3388590945DEBC6CB5183CAFB771CA0D4715D143C8E27E700A9101D508B67E237BD89A58FCEAA8E5E286D77B8E171
                    Malicious:false
                    Reputation:unknown
                    Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.Y.s....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Y.t....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Y.t....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Y.t..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........2*......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Dec 4 13:32:22 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2677
                    Entropy (8bit):3.994482027113372
                    Encrypted:false
                    SSDEEP:
                    MD5:7EDC0E36228D66CC0D45AD703D57B869
                    SHA1:983A23F48FFDB5D1E1145453A582E13702698921
                    SHA-256:99BD3E527DA2A79EC85C94CC982B07974850D8F6240BD4412029BED16F5867FE
                    SHA-512:392A4D0D1D18A1067131DECEE28615ECBC7587BCBA92B3B15C07AB474E856AE530E87322A5211B644FB997CA60565456724274DCB5D01CD0792A0201AB94E8A8
                    Malicious:false
                    Reputation:unknown
                    Preview:L..................F.@.. ...$+.,.....p.TYF..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.Y.s....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Y.t....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Y.t....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Y.t..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Y.t...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........2*......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Dec 4 13:32:22 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2677
                    Entropy (8bit):3.9861840890013216
                    Encrypted:false
                    SSDEEP:
                    MD5:B2B3ECEBA47874679C8A97D84CBA248F
                    SHA1:7A7EB8B33075B66BBD5979B367CFB150ADE4655C
                    SHA-256:3E2FBE6823C4FFF5BEAA320E9D5382F0883DCB482CA96E9852C31A70CA123F6A
                    SHA-512:E05079836286023B68CBAF6D4593E266747E36417B3173139FA63DB1C0B2C8D2CFE7BBCE5DCC9D367001E1F882F3C1EF75726A0FC92304092D1BA3661830BC8F
                    Malicious:false
                    Reputation:unknown
                    Preview:L..................F.@.. ...$+.,.......TYF..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.Y.s....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Y.t....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Y.t....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Y.t..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Y.t...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........2*......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Dec 4 13:32:22 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2679
                    Entropy (8bit):3.994518150830556
                    Encrypted:false
                    SSDEEP:
                    MD5:B151B56692CCBE8382D41B5010968113
                    SHA1:467A29713EA60748D5A80E1462F43BD37E698E5B
                    SHA-256:2066FBC41AB18CC00DAAAB72EDC4513C42E3EFA5CEC82F8B718405A8F3EBBFE5
                    SHA-512:5C4F4F40AE0EEEF800B927147069B921E39DBE56492B355CC59279F8B2638760B9552A06C7375F4469A4D9E6630D7EF6B15B63B5D76FE9D90D0AC4370F744190
                    Malicious:false
                    Reputation:unknown
                    Preview:L..................F.@.. ...$+.,.....6.TYF..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.Y.s....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Y.t....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Y.t....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Y.t..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Y.t...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........2*......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:Microsoft Outlook email folder (>=2003)
                    Category:dropped
                    Size (bytes):271360
                    Entropy (8bit):3.4954196856184208
                    Encrypted:false
                    SSDEEP:
                    MD5:16C7FC2D8B6484DBC3E4F23BCF6A864B
                    SHA1:F5AE6DCE01B4C028C7346C2BA926069C9A9F7E00
                    SHA-256:96EE78B616C83EC9884DC9F3A88BD061BE971F18CEB547C0CB0B85584D21B263
                    SHA-512:FF6295C7AF45126C035980BB89B2659251FCE89CBFF3A259E1F7C64C6CA79BA211A547B83A937CD5470AF19524047F1005EC5E1DE4BE8DB47B9AC213B09DB427
                    Malicious:false
                    Reputation:unknown
                    Preview:!BDN6u..SM......\...............?.......l................@...........@...@...................................@...........................................................................$.......D......@...............>........(......;.....................................................................................................................................................................................................................................................................................................O=........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):131072
                    Entropy (8bit):4.680456384862076
                    Encrypted:false
                    SSDEEP:
                    MD5:AA83C67CC6079C2DF7B62262DA5C5090
                    SHA1:2D734860D4568CA51BF9C23D514D11C772D635E6
                    SHA-256:24E4BA2E968BF4A2751372E7A97FB1CAF140ABCAB4FD7D3F35B65D55F2EA1078
                    SHA-512:D82E5B613A0D31DF84A43B2784C7EB0F03A6DC98F3CC162F19A96244069DF004E9ACC275BDF743B4E91C4859AF0356E1C95EEA557277D8DF4DF5DAE6460D61C7
                    Malicious:false
                    Reputation:unknown
                    Preview:e..KC...j...........b..*YF....................#.!BDN6u..SM......\...............?.......l................@...........@...@...................................@...........................................................................$.......D......@...............>........(......;.....................................................................................................................................................................................................................................................................................................O=....b..*YF.......B............#.........................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with no line terminators
                    Category:downloaded
                    Size (bytes):76
                    Entropy (8bit):4.647286191183791
                    Encrypted:false
                    SSDEEP:
                    MD5:C107AACFAB53764186B60BAB99DE8789
                    SHA1:792443024CB760218FF7FA6C3D2E20642DD2D84D
                    SHA-256:225D0CDD918A83B718B3CEA6E1070D9F269B299D51F912DC93B5A2E48E9DAD6D
                    SHA-512:C1EAFDEF10084130CDBAA4C8916C1493B923F522917955796C0B2A3D5DCEB7041DE6AC63A25874B5B60C5A96D1AB76A9574205EEEA74E518BDC005FEEEE478B4
                    Malicious:false
                    Reputation:unknown
                    URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISFwms9ojd1ndNjhIFDZTITUMSBQ36z_YF?alt=proto
                    Preview:CjYKEQ2UyE1DGgQICRgBGgQIVhgCCiEN+s/2BRoECEsYAioUCApSEAoGIUAuIyokEAEY/////w8=
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (27615), with no line terminators
                    Category:downloaded
                    Size (bytes):27615
                    Entropy (8bit):5.310135227905369
                    Encrypted:false
                    SSDEEP:
                    MD5:7B92ABF66B19B9EB69250A6D06A8DF26
                    SHA1:7F9D6E3895DE0D3F09AB86E22DBE77C5AEE1ACA2
                    SHA-256:51A2CBF344BB686681A45D1278A018BEBBAD7DA1DFD62272C79883B2174F6C42
                    SHA-512:59D1EC38992E9CF6E78E5792F97F755ACAEE267B9BDEAD3BA784FC16E2DA3CFB3083574C61F2BB18C33B325E1B01B71D209660D37FDF7A4264E59C42A051D55F
                    Malicious:false
                    Reputation:unknown
                    URL:https://app.raisetech.io/_next/static/css/20b45c7eeeade655.css
                    Preview:.Breadcrumb_breadcrumb__fGdIm{display:flex;align-items:center;font-size:1.1rem;padding:0;gap:0!important;height:30px;flex-wrap:wrap;align-content:center}.Breadcrumb_breadcrumb__fGdIm a,.Breadcrumb_breadcrumb__fGdIm div,.Breadcrumb_breadcrumb__fGdIm svg{display:inline-block;vertical-align:middle;color:#595959!important}.Breadcrumb_breadcrumb__fGdIm a:focus,.Breadcrumb_breadcrumb__fGdIm a:hover{color:#084243!important}.Breadcrumb_breadcrumb__fGdIm svg{position:relative;top:-1px;margin:0 4px;transform:scaleY(.7)}@media(min-width:768px){.Breadcrumb_breadcrumb__fGdIm{height:30px}}.ButtonNew_button__VEEL8{display:inline-block;transition:all .1s ease-in-out}.ButtonNew_button__VEEL8.ButtonNew_full-width__oOBE6{width:100%}.ButtonNew_button__VEEL8.ButtonNew_align-right__sM9Jf{float:right}.ButtonNew_button__VEEL8.ButtonNew_centred__eZgf3{display:flex;align-items:center}.ButtonNew_button__VEEL8.ButtonNew_primary___PjcD.ButtonNew_loading___Vs3i,.ButtonNew_button__VEEL8.ButtonNew_quarternary__UbgHs.
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (24313), with no line terminators
                    Category:dropped
                    Size (bytes):24313
                    Entropy (8bit):5.18101584459881
                    Encrypted:false
                    SSDEEP:
                    MD5:E0D1522B835ABA9CCA8F4F46B71699E7
                    SHA1:6607E88C0CF9D58DC30F3A86C072AAA68DD2080B
                    SHA-256:2965358595F9D290C5E2081F7DC548BF515D844F5ED8771BAF25B4A2ADFF8D68
                    SHA-512:A43C5E6B2AD5A97663BF0168A9F468A42D6AF5D44702AB44306B600059AB24399DC8FEF43FEBEC7CDC6C1DFF9E8F4FBC6E5C10687FE319B3F7CF8C3DFD5F3D34
                    Malicious:false
                    Reputation:unknown
                    Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[7583],{58992:function(e,t,o){var n,r,l;l={canUseDOM:r=!!("undefined"!=typeof window&&window.document&&window.document.createElement),canUseWorkers:"undefined"!=typeof Worker,canUseEventListeners:r&&!!(window.addEventListener||window.attachEvent),canUseViewport:r&&!!window.screen},void 0!==(n=(function(){return l}).call(t,o,t,e))&&(e.exports=n)},30075:function(e,t,o){"use strict";function n(){var e=this.constructor.getDerivedStateFromProps(this.props,this.state);null!=e&&this.setState(e)}function r(e){this.setState((function(t){var o=this.constructor.getDerivedStateFromProps(e,t);return null!=o?o:null}).bind(this))}function l(e,t){try{var o=this.props,n=this.state;this.props=e,this.state=t,this.__reactInternalSnapshotFlag=!0,this.__reactInternalSnapshot=this.getSnapshotBeforeUpdate(o,n)}finally{this.props=o,this.state=n}}function a(e){var t=e.prototype;if(!t||!t.isReactComponent)throw Error("Can only polyfill class components");if
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (19663), with no line terminators
                    Category:downloaded
                    Size (bytes):19663
                    Entropy (8bit):5.0605237248807695
                    Encrypted:false
                    SSDEEP:
                    MD5:7DDA863652B4197AEFAAB026F909657D
                    SHA1:7FBEAFDB3D353F31E6BF13A8BF25023E4D170D37
                    SHA-256:8962164A328A195017AD6F0465A71829E89EE23E0C13C384C7220D6E67A6B255
                    SHA-512:B2E0329C2906B4B3C5F9F22039B5279835715DBBFC33EA6CE3BDF5736EB1EF708672DE44788C7983EA2D0C1DC8B683C15C28B33E16B963C2744C10AA3DAF0EF2
                    Malicious:false
                    Reputation:unknown
                    URL:https://app.raisetech.io/_next/static/chunks/6164-ce458d196dbf69e7.js
                    Preview:"use strict";(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[6164],{96164:function(e,r,o){o.d(r,{m6:function(){return U}});let t=e=>{let r=a(e),{conflictingClassGroups:o,conflictingClassGroupModifiers:t}=e;return{getClassGroupId:e=>{let o=e.split("-");return""===o[0]&&1!==o.length&&o.shift(),n(o,r)||s(e)},getConflictingClassGroupIds:(e,r)=>{let n=o[e]||[];return r&&t[e]?[...n,...t[e]]:n}}},n=(e,r)=>{if(0===e.length)return r.classGroupId;let o=e[0],t=r.nextPart.get(o),l=t?n(e.slice(1),t):void 0;if(l)return l;if(0===r.validators.length)return;let s=e.join("-");return r.validators.find(({validator:e})=>e(s))?.classGroupId},l=/^\[(.+)\]$/,s=e=>{if(l.test(e)){let r=l.exec(e)[1],o=r?.substring(0,r.indexOf(":"));if(o)return"arbitrary.."+o}},a=e=>{let{theme:r,prefix:o}=e,t={nextPart:new Map,validators:[]};return p(Object.entries(e.classGroups),o).forEach(([e,o])=>{i(o,t,e,r)}),t},i=(e,r,o,t)=>{e.forEach(e=>{if("string"==typeof e){(""===e?r:d(r,e)).classGroupId=o;return}if("function"==
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (65471)
                    Category:downloaded
                    Size (bytes):102878
                    Entropy (8bit):5.198094934573256
                    Encrypted:false
                    SSDEEP:
                    MD5:701E72ED89C7B3112CDDEC3F2EFFED92
                    SHA1:A7204D97AB9DAA6BCC43BE38EF1E9B531FFDB6B6
                    SHA-256:75DB093F3AE721B7C642408BCB671D007FCE19D110CF79A6928CD902D49420B6
                    SHA-512:1F0F2DA12BAEECAE2742B7193023DD3C85650FF3A1DC3EC3135814DC50CDBC9FF5F219DB03D3FCC7B18765F07F93C99242D738D5C139E8F34A5A8157454F30FA
                    Malicious:false
                    Reputation:unknown
                    URL:https://app.raisetech.io/_next/static/css/bb31a75961d76c29.css
                    Preview:/*.! tailwindcss v3.4.10 | MIT License | https://tailwindcss.com.*/*,:after,:before{box-sizing:border-box;border:0 solid #e5e7eb}:after,:before{--tw-content:""}:host,html{line-height:1.5;-webkit-text-size-adjust:100%;tab-size:4;font-family:Roboto,ui-sans-serif,system-ui,-apple-system,BlinkMacSystemFont,Segoe UI,Raleway,Helvetica Neue,Arial,Noto Sans,sans-serif,Apple Color Emoji,Segoe UI Emoji,Segoe UI Symbol,Noto Color Emoji;font-feature-settings:normal;font-variation-settings:normal;-webkit-tap-highlight-color:transparent}body{margin:0;line-height:inherit}hr{height:0;color:inherit;border-top-width:1px}abbr:where([title]){-webkit-text-decoration:underline dotted;text-decoration:underline dotted}h1,h2,h3,h4,h5,h6{font-size:inherit;font-weight:inherit}a{color:inherit;text-decoration:inherit}b,strong{font-weight:bolder}code,kbd,pre,samp{font-family:ui-monospace,SFMono-Regular,Menlo,Monaco,Consolas,Liberation Mono,Courier New,monospace;font-feature-settings:normal;font-variation-settings:n
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:TrueType Font data, 18 tables, 1st "GDEF", 20 names, Microsoft, language 0x409, Copyright 2010 The Raleway Project Authors (impallari@gmail.com), with Reserved Font Name "Ralew
                    Category:downloaded
                    Size (bytes):163388
                    Entropy (8bit):6.368877296768115
                    Encrypted:false
                    SSDEEP:
                    MD5:75B4247FDD3B97D0E3B8E07B115673C2
                    SHA1:A31C64DB393AD78109933B35C69E0D45BA3B61B6
                    SHA-256:F6EAEB48224229BF83B2B8972647947F137FB4AE1F87DD0AF54D68356D2BB678
                    SHA-512:B9018CB9BC184F70DA7E0F5B5727A10ADF07E9F2057BEB4BD39880004591B2A2D12B1F92EDD657C48AC2E1BC3C7FEC9A2EA5F8BE20C2E93C152107B134B880DF
                    Malicious:false
                    Reputation:unknown
                    URL:https://app.raisetech.io/_next/static/media/Raleway-Regular.62b38445.ttf
                    Preview:........... GDEF.T.0.......LGPOS..&=...$....GSUB7..I..o.....OS/2..g8..7....`STAT.x.'..}....Hcmap...U..7....Vcvt ......S.....fpgm...Z..BT....gasp............glyf...\...,....head.a....&....6hhea......7x...$hmtx$.....&.....loca=......<...Xmaxp........... name.}....T....0postYY....]@..#.prepO(....Q........2..............e.#!"&5.43!2...4#!"....3!2..7...!.@......4.......a...i4.............8...........i................D@'...................................r..r.++2.9/33.39....9..<<..<<01A3.#'!.#....5;.'J\..[K......:....._.............&................../.01...........&................../.01...........&....................././..01.....W.....&.....'..................../.01...........&....................././..01...........&...............#....././..01...........&....................././..01...........&................../.01...........&.........v......@...././..01.....W.....&.....'..................../.01...........&................@...././..01...........&................@...././..01...........&
