Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
phish_alert_iocp_v1.4.48 - 2024-12-11T151927.331.eml

Overview

General Information

Sample name:phish_alert_iocp_v1.4.48 - 2024-12-11T151927.331.eml
Analysis ID:1573437
MD5:e55b3edf620b2d5a93d9afcffbce138b
SHA1:1a803065c47ffadc7e34eba3155b35a47d12267e
SHA256:4962543d1e673175d8e4be497916f41feb7177b92b434ecd1cb1a414d443382d
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected landing page (webpage, office document or email)
AI detected potential phishing Email
HTML body contains low number of good links
HTML body contains password input but no form action
HTML title does not match URL
Queries the volume information (name, serial number etc) of a device
Sigma detected: Office Autorun Keys Modification
Sigma detected: Suspicious Office Outbound Connections
Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • OUTLOOK.EXE (PID: 6936 cmdline: "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml "C:\Users\user\Desktop\phish_alert_iocp_v1.4.48 - 2024-12-11T151927.331.eml" MD5: 91A5292942864110ED734005B7E005C0)
    • ai.exe (PID: 6260 cmdline: "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "008396C2-7936-45B1-BE99-63D9AC9AB6BA" "AAD41B3B-EA7B-4CA9-8082-74D209EB4D4C" "6936" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx" MD5: EC652BEDD90E089D9406AFED89A8A8BD)
    • chrome.exe (PID: 3664 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://clicktime.cloud.postoffice.net/clicktime.php?U=https://mvadvancement-my.sharepoint.com/:f:/g/personal/ewanner_mvadvancements_org/Elr4An5-W3dKpaplAFapN9oBQntO33Aum0uwc3Qr2tH1GA%3Fe%3D5%253auBc0Zg%26at%3D9&E=sschultz%40firstfedweb.com&X=XID905CLkP5D3070Xd2&T=FF1001&HV=U,E,X,T&H=f2634b391758e2b7b5ed6086be5fe1e72b2f00f1 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
      • chrome.exe (PID: 5712 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=2092,i,12444803471931397500,5083405467017101052,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
    • chrome.exe (PID: 8104 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://clicktime.cloud.postoffice.net/clicktime.php?U=https://mvadvancement-my.sharepoint.com/:f:/g/personal/ewanner_mvadvancements_org/Elr4An5-W3dKpaplAFapN9oBQntO33Aum0uwc3Qr2tH1GA%3Fe%3D5%253auBc0Zg%26at%3D9&E=sschultz%40firstfedweb.com&X=XID905CLkP5D3070Xd2&T=FF1001&HV=U,E,X,T&H=f2634b391758e2b7b5ed6086be5fe1e72b2f00f1 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
      • chrome.exe (PID: 7420 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2076 --field-trial-handle=2012,i,1738063653006714173,4374116596017740249,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
  • cleanup
No yara matches
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE, ProcessId: 6936, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Addins\OneNote.OutlookAddin\1
Source: Network ConnectionAuthor: X__Junior (Nextron Systems): Data: DestinationIp: 1.1.1.1, DestinationIsIpv6: false, DestinationPort: 53, EventID: 3, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE, Initiated: true, ProcessId: 6936, Protocol: tcp, SourceIp: 192.168.2.17, SourceIsIpv6: false, SourcePort: 49713
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

Phishing

barindex
Source: EmailJoe Sandbox AI: Email contains prominent button: 'open'
Source: EmailJoe Sandbox AI: Detected potential phishing email: The email contains a link that uses a URL shortening or redirection service (clicktime.cloud.postoffice.net), which is commonly used in phishing attempts to obscure the final destination.. The email claims to be from a known entity (MV Advancements) but uses an external link that does not directly match the organization's domain, which is suspicious.. The email's language and structure are typical of phishing attempts, attempting to create urgency or importance by sharing a folder.
Source: https://login.microsoftonline.com/0ea53f02-3da3-46dd-95b5-fc7a9f0a3cf3/oauth2/authorize?client%5Fid=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&response%5Fmode=form%5Fpost&response%5Ftype=code%20id%5Ftoken&resource=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&scope=openid&nonce=C6988A7DE21A88BD9A24DE4544CE0B375F4E69B533933F66%2D95C16255A6926278F8BFC7BCAEDA431B400A588A2154C4FB109FF5C66F32BEED&redirect%5Furi=https%3A%2F%2Fmvadvancement%2Dmy%2Esharepoint%2Ecom%2F%5Fforms%2Fdefault%2Easpx&state=OD0w&claims=%7B%22id%5Ftoken%22%3A%7B%22xms%5Fcc%22%3A%7B%22values%22%3A%5B%22CP1%22%5D%7D%7D%7D&wsucxt=1&cobrandid=11bd8083%2D87e0%2D41b5%2Dbb78%2D0bc43c8a8e8a&client%2Drequest%2Did=66a36ca1%2Dd045%2D7000%2D40ed%2D0645ca6da09aHTTP Parser: Number of links: 0
Source: https://login.microsoftonline.com/0ea53f02-3da3-46dd-95b5-fc7a9f0a3cf3/oauth2/authorize?client%5Fid=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&response%5Fmode=form%5Fpost&response%5Ftype=code%20id%5Ftoken&resource=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&scope=openid&nonce=C6988A7DE21A88BD9A24DE4544CE0B375F4E69B533933F66%2D95C16255A6926278F8BFC7BCAEDA431B400A588A2154C4FB109FF5C66F32BEED&redirect%5Furi=https%3A%2F%2Fmvadvancement%2Dmy%2Esharepoint%2Ecom%2F%5Fforms%2Fdefault%2Easpx&state=OD0w&claims=%7B%22id%5Ftoken%22%3A%7B%22xms%5Fcc%22%3A%7B%22values%22%3A%5B%22CP1%22%5D%7D%7D%7D&wsucxt=1&cobrandid=11bd8083%2D87e0%2D41b5%2Dbb78%2D0bc43c8a8e8a&client%2Drequest%2Did=66a36ca1%2Dd045%2D7000%2D40ed%2D0645ca6da09a&sso_reload=trueHTTP Parser: Number of links: 0
Source: https://login.live.com/oauth20_authorize.srf?scope=openid+profile+email+offline_access&response_type=code&client_id=51483342-085c-4d86-bf88-cf50c7252078&response_mode=form_post&redirect_uri=https%3a%2f%2flogin.microsoftonline.com%2fcommon%2ffederation%2foauth2msa&state=rQQIARAApVE7bNNgGLTr1DQhpVGnjijqVHDy27_fqBJ-CmihD4lChVD0-7fdOPUjtd30pS5MjF1YOiAeE12oYIFOTCBlykrFwIgqFaEudCQRC2MlbjjdcDrdd98UxdZYdRL8BWQGzADfZxnsDdQ_SMdLlZfha9_qEe2bp7TVjV7s75PFRhh0vBpOogPyRjPP25lar0cd5HZQjL3Ii3Mm2qplTZR67SSI84Gz3vCTNMrqruej9TCvoay9-YEkeyT5gyQPhtYMUZFlTTItjtVkWTcVjeNNixd43rCADiXB5i1R0QUIFQhtUWQUwWBFThA0UeFETpJtWbcNSTc0y9R4yOo8AJrQj-RYgTd4W2eBYtuCIYo25HTLMo-Hxua09bzJDShJg23vbKg46NhoJ1m-TxXmTLBxQF1opnd9m4cE6AOOgS6CDC-6br-hIzA-lpDiAwSxD7sUnbS9OHB7BfKkUAaUOjJSqhATxFXivEC-Gu6PvTTx7Xm3pRrvt94UPs4XiO5wfcGUgBMvtmxuoTmXzWYzaw9dQc_t1dbd8H4ighV0zZ_dslewhqclld2jyT2aPqKLI1SFqFLGPPuLJp9eIo6K__Oq3mXysEwel9lSESdOimI3cMcnWdZxZSBDRpY8wPBs_17HkWQGOJiHWEayJ6PjMl-icYiCKBuf2qkGbiNPVr24qu5UN6OsgfFAdVC47mVV9VG137f6eHd398nohdI_jRLnV36ffn329svnn7dOxq6HrT...HTTP Parser: <input type="password" .../> found but no <form action="...
Source: https://login.live.com/ppsecure/post.srf?username=vbcvbcvbcvbcvbc&client_id=51483342-085c-4d86-bf88-cf50c7252078&cobrandid=11bd8083-87e0-41b5-bb78-0bc43c8a8e8a&contextid=E8B9FA621D61BC1E&opid=3BF2AEABA02B697A&bk=1733959495&uaid=66a36ca1d045700040ed0645ca6da09a&pid=15216HTTP Parser: <input type="password" .../> found but no <form action="...
Source: https://login.microsoftonline.com/0ea53f02-3da3-46dd-95b5-fc7a9f0a3cf3/oauth2/authorize?client%5Fid=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&response%5Fmode=form%5Fpost&response%5Ftype=code%20id%5Ftoken&resource=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&scope=openid&nonce=C6988A7DE21A88BD9A24DE4544CE0B375F4E69B533933F66%2D95C16255A6926278F8BFC7BCAEDA431B400A588A2154C4FB109FF5C66F32BEED&redirect%5Furi=https%3A%2F%2Fmvadvancement%2Dmy%2Esharepoint%2Ecom%2F%5Fforms%2Fdefault%2Easpx&state=OD0w&claims=%7B%22id%5Ftoken%22%3A%7B%22xms%5Fcc%22%3A%7B%22values%22%3A%5B%22CP1%22%5D%7D%7D%7D&wsucxt=1&cobrandid=11bd8083%2D87e0%2D41b5%2Dbb78%2D0bc43c8a8e8a&client%2Drequest%2Did=66a36ca1%2Dd045%2D7000%2D40ed%2D0645ca6da09aHTTP Parser: Title: Redirecting does not match URL
Source: https://login.microsoftonline.com/0ea53f02-3da3-46dd-95b5-fc7a9f0a3cf3/oauth2/authorize?client%5Fid=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&response%5Fmode=form%5Fpost&response%5Ftype=code%20id%5Ftoken&resource=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&scope=openid&nonce=C6988A7DE21A88BD9A24DE4544CE0B375F4E69B533933F66%2D95C16255A6926278F8BFC7BCAEDA431B400A588A2154C4FB109FF5C66F32BEED&redirect%5Furi=https%3A%2F%2Fmvadvancement%2Dmy%2Esharepoint%2Ecom%2F%5Fforms%2Fdefault%2Easpx&state=OD0w&claims=%7B%22id%5Ftoken%22%3A%7B%22xms%5Fcc%22%3A%7B%22values%22%3A%5B%22CP1%22%5D%7D%7D%7D&wsucxt=1&cobrandid=11bd8083%2D87e0%2D41b5%2Dbb78%2D0bc43c8a8e8a&client%2Drequest%2Did=66a36ca1%2Dd045%2D7000%2D40ed%2D0645ca6da09a&sso_reload=trueHTTP Parser: Title: Sign in to your account does not match URL
Source: https://login.live.com/oauth20_authorize.srf?scope=openid+profile+email+offline_access&response_type=code&client_id=51483342-085c-4d86-bf88-cf50c7252078&response_mode=form_post&redirect_uri=https%3a%2f%2flogin.microsoftonline.com%2fcommon%2ffederation%2foauth2msa&state=rQQIARAApVE7bNNgGLTr1DQhpVGnjijqVHDy27_fqBJ-CmihD4lChVD0-7fdOPUjtd30pS5MjF1YOiAeE12oYIFOTCBlykrFwIgqFaEudCQRC2MlbjjdcDrdd98UxdZYdRL8BWQGzADfZxnsDdQ_SMdLlZfha9_qEe2bp7TVjV7s75PFRhh0vBpOogPyRjPP25lar0cd5HZQjL3Ii3Mm2qplTZR67SSI84Gz3vCTNMrqruej9TCvoay9-YEkeyT5gyQPhtYMUZFlTTItjtVkWTcVjeNNixd43rCADiXB5i1R0QUIFQhtUWQUwWBFThA0UeFETpJtWbcNSTc0y9R4yOo8AJrQj-RYgTd4W2eBYtuCIYo25HTLMo-Hxua09bzJDShJg23vbKg46NhoJ1m-TxXmTLBxQF1opnd9m4cE6AOOgS6CDC-6br-hIzA-lpDiAwSxD7sUnbS9OHB7BfKkUAaUOjJSqhATxFXivEC-Gu6PvTTx7Xm3pRrvt94UPs4XiO5wfcGUgBMvtmxuoTmXzWYzaw9dQc_t1dbd8H4ighV0zZ_dslewhqclld2jyT2aPqKLI1SFqFLGPPuLJp9eIo6K__Oq3mXysEwel9lSESdOimI3cMcnWdZxZSBDRpY8wPBs_17HkWQGOJiHWEayJ6PjMl-icYiCKBuf2qkGbiNPVr24qu5UN6OsgfFAdVC47mVV9VG137f6eHd398nohdI_jRLnV36ffn329svnn7dOxq6HrT...HTTP Parser: Title: Sign in to your Microsoft account does not match URL
Source: https://login.live.com/ppsecure/post.srf?username=vbcvbcvbcvbcvbc&client_id=51483342-085c-4d86-bf88-cf50c7252078&cobrandid=11bd8083-87e0-41b5-bb78-0bc43c8a8e8a&contextid=E8B9FA621D61BC1E&opid=3BF2AEABA02B697A&bk=1733959495&uaid=66a36ca1d045700040ed0645ca6da09a&pid=15216HTTP Parser: Title: Sign in to your Microsoft account does not match URL
Source: EmailClassification: Credential Stealer
Source: https://login.live.com/oauth20_authorize.srf?scope=openid+profile+email+offline_access&response_type=code&client_id=51483342-085c-4d86-bf88-cf50c7252078&response_mode=form_post&redirect_uri=https%3a%2f%2flogin.microsoftonline.com%2fcommon%2ffederation%2foauth2msa&state=rQQIARAApVE7bNNgGLTr1DQhpVGnjijqVHDy27_fqBJ-CmihD4lChVD0-7fdOPUjtd30pS5MjF1YOiAeE12oYIFOTCBlykrFwIgqFaEudCQRC2MlbjjdcDrdd98UxdZYdRL8BWQGzADfZxnsDdQ_SMdLlZfha9_qEe2bp7TVjV7s75PFRhh0vBpOogPyRjPP25lar0cd5HZQjL3Ii3Mm2qplTZR67SSI84Gz3vCTNMrqruej9TCvoay9-YEkeyT5gyQPhtYMUZFlTTItjtVkWTcVjeNNixd43rCADiXB5i1R0QUIFQhtUWQUwWBFThA0UeFETpJtWbcNSTc0y9R4yOo8AJrQj-RYgTd4W2eBYtuCIYo25HTLMo-Hxua09bzJDShJg23vbKg46NhoJ1m-TxXmTLBxQF1opnd9m4cE6AOOgS6CDC-6br-hIzA-lpDiAwSxD7sUnbS9OHB7BfKkUAaUOjJSqhATxFXivEC-Gu6PvTTx7Xm3pRrvt94UPs4XiO5wfcGUgBMvtmxuoTmXzWYzaw9dQc_t1dbd8H4ighV0zZ_dslewhqclld2jyT2aPqKLI1SFqFLGPPuLJp9eIo6K__Oq3mXysEwel9lSESdOimI3cMcnWdZxZSBDRpY8wPBs_17HkWQGOJiHWEayJ6PjMl-icYiCKBuf2qkGbiNPVr24qu5UN6OsgfFAdVC47mVV9VG137f6eHd398nohdI_jRLnV36ffn329svnn7dOxq6HrT...HTTP Parser: Iframe src: https://fpt.live.com?session_id=66a36ca1d045700040ed0645ca6da09a&CustomerId=33e01921-4d64-4f8c-a055-5bdaffd5e33d&PageId=SI
Source: https://login.live.com/oauth20_authorize.srf?scope=openid+profile+email+offline_access&response_type=code&client_id=51483342-085c-4d86-bf88-cf50c7252078&response_mode=form_post&redirect_uri=https%3a%2f%2flogin.microsoftonline.com%2fcommon%2ffederation%2foauth2msa&state=rQQIARAApVE7bNNgGLTr1DQhpVGnjijqVHDy27_fqBJ-CmihD4lChVD0-7fdOPUjtd30pS5MjF1YOiAeE12oYIFOTCBlykrFwIgqFaEudCQRC2MlbjjdcDrdd98UxdZYdRL8BWQGzADfZxnsDdQ_SMdLlZfha9_qEe2bp7TVjV7s75PFRhh0vBpOogPyRjPP25lar0cd5HZQjL3Ii3Mm2qplTZR67SSI84Gz3vCTNMrqruej9TCvoay9-YEkeyT5gyQPhtYMUZFlTTItjtVkWTcVjeNNixd43rCADiXB5i1R0QUIFQhtUWQUwWBFThA0UeFETpJtWbcNSTc0y9R4yOo8AJrQj-RYgTd4W2eBYtuCIYo25HTLMo-Hxua09bzJDShJg23vbKg46NhoJ1m-TxXmTLBxQF1opnd9m4cE6AOOgS6CDC-6br-hIzA-lpDiAwSxD7sUnbS9OHB7BfKkUAaUOjJSqhATxFXivEC-Gu6PvTTx7Xm3pRrvt94UPs4XiO5wfcGUgBMvtmxuoTmXzWYzaw9dQc_t1dbd8H4ighV0zZ_dslewhqclld2jyT2aPqKLI1SFqFLGPPuLJp9eIo6K__Oq3mXysEwel9lSESdOimI3cMcnWdZxZSBDRpY8wPBs_17HkWQGOJiHWEayJ6PjMl-icYiCKBuf2qkGbiNPVr24qu5UN6OsgfFAdVC47mVV9VG137f6eHd398nohdI_jRLnV36ffn329svnn7dOxq6HrT...HTTP Parser: Iframe src: https://fpt.live.com?session_id=66a36ca1d045700040ed0645ca6da09a&CustomerId=33e01921-4d64-4f8c-a055-5bdaffd5e33d&PageId=SI
Source: https://login.live.com/ppsecure/post.srf?username=vbcvbcvbcvbcvbc&client_id=51483342-085c-4d86-bf88-cf50c7252078&cobrandid=11bd8083-87e0-41b5-bb78-0bc43c8a8e8a&contextid=E8B9FA621D61BC1E&opid=3BF2AEABA02B697A&bk=1733959495&uaid=66a36ca1d045700040ed0645ca6da09a&pid=15216HTTP Parser: Iframe src: https://fpt.live.com?session_id=66a36ca1d045700040ed0645ca6da09a&CustomerId=33e01921-4d64-4f8c-a055-5bdaffd5e33d&PageId=SI
Source: https://login.live.com/ppsecure/post.srf?username=vbcvbcvbcvbcvbc&client_id=51483342-085c-4d86-bf88-cf50c7252078&cobrandid=11bd8083-87e0-41b5-bb78-0bc43c8a8e8a&contextid=E8B9FA621D61BC1E&opid=3BF2AEABA02B697A&bk=1733959495&uaid=66a36ca1d045700040ed0645ca6da09a&pid=15216HTTP Parser: Iframe src: https://fpt.live.com?session_id=66a36ca1d045700040ed0645ca6da09a&CustomerId=33e01921-4d64-4f8c-a055-5bdaffd5e33d&PageId=SI
Source: https://login.microsoftonline.com/0ea53f02-3da3-46dd-95b5-fc7a9f0a3cf3/oauth2/authorize?client%5Fid=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&response%5Fmode=form%5Fpost&response%5Ftype=code%20id%5Ftoken&resource=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&scope=openid&nonce=C6988A7DE21A88BD9A24DE4544CE0B375F4E69B533933F66%2D95C16255A6926278F8BFC7BCAEDA431B400A588A2154C4FB109FF5C66F32BEED&redirect%5Furi=https%3A%2F%2Fmvadvancement%2Dmy%2Esharepoint%2Ecom%2F%5Fforms%2Fdefault%2Easpx&state=OD0w&claims=%7B%22id%5Ftoken%22%3A%7B%22xms%5Fcc%22%3A%7B%22values%22%3A%5B%22CP1%22%5D%7D%7D%7D&wsucxt=1&cobrandid=11bd8083%2D87e0%2D41b5%2Dbb78%2D0bc43c8a8e8a&client%2Drequest%2Did=66a36ca1%2Dd045%2D7000%2D40ed%2D0645ca6da09a&sso_reload=trueHTTP Parser: <input type="password" .../> found
Source: https://login.live.com/oauth20_authorize.srf?scope=openid+profile+email+offline_access&response_type=code&client_id=51483342-085c-4d86-bf88-cf50c7252078&response_mode=form_post&redirect_uri=https%3a%2f%2flogin.microsoftonline.com%2fcommon%2ffederation%2foauth2msa&state=rQQIARAApVE7bNNgGLTr1DQhpVGnjijqVHDy27_fqBJ-CmihD4lChVD0-7fdOPUjtd30pS5MjF1YOiAeE12oYIFOTCBlykrFwIgqFaEudCQRC2MlbjjdcDrdd98UxdZYdRL8BWQGzADfZxnsDdQ_SMdLlZfha9_qEe2bp7TVjV7s75PFRhh0vBpOogPyRjPP25lar0cd5HZQjL3Ii3Mm2qplTZR67SSI84Gz3vCTNMrqruej9TCvoay9-YEkeyT5gyQPhtYMUZFlTTItjtVkWTcVjeNNixd43rCADiXB5i1R0QUIFQhtUWQUwWBFThA0UeFETpJtWbcNSTc0y9R4yOo8AJrQj-RYgTd4W2eBYtuCIYo25HTLMo-Hxua09bzJDShJg23vbKg46NhoJ1m-TxXmTLBxQF1opnd9m4cE6AOOgS6CDC-6br-hIzA-lpDiAwSxD7sUnbS9OHB7BfKkUAaUOjJSqhATxFXivEC-Gu6PvTTx7Xm3pRrvt94UPs4XiO5wfcGUgBMvtmxuoTmXzWYzaw9dQc_t1dbd8H4ighV0zZ_dslewhqclld2jyT2aPqKLI1SFqFLGPPuLJp9eIo6K__Oq3mXysEwel9lSESdOimI3cMcnWdZxZSBDRpY8wPBs_17HkWQGOJiHWEayJ6PjMl-icYiCKBuf2qkGbiNPVr24qu5UN6OsgfFAdVC47mVV9VG137f6eHd398nohdI_jRLnV36ffn329svnn7dOxq6HrT...HTTP Parser: <input type="password" .../> found
Source: https://login.live.com/ppsecure/post.srf?username=vbcvbcvbcvbcvbc&client_id=51483342-085c-4d86-bf88-cf50c7252078&cobrandid=11bd8083-87e0-41b5-bb78-0bc43c8a8e8a&contextid=E8B9FA621D61BC1E&opid=3BF2AEABA02B697A&bk=1733959495&uaid=66a36ca1d045700040ed0645ca6da09a&pid=15216HTTP Parser: <input type="password" .../> found
Source: https://clicktime.cloud.postoffice.net/clicktime.php?U=https://mvadvancement-my.sharepoint.com/:f:/g/personal/ewanner_mvadvancements_org/Elr4An5-W3dKpaplAFapN9oBQntO33Aum0uwc3Qr2tH1GA%3Fe%3D5%253auBc0Zg%26at%3D9&E=sschultz%40firstfedweb.com&X=XID905CLkP5D3070Xd2&T=FF1001&HV=U,E,X,T&H=f2634b391758e2b7b5ed6086be5fe1e72b2f00f1HTTP Parser: No favicon
Source: https://clicktime.cloud.postoffice.net/clicktime.php?U=https://mvadvancement-my.sharepoint.com/:f:/g/personal/ewanner_mvadvancements_org/Elr4An5-W3dKpaplAFapN9oBQntO33Aum0uwc3Qr2tH1GA%3Fe%3D5%253auBc0Zg%26at%3D9&E=sschultz%40firstfedweb.com&X=XID905CLkP5D3070Xd2&T=FF1001&HV=U,E,X,T&H=f2634b391758e2b7b5ed6086be5fe1e72b2f00f1HTTP Parser: No favicon
Source: https://clicktime.cloud.postoffice.net/clicktime.php?U=https://mvadvancement-my.sharepoint.com/:f:/g/personal/ewanner_mvadvancements_org/Elr4An5-W3dKpaplAFapN9oBQntO33Aum0uwc3Qr2tH1GA%3Fe%3D5%253auBc0Zg%26at%3D9&E=sschultz%40firstfedweb.com&X=XID905CLkP5D3070Xd2&T=FF1001&HV=U,E,X,T&H=f2634b391758e2b7b5ed6086be5fe1e72b2f00f1HTTP Parser: No favicon
Source: https://login.microsoftonline.com/0ea53f02-3da3-46dd-95b5-fc7a9f0a3cf3/oauth2/authorize?client%5Fid=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&response%5Fmode=form%5Fpost&response%5Ftype=code%20id%5Ftoken&resource=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&scope=openid&nonce=C6988A7DE21A88BD9A24DE4544CE0B375F4E69B533933F66%2D95C16255A6926278F8BFC7BCAEDA431B400A588A2154C4FB109FF5C66F32BEED&redirect%5Furi=https%3A%2F%2Fmvadvancement%2Dmy%2Esharepoint%2Ecom%2F%5Fforms%2Fdefault%2Easpx&state=OD0w&claims=%7B%22id%5Ftoken%22%3A%7B%22xms%5Fcc%22%3A%7B%22values%22%3A%5B%22CP1%22%5D%7D%7D%7D&wsucxt=1&cobrandid=11bd8083%2D87e0%2D41b5%2Dbb78%2D0bc43c8a8e8a&client%2Drequest%2Did=66a36ca1%2Dd045%2D7000%2D40ed%2D0645ca6da09aHTTP Parser: No favicon
Source: https://login.live.com/oauth20_authorize.srf?scope=openid+profile+email+offline_access&response_type=code&client_id=51483342-085c-4d86-bf88-cf50c7252078&response_mode=form_post&redirect_uri=https%3a%2f%2flogin.microsoftonline.com%2fcommon%2ffederation%2foauth2msa&state=rQQIARAApVE7bNNgGLTr1DQhpVGnjijqVHDy27_fqBJ-CmihD4lChVD0-7fdOPUjtd30pS5MjF1YOiAeE12oYIFOTCBlykrFwIgqFaEudCQRC2MlbjjdcDrdd98UxdZYdRL8BWQGzADfZxnsDdQ_SMdLlZfha9_qEe2bp7TVjV7s75PFRhh0vBpOogPyRjPP25lar0cd5HZQjL3Ii3Mm2qplTZR67SSI84Gz3vCTNMrqruej9TCvoay9-YEkeyT5gyQPhtYMUZFlTTItjtVkWTcVjeNNixd43rCADiXB5i1R0QUIFQhtUWQUwWBFThA0UeFETpJtWbcNSTc0y9R4yOo8AJrQj-RYgTd4W2eBYtuCIYo25HTLMo-Hxua09bzJDShJg23vbKg46NhoJ1m-TxXmTLBxQF1opnd9m4cE6AOOgS6CDC-6br-hIzA-lpDiAwSxD7sUnbS9OHB7BfKkUAaUOjJSqhATxFXivEC-Gu6PvTTx7Xm3pRrvt94UPs4XiO5wfcGUgBMvtmxuoTmXzWYzaw9dQc_t1dbd8H4ighV0zZ_dslewhqclld2jyT2aPqKLI1SFqFLGPPuLJp9eIo6K__Oq3mXysEwel9lSESdOimI3cMcnWdZxZSBDRpY8wPBs_17HkWQGOJiHWEayJ6PjMl-icYiCKBuf2qkGbiNPVr24qu5UN6OsgfFAdVC47mVV9VG137f6eHd398nohdI_jRLnV36ffn329svnn7dOxq6HrT...HTTP Parser: No favicon
Source: https://login.microsoftonline.com/0ea53f02-3da3-46dd-95b5-fc7a9f0a3cf3/oauth2/authorize?client%5Fid=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&response%5Fmode=form%5Fpost&response%5Ftype=code%20id%5Ftoken&resource=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&scope=openid&nonce=C6988A7DE21A88BD9A24DE4544CE0B375F4E69B533933F66%2D95C16255A6926278F8BFC7BCAEDA431B400A588A2154C4FB109FF5C66F32BEED&redirect%5Furi=https%3A%2F%2Fmvadvancement%2Dmy%2Esharepoint%2Ecom%2F%5Fforms%2Fdefault%2Easpx&state=OD0w&claims=%7B%22id%5Ftoken%22%3A%7B%22xms%5Fcc%22%3A%7B%22values%22%3A%5B%22CP1%22%5D%7D%7D%7D&wsucxt=1&cobrandid=11bd8083%2D87e0%2D41b5%2Dbb78%2D0bc43c8a8e8a&client%2Drequest%2Did=66a36ca1%2Dd045%2D7000%2D40ed%2D0645ca6da09aHTTP Parser: No <meta name="author".. found
Source: https://login.microsoftonline.com/0ea53f02-3da3-46dd-95b5-fc7a9f0a3cf3/oauth2/authorize?client%5Fid=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&response%5Fmode=form%5Fpost&response%5Ftype=code%20id%5Ftoken&resource=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&scope=openid&nonce=C6988A7DE21A88BD9A24DE4544CE0B375F4E69B533933F66%2D95C16255A6926278F8BFC7BCAEDA431B400A588A2154C4FB109FF5C66F32BEED&redirect%5Furi=https%3A%2F%2Fmvadvancement%2Dmy%2Esharepoint%2Ecom%2F%5Fforms%2Fdefault%2Easpx&state=OD0w&claims=%7B%22id%5Ftoken%22%3A%7B%22xms%5Fcc%22%3A%7B%22values%22%3A%5B%22CP1%22%5D%7D%7D%7D&wsucxt=1&cobrandid=11bd8083%2D87e0%2D41b5%2Dbb78%2D0bc43c8a8e8a&client%2Drequest%2Did=66a36ca1%2Dd045%2D7000%2D40ed%2D0645ca6da09a&sso_reload=trueHTTP Parser: No <meta name="author".. found
Source: https://login.microsoftonline.com/0ea53f02-3da3-46dd-95b5-fc7a9f0a3cf3/oauth2/authorize?client%5Fid=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&response%5Fmode=form%5Fpost&response%5Ftype=code%20id%5Ftoken&resource=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&scope=openid&nonce=C6988A7DE21A88BD9A24DE4544CE0B375F4E69B533933F66%2D95C16255A6926278F8BFC7BCAEDA431B400A588A2154C4FB109FF5C66F32BEED&redirect%5Furi=https%3A%2F%2Fmvadvancement%2Dmy%2Esharepoint%2Ecom%2F%5Fforms%2Fdefault%2Easpx&state=OD0w&claims=%7B%22id%5Ftoken%22%3A%7B%22xms%5Fcc%22%3A%7B%22values%22%3A%5B%22CP1%22%5D%7D%7D%7D&wsucxt=1&cobrandid=11bd8083%2D87e0%2D41b5%2Dbb78%2D0bc43c8a8e8a&client%2Drequest%2Did=66a36ca1%2Dd045%2D7000%2D40ed%2D0645ca6da09a&sso_reload=trueHTTP Parser: No <meta name="author".. found
Source: https://login.microsoftonline.com/0ea53f02-3da3-46dd-95b5-fc7a9f0a3cf3/oauth2/authorize?client%5Fid=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&response%5Fmode=form%5Fpost&response%5Ftype=code%20id%5Ftoken&resource=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&scope=openid&nonce=C6988A7DE21A88BD9A24DE4544CE0B375F4E69B533933F66%2D95C16255A6926278F8BFC7BCAEDA431B400A588A2154C4FB109FF5C66F32BEED&redirect%5Furi=https%3A%2F%2Fmvadvancement%2Dmy%2Esharepoint%2Ecom%2F%5Fforms%2Fdefault%2Easpx&state=OD0w&claims=%7B%22id%5Ftoken%22%3A%7B%22xms%5Fcc%22%3A%7B%22values%22%3A%5B%22CP1%22%5D%7D%7D%7D&wsucxt=1&cobrandid=11bd8083%2D87e0%2D41b5%2Dbb78%2D0bc43c8a8e8a&client%2Drequest%2Did=66a36ca1%2Dd045%2D7000%2D40ed%2D0645ca6da09a&sso_reload=trueHTTP Parser: No <meta name="author".. found
Source: https://login.microsoftonline.com/0ea53f02-3da3-46dd-95b5-fc7a9f0a3cf3/oauth2/authorize?client%5Fid=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&response%5Fmode=form%5Fpost&response%5Ftype=code%20id%5Ftoken&resource=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&scope=openid&nonce=C6988A7DE21A88BD9A24DE4544CE0B375F4E69B533933F66%2D95C16255A6926278F8BFC7BCAEDA431B400A588A2154C4FB109FF5C66F32BEED&redirect%5Furi=https%3A%2F%2Fmvadvancement%2Dmy%2Esharepoint%2Ecom%2F%5Fforms%2Fdefault%2Easpx&state=OD0w&claims=%7B%22id%5Ftoken%22%3A%7B%22xms%5Fcc%22%3A%7B%22values%22%3A%5B%22CP1%22%5D%7D%7D%7D&wsucxt=1&cobrandid=11bd8083%2D87e0%2D41b5%2Dbb78%2D0bc43c8a8e8a&client%2Drequest%2Did=66a36ca1%2Dd045%2D7000%2D40ed%2D0645ca6da09a&sso_reload=trueHTTP Parser: No <meta name="author".. found
Source: https://login.live.com/oauth20_authorize.srf?scope=openid+profile+email+offline_access&response_type=code&client_id=51483342-085c-4d86-bf88-cf50c7252078&response_mode=form_post&redirect_uri=https%3a%2f%2flogin.microsoftonline.com%2fcommon%2ffederation%2foauth2msa&state=rQQIARAApVE7bNNgGLTr1DQhpVGnjijqVHDy27_fqBJ-CmihD4lChVD0-7fdOPUjtd30pS5MjF1YOiAeE12oYIFOTCBlykrFwIgqFaEudCQRC2MlbjjdcDrdd98UxdZYdRL8BWQGzADfZxnsDdQ_SMdLlZfha9_qEe2bp7TVjV7s75PFRhh0vBpOogPyRjPP25lar0cd5HZQjL3Ii3Mm2qplTZR67SSI84Gz3vCTNMrqruej9TCvoay9-YEkeyT5gyQPhtYMUZFlTTItjtVkWTcVjeNNixd43rCADiXB5i1R0QUIFQhtUWQUwWBFThA0UeFETpJtWbcNSTc0y9R4yOo8AJrQj-RYgTd4W2eBYtuCIYo25HTLMo-Hxua09bzJDShJg23vbKg46NhoJ1m-TxXmTLBxQF1opnd9m4cE6AOOgS6CDC-6br-hIzA-lpDiAwSxD7sUnbS9OHB7BfKkUAaUOjJSqhATxFXivEC-Gu6PvTTx7Xm3pRrvt94UPs4XiO5wfcGUgBMvtmxuoTmXzWYzaw9dQc_t1dbd8H4ighV0zZ_dslewhqclld2jyT2aPqKLI1SFqFLGPPuLJp9eIo6K__Oq3mXysEwel9lSESdOimI3cMcnWdZxZSBDRpY8wPBs_17HkWQGOJiHWEayJ6PjMl-icYiCKBuf2qkGbiNPVr24qu5UN6OsgfFAdVC47mVV9VG137f6eHd398nohdI_jRLnV36ffn329svnn7dOxq6HrTHTTP Parser: No <meta name="author".. found
Source: https://login.live.com/oauth20_authorize.srf?scope=openid+profile+email+offline_access&response_type=code&client_id=51483342-085c-4d86-bf88-cf50c7252078&response_mode=form_post&redirect_uri=https%3a%2f%2flogin.microsoftonline.com%2fcommon%2ffederation%2foauth2msa&state=rQQIARAApVE7bNNgGLTr1DQhpVGnjijqVHDy27_fqBJ-CmihD4lChVD0-7fdOPUjtd30pS5MjF1YOiAeE12oYIFOTCBlykrFwIgqFaEudCQRC2MlbjjdcDrdd98UxdZYdRL8BWQGzADfZxnsDdQ_SMdLlZfha9_qEe2bp7TVjV7s75PFRhh0vBpOogPyRjPP25lar0cd5HZQjL3Ii3Mm2qplTZR67SSI84Gz3vCTNMrqruej9TCvoay9-YEkeyT5gyQPhtYMUZFlTTItjtVkWTcVjeNNixd43rCADiXB5i1R0QUIFQhtUWQUwWBFThA0UeFETpJtWbcNSTc0y9R4yOo8AJrQj-RYgTd4W2eBYtuCIYo25HTLMo-Hxua09bzJDShJg23vbKg46NhoJ1m-TxXmTLBxQF1opnd9m4cE6AOOgS6CDC-6br-hIzA-lpDiAwSxD7sUnbS9OHB7BfKkUAaUOjJSqhATxFXivEC-Gu6PvTTx7Xm3pRrvt94UPs4XiO5wfcGUgBMvtmxuoTmXzWYzaw9dQc_t1dbd8H4ighV0zZ_dslewhqclld2jyT2aPqKLI1SFqFLGPPuLJp9eIo6K__Oq3mXysEwel9lSESdOimI3cMcnWdZxZSBDRpY8wPBs_17HkWQGOJiHWEayJ6PjMl-icYiCKBuf2qkGbiNPVr24qu5UN6OsgfFAdVC47mVV9VG137f6eHd398nohdI_jRLnV36ffn329svnn7dOxq6HrTHTTP Parser: No <meta name="author".. found