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (2530)
                    Category:downloaded
                    Size (bytes):220638
                    Entropy (8bit):5.539236021235774
                    Encrypted:false
                    SSDEEP:
                    MD5:85DAD32B14598D8153506DC08B47057F
                    SHA1:13D51DA89E5E2D2A140415F1BECD45F4A8EBA852
                    SHA-256:11F94A8F7B4AEDB4424A80B65B42FC4A9988310DD114C7041FF44E90EDA6ADD4
                    SHA-512:52F2F8855FCB5C7C72E934A79AE78A07120BE2B719474209BBE6EBB29DEC415798F5A6B24A45B0FA6B5228A41783AAACB17E1E83A8397A1BF8B4CA940CCC9FC7
                    Malicious:false
                    Reputation:unknown
                    URL:https://www.googletagmanager.com/gtm.js?id=GTM-P69RPM2
                    Preview:.// Copyright 2012 Google Inc. All rights reserved.. . (function(w,g){w[g]=w[g]||{};. w[g].e=function(s){return eval(s);};})(window,'google_tag_manager');. .(function(){..var data = {."resource": {. "version":"12",. . "macros":[{"function":"__e"},{"function":"__u","vtp_component":"URL","vtp_enableMultiQueryKeys":false,"vtp_enableIgnoreEmptyQueryParam":false},{"function":"__remm","vtp_setDefaultValue":true,"vtp_input":["macro",1],"vtp_fullMatch":false,"vtp_replaceAfterMatch":false,"vtp_defaultValue":"Other","vtp_ignoreCase":true,"vtp_map":["list",["map","key","\/contractor\/","value","Contractor"],["map","key","\/client\/","value","Client"],["map","key","\/agency\/","value","Agency"]]},{"function":"__remm","vtp_setDefaultValue":true,"vtp_input":["macro",1],"vtp_fullMatch":false,"vtp_replaceAfterMatch":false,"vtp_defaultValue":"Other","vtp_ignoreCase":true,"vtp_map":["list",["map","key","transaction\/timesheet","value","Timesheet"],["map","key","\/contract\/","value","Placement"],["ma
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (33663)
                    Category:downloaded
                    Size (bytes):48387
                    Entropy (8bit):4.599903106714434
                    Encrypted:false
                    SSDEEP:
                    MD5:4148F9E9A5F8713062ED2BBCE433C878
                    SHA1:0882729331653F723005366A4AD251B1A0D36130
                    SHA-256:97C7395FA449437479768B422BC296C95837A4706E1A58E511BC54FDC6867BEF
                    SHA-512:95B2C05943FFE7B1AF0F8445DE86E074C05B05DCAA699C3E59B2106B9F2FA69947A98A05804A45739BA4CDC2816ADEA46A619BEEF5C30356C5A120BFF94C17FA
                    Malicious:false
                    Reputation:unknown
                    URL:https://app.raisetech.io/_next/static/css/da3606928efd29e5.css
                    Preview:.e-grid-menu .e-indent:before,.e-treegrid .e-indent:before{content:"\e810"}.e-grid-menu .e-outdent:before,.e-treegrid .e-outdent:before{content:"\e72a"}.e-treegrid .e-treegridcollapse:before,.e-treegrid .e-treegridexpand:before{content:"\e75c"}.e-treegrid .e-toolbar-item .e-expand:before{content:"\e7c9"}.e-treegrid .e-toolbar-item .e-collapse:before{content:"\e80f"}.e-treegrid .e-toolbar-item .e-indent:before{content:"\e810"}.e-treegrid .e-toolbar-item .e-outdent:before{content:"\e72a"}.e-bigger .e-treegrid .e-treegridcollapse,.e-bigger .e-treegrid .e-treegridexpand{font-size:22px;height:22px;width:22px;vertical-align:bottom}.e-bigger .e-treegrid .e-hierarchycheckbox{padding-left:2px}.e-bigger .e-treegrid .e-hierarchycheckbox .e-frame{height:18px;width:18px}.e-bigger .e-treegrid .e-treecell{line-height:22px}.e-bigger .e-treegrid .e-treecolumn-container span{vertical-align:middle}.e-treegrid .e-icons.e-none:before{content:""}.e-treegrid .e-gridheader .e-headercell .e-css.e-hierarchychec
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (28948), with no line terminators
                    Category:downloaded
                    Size (bytes):28948
                    Entropy (8bit):4.750386474271689
                    Encrypted:false
                    SSDEEP:
                    MD5:84A961A1EEB44A9EF22FCA7669A53339
                    SHA1:3FCD4A566B4ADAB79CBA1874C48DF45223138830
                    SHA-256:B5AD208F05838883D18264430B0263AEB99E11586090B68B5E8FD942D6D9A00B
                    SHA-512:2DF5F9A8469CDD389814665FE438D9BE2B21924DA29E1718F1295065CBDB4449B3B0E99A811EB5C18696735C569E05435ED56098D975A3D4D62CBA41FC3C10EA
                    Malicious:false
                    Reputation:unknown
                    URL:https://app.raisetech.io/_next/static/css/bd8e89009428094b.css
                    Preview:.e-badge{background:#f9fafb;border-color:#0000;border-radius:2px;box-shadow:0 0 0 2px #0000;box-sizing:border-box;color:#374151;display:inline-block;font-family:Inter;font-size:10px;font-weight:500;line-height:1;height:18px;overflow:hidden;padding:4px;text-align:center;text-indent:0;vertical-align:middle}.e-badge,.e-badge:hover{text-decoration:none}.e-badge.e-badge-pill{border-radius:10px;padding:4px 10px}.e-badge.e-badge-ghost{line-height:1;padding:3px 10px}.e-badge.e-badge-notification{border-radius:10px;height:18px;line-height:1;min-width:32px;padding:4px 10px;width:auto;font-size:10px;position:absolute;top:-10px;left:100%}.e-badge.e-badge-notification.e-badge-ghost{line-height:1}.e-badge.e-badge-circle{border-radius:10px;height:18px;line-height:1;min-width:0;padding:4px 3px;width:18px}.e-badge.e-badge-circle.e-badge-ghost{line-height:1;padding:3px}.e-badge.e-badge-overlap{position:absolute;top:-10px;transform:translateX(-50%)}.e-badge.e-badge-dot{border-radius:10px;height:10px;line
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (15150), with no line terminators
                    Category:dropped
                    Size (bytes):15150
                    Entropy (8bit):5.563405795837169
                    Encrypted:false
                    SSDEEP:
                    MD5:E9C266123948C1F03625337925E8EBEC
                    SHA1:DF98F8B573D7A99DF5A6C3F57CCE11A8F31704AC
                    SHA-256:05FF1433E4BE292F41AC9905068E972045C8103F45DD98547F9B5A2004C34C2F
                    SHA-512:AD9C2E47181688D6351EF4B219B0F03DCE2129A944175606A67E550FC9F00FA39E454EE3EE5FDE1E9558EED9C4E65135B9C9AF7756C6EA90A78C96D75CB95EA2
                    Malicious:false
                    Reputation:unknown
                    Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[7375,5360,490],{56249:function(){},20490:function(e,t,a){"use strict";a.r(t),a.d(t,{default:function(){return u}});var n=a(57437),s=a(56800),r=a.n(s),l=a(87138),o=a(2265),i=a(96164),c=a(73106),d=a.n(c);function u(e){let{align:t="left",alt:a,className:s,disabled:c,external:u,fullWidth:x,hidden:m,href:f,icon:h=null,iconAlign:p="left",id:_,label:g=null,loading:N,onClick:w,size:j="small",theme:b,type:v="button",variant:y="primary",centred:C=!1,pseudo:k=!1,triggerFocus:$=!1,overrideClass:A="",overrideContentClassName:z="",toolTipText:S="",showToolTipWhenDisabled:B=!1}=e,O=r()(d().button,d()[t&&`align-${t}`],d()[c&&"disabled"],d()[x&&"full-width"],d()[!g&&"icon-only"],d()[N&&"loading"],d()[C&&"centred"],d()[j],d()[b],d()[y],s),E=r()(d().content,d()[p&&`icon-align-${p}`],"!flex flex-row gap-2 justify-center items-center",z),L=(0,n.jsx)("span",{className:E,children:"left"===p?(0,n.jsxs)(n.Fragment,{children:[h||null,g||null]}):(0,n.jsxs)
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:Unicode text, UTF-8 text, with very long lines (30313)
                    Category:dropped
                    Size (bytes):789501
                    Entropy (8bit):5.5894533554720285
                    Encrypted:false
                    SSDEEP:
                    MD5:F1887A15C685B30C5C34A4D6255B010C
                    SHA1:4A2C264B2331BDCC4E1A6574B2508E60344337CB
                    SHA-256:9C82F9BA0E1BC76525CD69684A30FA5A1ADAB09E44B76D9C031E81B53697E583
                    SHA-512:A5057377B3BE57FA84B881E112C401CD9F59A92667201EED7E42A7723F72FCC0FF82420FE891F850808E51DFA4FD82A6716D6E82F00DABA2804D0A0FC3788D3B
                    Malicious:false
                    Reputation:unknown
                    Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[9822],{5290:function(e,t,r){e.exports=r(90876)},90876:function(e,t,r){(function(){var e,n,o,i,a,s,u,l,c,d,f,p,h,y,g,m,v,b,$,w,_,S=[].indexOf;({floor:g,max:v,min:b}=Math),n=r(86543),h=r(50986),l=function(e,t){return t?2*e/t:1},u=function(e,t){var r,n,o,i,a;for([o,i]=[e.length,t.length],r=n=0,a=b(o,i);0<=a?n<a:n>a;r=0<=a?++n:--n){if(e[r]<t[r])return -1;if(e[r]>t[r])return 1}return o-i},p=function(e,t){return Object.prototype.hasOwnProperty.call(e,t)},s=function(e){var t,r;for(t=0,r=e.length;t<r;t++)if(e[t])return!0;return!1},a=class{constructor(e,t="",r="",n=!0){this.isjunk=e,this.autojunk=n,this.a=this.b=null,this.setSeqs(t,r)}setSeqs(e,t){return this.setSeq1(e),this.setSeq2(t)}setSeq1(e){if(e!==this.a)return this.a=e,this.matchingBlocks=this.opcodes=null}setSeq2(e){if(e!==this.b)return this.b=e,this.matchingBlocks=this.opcodes=null,this.fullbcount=null,this._chainB()}_chainB(){var e,t,r,n,o,i,a,s,u,l,c;for(e=this.b,this.b2j=t=new
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (7726)
                    Category:downloaded
                    Size (bytes):340798
                    Entropy (8bit):5.582433907584055
                    Encrypted:false
                    SSDEEP:
                    MD5:CA644D24473BA911A01B2DF7D3CB03BB
                    SHA1:3692C8CFA9A52D5322F2A23FE770C7C2F0C890A6
                    SHA-256:B28FEC7F1BA252A340803DFCD9FC050C9C3FB3282D5A6B5D45A1656E4128F8A9
                    SHA-512:A708AC84E3F73DDB59E5E1D219EA3E792891C49747220B2DF99393D9997EF8B4230CF40813B83B1CBB4FADC676894AC0104195B51CF65DB92AAD38B7BD036766
                    Malicious:false
                    Reputation:unknown
                    URL:https://www.googletagmanager.com/gtag/js?id=G-5VG87N5DG4&l=dataLayer&cx=c&gtm=45He4bk0v9116286462za200
                    Preview:.// Copyright 2012 Google Inc. All rights reserved.. .(function(){..var data = {."resource": {. "version":"1",. . "macros":[{"function":"__e"},{"function":"__c","vtp_value":""},{"function":"__c","vtp_value":0}],. "tags":[{"function":"__ogt_1p_data_v2","priority":14,"vtp_isAutoEnabled":true,"vtp_autoCollectExclusionSelectors":["list",["map","exclusionSelector",""]],"vtp_isEnabled":true,"vtp_cityType":"CSS_SELECTOR","vtp_manualEmailEnabled":false,"vtp_firstNameType":"CSS_SELECTOR","vtp_countryType":"CSS_SELECTOR","vtp_cityValue":"","vtp_emailType":"CSS_SELECTOR","vtp_regionType":"CSS_SELECTOR","vtp_autoEmailEnabled":true,"vtp_postalCodeValue":"","vtp_lastNameValue":"","vtp_phoneType":"CSS_SELECTOR","vtp_phoneValue":"","vtp_streetType":"CSS_SELECTOR","vtp_autoPhoneEnabled":false,"vtp_postalCodeType":"CSS_SELECTOR","vtp_emailValue":"","vtp_firstNameValue":"","vtp_streetValue":"","vtp_lastNameType":"CSS_SELECTOR","vtp_autoAddressEnabled":false,"vtp_regionValue":"","vtp_countryValue":"",
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:Unicode text, UTF-8 text, with very long lines (24852)
                    Category:dropped
                    Size (bytes):48155
                    Entropy (8bit):5.526844138973007
                    Encrypted:false
                    SSDEEP:
                    MD5:E2BABDA1FB2C0F653AA1FDC8949CCAE0
                    SHA1:2ECE7ECC4293D8DFAE4FB43603B211E206EFD44D
                    SHA-256:CD87396228C625E1BE6CD56E5E00F85BFA0020D1577063C304DDA48206BBCF84
                    SHA-512:FFA8F7B353C2068ABBB72FA602932F75BB1D1993F9F624B118B10A4801BF0CBFFF94F2D1317F8C9693ADB2D83FD7F49F8DDBADA5FD10A079AE9C4923BA8AF611
                    Malicious:false
                    Reputation:unknown
                    Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[3185,3257,5360,3196,490,2949,5536],{42480:function(){},58449:function(e,t,a){Promise.resolve().then(a.bind(a,94580))},94580:function(e,t,a){"use strict";a.r(t),a.d(t,{default:function(){return eL}});var s=a(57437);a(92390),a(62501),a(58877);var n=a(50280),i=a(60788),r=a(28720);function l(e){let{children:t}=e;return(0,s.jsx)(s.Fragment,{children:t})}var d=a(56800),o=a.n(d),c=a(37545),u=a(2265);class m extends u.Component{constructor(e){super(e),this.state={hasError:!1}}static getDerivedStateFromError(e){return{hasError:!0}}componentDidCatch(e,t){console.warn(e,t)}render(){return this.state.hasError&&console.warn("Something went wrong."),this.props.children}}var p=a(58110),_=a(49714),f=a(22599),h=a.n(f),g=a(99078),x=a(51046),b=a.n(x),y=a(85360);function v(){return(0,s.jsxs)("footer",{className:"flex flex-col md:flex-row md:gap-1 justify-center items-center text-skin-disabled bg-skin-disabled h-10 ","data-component":"Organisms: Foot
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (27463)
                    Category:downloaded
                    Size (bytes):104788
                    Entropy (8bit):4.560385069520419
                    Encrypted:false
                    SSDEEP:
                    MD5:B9E456A687A9E5D85DCE61146A627770
                    SHA1:9D6135F6AFAFA862F2205F76156FB8A2729E81C7
                    SHA-256:A2317CE19560FC51177C3CEF4D0C03EB696B2E15CAAB3CA23744E13688FD8A75
                    SHA-512:50D82EFF59B7CD1C4A3EDD535DFB19FE4F7923DBF230E89A42719B442EF68CED834AA95CBA03BC8A8B6014C58E5DB717CEC2D4E6AEA5474B020E3464749DD12C
                    Malicious:false
                    Reputation:unknown
                    URL:https://app.raisetech.io/_next/static/css/62fff4a7ce7f8429.css
                    Preview:/*! calendar tailwind theme variables */./*! component icons */.e-calendar .e-header .e-date-icon-prev:before{content:"\e776"}.e-calendar .e-header .e-date-icon-next:before{content:"\e729"}../*! calendar layout */ejs-calendar{display:block}.e-calendar.e-disabled .e-header .e-next,.e-calendar.e-disabled .e-header .e-prev,.e-calendar.e-disabled .e-header .e-title{cursor:default;pointer-events:none;touch-action:none}.e-calendar.e-disabled .e-btn.e-today,.e-calendar.e-disabled .e-content td{pointer-events:none;touch-action:none}.e-bigger.e-small .e-calendar,.e-calendar{-webkit-tap-highlight-color:transparent;border-radius:4px;display:block;overflow:auto;-webkit-user-select:none;user-select:none}.e-bigger.e-small .e-calendar.e-rtl .e-header .e-title,.e-calendar.e-rtl .e-header .e-title{float:right}.e-bigger.e-small .e-calendar.e-rtl .e-header .e-icon-container,.e-calendar.e-rtl .e-header .e-icon-container{float:left}.e-bigger.e-small .e-calendar .e-header,.e-calendar .e-header{background:no
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows icon resource - 1 icon, 32x32 with PNG image data, 32 x 32, 8-bit colormap, non-interlaced, 32 bits/pixel
                    Category:dropped
                    Size (bytes):560
                    Entropy (8bit):7.2401951692376745
                    Encrypted:false
                    SSDEEP:
                    MD5:10F60C3835CF4BD764356830AB418DDD
                    SHA1:107B6B36C9AE263D2E776FF2F00D3902EC4619D3
                    SHA-256:A8F8DDA10596A6DA471336CC9B2104F0A6B5F52DEAD00759E96A7A74D4A13F57
                    SHA-512:250F65BE5AB4A7359BA81077B54BEE230021B591A2F5F87F28F8D183C71F3FCE84817D49290972AD270E2C9E31AE171D69873FAD4BF65B0489C138E79B636CD3
                    Malicious:false
                    Reputation:unknown
                    Preview:...... .... ..........PNG........IHDR... ... .....D.......sRGB...,.....pHYs.................PLTE.BC#WX......}..8gg.FG1bb.........Qzz.CD...<jk...Ano'YZ4de............'Z[......$XY/`aBoo"VW6ef_...GH.JK......KL...)[\[.....z..GssDpqe..........GHLvv...................u..@mm.LM......Rz{....RS.CD.......NO...;ij.PQ.......MN\...KLZ...PQ........IDATx......0.......@..)......C..C..}Jf.$..B.......b.....;......4......A..8..P...".B..P._.g...".Hx.d.T. C....,.3...|.wP$.w(.+.......i.u.....:.....h<...=j.......X......y..V.e.......p......2.....b...v......IEND.B`.
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (65536), with no line terminators
                    Category:dropped
                    Size (bytes):172834
                    Entropy (8bit):5.252467311060715
                    Encrypted:false
                    SSDEEP:
                    MD5:A7B1F8EDB3A07966DB70F6240AAD77F1
                    SHA1:2667E1E0AA78D921391A7564B51EA023A5E723FB
                    SHA-256:DA5AAE89949F6C8FA05F88F84D6E0948C2CBFC3E5286AC327605A91725EB4F2F
                    SHA-512:779F9CE6770516FAA65645F5196FFF3BE225683ED8CA9B94496CA2E1E0C14927C3390280EC34846F279A89FFE7BC387FA3B54A5E4CA27D9810A8EABE810676EB
                    Malicious:false
                    Reputation:unknown
                    Preview:"use strict";(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[2971],{84417:function(e,t,n){var r,l=n(2265),a=n(85689),o={usingClientEntryPoint:!1,Events:null,Dispatcher:{current:null}};function i(e){var t="https://react.dev/errors/"+e;if(1<arguments.length){t+="?args[]="+encodeURIComponent(arguments[1]);for(var n=2;n<arguments.length;n++)t+="&args[]="+encodeURIComponent(arguments[n])}return"Minified React error #"+e+"; visit "+t+" for the full message or use the non-minified dev environment for full errors and additional helpful warnings."}var u=Object.assign,s=l.__SECRET_INTERNALS_DO_NOT_USE_OR_YOU_WILL_BE_FIRED,c=s.ReactCurrentDispatcher,f={pending:!1,data:null,method:null,action:null},d=[],p=-1;function m(e){return{current:e}}function h(e){0>p||(e.current=d[p],d[p]=null,p--)}function g(e,t){d[++p]=e.current,e.current=t}var y=Symbol.for("react.element"),v=Symbol.for("react.portal"),b=Symbol.for("react.fragment"),k=Symbol.for("react.strict_mode"),w=Symbol.for("react.profiler")
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:Web Open Font Format (Version 2), TrueType, length 37712, version 1.0
                    Category:downloaded
                    Size (bytes):37712
                    Entropy (8bit):7.994543267633907
                    Encrypted:true
                    SSDEEP:
                    MD5:F6E3B6A90D26EC4B40E07DEBE98561E4
                    SHA1:E0BB2D3D4059F81709411063F1FB15680413415A
                    SHA-256:3B3463822AFDD3460423267D05D73D9D67027959A67C5679C4D8289E8DA85448
                    SHA-512:894218F5DB0778CC28A2F857003EA0646780B3651C65F455FB2631C90723F85AB449FE0C26197C9E10C0837AFE7A7360B8DEB6441D6762DD26E920FCD24A8FC3
                    Malicious:false
                    Reputation:unknown
                    URL:https://app.raisetech.io/_next/static/media/Recoleta-Regular.8fd0ea04.woff2
                    Preview:wOF2.......P....................................?FFTM...D......L.`........p..k..D..6.$.... ..;..j[}......i."Y........E..MA..n....O.K*.1+............._.....{.y.....s^,....H..B.b..(..bL!..SjeafK..,9..J...20r.T.z..%...n.\Fx....\...d.Q.........$.*.,F..t.V......x.e..S./....=.u.v..5.."!.:...L@.).......d....../}...[._.....z.p........q.333Sm.IHBZm.f....9....$$.s.W.?...]j3V..:.{uw.y.p..y..5..^N.4M.w...w...9oU...].......l..j#......_..8.!/.>.".'.0...X.P..[%.*D..P.d..^..cB.pX...I.....$.y.K.s...,:..+X....G4....E.@..$...".B*..=...UL.N.Y*XR.@.p..0.7....j....e...Y..Q.$..C....(......#mb...!.%...(GY.h}y.Yg..!.<...^.....w.$"S...c....3.D.. ........!...@..5r.........ak[]......+..f.....{.o...m<.....?..y..&..(..cn..R!.7{.M...Cx.1..L.D..H..?..)..(.2.kJ..@..)..tl...,..P66.L5z.p.B.....@.h..........m.......(..i....6..R...m.7/...3~-.n....!.z.M..n;).P....=...K...76....qzjyc.F......eB.%E./....vJ..5.5.........:..;..%.V..V......mQ.wqK.Zclx...1i...=.._)..R.@....9.l&
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:Unicode text, UTF-8 text, with very long lines (65398), with no line terminators
                    Category:downloaded
                    Size (bytes):194766
                    Entropy (8bit):5.875554927714731
                    Encrypted:false
                    SSDEEP:
                    MD5:9B8F5885448A178CA156DCA115FD341D
                    SHA1:5C9F350AC8F522247E9127FA1FB97060D8D6CE31
                    SHA-256:74CC2C8B4B87ECEB76EC1EF63740F47827647E9E69A78072C515EAF104117B6C
                    SHA-512:0202E02AFF3C3D257B5927D965E3803D2CF62879E9D29EAE988299D6FAD534AC63CC32D67AB8E097D4476DB3C8065CE6DBED72201EC32296C38A27D997DE8783
                    Malicious:false
                    Reputation:unknown
                    URL:https://app.raisetech.io/_next/static/chunks/788-b7ca71297cbf317f.js
                    Preview:"use strict";(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[788],{60788:function(t,e,i){i.d(e,{tk:function(){return td},fw:function(){return en},XY:function(){return t4},AR:function(){return tw},rt:function(){return ej},FE:function(){return t9},Zz:function(){return t7},wA:function(){return eE},_l:function(){return eQ},bK:function(){return eC},ju:function(){return t8},bi:function(){return tY},Uo:function(){return tT},hv:function(){return g},eC:function(){return tj},sd:function(){return j},nv:function(){return eR},E7:function(){return eV},Zl:function(){return et},Qj:function(){return tu},Z9:function(){return t6},pJ:function(){return id},Xh:function(){return eB},cn:function(){return tk},ti:function(){return z},R3:function(){return tR},Y4:function(){return tH},ep:function(){return iN},s1:function(){return tK},qV:function(){return ts},oq:function(){return tX},MY:function(){return ic},az:function(){return tU},Fs:function(){return d},Ds:function(){return Y},ly:function(){return tg},
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (35185), with no line terminators
                    Category:dropped
                    Size (bytes):35185
                    Entropy (8bit):5.62535053204298
                    Encrypted:false
                    SSDEEP:
                    MD5:9EB1AA5F1EB19714DC7BC358D25433FA
                    SHA1:8269E0B198AABBFD8B3922F6D09F25837D1554C8
                    SHA-256:76664014D33C7E4D18D74ED688D9A05C7C72C84ED9C9E88850DCE871A7379C37
                    SHA-512:81F5ABCEC44EE4267519CFFE96426048A0281E5A34E5B90E144EEFBE7EDC7420E200CD1451C2D228148187BF53329298100ED0EA4271DB27B8537B9B47516AF5
                    Malicious:false
                    Reputation:unknown
                    Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[4359],{54516:function(e,t,r){var n=r(91956).w_;e.exports.Q=function(e){return n({tag:"svg",attr:{viewBox:"0 0 448 512"},child:[{tag:"path",attr:{d:"M0 224h192V32H0v192zM64 96h64v64H64V96zm192-64v192h192V32H256zm128 128h-64V96h64v64zM0 480h192V288H0v192zm64-128h64v64H64v-64zm352-64h32v128h-96v-32h-32v96h-64V288h96v32h64v-32zm0 160h32v32h-32v-32zm-64 0h32v32h-32v-32z"}}]})(e)}},10112:function(e,t,r){var n=r(91956).w_;e.exports.J=function(e){return n({tag:"svg",attr:{version:"1.1",x:"0px",y:"0px",viewBox:"0 0 48 48",enableBackground:"new 0 0 48 48"},child:[{tag:"path",attr:{fill:"#FFC107",d:"M43.611,20.083H42V20H24v8h11.303c-1.649,4.657-6.08,8-11.303,8c-6.627,0-12-5.373-12-12\r\n.c0-6.627,5.373-12,12-12c3.059,0,5.842,1.154,7.961,3.039l5.657-5.657C34.046,6.053,29.268,4,24,4C12.955,4,4,12.955,4,24\r\n.c0,11.045,8.955,20,20,20c11.045,0,20-8.955,20-20C44,22.659,43.862,21.35,43.611,20.083z"}},{tag:"path",attr:{fill:"#FF3D00",d:"M6.306,14
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (65536), with no line terminators
                    Category:dropped
                    Size (bytes):76650
                    Entropy (8bit):5.280156181609176
                    Encrypted:false
                    SSDEEP:
                    MD5:7431229B9F3B73D0EF6EDE71D5777077
                    SHA1:4806E8BF76ABB87102684CC6FE436260B856EEF4
                    SHA-256:7C351D5B44CF9B2E9B6022DB1179AD13F1C6B0E85D722A3405F70AA65263AD09
                    SHA-512:4F712EA049B529FF6ADDBA65BDA30B4F9C69E71D023F67810A7DFC4F7DF3CE7E54A37532512909FF17717B90F955B741C21A0CE0AA4FF30741B755E8F34C371C
                    Malicious:false
                    Reputation:unknown
                    Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[9461],{64379:function(e){var t;t=function(){"use strict";function e(e,t){(null==t||t>e.length)&&(t=e.length);for(var n=0,o=Array(t);n<t;n++)o[n]=e[n];return o}function t(e,t,n){if("function"==typeof e?e===t:e.has(t))return arguments.length<3?t:n;throw TypeError("Private element is not present on this object")}function n(e,t){if(!(e instanceof t))throw TypeError("Cannot call a class as a function")}function o(e,t,n){return t&&function(e,t){for(var n=0;n<t.length;n++){var o=t[n];o.enumerable=o.enumerable||!1,o.configurable=!0,"value"in o&&(o.writable=!0),Object.defineProperty(e,function(e){var t=function(e,t){if("object"!=typeof e||!e)return e;var n=e[Symbol.toPrimitive];if(void 0!==n){var o=n.call(e,t);if("object"!=typeof o)return o;throw TypeError("@@toPrimitive must return a primitive value.")}return String(e)}(e,"string");return"symbol"==typeof t?t:t+""}(o.key),o)}}(e.prototype,t),Object.defineProperty(e,"prototype",{writable:!
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (2313), with no line terminators
                    Category:downloaded
                    Size (bytes):2313
                    Entropy (8bit):5.166817230764043
                    Encrypted:false
                    SSDEEP:
                    MD5:A855A5C6E55EA080FCB1EA98DEA5EC9E
                    SHA1:CE9CF36BDA4B4306CF0C8709917E3B037EFFEDAF
                    SHA-256:820BDF7BF8676EE0546BF12621825F7DCF5E160F1B34DE31418016FB7C3DC84F
                    SHA-512:6831D3E04F75045B96C04305BD86916C784B885ECD645696B550700D43CD9B977B6BD751312EA85719A45EAB310EA03091E1A66B3A9CC0BBD645E2185530AAF8
                    Malicious:false
                    Reputation:unknown
                    URL:https://app.raisetech.io/_next/static/css/b44e7716f5ea7a26.css
                    Preview:.Login_wrapper__w2Om1{display:flex;align-items:center;justify-content:center;height:100vh}.Login_container__kbBHv{margin:76px 16px;background:#084243;color:#fff;border-radius:8px;max-width:630px;width:100%}.Login_container__kbBHv .Login_content__tg7fQ{margin:auto;max-width:500px;width:100%;text-align:center;padding:44px 0 22px}.Login_container__kbBHv .Login_content__tg7fQ .Login_logo__Kao8k{display:block;width:80px;margin:auto auto 20px}.Login_container__kbBHv .Login_content__tg7fQ h1{color:#fff!important;font-size:4.8rem!important;margin:40px 0 24px!important}.Login_container__kbBHv .Login_content__tg7fQ p{font-family:Raleway-Light!important;font-size:1.6rem;margin-bottom:18px!important;line-height:2.6rem}.Login_container__kbBHv .Login_content__tg7fQ p.Login_intro__v0soz{margin-bottom:52px!important}.Login_container__kbBHv .Login_content__tg7fQ form{display:flex;flex-direction:column;align-items:center}.Login_container__kbBHv .Login_content__tg7fQ form input{max-width:310px;width:100%
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:gzip compressed data, from Unix, original size modulo 2^32 6697
                    Category:downloaded
                    Size (bytes):2667
                    Entropy (8bit):7.923681085226935
                    Encrypted:false
                    SSDEEP:
                    MD5:6D5189270CB1CDED03A822BD9403C1A6
                    SHA1:1B49CBE4AFED738BA0DE48029C4C3CF3096C0F0A
                    SHA-256:6AD3A32D286C822F96F60277B6D56724B71A202927E5F0A114C27C79A2C206C6
                    SHA-512:DF6B638B80DBB7AB57F088D9667DB5E6FA2467B2B162A09BB1A2F6927B3D6370D6EF1B19801B9934DC46496D39635F5B07A87815189E8004BB9146F4A0AF4BBF
                    Malicious:false
                    Reputation:unknown
                    URL:https://widget.intercom.io/widget/exwli1la
                    Preview:...........Y.s.:..+.w'...........t..C..w.t3..$.G...I..~.....pg...>:/...'...x......'....Y...+..]R.>$B.4X.b&C:...gOX.Q..H-.l.$l0$).RI.k.Ai12..WT.......0f. !j.....La.}.j.^:.T..D........x.@...+..+<..Kk-I....g:...G....il{.....`*"...d.7.+.F).p..;..={....<?!'/NNO....q..E..j.p...7.N..?..;..,...'.U.m.4.>...tKO..1..21.. ^aL.)%2.....|L....,..=.t.z6....{.^{*X....#......w.l....Y.F..WR5...E..kNf8.eN.-...b.a.+.=.n^.J...Z..,T.y..m.L..+...?D."<.pf5.I.cH.\.DB%......S1d1m3....$S...5..g..h..v'T.^.)'.F.L)..V...+...@......F,$z[.}....e.LZ"...Z.[s$...yT.].o.d.[zWD.....W..|....S..M*.*..]O..A...8\..q..,.hW...u.(;.s\.....Z.6..8!y1F9hZ.['.....4r.$...6..oi...d..m_.w....u.bs....._..G+K@m...u_\..>......g...(.hd..o.}%).n...^.8:.A.....Q............D...o9.Cw..|m~.n....|....T.5.W..;..q=.l.~.....J?.[.:zi.....~.....1....k.k.,'$.}"...D.Z...L......5_..3..e:6.......$..8.k......."$q..G..QSH};.0...~..+.i.5...R.T..p..l_(..l6+.......A..[.Hf.b.1..L....gS....].^.T.96.Rv.....C.?.d.u....!.oO.:>.
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with no line terminators
                    Category:downloaded
                    Size (bytes):198
                    Entropy (8bit):4.609891489882625
                    Encrypted:false
                    SSDEEP:
                    MD5:5F6BA74684CB6F0D3E13B0E45C90B151
                    SHA1:60366A51C291D00C1980D5C3446553DB4DF9A6D6
                    SHA-256:6A23B0C96E1794128B1E0D2B93948210220C882827712234D27C801287FECFD0
                    SHA-512:B3B1046DD43928D23851EFD5F15B242D21FD2A500F283DA5529CE270143935A3174872C596F4C0370ACABD75190918A446F868DEA9A5E58F40E8C8A29C2EBCB7
                    Malicious:false
                    Reputation:unknown
                    URL:https://app.raisetech.io/_next/static/css/dda7549ca47d79f5.css
                    Preview:.e-grid{font-family:lato;.e-icon-ascending:before{content:"\e7a3"}.e-icon-descending:before{content:"\e7b6"}}.e-gantt,.e-kanban,.e-pivotview,.e-querybuilder,.e-schedule,.e-treegrid{font-family:lato}
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (33245), with CRLF, LF line terminators
                    Category:dropped
                    Size (bytes):69165
                    Entropy (8bit):5.474379768942856
                    Encrypted:false
                    SSDEEP:
                    MD5:A8E7EEC52F7C365CE3AD4D658EF45482
                    SHA1:8394F2B10821D332267B32AD7702C43E51FEBBE2
                    SHA-256:98D2044E5C1DFB80E9BDB87991A48FDED27AD5E00F5D4AF6861EFCD2517FF8F3
                    SHA-512:AA0C9B53BB83F9DD9C66CDBBC844547CFC58C66ADB532706B8741CCF62C8C5D93E103207148720E776E35780A4D81B0D3729F234BCF0206062F58AC08A8AB5BE
                    Malicious:false
                    Reputation:unknown
                    Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[3246],{19540:function(e,t,n){"use strict";Object.defineProperty(t,"__esModule",{value:!0}),t.RawSha256=void 0;var r=n(40171),i=function(){function e(){this.state=Int32Array.from(r.INIT),this.temp=new Int32Array(64),this.buffer=new Uint8Array(64),this.bufferLength=0,this.bytesHashed=0,this.finished=!1}return e.prototype.update=function(e){if(this.finished)throw Error("Attempted to update an already finished hash.");var t=0,n=e.byteLength;if(this.bytesHashed+=n,8*this.bytesHashed>r.MAX_HASHABLE_LENGTH)throw Error("Cannot hash more than 2^53 - 1 bits");for(;n>0;)this.buffer[this.bufferLength++]=e[t++],n--,this.bufferLength===r.BLOCK_SIZE&&(this.hashBuffer(),this.bufferLength=0)},e.prototype.digest=function(){if(!this.finished){var e=8*this.bytesHashed,t=new DataView(this.buffer.buffer,this.buffer.byteOffset,this.buffer.byteLength),n=this.bufferLength;if(t.setUint8(this.bufferLength++,128),n%r.BLOCK_SIZE>=r.BLOCK_SIZE-8){for(var i=th
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:Unicode text, UTF-8 text, with very long lines (53780)
                    Category:dropped
                    Size (bytes):55179
                    Entropy (8bit):5.346710566298965
                    Encrypted:false
                    SSDEEP:
                    MD5:AA02D8A9BFA1E1FCB43E1F533106C1AC
                    SHA1:4144037C1960B511F267EDFD13398DB194D35543
                    SHA-256:BD427D118BFBF9BC445437769F7090270F95AFD36342359E43A91FAC260501E6
                    SHA-512:949A6D2F2499CDAA04B37AF7C4C761C5074E1B72924AE33C00A7E258E776239CBC9F80D2628C0BD0FDCE481DBA1FE16117A997775F8E16A9B9210DC0016D0357
                    Malicious:false
                    Reputation:unknown
                    Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[7189],{71539:function(e,t,r){var n=r(91956).w_;e.exports.v=function(e){return n({tag:"svg",attr:{viewBox:"0 0 24 24"},child:[{tag:"path",attr:{fill:"none",stroke:"#000",strokeWidth:"2",d:"M7,7 L17,17 M7,17 L17,7"}}]})(e)}},39589:function(e,t,r){e.exports=function(e){var t={};function r(n){if(t[n])return t[n].exports;var a=t[n]={i:n,l:!1,exports:{}};return e[n].call(a.exports,a,a.exports,r),a.l=!0,a.exports}return r.m=e,r.c=t,r.d=function(e,t,n){r.o(e,t)||Object.defineProperty(e,t,{enumerable:!0,get:n})},r.r=function(e){"undefined"!=typeof Symbol&&Symbol.toStringTag&&Object.defineProperty(e,Symbol.toStringTag,{value:"Module"}),Object.defineProperty(e,"__esModule",{value:!0})},r.t=function(e,t){if(1&t&&(e=r(e)),8&t||4&t&&"object"==typeof e&&e&&e.__esModule)return e;var n=Object.create(null);if(r.r(n),Object.defineProperty(n,"default",{enumerable:!0,value:e}),2&t&&"string"!=typeof e)for(var a in e)r.d(n,a,(function(t){return e[t]}).