Source: https://login.live.com/ppsecure/post.srf?username=vbcvbcvbcvbcvbc&client_id=51483342-085c-4d86-bf88-cf50c7252078&cobrandid=11bd8083-87e0-41b5-bb78-0bc43c8a8e8a&contextid=E8B9FA621D61BC1E&opid=3BF2AEABA02B697A&bk=1733959495&uaid=66a36ca1d045700040ed0645ca6da09a&pid=15216HTTP Parser: No <meta name="author".. found
Source: https://login.live.com/ppsecure/post.srf?username=vbcvbcvbcvbcvbc&client_id=51483342-085c-4d86-bf88-cf50c7252078&cobrandid=11bd8083-87e0-41b5-bb78-0bc43c8a8e8a&contextid=E8B9FA621D61BC1E&opid=3BF2AEABA02B697A&bk=1733959495&uaid=66a36ca1d045700040ed0645ca6da09a&pid=15216HTTP Parser: No <meta name="author".. found
Source: https://login.microsoftonline.com/0ea53f02-3da3-46dd-95b5-fc7a9f0a3cf3/oauth2/authorize?client%5Fid=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&response%5Fmode=form%5Fpost&response%5Ftype=code%20id%5Ftoken&resource=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&scope=openid&nonce=C6988A7DE21A88BD9A24DE4544CE0B375F4E69B533933F66%2D95C16255A6926278F8BFC7BCAEDA431B400A588A2154C4FB109FF5C66F32BEED&redirect%5Furi=https%3A%2F%2Fmvadvancement%2Dmy%2Esharepoint%2Ecom%2F%5Fforms%2Fdefault%2Easpx&state=OD0w&claims=%7B%22id%5Ftoken%22%3A%7B%22xms%5Fcc%22%3A%7B%22values%22%3A%5B%22CP1%22%5D%7D%7D%7D&wsucxt=1&cobrandid=11bd8083%2D87e0%2D41b5%2Dbb78%2D0bc43c8a8e8a&client%2Drequest%2Did=66a36ca1%2Dd045%2D7000%2D40ed%2D0645ca6da09aHTTP Parser: No <meta name="copyright".. found
Source: https://login.microsoftonline.com/0ea53f02-3da3-46dd-95b5-fc7a9f0a3cf3/oauth2/authorize?client%5Fid=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&response%5Fmode=form%5Fpost&response%5Ftype=code%20id%5Ftoken&resource=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&scope=openid&nonce=C6988A7DE21A88BD9A24DE4544CE0B375F4E69B533933F66%2D95C16255A6926278F8BFC7BCAEDA431B400A588A2154C4FB109FF5C66F32BEED&redirect%5Furi=https%3A%2F%2Fmvadvancement%2Dmy%2Esharepoint%2Ecom%2F%5Fforms%2Fdefault%2Easpx&state=OD0w&claims=%7B%22id%5Ftoken%22%3A%7B%22xms%5Fcc%22%3A%7B%22values%22%3A%5B%22CP1%22%5D%7D%7D%7D&wsucxt=1&cobrandid=11bd8083%2D87e0%2D41b5%2Dbb78%2D0bc43c8a8e8a&client%2Drequest%2Did=66a36ca1%2Dd045%2D7000%2D40ed%2D0645ca6da09a&sso_reload=trueHTTP Parser: No <meta name="copyright".. found
Source: https://login.microsoftonline.com/0ea53f02-3da3-46dd-95b5-fc7a9f0a3cf3/oauth2/authorize?client%5Fid=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&response%5Fmode=form%5Fpost&response%5Ftype=code%20id%5Ftoken&resource=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&scope=openid&nonce=C6988A7DE21A88BD9A24DE4544CE0B375F4E69B533933F66%2D95C16255A6926278F8BFC7BCAEDA431B400A588A2154C4FB109FF5C66F32BEED&redirect%5Furi=https%3A%2F%2Fmvadvancement%2Dmy%2Esharepoint%2Ecom%2F%5Fforms%2Fdefault%2Easpx&state=OD0w&claims=%7B%22id%5Ftoken%22%3A%7B%22xms%5Fcc%22%3A%7B%22values%22%3A%5B%22CP1%22%5D%7D%7D%7D&wsucxt=1&cobrandid=11bd8083%2D87e0%2D41b5%2Dbb78%2D0bc43c8a8e8a&client%2Drequest%2Did=66a36ca1%2Dd045%2D7000%2D40ed%2D0645ca6da09a&sso_reload=trueHTTP Parser: No <meta name="copyright".. found
Source: https://login.microsoftonline.com/0ea53f02-3da3-46dd-95b5-fc7a9f0a3cf3/oauth2/authorize?client%5Fid=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&response%5Fmode=form%5Fpost&response%5Ftype=code%20id%5Ftoken&resource=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&scope=openid&nonce=C6988A7DE21A88BD9A24DE4544CE0B375F4E69B533933F66%2D95C16255A6926278F8BFC7BCAEDA431B400A588A2154C4FB109FF5C66F32BEED&redirect%5Furi=https%3A%2F%2Fmvadvancement%2Dmy%2Esharepoint%2Ecom%2F%5Fforms%2Fdefault%2Easpx&state=OD0w&claims=%7B%22id%5Ftoken%22%3A%7B%22xms%5Fcc%22%3A%7B%22values%22%3A%5B%22CP1%22%5D%7D%7D%7D&wsucxt=1&cobrandid=11bd8083%2D87e0%2D41b5%2Dbb78%2D0bc43c8a8e8a&client%2Drequest%2Did=66a36ca1%2Dd045%2D7000%2D40ed%2D0645ca6da09a&sso_reload=trueHTTP Parser: No <meta name="copyright".. found
Source: https://login.microsoftonline.com/0ea53f02-3da3-46dd-95b5-fc7a9f0a3cf3/oauth2/authorize?client%5Fid=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&response%5Fmode=form%5Fpost&response%5Ftype=code%20id%5Ftoken&resource=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&scope=openid&nonce=C6988A7DE21A88BD9A24DE4544CE0B375F4E69B533933F66%2D95C16255A6926278F8BFC7BCAEDA431B400A588A2154C4FB109FF5C66F32BEED&redirect%5Furi=https%3A%2F%2Fmvadvancement%2Dmy%2Esharepoint%2Ecom%2F%5Fforms%2Fdefault%2Easpx&state=OD0w&claims=%7B%22id%5Ftoken%22%3A%7B%22xms%5Fcc%22%3A%7B%22values%22%3A%5B%22CP1%22%5D%7D%7D%7D&wsucxt=1&cobrandid=11bd8083%2D87e0%2D41b5%2Dbb78%2D0bc43c8a8e8a&client%2Drequest%2Did=66a36ca1%2Dd045%2D7000%2D40ed%2D0645ca6da09a&sso_reload=trueHTTP Parser: No <meta name="copyright".. found
Source: https://login.live.com/oauth20_authorize.srf?scope=openid+profile+email+offline_access&response_type=code&client_id=51483342-085c-4d86-bf88-cf50c7252078&response_mode=form_post&redirect_uri=https%3a%2f%2flogin.microsoftonline.com%2fcommon%2ffederation%2foauth2msa&state=rQQIARAApVE7bNNgGLTr1DQhpVGnjijqVHDy27_fqBJ-CmihD4lChVD0-7fdOPUjtd30pS5MjF1YOiAeE12oYIFOTCBlykrFwIgqFaEudCQRC2MlbjjdcDrdd98UxdZYdRL8BWQGzADfZxnsDdQ_SMdLlZfha9_qEe2bp7TVjV7s75PFRhh0vBpOogPyRjPP25lar0cd5HZQjL3Ii3Mm2qplTZR67SSI84Gz3vCTNMrqruej9TCvoay9-YEkeyT5gyQPhtYMUZFlTTItjtVkWTcVjeNNixd43rCADiXB5i1R0QUIFQhtUWQUwWBFThA0UeFETpJtWbcNSTc0y9R4yOo8AJrQj-RYgTd4W2eBYtuCIYo25HTLMo-Hxua09bzJDShJg23vbKg46NhoJ1m-TxXmTLBxQF1opnd9m4cE6AOOgS6CDC-6br-hIzA-lpDiAwSxD7sUnbS9OHB7BfKkUAaUOjJSqhATxFXivEC-Gu6PvTTx7Xm3pRrvt94UPs4XiO5wfcGUgBMvtmxuoTmXzWYzaw9dQc_t1dbd8H4ighV0zZ_dslewhqclld2jyT2aPqKLI1SFqFLGPPuLJp9eIo6K__Oq3mXysEwel9lSESdOimI3cMcnWdZxZSBDRpY8wPBs_17HkWQGOJiHWEayJ6PjMl-icYiCKBuf2qkGbiNPVr24qu5UN6OsgfFAdVC47mVV9VG137f6eHd398nohdI_jRLnV36ffn329svnn7dOxq6HrT...HTTP Parser: No <meta name="copyright".. found
Source: https://login.live.com/oauth20_authorize.srf?scope=openid+profile+email+offline_access&response_type=code&client_id=51483342-085c-4d86-bf88-cf50c7252078&response_mode=form_post&redirect_uri=https%3a%2f%2flogin.microsoftonline.com%2fcommon%2ffederation%2foauth2msa&state=rQQIARAApVE7bNNgGLTr1DQhpVGnjijqVHDy27_fqBJ-CmihD4lChVD0-7fdOPUjtd30pS5MjF1YOiAeE12oYIFOTCBlykrFwIgqFaEudCQRC2MlbjjdcDrdd98UxdZYdRL8BWQGzADfZxnsDdQ_SMdLlZfha9_qEe2bp7TVjV7s75PFRhh0vBpOogPyRjPP25lar0cd5HZQjL3Ii3Mm2qplTZR67SSI84Gz3vCTNMrqruej9TCvoay9-YEkeyT5gyQPhtYMUZFlTTItjtVkWTcVjeNNixd43rCADiXB5i1R0QUIFQhtUWQUwWBFThA0UeFETpJtWbcNSTc0y9R4yOo8AJrQj-RYgTd4W2eBYtuCIYo25HTLMo-Hxua09bzJDShJg23vbKg46NhoJ1m-TxXmTLBxQF1opnd9m4cE6AOOgS6CDC-6br-hIzA-lpDiAwSxD7sUnbS9OHB7BfKkUAaUOjJSqhATxFXivEC-Gu6PvTTx7Xm3pRrvt94UPs4XiO5wfcGUgBMvtmxuoTmXzWYzaw9dQc_t1dbd8H4ighV0zZ_dslewhqclld2jyT2aPqKLI1SFqFLGPPuLJp9eIo6K__Oq3mXysEwel9lSESdOimI3cMcnWdZxZSBDRpY8wPBs_17HkWQGOJiHWEayJ6PjMl-icYiCKBuf2qkGbiNPVr24qu5UN6OsgfFAdVC47mVV9VG137f6eHd398nohdI_jRLnV36ffn329svnn7dOxq6HrT...HTTP Parser: No <meta name="copyright".. found
Source: https://login.live.com/ppsecure/post.srf?username=vbcvbcvbcvbcvbc&client_id=51483342-085c-4d86-bf88-cf50c7252078&cobrandid=11bd8083-87e0-41b5-bb78-0bc43c8a8e8a&contextid=E8B9FA621D61BC1E&opid=3BF2AEABA02B697A&bk=1733959495&uaid=66a36ca1d045700040ed0645ca6da09a&pid=15216HTTP Parser: No <meta name="copyright".. found
Source: https://login.live.com/ppsecure/post.srf?username=vbcvbcvbcvbcvbc&client_id=51483342-085c-4d86-bf88-cf50c7252078&cobrandid=11bd8083-87e0-41b5-bb78-0bc43c8a8e8a&contextid=E8B9FA621D61BC1E&opid=3BF2AEABA02B697A&bk=1733959495&uaid=66a36ca1d045700040ed0645ca6da09a&pid=15216HTTP Parser: No <meta name="copyright".. found
Source: unknownHTTPS traffic detected: 4.245.163.56:443 -> 192.168.2.17:49708 version: TLS 1.2
Source: unknownHTTPS traffic detected: 2.18.109.164:443 -> 192.168.2.17:49709 version: TLS 1.2
Source: unknownHTTPS traffic detected: 2.18.109.164:443 -> 192.168.2.17:49712 version: TLS 1.2
Source: unknownHTTPS traffic detected: 4.245.163.56:443 -> 192.168.2.17:49771 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.5.88:443 -> 192.168.2.17:49796 version: TLS 1.2
Source: unknownHTTPS traffic detected: 2.16.158.96:443 -> 192.168.2.17:49797 version: TLS 1.2
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.147.2
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.147.2
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.147.2
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.147.2
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.147.2
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 2.18.109.164
Source: unknownTCP traffic detected without corresponding DNS query: 2.18.109.164
Source: unknownTCP traffic detected without corresponding DNS query: 2.18.109.164
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 2.18.109.164
Source: unknownTCP traffic detected without corresponding DNS query: 2.18.109.164
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 2.18.109.164
Source: unknownTCP traffic detected without corresponding DNS query: 2.18.109.164
Source: unknownTCP traffic detected without corresponding DNS query: 2.18.109.164
Source: unknownTCP traffic detected without corresponding DNS query: 2.18.109.164
Source: unknownTCP traffic detected without corresponding DNS query: 2.18.109.164
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.13
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.147.2
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.147.2
Source: unknownTCP traffic detected without corresponding DNS query: 2.18.109.164
Source: unknownTCP traffic detected without corresponding DNS query: 2.18.109.164
Source: unknownTCP traffic detected without corresponding DNS query: 2.18.109.164
Source: unknownTCP traffic detected without corresponding DNS query: 2.18.109.164
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.13
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.147.2
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.147.2
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.147.2
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.147.2
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.147.2
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.13
Source: unknownTCP traffic detected without corresponding DNS query: 2.18.109.164
Source: global trafficDNS traffic detected: DNS query: clicktime.cloud.postoffice.net
Source: global trafficDNS traffic detected: DNS query: maxcdn.bootstrapcdn.com
Source: global trafficDNS traffic detected: DNS query: cdnjs.cloudflare.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: cloud.postoffice.net
Source: global trafficDNS traffic detected: DNS query: mvadvancement-my.sharepoint.com
Source: global trafficDNS traffic detected: DNS query: m365cdn.nel.measure.office.net
Source: global trafficDNS traffic detected: DNS query: login.microsoftonline.com
Source: global trafficDNS traffic detected: DNS query: aadcdn.msftauth.net
Source: global trafficDNS traffic detected: DNS query: aadcdn.msftauthimages.net
Source: global trafficDNS traffic detected: DNS query: autologon.microsoftazuread-sso.com
Source: global trafficDNS traffic detected: DNS query: identity.nel.measure.office.net
Source: global trafficDNS traffic detected: DNS query: spo.nel.measure.office.net
Source: global trafficDNS traffic detected: DNS query: logincdn.msftauth.net
Source: global trafficDNS traffic detected: DNS query: acctcdn.msftauth.net
Source: global trafficDNS traffic detected: DNS query: fpt.live.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
Source: unknownNetwork traffic detected: HTTP traffic on port 49817 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49864
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49863
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49862
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49861
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49860
Source: unknownNetwork traffic detected: HTTP traffic on port 49789 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49800 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49795 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49859
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49858
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
Source: unknownNetwork traffic detected: HTTP traffic on port 49841 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49812 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49858 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49823 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
Source: unknownNetwork traffic detected: HTTP traffic on port 49790 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49869 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49841
Source: unknownNetwork traffic detected: HTTP traffic on port 49834 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49828 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49839
Source: unknownNetwork traffic detected: HTTP traffic on port 49680 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49836
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49835
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49834
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49833
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49831
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49830
Source: unknownNetwork traffic detected: HTTP traffic on port 49839 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49864 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49822 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49870 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49796 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
Source: unknownNetwork traffic detected: HTTP traffic on port 49811 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49828
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49827
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49826
Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49825
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49824
Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49823
Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49822
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49787
Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49786
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
Source: unknownNetwork traffic detected: HTTP traffic on port 49813 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
Source: unknownNetwork traffic detected: HTTP traffic on port 49836 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49807 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49791 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49868 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
Source: unknownNetwork traffic detected: HTTP traffic on port 49862 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49879 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49830 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
Source: unknownNetwork traffic detected: HTTP traffic on port 49863 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49883
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49882
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49880
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49797 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49824 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49879
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49873
Source: unknownNetwork traffic detected: HTTP traffic on port 49818 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49871
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49870
Source: unknownNetwork traffic detected: HTTP traffic on port 49835 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49786 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49880 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49869
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
Source: unknownNetwork traffic detected: HTTP traffic on port 49792 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49868
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49803 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49826 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
Source: unknownNetwork traffic detected: HTTP traffic on port 49820 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49691
Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49798 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49861 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49819 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49873 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49787 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49831 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49799
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49798
Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49797
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49796
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49795
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49794
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49793
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49792
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49791
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49790
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49825 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49808 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49789
Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49821
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49820
Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49859 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49691 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49871 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49833 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49819
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49818
Source: unknownNetwork traffic detected: HTTP traffic on port 49799 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49810 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49817
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49816
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49815
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49813
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49812
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49811
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49810
Source: unknownNetwork traffic detected: HTTP traffic on port 49816 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49794 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49827 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49809
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49808
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49807
Source: unknownNetwork traffic detected: HTTP traffic on port 49882 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49803
Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49800
Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49821 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49815 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49809 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49860 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49883 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
Source: unknownHTTPS traffic detected: 4.245.163.56:443 -> 192.168.2.17:49708 version: TLS 1.2
Source: unknownHTTPS traffic detected: 2.18.109.164:443 -> 192.168.2.17:49709 version: TLS 1.2
Source: unknownHTTPS traffic detected: 2.18.109.164:443 -> 192.168.2.17:49712 version: TLS 1.2
Source: unknownHTTPS traffic detected: 4.245.163.56:443 -> 192.168.2.17:49771 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.5.88:443 -> 192.168.2.17:49796 version: TLS 1.2
Source: unknownHTTPS traffic detected: 2.16.158.96:443 -> 192.168.2.17:49797 version: TLS 1.2
Source: classification engineClassification label: mal48.winEML@30/72@54/75
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\Documents\Outlook Files\~Outlook Data File - NoEmail.pst.tmp
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_16827_20130-20241211T1823060293-6936.etl
Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml "C:\Users\user\Desktop\phish_alert_iocp_v1.4.48 - 2024-12-11T151927.331.eml"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "008396C2-7936-45B1-BE99-63D9AC9AB6BA" "AAD41B3B-EA7B-4CA9-8082-74D209EB4D4C" "6936" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://clicktime.cloud.postoffice.net/clicktime.php?U=https://mvadvancement-my.sharepoint.com/:f:/g/personal/ewanner_mvadvancements_org/Elr4An5-W3dKpaplAFapN9oBQntO33Aum0uwc3Qr2tH1GA%3Fe%3D5%253auBc0Zg%26at%3D9&E=sschultz%40firstfedweb.com&X=XID905CLkP5D3070Xd2&T=FF1001&HV=U,E,X,T&H=f2634b391758e2b7b5ed6086be5fe1e72b2f00f1
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=2092,i,12444803471931397500,5083405467017101052,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "008396C2-7936-45B1-BE99-63D9AC9AB6BA" "AAD41B3B-EA7B-4CA9-8082-74D209EB4D4C" "6936" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://clicktime.cloud.postoffice.net/clicktime.php?U=https://mvadvancement-my.sharepoint.com/:f:/g/personal/ewanner_mvadvancements_org/Elr4An5-W3dKpaplAFapN9oBQntO33Aum0uwc3Qr2tH1GA%3Fe%3D5%253auBc0Zg%26at%3D9&E=sschultz%40firstfedweb.com&X=XID905CLkP5D3070Xd2&T=FF1001&HV=U,E,X,T&H=f2634b391758e2b7b5ed6086be5fe1e72b2f00f1
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=2092,i,12444803471931397500,5083405467017101052,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://clicktime.cloud.postoffice.net/clicktime.php?U=https://mvadvancement-my.sharepoint.com/:f:/g/personal/ewanner_mvadvancements_org/Elr4An5-W3dKpaplAFapN9oBQntO33Aum0uwc3Qr2tH1GA%3Fe%3D5%253auBc0Zg%26at%3D9&E=sschultz%40firstfedweb.com&X=XID905CLkP5D3070Xd2&T=FF1001&HV=U,E,X,T&H=f2634b391758e2b7b5ed6086be5fe1e72b2f00f1
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2076 --field-trial-handle=2012,i,1738063653006714173,4374116596017740249,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://clicktime.cloud.postoffice.net/clicktime.php?U=https://mvadvancement-my.sharepoint.com/:f:/g/personal/ewanner_mvadvancements_org/Elr4An5-W3dKpaplAFapN9oBQntO33Aum0uwc3Qr2tH1GA%3Fe%3D5%253auBc0Zg%26at%3D9&E=sschultz%40firstfedweb.com&X=XID905CLkP5D3070Xd2&T=FF1001&HV=U,E,X,T&H=f2634b391758e2b7b5ed6086be5fe1e72b2f00f1
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2076 --field-trial-handle=2012,i,1738063653006714173,4374116596017740249,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: apphelp.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: c2r64.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: userenv.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: msasn1.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: kernel.appcore.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptsp.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: rsaenh.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: gpapi.dll
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\ClickToRun\REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{ED475410-B0D6-11D2-8C3B-00104B2A6676}\InprocServer32
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEWindow found: window name: SysTabControl32
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\Common
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information queried: ProcessInformation
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeQueries volume information: C:\Program Files (x86)\Microsoft Office\root\Office16\AI\WordCombinedFloatieLreOnline.onnx VolumeInformation
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure1
Drive-by Compromise
Windows Management Instrumentation21
Browser Extensions
1
Process Injection
1
Masquerading
OS Credential Dumping1
Process Discovery
Remote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
DLL Side-Loading
1
Process Injection
LSASS Memory12
System Information Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
Registry Run Keys / Startup Folder