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (475), with no line terminators
                    Category:downloaded
                    Size (bytes):475
                    Entropy (8bit):5.072949843914907
                    Encrypted:false
                    SSDEEP:
                    MD5:5E43CBD2C0629A1C7164CD0363B97299
                    SHA1:44DC471F67352E683564A4D33B2D72192EB7026F
                    SHA-256:5B7C4F07B2443259DA2FB09A97C035AF8B9E7603C64461C934645056AA5C33E6
                    SHA-512:DDC82978C4CCD5EF06F4E9FBE0A8A049FDBB67F81358710306DD712B28DCF5619DFB687BFD6BAA4D13D9C7821AC01855A986BD6B9161D73A68048FA52E19E992
                    Malicious:false
                    Reputation:unknown
                    URL:https://app.raisetech.io/_next/static/chunks/main-app-aa1e680f91d2a1a3.js
                    Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[1744],{36198:function(e,n,t){Promise.resolve().then(t.t.bind(t,95751,23)),Promise.resolve().then(t.t.bind(t,66513,23)),Promise.resolve().then(t.t.bind(t,76130,23)),Promise.resolve().then(t.t.bind(t,39275,23)),Promise.resolve().then(t.t.bind(t,16585,23)),Promise.resolve().then(t.t.bind(t,61343,23))}},function(e){var n=function(n){return e(e.s=n)};e.O(0,[2971,7023],function(){return n(11028),n(36198)}),_N_E=e.O()}]);
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (65536), with no line terminators
                    Category:downloaded
                    Size (bytes):327538
                    Entropy (8bit):5.21998982580713
                    Encrypted:false
                    SSDEEP:
                    MD5:E2B5DC2A5138B9952D491E4AF32C18D3
                    SHA1:CB02CC88B56DDD06F5953A23111A52226BC61A9C
                    SHA-256:6742134DDFD7B4B46380B78A1BA7DDEABFAD8A40B13C029A4DEAC6093F67AC06
                    SHA-512:2053C548ECFA676223D6568A5920E25B17FD1DEA15631D8AE1526B87E17F0341BFAA620E941172EF4A2CBE50FE64B6657D6A7760747F1E9685CDCF28A7C22ADB
                    Malicious:false
                    Reputation:unknown
                    URL:https://app.raisetech.io/_next/static/css/7e33f140c7f35f99.css
                    Preview:@import url("https://fonts.googleapis.com/css2?family=Inter:wght@100;200;300;400;500;600;700;800;900&display=swap");@font-face{font-family:e-icons;src:url(data:application/x-font-ttf;charset=utf-8;base64,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
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:Unicode text, UTF-8 text, with very long lines (35837)
                    Category:downloaded
                    Size (bytes):259432
                    Entropy (8bit):5.540063913395817
                    Encrypted:false
                    SSDEEP:
                    MD5:BB04D38191CA110835B88FB297B4A69D
                    SHA1:D874EC13FB00EAA5FC2AC2A1346501DB076FE806
                    SHA-256:B2D70E4AB8B4D50E61DC7AFE8AD3C7F89155FEFEA93A29EC0FC8B0EF89006858
                    SHA-512:6E9E95A674D91720B83E9555C0726CCB91AAD84FF64F2E2D5ECFC4459C017D77FB2C3937CDA74C92602F7600A97804F70D0536B47FCB2AF1C28AB8769BC11740
                    Malicious:false
                    Reputation:unknown
                    URL:https://app.raisetech.io/_next/static/chunks/4241-519d6cf8fc6aa984.js
                    Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[4241,244],{87656:function(e,t,r){var n=r(91956).w_;e.exports.L=function(e){return n({tag:"svg",attr:{viewBox:"0 0 1024 1024"},child:[{tag:"path",attr:{d:"M924.8 385.6a446.7 446.7 0 0 0-96-142.4 446.7 446.7 0 0 0-142.4-96C631.1 123.8 572.5 112 512 112s-119.1 11.8-174.4 35.2a446.7 446.7 0 0 0-142.4 96 446.7 446.7 0 0 0-96 142.4C75.8 440.9 64 499.5 64 560c0 132.7 58.3 257.7 159.9 343.1l1.7 1.4c5.8 4.8 13.1 7.5 20.6 7.5h531.7c7.5 0 14.8-2.7 20.6-7.5l1.7-1.4C901.7 817.7 960 692.7 960 560c0-60.5-11.9-119.1-35.2-174.4zM761.4 836H262.6A371.12 371.12 0 0 1 140 560c0-99.4 38.7-192.8 109-263 70.3-70.3 163.7-109 263-109 99.4 0 192.8 38.7 263 109 70.3 70.3 109 163.7 109 263 0 105.6-44.5 205.5-122.6 276zM623.5 421.5a8.03 8.03 0 0 0-11.3 0L527.7 506c-18.7-5-39.4-.2-54.1 14.5a55.95 55.95 0 0 0 0 79.2 55.95 55.95 0 0 0 79.2 0 55.87 55.87 0 0 0 14.5-54.1l84.5-84.5c3.1-3.1 3.1-8.2 0-11.3l-28.3-28.3zM490 320h44c4.4 0 8-3.6 8-8v-80c0-4.4-3.6-8-8-8h-4
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:Unicode text, UTF-8 text, with very long lines (65344), with no line terminators
                    Category:downloaded
                    Size (bytes):69734
                    Entropy (8bit):5.319636339165458
                    Encrypted:false
                    SSDEEP:
                    MD5:A5E92C6DB8FCBFD63D5FC4894E97F8AA
                    SHA1:96DCA029D6290104379CBFE6CFE5C13B95834C7C
                    SHA-256:57E46FE26F82F5B3D5DB4A375F6C84F8015FF9CC26C00ADB40DBF1DBF3687172
                    SHA-512:134930DA87ED485B134EF03516D8BBB66139C6B5C14E854062386A56D81535B9E04DE8FE202A8D5A9F661F286C5BB247A313E6118E850318A8D76A4FBEB2E5F6
                    Malicious:false
                    Reputation:unknown
                    URL:https://app.raisetech.io/_next/static/chunks/e37a0b60-59edab8140587b66.js
                    Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[1866],{22599:function(n,t,r){var e;n=r.nmd(n),(function(){var u,i="Expected a function",o="__lodash_hash_undefined__",f="__lodash_placeholder__",a=1/0,c=0/0,l=[["ary",128],["bind",1],["bindKey",2],["curry",8],["curryRight",16],["flip",512],["partial",32],["partialRight",64],["rearg",256]],s="[object Arguments]",h="[object Array]",p="[object Boolean]",v="[object Date]",_="[object Error]",g="[object Function]",y="[object GeneratorFunction]",d="[object Map]",b="[object Number]",w="[object Object]",m="[object Promise]",x="[object RegExp]",j="[object Set]",A="[object String]",k="[object Symbol]",O="[object WeakMap]",I="[object ArrayBuffer]",E="[object DataView]",R="[object Float32Array]",z="[object Float64Array]",S="[object Int8Array]",C="[object Int16Array]",W="[object Int32Array]",L="[object Uint8Array]",U="[object Uint8ClampedArray]",B="[object Uint16Array]",T="[object Uint32Array]",$=/\b__p \+= '';/g,D=/\b(__p \+=) '' \+/g,M=/(__e
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:SVG Scalable Vector Graphics image
                    Category:downloaded
                    Size (bytes):2708
                    Entropy (8bit):4.347995222116886
                    Encrypted:false
                    SSDEEP:
                    MD5:E531F57349087553A91D448C5B6B72FA
                    SHA1:6E9CAC3AE37040E5935F92ED350C39DA8740FAC4
                    SHA-256:E22FE78967B96A4E2DE85823288999C26F3F4723CA4CEF62ECD4E07FB50FFA5D
                    SHA-512:8C733813874D5001CA8F3750044E6338C78B5B7122AC41A02241D1BC3B7C588CBE37F3EDF6478AA392A4149D9447C558E4AEEF58249847D7FECC91B42E72F48D
                    Malicious:false
                    Reputation:unknown
                    URL:https://app.raisetech.io/img/raise-logo-light.svg
                    Preview:<svg width="176" height="54" viewBox="0 0 176 54" fill="none" xmlns="http://www.w3.org/2000/svg">.<g clip-path="url(#clip0_282_2924)">.<path d="M74.5951 22.5802C71.9375 18.4006 67.6967 15.949 62.3062 15.949C52.7502 15.949 45.9219 23.59 45.9219 34.9759C45.9219 46.3618 52.6775 54.0001 62.3062 54.0001C67.6913 54.0001 71.9375 51.5485 74.5951 47.4418V52.9903H82.7886V16.9588H74.5951V22.5802ZM64.6056 46.7938C58.4989 46.7938 54.4735 42.1093 54.4735 34.9759C54.4735 27.8425 58.5123 23.1553 64.6056 23.1553C70.6424 23.1553 74.6678 27.8398 74.6678 34.9759C74.6678 42.112 70.6424 46.7938 64.6056 46.7938Z" fill="white"/>.<path d="M97.8829 16.9585H89.6895V52.99H97.8829V16.9585Z" fill="white"/>.<path d="M112.684 27.0487C112.684 24.454 115.414 22.5802 119.583 22.5802C124.542 22.5802 127.776 25.3909 126.769 29.4976H134.747C136.255 21.3544 129.284 15.949 119.669 15.949C110.972 15.949 104.289 20.3473 104.289 27.559C104.289 41.0347 127.429 35.8453 127.429 43.0516C127.429 45.6463 124.483 47.3716 120.1 47.3716
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (44907), with no line terminators
                    Category:downloaded
                    Size (bytes):44907
                    Entropy (8bit):5.998186735459071
                    Encrypted:false
                    SSDEEP:
                    MD5:D3126B3D23F2F3EB80386DC1C4818E68
                    SHA1:BFFA599F11B027FB524A4667963638867167BC86
                    SHA-256:6592C3CDF7461B16379CE4A61F0AA1E3799162F5A26F997C3FAD0FF4F4C2A921
                    SHA-512:662009215CCF4E74904A598C36B905B463EAC464C650FDCE8C0B812855D01D138F883F1CBB575A74BD2BB4989C7C61E4C7A514F3013E8A496BA6E7AEA3B34373
                    Malicious:false
                    Reputation:unknown
                    URL:https://app.raisetech.io/_next/static/css/9a99da405ed75782.css
                    Preview:.react-tel-input{font-family:Roboto,sans-serif;font-size:15px;position:relative;width:100%}.react-tel-input :disabled{cursor:not-allowed}.react-tel-input .flag{width:16px;height:11px;background-image:url(data:image/png;base64,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
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (25714), with no line terminators
                    Category:downloaded
                    Size (bytes):25714
                    Entropy (8bit):5.448844611256576
                    Encrypted:false
                    SSDEEP:
                    MD5:2C24339E85ECF4B1708621FA2C58F5AF
                    SHA1:7B6D5C6D5B71307DCD9095841EEBDD2FCF04E65D
                    SHA-256:25354990156A9739A10FC3EE9F73B8C8A3F06237C97C79195378E2EE4199D642
                    SHA-512:CF52D7C13AA04C69088AA89821EEB0C22B11DBAA1DF1482374F06ABEB7B2FDC6241CD5827DCF353D10A4A40A5327FD1F0157AA85C0993020DFBDF3992139544A
                    Malicious:false
                    Reputation:unknown
                    URL:https://app.raisetech.io/_next/static/chunks/app/auth/login/page-2d0b563df3eeb526.js
                    Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[6716,3257,2949,8967],{5617:function(e,t,s){Promise.resolve().then(s.bind(s,4200))},4200:function(e,t,s){"use strict";s.r(t),s.d(t,{default:function(){return M}});var a=s(57437),i=s(54516),r=s(10112),n=s(92831),l=s(36631),o=s(20490),d=s(20071),c=s(87998),u=s(85360),m=s(28720),p=s(22420),h=s(49714),_=s(22599),g=s.n(_),x=s(66648),f=s(16463),b=s(2265),v=s(75823),j=s(20656),k=s(51046),w=s.n(k),y=s(88967),S=s(44274),N=s(70599),B=s(96258),C=s(85494),I=s(49522),$=s(65569),A=s.n($);function E(){let{router:e,routerPath:t,routerParams:s,routerSearchParams:_}=(0,m.Qw)((0,f.useSearchParams)(),(0,m.Iy)()),{setAuthData:k,refreshAuth:$,user_id:E,id_token:M,logoutUser:T,user_business_id:R}=(0,b.useContext)(C.Vo),{clearEnumValues:P}=(0,b.useContext)(C.S9),[F,O]=(0,b.useState)(""),[z,W]=(0,b.useState)(""),[q,U]=(0,b.useState)(""),[J,D]=(0,b.useState)(""),[G,K]=(0,b.useState)(""),[Q,Z]=(0,b.useState)(!1),[L,V]=(0,b.useState)(!1),[Y,H]=(0,b.useState)
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:HTML document, ASCII text, with very long lines (15735), with no line terminators
                    Category:downloaded
                    Size (bytes):15735
                    Entropy (8bit):5.273597381882768
                    Encrypted:false
                    SSDEEP:
                    MD5:0B87477969ABB8613AB6B6452247DB57
                    SHA1:C104602FF5DD64CCF5B075D10096C9C661DFD77A
                    SHA-256:B85D78E7C8B52B9C2BFD5B02872F71D752FCF2776F4E45E0A3D2B71E24662123
                    SHA-512:2C8644485BEA5742E7A984FC2AE7C56C223AE32A9132D40CC274B56F05997D0CE0C4F6A10BC9DE07823FB3B99CF46AE830E53BD265CC127BB35DD9961D1DA992
                    Malicious:false
                    Reputation:unknown
                    URL:https://app.raisetech.io/auth/login
                    Preview:<!DOCTYPE html><html lang="en"><head><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1"/><link rel="stylesheet" href="/_next/static/css/bb31a75961d76c29.css" data-precedence="next"/><link rel="stylesheet" href="/_next/static/css/31727a93a287bab0.css" data-precedence="next"/><link rel="stylesheet" href="/_next/static/css/7e33f140c7f35f99.css" data-precedence="next"/><link rel="stylesheet" href="/_next/static/css/6e95abce2f732eca.css" data-precedence="next"/><link rel="stylesheet" href="/_next/static/css/62fff4a7ce7f8429.css" data-precedence="next"/><link rel="stylesheet" href="/_next/static/css/aef790856d01b631.css" data-precedence="next"/><link rel="stylesheet" href="/_next/static/css/a5f8944a5a518c6a.css" data-precedence="next"/><link rel="stylesheet" href="/_next/static/css/310c48912cac47d6.css" data-precedence="next"/><link rel="stylesheet" href="/_next/static/css/ebffa9ccf8a8c996.css" data-precedence="next"/><link rel="stylesheet" href="/_nex
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text
                    Category:downloaded
                    Size (bytes):22239
                    Entropy (8bit):5.476045210460076
                    Encrypted:false
                    SSDEEP:
                    MD5:AA13520F22B140A8145393995164EA16
                    SHA1:EF340DAA150BCAD5AD9FA269785F0CF7251837F5
                    SHA-256:A01210A2B1A7E2C2249E9AFAD4E30BF8C0D7FEB7FB6D56BADD923FA3BC1A992A
                    SHA-512:F1F79BDF88BD1D12D94AE0A66D0C3B09248C4C58E50A7DB1C7828EDC9FF47EABFFE6DF0B8EACD66409C4C5FB0986CCDFEADCB5856609EDB24970446A5AE452E5
                    Malicious:false
                    Reputation:unknown
                    URL:https://fonts.googleapis.com/css2?family=Inter:wght@100;200;300;400;500;600;700;800;900&display=swap
                    Preview:/* cyrillic-ext */.@font-face {. font-family: 'Inter';. font-style: normal;. font-weight: 100;. font-display: swap;. src: url(https://fonts.gstatic.com/s/inter/v18/UcC73FwrK3iLTeHuS_nVMrMxCp50SjIa2JL7SUc.woff2) format('woff2');. unicode-range: U+0460-052F, U+1C80-1C8A, U+20B4, U+2DE0-2DFF, U+A640-A69F, U+FE2E-FE2F;.}./* cyrillic */.@font-face {. font-family: 'Inter';. font-style: normal;. font-weight: 100;. font-display: swap;. src: url(https://fonts.gstatic.com/s/inter/v18/UcC73FwrK3iLTeHuS_nVMrMxCp50SjIa0ZL7SUc.woff2) format('woff2');. unicode-range: U+0301, U+0400-045F, U+0490-0491, U+04B0-04B1, U+2116;.}./* greek-ext */.@font-face {. font-family: 'Inter';. font-style: normal;. font-weight: 100;. font-display: swap;. src: url(https://fonts.gstatic.com/s/inter/v18/UcC73FwrK3iLTeHuS_nVMrMxCp50SjIa2ZL7SUc.woff2) format('woff2');. unicode-range: U+1F00-1FFF;.}./* greek */.@font-face {. font-family: 'Inter';. font-style: normal;. font-weight: 100;. font-display: swa
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (65248)
                    Category:downloaded
                    Size (bytes):311118
                    Entropy (8bit):4.712312633185466
                    Encrypted:false
                    SSDEEP:
                    MD5:BF6E05C410176CA96436F2FA18F17C27
                    SHA1:F65A660F8182869705FE75A9CE4B3DDD8BE1E5DA
                    SHA-256:347B628D87524BF2520AB33251049C7D18EE1221E194BFE23146298107E8378A
                    SHA-512:24E3A538253AC3FCA73F21ECB2CE04EF895278AEE1279098AF2F4ADF9CE8630CB71B0F399928120449D1AC6FCDE529A51796CBC24B21A4F5345974E205C3CA63
                    Malicious:false
                    Reputation:unknown
                    URL:https://app.raisetech.io/_next/static/css/a5f8944a5a518c6a.css
                    Preview:.e-signature.e-control{background-color:#fff;border:1px solid #e5e7eb}.e-float-input .e-clear-icon:before,.e-float-input.e-control-wrapper .e-clear-icon:before,.e-input-group .e-clear-icon:before,.e-input-group.e-control-wrapper .e-clear-icon:before{content:"\e7e7";font-family:e-icons}../*! input layout */.e-input-group,.e-input-group.e-control-wrapper{display:table;line-height:1.4;margin-bottom:0}.e-input-group input.e-input,.e-input-group textarea.e-input,.e-input-group.e-control-wrapper input.e-input,.e-input-group.e-control-wrapper textarea.e-input,input.e-input,textarea.e-input{border:1px solid;height:auto;line-height:inherit;margin:0;outline:none;padding:4px 0 4px 12px;text-indent:12px;width:100%}.e-input-group,.e-input-group.e-control-wrapper,.e-input-group.e-control-wrapper.e-disabled,.e-input-group.e-disabled,input.e-input,textarea.e-input{font-family:Inter;font-size:14px;font-weight:400}.e-bigger .e-input-group .e-input,.e-bigger .e-input-group.e-control-wrapper .e-input,.e-i