1
Registry Run Keys / Startup Folder
1
DLL Side-Loading
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
dual-spo-0005.spo-msedge.net
13.107.136.10
truefalse
    high
    cloud.postoffice.net
    165.212.65.209
    truetrue
      unknown
      cdnjs.cloudflare.com
      104.17.25.14
      truefalse
        high
        sni1gl.wpc.alphacdn.net
        152.199.21.175
        truefalse
          high
          clicktime.cloud.postoffice.net
          165.212.65.140
          truetrue
            unknown
            maxcdn.bootstrapcdn.com
            104.18.10.207
            truefalse
              high
              sni1gl.wpc.omegacdn.net
              152.199.21.175
              truefalse
                high
                www.google.com
                142.250.181.100
                truefalse
                  high
                  s-part-0035.t-0009.t-msedge.net
                  13.107.246.63
                  truefalse
                    high
                    autologon.microsoftazuread-sso.com
                    20.190.181.6
                    truefalse
                      high
                      aadcdn.msftauth.net
                      unknown
                      unknownfalse
                        high
                        logincdn.msftauth.net
                        unknown
                        unknownfalse
                          high
                          m365cdn.nel.measure.office.net
                          unknown
                          unknownfalse
                            high
                            aadcdn.msftauthimages.net
                            unknown
                            unknownfalse
                              unknown
                              spo.nel.measure.office.net
                              unknown
                              unknownfalse
                                high
                                identity.nel.measure.office.net
                                unknown
                                unknownfalse
                                  high
                                  login.microsoftonline.com
                                  unknown
                                  unknownfalse
                                    high
                                    fpt.live.com
                                    unknown
                                    unknownfalse
                                      high
                                      acctcdn.msftauth.net
                                      unknown
                                      unknownfalse
                                        high
                                        mvadvancement-my.sharepoint.com
                                        unknown
                                        unknownfalse
                                          unknown
                                          NameMaliciousAntivirus DetectionReputation
                                          https://clicktime.cloud.postoffice.net/clicktime.php?U=https://mvadvancement-my.sharepoint.com/:f:/g/personal/ewanner_mvadvancements_org/Elr4An5-W3dKpaplAFapN9oBQntO33Aum0uwc3Qr2tH1GA%3Fe%3D5%253auBc0Zg%26at%3D9&E=sschultz%40firstfedweb.com&X=XID905CLkP5D3070Xd2&T=FF1001&HV=U,E,X,T&H=f2634b391758e2b7b5ed6086be5fe1e72b2f00f1false
                                            unknown
                                            https://login.microsoftonline.com/0ea53f02-3da3-46dd-95b5-fc7a9f0a3cf3/oauth2/authorize?client%5Fid=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&response%5Fmode=form%5Fpost&response%5Ftype=code%20id%5Ftoken&resource=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&scope=openid&nonce=C6988A7DE21A88BD9A24DE4544CE0B375F4E69B533933F66%2D95C16255A6926278F8BFC7BCAEDA431B400A588A2154C4FB109FF5C66F32BEED&redirect%5Furi=https%3A%2F%2Fmvadvancement%2Dmy%2Esharepoint%2Ecom%2F%5Fforms%2Fdefault%2Easpx&state=OD0w&claims=%7B%22id%5Ftoken%22%3A%7B%22xms%5Fcc%22%3A%7B%22values%22%3A%5B%22CP1%22%5D%7D%7D%7D&wsucxt=1&cobrandid=11bd8083%2D87e0%2D41b5%2Dbb78%2D0bc43c8a8e8a&client%2Drequest%2Did=66a36ca1%2Dd045%2D7000%2D40ed%2D0645ca6da09afalse
                                              unknown
                                              https://mvadvancement-my.sharepoint.com/:f:/g/personal/ewanner_mvadvancements_org/Elr4An5-W3dKpaplAFapN9oBQntO33Aum0uwc3Qr2tH1GA?e=5%3auBc0Zg&at=9false
                                                unknown
                                                https://login.microsoftonline.com/0ea53f02-3da3-46dd-95b5-fc7a9f0a3cf3/oauth2/authorize?client%5Fid=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&response%5Fmode=form%5Fpost&response%5Ftype=code%20id%5Ftoken&resource=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&scope=openid&nonce=C6988A7DE21A88BD9A24DE4544CE0B375F4E69B533933F66%2D95C16255A6926278F8BFC7BCAEDA431B400A588A2154C4FB109FF5C66F32BEED&redirect%5Furi=https%3A%2F%2Fmvadvancement%2Dmy%2Esharepoint%2Ecom%2F%5Fforms%2Fdefault%2Easpx&state=OD0w&claims=%7B%22id%5Ftoken%22%3A%7B%22xms%5Fcc%22%3A%7B%22values%22%3A%5B%22CP1%22%5D%7D%7D%7D&wsucxt=1&cobrandid=11bd8083%2D87e0%2D41b5%2Dbb78%2D0bc43c8a8e8a&client%2Drequest%2Did=66a36ca1%2Dd045%2D7000%2D40ed%2D0645ca6da09a&sso_reload=truefalse
                                                  unknown
                                                  • No. of IPs < 25%
                                                  • 25% < No. of IPs < 50%
                                                  • 50% < No. of IPs < 75%
                                                  • 75% < No. of IPs
                                                  IPDomainCountryFlagASNASN NameMalicious
                                                  13.107.138.10
                                                  unknownUnited States
                                                  8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                  13.107.246.63
                                                  s-part-0035.t-0009.t-msedge.netUnited States
                                                  8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                  104.18.10.207
                                                  maxcdn.bootstrapcdn.comUnited States
                                                  13335CLOUDFLARENETUSfalse
                                                  13.107.136.10
                                                  dual-spo-0005.spo-msedge.netUnited States
                                                  8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                  52.111.252.18
                                                  unknownUnited States
                                                  8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                  20.231.128.66
                                                  unknownUnited States
                                                  8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                  20.190.177.85
                                                  unknownUnited States
                                                  8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                  165.212.65.140
                                                  clicktime.cloud.postoffice.netUnited States
                                                  14454PERIMETER-ESECURITYUStrue
                                                  95.101.143.226
                                                  unknownEuropean Union
                                                  20940AKAMAI-ASN1EUfalse
                                                  20.190.147.2
                                                  unknownUnited States
                                                  8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                  52.109.89.19
                                                  unknownUnited States
                                                  8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                  172.217.21.35
                                                  unknownUnited States
                                                  15169GOOGLEUSfalse
                                                  142.250.181.42
                                                  unknownUnited States
                                                  15169GOOGLEUSfalse
                                                  52.113.194.132
                                                  unknownUnited States
                                                  8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                  165.212.65.209
                                                  cloud.postoffice.netUnited States
                                                  14454PERIMETER-ESECURITYUStrue
                                                  172.217.17.78
                                                  unknownUnited States
                                                  15169GOOGLEUSfalse
                                                  20.190.181.6
                                                  autologon.microsoftazuread-sso.comUnited States
                                                  8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                  172.217.17.35
                                                  unknownUnited States
                                                  15169GOOGLEUSfalse
                                                  2.16.149.13
                                                  unknownEuropean Union
                                                  1273CWVodafoneGroupPLCEUfalse
                                                  142.250.181.100
                                                  www.google.comUnited States
                                                  15169GOOGLEUSfalse
                                                  2.16.149.34
                                                  unknownEuropean Union
                                                  1273CWVodafoneGroupPLCEUfalse
                                                  216.58.208.234
                                                  unknownUnited States
                                                  15169GOOGLEUSfalse
                                                  20.189.173.28
                                                  unknownUnited States
                                                  8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                  239.255.255.250
                                                  unknownReserved
                                                  unknownunknownfalse
                                                  51.105.71.137
                                                  unknownUnited Kingdom
                                                  8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                  152.199.21.175
                                                  sni1gl.wpc.alphacdn.netUnited States
                                                  15133EDGECASTUSfalse
                                                  173.194.222.84
                                                  unknownUnited States
                                                  15169GOOGLEUSfalse
                                                  52.109.76.240
                                                  unknownUnited States
                                                  8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                  104.17.25.14
                                                  cdnjs.cloudflare.comUnited States
                                                  13335CLOUDFLARENETUSfalse
                                                  142.250.181.74
                                                  unknownUnited States
                                                  15169GOOGLEUSfalse
                                                  IP
                                                  192.168.2.17
                                                  Joe Sandbox version:41.0.0 Charoite
                                                  Analysis ID:1573437
                                                  Start date and time:2024-12-12 00:22:27 +01:00
                                                  Joe Sandbox product:CloudBasic
                                                  Overall analysis duration:
                                                  Hypervisor based Inspection enabled:false
                                                  Report type:full
                                                  Cookbook file name:defaultwindowsinteractivecookbook.jbs
                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                  Number of analysed new started processes analysed:22
                                                  Number of new started drivers analysed:0
                                                  Number of existing processes analysed:0
                                                  Number of existing drivers analysed:0
                                                  Number of injected processes analysed:0
                                                  Technologies:
                                                  • EGA enabled
                                                  Analysis Mode:stream
                                                  Analysis stop reason:Timeout
                                                  Sample name:phish_alert_iocp_v1.4.48 - 2024-12-11T151927.331.eml
                                                  Detection:MAL
                                                  Classification:mal48.winEML@30/72@54/75
                                                  Cookbook Comments:
                                                  • Found application associated with file extension: .eml
                                                  • Exclude process from analysis (whitelisted): dllhost.exe, svchost.exe
                                                  • Excluded IPs from analysis (whitelisted): 52.109.76.240, 52.113.194.132, 52.109.89.19, 52.111.252.18, 52.111.252.15, 52.111.252.17, 52.111.252.16, 51.105.71.137, 172.217.21.35, 172.217.17.46, 173.194.222.84, 172.217.17.78, 142.250.181.74, 192.229.221.95
                                                  • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, weu-azsc-000.roaming.officeapps.live.com, clientservices.googleapis.com, eur.roaming1.live.com.akadns.net, mobile.events.data.microsoft.com, ecs-office.s-0005.s-msedge.net, roaming.officeapps.live.com, onedscolprduks03.uksouth.cloudapp.azure.com, osiprod-weu-buff-azsc-000.westeurope.cloudapp.azure.com, clients2.google.com, ocsp.digicert.com, redirector.gvt1.com, officeclient.microsoft.com, ecs.office.com, fs.microsoft.com, prod-all.naturallanguageeditorservice.osi.office.net.akadns.net, accounts.google.com, prod-inc-resolver.naturallanguageeditorservice.osi.office.net.akadns.net, ajax.googleapis.com, prod.configsvc1.live.com.akadns.net, prod.roaming1.live.com.akadns.net, s-0005-office.config.skype.com, fe3cr.delivery.mp.microsoft.com, prod1.naturallanguageeditorservice.osi.office.net.akadns.net, neu-azsc-config.officeapps.live.com, nleditor.osi.office.net, s-0005.s-msedge.net, config.officeapps.live.com, ecs.office.trafficmanager.net, c
                                                  • Not all processes where analyzed, report is missing behavior information
                                                  • Report size getting too big, too many NtQueryAttributesFile calls found.
                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                  • VT rate limit hit for: phish_alert_iocp_v1.4.48 - 2024-12-11T151927.331.eml
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):181859
                                                  Entropy (8bit):5.295296615636303
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:9B37A571960B985F90BE2E6EE4BF1ED2
                                                  SHA1:8BF41109840D87173D143BC9D5E6EB32B1B9A91C
                                                  SHA-256:DCFB698D3DAB5DBD86F4FCEBE8AFEB3692EADC5674EB94A85F3FE95DBA4AD1D6
                                                  SHA-512:74C9530CABAC11696FEB70BF22964EED392FE3BFE10D3902DA1FDEC2AB97BE27840FCF4FA43D48A00ACFBB469FFB409BE60B4AC50D63CA06F962A45069425293
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:<?xml version="1.0" encoding="utf-8"?>..<o:OfficeConfig xmlns:o="urn:schemas-microsoft-com:office:office">.. <o:services o:GenerationTime="2024-12-11T23:23:09">.. Build: 16.0.18312.40138-->.. <o:default>.. <o:ticket o:headerName="Authorization" o:headerValue="{}" />.. </o:default>.. <o:service o:name="Research">.. <o:url>https://word-edit.officeapps.live.com/we/rrdiscovery.ashx</o:url>.. </o:service>.. <o:service o:name="ORedir">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ORedirSSL">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ClViewClientHelpId" o:authentication="1">.. <o:url>https://[MAX.BaseHost]/client/results</o:url>.. <o:ticket o:policy="MBI_SSL_SHORT" o:idprovider="1" o:target="[MAX.AuthHost]" o:headerValue="Passport1.4 from-PP='{}&amp;p='" />.. <o:ticket o:idprovider="3" o:headerValue="Bearer {}" o:resourceId="[
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):32768
                                                  Entropy (8bit):0.04591939678467531
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:C1534C83547606E560813DB8B8EC4B8E
                                                  SHA1:46AF82445C8A0A575E5B87AF037771EEE0C807F1
                                                  SHA-256:7574B0B9BFB09C8A4AEC480E579FB75262B2FC7DF6EB196E183D129B004EE985
                                                  SHA-512:FD08AC03CDB2F5BDAB5DFA91AE2E0CD6FFE694F5C8CEECC3579FE8E6C257924113EFC0625B9FC3826455ADAAD7B956B2C48EC29D0C14C6A8AB72F4865F462C0A
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:..-.....................W.Z........D.`..5..A..<e..-.....................W.Z........D.`..5..A..<e........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                  File Type:SQLite Write-Ahead Log, version 3007000
                                                  Category:dropped
                                                  Size (bytes):49472
                                                  Entropy (8bit):0.4833357824714724
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:765B2AECD290921865A0CF3637D04B88
                                                  SHA1:F45D32B13207AD2CB811844AA04F0C3B2ED4F6EE
                                                  SHA-256:CB3C9277D29A58290C376C364D55939E88A28B42DE9B3AB7498E10FF809DD4F3
                                                  SHA-512:6A22BC627F7CF032DF7FCC362F70C1D5250FBADCC934176AA82617E44D9B7DB2C24D75770CC057C9CA461B10F0A4F0405A6FC1A31D100D028DADE2BDA667AF50
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:7....-.............D.`......s...........D.`...E...X.mSQLite format 3......@ .......................................................................... .............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                  File Type:PNG image data, 96 x 96, 8-bit/color RGBA, non-interlaced
                                                  Category:dropped
                                                  Size (bytes):560
                                                  Entropy (8bit):7.202675966728479
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:C8BF8E6B73F65643F299721BE280AFD4
                                                  SHA1:3C1302210ED6D13A3D98E8D512F4F72DA066E2E9
                                                  SHA-256:C201EFFC2BAD916AD6DFCF3A43F301B300F76EAF297BE0A3E024AA6BCC0B693B
                                                  SHA-512:378E599691264A337FE122BB250CC95291812A30B81DB188286B875BD2FB3129E9B03B0C29B6E3F87EE06A522511E99D67A6489F4CAA8077E9AFEB852772E9E5
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:.PNG........IHDR...`...`......w8....tEXtSoftware.Adobe ImageReadyq.e<....IDATx...N.A...o[.P.4."6."..........b........h-.G..@T.B0.h.-...2.......lV.1..g.............Yd.0.R...Yu...y.......0,~.5....B..`........l.:...e.jz.. ;..........y..:!..,.J.m.}#...a.4Z..........k..^%.....:QNx.......]d.. ..V...$.../..49'.nI3.f...-.=..S.+.t...}0G..P/............q....6..?..J@.../......f........0.........a:.#<...t...!L.....8lAlA....p....1.!.. :.t..P..........`..?.....3..w..}+.t..x..x.D.......VWQ1J.....B>......|....N).........0.>....Ev>..:.....IEND.B`.
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                  File Type:PNG image data, 96 x 96, 8-bit/color RGBA, non-interlaced
                                                  Category:dropped
                                                  Size (bytes):2877
                                                  Entropy (8bit):7.9028514706867385
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:1E13EE0ED09C4AF1ADFB6C0D280879B0
                                                  SHA1:1192A79F7B4C4FF814583743F8C66ACA7ECB8ACF
                                                  SHA-256:E2395FBA25D3FB8A971345CA65D144F7D9C9D933F70409165446E63D18C0958D
                                                  SHA-512:4D86A41DE4B3CA8BB73BF641838953BE03FFF34A890B7BDDC506276186D42979BC99A7DC5553005F135AA1C02137C85C6A2623498C78A617CC195E28FD8B3C95
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:.PNG........IHDR...`...`......w8....sRGB.........IDATx..\}l.G..o..Z....$%i....4P5. Q......*...@...nZ.wg.....%.$M........-.T>$..B.........MA..4Q...v...g..v....q..H.}......};o.D:h.4.....F.rC ..MBp..6.n@x..{(.?.6..1..z.............&....D....P.3A. ....).?.4...2..*.&..?.$...J.d...a&....M@5..^..A....".LBo.q.d.......B.a_I.....i....#...k.. 'h..-.;QmTG...1an...cN..i.."%....5...j...'bQ-...$.s.......T.8.. .$..N...Y..k..P...a..g....>`...Y[#.-..._M.m. *.$.^Ed,.Z..}Y..}.2.c..X....c...$.e{..I.+.+.n.TH........7..k..wCm.....6.'..rd..U0.A..WT.vi.O@"..Jq'F...........NH`.:eb.9.gJ.5..=s.....\...F;.."@fH.i..%\..Z......N3.x..%.n...............}.i..a.....~.I*L.c...7...b....j.!<...ufR.{.._....>..wc...b+.\..._....8.L..f..&..".0...@.%.g ..%...I.-R*D..3!^!..2.(k[..VS.......&.w.I......-..;.{.p..H.4..G.C./.z..UpB.S.2=.U.s.U..]....c...x.4P...c2.{.>.g..v....T.=G..`....:AqJb..{.v.4.......3h.R...3....$u......oVZ.7..a.)b.T..!........Z5.y.H.....h.UCgdr-.?...~..~yF.R,.{.$Hg.=..LB.3!.W...
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                  File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=5], baseline, precision 8, 280x47, components 3
                                                  Category:dropped
                                                  Size (bytes):7408
                                                  Entropy (8bit):7.846999511119745
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:A51112904EFF9B2DED38555B6FF31FC9
                                                  SHA1:B7B645ED99B657069807BAA14A55401DB7407A40
                                                  SHA-256:0AE1A24DAE94C7706F4123722DAC04388B73E15DB1900DDA5D46B14E59EE1512
                                                  SHA-512:2632AABE840DB347D3A522F653553AA85005D7DFE36CD2B8A9E805EACC6532E243272D88CBC6C7D91294DEF0DE1E5447B13B2911A93EDCD8CE4707F18FECF489
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:......JFIF.....`.`......Exif..MM.*.......>.........J.?.........ZQ...........Q...........Q.................z%..............................u0.......`......:........o.......C....................................................................C......................................................................./...."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?........o..?...._.|H..F.#.....GW..3...$(+..lh].:.\.%.5..^?......*7.h..&....k..*.<Z...rH.....&z..v.Q.......q....S...T..]...........+..V.../...H..R..I....S..Kk.f..9..~../....~...U..kM...5.~.c..N&..L.v.... ..."...........