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:TrueType Font data, 18 tables, 1st "GDEF", 22 names, Microsoft, language 0x409, Copyright 2010 The Raleway Project Authors (impallari@gmail.com), with Reserved Font Name "Ralew
                    Category:downloaded
                    Size (bytes):163404
                    Entropy (8bit):6.3644958588438865
                    Encrypted:false
                    SSDEEP:
                    MD5:6C084270CCDEB72FD9F5A5144CEA628F
                    SHA1:DF6BEA2956C0A2471AEF790B6A5458F0822CD898
                    SHA-256:79B7DC3B96DA214096C6990FE9B0F0AC1E40B49CC2677E28910EA83AB43C991B
                    SHA-512:58102191AA93E8FF1ADDFA9B9D347BC0275D3D78FA96B8C03FB332E04D8302A14F83E90E9B276028F29CB292E089C692B2D6749EA5C29AB288E18D1C902B295F
                    Malicious:false
                    Reputation:unknown
                    URL:https://app.raisetech.io/_next/static/media/Raleway-Light.9581a20d.ttf
                    Preview:........... GDEF.T.0.......LGPOS..]...h...GSUB7..I..p.....OS/2.ug8..7....`STAT.T."..~....Dcmap...U..8(...Vcvt ......S.....fpgm...Z..B.....gasp............glyf...3...,....head.a....&....6hhea......7....$hmtx... ..&.....locaR......h...Xmaxp.......H... name". ...T<...FpostYY....]...#.prepO(....R........2..............e.#!"&5.43!2...4#!"....3!2..7...!.@......4.......a...i4.............8...........i................D@'...................................r..r.++2.9/33.39....9..<<..<<01A3.#'!.#....<,.,6c..c7......:.....t.............&................../.01...........&................../.01...........&....................././..01.....g.....&.....'..................../.01...........&....................././..01...........&...............#....././..01...........&....................././..01...........&................../.01...........&................@...././..01.....g.....&.....'..................../.01...........&................@...././..01...........&................@...././..01...........&
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (65536), with no line terminators
                    Category:downloaded
                    Size (bytes):158353
                    Entropy (8bit):4.687816508073247
                    Encrypted:false
                    SSDEEP:
                    MD5:C7E1CBF05882B5F48AA4689D970CB507
                    SHA1:8D945DA59CC38CF4120AAB8BF7B2F855FA2600A1
                    SHA-256:15287795C14838B6FAF2775633C0803B00BEAC5B4EE187437A629E294CD669D6
                    SHA-512:B2664299CA0C0783DCB91D36C61BDC9BE03B14ADC00D8A604C638F851F50CBE09E4A89AFB6990101A7F066DD699CFC09C32D8D4E1706E32DCE11502BF435EC5D
                    Malicious:false
                    Reputation:unknown
                    URL:https://app.raisetech.io/_next/static/css/6e95abce2f732eca.css
                    Preview:.e-btn,.e-css.e-btn{-webkit-font-smoothing:antialiased;border:1px solid;border-radius:4px;box-sizing:border-box;cursor:pointer;display:inline-block;font-family:Inter;font-size:14px;font-weight:500;justify-content:center;line-height:1.429em;outline:none;padding:4px 12px;text-align:center;text-decoration:none;text-transform:none;-webkit-user-select:none;user-select:none;vertical-align:middle;white-space:nowrap}.e-btn:disabled,.e-css.e-btn:disabled{cursor:default}.e-btn:focus,.e-btn:hover,.e-css.e-btn:focus,.e-css.e-btn:hover{text-decoration:none}.e-btn::-moz-focus-inner,.e-css.e-btn::-moz-focus-inner{border:0;padding:0}.e-btn .e-btn-icon,.e-css.e-btn .e-btn-icon{display:inline-block;font-size:18px;margin-top:-2px;vertical-align:middle;width:1em}.e-btn .e-btn-icon.e-icon-left,.e-css.e-btn .e-btn-icon.e-icon-left{margin-left:-.5em;width:2em;line-height:0}.e-btn .e-btn-icon.e-icon-right,.e-css.e-btn .e-btn-icon.e-icon-right{width:2em;margin-right:-.5em;line-height:0}.e-btn .e-btn-icon.e-ico
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (35016)
                    Category:downloaded
                    Size (bytes):341910
                    Entropy (8bit):4.59865326805308
                    Encrypted:false
                    SSDEEP:
                    MD5:A99E05B7149C0C5C444AE1931C3A6BE9
                    SHA1:70579DBC6C4AC360A067EA44A6195A1935E9D8D1
                    SHA-256:8E8BA829E9B722A6057331ACA94598E67635D02AD5D0971FC3551C5AE478C463
                    SHA-512:2D346182E07336A849E4328472A7A51C3616238A9C46770322B68FA1DD792BC3DA1772BEEB5F6058B2794436DF9FB13D7FDE81FFDB48C3BB57FAC0711EA77D06
                    Malicious:false
                    Reputation:unknown
                    URL:https://app.raisetech.io/_next/static/css/310c48912cac47d6.css
                    Preview:/* !componenticons */.e-grid-menu .e-icon-last:before,.e-pager .e-icon-last:before{content:"\e7a9"}.e-grid-menu .e-icon-first:before,.e-pager .e-icon-first:before{content:"\e744"}.e-grid-menu .e-icon-prev:before,.e-pager .e-icon-prev:before{content:"\e765"}.e-grid-menu .e-icon-next:before,.e-pager .e-icon-next:before{content:"\e748"}.e-grid-menu.e-rtl .e-icon-last.e-lastpage:before,.e-grid-menu.e-rtl .e-icon-last.e-lastpage:hover,.e-grid-menu.e-rtl .e-icon-last.e-lastpagedisabled:before,.e-pager.e-rtl .e-icon-last.e-lastpage:before,.e-pager.e-rtl .e-icon-last.e-lastpage:hover,.e-pager.e-rtl .e-icon-last.e-lastpagedisabled:before{content:"\e744"}.e-grid-menu.e-rtl .e-icon-first.e-firstpage:before,.e-grid-menu.e-rtl .e-icon-first.e-firstpage:hover,.e-grid-menu.e-rtl .e-icon-first.e-firstpagedisabled:before,.e-pager.e-rtl .e-icon-first.e-firstpage:before,.e-pager.e-rtl .e-icon-first.e-firstpage:hover,.e-pager.e-rtl .e-icon-first.e-firstpagedisabled:before{content:"\e7a9"}.e-grid-menu.e-rt
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (47133)
                    Category:downloaded
                    Size (bytes):96295
                    Entropy (8bit):4.620611116402881
                    Encrypted:false
                    SSDEEP:
                    MD5:D2C3AFE6794DBB2A47407BB971FC4F80
                    SHA1:786AC73254D7EACF549F551CFC7F67550CC63C39
                    SHA-256:A4EBD857E86D6E8AC98F054F0B82D7439C49A2BA65806348C96A4D9C295F7C64
                    SHA-512:390E4EF9E92905DC6F66AA59C6B065FD0BADDD5BAEB0D2C4BDB06F9E6A75E32886651418CE9C22277A6C521ACD16D0DDE6972907093B0D220751FCE057D0F273
                    Malicious:false
                    Reputation:unknown
                    URL:https://app.raisetech.io/_next/static/css/aef790856d01b631.css
                    Preview:.e-dropdownbase .e-list-item.e-active,.e-dropdownbase .e-list-item.e-active.e-hover{font-weight:500}.e-dropdownbase .e-list-group-item,.e-fixed-head{text-transform:uppercase}.e-small .e-dropdownbase .e-list-group-item,.e-small .e-fixed-head,.e-small.e-dropdownbase .e-list-group-item,.e-small.e-fixed-head{font-size:10px}.e-bigger .e-dropdownbase .e-list-group-item,.e-bigger .e-fixed-head,.e-bigger.e-dropdownbase .e-list-group-item,.e-bigger.e-fixed-head{font-size:14px}.e-bigger.e-small .e-dropdownbase .e-list-group-item,.e-bigger.e-small .e-fixed-head,.e-bigger.e-small.e-dropdownbase .e-list-group-item,.e-bigger.e-small.e-fixed-head{font-size:12px}.e-dropdownbase .e-list-item .e-list-icon{padding:0 8px 0 0}.e-bigger .e-dropdownbase .e-list-item .e-list-icon{padding:0 12px 0 0}.e-bigger.e-small .e-dropdownbase .e-list-item .e-list-icon{padding:0 8px 0 0}.e-small .e-dropdownbase .e-list-item .e-list-icon{padding:0 4px 0 0}.e-bigger .e-dropdownbase,.e-dropdownbase.e-bigger{min-height:45px}
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:SVG Scalable Vector Graphics image
                    Category:dropped
                    Size (bytes):775
                    Entropy (8bit):4.366331439451556
                    Encrypted:false
                    SSDEEP:
                    MD5:83BD247DC855F1E2B2C44D48FF9F8244
                    SHA1:09855F3EB94922B55B1876F066523A1F0DDEA8A6
                    SHA-256:2D52BA6B79778A7788B088E74C1B5EE07C1FE9D6589FCD8609F57012ED6BFDDF
                    SHA-512:D8F6E65424D49FDF7E2C3FBB9549A9A9E6E17AC33A6818E78E944DE1B509C9B07B8B3103F97BB59EAE73F737DE25619C38AEE21424739654B3CEBF1D89444B5F
                    Malicious:false
                    Reputation:unknown
                    Preview:<svg viewBox="0 0 126 3" preserveAspectRatio="none" fill="none" xmlns="http://www.w3.org/2000/svg">. <path d="M0 0.589633C0.505898 0.347251 1.16419 0.168945 1.90017 0.0750149C2.63616 -0.0189153 3.42046 -0.0247533 4.16397 0.0581724C12.1185 0.594465 20.0847 0.41897 28.0626 0.199578C38.1484 -0.083422 48.2733 -0.0100544 58.3295 0.418946C73.4922 1.07225 88.5964 0.721235 103.689 0.311702C110.011 0.141064 116.309 0.238598 122.607 0.155716C124.788 0.126464 126 0 126 1.31118C126 2.35541 125.185 2.58366 122.992 2.71042C122.367 2.74851 121.734 2.75992 121.103 2.74452C103.853 2.29111 86.637 3.42221 69.3866 2.81766C64.5695 2.6519 59.7406 2.55926 54.9352 2.33012C40.939 1.71095 26.8145 2.16923 12.7832 1.84258C8.52602 1.73532 4.0356 1.72072 0 0.589633Z" fill="#9AD3B3" />.</svg>
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (20682), with no line terminators
                    Category:dropped
                    Size (bytes):20682
                    Entropy (8bit):5.3631764906745305
                    Encrypted:false
                    SSDEEP:
                    MD5:6EF8C380C170503D68A51602203E07FD
                    SHA1:870E46BE879DB1341114530C8D30A929D6AF4552
                    SHA-256:15A222BFD2DDBF0D8E76A9EF8C2278C1BF453835FDDB3AA723262F7CCDAEAA8D
                    SHA-512:E23D92A4A4E051DB847E4C5FA7862D8F19B72BA07230FB356736AA7B966F481FFAB75D9D65C8ACF900FDFA4239898816C13D1F93049834C676518DD77D96360A
                    Malicious:false
                    Reputation:unknown
                    Preview:"use strict";(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[7138],{87138:function(e,t,n){n.d(t,{default:function(){return o.a}});var r=n(231),o=n.n(r)},844:function(e,t,n){Object.defineProperty(t,"__esModule",{value:!0}),Object.defineProperty(t,"addLocale",{enumerable:!0,get:function(){return r}}),n(18157);let r=function(e){for(var t=arguments.length,n=Array(t>1?t-1:0),r=1;r<t;r++)n[r-1]=arguments[r];return e};("function"==typeof t.default||"object"==typeof t.default&&null!==t.default)&&void 0===t.default.__esModule&&(Object.defineProperty(t.default,"__esModule",{value:!0}),Object.assign(t.default,t),e.exports=t.default)},25944:function(e,t,n){function r(e,t,n,r){return!1}Object.defineProperty(t,"__esModule",{value:!0}),Object.defineProperty(t,"getDomainLocale",{enumerable:!0,get:function(){return r}}),n(18157),("function"==typeof t.default||"object"==typeof t.default&&null!==t.default)&&void 0===t.default.__esModule&&(Object.defineProperty(t.default,"__esModule",{value:!0}),
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (57376)
                    Category:downloaded
                    Size (bytes):83665
                    Entropy (8bit):4.6915814656059
                    Encrypted:false
                    SSDEEP:
                    MD5:AAAA9C531B3984934B7F423B9BD68B57
                    SHA1:45F07E013D2752EAC7DAE7FB2C0B27CAD5BCAB50
                    SHA-256:1091D9D4668765FE1C24DD9C79BDFDCDDD718DF1A8DFE984E733F2E35F03073B
                    SHA-512:43C787498A2DE4A5D7D354B1178BB647A627E70700705721B1B19EE433B78DEBD0A581EB4EC6D2245D51F4D4865BFCE10D765D221F9FE8075024669E664768A3
                    Malicious:false
                    Reputation:unknown
                    URL:https://app.raisetech.io/_next/static/css/ebffa9ccf8a8c996.css
                    Preview:.e-dialog .e-icon-dlg-close:before{content:"\e7e7";position:relative}.e-dialog .e-icon-dlg-close,.e-dialog .e-icon-dlg-close:active,.e-dialog .e-icon-dlg-close:hover{opacity:1}.e-dialog .e-north-east:before,.e-dialog .e-north-west:before,.e-dialog .e-south-east:before,.e-dialog .e-south-west:before{content:"\e761"}.e-dialog{border:1px solid #e5e7eb;border-radius:6px;flex-direction:column}.e-dialog,.e-dialog.e-popup{width:100%}.e-dialog.e-dlg-resizable{padding-bottom:15px;touch-action:none}.e-dialog .e-dlg-header-content{border-radius:6px;line-height:1.25}.e-dialog .e-dlg-header-content+.e-dlg-content{padding-top:12px}.e-dialog .e-btn .e-btn-icon.e-icon-dlg-close{font-size:16px;width:10px}.e-dialog .e-dlg-header{display:block;font-size:16px;font-weight:500;overflow:hidden;text-overflow:ellipsis;-webkit-user-select:none;user-select:none;vertical-align:top;white-space:nowrap;width:80%}.e-dialog .e-dlg-header.e-hide{display:none}.e-dialog .e-dlg-modal{position:fixed}.e-dialog .e-scroll-dis
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (49978)
                    Category:downloaded
                    Size (bytes):175995
                    Entropy (8bit):4.582072755642581
                    Encrypted:false
                    SSDEEP:
                    MD5:6D47FDBAD27FFC3BB61852C016221FC7
                    SHA1:AAEE85328895E083F0A858F6FF9A113326713734
                    SHA-256:90ECD727732B35B9EC3E9712E909104337144CB21C0FE46B220CB9F74F5FB747
                    SHA-512:F1C11BCE089A4F161295F682135E1156109B7F83FDDF0128A79815A26E0552F1E3F5925DA975A88B4AF5DABBB3002D1BD7E6C15ADC8030BD0B31537F9A0C63E3
                    Malicious:false
                    Reputation:unknown
                    URL:https://app.raisetech.io/_next/static/css/5210aa189d02df72.css
                    Preview:.e-ddl.e-control-wrapper .e-ddl-icon:before{transform:rotate(0deg);transition:transform .3s ease}.e-ddl.e-control-wrapper.e-icon-anim .e-ddl-icon:before{transform:rotate(180deg);transition:transform .3s ease}.e-dropdownbase .e-list-item.e-active.e-hover{color:#111827}.e-input-group:not(.e-disabled) .e-back-icon:active,.e-input-group:not(.e-disabled) .e-back-icon:hover,.e-input-group:not(.e-disabled) .e-control.e-dropdownlist~.e-ddl-icon:active,.e-input-group:not(.e-disabled) .e-control.e-dropdownlist~.e-ddl-icon:hover,.e-popup.e-ddl .e-input-group:not(.e-disabled) .e-clear-icon:active,.e-popup.e-ddl .e-input-group:not(.e-disabled) .e-clear-icon:hover{background:#0000}.e-input-group .e-ddl-icon:not(:active):after{animation:none}.e-ddl.e-popup{border:0;border-radius:4px;box-shadow:0 10px 15px -3px #0000001a,0 4px 6px -2px #0000000d;margin-top:4px}.e-small .e-ddl.e-popup,.e-small.e-ddl.e-popup{border-radius:2px;margin-top:2px}.e-bigger .e-ddl.e-popup,.e-bigger.e-ddl.e-popup{border-radius:
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:Web Open Font Format (Version 2), TrueType, length 34352, version 1.0
                    Category:downloaded
                    Size (bytes):34352
                    Entropy (8bit):7.993537574540273
                    Encrypted:true
                    SSDEEP:
                    MD5:82BEC4D8BA35AB089DEEFB9A7A4BD78E
                    SHA1:7147A4323BC35611ACFCD8AAD2DAA37EC4F8A1AE
                    SHA-256:209840434FE77D77FB51A79AC57B854BEEA8431B5AF24957EF7A825D390C2FD5
                    SHA-512:3E53C5153F7966281DE15C2B40DC5B4DB36CE6BDAC40CA6BCB44CA76C0D8F13BDD578EB6E2543CE7BE8E969730B032770E55C6C84B1C5E842F2891BDA52CF558
                    Malicious:false
                    Reputation:unknown
                    URL:https://app.raisetech.io/_next/static/media/Recoleta-Black.f322cec9.woff2
                    Preview:wOF2.......0...................................?FFTM...D...|..L.`...........u..D..6.$.... ..5..j[....r............Vb..y......3"?r.....U.^.......vY.m.NZ'.&).M..jE..9....B...Q.d.dKI.h,+.Cg.....(.c.4.e...I(\!O.Tp..4....V.L.[}.c. ...A&..Z6.]c..&.2.>..{.l.G.........=..x`S....$$!.(D|.x.^.=...Hm.S4y.j{..N=.....C.l~...v......6A..0.........C/)..RR.@..0.....cV.....OHB...g...Zk.s..0..8f....:._....s....$....r>./.N.._J.y..AN}B...GA............kDYZ._..5..bsg6..(.....'_x....g'..X.UVeU...T{|2Cd.M.Z.v.s.G-*G..`.Y#.z...fM..%.D..r..1..F..Hx.'.tL.i...?~=........BR.$.Y...!)..pxd.F...w....#..,.......#7.#F...3x.J.P0..0.+0.^.~..}.....W,.........a....B...G0..^.s.\.......dfw...........}....x....Lr..X."...k...1...=w&...O0.3A.y........%I....?...bg..%K....{.K..g..(: u.N.:uYts.......2......EQ.M.4M.~o.<..f4k".,.;. ..y['..7........=..JXI..ym...=..XH.d...A.o..1T.R.q...../..B.R.+Z....*..R....G.4MS.E.../1p..E...e.A..d...A...!......'..%*...C.y.....\.(..i...b..k..(...I}?sy..8.3?..