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                  File Type:PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced
                                                  Category:dropped
                                                  Size (bytes):2133
                                                  Entropy (8bit):7.86298626930999
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:4DF1205B01187B26FF893615B19C65DE
                                                  SHA1:13856C6DCE2C8C328153C9C6FD37643EDCC45B81
                                                  SHA-256:5931FFF65F3CF45DA0DDD4F29D39BA23063A3735A8F99868DF6C23E26BD61788
                                                  SHA-512:074239FBFE2D5B34EFDD6EC0255A459CFDDCA9538FDAE5F371F50414B4EC305D551461CBD852294E89197BD8375E7FC5C888657971281AFCCC06051AFA01FA1E
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:.PNG........IHDR...0...0.....W.......pHYs...%...%.IR$.....sRGB.........gAMA......a.....IDATx..ZOL.U..fkmM..%...p.S....M.<.....M!R....TL...x.=......<.5.......S6.R....U...K/.t...v.0.3........v.......}.B[.UU.D.Z..:>T..z..6...H.HQf..G.....O.H..x..p#...3.W"L....u.%c... 5.b.k.Q4....Zq.....BKKK.<?7G..iJOO...&.X.S..R......J<...{L..b*....8....{C^..$..:.u.'nB.......?.H$B[.L&C.##.da.......FI.Tu_......GX=.O..uy.......).........n.ls.YP.A~gGG'.9{...../0....;l....ZZZimu.fggw......T..r..T... ..==B....{r`.gw.4Z...kimu|n.U........fO~_+..h.....tv.#M[..~.`..B!ZXX....-.4.=...B.s.=...p.n-.}p.J.P0X....Jg...#Z^^&._..9joo.6>0.)....:.s.."!.X....k..........~...dR.<t.D......].pQ\...+........dxBr.@.=..m0..@....8......F_'`.pb...........#n&.._..Lf.$.HD.r]..\N...P.}...9.e..<....R..!q....K..Q.....T0.0.w...B.c...Tu$.....7..a..N0.^'.._.....<j._..V.........4*...............[C..X.*.@....;...s.~....@.:...<.9##..ni.......".~M.s.) ....[I.H[...6....T.{<...|.F..3..Q......1...+......K..3.-...T.
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):10392
                                                  Entropy (8bit):3.4465746079707427
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:D53C32CEDA86E37D7BA9033AB0895071
                                                  SHA1:CB19F1D0D12D7470673978180A3BD77DC2B26FAE
                                                  SHA-256:B4BE4CCAFCCD3EF1D36BB23FB217D8E774F47C890D3BF36451003FD24B6EB036
                                                  SHA-512:0F8CA0B4E361FA1CB91EAA4630B2B2F9850DCBE3EDFE496C040CC0DA44DDCD35374D0915DEB7AB6E4AAFE8293435D00A944159D4053086C0F7F1144D07B664A1
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:....[.E.X.T.E.R.N.A.L. .E.M.A.I.L.:. .T.a.k.e. .c.a.u.t.i.o.n. .w.i.t.h. .l.i.n.k.s. .a.n.d. .a.t.t.a.c.h.m.e.n.t.s... .]. .......I.N.C.L.U.D.E.P.I.C.T.U.R.E. .".c.i.d.:.a.2.f.e.5.a.7.5.-.c.3.1.8.-.4.6.6.4.-.b.3.9.a.-.4.0.2.e.f.c.4.f.7.6.8.4.". .\.*. .M.E.R.G.E.F.O.R.M.A.T.I.N.E.T... . .................................................................................................................................................................................................................................................................H...J...L...N...P..................................................................................................................................................j................5...$..$.If....!v..h.#v....:V...t..........6......,.....5.......2......,.2........3........4........B..........$..d............[$.\$.a$.....$..$.If....:V.......t.....6......4........4........a....*...$..$.If........!v..h.#v....:V.......t.....6......5.......4........4........a
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                  File Type:ASCII text, with very long lines (28760), with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):20971520
                                                  Entropy (8bit):0.17697619321885213
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:7C819EF98230DF1AA9340BE79D3289F5
                                                  SHA1:99B7E28B3EFC7929277B01E51FEDDCCDDE4B4A82
                                                  SHA-256:48BC442FDCBCDD1170D46337CCB90092633F8517AE6EEA058EAE0E3A7ECE39B6
                                                  SHA-512:410173E562456631113044BA4645D32091AFE5757B0ECDDCAD7D583BAA0DEE50C881BF9172DCE2AB932EDA509CEA3E7B4C3D8566EA4B34202735052DA1A166D9
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:Timestamp.Process.TID.Area.Category.EventID.Level.Message.Correlation..12/11/2024 23:23:06.533.OUTLOOK (0x1B18).0x1B1C.Microsoft Outlook.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.Text.GDIAssistant.HandleCallback","Flags":30962256044949761,"InternalSequenceNumber":22,"Time":"2024-12-11T23:23:06.533Z","Contract":"Office.System.Activity","Activity.CV":"KxMkdc2HI06oDF1Z8nLnDg.4.9","Activity.Duration":10,"Activity.Count":1,"Activity.AggMode":0,"Activity.Success":true,"Data.GdiFamilyName":"","Data.CloudFontStatus":6,"Data.CloudFontTypes":256}...12/11/2024 23:23:06.565.OUTLOOK (0x1B18).0x1B1C.Microsoft Outlook.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.Text.ResourceClient.Deserialize","Flags":30962256044949761,"InternalSequenceNumber":24,"Time":"2024-12-11T23:23:06.565Z","Contract":"Office.System.Activity","Activity.CV":"KxMkdc2HI06oDF1Z8nLnDg.4.10","Activity.Duration":11896,"Activity.Count":1,"Activity.AggMode":0,"Activity.Success":true,"Data.JsonFileMajorV
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):20971520
                                                  Entropy (8bit):0.0
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:8F4E33F3DC3E414FF94E5FB6905CBA8C
                                                  SHA1:9674344C90C2F0646F0B78026E127C9B86E3AD77
                                                  SHA-256:CD52D81E25F372E6FA4DB2C0DFCEB59862C1969CAB17096DA352B34950C973CC
                                                  SHA-512:7FB91E868F3923BBD043725818EF3A5D8D08EBF1059A18AC0FE07040D32EEBA517DA11515E6A4AFAEB29BCC5E0F1543BA2C595B0FE8E6167DDC5E6793EDEF5BB
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                  File Type:data
                                                  Category:modified
                                                  Size (bytes):106496
                                                  Entropy (8bit):4.474348580739585
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:FF279CED25E2D7094A31BC78AC20BCF4
                                                  SHA1:E88C88E9CAA4EDF529FCA7F341FAA4D2E081CAFE
                                                  SHA-256:C7177F3907614C977E500181B86A366A74E6581CB79F5056AF7D5E64D545E5D7
                                                  SHA-512:7123B8426F723D156DC800E88961562F198990F22112519002E0F4705FD17599FC81A1F6C9EE3B2508E2F29B2FBA6E120F9022DEF24C53D7AC0AE4A00399183B
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:............................................................................d...........D...#L..................eJ..............Zb..2...................................,...@.t.z.r.e.s...d.l.l.,.-.1.1.2.......................................................@.t.z.r.e.s...d.l.l.,.-.1.1.1........................................................... ....Y..........D...#L..........v.2._.O.U.T.L.O.O.K.:.1.b.1.8.:.a.2.d.c.3.b.e.a.2.9.e.f.4.0.2.f.b.d.3.7.d.b.d.5.f.7.c.3.9.e.c.0...C.:.\.U.s.e.r.s.\.t.o.r.r.e.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.O.u.t.l.o.o.k. .L.o.g.g.i.n.g.\.O.U.T.L.O.O.K._.1.6._.0._.1.6.8.2.7._.2.0.1.3.0.-.2.0.2.4.1.2.1.1.T.1.8.2.3.0.6.0.2.9.3.-.6.9.3.6...e.t.l...........P.P.........D...#L..................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):30
                                                  Entropy (8bit):1.172253928364927
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:FE822D69F6DD268D972193811E527037
                                                  SHA1:25FAD9B59BDD58F187BBC1C0CA97BAB34E29D910
                                                  SHA-256:4C97741FDDF9334DF2801602337AF6701E6108936ABCE627214F7008430DE00C
                                                  SHA-512:F508F76859EB75C27A93CA9A8F68A4ACA01B93BCBA0BC474AE514824FAF240933ED7E211B54AE6ABADEA7E819F36788F11FCDC290F0857267B74C9E1B156803F
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:..............................
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                  Category:modified
                                                  Size (bytes):18
                                                  Entropy (8bit):2.725480556997868
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:A5E51FDFAF429614FB5218AB559D299A
                                                  SHA1:262EC76760BB9A83BCFF955C985E70820DF567AE
                                                  SHA-256:3E82E9F60CE38815C28B0E5323268BDA212A84C3A9C7ACCC731360F998DF0240
                                                  SHA-512:9B68F1C04BDE0024CECFC05A37932368CE2F09BD96C72AB0442E16C8CF5456ED9BB995901095AC1BBDF645255014A5E43AADEE475564F01CA6BE3889C96C29C9
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:..t.o.r.r.e.s.....
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Dec 11 22:23:19 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                                                  Category:dropped
                                                  Size (bytes):2677
                                                  Entropy (8bit):3.9990099476826897
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:E3E48811B685843232B9948340B24E27
                                                  SHA1:4E4682666D7084FB31114109F0C2EBB37D473464
                                                  SHA-256:1C6837CDAF113944E0805997D96972C4FC92FC7D47D72CA66D38F53DA00138C0
                                                  SHA-512:0E0267FD669EDBE58A049B837337D6F01F512A5176ECEB517AAF07BDC99581135913509CFBFCF9DDAD95901D28A1C3846C8D068AAE64949DFB4F54F88C23E125
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:L..................F.@.. ...$+.,.....J..#L......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.I.Y.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Y.....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.V.Y.....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.V.Y............................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V.Y............................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............L.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Dec 11 22:23:19 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                                                  Category:dropped
                                                  Size (bytes):2679
                                                  Entropy (8bit):4.014608029144283
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:68E43432782AF2E4AB2C514C522DDDB5
                                                  SHA1:F4042448B624EC22F5FF2B40311474DD28D38BC4
                                                  SHA-256:9CC7B138E9A8A046BDEE2EDFAD448FC21553A998BF06C4530AC66204EF1EF939
                                                  SHA-512:36F5473AB49BE92756B4737F519F707D271E45128B340B06EBBE0C0DC4A071AD75D02457CA706E1CC9BBBFB59FAF932AE0421FBCCE4559F40F1E59623005970C
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:L..................F.@.. ...$+.,....>..#L......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.I.Y.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Y.....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.V.Y.....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.V.Y............................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V.Y............................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............L.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:54:41 2023, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                                                  Category:dropped
                                                  Size (bytes):2693
                                                  Entropy (8bit):4.022821124300008
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:94D5AB534FED88221DB801DCFD832080
                                                  SHA1:FB255F2A7899D0CDB5B321F30FE2EE46460B09D2
                                                  SHA-256:207984FEF2C0B02FB84D59B3BB5929543A45DE6DD3B742728AD97F7C3DB7F523
                                                  SHA-512:8DBCFEE8415480864A5EBE1535CE797706F2815B3898505F3A8E444CBE76F9A56832AD1F749AF9C9453CE1E2205BBBED5B5E055A45188B2428A91288BBB80438
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:L..................F.@.. ...$+.,.....v. ;.......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.I.Y.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Y.....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.V.Y.....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.V.Y............................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VFW.N...........................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............L.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Dec 11 22:23:19 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                                                  Category:dropped
                                                  Size (bytes):2681
                                                  Entropy (8bit):4.011604449081807
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:3BDFDE32189D8A6CF7966B89C6BCF1E1
                                                  SHA1:369B4817AE68905CAE362B107A557DF24A2D7028
                                                  SHA-256:31BCB781A319BB2943A7A8EEED018C98E137CCC07301AE50779647EF0409A0E7
                                                  SHA-512:E7878A797EDD56347352FD65358308F028D96E60F6B3431E11EFE6FB3A9ABF61FE579396767A53537DFD70D4318F03E9EB0889CD8D2384D9CF16D00A7C0E20F4
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:L..................F.@.. ...$+.,....J..#L......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.I.Y.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Y.....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.V.Y.....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.V.Y............................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V.Y............................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............L.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Dec 11 22:23:19 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                                                  Category:dropped
                                                  Size (bytes):2681
                                                  Entropy (8bit):4.001281264361207
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:CC117ADDC36007F21F38FFC98D3EA345
                                                  SHA1:9DB96051CB40A5B8DE5E082574545ED6BD895C34
                                                  SHA-256:2BBF401085C54CDC21D9F4B205062FDFA93764CFD5F014A88D4F6ADB5A9FD99D
                                                  SHA-512:913E3A088B95A23680D57FA4148D48F0B8BE167331B9DCA7686172B3A5E1D93009EB479FBCACD9C57FDB84C32B690390A41B73F7D8D2426EC56E676DF44D1F99
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:L..................F.@.. ...$+.,.....'.#L......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.I.Y.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Y.....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.V.Y.....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.V.Y............................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V.Y............................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............L.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Dec 11 22:23:19 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                                                  Category:dropped
                                                  Size (bytes):2683
                                                  Entropy (8bit):4.013156491494126
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:1FC10B22C48C0BDC1C10E5B7354CB773
                                                  SHA1:5B18A9233A7CB04953645BEF7C6EFD294E8662ED
                                                  SHA-256:D5530057A1A8FB1AFDB73F0F362D35DFDE32E0E8F3003C4F32EF6A5AE9848504
                                                  SHA-512:DE9DB3A91E193268CDC38618F587137D49675739EF9DF47C77DD4927BFDAD128DDD6646218DF6310C54182BA8B31E6C6FB55C3D8892352E6A2B950DF4017CADC
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:L..................F.@.. ...$+.,........#L......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.I.Y.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Y.....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.V.Y.....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.V.Y............................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V.Y............................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............L.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                  File Type:Microsoft Outlook email folder (>=2003)
                                                  Category:dropped
                                                  Size (bytes):271360
                                                  Entropy (8bit):3.544542294801637
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:21C2CDF4BD28652911A2698252C6A1D4
                                                  SHA1:23B168653E67953E84CA41A2CAEFEB6542D0A807
                                                  SHA-256:9654C7E1D2D6D555C5E871D1B7F388B8860BE651B40AB1AA78C10DFED34C727F
                                                  SHA-512:C30998642BA96630175B7E15C2E111E85CF530BF06672201C7E0B128FA1F2FFD17DA45C2173E1999A195C8525BB4ED5688434463BE032B20B0280D0214410419
                                                  Malicious:true
                                                  Reputation:unknown
                                                  Preview:!BDN.L4.SM......\...8...................a................@...........@...@...................................@...........................................................................$.......D......@...................................................................................................................................................................................................................................................................................................................................F3..I.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):262144
                                                  Entropy (8bit):3.5426591699758183
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:B4C1A20C4A7CC05E1821C65BE6126FAE
                                                  SHA1:17A14093EC6030D517FBAFA8FA49B9591EAEB294
                                                  SHA-256:81FA6963D796FE5897E53C657649AA21F49DF01C28D89D169E604A38339C6C6B
                                                  SHA-512:E5D68EABFA5F6D5223FF1F8FCA4E2C42EBC88E676C5780BEA581F5183C220E1354AAAD0F037FBF9BD870C69362A6AF9D86112D86889AD90FF9D59F2A69804D93
                                                  Malicious:true
                                                  Reputation:unknown
                                                  Preview:.C.iC...g............^.#L....................#.!BDN.L4.SM......\...8...................a................@...........@...@...................................@...........................................................................$.......D......@...................................................................................................................................................................................................................................................................................................................................F3..I....^.#L.......B............#.........................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):43
                                                  Entropy (8bit):4.452443755145651
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:0906C5886E3CAD372F5F89F0A85554BF
                                                  SHA1:2F288774D36BBC8EDE7FD36ABF444961B249BF3C
                                                  SHA-256:BE5E387F4E45DD8B3FD89A12CD1A994F18077EC871BC5D7F22442BA8F33EAEB1
                                                  SHA-512:72C4F8F75D4538513EBD68E9F61F8998E04244FC868448EC7F26AF68D07280462DD365F50CBB4EB1D53141F0B7A37B9429F9B2927640E7B879944573A94660E3
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:Array.(. [lastmodtime] => 1733959436.)..
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:HTML document, ASCII text, with very long lines (3450), with CRLF line terminators
                                                  Category:downloaded
                                                  Size (bytes):3452
                                                  Entropy (8bit):5.117912766689607
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:CB06E9A552B197D5C0EA600B431A3407
                                                  SHA1:04E167433F2F1038C78F387F8A166BB6542C2008
                                                  SHA-256:1F4EDBD2416E15BD82E61BA1A8E5558D44C4E914536B1B07712181BF57934021
                                                  SHA-512:1B4A3919E442EE4D2F30AE29B1C70DF7274E5428BCB6B3EDD84DCB92D60A0D6BDD9FA6D9DDE8EAB341FF4C12DE00A50858BF1FC5B6135B71E9E177F5A9ED34B9
                                                  Malicious:false
                                                  Reputation:unknown
                                                  URL:https://login.live.com/Me.htm?v=3
                                                  Preview:<script type="text/javascript">!function(t,e){for(var s in e)t[s]=e[s]}(this,function(t){function e(n){if(s[n])return s[n].exports;var i=s[n]={exports:{},id:n,loaded:!1};return t[n].call(i.exports,i,i.exports,e),i.loaded=!0,i.exports}var s={};return e.m=t,e.c=s,e.p="",e(0)}([function(t,e){function s(t){for(var e=f[S],s=0,n=e.length;s<n;++s)if(e[s]===t)return!0;return!1}function n(t){if(!t)return null;for(var e=t+"=",s=document.cookie.split(";"),n=0,i=s.length;n<i;n++){var a=s[n].replace(/^\s*(\w+)\s*=\s*/,"$1=").replace(/(\s+$)/,"");if(0===a.indexOf(e))return a.substring(e.length)}return null}function i(t,e,s){if(t)for(var n=t.split(":"),i=null,a=0,r=n.length;a<r;++a){var c=null,S=n[a].split("$");if(0===a&&(i=parseInt(S.shift()),!i))return;var l=S.length;if(l>=1){var p=o(i,S[0]);if(!p||s[p])continue;c={signInName:p,idp:"msa",isSignedIn:!0}}if(l>=3&&(c.firstName=o(i,S[1]),c.lastName=o(i,S[2])),l>=4){var f=S[3],d=f.split("|");c.otherHashedAliases=d}if(l>=5){var h=parseInt(S[4],16);h&&(c.
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:JSON data
                                                  Category:downloaded
                                                  Size (bytes):121
                                                  Entropy (8bit):4.296888559995328
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:FF432631185D59BE11E35CC63F024573
                                                  SHA1:B8F12A85F14EB09570748DF8CEEA6FAEE085F31D
                                                  SHA-256:9DFE22BCD68B6362D5687D096DCA761218F356A37FC889E83DCD87ABC7DEEAB0
                                                  SHA-512:C929ACE6655CB5F6DA0FADE89F026A7EECCAFE6821CD56BA598E029B4ABC6DAF9A35CEABD236B3BCBF4BE33C74435E964FA983F8B5B1577D0BD369B9BC5DAE7C
                                                  Malicious:false
                                                  Reputation:unknown
                                                  URL:"https://clicktime.cloud.postoffice.net/rest/FF1001/v3/urlstatus?U=https://mvadvancement-my.sharepoint.com/:f:/g/personal/ewanner_mvadvancements_org/Elr4An5-W3dKpaplAFapN9oBQntO33Aum0uwc3Qr2tH1GA%3Fe%3D5%253auBc0Zg%26at%3D9&E=sschultz%40firstfedweb.com&X=XID905CLkP5D3070Xd2&T=FF1001&HV=U,E,X,T&H=f2634b391758e2b7b5ed6086be5fe1e72b2f00f1&CK=CKCLkXXx10021728408c&resubmit=N&_=1733959428726"
                                                  Preview:{"status":"unknown","threatname":"","reprocess":true,"reason":"","polling_status":{"dynamic":1,"static":2,"in_depth":0}}.
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:GIF image data, version 89a, 352 x 3
                                                  Category:dropped
                                                  Size (bytes):2672
                                                  Entropy (8bit):6.640973516071413
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:166DE53471265253AB3A456DEFE6DA23
                                                  SHA1:17C6DF4D7CCF1FA2C9EFD716FBAE0FC2C71C8D6D
                                                  SHA-256:A46201581A7C7C667FD42787CD1E9ADF2F6BF809EFB7596E61A03E8DBA9ADA13
                                                  SHA-512:80978C1D262BC225A8BA1758DF546E27B5BE8D84CBCF7E6044910E5E05E04AFFEFEC3C0DA0818145EB8A917E1A8D90F4BAC833B64A1F6DE97AD3D5FC80A02308
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:GIF89a`............!..NETSCAPE2.0.....!.......,....`.....6......P.l.......H....I..:qJ......k....`BY..L*..&...!.......,....0.............<....[.\K8j.tr.g..!.......,....3............^;.*..\UK.]\.%.V.c...!.......,....7........`....lo...[.a..*Rw~i...!.......,....;........h.....l.G-.[K.,_XA]..'g..!.......,....?........i.....g....Z.}..)..u...F..!.......,....C...............P.,nt^.i....Xq...i..!.......,....F...........{^b....n.y..i...\C.-...!.......,....H..............R...o....h.xV!.z#...!.......,"...L.............r.jY..w~aP(.......[i...!.......,(...N.............r....w.aP.j.'.)Y..S..!.......,....H.........`......hew..9`.%z.xVeS..!.......,5...A.........`...\m.Vmtzw.}.d.%...Q..!.......,9...=.........h......3S..s.-W8m...Q..!.......,A...5.........h.....N...:..!..U..!.......,H.............h....M.x...f.i.4..!.......,O...'.........i...tp......(..!.......,X.............j...@.x....!.......,].............j..L..3em..!.......,e.............`......!.......,n..............{i..!..
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:ASCII text, with very long lines (61177)
                                                  Category:downloaded
                                                  Size (bytes):113424
                                                  Entropy (8bit):5.2850742719795925
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:F3588C5412D4119F95E47073A4A5DF72
                                                  SHA1:3C4B1652E71C25E1CE7DE611FBD17EDBAAE411D9
                                                  SHA-256:6CC79C59F00478CE5D8EAA982EFDD8FC3CC205A7EA023A564BB2688FA206A087
                                                  SHA-512:62886F8BFB32D2BE842A23ECA157556C30EC1D616E2607D9DF1894F702BB7A982EEB3576C95F859B4B8E9183A84D70149A8802F31317F80D4845B02CCFA018F9
                                                  Malicious:false
                                                  Reputation:unknown
                                                  URL:https://aadcdn.msftauth.net/ests/2.1/content/cdnbundles/converged.v2.login.min_81imvbluez-v5hbzpkxfcg2.css
                                                  Preview:/*! Copyright (C) Microsoft Corporation. All rights reserved. *//*!.------------------------------------------- START OF THIRD PARTY NOTICE -----------------------------------------..This file is based on or incorporates material from the projects listed below (Third Party IP). The original copyright notice and the license under which Microsoft received such Third Party IP, are set forth below. Such licenses and notices are provided for informational purposes only. Microsoft licenses the Third Party IP to you under the licensing terms for the Microsoft product. Microsoft reserves all other rights not expressly granted under this agreement, whether by implication, estoppel or otherwise...//-----------------------------------------------------------------------------.twbs-bootstrap-sass (3.3.0).//-----------------------------------------------------------------------------..The MIT License (MIT)..Copyright (c) 2013 Twitter, Inc..Permission is hereby granted, free of charge, to any person
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:ASCII text, with very long lines (9476)
                                                  Category:downloaded
                                                  Size (bytes):9477
                                                  Entropy (8bit):5.083820993965513
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:2EAD379C1E73686AB18ABD0E9DE02AED
                                                  SHA1:42073C7248BACBE4F794FFDE16CF8705999F28C9
                                                  SHA-256:9C5CAC9B09D5F0C3FE3D1D5A811223F1EA089177E78AAFFB9FDC04ED00E7A5A3
                                                  SHA-512:2484FA306CB82772995FDCFFC787052619FD869B4E0B716956324BFCFC7A61FBC73C7998AB3ED2F08C413CEFDA73C3A14F0265C371D918CCADF827312D4EC5A4
                                                  Malicious:false
                                                  Reputation:unknown
                                                  URL:https://cdnjs.cloudflare.com/ajax/libs/mustache.js/2.1.3/mustache.min.js
                                                  Preview:(function defineMustache(global,factory){if(typeof exports==="object"&&exports&&typeof exports.nodeName!=="string"){factory(exports)}else if(typeof define==="function"&&define.amd){define(["exports"],factory)}else{global.Mustache={};factory(Mustache)}})(this,function mustacheFactory(mustache){var objectToString=Object.prototype.toString;var isArray=Array.isArray||function isArrayPolyfill(object){return objectToString.call(object)==="[object Array]"};function isFunction(object){return typeof object==="function"}function typeStr(obj){return isArray(obj)?"array":typeof obj}function escapeRegExp(string){return string.replace(/[\-\[\]{}()*+?.,\\\^$|#\s]/g,"\\$&")}function hasProperty(obj,propName){return obj!=null&&typeof obj==="object"&&propName in obj}var regExpTest=RegExp.prototype.test;function testRegExp(re,string){return regExpTest.call(re,string)}var nonSpaceRe=/\S/;function isWhitespace(string){return!testRegExp(nonSpaceRe,string)}var entityMap={"&":"&amp;","<":"&lt;",">":"&gt;",'"'
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):226
                                                  Entropy (8bit):3.746633314569379
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:9A0074EC225494DF55A7226B2808B01B
                                                  SHA1:8ED0FBB6850F69AEBF05C4854166AA25504E361D
                                                  SHA-256:C3B833253377D17874682D092046115BE3CF3F41F3D1E29230330F094B195408
                                                  SHA-512:5025446F05388A4C536BEFBBF40CD8DC3096B2BA73E0C75686906765C8536748338FA14ECD07B9DDF3B380A12F401524450E473B4409842E19CD50835CE37CDE
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:Array.(. [status] => unknown. [threatname] => . [reprocess] => 1. [reason] => . [polling_status] => Array. (. [dynamic] => 1. [static] => 2. [in_depth] => 0. )..)..