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (61436)
                    Category:downloaded
                    Size (bytes):73399
                    Entropy (8bit):4.721059536214026
                    Encrypted:false
                    SSDEEP:
                    MD5:86DF5071D86BBE52D685CA5735C11448
                    SHA1:FB3CE48D7428A9A70B8E829F5351AD66A85E8330
                    SHA-256:753D7A2C12AB1F8E646425BC1B5AB4747372DBF03C37302CBBCDC95E4107378F
                    SHA-512:322EEC85A8D968322F273E73C3A5FD2FF011859408A98C6CA380498362FE445F42C9ABD16F8A48F2C894E761149E381609A7C6B724F757AA3E31F22551A2E597
                    Malicious:false
                    Reputation:unknown
                    URL:https://app.raisetech.io/_next/static/css/bb27e60ac658f765.css
                    Preview:.e-query-builder .e-collapse-rule:before{content:"\e80e"}.e-query-builder .e-drag-qb-rule:before{content:"\e726"}.e-query-builder{border:1px solid;border-radius:4px;height:auto;width:auto}.e-query-builder .e-multiselect .e-qb-spinner .e-spinner-inner{left:auto;right:5px}.e-query-builder .e-cloneproperties.e-group-body{padding:0!important}.e-query-builder .e-dragclone.e-cloneproperties .e-group-container,.e-query-builder .e-dragclone.e-cloneproperties .e-rule-container{background:#f9fafb}.e-query-builder .e-dragclone.e-cloneproperties .e-rule-value-delete{margin-top:10px}.e-query-builder .e-dragclone.e-cloneproperties .e-drag-qb-rule{padding:18px 5px}.e-query-builder .e-drag-qb-rule,.e-query-builder .e-dragclone{cursor:move}.e-query-builder .e-dragclone .e-rule-field{display:flex;padding:10px}.e-query-builder .e-dragclone.e-notallowedcur,.e-query-builder .e-dragclone.e-notallowedcur .e-drag-qb-rule{cursor:not-allowed!important}.e-query-builder .e-dragclone .e-drag-qb-rule,.e-query-build
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:gzip compressed data, from Unix, original size modulo 2^32 864937
                    Category:dropped
                    Size (bytes):188645
                    Entropy (8bit):7.998211126986466
                    Encrypted:true
                    SSDEEP:
                    MD5:DB9B40DD9D3B1D888853B7924E94BC10
                    SHA1:B73C9ED4451B1F9B170E1E5E1FA045F4C93BDD73
                    SHA-256:B773A540D50118E1262ED0FD7EEADA8AB50F42F6D195DFC5E0877BE0C81BDA36
                    SHA-512:9F15DB086D4D70DC517A9A2711490E24D11702F765BEB37BF8235DFD373E97BE2EC3D535FFDF91EBBA5802E6E5F8214F473C0DC72E9BFCDB1F3160819C6D06A3
                    Malicious:false
                    Reputation:unknown
                    Preview:...........yw.7.7....mf...M...z.F.WQ...bO.h.__.....s.....~.W@.l.r.d...-...Bm.*|...X.Og.h.O'...N..q..N'..(M(i....,...L=...3..s.d.....;.....|..<8_N.(..[%3ka....S{...TR..<....f..Z.7..p..9.K..).....t1<...+.U.+O...2.%......!y.<...:....w.6.i{.[Lw...3K.......:.7.....g..NVd.^Y.g....O&.3.|89....(..........:;..lze.N.z...~.......8...O?|..iw.r.j=u^.......OO.N..~.u......hE}..N..r:[.w..><...]...A|..'3Z...{.+_.....+...E.B.n..B.~1.^...#;vE._....(.*....'.._x...-.~......0T..8.KD..b[z.Wgi.....e.{v...e..).C...HGy."0...c.A....SJ..k....O..TE..Ca*9O.O~....V..a.PJj8.C.".v.)....7...c.B....8.."............j../.........b;...|..4..8....C.J.....z.7.<.+..GyM.+h.}..8Z.W...$...K...Pv ......@.g.gr..I..&.`.....&...i.2.N....&>....eQ,v}*..._....X......y...#;R.ni...0.Ed.w./.r..P..5...vH@}."3..Q.....5..U....M...w.*..-U...W.(|_z...yY....`.}3.E.F....]..xYtW.-.Xc.U..."J.~..o.......i.."....(vVLs...zU....l0..t<....lw.. ...5..)1u..........K..N.;.h.N.9.g[t.qr.8
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (26158), with no line terminators
                    Category:dropped
                    Size (bytes):26158
                    Entropy (8bit):5.268753225237453
                    Encrypted:false
                    SSDEEP:
                    MD5:47B99895B5CABAF3F38C288803FD02CE
                    SHA1:96315362371DD88FE4631361FA22D6C1CD1DA948
                    SHA-256:ADA27A6DF0DE303AA90C24FD51FD619898272BC55BE97804008EB09A34346E11
                    SHA-512:59D2BD62272731F731C4D94858BBC96E2D1E96BCEF35CE3CB94708BDC1DC89AEB06F6D0F459DA632BAAC3B76B19DDC39FAA47B96CFF4610B6BBD42678E2F1D22
                    Malicious:false
                    Reputation:unknown
                    Preview:"use strict";(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[2067],{48362:function(t,e,n){n.d(e,{Z:function(){return r}});function r(t,e){(null==e||e>t.length)&&(e=t.length);for(var n=0,r=Array(e);n<e;n++)r[n]=t[n];return r}},41088:function(t,e,n){n.d(e,{Z:function(){return r}});function r(t){if(void 0===t)throw ReferenceError("this hasn't been initialised - super() hasn't been called");return t}},82546:function(t,e,n){n.d(e,{Z:function(){return r}});function r(t,e){if(!(t instanceof e))throw TypeError("Cannot call a class as a function")}},84179:function(t,e,n){n.d(e,{Z:function(){return o}});var r=n(83616);function i(t,e){for(var n=0;n<e.length;n++){var i=e[n];i.enumerable=i.enumerable||!1,i.configurable=!0,"value"in i&&(i.writable=!0),Object.defineProperty(t,(0,r.Z)(i.key),i)}}function o(t,e,n){return e&&i(t.prototype,e),n&&i(t,n),Object.defineProperty(t,"prototype",{writable:!1}),t}},33542:function(t,e,n){function r(t){return(r=Object.setPrototypeOf?Object.getPrototypeOf.b
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (65536), with no line terminators
                    Category:downloaded
                    Size (bytes):326087
                    Entropy (8bit):5.2463587344413956
                    Encrypted:false
                    SSDEEP:
                    MD5:79806883A104959E612BB3AE11507893
                    SHA1:B5B2AAD0720C85C667FC04EFBFF9EE83A58E9770
                    SHA-256:343197E64A602D79CBF1178B9262DD06E79C00BABE1943920E9EA6CAC642FC21
                    SHA-512:416E931A56F1CF2F96AE39B4A2536C92A581701A41851C9DE46D1AF5913D0705FF084E10D6D243189E07F1DFC602C2C1D12FB0C165AAB5B3B238941E4EC3110D
                    Malicious:false
                    Reputation:unknown
                    URL:https://app.raisetech.io/_next/static/chunks/6258-6c09b8ff4b10adb9.js
                    Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[6258],{20366:function(e,t,i){"use strict";i.d(t,{eL:function(){return l},h:function(){return c},iK:function(){return o}});var n=i(17923),a=i(96258),r=i(22599),s=i.n(r);let l=e=>{let{id:t}=e;return[{label:"Invoices",value:"invoice",relationship:"invoices",category:"agency",module:"transaction",entity:"invoice",whereById:{contract_id:{_eq:t}}}]},c=e=>{let{type:t,option_list_map:i,...n}=e,r={fieldWidth:"w-1/6",...n};return""===t?{...r}:{...r,formOverrideValues:{status:["active"]},fieldWidth:"md:w-1/6",formSchema:{human_id:{title:"Reference",type:"string",ui:"react_select",isMulti:!0,listSchema:{module:"fundo",entity:"contract",excludeDefaultFields:!0,where:{type:{_eq:"perm_placement"},is_active:{_eq:!0}},fields:{id:!0,name:"human_id",type_0:"title",type_1_date:"start_date"}},onFilter:e=>e?{id:{_in:e}}:null},request_id:{title:"Request ID",type:"string",ui:"react_select",isMulti:!0,listSchema:{module:"platform",entity:"request",exclud
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (2530)
                    Category:dropped
                    Size (bytes):220638
                    Entropy (8bit):5.539230007242098
                    Encrypted:false
                    SSDEEP:
                    MD5:B51E660E50EE12D3A55FB6672BD6B26D
                    SHA1:7E72DADD64F6DE49615A6A55694610BCB46CE3B0
                    SHA-256:157CB60387BD77FB42100D3582EDA99731A549C93002C6D428EB4551676E41F3
                    SHA-512:BF205D65312EE7C50EA93EB69D6D75DBFC3FEF677B1CEB92ED4B302D1846FCCE7576C27E7C1CE02494824F83F04EC6E40DCA2C943DA54AD1BF834491622F02EA
                    Malicious:false
                    Reputation:unknown
                    Preview:.// Copyright 2012 Google Inc. All rights reserved.. . (function(w,g){w[g]=w[g]||{};. w[g].e=function(s){return eval(s);};})(window,'google_tag_manager');. .(function(){..var data = {."resource": {. "version":"12",. . "macros":[{"function":"__e"},{"function":"__u","vtp_component":"URL","vtp_enableMultiQueryKeys":false,"vtp_enableIgnoreEmptyQueryParam":false},{"function":"__remm","vtp_setDefaultValue":true,"vtp_input":["macro",1],"vtp_fullMatch":false,"vtp_replaceAfterMatch":false,"vtp_defaultValue":"Other","vtp_ignoreCase":true,"vtp_map":["list",["map","key","\/contractor\/","value","Contractor"],["map","key","\/client\/","value","Client"],["map","key","\/agency\/","value","Agency"]]},{"function":"__remm","vtp_setDefaultValue":true,"vtp_input":["macro",1],"vtp_fullMatch":false,"vtp_replaceAfterMatch":false,"vtp_defaultValue":"Other","vtp_ignoreCase":true,"vtp_map":["list",["map","key","transaction\/timesheet","value","Timesheet"],["map","key","\/contract\/","value","Placement"],["ma
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with no line terminators
                    Category:downloaded
                    Size (bytes):58
                    Entropy (8bit):4.379556754405943
                    Encrypted:false
                    SSDEEP:
                    MD5:C509BBED73C8E32352EE97B6CC077068
                    SHA1:0893B68745F4D5333CB78CB0257855E0E816BED8
                    SHA-256:80C29DA5FD8653D54F394C7C4367F3B8FB1478FA96954A6F11B0E1CEA49D240E
                    SHA-512:7D015841A272B0357FEE1717DD76974F53576A935FF199E024E46AD72293D789062A46AFDE496A97AD74FD6880D081E9F30B4A5CB7D3DEC7A5D14FAA4D3353CF
                    Malicious:false
                    Reputation:unknown
                    URL:https://app.raisetech.io/_next/static/css/31727a93a287bab0.css
                    Preview:.chart_container_wallet canvas{transform:translateY(20px)}
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (1494), with no line terminators
                    Category:downloaded
                    Size (bytes):1494
                    Entropy (8bit):4.994508576526237
                    Encrypted:false
                    SSDEEP:
                    MD5:76AB23ED389A10E534A1A22FC4F95609
                    SHA1:ECF41F004B5A8D3E823DB00143E74A35408AEF4D
                    SHA-256:E4B7E3724B36A32EA37724F9981BF7844914CF3E6EE19C7D14319000A375ED38
                    SHA-512:4273D2DCC9D2A9E87C9C655D1D3CB559C95B8AD4E4DF4DC33046031424565DD990413F30DE94AC23DA2ACE7F213DC054131E0AE3B306A3EBF31D6EE8159964E9
                    Malicious:false
                    Reputation:unknown
                    URL:https://app.raisetech.io/_next/static/css/b660f8b7c3f05f41.css
                    Preview:.Dynamic_table___QuTu{display:table!important;font-family:Lato}.Dynamic_table___QuTu input[type=checkbox]{width:20px;height:20px;border-radius:4px;border:1px solid #dadada}.Dynamic_table___QuTu tr{box-shadow:none!important;border-radius:0!important;margin:0!important;border-bottom:2px solid #08424310;display:table-row!important}.Dynamic_table___QuTu tr th div{vertical-align:middle}.Dynamic_table___QuTu tr th div svg{transform:scale(.75)}.Dynamic_table___QuTu tr td{white-space:nowrap;overflow:hidden;text-overflow:ellipsis;word-break:break-all;color:#084243!important}.Dynamic_table___QuTu tr td .Dynamic_profile_icon_container__soQRC{display:flex}.Dynamic_table___QuTu tr td .Dynamic_profile_icon_wrapper__gDZeE{display:flex!important;align-items:center}.Dynamic_table___QuTu tr td .Dynamic_profile_icon__okzdl{margin-right:10px;width:fit-content!important}.Dynamic_table___QuTu tr td div{word-break:break-word!important;text-align:inherit!important}.Dynamic_table___QuTu tr td,.Dynamic_table___
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (65536), with no line terminators
                    Category:downloaded
                    Size (bytes):342521
                    Entropy (8bit):4.449795654755527
                    Encrypted:false
                    SSDEEP:
                    MD5:D44E67A8C0D8D8F63A1C35D3AD5E51D3
                    SHA1:1BA14E39F04AED9289FFAB3CF8CC7B31D7FEA3DC
                    SHA-256:DC908F57F5A6CD8DADD33C7F928AC8CB268C5197D6C39E56ACF22846E90CBAB1
                    SHA-512:566E8DB5C4A6BA417939C897AE9EB02BB393BFDFA6875B8210AE4C0E8F98551F082E35A865F612C297E8844FD1E8FB3D14FD14812851645FB3377F074D71078B
                    Malicious:false
                    Reputation:unknown
                    URL:https://app.raisetech.io/_next/static/css/4e1f9b912273192f.css
                    Preview:.e-pivotview .e-expand:before{content:"\e75c"}.e-pivotview .e-collapse:before{content:"\e734"}.e-pivotview.e-rtl .e-expand:before{content:"\e738"}.e-pivotview .e-sort:before{content:"\e7df"}.e-pivotview .e-pv-filter:before{content:"\e7f7"}.e-pivotview .e-pv-filtered:before{content:"\e735"}.e-pivotview .e-remove:before{content:"\e7e7"}.e-pivotview .e-selected-option-icon:before{content:"\e72b"}.e-pivotview .e-clear-filter-icon:before{content:"\e72c"}.e-pivotview .e-dropdown-icon:before{content:"\e729"}.e-pivotview .e-export:before{content:"\e72e"}.e-pivotview .e-new-report:before{content:"\e7dc"}.e-pivotview .e-save-report:before{content:"\e7c8"}.e-pivotview .e-saveas-report:before{content:"\e7ae"}.e-pivotview .e-rename-report:before{content:"\e76d"}.e-pivotview .e-remove-report:before{content:"\e820"}.e-pivotview .e-sub-total:before{content:"\e702"}.e-pivotview .e-grand-total:before{content:"\e74d"}.e-pivotview .e-toolbar-fieldlist:before{content:"\e751"}.e-pivotview .e-toolbar-grid:be
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:SVG Scalable Vector Graphics image
                    Category:downloaded
                    Size (bytes):468
                    Entropy (8bit):5.124608447819648
                    Encrypted:false
                    SSDEEP:
                    MD5:8F3ACEEA5ADD185FE6807C9E1B70FA3F
                    SHA1:6CFAFDC7EC8A1FDC82B4451693696C260CB800BA
                    SHA-256:05D975A32828B43F304A07DE1F533743CDA29B620C3CCA915361B3CEA7DB8EB8
                    SHA-512:F5D458C2E33985EAD1AED9D705BAF5E52467093B86B0024169AED7B1210A0E4EB4078E5D5622E0E7AAD0C5AC28D4F4FC93F58A456D9A08C96E55884CDF965B17
                    Malicious:false
                    Reputation:unknown
                    URL:https://app.raisetech.io/static/Microsoft_logo.svg
                    Preview:<?xml version="1.0" encoding="utf-8"?> Uploaded to: SVG Repo, www.svgrepo.com, Generator: SVG Repo Mixer Tools -->.<svg width="800px" height="800px" viewBox="0 0 32 32" fill="none" xmlns="http://www.w3.org/2000/svg">..<rect x="17" y="17" width="10" height="10" fill="#FEBA08"/>..<rect x="5" y="17" width="10" height="10" fill="#05A6F0"/>..<rect x="17" y="5" width="10" height="10" fill="#80BC06"/>..<rect x="5" y="5" width="10" height="10" fill="#F25325"/>..</svg>
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (65463)