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:PNG image data, 600 x 600, 8-bit/color RGBA, non-interlaced
                                                  Category:downloaded
                                                  Size (bytes):14484
                                                  Entropy (8bit):7.827577013675343
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:D37A2535E82DBE99F18768BF661506BA
                                                  SHA1:C2B5D3E11CCA2A91EFA55C31B759FE8A999B2DF3
                                                  SHA-256:F460E7D8D47F47F0FA005C4638F4D24D4780AADE38F894C27F928EAFC62DD274
                                                  SHA-512:ACB7D4A46F987BE78F8C8C3652D8678B96AC6DA3CCB93842FE6170EE128B3D1F81730CA78EA445398DCFE3C0D9784D6FDF1058C8A4B42ED91B591D0875B9646A
                                                  Malicious:false
                                                  Reputation:unknown
                                                  URL:https://clicktime.cloud.postoffice.net/images/tips.png
                                                  Preview:.PNG........IHDR...X...X......f......bKGD............ .IDATx...g.^U...3.$......i...t..7A..3b.D.t.6...PA..*"(..J.&.#U...!.PRH/....Hy........q.#.a."..z.^.$I.$I.$I.$I.$I.$I.$I.$I.$I.$I.$I.$I.$I.$I.$I.$I.$I.$I.$I.$I.$I.$I.$I.$I.$I.$I.$I.$I.$I.$I.$I.$I.$I.$I.$I.$I.$I.$I.$I.$I.$I.$I.$I.j./:..b.............%..................b.......?O.&..v.:.....L.&.c.....1s.:......@.,I.3.X.X.X.Xm..H*Q..Q.^.^$..g...S..].......J..K....6.N...j......<.<....k...0%...&.`I."0...X.9.j..P..A*^.........AzT)..,XR.........o.E..f...w.J....00+0....`I...l.5...!.T........].X...X...,.l.l.l.l...M..z.....p.p+054..>.`I.>ifjg..j..G.7.7.W.v;J..Kj...]....H...n.I.Z...I.\..%5..K.....i.jo..>iA&.f.....<..G..Y....]..=H.vJ.1.....k....$..`I....^. `K`@l...e..."R.z-6..N.,.^... .*....&...... ..(..,XR.V.....6.....5.2.....q..../Uc9R.. ..O..&.J.Y...D.b.,.............#..3..._.w.g..a..znm.#.ax..r..+.....,R.,XR..#=...>.T........6..D..,X..Lz...0<8..._......H.26....&.O...#.B<.t....p.K.c..H..]....N.d.w...,R#Y.$....iG...,
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:ASCII text, with very long lines (64612)
                                                  Category:downloaded
                                                  Size (bytes):113769
                                                  Entropy (8bit):5.492343205210805
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:9F02E24CD4E7788D28587C2B1CB504E7
                                                  SHA1:59DA2FC24777CD180F6D3A3F7CE9D9DD90520430
                                                  SHA-256:C30FD6BB912661057EC2EEA9A2F135303A6D0F8D110BF11493B369286F0587AE
                                                  SHA-512:95276C7F1BBA2777F02E7CD3674CD0E967C96F0E0FC88C0862E82A7455A6C7D6CC90A23F9623412B3696F39F8C4069B17DC8FDF16C03003165D398E2080CAD57
                                                  Malicious:false
                                                  Reputation:unknown
                                                  URL:https://aadcdn.msftauth.net/shared/1.0/content/js/asyncchunk/convergedlogin_pstringcustomizationhelper_cc2c59f5ef2c09e14b08.js
                                                  Preview:/*!. * ------------------------------------------- START OF THIRD PARTY NOTICE -----------------------------------------. * . * This file is based on or incorporates material from the projects listed below (Third Party IP). The original copyright notice and the license under which Microsoft received such Third Party IP, are set forth below. Such licenses and notices are provided for informational purposes only. Microsoft licenses the Third Party IP to you under the licensing terms for the Microsoft product. Microsoft reserves all other rights not expressly granted under this agreement, whether by implication, estoppel or otherwise.. * . * json2.js (2016-05-01). * https://github.com/douglascrockford/JSON-js. * License: Public Domain. * . * Provided for Informational Purposes Only. * . * ----------------------------------------------- END OF THIRD PARTY NOTICE ------------------------------------------. */.(window.webpackJsonp=window.webpackJsonp||[]).push([[37],{1379:function(e,t,
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:GIF image data, version 89a, 352 x 3
                                                  Category:downloaded
                                                  Size (bytes):3620
                                                  Entropy (8bit):6.867828878374734
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:B540A8E518037192E32C4FE58BF2DBAB
                                                  SHA1:3047C1DB97B86F6981E0AD2F96AF40CDF43511AF
                                                  SHA-256:8737D721808655F37B333F08A90185699E7E8B9BDAAA15CDB63C8448B426F95D
                                                  SHA-512:E3612D9E6809EC192F6E2D035290B730871C269A267115E4A5515CADB7E6E14E3DD4290A35ABAA8D14CF1FA3924DC76E11926AC341E0F6F372E9FC5434B546E5
                                                  Malicious:false
                                                  Reputation:unknown
                                                  URL:https://aadcdn.msftauth.net/shared/1.0/content/images/marching_ants_986f40b5a9dc7d39ef8396797f61b323.gif
                                                  Preview:GIF89a`.........iii!.......!.&Edited with ezgif.com online GIF maker.!..NETSCAPE2.0.....,....`.....6......P.l.......H....I..:qJ......k....`BY..L*..&...!.......,....`.....9..i....Q4......H..j.=.k9-5_..........j7..({.........!.......,....`.....9.......trV.......H....`.[.q6......>.. .CZ.&!.....M...!.......,....`.....8..........:......H..jJ..U..6_....../.el...q.)...*..!.......,....`.....9.....i..l.go.....H..*".U...f......._......5......n..!.......,....`.....:..i......./.....H...5%.kE/5.........In.a..@&3.....J...!.......,....`.....9.......kr.j.....H..*.-.{Im5c..............@&.........!.......,....`.....9.........j..q....H...].&..\.5.........8..S..........!.......,....`.....9.......3q.g..5....H...:u..............Al..x.q.........!.......,....`.....9......\.F....z....H...zX...ov.........h3N.x4......j..!.......,....`.....9........Q.:......H....y..^...1.........n.!.F......E...!.......,....`.....8.........i,......H....*_.21.I.........%...
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 142367
                                                  Category:dropped
                                                  Size (bytes):49911
                                                  Entropy (8bit):7.994516776763163
                                                  Encrypted:true
                                                  SSDEEP:
                                                  MD5:9B96CC09F9E89D0334BA2FBC22B5197A
                                                  SHA1:B5FE69F39E9F61FEF88DF794F02DC4F4086E2592
                                                  SHA-256:E6331018533143C411BAE25326AB52FCED541C48674551AEA78E750855BDCD1D
                                                  SHA-512:2BDD71A34A7D6172AD4B7B6CF077A891D6266C148000EEF8345E2343E6C21ED8783B2EA328EF3BF7176462A3CA575D2D6D4B55A07138CFD1B02900C95F61077D
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:...........m[.8.0........OL....;w.....a.....\N.......h.r~........=........,..JU.......T~.l..?..y..2.X9.|xvP9...TN.......?.....qe.OE.~Gn,.J.T....0......r..#.V&Qx_I.De.._.8.+S?N..HL..J......%O..S........(=.gO.|.T.0......6.. ..y....x..*..8..p.T"1...|$.Cz..V.D%.Ie.F....^."..5....c...?..T8..._..b.gs.4....S]kDZ..7.J.V..l}..?.....c...g.A...8.......8.VB..*....^..f..O.*... ...`...H.{.$. OP..S..AC.gVE.I8..).-U.....R...A..%.T[...Fc{..49..If...y.'w.Q}..oz..v.....W...pp..%..G.+.r:.A.*.....[.:..s.?U......_............k.y0.U....+I5..0.>.Q%.".w.....O....5w..;.;.>..mr.k53r.......k.0.I.<.D......d&...c..jhE..zx.]....y|W....i...`.. .k.P...@.Uq.\;..1............z|.O..Y5..........XtR,....R...k3..<.*.\.2.>.;T..$...kj.5-.i?/..YH`!jb..Z..=.&.L..F...([..y....K5pzQ.>i.1.......0..P...@...L.".n.x..Cj?..w.:+...n..4..H.. .*....S.....h*....8....v.l.[M.0..q..c;.....0*..*.8.......l.TM..n "..km..S.<.T..].k.+1.....P.V...4-W.C....0-/.S;.w......K.z+...DZ....=q.E.@ .Dv.z...@.d.#tE...
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:HTML document, ASCII text
                                                  Category:downloaded
                                                  Size (bytes):209
                                                  Entropy (8bit):5.143049113812332
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:18FFB59B61525F781CF9251045BE575D
                                                  SHA1:BD7318B00B15B7A1C8A48524419FA2E5C27A5B6D
                                                  SHA-256:B6682CAB65D3243B5B75EFB7279DBF49491957484780F2BA0A87632CC0E25642
                                                  SHA-512:A032F853ABD9492232E1183D1CB1D14110B623F2E9DEC56B7B64DD576A0317DDA8D51125763E11D6642433C5364B2BD10A994EE4F1514629A4950BBAB3ABA499
                                                  Malicious:false
                                                  Reputation:unknown
                                                  URL:https://clicktime.cloud.postoffice.net/favicon.ico
                                                  Preview:<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">.<html><head>.<title>404 Not Found</title>.</head><body>.<h1>Not Found</h1>.<p>The requested URL /favicon.ico was not found on this server.</p>.</body></html>.
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 40329
                                                  Category:dropped
                                                  Size (bytes):9984
                                                  Entropy (8bit):7.979200972475404
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:027A7D52E1CEED8AEF7DC13505B81D36
                                                  SHA1:33CF0BCE6A4C8B44B4A80B3116C978C12EE93FD0
                                                  SHA-256:29061464FB6FCE2326B952EACAA95C3C6183BFEA74C3851390E9838720D372A6
                                                  SHA-512:FCDDEBF6DE759B5079E7DF2432771A866DE1824B119AD8CB3BAE11F9FAA060B943D52F121E4C63E7E20D43F31B2220C1D4E9C24A20004C4B061CD1A0A5EE5AC9
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:...........}ks.H......@a{ebU......h.^.._a..3!k...HB....m.%....?i..e..U@.........wefefefU........O.....?8).we:...?x..eQ.....EQ.:-.`p.e.^....b.W..X.........UQ.......,...4.jV~..tQ........`......Y..,.]........sR..E...M....\.c>H5.t......xW.jt.?6?.c(..`_....B.G..'.<.1.c....o...yZ..cZ.a=K+....l.l...EQ..4.=......L_..Z..4gYuQ|._!]m1.`Q.uQ....)..=..|.....2.8G."XY.......]c..*|xT....3@..?..Zm..E.'..*......2..E gy..<(.Z...8XY..4O2....U...4.0..5.W!}x._i.`.T,.V.G...b/.t..j>...<.((....,."Uo5X}.@QE.b.khU.h...>...Q~=.k.?.....o.0k........GM..X......P^G....=..<fY.U..S....K....H..9:*......'...J=).O....#G[m...30k...j.2+.im.(Km3.uxv._.pT.4.>..f.-..UZ.=e...C....._5..xR.:..\U..jR. .....9A..1:1.......a..2...U......YTP..`...l0.9.t.}.'.p.c3q.. {m.,...G1..".L.Aj@.D.h.p......fZ{...eYB......1.Ep.b&..% .c.._i9.).,.eD.'...`.E.i..M3#+6...9+....B..NYB..%..8..?....zv.r..XP..W.../+..e.N........Z..i..... ....4I..iR...8+.>....k...N?....MA.....uU...&...Xyb..u*..H....%.
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:ASCII text, with very long lines (64616)
                                                  Category:dropped
                                                  Size (bytes):450755
                                                  Entropy (8bit):5.449552702818663
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:900C7DA993921F883DD05347B2D1CC08
                                                  SHA1:31F7A9C889C260DD56AE1B601C7AC73AC806C38F
                                                  SHA-256:3BB35E786C5EF0186C1202CE43B9745D0EA7315C2158259BDFBDF9CC028780C6
                                                  SHA-512:8FD0A4EB1E15FFE26081B9F7731260B8C18F89884A4E37258B4890C10D3FAF1CA9DEF61A1B86436A16A49345E56EF8D5416300B7C4C1D0085544B83D9D8958D1
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:/*!. * ------------------------------------------- START OF THIRD PARTY NOTICE -----------------------------------------. * . * This file is based on or incorporates material from the projects listed below (Third Party IP). The original copyright notice and the license under which Microsoft received such Third Party IP, are set forth below. Such licenses and notices are provided for informational purposes only. Microsoft licenses the Third Party IP to you under the licensing terms for the Microsoft product. Microsoft reserves all other rights not expressly granted under this agreement, whether by implication, estoppel or otherwise.. * . * json2.js (2016-05-01). * https://github.com/douglascrockford/JSON-js. * License: Public Domain. * . * Provided for Informational Purposes Only. * . * ----------------------------------------------- END OF THIRD PARTY NOTICE ------------------------------------------. */!function(e){function n(n){for(var t,i,o=n[0],r=n[1],s=0,c=[];s<o.length;s++)
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:HTML document, ASCII text, with very long lines (64257), with CRLF, LF line terminators
                                                  Category:downloaded
                                                  Size (bytes):280693
                                                  Entropy (8bit):4.924049150453652
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:0FDA4FDFF35FCEC889FB2FE1581B5674
                                                  SHA1:D343513DBB29F235A8B84D797D22325CDBA68CD9
                                                  SHA-256:D91C350AB6609E3F62D18207C1C18ABFEFDBB59F2956F617FA8C331D67A26977
                                                  SHA-512:1E745643FCEE21B3BBA685C76C03C10E5802D898862089D17A320D43B2DA447736297AFFD8F2F820E4C36CE20327EB6AD2D0BE38E0BFCBBB36C5E6EA4D2539CA
                                                  Malicious:false
                                                  Reputation:unknown
                                                  URL:https://mvadvancement-my.sharepoint.com/:f:/g/personal/ewanner_mvadvancements_org/Elr4An5-W3dKpaplAFapN9oBQntO33Aum0uwc3Qr2tH1GA?e=5%3auBc0Zg&at=9
                                                  Preview:..<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN".."http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">..<html xmlns:o="urn:schemas-microsoft-com:office:office" lang="en-us" dir="ltr">..<head><meta name="GENERATOR" content="Microsoft SharePoint" /><meta http-equiv="Content-Type" content="text/html; charset=utf-8" /><meta http-equiv="Expires" content="0" /><meta http-equiv="X-UA-Compatible" content="IE=8"/><meta name="ROBOTS" content="NOHTMLINDEX" /><title>......Error....</title><link id="CssLink-f4101f0e51154f5f9f37d8012b391419" rel="stylesheet" type="text/css" href="/_layouts/15/1033/styles/corev15.css?rev=6mW3puolnEzekaR1MkMqzA%3D%3DTAG509"/>.<link id="CssLink-790e9d5f82194e09a29ae35a9a255d6e" rel="stylesheet" type="text/css" href="/_layouts/15/1033/styles/error.css?rev=tF7fyfzbaQzNoASoSDlV4A%3D%3DTAG509"/>.<style id="SPThemeHideForms" type="text/css">body {opacity:0 !important}</style><script type="text/javascript">// <![CDATA[ ...var _initGlobalSnapShot = {};try { if (O
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:downloaded
                                                  Size (bytes):36
                                                  Entropy (8bit):4.503258334775644
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:06B313E93DD76909460FBFC0CD98CB6B
                                                  SHA1:C4F9B2BBD840A4328F85F54873C434336A193888
                                                  SHA-256:B4532478707B495D0BB1C21C314AEF959DD1A5E0F66E52DAD5FC332C8B697CBA
                                                  SHA-512:EFD7E8195D9C126883C71FED3EFEDE55916848B784F8434ED2677DF5004436F7EDE9F80277CB4675C4DEB8F243B2705A3806B412FAA8842E039E9DC467C11645
                                                  Malicious:false
                                                  Reputation:unknown
                                                  URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xNDkSFwmCAmly1gHbXRIFDdFbUVISBQ1Xevf9?alt=proto
                                                  Preview:ChgKDQ3RW1FSGgQIVhgCIAEKBw1Xevf9GgA=
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:PNG image data, 250 x 92, 8-bit/color RGBA, non-interlaced
                                                  Category:dropped
                                                  Size (bytes):9335
                                                  Entropy (8bit):7.971742760307023
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:1C83FE8B9201CAC3D9E92DAB3E5383C4
                                                  SHA1:2CEDC7C3D1CAA57FC400DB2D3EE689626847CF84
                                                  SHA-256:0B6F376E22180D732CDF015BE9DE295BCC8E0BDB10A61536DDFD39C0026918AF
                                                  SHA-512:EF46559B15ED8A2FCD42275C5414D82147EF5F754CD4990103EFE174751008F2A621D9A9D70CF59A825035F5AB112B03D9C58685E3B46AF079A6C98EAA7C7987
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:.PNG........IHDR.......\.....G.......sRGB.........gAMA......a.....pHYs...#...#.x.?v..$.IDATx^..|.e..wf.K..@0...(.....)..."E.r....:XNi..I1..)......T...b....$..$3...f...%...l....<....w..}..m.H$..D".H$..D".H$..D".H$..D".H$..D".H$..D".HNi..P......W.........Wk.....77.\kU"9..PEWU...7..k..%--...e...'4}%.@...h...YYY...S....#..8.Z.HN:'\..-u..z......:.Z.H"...Z*....Z+...&MRKK..,.}[$...d.*.z...24o.2EQ...U.$b8..EJ{.....J.'##.L]7.n.J$..ITtb<..z/.Vj5....k..Z.H"....P..a8s..Z.j%.OV_<KOkU".8N..)..s.f-...Z....3.V%..$R,......k.p.....U.$"..EWNs..tk.....t5.c..*.D,...+......c.F<....p.Y.....I..Q.`......V#....GQ<..V%..&.....yaa1b..&##.".P.[..I..Q.n1$##.zk9.X.p.SU.l.J.k.D..D..3.UU%...G.;w....W..$..A$Ztr^aa...!++.,E1..V%.Z.IW.|}....Z.\...OnGk5".u......_..f-J$..IU...|}..JZ.l.....k...(Z.t..x.........g.....{[*.$b.I.<.O..s_hb.....g.p..O...5==.(**.Sv...[2&>....4...Z.'.|.....N./]..\.tI..s..9...*...!)z\\.....&MZX......`.gR...y.f...0JJJ.)...O<.L.Y..I....B'.Z5...W^y.\
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):23063
                                                  Entropy (8bit):4.7535440881548165
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:90EA7274F19755002360945D54C2A0D7
                                                  SHA1:647B5D8BF7D119A2C97895363A07A0C6EB8CD284
                                                  SHA-256:40732E9DCFA704CF615E4691BB07AECFD1CC5E063220A46E4A7FF6560C77F5DB
                                                  SHA-512:7474667800FF52A0031029CC338F81E1586F237EB07A49183008C8EC44A8F67B37E5E896573F089A50283DF96A1C8F185E53D667741331B647894532669E2C07
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:function WebForm_PostBackOptions(eventTarget, eventArgument, validation, validationGroup, actionUrl, trackFocus, clientSubmit) {.. this.eventTarget = eventTarget;.. this.eventArgument = eventArgument;.. this.validation = validation;.. this.validationGroup = validationGroup;.. this.actionUrl = actionUrl;.. this.trackFocus = trackFocus;.. this.clientSubmit = clientSubmit;..}..function WebForm_DoPostBackWithOptions(options) {.. var validationResult = true;.. if (options.validation) {.. if (typeof(Page_ClientValidate) == 'function') {.. validationResult = Page_ClientValidate(options.validationGroup);.. }.. }.. if (validationResult) {.. if ((typeof(options.actionUrl) != "undefined") && (options.actionUrl != null) && (options.actionUrl.length > 0)) {.. theForm.action = options.actionUrl;.. }.. if (options.trackFocus) {.. var lastFocus = theForm.elements["__LASTFOCUS"];.. if ((typeo
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:Unicode text, UTF-8 text, with very long lines (32016)
                                                  Category:downloaded
                                                  Size (bytes):57510
                                                  Entropy (8bit):5.3728935008680745
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:23C7FEEF919F9374C1B26F019804CDA8
                                                  SHA1:3E22BA24CFD4F5A1C4D189AAADB1A82A867377C0
                                                  SHA-256:993A5748DB7B6BC125F88788845A7599234130BCE2858B528071035488CB886D
                                                  SHA-512:93D4D19CA4BACFC0AD64690E2426D573D47991DAF772D178D5C477369675539274A5E97C666A97A49AD0EC82E566EF4B71E967E7D7FFC575FBD2171E06791276
                                                  Malicious:false
                                                  Reputation:unknown
                                                  URL:https://aadcdn.msftauth.net/ests/2.1/content/cdnbundles/ux.converged.login.strings-en.min_i8f-75gfk3tbsm8bmatnqa2.js
                                                  Preview:!function(e){function o(n){if(i[n])return i[n].exports;var t=i[n]={exports:{},id:n,loaded:!1};return e[n].call(t.exports,t,t.exports,o),t.loaded=!0,t.exports}var i={};return o.m=e,o.c=i,o.p="",o(0)}([function(e,o,i){i(2);var n=i(1),t=i(5),r=i(6),a=r.StringsVariantId,s=r.AllowedIdentitiesType;n.registerSource("str",function(e,o){if(e.WF_STR_SignupLink_AriaLabel_Text="Create a Microsoft account",e.WF_STR_SignupLink_AriaLabel_Generic_Text="Create a new account",e.CT_STR_CookieBanner_Link_AriaLabel="Learn more about Microsoft's Cookie Policy",e.WF_STR_HeaderDefault_Title=o.iLoginStringsVariantId===a.CombinedSigninSignupV2WelcomeTitle?"Welcome":"Sign in",e.STR_Footer_IcpLicense_Text=".ICP.13015306.-10",o.oAppCobranding&&o.oAppCobranding.friendlyAppName){var i=o.fBreakBrandingSigninString?"to continue to {0}":"Continue to {0}";e.WF_STR_App_Title=t.format(i,o.oAppCobranding.friendlyAppName)}switch(o.oAppCobranding&&o.oAppCobranding.signinDescription&&(e.WF_STR_Default_Desc=o.oAppCobrand
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 150x150, segment length 16, baseline, precision 8, 1568x1263, components 3
                                                  Category:downloaded
                                                  Size (bytes):99129
                                                  Entropy (8bit):7.212163983369542
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:AE249503768AAEED2333AFE8973D0E84
                                                  SHA1:1501FBC1A1A31DBD1FBA476FF01CA6688E436313
                                                  SHA-256:36A57E7DAB86174B01A45F2F6EF50F9B0D0515ADB26745561557C743EEA751C1
                                                  SHA-512:0C2D8854165369D352A77F957CA07703E55CC19F25B7445C2155B19F6132A5AC774772136DC5586AF2C1816CD47E1089CBD8BA48B243FFB859EB395D5EA9ABA4
                                                  Malicious:false
                                                  Reputation:unknown
                                                  URL:https://aadcdn.msftauthimages.net/dbd5a2dd-zvodlet4gokq3wyyf1yen8currujcofk2xf80cnwcak/logintenantbranding/0/illustration?ts=637949671377217706
                                                  Preview:......JFIF.............,Photoshop 3.0.8BIM..........................G.http://ns.adobe.com/xap/1.0/.<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?>..<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.3-c011 66.145661, 2012/02/06-14:56:27 ">...<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">....<rdf:Description rdf:about="" xmlns:dc="http://purl.org/dc/elements/1.1/">.....<dc:format>image/jpeg</dc:format>.....<dc:title>......<rdf:Alt>.......<rdf:li xml:lang="x-default">Web</rdf:li>......</rdf:Alt>.....</dc:title>....</rdf:Description>....<rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpGImg="http://ns.adobe.com/xap/1.0/g/img/">.....<xmp:CreatorTool>Adobe Illustrator CS6 (Macintosh)</xmp:CreatorTool>.....<xmp:CreateDate>2015-07-20T12:44:06-07:00</xmp:CreateDate>.....<xmp:ModifyDate>2015-07-20T19:44:13Z</xmp:ModifyDate>.....<xmp:MetadataDate>2015-07-20T12:44:06-07:00</xmp:MetadataDate>.....<xmp:Thumbnails>......<rdf:Al
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:ASCII text, with very long lines (35238), with no line terminators
                                                  Category:dropped
                                                  Size (bytes):35238
                                                  Entropy (8bit):5.390650418562352
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:C637DE6889D81964119BA1FD124E2454
                                                  SHA1:5DB2B1681BE6FF9A7B26E269CD80D817D41A01BE
                                                  SHA-256:18E8366C8C5590C3D056BA6CA9691B7471D6970EE00D0E22A4B68E517B54F087
                                                  SHA-512:78288767F08DB38F6DC8C366546CECC05DF35C25BCD898B94DCCC5ECCB3ACD7807817BAF813BCA11F4CCAC169A980E4F10EBF4334000C4D2D0F74DCC30BB36EE
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:var Theming={__namespace:true};Theming_module_def();function Theming_module_def(){Theming.ApplyThemeToCss=tb;Theming.ReplaceCssTextForElement=J;Theming.ThemeInfo=E;Theming.ImageProcessor=R;Theming.Colors={Color:a,ColorApplication:x,HslColor:h};function cb(d,c,e){for(var b=true,a=0;a<c.length;a++)if(d.charCodeAt(e+a)!==c.charCodeAt(a)){b=false;break}return b}var c={text:0,comment:1,string:2,url:3,right_par:4,font_family:5,rgb:6,rgba:7,colon:8,semicolon:9,right_curly:10,color:11};function d(a,b){this.kind=a;this.text=b}function Db(b){var e,a,g,f,l="*/",u="url(",i=")",j="font-family",t="rgb(",s="rgba(",o="#",w=":",y=";",x="}",k=new d(c.text,"");if(!Boolean(b))b="";a=0;f=b.length;m.prototype={kind:0,text:"",getToken:function(){return null}};function m(){}var r={"/":{},"'":{},'"':{},"#":{},")":new d(c.right_par,")"),";":new d(c.semicolon,";"),":":new d(c.colon,":"),"}":new d(c.right_curly,"}"),u:{getToken:q},f:{getToken:n},r:{getToken:p}};function h(c){var a=b.indexOf(")",c);if(a<0)a=f;retu
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                                  Category:downloaded
                                                  Size (bytes):3947
                                                  Entropy (8bit):7.778530388911459
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:C0CC11B97D6386BBA1564E44774CF3E7
                                                  SHA1:3077CE86499EECF8AEADD59F1CD96673471398F3
                                                  SHA-256:37FAD979EBB105A728790714F1D959D4E277A0CAC7D3F71F54C5CF36DA16C8EC
                                                  SHA-512:AB74E9972D5F94069571969A095B5D9DEE9FE620545463CE284085335711A25F2DCDED9E6F16DF126A4E739D081885271AE308051A61A14800EAF5EC933D9B9D
                                                  Malicious:false
                                                  Reputation:unknown
                                                  URL:https://clicktime.cloud.postoffice.net/images/tick.png
                                                  Preview:.PNG........IHDR.............\r.f...2IDATx....p....G...\u.T4...P4....C!x...v`<....W)s]F.92.l...8#.`....i.y....}v.....0...+.w.J.}</.....T.........._c.6a3....c....MX....>.K...1..p .Z...5..c.z\..\.{.Mv/.B........j#..C..X........a.......A....P7^.....".. n...jt#........b-.......d.....T..N.F...p*.@..hU.8..1.PM*..Kp4..@.S..o.BUp.N..d.r........]..K....@.8...M..8..H2....\....0....$...u`.~.P.~.Y.xPD...X.PKY...BR-.P...6.Z.mX<....ub.6".V6b.:....h:z.jk...$.......R.....PRO...F..vc..`...o....-x.:.@{{.~....+<....I..;.R.;q.&...p<nE.@..'...5.K'0.%.b)&....<\.(.t=&..../.G.H......C..QG.J.j..2.... m.T...W...@R?^m.......h...K...h...=.....0...G..!e..G...:..!.....@}LG?B.X?f..b.. ..H..g..q&*.."Up..... Z....0>.!.6p....r..F....Y....2.P...R.{.........4.#`.*...*.c.....Jd7....8...R.m..e...x.!..f.Q....^..%.......FH....W..,E<....... .GR...5...V.^I..[.....>I........1...].p..f.Ni..LF?.f..ar.....!$..u.B........pRa3..qR..`..".#i-.h..,E.N....... .'i./.5....Q7..DG..x#..$.1..<...u'i3..S..h.I..%.S0.h.I.