                    Category:downloaded
                    Size (bytes):126976
                    Entropy (8bit):4.684053016513783
                    Encrypted:false
                    SSDEEP:
                    MD5:0FA1D460974AC7AEA86ADF44B6478725
                    SHA1:8C98E156D15A58534F5EBB63077EB53D662E9743
                    SHA-256:503D409A784967DC2049857982F90A6F1B61F99E1A75803476D908154B85793D
                    SHA-512:675A0765373E01270325F571306ABE4520FE3956DD10B742DAEE2136ED717DFD6E0C9D09ED5517EFF4B868B3A5D6E89C4D862C8A74404FE0C7B599A677CE8060
                    Malicious:false
                    Reputation:unknown
                    URL:https://app.raisetech.io/_next/static/css/6857ee6a904ad66c.css
                    Preview:/*! TreeView's tailwind theme wise override definitions and variables */./*! calendar tailwind theme variables */.e-ddl.e-control-wrapper .e-ddl-icon:before{transform:rotate(0deg);transition:transform .3s ease}.e-ddl.e-control-wrapper.e-icon-anim .e-ddl-icon:before{transform:rotate(180deg);transition:transform .3s ease}.e-dropdownbase .e-list-item.e-active.e-hover{color:#111827}.e-input-group:not(.e-disabled) .e-back-icon:active,.e-input-group:not(.e-disabled) .e-back-icon:hover,.e-input-group:not(.e-disabled) .e-control.e-dropdownlist~.e-ddl-icon:active,.e-input-group:not(.e-disabled) .e-control.e-dropdownlist~.e-ddl-icon:hover,.e-popup.e-ddl .e-input-group:not(.e-disabled) .e-clear-icon:active,.e-popup.e-ddl .e-input-group:not(.e-disabled) .e-clear-icon:hover{background:#0000}.e-input-group .e-ddl-icon:not(:active):after{animation:none}.e-ddl.e-popup{border:0;border-radius:4px;box-shadow:0 10px 15px -3px #0000001a,0 4px 6px -2px #0000000d;margin-top:4px}.e-small .e-ddl.e-popup,.e-sma
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:Unicode text, UTF-8 text, with very long lines (47849)
                    Category:dropped
                    Size (bytes):81561
                    Entropy (8bit):5.523735555794942
                    Encrypted:false
                    SSDEEP:
                    MD5:D401E3F7A7C2B7E9890469B6EAE6D3F6
                    SHA1:C2A6736700B2FA18E320445E7A06AF810763711C
                    SHA-256:856388E7DF5EEB9FCF8F4220CD76881168F487FDCE94A842C3C944E4335BEC1A
                    SHA-512:0FF51E1991CFA29F17CF1D67F9E86359E844E15E31408A80C54E091590C07DB6F48FCEEB784696B0A372AF53826020971EE21BB051B121BCE52FEA5884E6B6F9
                    Malicious:false
                    Reputation:unknown
                    Preview:"use strict";(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[8645],{31818:function(e,t,n){n.d(t,{Z:function(){return B}});var r=function(){function e(e){var t=this;this._insertTag=function(e){var n;n=0===t.tags.length?t.insertionPoint?t.insertionPoint.nextSibling:t.prepend?t.container.firstChild:t.before:t.tags[t.tags.length-1].nextSibling,t.container.insertBefore(e,n),t.tags.push(e)},this.isSpeedy=void 0===e.speedy||e.speedy,this.tags=[],this.ctr=0,this.nonce=e.nonce,this.key=e.key,this.container=e.container,this.prepend=e.prepend,this.insertionPoint=e.insertionPoint,this.before=null}var t=e.prototype;return t.hydrate=function(e){e.forEach(this._insertTag)},t.insert=function(e){if(this.ctr%(this.isSpeedy?65e3:1)==0){var t;this._insertTag(((t=document.createElement("style")).setAttribute("data-emotion",this.key),void 0!==this.nonce&&t.setAttribute("nonce",this.nonce),t.appendChild(document.createTextNode("")),t.setAttribute("data-s",""),t))}var n=this.tags[this.tags.length-1];
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (14271), with no line terminators
                    Category:dropped
                    Size (bytes):14271
                    Entropy (8bit):5.284069892901293
                    Encrypted:false
                    SSDEEP:
                    MD5:1354B21E0662DC4A8EC27A67762E732B
                    SHA1:E4D425204A35933F7EE9A0CCD3E3CA7CA6691DED
                    SHA-256:E07E54C0DCD1CE7A0DF62F8598F6F28A40E6BD4688A407986FA4867A1CD4FE81
                    SHA-512:33383B1F4B3A7746842B3A42E495A7C69B7AE6336064099628ADD409BAD424145A58DECD945A127011823D02FCD0E3DC7A947381E2DC811C677A3831DCEF0B3F
                    Malicious:false
                    Reputation:unknown
                    Preview:!function(){"use strict";var e,a,c,f,d,b,t,n,r,o,i,u,s={},l={};function h(e){var a=l[e];if(void 0!==a)return a.exports;var c=l[e]={id:e,loaded:!1,exports:{}},f=!0;try{s[e].call(c.exports,c,c.exports,h),f=!1}finally{f&&delete l[e]}return c.loaded=!0,c.exports}h.m=s,e=[],h.O=function(a,c,f,d){if(c){d=d||0;for(var b=e.length;b>0&&e[b-1][2]>d;b--)e[b]=e[b-1];e[b]=[c,f,d];return}for(var t=1/0,b=0;b<e.length;b++){for(var c=e[b][0],f=e[b][1],d=e[b][2],n=!0,r=0;r<c.length;r++)t>=d&&Object.keys(h.O).every(function(e){return h.O[e](c[r])})?c.splice(r--,1):(n=!1,d<t&&(t=d));if(n){e.splice(b--,1);var o=f();void 0!==o&&(a=o)}}return a},h.n=function(e){var a=e&&e.__esModule?function(){return e.default}:function(){return e};return h.d(a,{a:a}),a},c=Object.getPrototypeOf?function(e){return Object.getPrototypeOf(e)}:function(e){return e.__proto__},h.t=function(e,f){if(1&f&&(e=this(e)),8&f||"object"==typeof e&&e&&(4&f&&e.__esModule||16&f&&"function"==typeof e.then))return e;var d=Object.create(null);h.r
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (65536), with no line terminators
                    Category:dropped
                    Size (bytes):123729
                    Entropy (8bit):5.313406412364438
                    Encrypted:false
                    SSDEEP:
                    MD5:B00F4D609C432CE598837ED788757F9F
                    SHA1:7A560A540CD6F90E5B842BBD796355B096075F29
                    SHA-256:30283CDBC5C3353199363DE0166192F245CCE3D3378769B2A2BA235072396184
                    SHA-512:A6064830443B9E1D266A556B3F21E901272B470ED85A084A604750F5945C586E1029C61D6579FD4F5323BECA93F5792415ECE19B8DFC455C1BEA84F9FBC512D6
                    Malicious:false
                    Reputation:unknown
                    Preview:(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[7023],{29492:function(e,t){"use strict";function n(){return""}Object.defineProperty(t,"__esModule",{value:!0}),Object.defineProperty(t,"getDeploymentIdQueryOrEmptyString",{enumerable:!0,get:function(){return n}})},57108:function(){"trimStart"in String.prototype||(String.prototype.trimStart=String.prototype.trimLeft),"trimEnd"in String.prototype||(String.prototype.trimEnd=String.prototype.trimRight),"description"in Symbol.prototype||Object.defineProperty(Symbol.prototype,"description",{configurable:!0,get:function(){var e=/\((.*)\)/.exec(this.toString());return e?e[1]:void 0}}),Array.prototype.flat||(Array.prototype.flat=function(e,t){return t=this.concat.apply([],this),e>1&&t.some(Array.isArray)?t.flat(e-1):t},Array.prototype.flatMap=function(e,t){return this.map(e,t).flat()}),Promise.prototype.finally||(Promise.prototype.finally=function(e){if("function"!=typeof e)return this.then(e,e);var t=this.constructor||Promise;return this
                    File type:RFC 822 mail, ASCII text, with very long lines (329), with CRLF line terminators
                    Entropy (8bit):6.134777632087059
                    TrID:
                    • E-Mail message (Var. 5) (54515/1) 100.00%
                    File name:Welcome To Raise.eml
                    File size:40'159 bytes
                    MD5:e4784d2d9be56433dc20d460c24febc6
                    SHA1:41cd4e3c731337cde84357884fa211cdd859acc6
                    SHA256:f569395095c5bee24b65c065a04764639c58676d2ae17f773feeb930c3401e10
                    SHA512:9544eaa975355576d2ef4715c12f39db1f58f4dd8d26cca6067bbb1bce9bf8a35e122e172b76f7aa0db407fa17cba134976594c5e616fc83960ad5ec70da1557
                    SSDEEP:768:Li3Unfm0y76rApSehdGJ9jkl6oNewJN67jY2mvmy6FmAPmmJmXme4mgNJ12mIB:Li3Unfm03spqG6oUwrAjY2mvmPmAPmm0
                    TLSH:62034AD059251015F12649D81F00BE0E96A0394FDAFEDDC139EA60B7AFCF077AE6A748
                    File Content Preview:Received: from AS2PR03MB9443.eurprd03.prod.outlook.com (2603:10a6:20b:59c::20).. by PAWPR03MB8961.eurprd03.prod.outlook.com with HTTPS; Wed, 4 Dec 2024.. 13:58:18 +0000..Received: from DUZP191CA0014.EURP191.PROD.OUTLOOK.COM (2603:10a6:10:4f9::18).. by AS2
                    Subject:Welcome To Raise
                    From:Raise <support@raisetech.io>
                    To:adam.jones@cardfactory.co.uk
                    Cc:
                    BCC:
                    Date:Wed, 04 Dec 2024 13:58:01 +0000
                    Communications:
                    • Welcome to Raise 04 Dec 2024 Hello Adam Jones, Youre almost finished with setting up your Raise account. When you click on the login button below, you will be taken to the login page where you will b CAUTION: This email originated from outside of the organisation. If in doubt please use the report message button to Security. sophospsmartbannerend Welcome to Raise 04 Dec 2024 Hello Adam Jones, Youre almost finished with setting up your Raise account. When you click on the login button below, you will be taken to the login page where you will be prompted to enter your username and One-time password. Please copy and paste the username and password from this email, click the view icon in the password section to make sure you have it entered correctly. You will then be asked to create a new secure password. Username : adam.jones@cardfactory.co.uk Temporary password : $R@1s3n27ebrlc8 (Please ensure the password has no whitespace at the end when its copied.) Login raisetech.io Welcome to Raise 04 Dec 2024 Hello Adam Jones, Youre almost finished with setting up your Raise account. When you click on the login button below, you will be taken to the login page where you will b CAUTION: This email originated from outside of the organisation. If in doubt please use the report message button to Security. sophospsmartbannerend Welcome to Raise 04 Dec 2024 Hello Adam Jones, Youre almost finished with setting up your Raise account. When you click on the login button below, you will be taken to the login page where you will be prompted to enter your username and One-time password. Please copy and paste the username and password from this email, click the view icon in the password section to make sure you have it entered correctly. You will then be asked to create a new secure password. Username : adam.jones@cardfactory.co.uk Temporary password : $R@1s3n27ebrlc8 (Please ensure the password has no whitespace at the end when its copied.) Login raisetech.io Welcome to Raise 04 Dec 2024 Hello Adam Jones, Youre almost finished with setting up your Raise account. When you click on the login button below, you will be taken to the login page where you will b CAUTION: This email originated from outside of the organisation. If in doubt please use the report message button to Security. sophospsmartbannerend Welcome to Raise 04 Dec 2024 Hello Adam Jones, Youre almost finished with setting up your Raise account. When you click on the login button below, you will be taken to the login page where you will b CAUTION: This email originated from outside of the organisation. If in doubt please use the report message button to Security. CAUTION: This email originated from outside of the organisation. If in doubt please use the report message button to Security. CAUTION: This email originated from outside of the organisation. If in doubt please use the report message button to Security. CAUTION: This email originated from outside of the organisation. If in doubt please use the report message button to Security. sophospsmartbannerend Welcome to Raise Welcome to Raise 04 Dec 2024 04 Dec 2024 Hello Adam Jones, Youre almost finished with setting up your Raise account. When you click on the login button below, you will be taken to the login page where you will be prompted to enter your username and One-time password. Please copy and paste the username and password from this email, click the view icon in the password section to make sure you have it entered correctly. You will then be asked to create a new secure password. Username : adam.jones@cardfactory.co.uk Temporary password : $R@1s3n27ebrlc8 (Please ensure the password has no whitespace at the end when its copied.) Hello Adam Jones, Youre almost finished with setting up your Raise account. When you click on the login button below, you will be taken to the login page where you will be prompted to enter your username and One-time password. Please copy and paste the username and password from this email, click the view icon in the password section to make sure you have it entered correctly. You will then be asked to create a new secure password. Username : adam.jones@cardfactory.co.uk Temporary password : $R@1s3n27ebrlc8 (Please ensure the password has no whitespace at the end when its copied.) Adam Jones adam.jones@cardfactory.co.uk $R@1s3n27ebrlc8 $R@1s3n27ebrlc8 Login Login https://eu-west-1.protection.sophos.com?d=raisetech.io&u=aHR0cHM6Ly9hcHAucmFpc2V0ZWNoLmlvL2F1dGgvbG9naW4=&p=m&i=NjBjYTgyOGE5ODM4MzQwZTVmNTJmYzk1&t=T0VzcmFQQVdqcC9EWEhKSGVqSE1Md0d2a1FSVkxGbWFZY3VrMFNLeHZ0TT0=&h=1cd637a0376e41e78af922b0e0e7274f&s=AVNPUEhUT0NFTkNSWVBUSVZYvxLCf6KfjkXyJEJz6YJArcsaAwFt6jVKVm0Ehc6Uz_BSiv8BBrnNy99NpAL7Zy3Nsd2XqSpxv98SGJtcqgcDNsHRZmSKrOfj2cWQzCypap5hAAQ1SIuK4d_mfOR8Mko raisetech.io raisetech.io https://eu-west-1.protection.sophos.com?d=raisetech.io&u=aHR0cHM6Ly93d3cucmFpc2V0ZWNoLmlvLw==&p=m&i=NjBjYTgyOGE5ODM4MzQwZTVmNTJmYzk1&t=RlcrTHNmeG1xQ2M2QVV3ZXVIKzFNeWRvc3lDMUZteDV6RzdUeG1ScXdzcz0=&h=1cd637a0376e41e78af922b0e0e7274f&s=AVNPUEhUT0NFTkNSWVBUSVZYvxLCf6KfjkXyJEJz6YJArcsaAwFt6jVKVm0Ehc6Uz_BSiv8BBrnNy99NpAL7Zy3Nsd2XqSpxv98SGJtcqgcDNsHRZmSKrOfj2cWQzCypap5hAAQ1SIuK4d_mfOR8Mko raisetech.io raisetech.io https://eu-west-1.protection.sophos.com?d=twitter.com&u=aHR0cHM6Ly90d2l0dGVyLmNvbS9yYWlzZXRlY2hpbw==&p=m&i=NjBjYTgyOGE5ODM4MzQwZTVmNTJmYzk1&t=WDNtay9JNmlxbEdwcmY4RzVJWEMycmNMbFcwbmZOcDZYdnExZnYwR2prZz0=&h=1cd637a0376e41e78af922b0e0e7274f&s=AVNPUEhUT0NFTkNSWVBUSVZYvxLCf6KfjkXyJEJz6YJArcsaAwFt6jVKVm0Ehc6Uz_BSiv8BBrnNy99NpAL7Zy3Nsd2XqSpxv98SGJtcqgcDNsHRZmSKrOfj2cWQzCypap5hAAQ1SIuK4d_mfOR8Mko https://eu-west-1.protection.sophos.com?d=facebook.com&u=aHR0cHM6Ly93d3cuZmFjZWJvb2suY29tL3JhaXNldGVjaGlv&p=m&i=NjBjYTgyOGE5ODM4MzQwZTVmNTJmYzk1&t=Y3ZSMmVtRU0xL0ZHYXlVQ3FmYmQ1VDh3M2hKTFArQXRZZ3lBSExEeGp0OD0=&h=1cd637a0376e41e78af922b0e0e7274f&s=AVNPUEhUT0NFTkNSWVBUSVZYvxLCf6KfjkXyJEJz6YJArcsaAwFt6jVKVm0Ehc6Uz_BSiv8BBrnNy99NpAL7Zy3Nsd2XqSpxv98SGJtcqgcDNsHRZmSKrOfj2cWQzCypap5hAAQ1SIuK4d_mfOR8Mko https://eu-west-1.protection.sophos.com?d=linkedin.com&u=aHR0cHM6Ly93d3cubGlua2VkaW4uY29tL2NvbXBhbnkvcmFpc2V0ZWNoaW8v&p=m&i=NjBjYTgyOGE5ODM4MzQwZTVmNTJmYzk1&t=UWs2VHlFcS9YSVAxbXUzbTZrOTNBYVFWRkRhOGk4b3JTSEkzaElJazRqND0=&h=1cd637a0376e41e78af922b0e0e7274f&s=AVNPUEhUT0NFTkNSWVBUSVZYvxLCf6KfjkXyJEJz6YJArcsaAwFt6jVKVm0Ehc6Uz_BSiv8BBrnNy99NpAL7Zy3Nsd2XqSpxv98SGJtcqgcDNsHRZmSKrOfj2cWQzCypap5hAAQ1SIuK4d_mfOR8Mko
                    Attachments:
                    • emailTempTwitter.png
                    • emailTempLogoWhite.png
                    • emailTempFacebook.png
                    • emailTempLinkedin.png
                    Key Value
                    Receivedfrom d218-17.smtp-out.eu-west-2.amazonses.com (23.249.218.17) by AM1PEPF000252E1.mail.protection.outlook.com (10.167.16.59) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8230.7 via Frontend Transport; Wed, 4 Dec 2024 13:58:01 +0000
                    Authentication-Resultsspf=fail (sender IP is 198.154.180.201) smtp.mailfrom=eu-west-2.amazonses.com; dkim=fail (body hash did not verify) header.d=raisetech.io;dkim=fail (body hash did not verify) header.d=amazonses.com;dmarc=fail action=none header.from=raisetech.io;compauth=fail reason=001
                    Received-SPFPass (protection.outlook.com: domain of eu-west-2.amazonses.com designates 23.249.218.17 as permitted sender) receiver=protection.outlook.com; client-ip=23.249.218.17; helo=d218-17.smtp-out.eu-west-2.amazonses.com; pr=C
                    X-Sophos-Product-TypeMailflow
                    X-Sophos-Email-ID1cd637a0376e41e78af922b0e0e7274f
                    Authentication-Results-Originalspf=pass (sender IP is 23.249.218.17) smtp.mailfrom=eu-west-2.amazonses.com; dkim=pass (signature was verified) header.d=raisetech.io;dkim=pass (signature was verified) header.d=amazonses.com;dmarc=pass action=none header.from=raisetech.io;compauth=pass reason=100
                    DKIM-Signaturev=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=pgxy5mtxzx6eoyytua4nvvg26jbuf6lj; d=amazonses.com; t=1733320681; h=From:To:Subject:Message-ID:Date:MIME-Version:Content-Type:Feedback-ID; bh=RtLCTYCvlEV7o/KAuAPetlQNgFHg9mbeaKz/L2ahpac=; b=ZkQyI6qQt3+8ruiMbnks+jETR8f1LPv8JFdrBtntq9O5HydxXhDCVNT6WEzQpUsn g9mjzoY0YHdIGe1dfBi2Mw2oCfzPW0354BHEE/coRHw3q6NtsQexG5WG542q5cJ9oht PpetW7TVUj8Khfkkh6vvCMDD38C91VuaSqIh9tMQ=
                    FromRaise <support@raisetech.io>
                    Toadam.jones@cardfactory.co.uk
                    SubjectWelcome To Raise
                    Message-ID<010b019391f6a7a5-5fa7ec64-1a39-442d-9087-a8f28fc6355d-000000@eu-west-2.amazonses.com>
                    DateWed, 04 Dec 2024 13:58:01 +0000
                    Content-Typemultipart/related; type="text/html"; boundary="--_NmP-3a8ee51e33f2b28b-Part_1"
                    Feedback-ID::1.eu-west-2./UxQnOELIW8BrcSDgmhAvp2IZVOVwdppTJzDHgpNXK4=:AmazonSES
                    X-SES-Outgoing2024.12.04-23.249.218.17
                    X-EOPAttributedMessage1
                    X-EOPTenantAttributedMessage7956b84e-0c99-46b5-81c6-28689cfa7221:1
                    X-MS-TrafficTypeDiagnostic AM1PEPF000252E1:EE_|AM9PR03MB7760:EE_|DB5PEPF00014B89:EE_|AS2PR03MB9443:EE_|PAWPR03MB8961:EE_
                    X-MS-Office365-Filtering-Correlation-Id92249eb6-9bf6-4dfe-6463-08dd146baf5b
                    X-Microsoft-Antispam-UntrustedBCL:0; ARA:13230040|32142699015|4073199012|5073199012|5062899012|2092899012|12012899012|3072899012|7053199007|8096899003|136100200026;
                    X-Microsoft-Antispam-Message-Info-Original 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
                    X-Forefront-Antispam-Report-UntrustedCIP:23.249.218.17; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:d218-17.smtp-out.eu-west-2.amazonses.com; PTR:d218-17.smtp-out.eu-west-2.amazonses.com; CAT:NONE; SFS:(13230040)(32142699015)(4073199012)(5073199012)(5062899012)(2092899012)(12012899012)(3072899012)(7053199007)(8096899003)(136100200026); DIR:INB;
                    X-MS-Exchange-Transport-CrossTenantHeadersStampedAS2PR03MB9443
                    Content-Transfer-Encoding8bit
                    X-Sophos-Email-Scan-Details27140d1e1540510e7e771140550e7d75
                    X-Sophos-Email[eu-west-1] Antispam-Engine: 6.0.0, AntispamData: 2024.12.4.131246
                    X-Sophos-SenderHistoryip=23.249.218.17, fs=141286319, fso=149231634, da=226779293, mc=1372258, sc=464, hc=1371794, sp=0, re=47, sd=0, hd=30
                    X-Sophos-DomainHistoryd=amazonses.com, fs=50280, fso=82282583, da=87522117, mc=140810, sc=295, hc=140515, sp=0, re=952, sd=0, hd=30
                    X-LASED-From-ReplyTo-DiffFrom:<printcraft.co.uk>:12
                    X-LASED-SpamProbability0.111551
                    X-LASED-HitsAUTH_RES_PASS 0.000000, BODYTEXTH_SIZE_10000_LESS 0.000000, BODYTEXTH_SIZE_3000_MORE 0.000000, BODY_SIZE_10000_PLUS 0.000000, DKIM_ALIGNS 0.000000, DKIM_SIGNATURE 0.000000, DQ_S_H 0.000000, FROM_NAME_ONE_WORD 0.050000, HREF_LABEL_TEXT_NO_URI 0.000000, HTML_70_90 0.100000, HTML_BAD_EXTRAS 0.000000, HTML_FONT_INVISIBLE 0.100000, IMGSPAM_BODY 0.500000, IMG_AR_1 0.000000, IMG_ATTACHED_2P 0.000000, IMP_FROM_NOTSELF 0.000000, INBOUND_SOPHOS 0.000000, INBOUND_SOPHOS_TOP_REGIONS 0.000000, KNOWN_MTA_TFX 0.000000, MULTIPLE_ATTACHMENTS 0.000000, NO_FUR_HEADER 0.000000, PNG_PIXPERBYTE_LOW 0.000000, PNG_PIXPERBYTE_MED 0.000000, RCVD_FROM_IP_DATE 0.100000, SXL_IP_TFX_WM 0.000000, TRANSACTIONAL 0.000000, __AMAZON_DKIM 0.000000, __AMAZON_MSGID 0.000000, __ANY_URI 0.000000, __ATTACH_CTE_BASE64 0.000000, __ATTACH_CTE_QUOTED_PRINTABLE 0.000000, __AUTH_RES_DKIM_PASS 0.000000, __AUTH_RES_DMARC_PASS 0.000000, __AUTH_RES_PASS 0.000000, __AUTH_R_DKIM_P_AMAZON 0.000000, __BODY_NO_MAILTO 0.000000, __BODY_TEXT_X4 0.000000, __COMPANY_FACEBOOK 0.000000, __COMPANY_TWITTER 0.000000, __CT 0.000000, __CTYPE_HAS_BOUNDARY 0.000000, __CTYPE_HTML 0.000000, __CTYPE_MULTIPART 0.000000, __DKIM_ALIGNS_1 0.000000, __DKIM_ALIGNS_2 0.000000, __DQ_D_H 0.000000, __DQ_IP_FSO_LARGE 0.000000, __DQ_S_DOMAIN_100K 0.000000, __DQ_S_DOMAIN_HD_10_P 0.000000, __DQ_S_DOMAIN_HD_1_P 0.000000, __DQ_S_DOMAIN_HD_20_P 0.000000, __DQ_S_DOMAIN_HD_30 0.000000, __DQ_S_DOMAIN_HD_5_P 0.000000, __DQ_S_DOMAIN_HIST_1 0.000000, __DQ_S_DOMAIN_MC_100_P 0.000000, __DQ_S_DOMAIN_MC_10_P 0.000000, __DQ_S_DOMAIN_MC_1K_P 0.000000, __DQ_S_DOMAIN_MC_1_P 0.000000, __DQ_S_DOMAIN_MC_50_P 0.000000, __DQ_S_DOMAIN_MC_5_P 0.000000, __DQ_S_DOMAIN_RE_100_P 0.000000, __DQ_S_DOMAIN_SC_100_P 0.000000, __DQ_S_DOMAIN_SC_10_P 0.000000, __DQ_S_DOMAIN_SC_1_P 0.000000, __DQ_S_DOMAIN_SC_5_P 0.000000, __DQ_S_DOMAIN_SP_0_P 0.000000, __DQ_S_HIST_1 0.000000, __DQ_S_HIST_2 0.000000, __DQ_S_IP_HD_10_P 0.000000, __DQ_S_IP_MC_100_P 0.000000, __DQ_S_IP_MC_10_P 0.000000, __DQ_S_IP_MC_1K_P 0.000000, __DQ_S_IP_MC_1_P 0.000000, __DQ_S_IP_MC_5_P 0.000000, __DQ_S_IP_RE_49_L 0.000000, __DQ_S_IP_RE_99_L 0.000000, __DQ_S_IP_SC_100_P 0.000000, __DQ_S_IP_SC_10_P 0.000000, __DQ_S_IP_SC_1_P 0.000000, __DQ_S_IP_SC_5_P 0.000000, __DQ_S_IP_SP_0_P 0.000000, __EMBEDDED_IMG 0.000000, __EXTRA_MPART_TYPE_1 0.000000, __EXTRA_MPART_TYPE_N1 0.000000, __FRAUD_MONEY_CURRENCY 0.000000, __FRAUD_MONEY_CURRENCY_DOLLAR 0.000000, __FRAUD_NEGATE 0.000000, __FROM_ADDY_SHORT_LC 0.000000, __HAS_ATTACHMENT 0.000000, __HAS_ATTACHMENT1 0.000000, __HAS_ATTACHMENT2 0.000000, __HAS_FROM 0.000000, __HAS_HTML 0.000000, __HAS_MSGID 0.000000, __HAS_X_FF_ASR 0.000000, __HAS_X_FF_ASR_CAT 0.000000, __HAS_X_FF_ASR_SFV 0.000000, __HIGHBIT_ASCII_MIX 0.000000, __HREF_LABEL_IMG 0.000000, __HREF_LABEL_TEXT 0.000000, __HTML_AHREF_TAG 0.000000, __HTML_BAD_END 0.000000, __HTML_BAD_START 0.000000, __HTML_BOLD 0.000000, __HTML_HREF_TAG_X2 0.000000, __HTML_TAG_DIV 0.000000, __HTML_TAG_IMG_X2 0.000000, __HTTPS_URI 0.000000, __IMGSPAM_BODY 0.000000, __IMG_ATTACHED 0.000000, __IMG_SIZE_1K_10K 0.000000, __IMG_SIZE_1K_LESS 0.000000, __IMG_THEN_TEXT 0.000000, __IMP_FROM_NOTSELF 0.000000, __INBOUND_SOPHOS_EU_WEST_1 0.000000, __JSON_HAS_MODELS 0.000000, __JSON_HAS_SCHEMA_VERSION 0.000000, __JSON_HAS_SENDER_AUTH 0.000000, __JSON_HAS_TENANT_DOMAINS 0.000000, __JSON_HAS_TENANT_ID 0.000000, __JSON_HAS_TENANT_SCHEMA_VERSION 0.000000, __JSON_HAS_TENANT_VIPS 0.000000, __JSON_HAS_TRACKING_ID 0.000000, __MIME_ATTACHMENT_1_N 0.000000, __MIME_ATTACHMENT_N_2 0.000000, __MIME_ATTACHMENT_N_3 0.000000, __MIME_ATTACHMENT_N_4 0.000000, __MIME_BOUND_NMP 0.000000, __MIME_HTML 0.000000, __MIME_TEXT_H 0.000000, __MIME_TEXT_H1 0.000000, __MIME_TEXT_H2 0.000000, __MIME_VERSION 0.000000, __MTHREAT_0 0.000000, __MTL_0 0.000000, __MULTIPLE_URI_HTML 0.000000, __MULTIPLE_URI_TEXT 0.000000, __PART_TYPE_HTML 0.000000, __PASSWORD_IN_BODY 0.000000, __PHISH_PHRASE10 0.000000, __PHISH_SPEAR_NEGATE 0.000000, __PHISH_SPEAR_PASSWORD_1 0.000000, __PHISH_SPEAR_PASSWORD_2 0.000000, __PNG_AR_1 0.000000, __PNG_HEIGHT_100 0.000000, __PNG_WIDTH_100 0.000000, __RCVD_PASS 0.000000, __SANE_MSGID 0.000000, __SCAN_DETAILS 0.000000, __SCAN_DETAILS_SANE 0.000000, __SCAN_DETAILS_TL_0 0.000000, __SUBJ_ALPHA_END 0.000000, __SUBJ_SHORT 0.000000, __SUBJ_TRANSACTIONAL 0.000000, __SUBJ_TR_GEN 0.000000, __TAG_EXISTS_BODY 0.000000, __TO_MALFORMED_2 0.000000, __TO_NO_NAME 0.000000, __URI_ENDS_IN_SLASH 0.000000, __URI_IN_BODY 0.000000, __URI_MAILTO 0.000000, __URI_NOT_IMG 0.000000, __URI_NS 0.000000, __URI_WITHOUT_PATH 0.000000, __URI_WITH_PATH 0.000000, __X_FF_ASR_SCL_NSP 0.000000, __X_FF_ASR_SFV_NSPM 0.000000
                    X-LASED-ImpersonationFalse
                    X-LASED-SpamNonSpam
                    X-Sophos-MH-Mail-Info-KeyNFkzSnk4NU5QenpqV3dMLTE3Mi4xOS4xLjQ4
                    Return-Path 010b019391f6a7a5-5fa7ec64-1a39-442d-9087-a8f28fc6355d-000000@eu-west-2.amazonses.com
                    X-MS-Exchange-Organization-ExpirationStartTime04 Dec 2024 13:58:09.2536 (UTC)
                    X-MS-Exchange-Organization-ExpirationStartTimeReasonOriginalSubmit
                    X-MS-Exchange-Organization-ExpirationInterval1:00:00:00.0000000
                    X-MS-Exchange-Organization-ExpirationIntervalReasonOriginalSubmit
                    X-MS-Exchange-Organization-Network-Message-Id 92249eb6-9bf6-4dfe-6463-08dd146baf5b
                    X-MS-Exchange-Organization-MessageDirectionalityIncoming
                    X-MS-Exchange-Transport-CrossTenantHeadersStripped DB5PEPF00014B89.eurprd02.prod.outlook.com
                    X-MS-PublicTrafficTypeEmail
                    X-MS-Exchange-Organization-AuthSource DB5PEPF00014B89.eurprd02.prod.outlook.com
                    X-MS-Exchange-Organization-AuthAsAnonymous
                    X-MS-Office365-Filtering-Correlation-Id-Prvs 4d14ab09-c11d-408a-5554-08dd146baaee
                    X-MS-Exchange-Organization-SCL-1
                    X-Microsoft-Antispam BCL:0;ARA:13230040|5073199012|22003199012|4073199012|32142699015|5063199012|35042699022|12012899012|2092899012|5062899012|3072899012|7053199007|8096899003|136100200026;
                    X-Forefront-Antispam-Report CIP:198.154.180.201;CTRY:US;LANG:en;SCL:-1;SRV:;IPV:NLI;SFV:SKN;H:mfid-euw1.prod.hydra.sophos.com;PTR:mfid-euw1.prod.hydra.sophos.com;CAT:NONE;SFS:(13230040)(5073199012)(22003199012)(4073199012)(32142699015)(5063199012)(35042699022)(12012899012)(2092899012)(5062899012)(3072899012)(7053199007)(8096899003)(136100200026);DIR:INB;
                    X-MS-Exchange-CrossTenant-OriginalArrivalTime04 Dec 2024 13:58:09.1286 (UTC)
                    X-MS-Exchange-CrossTenant-Network-Message-Id92249eb6-9bf6-4dfe-6463-08dd146baf5b
                    X-MS-Exchange-CrossTenant-Id7956b84e-0c99-46b5-81c6-28689cfa7221
                    X-MS-Exchange-CrossTenant-AuthSource DB5PEPF00014B89.eurprd02.prod.outlook.com
                    X-MS-Exchange-CrossTenant-AuthAsAnonymous
                    X-MS-Exchange-CrossTenant-FromEntityHeaderInternet
                    X-MS-Exchange-Transport-EndToEndLatency00:00:09.7734927
                    X-MS-Exchange-Processed-By-BccFoldering15.20.8207.017
                    X-Microsoft-Antispam-Mailbox-Delivery ucf:0;jmr:0;auth:0;dest:I;ENG:(910001)(944506478)(944626604)(920097)(930097)(140003);
                    X-Microsoft-Antispam-Message-Info ROAyTpRCJ9vX4dxHyyLE3jCEGQMy5UDY+W3Fvle3MBiVS3yK3cdKbnDN+Fz5+wemUM9bzzgj1Qr/wtNb13KuShFM4SSQjRjY5//wGU/3S6pCBSluymB6fx5A38EguyXitWurjinGRStokoB4g1NVGytHrJI3cGlmDJS6fcNCIvFGqAwRPXx+PhMZw6uLTZPse54vxa2EYLZ7L6roCxZfTxmNX+GugZWWBneQ/WurvICoE0RhmbZVrtX2uAmNKOeDHjaBeB4HBsFdWBXqNUezZMm7hwQXirXuYY84k//PTfM/p3khKfKX5l61qW2ovsTyENhp3VJzxTwyWN1uBx2DKC5Y56DYVM0HK+whgqD6mqW9NfcrA7dK/gObYi0m9S70A4cJSVCjCYeREpmfj9AL4hBymzCL2GxRbJlN08AJ0IL+v7n3Yd66spD/tOns1Vxeq7I/vmsSPDiWA0mQQ0stUjmRoUT4V+G4QqfekSWVjlUx8b5SUoPqtrWd8OaqOUd3nT45YkzCZoH+A6L713T2TQM68nYwQt7q924n/YAn7IyAwU2IOWau77QOaugFiQehV/FLgMmi/BsZ2NWcUc51XrDQKyqIdtLUznFDW8/QlvjCT0WFLaLuXNC2rrkLPZB3ayclWgmJO54OWDIAX+l0mYy8x64t/kS2ofVIrvjA1du9e3/CEJYJEM84QqvC4WaXHYy1ygjsilrw8S/g1STQNgi23ujT39XMAyzr2vzm9wd1cVDfttyrGXlN2nf7DEilEfnmRywf0qHqcIwKGlJR3SgX+ER5+dvExYWtuq8y5wJq9UGE4i51M2KnmYaQrKDgo5jNYPqi3kAeb6Edmlju3Tq9AYzTWi4visBZ8mtz4Fhp4VGISdd3pwAOcumcR1aLusgM3jBKOI+5pfcjEWgn4dWQQT69IGO8cKbksEGc/43hi1NRpnT5PaiAEgiphwqPZBuA8minfCFeRnbX2fcoK/4tLAsYF03twX+6BOF7y7y18oNpyZ5iwLdX6g5CzD2THwE3UHNCfSIeFNUKMDXDxe+YacqROYpvJQ8KRk9x716Zt0INWsdcDeynhqxd9+6ENCA/D/YwRCBbxjjc7f2Y81IOn72VG/jTw8LF4Pl8as0ZXKHbP58/yh3WluDcXlHVVZTznxxwKcB9mRMenKMoQ9jSb6n7+B8Y+CfGkHr7NQoMmKgT4XHLgAJTj3A2FmkJdNDf+CvUbhdRfijvvOer4eMysRxEJTI5gZvXdwvSQREuFoVFPzDQq5+3iPHMxbmBi/IXtqQWTY8pSsCtVDt7ySMUauEfS55LumW3xrDdN7APjX/GRzpq2G8jbMyEHoCu9OGkPj/6UWSmWPRK5Fmsc9+3X+SuzqMxykuHRh8Eg3ByNci96ygM9li4QmZuFp6BWAg/ZUAp4YIMFzspl92wxpXludxOqFgjTPaA7i6g00mXOga/lK1R8ScCxPXynnH8ZcUZHvu486NW42FCAlYAcqbKwUdpH3FqgrWUO9wVipei/+dswTNTc9u5p+OnaxN/1OGIhBot2ICYgGHN/ROGmMTsSa7DOKFco5XjLyFJsVXDlWIpOEuqew8SIaoo77BbKi0cq6MTLuRapYmQzSYWuAEQ66YUIucdMGIg30en9xCr6QZ4QIjiDnkcwLCJ4/4XlT3cNumifOoQqiT7204hGCJ07vVh9MvIAvL6eNiGrKx/CE67ugwwHpfsjT1QivtTa3SoyuVP8aZN1DO7hec3A6wg1mwcAFMVPmBVJKKOoHxD4vKlQepgI6WoUSi7xAvgmWc5VlCwzH/4SqvAfOhp4OhNzPJXSMFiGq/WcucdtyuyJFtIqSuNHLGBss79uKi69+5hwRVxOFkvOVJvZRtNKV7vXW6dklRzBtWyF1eL3hBih0BM21eX8ZKVmuYcEX0EZZNOySBDjBsc1vVKudzCtOgV3/pORb4r/zM9nhIg1xxlri6A9vPvrUPKODVkSxtfi9yp3xdeX5X4WJ5QMR7Zg2WGRJ+DDplh2WvXdEJr6uZYrnllvRqHMdJW5VUi9G/adFE8CypMrfCQhsOQBlflq6g3vb/OOmX8L5Ldd5dOxjoOyYGkqRF3Dl6/pGbHdZt4NFxmGF6uLhNkoldBbgRlXyjGM7pN14FKdZCbkYY3m2SB/OEX7zNDuHiVoOzoZwTMIGmQHFhDTZqGRlF6covBtOg5x4KmD6+b3McToFmxErcQwVbpln/IcYj/40M7wYJ/3SONJmdygKoLKuwXkPiXNNeojusIU4lQ21KufXqP9rwTJEoeQ99uyHdLsRWOmnXGLNNoSDPFxbvrdYNWIJPj+Nj9nPBxNM9Qy32tnuLlf9qOgEdxIEFTiBuMpOxsB9MCMUbo/9Z5hmvZSjhqrm98WxfOVWcfbVZXzuLa9KPBSXE3ypkJD1YdWxBQMnXwifEcBPGB5O1BoK84KYdgurfGcy1iKDZp1iAjOxtVXnsO9BRdeXid2qrgYjQasMjX/WoGJ2I44f85CsGWI1QPZyBfPVWUdTgDb4Pygjsd8RwcVWXm65dbFpBDl1OZTpVOiRYHIDSe7eCcV/akvhEOES9YzNRXShjCK6VsNm70Dure+uB9V+o57ylEDxcmAypx1sU/WdMI9n4iWnCeLxAzrc2eBD5s0JhFaNE3viohFFDLVCZFLUgjp2JN1JZUYDJGFzlF
                    MIME-Version1.0

                    Icon Hash:46070c0a8e0c67d6