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:HTML document, ASCII text, with very long lines (2621), with CRLF line terminators
                                                  Category:downloaded
                                                  Size (bytes):2742
                                                  Entropy (8bit):5.656383707670956
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:B42FADFF879386D6A0CB5F8FB130FF09
                                                  SHA1:3643DBE73FF7EE0C95D90C33C1005D935CA6AEBE
                                                  SHA-256:091A9FECE328AE75D8BA46CEE9ED194F789DCF14E5590C9066452BFE3F7455FF
                                                  SHA-512:6DCBB7C84CFFD8E79DFA3FB35DDFEEA92F583A23CC96AFA3AA2D33D6B4AAB7878C20C77A6F0092728AC25F223CEA11EB5C2AB73DBF74D9F1E0B87F5BA27C4616
                                                  Malicious:false
                                                  Reputation:unknown
                                                  URL:https://fpt2.microsoft.com/Clear.HTML?ctx=Ls1.0&wl=False&session_id=66a36ca1d045700040ed0645ca6da09a&id=d1b4f369-6973-b6ca-07b7-3b27c398d092&w=8DD1A3B09B094ED&tkt=taBcrIH61PuCVH7eNCyH0HyAAKgSb15ZEqidLg30r8MSHcqN4yn2jnZx%252bY0X0hLLaA9RYSX4h%252fZtmAewXrWwuhTN3ySXBmiev%252fRhBYeHZbrozMkAhjoC97DU1HeFn5SizlBJNO1P4Mhkfx1hIUdOZuTc51Z8imBGvrvLeI0%252fJjrveZxiIwulJ06ZoF06wv85sPGtaJEokKZgRjl%252fil1bD097jeIwv1V41qJd21d1Lew4hcZHE7FuUGizW4j29Bck0WrGiRH%252bXWJiAWVfwyZcSTaRY9JiVs9%252fF3ma1u1kvRmSoQePfb4Ft71JDHpRUQAe&CustomerId=33e01921-4d64-4f8c-a055-5bdaffd5e33d
                                                  Preview:<!DOCTYPE html>..<html xmlns="http://www.w3.org/1999/xhtml">..<head>.. <title></title>..</head>..<script>function BaseStamp() { this.GetStorageQsInfo = function () { if (window.localStorage) { var n = window.localStorage.getItem(lsKey); var lsupd = "False"; if (lsupd === "true" && n) { var xhr = new XMLHttpRequest(), method = "GET", url = target + "updatels.html?ofid=" + n + "&session_id=" + sid + "&CustomerId=" + cid; xhr.open(method, url, true); xhr.onreadystatechange = function () { if (xhr.readyState === XMLHttpRequest.DONE && xhr.status === 200) { var update = xhr.responseText; if (update && update.toLowerCase() === "true") { window.localStorage.setItem(lsKey, id); } } }; xhr.send(); } if (n && n != null && n != "" || (window.localStorage.setItem(lsKey, id), n = id), id != n) return "session_id=" + sid + "&CustomerId=" + cid + "&fid=" + id + "&ofid=" + n + "&w=" + ticks + "&auth=" + encodeURIComponent(authKey) } return "" }; this.newXMLHttp = function () { var n = null; return
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:ASCII text, with very long lines (65439)
                                                  Category:dropped
                                                  Size (bytes):90677
                                                  Entropy (8bit):5.331203510001561
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:57FD0FB79B8289945CA246DE0908D270
                                                  SHA1:7FC9AB444778E83D566F35102D604969ED50576D
                                                  SHA-256:EB327424AA27D47E4499187303774F8F22557359DB3C6BB583E033E07DD0B337
                                                  SHA-512:99F654C722C50C08BB1C68A18BF6EED1FDA1E4CCF6D30BE65BFA6F24B21BA2F1995870C8CF54E820655B41497716DDFDD7487E0A33C121B322F705FA37E5DA09
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:/*! For license information please see oneds-analytics-js_077217740c853b5d4fe8.js.LICENSE.txt */."use strict";(self.webpackChunk_msidentity_sisu_msa=self.webpackChunk_msidentity_sisu_msa||[]).push([[471],{2278:function(n,e,t){t.r(e),t.d(e,{AppInsightsCore:function(){return qo},ApplicationInsights:function(){return ja},BE_PROFILE:function(){return Vo},BaseTelemetryPlugin:function(){return di},Cloud:function(){return Vi},CoreUtils:function(){return Hr},Device:function(){return Xi},DiagnosticLogger:function(){return et},EventLatency:function(){return Ga},EventPersistence:function(){return Qa},EventsDiscardedReason:function(){return Ho},InternalAppInsightsCore:function(){return Ko},Loc:function(){return $i},LoggingSeverity:function(){return Wa},MinChannelPriorty:function(){return $a},NRT_PROFILE:function(){return Wo},NotificationManager:function(){return Uo},PostChannel:function(){return qa},PropertiesPlugin:function(){return Po},RT_PROFILE:function(){return jo},Session:function(){return B
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:downloaded
                                                  Size (bytes):72
                                                  Entropy (8bit):4.94980734266503
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:605058644D0DFD48047E0CEB808DCA1D
                                                  SHA1:2079183E908FA4CAD4B523EE9D7A04489D1383D7
                                                  SHA-256:6882C0D82DED2D86FE7CA2FA7181C9E3E6B2660F2FBC0A6CFBA47245A7F4BFBB
                                                  SHA-512:6D1A9DC642CED49F995FBB84BB6777EEE0C4F3BD199FC42EE61724C20FDA1E756744460D94778B10A19D9C105C9334CB691A55A7A6BB0559F019DD2B8A1A4A75
                                                  Malicious:false
                                                  Reputation:unknown
                                                  URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xNDkSEAlwWwY0Nini5hIFDVd69_0=?alt=proto
                                                  Preview:CjIKMA1Xevf9GgQISxgCKiMIClIfChVAIS4jKiRfLT8rJiUvLCleKDo9JzsQARj/////Dw==
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:downloaded
                                                  Size (bytes):6
                                                  Entropy (8bit):2.584962500721156
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:AAAB7A355103063D9EEB4824A3A6B374
                                                  SHA1:E51555F02C32321F3E48F07A0FA5AF46DF835BFC
                                                  SHA-256:79BA862622D6FA84AC7E4F98EB95043A255FC2C81711E9400A8AA4D4B1608471
                                                  SHA-512:D1A0C9C4F628459F5CA904405B2A66A69425A50E8DCE1BAA43161D784EB219BD3E1FD9447BCBACC314652EDA08CF0B02C863C87F3AC1534AE0F62A414C191F1B
                                                  Malicious:false
                                                  Reputation:unknown
                                                  URL:https://fpt.live.com/Images/Clear.PNG?ctx=jscb1.0&session_id=66a36ca1d045700040ed0645ca6da09a&CustomerId=33e01921-4d64-4f8c-a055-5bdaffd5e33d&esi=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&eci=eyJ1dmRyIjoiR29vZ2xlIEluYy4gKEdvb2dsZSkiLCJ1cmRyIjoiQU5HTEUgKEdvb2dsZSwgVnVsa2FuIDEuMy4wIChTd2lmdFNoYWRlciBEZXZpY2UgKFN1Ynplcm8pICgweDAwMDBDMERFKSksIFN3aWZ0U2hhZGVyIGRyaXZlcikiLCJ2ZHIiOiJXZWJLaXQiLCJyZHIiOiJXZWJLaXQgV2ViR0wiLCJpZHVoIjoiMTViNmNhNDcyNjliZTQyODc1Njg1MDY5MzdlOTkxN2MifQ==&PageId=SI&u1=&u3=10.0.0&u4=x86&u5=64&u2=(Google%20Chrome%2C117.0.5938.149)%2C(Not%3BA%3DBrand%2C8.0.0.0)%2C(Chromium%2C117.0.5938.149)
                                                  Preview:dfp:OK
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:ASCII text, with very long lines (26548)
                                                  Category:downloaded
                                                  Size (bytes):26711
                                                  Entropy (8bit):4.753681219070429
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:0831CBA6A670E405168B84AA20798347
                                                  SHA1:05EA25BC9B3AC48993E1FEE322D3BC94B49A6E22
                                                  SHA-256:936FFCCDC35BC55221E669D0E76034AF76BA8C080C1B1149144DBBD3B5311829
                                                  SHA-512:655F4A6B01B62DE824C29DE7025C4B21516E7536AE5AE0690B5D2E11A7CC1D82F449AAEBCF903B1BBF645E1E7EE7EC28C50E47339E7D5D7D94663309DFA5A996
                                                  Malicious:false
                                                  Reputation:unknown
                                                  URL:https://maxcdn.bootstrapcdn.com/font-awesome/4.4.0/css/font-awesome.min.css
                                                  Preview:/*!. * Font Awesome 4.4.0 by @davegandy - http://fontawesome.io - @fontawesome. * License - http://fontawesome.io/license (Font: SIL OFL 1.1, CSS: MIT License). */@font-face{font-family:'FontAwesome';src:url('../fonts/fontawesome-webfont.eot?v=4.4.0');src:url('../fonts/fontawesome-webfont.eot?#iefix&v=4.4.0') format('embedded-opentype'),url('../fonts/fontawesome-webfont.woff2?v=4.4.0') format('woff2'),url('../fonts/fontawesome-webfont.woff?v=4.4.0') format('woff'),url('../fonts/fontawesome-webfont.ttf?v=4.4.0') format('truetype'),url('../fonts/fontawesome-webfont.svg?v=4.4.0#fontawesomeregular') format('svg');font-weight:normal;font-style:normal}.fa{display:inline-block;font:normal normal normal 14px/1 FontAwesome;font-size:inherit;text-rendering:auto;-webkit-font-smoothing:antialiased;-moz-osx-font-smoothing:grayscale}.fa-lg{font-size:1.33333333em;line-height:.75em;vertical-align:-15%}.fa-2x{font-size:2em}.fa-3x{font-size:3em}.fa-4x{font-size:4em}.fa-5x{font-size:5em}.fa-fw{width:1.
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:ASCII text
                                                  Category:downloaded
                                                  Size (bytes):2186
                                                  Entropy (8bit):4.757782388872235
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:07A6DC5AC593B15AAF16A70BE15F6D24
                                                  SHA1:7C3E38C817281206726470330229D1B7E2A4790B
                                                  SHA-256:5E56EAB72979F3A0AA28B53CD2DB8395B9BB8AC4433DDDC94B221DAA25A5B73A
                                                  SHA-512:44D8CA93015B9D1410515B2762808B2C52B6C4302B5D6B5804E0BC6A3435E7F93859669172D7207719EDC8A59A70FD9DADE50C10BBF6D5FF867AFA9B7776F62B
                                                  Malicious:false
                                                  Reputation:unknown
                                                  URL:https://clicktime.cloud.postoffice.net/css/styles.css
                                                  Preview:body {. background-color: #eee;. color: #444;. font-family:"Open Sans","Helvetica Neue", Helvetica, Arial, sans-serif;. font-size: 14px;.}.h1 {. font-size: 24pt;. font-weight: normal .}.table {. width: 60%;.}..analysis h3 {. display: inline;.}..content {. visibility: visible;. z-index: 1;.}.#watermark-text-black {. color:black;. opacity: 0.2;. font-size:120px;. transform:rotate(330deg);. -webkit-transform:rotate(330deg);. position:absolute;. margin: 100px auto;. padding: 2px 2px;. visibility: hidden;.}.#watermark-text-white {. color:white;. opacity: 0.2;. font-size:120px;. transform:rotate(330deg);. -webkit-transform:rotate(330deg);. position:absolute;. margin: 100px auto;. visibility: hidden;.}.button {. width: 100%;. text-align: left;. padding: 0px 15px;. font-size: 12pt;. color: #fff;. background-color: #555;. border: 5px solid #555;.}.button:hover {. background-color: #333;.}.a
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:SVG Scalable Vector Graphics image
                                                  Category:dropped
                                                  Size (bytes):1592
                                                  Entropy (8bit):4.205005284721148
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:4E48046CE74F4B89D45037C90576BFAC
                                                  SHA1:4A41B3B51ED787F7B33294202DA72220C7CD2C32
                                                  SHA-256:8E6DB1634F1812D42516778FC890010AA57F3E39914FB4803DF2C38ABBF56D93
                                                  SHA-512:B2BBA2A68EDAA1A08CFA31ED058AFB5E6A3150AABB9A78DB9F5CCC2364186D44A015986A57707B57E2CC855FA7DA57861AD19FC4E7006C2C239C98063FE903CF
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:<svg xmlns="http://www.w3.org/2000/svg" width="48" height="48" viewBox="0 0 48 48"><defs><style>.a{fill:none;}.b{fill:#404040;}</style></defs><rect class="a" width="48" height="48"/><path class="b" d="M40,32.578V40H32V36H28V32H24V28.766A10.689,10.689,0,0,1,19,30a10.9,10.9,0,0,1-5.547-1.5,11.106,11.106,0,0,1-2.219-1.719A11.373,11.373,0,0,1,9.5,24.547a10.4,10.4,0,0,1-1.109-2.625A11.616,11.616,0,0,1,8,19a10.9,10.9,0,0,1,1.5-5.547,11.106,11.106,0,0,1,1.719-2.219A11.373,11.373,0,0,1,13.453,9.5a10.4,10.4,0,0,1,2.625-1.109A11.616,11.616,0,0,1,19,8a10.9,10.9,0,0,1,5.547,1.5,11.106,11.106,0,0,1,2.219,1.719A11.373,11.373,0,0,1,28.5,13.453a10.4,10.4,0,0,1,1.109,2.625A11.616,11.616,0,0,1,30,19a10.015,10.015,0,0,1-.125,1.578,10.879,10.879,0,0,1-.359,1.531Zm-2,.844L27.219,22.641a14.716,14.716,0,0,0,.562-1.782A7.751,7.751,0,0,0,28,19a8.786,8.786,0,0,0-.7-3.5,8.9,8.9,0,0,0-1.938-2.859A9.269,9.269,0,0,0,22.5,10.719,8.9,8.9,0,0,0,19,10a8.786,8.786,0,0,0-3.5.7,8.9,8.9,0,0,0-2.859,1.938A9.269,9.269,0,0,0,
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:HTML document, ASCII text, with CRLF line terminators
                                                  Category:downloaded
                                                  Size (bytes):182
                                                  Entropy (8bit):5.111382121361486
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:B74499BDA902C84D1468A84DA5F443FB
                                                  SHA1:0A3259A9852BE07405F10D39293466137C44BB4F
                                                  SHA-256:0BA26423ED3348AE5C95A103E7D7AF6EA3B202C4A4830EFF7D609558925A5382
                                                  SHA-512:B82A3F5996F65F36565E066845E673B7AB1587F6A64B7CD41225A5867CE6CFC38CE0DB7349AA0855C23F2E562C26D932EF53DB9DA9E42228D58C54B0DC6EBBD4
                                                  Malicious:false
                                                  Reputation:unknown
                                                  URL:https://fpt.live.com/?session_id=66a36ca1d045700040ed0645ca6da09a&CustomerId=33e01921-4d64-4f8c-a055-5bdaffd5e33d&PageId=SI
                                                  Preview:<!DOCTYPE html>..<html xmlns="http://www.w3.org/1999/xhtml">..<head>.. <title></title>.. <script>window.parent.postMessage('dfp:OK', '*');</script>..</head>..<body/>..</html>..
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:ASCII text, with very long lines (45797)
                                                  Category:dropped
                                                  Size (bytes):406986
                                                  Entropy (8bit):5.31789636250024
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:9083D228E539FD87EF95A94B7ABC396C
                                                  SHA1:159AE950D79B4987D65F18FFBF6FF87D76C5B536
                                                  SHA-256:54B34EA260D9DCF6D7961A60C9B540673312A965F9DDC2F1AB9855D622BFA07C
                                                  SHA-512:1306A0CFBA637F249786677E9C29D72E15C72F1575DEB217E9E965E456D2320C5644CDE43F06BA1E8373D11E16D33DD955FB3E9077C38F585E4A33B5A1075A0B
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:/*!. * ------------------------------------------- START OF THIRD PARTY NOTICE -----------------------------------------. * . * This file is based on or incorporates material from the projects listed below (Third Party IP). The original copyright notice and the license under which Microsoft received such Third Party IP, are set forth below. Such licenses and notices are provided for informational purposes only. Microsoft licenses the Third Party IP to you under the licensing terms for the Microsoft product. Microsoft reserves all other rights not expressly granted under this agreement, whether by implication, estoppel or otherwise.. * . * json2.js (2016-05-01). * https://github.com/douglascrockford/JSON-js. * License: Public Domain. * . * Provided for Informational Purposes Only. * . * ----------------------------------------------- END OF THIRD PARTY NOTICE ------------------------------------------. */.(window.webpackJsonp=window.webpackJsonp||[]).push([[8],Array(539).concat([f
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:ASCII text, with very long lines (456), with no line terminators
                                                  Category:dropped
                                                  Size (bytes):456
                                                  Entropy (8bit):5.222144795560152
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:5769139CBAB74965D9F0E9FB4D6511F3
                                                  SHA1:B3932995EB64FA866BE0AC7B76B3EF249D345013
                                                  SHA-256:292AB8028C484B7A97375CDA50CD120B363B7443BDC760ABA6BD0DCB30E9A32F
                                                  SHA-512:3A25D82DE64B8C8B9830C46F5FD5375445056EBB9E84043578A68B694A587C3CD6BD196984400D39D8209836DD4D315F3EE941A51597BB66690F6D7BE8C38A91
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:function $_global_blank(){if("undefined"==typeof g_all_modules)g_all_modules={};g_all_modules["blank.js"]={version:{rmj:16,rmm:0,rup:25506,rpr:12016}};typeof spWriteProfilerMark=="function"&&spWriteProfilerMark("perfMarkBegin_blank.js");typeof spWriteProfilerMark=="function"&&spWriteProfilerMark("perfMarkEnd_blank.js")}function ULSaew(){var a={};a.ULSTeamName="Microsoft SharePoint Foundation";a.ULSFileName="blank.commentedjs";return a}$_global_blank();
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:ASCII text, with very long lines (32038)
                                                  Category:dropped
                                                  Size (bytes):95992
                                                  Entropy (8bit):5.391333957965341
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:F03E5A3BF534F4A738BC350631FD05BD
                                                  SHA1:37B1DB88B57438F1072A8EBC7559C909C9D3A682
                                                  SHA-256:AEC3D419D50F05781A96F223E18289AEB52598B5DB39BE82A7B71DC67D6A7947
                                                  SHA-512:8EEEAEFB86CF5F9D09426814F7B60E1805E644CAC3F5AB382C4D393DD0B7AB272C1909A31A57E6D38D5ACF207555F097A64A6DD62F60A97093E97BB184126D2A
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:/*! jQuery v1.11.3 | (c) 2005, 2015 jQuery Foundation, Inc. | jquery.org/license */.!function(a,b){"object"==typeof module&&"object"==typeof module.exports?module.exports=a.document?b(a,!0):function(a){if(!a.document)throw new Error("jQuery requires a window with a document");return b(a)}:b(a)}("undefined"!=typeof window?window:this,function(a,b){var c=[],d=c.slice,e=c.concat,f=c.push,g=c.indexOf,h={},i=h.toString,j=h.hasOwnProperty,k={},l="1.11.3",m=function(a,b){return new m.fn.init(a,b)},n=/^[\s\uFEFF\xA0]+|[\s\uFEFF\xA0]+$/g,o=/^-ms-/,p=/-([\da-z])/gi,q=function(a,b){return b.toUpperCase()};m.fn=m.prototype={jquery:l,constructor:m,selector:"",length:0,toArray:function(){return d.call(this)},get:function(a){return null!=a?0>a?this[a+this.length]:this[a]:d.call(this)},pushStack:function(a){var b=m.merge(this.constructor(),a);return b.prevObject=this,b.context=this.context,b},each:function(a,b){return m.each(this,a,b)},map:function(a){return this.pushStack(m.map(this,function(b,c){ret
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:ASCII text, with very long lines (65536), with no line terminators
                                                  Category:dropped
                                                  Size (bytes):340993
                                                  Entropy (8bit):5.442856199932659
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:CA4FBFA5C2BF4A3D13F15305C617F49A
                                                  SHA1:828763FC83008247D28A644171F71ABEC6E40767
                                                  SHA-256:7AE16143B9946D9DECB9E2B70DA6C0839D21D81949A100B3E3505A7B5CA22A5C
                                                  SHA-512:417853932A36202042E2BF0AD4922DC7D5D2335D67ED938279DD004606E7D030356EFC380F88E22944071F3928DA28CA576D4D04C4ECEB4B1247480E2B27012F
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:function $_global_init(){if("undefined"==typeof g_all_modules)g_all_modules={};g_all_modules["init.js"]={version:{rmj:16,rmm:0,rup:25506,rpr:12016}};if(-1!=navigator.userAgent.indexOf("ProfilerMark")&&"function"==typeof msWriteProfilerMark)spWriteProfilerMark=function(a){window.msWriteProfilerMark(a)};typeof spWriteProfilerMark=="function"&&spWriteProfilerMark("perfMarkBegin_init.js");if(typeof OffSwitch=="undefined"){OffSwitch={__namespace:true};OffSwitch_module_def()}if(typeof RuntimeErrors=="undefined"){RuntimeErrors={__namespace:true};RuntimeErrors_module_def()}if(typeof Verify=="undefined"){Verify={__namespace:true};Verify_module_def()}if(typeof Define=="undefined"){Define={__namespace:true};Define_module_def()}if(typeof BrowserDetection=="undefined"){BrowserDetection={__namespace:true};BrowserDetection_module_def()}(function(){b.prototype={firefox:undefined,firefox36up:undefined,firefox3up:undefined,firefox4up:undefined,ie:undefined,ie55up:undefined,ie5up:undefined,ie7down:undefi
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:ASCII text, with very long lines (65536), with no line terminators
                                                  Category:downloaded
                                                  Size (bytes):190152
                                                  Entropy (8bit):5.348678574819375
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:4877EFC88055D60953886EC55B04DE34
                                                  SHA1:2341B026A3E2A3B01AFA1A39D1706840D75E09B3
                                                  SHA-256:8405362EB8F09DF13AE244DE155B51B1577274673D9728B6C81CD0278A63C8B0
                                                  SHA-512:625844EDC37594D5C2F7622BD1B59278BF68ABB2FA22476C56826433C961C7B1924858A7588F8B6284D3C5AC8738ECB895EEC949DE18667A98C04A59CB03DAC0
                                                  Malicious:false
                                                  Reputation:unknown
                                                  URL:https://aadcdn.msftauth.net/shared/1.0/content/js/oneDs_f2e0f4a029670f10d892.js
                                                  Preview:(window.telemetry_webpackJsonp=window.telemetry_webpackJsonp||[]).push([[2],[,,,function(e,t,n){"use strict";n.r(t),n.d(t,"ValueKind",(function(){return r.e})),n.d(t,"EventLatency",(function(){return r.a})),n.d(t,"EventPersistence",(function(){return r.b})),n.d(t,"TraceLevel",(function(){return r.d})),n.d(t,"AppInsightsCore",(function(){return i.a})),n.d(t,"BaseCore",(function(){return d})),n.d(t,"_ExtendedInternalMessageId",(function(){return r.f})),n.d(t,"EventPropertyType",(function(){return r.c})),n.d(t,"ESPromise",(function(){return g})),n.d(t,"ESPromiseScheduler",(function(){return C})),n.d(t,"ValueSanitizer",(function(){return I})),n.d(t,"NotificationManager",(function(){return E.a})),n.d(t,"BaseTelemetryPlugin",(function(){return S.a})),n.d(t,"ProcessTelemetryContext",(function(){return N.a})),n.d(t,"MinChannelPriorty",(function(){return w.a})),n.d(t,"EventsDiscardedReason",(function(){return P.a})),n.d(t,"DiagnosticLogger",(function(){return c.a})),n.d(t,"LoggingSeverity",(fun
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:downloaded
                                                  Size (bytes):622
                                                  Entropy (8bit):5.030708856292114
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:B45EDFC9FCDB690CCDA004A8483955E0
                                                  SHA1:BAEDF73329EABB32504CAC640538EE3B6B31819F
                                                  SHA-256:E817BF53005172205995AA07E0021BD8254A0204A1177E925F365E838C32D069
                                                  SHA-512:E2709C77BA686FC58FE528EC2C2CEB6B9C84D045018D77FB9B376359F204FB6B889910B6748C978B4FF9712A7611342DF3C8C59711AA42090219DEC0C83778D2
                                                  Malicious:false
                                                  Reputation:unknown
                                                  URL:https://mvadvancement-my.sharepoint.com/_layouts/15/1033/styles/error.css?rev=tF7fyfzbaQzNoASoSDlV4A%3D%3DTAG509
                                                  Preview:/* _lcid="1033".._LocalBinding */..#ms-error-header..{..margin:118px 0px 16px;..min-height:50px;..}..#ms-error-gobackcont..{..margin-top:28px;..}..#ms-accessDenied-reqDialog..{..max-width:100%;..}..#ms-error-body..{..background-size:auto;..overflow:auto;..width:830px;..margin-right:auto;..margin-left:auto;..}...ms-error-returnLink..{..line-height:19px;..vertical-align:middle;..}...ms-error-detailsFold..{..padding-top:42px;..}...ms-error-techMsg..{..padding-top:28px;..}...ms-error-groupJoinPanel..{..margin-top:15px;..}...ms-error-groupProfileText..{..margin-top:17px;..}...ms-error-separator..{..margin:34px 0px;..}..
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:MS Windows icon resource - 3 icons, 32x32, 32 bits/pixel, 24x24, 32 bits/pixel
                                                  Category:dropped
                                                  Size (bytes):7886
                                                  Entropy (8bit):3.9482833105763633
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:0B60F3C9E4DA6E807E808DA7360F24F2
                                                  SHA1:9AFC7ABB910DE855EFB426206E547574A1E074B7
                                                  SHA-256:ADDEEDEEEF393B6B1BE5BBB099B656DCD797334FF972C495CCB09CFCB1A78341
                                                  SHA-512:1328363987ABBAD1B927FC95F0A3D5646184EF69D66B42F32D1185EE06603AE1A574FAC64472FB6E349C2CE99F9B54407BA72B2908CA7AB01D023EC2F47E7E80
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:...... .... .....6......... ............... .h...f...(... ...@..... ...........................................................................70..7...7...7...7...7...7...70..............................................................................................7`..7...7...7...7...7...7...7...7...7`......................................................................................7P..7...7...7...7...7...7...7...7...7...7...7P..............................................................................7...7...7...7...7...7...7...7...7...7...7...7...7...7...........................................................................7`..7...7...7...7...7...7...7...7...7...7...7...7...7`..........................................................................,...,...,...,...,...,...,.......7...7...7...7...7...7...........................................................................'...'...'...'...'...'...'...'...2...7...7...7...7...,....................`..........................
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):72
                                                  Entropy (8bit):4.241202481433726
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:9E576E34B18E986347909C29AE6A82C6
                                                  SHA1:532C767978DC2B55854B3CA2D2DF5B4DB221C934
                                                  SHA-256:88BDF5AF090328963973990DE427779F9C4DF3B8E1F5BADC3D972BAC3087006D
                                                  SHA-512:5EF6DCFFD93434D45760888BF4B95FF134D53F34DA9DC904AD3C5EBEDC58409073483F531FEA4233869ED3EC75F38B022A70B2E179A5D3A13BDB10AB5C46B124
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:{"Message":"The requested resource does not support http method 'GET'."}
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:GIF image data, version 89a, 64 x 64
                                                  Category:downloaded
                                                  Size (bytes):2410
                                                  Entropy (8bit):7.672965923626863
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:F26D36E163C7E4CC9D704B2C7BA6667E
                                                  SHA1:36B818220251283B19A4E1C870CC143969CEEB23
                                                  SHA-256:E07DFFDAE94AA66CC46D4C9B13ECC132F65A53BDE534DB9E020129E9CE64AAE2
                                                  SHA-512:937955CD64B41B5D61AAA8F617F650C33923C280179544D0E24FEE8A2A3F8BFE21A5828D31E802FE29898320A19E5DFE0C441A85189BAA4FE56F4806FC9C38C9
                                                  Malicious:false
                                                  Reputation:unknown
                                                  URL:https://clicktime.cloud.postoffice.net/images/loading.gif
                                                  Preview:GIF89a@.@....................................................................................................!..NETSCAPE2.0.....!.......,....@.@.@...'.di.h..l.0*14#).2......D..hCbq.l:..".J.Z..h....E.P.....pPk..m..%p....~ob,l6>|+EF<FzqFH$q8QY...r..C.gU.Iq4.W.]...Ad.X..@m.............s.3.......=|.5}`.y..".G.x..0vW...@ph.5L...#....NqC..U5.Bp.....%..........p(...poP.s.d.H...,B..!.......,....@.@.@...'.di.h..l.0.PSM..#19O:..#X...H.d8.%Q...I.ZW.....z...o,..(M..Uk....|.m...Z.......]3N.-4nw'.r..o&....%..nD.a..k05v...LD`..V.d...t..cO..s..I.....d...........@d...dc{.....?Ayf..==%.v.\.m.0.`.c.19..B..y..........e..sH.... .....I..@D~Y..;(.G..G.0...b.T*.f@.(m....$(.H...8....!.......,....@.@.@...'.di.h..l.p..I.t.H8#...0F.1.'.1.l:.."tJ.Z...L..z>.....W...u.$...'.....~..~0Kjl~`..[..T.eD.....$`T[.3.u3.U..]..8.C7x.F.P..............c..Z..hI.%.=^`.$;...4.i.0..O.Z@.Z..s...(.3.B.vS.4.C.Pjd..[..=<..[..z.,...Y.P5....*VBq..S.....3jl...!.......,....@.@.@...'.di.h..l.p*0....3...L..#F,.....
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:ASCII text, with very long lines (65536), with no line terminators
                                                  Category:dropped
                                                  Size (bytes):511765
                                                  Entropy (8bit):5.440743602551332
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:583BB5511DE6144C084875438320A071
                                                  SHA1:35DA5351F2B88C0AB72BE5F207FA6B106B1D785A
                                                  SHA-256:806077183D913E25931F9318D30AD2772E8299E71E72E779DA4B30EBD0A97136
                                                  SHA-512:FEA5166786B67B70EA4FA5F914E9504F0E343BB88880D39B508D1747D7836FB46A92B0C819D3DC80B2A858A55375E2B7F521A2AC52411DEB11B8882B00ECA4A5
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:function $_global_core(){if("undefined"==typeof g_all_modules)g_all_modules={};g_all_modules["core.js"]={version:{rmj:16,rmm:0,rup:25506,rpr:12016}};typeof spWriteProfilerMark=="function"&&spWriteProfilerMark("perfMarkBegin_core.js");SPAnimation={};SPAnimation.g_Curves=new Array(7);SPAnimation.g_Curves[0]=new SPCurve(0,0,0,0,0,0);SPAnimation.g_Curves[1]=new SPCurve(1,1,0,0,0,0);SPAnimation.g_Curves[2]=new SPCurve(2,2,0,0,0,0);SPAnimation.g_Curves[3]=new SPCurve(3,3,.1,.9,.2,1);SPAnimation.g_Curves[4]=new SPCurve(4,3,.42,0,1,1);SPAnimation.g_Curves[5]=new SPCurve(5,3,0,0,.58,1);SPAnimation.g_Curves[6]=new SPCurve(6,3,.42,0,.58,1);SPKeyFrame.prototype={type:0,curveID:0,startTime:0,endTime:0,startValue:0,endValue:0,relativeTo:0,operationType:0};SPAnimation.Attribute={PositionX:1,PositionY:2,Height:3,Width:4,Opacity:5};SPAnimation.ID={Basic_Show:0,Basic_SlowShow:1,Basic_Fade:2,Basic_Move:3,Basic_Size:4,Content_SlideInFadeInRight:5,Content_SlideInFadeInRightInc:6,Content_SlideOutFadeOutRigh
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:ASCII text, with very long lines (14782)
                                                  Category:downloaded
                                                  Size (bytes):15755
                                                  Entropy (8bit):5.364203403428075
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:B21937967628C01620B33966B480E387
                                                  SHA1:2685229BC5F2540A4C36A2CD2D4BAE0C93489C86
                                                  SHA-256:73911B6531D9AF94C4B34095F0899A00CB5765A417A5EEDAC85D5DC5458390F9
                                                  SHA-512:50A6755F76EF09F02CD77F1111C249BCA7FF4ABC5B84DFF09BC45C405BC882B60096AA5ED19680D9EF41DC903EF529C1ABF0E48FA85DAD9104EDC7CA91CB9B53
                                                  Malicious:false
                                                  Reputation:unknown
                                                  URL:https://aadcdn.msftauth.net/shared/1.0/content/js/asyncchunk/convergedlogin_pfetchsessionsprogress_1cd84c14a6b01fcd8515.js
                                                  Preview:/*!. * ------------------------------------------- START OF THIRD PARTY NOTICE -----------------------------------------. * . * This file is based on or incorporates material from the projects listed below (Third Party IP). The original copyright notice and the license under which Microsoft received such Third Party IP, are set forth below. Such licenses and notices are provided for informational purposes only. Microsoft licenses the Third Party IP to you under the licensing terms for the Microsoft product. Microsoft reserves all other rights not expressly granted under this agreement, whether by implication, estoppel or otherwise.. * . * json2.js (2016-05-01). * https://github.com/douglascrockford/JSON-js. * License: Public Domain. * . * Provided for Informational Purposes Only. * . * ----------------------------------------------- END OF THIRD PARTY NOTICE ------------------------------------------. */.(window.webpackJsonp=window.webpackJsonp||[]).push([[17],{525:function(e,n,s
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:ASCII text, with very long lines (58365)
                                                  Category:dropped
                                                  Size (bytes):58433
                                                  Entropy (8bit):5.238203968773909
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:1F93B0FF0D508212BBB3BA428F0D4705
                                                  SHA1:B20AFA6ECB422E5C27FA2D87FBF996C53983EF8B
                                                  SHA-256:BE9D250EDA019221AAAA99C44D9A1707354D60CADCBECB366FC1332AA05B65D7
                                                  SHA-512:B5ACCD11AEF34A06103A2F197399E11D0DF038E98AA54CE3CFD529CCC318105B3A5BA2CD1F836F19780F3614CE61195B89083614132472CC6DEADD7E88BC2BBF
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:"use strict";(self.webpackChunk_msidentity_sisu_msa=self.webpackChunk_msidentity_sisu_msa||[]).push([[939],{2642:function(e,t,n){function r(e,t){var n="undefined"!=typeof Symbol&&e[Symbol.iterator]||e["@@iterator"];if(!n){if(Array.isArray(e)||(n=function(e,t){if(!e)return;if("string"==typeof e)return o(e,t);var n=Object.prototype.toString.call(e).slice(8,-1);"Object"===n&&e.constructor&&(n=e.constructor.name);if("Map"===n||"Set"===n)return Array.from(e);if("Arguments"===n||/^(?:Ui|I)nt(?:8|16|32)(?:Clamped)?Array$/.test(n))return o(e,t)}(e))||t&&e&&"number"==typeof e.length){n&&(e=n);var r=0,i=function(){};return{s:i,n:function(){return r>=e.length?{done:!0}:{done:!1,value:e[r++]}},e:function(e){throw e},f:i}}throw new TypeError("Invalid attempt to iterate non-iterable instance.\nIn order to be iterable, non-array objects must have a [Symbol.iterator]() method.")}var a,u=!0,c=!1;return{s:function(){n=n.call(e)},n:function(){var e=n.next();return u=e.done,e},e:function(e){c=!0,a=e},f:fu
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
                                                  Category:dropped
                                                  Size (bytes):17174
                                                  Entropy (8bit):2.9129715116732746
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:12E3DAC858061D088023B2BD48E2FA96
                                                  SHA1:E08CE1A144ECEAE0C3C2EA7A9D6FBC5658F24CE5
                                                  SHA-256:90CDAF487716184E4034000935C605D1633926D348116D198F355A98B8C6CD21
                                                  SHA-512:C5030C55A855E7A9E20E22F4C70BF1E0F3C558A9B7D501CFAB6992AC2656AE5E41B050CCAC541EFA55F9603E0D349B247EB4912EE169D44044271789C719CD01
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:..............h(..f...HH...........(..00......h....6.. ...........=...............@..........(....A..(....................(....................................."P.........................................."""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333""""""""""""""""""""""""""
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:ASCII text, with very long lines (65536), with no line terminators
                                                  Category:dropped
                                                  Size (bytes):186722
                                                  Entropy (8bit):5.127936869447186
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:2DE2482829622DE740DB42E04CBCD047
                                                  SHA1:2A88D65A01BDA232B97B24163F66BA7F90A63386
                                                  SHA-256:947D9E7117E8528021EC98FBBD6FE75A4D393A699DFFFFB3A2803EAE42845CEB
                                                  SHA-512:35A2B88CF1FD1505BAD30CF68FB235ED5E5029D4824EC8586452A53E820563229AEA06156B46702C5046DC4BCE0046DFC74E934E215BFDD040B2715D298E8886
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:var Strings; if (Strings === undefined) { Strings=new Object(); }Strings.CMS=function(){};Strings.CMS.L_SelectAllAltKey_TEXT="false";Strings.CMS.L_SpellCheckKey_VALUE="0x76";Strings.CMS.L_Callout_Usage_Count="<p>{0}</p>view||<p>{0}</p>views";Strings.CMS.L_NoElementStylesWereRemoved_TEXT="The selection did not contain any instances of element styles to remove.";Strings.CMS.L_DecWidthAltKey_TEXT="false";Strings.CMS.L_ExpandedTagNameH4="Heading 4";Strings.CMS.L_DecWidthShiftKey_TEXT="true";Strings.CMS.L_EditImageRenditionsAction="Edit Renditions";Strings.CMS.L_TabBackKey_TEXT="N";Strings.CMS.L_SvrBusySpellchecker_TEXT="The spell checking server was busy";Strings.CMS.L_RemoveLinkShiftKey_TEXT="false";Strings.CMS.L_Show_TEXT="Show";Strings.CMS.L_Title_TEXT="Title:";Strings.CMS.L_ShowSpecific_TEXT="Show the selected item in navigation";Strings.CMS.L_DecHeightShiftKey_TEXT="true";Strings.CMS.L_ChangeColumnWidthAndRowHeightKey_TEXT="W";Strings.CMS.L_UnlinkToolTip_TEXT="Remove Hyperlink";Strin
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:ASCII text, with very long lines (23437), with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):23594
                                                  Entropy (8bit):5.107347306409284
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:964FCB2BAF87049DC68975291AE89431
                                                  SHA1:D0CD8C989D44BC531472B632868D3FB2DE4B3184
                                                  SHA-256:B8F7BD568E379502CF0C00027581D2761C7DC14B166F5D25FC048A0B56B7BFBB
                                                  SHA-512:03CB58D197A776F9C315C2A14B9C034D88C7B7E9F4247C5698396F4FE7363A22FC2042A24C02A245C7E035DD2862F88E8EF46A7E5A269EDC2B69E39752A52987
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:var Strings; if (Strings === undefined) { Strings=new Object(); }Strings.STS=function(){};Strings.STS.L_NewTab="New tab";Strings.STS.L_CalloutLastEditedNameAndDate="Changed by ^1 on ^2";Strings.STS.L_CalloutSourceUrlHeader="Location";Strings.STS.L_SPDiscBestUndo="Remove best reply";Strings.STS.L_SPClientManage="manage";Strings.STS.L_SPAddNewWiki="new Wiki page";Strings.STS.L_SPCategorySortRecent="Recent";Strings.STS.L_ViewSelectorTitle="Change View";Strings.STS.L_SPDiscNumberOfLikes="{0} likes||{0} like||{0} likes";Strings.STS.L_Timeline_DfltViewName="Timeline";Strings.STS.L_TimelineToday="Today";Strings.STS.L_SPDiscNoPreviewAvailable="No preview available for this reply";Strings.STS.L_NODOCView="There are no documents in this view.";Strings.STS.L_SPBlogPostAuthorCategories="by {0} in {1}";Strings.STS.L_SPBlogsNoItemsInCategory="There are no posts in this category.";Strings.STS.L_QRCodeDescription="Scan this QR code with your phone or tablet to open {0}";Strings.STS.L_RelativeDateTime
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 102804
                                                  Category:downloaded
                                                  Size (bytes):25609
                                                  Entropy (8bit):7.992070293592458
                                                  Encrypted:true
                                                  SSDEEP:
                                                  MD5:B62553925BD98826C60457D2EB6B9A46
                                                  SHA1:84DBBB6D9B36A587C21B5A56B1D9E587E33BA943
                                                  SHA-256:C58166FE4DF4BA8F25A960C21451EAF841D97F6F552F104E43431C9DB1C2E2CC
                                                  SHA-512:7B6872144AE308224FF671A1EC63F040A40115888790CF6834AD85D517471CE5DAD3EC297EE751FB196B55118A181017151F7F06FCE0F2F26FF94E8EEC070033
                                                  Malicious:false
                                                  Reputation:unknown
                                                  URL:https://mvadvancement-my.sharepoint.com/ScriptResource.axd?d=tHZf7BPvmeSh4XUdNl3k2kwu_dgxWuV_Lc6e33kLB2c4ux_t_ppIwph8EeIuaVSMaDwymd8sqeCqEvtYtacgfAhI5JUODbzslqDFI4abLw8Ww3do0dk900oXIdIRonqcv5JYtpOMDjJQKHf3PNmMiP_XOUd7sf8BzMacl0DUtS3OscdGwKc-eTduK8X7oQzJ0&t=ffffffffb201fd3f
                                                  Preview:............r.I.(.>f..d..B6. )U/.(....mGRuw.... I..B..X...<.O..p}.=#.P.>s.Y...D,..........................'.......;.'..2.Uu5.C..%..v.M&;T...u1.T.=...m....'_z.......4.&?~.__....".db00..IR..|.(tj6+.y.$.L.$..."..FIx3+..tG%.7...N.'..........A9....9;.O...j...Y|8.........LW........h&.%WW...|\.Q..Tr....$\..?-&....}O...w..$R}....W.k.+.._..q...P..dR......`^.j]0.L..9......)...."...I....,.K..j...`1.a9-.`..-p..O..t...|Bo..Uu.~.t...uB9S.J.o..Fe<.....A.SM.....d>.].HO..Qx...ao....a.J..h6K..q7.N.n'..Ga78....v..n...>..0.I.X?...$=...x..H*..&.V.+.h..GyTJ....AT...x.Jl..*.X..t.H4...$9..^u....r9rq3.._..a...^I.{{.Ch....@.l.....@..BW.[..8~6.U3].I#....8....H`...4..I..6...I...Q1...W^]>...P.KJ.L......A...>.@hf.M...RP..)m.F...Wp{.!.R.".j.....!soO..]k...a."eo.S,...G|n.|!F[..O../.aR...$.\..4.N.-p1..}...2...r\a[`e.E..{H..?.....J.ak.Y...P......DP.d.?...<..Y.8....%d...@..e.....exc..g...b.....<z....7*8!...n..wG0.C..f..Y5....qE..p....2.rH-..r.S........q..R.$Q^q....!....
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:ASCII text, with very long lines (65470)
                                                  Category:dropped
                                                  Size (bytes):972336
                                                  Entropy (8bit):5.411537781320205
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:FCB8759D207037AE081D3DA9AFB36D90
                                                  SHA1:5D7BF0A11F47DEB6FEF26C67B832D91805D00260
                                                  SHA-256:91FAFA62301EC37A6B9353E4F056F3034A285977798FF94000B0CED1C2DDBF57
                                                  SHA-512:612638E27DB4400D132BD2AB24D02700D0F7FBD8E1F89AEBB5F96E2C0F3713E13C553A0DA492FD54883C512177241623BBA8143781A02CE9668C15016C211B42
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:/*! For license information please see login_en.js.LICENSE.txt */.!function(){var e,t,n,r,o,i={5135:function(e,t,n){"use strict";var r=n(2951),o={childContextTypes:!0,contextType:!0,contextTypes:!0,defaultProps:!0,displayName:!0,getDefaultProps:!0,getDerivedStateFromError:!0,getDerivedStateFromProps:!0,mixins:!0,propTypes:!0,type:!0},i={name:!0,length:!0,prototype:!0,caller:!0,callee:!0,arguments:!0,arity:!0},a={$$typeof:!0,compare:!0,defaultProps:!0,displayName:!0,propTypes:!0,type:!0},l={};function s(e){return r.isMemo(e)?a:l[e.$$typeof]||o}l[r.ForwardRef]={$$typeof:!0,render:!0,defaultProps:!0,displayName:!0,propTypes:!0},l[r.Memo]=a;var c=Object.defineProperty,u=Object.getOwnPropertyNames,d=Object.getOwnPropertySymbols,p=Object.getOwnPropertyDescriptor,f=Object.getPrototypeOf,g=Object.prototype;e.exports=function e(t,n,r){if("string"!=typeof n){if(g){var o=f(n);o&&o!==g&&e(t,o,r)}var a=u(n);d&&(a=a.concat(d(n)));for(var l=s(t),m=s(n),h=0;h<a.length;++h){var b=a[h];if(!(i[b]||r&&r[b
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:SVG Scalable Vector Graphics image
                                                  Category:downloaded
                                                  Size (bytes):1864
                                                  Entropy (8bit):5.222032823730197
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:BC3D32A696895F78C19DF6C717586A5D
                                                  SHA1:9191CB156A30A3ED79C44C0A16C95159E8FF689D
                                                  SHA-256:0E88B6FCBB8591EDFD28184FA70A04B6DD3AF8A14367C628EDD7CABA32E58C68
                                                  SHA-512:8D4F38907F3423A86D90575772B292680F7970527D2090FC005F9B096CC81D3F279D59AD76EAFCA30C3D4BBAF2276BBAA753E2A46A149424CF6F1C319DED5A64
                                                  Malicious:false
                                                  Reputation:unknown
                                                  URL:https://logincdn.msftauth.net/shared/5/images/2_bc3d32a696895f78c19d.svg
                                                  Preview:<svg xmlns="http://www.w3.org/2000/svg" width="1920" height="1080" fill="none"><g opacity=".2" clip-path="url(#E)"><path d="M1466.4 1795.2c950.37 0 1720.8-627.52 1720.8-1401.6S2416.77-1008 1466.4-1008-254.4-380.482-254.4 393.6s770.428 1401.6 1720.8 1401.6z" fill="url(#A)"/><path d="M394.2 1815.6c746.58 0 1351.8-493.2 1351.8-1101.6S1140.78-387.6 394.2-387.6-957.6 105.603-957.6 714-352.38 1815.6 394.2 1815.6z" fill="url(#B)"/><path d="M1548.6 1885.2c631.92 0 1144.2-417.45 1144.2-932.4S2180.52 20.4 1548.6 20.4 404.4 437.85 404.4 952.8s512.276 932.4 1144.2 932.4z" fill="url(#C)"/><path d="M265.8 1215.6c690.246 0 1249.8-455.595 1249.8-1017.6S956.046-819.6 265.8-819.6-984-364.005-984 198-424.445 1215.6 265.8 1215.6z" fill="url(#D)"/></g><defs><radialGradient id="A" cx="0" cy="0" r="1" gradientUnits="userSpaceOnUse" gradientTransform="translate(1466.4 393.6) rotate(90) scale(1401.6 1720.8)"><stop stop-color="#107c10"/><stop offset="1" stop-color="#c4c4c4" stop-opacity="0"/></radialGradient><r
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:downloaded
                                                  Size (bytes):341640
                                                  Entropy (8bit):5.3238250664261475
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:EA65B7A6EA259C4CDE91A47532432ACC
                                                  SHA1:14BDC709C3C6B5C22179E1E69E45F1A9A3743D37
                                                  SHA-256:409D90CF4307DB05F5DF84FB42EE000CA5A0E8C1ABA34F70E24A770230C8FE28
                                                  SHA-512:7DD26A7BB1A0B7B4BBC90236F47B757ABC7984ABC8D844CD4B712ED94FADF32560CB77B3E006750E152187E0FC930896728711374F3327ED97FABE42F72484E6
                                                  Malicious:false
                                                  Reputation:unknown
                                                  URL:https://mvadvancement-my.sharepoint.com/_layouts/15/1033/styles/corev15.css?rev=6mW3puolnEzekaR1MkMqzA%3D%3DTAG509
                                                  Preview:/* _lcid="1033".._LocalBinding */..body,...ms-core-defaultFont,..#pageStatusBar,..#hybridTooltipStatusBar,...ms-status-msg,...js-callout-body..{../* [ReplaceFont(themeFont:"body")] */ font-family:"Segoe UI","Segoe",Tahoma,Helvetica,Arial,sans-serif;..font-size:13px;..}..body,...ms-core-defaultFont,...js-callout-body..{../* [ReplaceColor(themeColor:"BodyText")] */ color:#444;..}...ms-core-defaultFont..{..font-weight:normal;..text-decoration:none;..white-space:normal;..word-break:normal;..line-height:normal;..}..body..{..margin:0px;..overflow:hidden;../* [ReplaceColor(themeColor:"PageBackground")] */ background-color:#fff;..background-size:cover;..background-repeat:no-repeat;..}..html > .ms-core-needIEFilter..{../* [ReplaceBGImage] */ -ms-filter:"progid:DXImageTransform.Microsoft.AlphaImageLoader(src='about:blank',sizingMethod='scale');";..}...ms-backgroundImage..{../* [ReplaceBGImage] */ background-image:url();..}..#s4-ribbonrow..{..position:relative;..}..#s4-workspace..{..overflow:auto
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:SVG Scalable Vector Graphics image
                                                  Category:dropped
                                                  Size (bytes):3651
                                                  Entropy (8bit):4.094801914706141
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:EE5C8D9FB6248C938FD0DC19370E90BD
                                                  SHA1:D01A22720918B781338B5BBF9202B241A5F99EE4
                                                  SHA-256:04D29248EE3A13A074518C93A18D6EFC491BF1F298F9B87FC989A6AE4B9FAD7A
                                                  SHA-512:C77215B729D0E60C97F075998E88775CD0F813B4D094DC2FDD13E5711D16F4E5993D4521D0FBD5BF7150B0DBE253D88B1B1FF60901F053113C5D7C1919852D58
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:<svg xmlns="http://www.w3.org/2000/svg" width="108" height="24" viewBox="0 0 108 24"><title>assets</title><path d="M44.836,4.6V18.4h-2.4V7.583H42.4L38.119,18.4H36.531L32.142,7.583h-.029V18.4H29.9V4.6h3.436L37.3,14.83h.058L41.545,4.6Zm2,1.049a1.268,1.268,0,0,1,.419-.967,1.413,1.413,0,0,1,1-.39,1.392,1.392,0,0,1,1.02.4,1.3,1.3,0,0,1,.4.958,1.248,1.248,0,0,1-.414.953,1.428,1.428,0,0,1-1.01.385A1.4,1.4,0,0,1,47.25,6.6a1.261,1.261,0,0,1-.409-.948M49.41,18.4H47.081V8.507H49.41Zm7.064-1.694a3.213,3.213,0,0,0,1.145-.241,4.811,4.811,0,0,0,1.155-.635V18a4.665,4.665,0,0,1-1.266.481,6.886,6.886,0,0,1-1.554.164,4.707,4.707,0,0,1-4.918-4.908,5.641,5.641,0,0,1,1.4-3.932,5.055,5.055,0,0,1,3.955-1.545,5.414,5.414,0,0,1,1.324.168,4.431,4.431,0,0,1,1.063.39v2.233a4.763,4.763,0,0,0-1.1-.611,3.184,3.184,0,0,0-1.15-.217,2.919,2.919,0,0,0-2.223.9,3.37,3.37,0,0,0-.847,2.416,3.216,3.216,0,0,0,.813,2.338,2.936,2.936,0,0,0,2.209.837M65.4,8.343a2.952,2.952,0,0,1,.5.039,2.1,2.1,0,0,1,.375.1v2.358a2.04,2.04,0,0,0-.
                                                  Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):22416
                                                  Entropy (8bit):4.386827911790251
                                                  Encrypted:false
                                                  SSDEEP:
                                                  MD5:74138F80B622EAC1E27CD928B8CF57DF
                                                  SHA1:EDB14CB1CBA354395901E6CD6F9A55DBFDDE4F93
                                                  SHA-256:C2717BA631484FD7F5A7848B2338A1A225EFF09914FA41D6DFB6EFC45BF0B95B
                                                  SHA-512:3A6D90F24D68C168861D33A5CBA6C7FB7DD6BBABE5AB5F697C8B0A7A5DBD520C02BE8346FE32122390DB2C3ADE95EF626228A5BAA533A2F27D08F6E462527D2B
                                                  Malicious:false
                                                  Reputation:unknown
                                                  Preview:// In case the browser doesn't have Date.now (IE8 and earlier).if (!Date.now) {. Date.now = function() {. return new Date().getTime();. }.}..// For IE9.//(function(){ window.console = window.console || { log: function(){} } }());..// Polling status code mapped with display string.POLLING_STATUS_DISPLAY_MAPPING = {. 0: { // Pending. 'icon': '',. 'text': '<h3>&lt; Pending &gt;</h3>'. }, // In Progress. 1: {. 'icon': '<img class="polling-status-icon" src="images/loading.gif">',. 'text': '<h3>&lt; In Progress &gt;</h3>'. }, // Unknown verdict. 2: {. 'icon': '<img class="polling-status-icon" src="images/tick.png">',. 'text': '<h3 style="color:#7FF337;">Nothing Found</h3>'. }, // Suspect verdict. 3: {. 'icon': '<img class="polling-status-icon" src="images/alert.svg">',. 'text': '<h3 style="color:#ffcc33;">Suspicious</h3>'. }, // Suspect in Progress. 4: {. 'icon': '<im
                                                  File type:RFC 822 mail, ASCII text, with very long lines (347), with CRLF line terminators
                                                  Entropy (8bit):6.120628147395938
                                                  TrID:
                                                  • E-Mail message (Var. 5) (54515/1) 100.00%
                                                  File name:phish_alert_iocp_v1.4.48 - 2024-12-11T151927.331.eml
                                                  File size:59'403 bytes
                                                  MD5:e55b3edf620b2d5a93d9afcffbce138b
                                                  SHA1:1a803065c47ffadc7e34eba3155b35a47d12267e
                                                  SHA256:4962543d1e673175d8e4be497916f41feb7177b92b434ecd1cb1a414d443382d
                                                  SHA512:d90fb50ab75d20a0b443215b4633d059a07275bd7764b16cdb82a2b45be8d29e1c456de86f1215c3cd088365d0e965356e67e3b9c021a56c6b7158bffcd122b0
                                                  SSDEEP:1536:WS6XRda3AGtB3e/yYd5vRwBXJDX2cqwgElWPl3CGtg0HKujZRemOIROGCCwe+OP:V6ySfRPcvJ+b5+Q
                                                  TLSH:28439EB55E51182AFC3250BCBA127A5DEA62344FDAE3EDE0F0AD30570FD3066065A7C8
                                                  File Content Preview:Received: from SA1PR22MB4366.namprd22.prod.outlook.com.. (2603:10b6:806:375::10) by MN0PR22MB5442.namprd22.prod.outlook.com with.. HTTPS; Wed, 11 Dec 2024 15:59:02 +0000..ARC-Seal: i=3; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=pass;.. b=kB+fH
                                                  Subject:Ed Wanner shared the folder "mvadvancements.org" with you
                                                  From:Ed Wanner <EWanner@mvadvancements.org>
                                                  To:Sandy Schultz <SSchultz@FirstFedWeb.com>
                                                  Cc:
                                                  BCC:
                                                  Date:Wed, 11 Dec 2024 07:55:23 -0800
                                                  Communications:
                                                  • [EXTERNAL EMAIL: Take caution with links and attachments. ] Ed Wanner shared a folder with you Here's the folder that Ed Wanner shared with you. <https://clicktime.cloud.postoffice.net/clicktime.php?U=https://mvadvancement-my.sharepoint.com/:f:/g/personal/ewanner_mvadvancements_org/Elr4An5-W3dKpaplAFapN9oBQntO33Aum0uwc3Qr2tH1GA%3Fe%3D5%253auBc0Zg%26at%3D9&E=sschultz%40firstfedweb.com&X=XID905CLkP5D3070Xd2&T=FF1001&HV=U,E,X,T&H=f2634b391758e2b7b5ed6086be5fe1e72b2f00f1> mvadvancements.org This link only works for the direct recipients of this message. Open <https://clicktime.cloud.postoffice.net/clicktime.php?U=https://mvadvancement-my.sharepoint.com/:f:/g/personal/ewanner_mvadvancements_org/Elr4An5-W3dKpaplAFapN9oBQntO33Aum0uwc3Qr2tH1GA%3Fe%3D5%253auBc0Zg%26at%3D9&E=sschultz%40firstfedweb.com&X=XID905CLkP5D3070Xd2&T=FF1001&HV=U,E,X,T&H=f2634b391758e2b7b5ed6086be5fe1e72b2f00f1> This email is generated through MV Advancements's use of Microsoft 365 and may contain content that is controlled by MV Advancements. <https://eastus2r-notifyp.svc.ms:443/api/v2/tracking/method/View?mi=l2lvrxqJ90a4kcjzhRzq2g>
                                                  Attachments:
                                                  • AttachedImage
                                                  • AttachedImage
                                                  • AttachedImage
                                                  • AttachedImage
                                                  Key Value
                                                  ReceivedWed, 11 Dec 2024 07:59:03 -0800
                                                  ARC-Seali=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=u/IhtUAiM6gxKoAXGuaAmkDGRDXsCD4+JDxoF7pkVfKHy4jhcF7m7RcajVZKCVYRQPNXXBXeBnhXNNyR4uXDamDI/CWJ31pyfa4PPX9Yu27KIUPS8rx2VtZuwFeYOkjvqVO5u+sC5/kM1OC6M2GvUo03C3s2T1zRj2SbiWl9GcHPS/IkfBq3C4UO3ENkPXtgtcvt5LZ509IgLTwOvhO+z7lKbmZd9lgGJ4wiTMFQx9RzKMFIj3E7eEFgz7nxRs/rIvhtke0aFvJpAIbkCfWywGjeKZ2OSMmcKvi0xqHzalcOP0LozE1+3s7DVTE2U9YgwyCJ0oIO7MAIvDdtmCSsoQ==
                                                  ARC-Message-Signaturei=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=1+sVMVVgtpT5bIV1IUmg41YVs24CSTKwT7I8HQeBYWs=; b=SOWIbaZ3wsrP9BVG2wqBPHlqJG6H8ppYgDMbxdM8HwBi+tW6l69jifIg6MLTNmb1t0lN06DE2asJjaxNepYz6swlx7+jTLb8sJOODEfq+ho8Eez9bQFxwD8HHHSS+N+n3tUHGynHDm1Y6TJYv7pq8qhA+vgO0/CFHmaBhzbg8mH6Sa2o5MAtqlGT5cme49+hxeo/wK+MYSK1vlChrj9MnnQF5W2snSQmdeah8L48jbO8GwHCAccLGIO3YOBz29+DVvdVjm1Zd6DwO6CVaH3nrSvRHQ65Si8NSaFTJpHlQU6criyv3aY8j8KcqIJ62kKD3MQ8PQ/MZuEAiBE/zNlfxg==
                                                  ARC-Authentication-Resultsi=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=mvadvancements.org; dmarc=pass action=none header.from=mvadvancements.org; dkim=pass header.d=mvadvancements.org; arc=none
                                                  authentication-resultsspf=fail (sender IP is 165.212.64.15) smtp.mailfrom=mvadvancements.org; dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=mvadvancements.org;compauth=none reason=405
                                                  received-spfFail (protection.outlook.com: domain of mvadvancements.org does not designate 165.212.64.15 as permitted sender) receiver=protection.outlook.com; client-ip=165.212.64.15; helo=postin02.mbox.net;
                                                  X-USANET-Receivedfrom emd2.mbox.net [165.212.64.9] by gws3.mbox.net via mtad (GIT.BUILD.5.0.3133) with ESMTP id 249CLkP5D0368Ms3; Wed, 11 Dec 2024 15:56:03 -0000
                                                  X-USANET-TAP-Score1
                                                  Authentication-Results-Originaldkim=none (message not signed) header.d=none;dmarc=none action=none header.from=mvadvancements.org;
                                                  X-USANET-Routed100 IN-RELAY R:gwsin-int:625
                                                  X-USANET-GWS2-Servicegwsdin-tap preclick-never
                                                  X-USANET-GWS2-Tenantfirstfedweb.com
                                                  X-USANET-GWS2-TagidFF1001
                                                  X-USANET-GWS2-MailFromDnsResultDnsFound
                                                  X-USANET-GWS2-SecurityTLSv1.2;ECDHE-RSA-AES256-GCM-SHA384
                                                  X-USANET-Source199.233.14.100 IN btv1+3D+3D075a1c25527+3D+3DEWanner@mvadvancements.org MX1.PRIMISYS.COM TLS
                                                  X-USANET-MsgIdXID905CLkP5D3070Xd2
                                                  X-BAEAI-Trust-Score97
                                                  X-BAEAI-Trust-ReasonsSNDRAUTH; SNDRNEW; DOMFRQ,mvadvancements.org; RCPTVIP;
                                                  x-asg-debug-id1733932561-0c01a67e9c1e6f40001-UpaMwU
                                                  x-barracuda-envelope-fromEWanner@mvadvancements.org
                                                  x-barracuda-rbl-trusted-forwarder104.47.56.169
                                                  X-ASG-WhitelistClient
                                                  X-Barracuda-Effective-Source-IPUNKNOWN[2603:10b6:208:3e5::13]
                                                  x-barracuda-apparent-source-ip2603:10b6:208:3e5::13
                                                  Thread-TopicEd Wanner shared the folder "mvadvancements.org" with you
                                                  x-asg-orig-subjEd Wanner shared the folder "mvadvancements.org" with you
                                                  Thread-IndexAQHbS+UWcfVHyof1F0CKQg5yNXh0cw==
                                                  Accept-Languageen-US
                                                  Content-Languageen-US
                                                  X-MS-Has-Attachyes
                                                  X-MS-TNEF-Correlator
                                                  x-ms-traffictypediagnostic BY5PR19MB4145:EE_|IA1PR19MB6323:EE_|SN1PEPF0002BA50:EE_|SA1PR22MB4366:EE_|MN0PR22MB5442:EE_
                                                  X-MS-Office365-Filtering-Correlation-Id db4a52bb-c7f6-4f73-3ecd-08dd19fc556d
                                                  x-ms-exchange-senderadcheck1
                                                  x-ms-exchange-antispam-relay0
                                                  X-Microsoft-Antispam-Untrusted BCL:0;ARA:13230040|69100299015|26013499003|1800799024|376014|366016|8096899003|38070700018;
                                                  X-Microsoft-Antispam-Message-Info-Original 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
                                                  X-Forefront-Antispam-Report-Untrusted CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BY5PR19MB4145.namprd19.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(69100299015)(26013499003)(1800799024)(376014)(366016)(8096899003)(38070700018);DIR:OUT;SFP:1102;
                                                  X-MS-Exchange-Transport-CrossTenantHeadersStampedSA1PR22MB4366
                                                  x-barracuda-connect mail-co1nam11lp2169.outbound.protection.outlook.com[104.47.56.169]
                                                  x-barracuda-start-time1733932561
                                                  x-barracuda-encryptedTLS_AES_256_GCM_SHA384
                                                  x-barracuda-urlhttps://mx1.primisys.com:443/cgi-mod/mark.cgi
                                                  x-virus-scannedby bsmtpd at PRIMISYS.COM
                                                  X-Barracuda-Scan-Msg-Size14706
                                                  x-barracuda-brts-status1
                                                  X-Cloudmark-Trackerv=2.4 cv=L4bWQPT8 c=1 sm=1 tr=0 ts=6759b614 cx=a_idp_d a=5x6+IuV7KoCiW+WP/V1afQ==:117 a=5x6+IuV7KoCiW+WP/V1afQ==:17 a=7k6irQuwAAAA:8 a=wKuvFiaSGQ0qltdbU6+NXLB8nM8=:19 a=Ol13hO9ccFRV9qXi2t6ftBPywas=:19 a=xqWC_Br6kY4A:10 a=RZcAm9yDv7YA:10 a=y3UNpz08AlgA:10 a=EVd-R0uoAAAA:20 a=z1yaR13IeP90ASzwOHEA:9 a=CjuIK1q_8ugA:10 a=u_sUsLCkAAAA:8 a=SSmOFEACAAAA:8 a=Rb08-NUsAAAA:8 a=iL-vJmAKEe4OKlbiXZ4A:9 a=JCT6jUz98xjEwYp8:21 a=frz4AuCg-hUA:10 a=_W_S_7VecoQA:10 a=lqcHg5cX4UMA:10 a=56YP0Ln_AIoA:10 a=hdlSYOrru2MBFLUBs4sA:9 a=HXjIzolwW10A:10 a=oXjUUlzhnkErSkVPVjUA:9 a=qkXsjCQKqSngLXW1HTUA:9 a=a3iXMrSWGj54uB--D74A:9 a=KQqxNPgzF0kA:10 a=__vjwkoA-TzAtzrkhdF9:22 a=DYOUYl955XQqaN5DGmdY:22 a=Y5sE1mEaS24PFcSHMkeh:22 a=2W3_7a7gKYtp3diSgIMB:22 a=JLFyZNmBzIn-y2qo7DnX:22 a=yULaImgL6KKpOYXvFmjq:22 a=KsK8fQC9rU1V1eOh1Fhg:22 a=YREq-EcjKmtKVXwQLQ3j:22 a=Z5ABNNGmrOfJ6cZ5bIyy:22 a=jd6J4Gguk5HxikPWLKER:22
                                                  X-LASED-VersionAntispam-Engine: 5.1.4, AntispamData: 2024.12.11.151846
                                                  X-LASED-SpamProbability0.089074
                                                  X-LASED-SpamNonSpam
                                                  X-LASED-HitsARCAUTH_PASSED 0.000000, BODYTEXTH_SIZE_3000_MORE 0.000000, BODYTEXTP_SIZE_3000_LESS 0.000000, BODY_SIZE_10000_PLUS 0.000000, BODY_SIZE_25K_PLUS 0.000000, HTML_90_100 0.100000, HTML_95_100 0.100000, HTML_98_100 0.100000, IMGSPAM_TABLE_1 0.000000, IMG_AR_1 0.000000, IMG_ATTACHED_2P 0.000000, INVALID_MSGID_NO_FQDN 0.000000, JPG_HAS_EXIF 0.000000, JPG_PIXPERBYTE_LOW 0.000000, JPG_SPAMMY_Y_RESOLUTION 0.000000, MULTIPLE_ATTACHMENTS 0.000000, OBFUSCATION 0.000000, PNG_PIXPERBYTE_HIGH 0.000000, PNG_PIXPERBYTE_LOW 0.000000, STYLE_RATWARE_REF 0.000000, SUPERLONG_LINE 0.050000, TEXT_DIRECTION 0.000000, TEXT_DIR_LTR_ONLY 0.000000, TO_NAME_IS_ADDY 0.000000, URI_WITH_PATH_ONLY 0.000000, __ANY_URI 0.000000, __ARCAUTH_DKIM_PASSED 0.000000, __ARCAUTH_DMARC_PASSED 0.000000, __ARCAUTH_PASSED 0.000000, __ARC_SEAL_MICROSOFT 0.000000, __ARC_SIGNATURE_MICROSOFT 0.000000, __ATTACH_CTE_BASE64 0.000000, __ATTACH_CTE_QUOTED_PRINTABLE 0.000000, __BODY_NO_MAILTO 0.000000, __CP_MEDIA_BODY 0.000000, __CP_URI_IN_BODY 0.000000, __CT 0.000000, __CTYPE_HAS_BOUNDARY 0.000000, __CTYPE_MULTIPART 0.000000, __CTYPE_MULTIPART_ALT 0.000000, __EMBEDDED_IMG 0.000000, __EXTRA_MPART_TYPE_1 0.000000, __EXTRA_MPART_TYPE_N1 0.000000, __FILESHARE_PHRASE 0.000000, __FUR_HEADER 0.000000, __HAS_ATTACHMENT 0.000000, __HAS_ATTACHMENT1 0.000000, __HAS_ATTACHMENT2 0.000000, __HAS_FROM 0.000000, __HAS_HTML 0.000000, __HAS_MSGID 0.000000, __HAS_X_FF_ASR 0.000000, __HAS_X_FF_ASR_CAT 0.000000, __HAS_X_FF_ASR_SFV 0.000000, __HTML_AHREF_TAG 0.000000, __HTML_ATTR_DIR 0.000000, __HTML_BAD_END 0.000000, __HTML_DIR_LTR 0.000000, __HTML_HREF_TAG_X2 0.000000, __HTML_STYLE_DEF_HIDDEN 0.000000, __HTML_TAG_CENTER 0.000000, __HTML_TAG_DIV 0.000000, __HTML_TAG_IMG_X2 0.000000, __HTML_TAG_TABLE 0.000000, __HTTPS_URI 0.000000, __ID_RETURN_PATH 0.000000, __IMGSPAM_TABLE_1 0.000000, __IMG_ATTACHED 0.000000, __IMG_SIZE_10K_50K 0.000000, __IMG_SIZE_1K_10K 0.000000, __IMG_SIZE_1K_LESS 0.000000, __IMG_THEN_TEXT 0.000000, __JPG_SPAMMY_Y_RESOLUTION_3 0.000000, __JPG_WIDTH_100 0.000000, __MIME_ATTACHMENT_1_N 0.000000, __MIME_ATTACHMENT_N_2 0.000000, __MIME_ATTACHMENT_N_3 0.000000, __MIME_ATTACHMENT_N_4 0.000000, __MIME_HTML 0.000000, __MIME_TEXT_H 0.000000, __MIME_TEXT_H1 0.000000, __MIME_TEXT_H2 0.000000, __MIME_TEXT_P 0.000000, __MIME_TEXT_P1 0.000000, __MIME_TEXT_P2 0.000000, __MIME_VERSION 0.000000, __MSGID_DOMAIN_NOT_IN_HDRS 0.000000, __MULTIPLE_URI_HTML 0.000000, __MULTIPLE_URI_TEXT 0.000000, __PART_TYPE_HTML 0.000000, __PNG_AR_1 0.000000, __SANE_MSGID 0.000000, __STOCK_PHRASE_7 0.000000, __STYLE_RATWARE 0.000000, __STYLE_RATWARE_NEG 0.000000, __STYLE_TAG 0.000000, __STYLE_TAGS_ATTACHED 0.000000, __SUBJ_ALPHA_END 0.000000, __TAG_EXISTS_BODY 0.000000, __TAG_EXISTS_HEAD 0.000000, __TAG_EXISTS_HTML 0.000000, __TAG_EXISTS_META 0.000000, __TEXT_DIR_LTR 0.000000, __TO_MALFORMED_2 0.000000, __TO_NAME 0.000000, __TO_NO_NAME 0.000000, __URI_HAS_HYPHEN_USC 0.000000, __URI_IN_BODY 0.000000, __URI_IN_BODY_HTTP_X10 0.000000, __URI_NOT_IMG 0.000000, __URI_NO_MAILTO 0.000000, __URI_NO_WWW 0.000000, __URI_NS 0.000000, __URI_WITH_PATH 0.000000, __X_FF_ASR_SCL_NSP 0.000000, __X_FF_ASR_SFV_NSPM 0.000000, __X_VIRUS_SCANNED 0.000000
                                                  X-LASED-ImpersonationFalse
                                                  X-Sophos-Tracker0.089074 461ad5929c7c02167ad5009c8f0621281bf40117
                                                  X-BAEAI-Source-GeoIP"US" "N/A" "N/A"
                                                  X-BAEAI-SPFPASS
                                                  X-BAEAI-DKIMNONE
                                                  X-BAEAI-DMARCabsent
                                                  X-SilverSky-ARCpass
                                                  X-BAEAI-Authentication-Ratingstrong
                                                  X-BAEAI-Trust-Levelgreen
                                                  Return-Pathbtv1==075a1c25527==EWanner@mvadvancements.org
                                                  X-MS-Exchange-Organization-ExpirationStartTime11 Dec 2024 15:56:11.2154 (UTC)
                                                  X-MS-Exchange-Organization-ExpirationStartTimeReasonOriginalSubmit
                                                  X-MS-Exchange-Organization-ExpirationInterval1:00:00:00.0000000
                                                  X-MS-Exchange-Organization-ExpirationIntervalReasonOriginalSubmit
                                                  X-MS-Exchange-Organization-Network-Message-Id db4a52bb-c7f6-4f73-3ecd-08dd19fc556d
                                                  X-EOPAttributedMessage0
                                                  X-EOPTenantAttributedMessage3778f0b2-789a-4d43-b25e-d4fe25a4c3c0:0
                                                  X-MS-Exchange-Organization-MessageDirectionalityIncoming
                                                  X-MS-Exchange-Transport-CrossTenantHeadersStripped SN1PEPF0002BA50.namprd03.prod.outlook.com
                                                  x-ms-publictraffictypeEmail
                                                  x-ms-exchange-organization-authsource SN1PEPF0002BA50.namprd03.prod.outlook.com
                                                  x-ms-exchange-organization-authasAnonymous
                                                  X-MS-Office365-Filtering-Correlation-Id-Prvs b11ebd49-e55f-4c1c-dc4b-08dd19fc4bc2
                                                  X-MS-Exchange-AtpMessagePropertiesSA|SL
                                                  X-MS-Exchange-Organization-SCL-1
                                                  X-MS-Exchange-Organization-BypassClutter$true
                                                  X-Microsoft-Antispam BCL:0;ARA:13230040|5073199012|4073199012|69100299015|35042699022|82310400026|26013499003|8096899003;
                                                  x-forefront-antispam-report CIP:165.212.64.15;CTRY:US;LANG:en;SCL:-1;SRV:;IPV:NLI;SFV:NSPM;H:postin02.mbox.net;PTR:postin02.mbox.net;CAT:NONE;SFS:(13230040)(5073199012)(4073199012)(69100299015)(35042699022)(82310400026)(26013499003)(8096899003);DIR:INB;
                                                  X-MS-Exchange-CrossTenant-OriginalArrivalTime11 Dec 2024 15:56:11.0123 (UTC)
                                                  X-MS-Exchange-CrossTenant-Network-Message-Id db4a52bb-c7f6-4f73-3ecd-08dd19fc556d
                                                  X-MS-Exchange-CrossTenant-Id3778f0b2-789a-4d43-b25e-d4fe25a4c3c0
                                                  X-MS-Exchange-CrossTenant-AuthSource SN1PEPF0002BA50.namprd03.prod.outlook.com
                                                  X-MS-Exchange-CrossTenant-AuthAsAnonymous
                                                  X-MS-Exchange-CrossTenant-FromEntityHeaderInternet
                                                  X-MS-Exchange-Transport-EndToEndLatency00:02:51.5606410
                                                  X-MS-Exchange-Processed-By-BccFoldering15.20.8230.010
                                                  X-Microsoft-Antispam-Mailbox-Delivery ucf:0;jmr:0;auth:0;dest:I;ENG:(910001)(944506478)(944626604)(920097)(930097)(140003);
                                                  X-Microsoft-Antispam-Message-Info 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
                                                  acceptlanguageen-US
                                                  x-ms-exchange-organization-originalclientipaddress165.212.64.15
                                                  x-ms-exchange-organization-originalserveripaddress10.167.242.73
                                                  X-Priority3
                                                  X-MSMail-PriorityNormal
                                                  Message-ID <Share-b5896ca1-8039-7000-3767-bd6305af8f5f-aeb782fc-11b0-4a3e-ae64-e886b43d54b1-r0-SendEmail@odspnotify>
                                                  FromEd Wanner <EWanner@mvadvancements.org>
                                                  ToSandy Schultz <SSchultz@FirstFedWeb.com>
                                                  SubjectEd Wanner shared the folder "mvadvancements.org" with you
                                                  DateWed, 11 Dec 2024 07:55:23 -0800
                                                  MIME-Version1.0
                                                  Content-typeMultipart/related; charset="us-ascii"; boundary="00B0FEED_message_boundary"
                                                  Content-DescriptionMultipart message

                                                  Icon Hash:46070c0a8e0c67d6