Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
RE Leander - Lighting and Control Devices Submittal.msg

Overview

General Information

Sample name:RE Leander - Lighting and Control Devices Submittal.msg
Analysis ID:1544659
MD5:655e4981b189d744500607d6d6c50b67
SHA1:1a08e7ec4556e86f9fcf5e6f3f12f946c1209be1
SHA256:6a381f857a36abbc651469b99f8ebf10f71a0b7dec47f72f1348aba672098923
Infos:

Detection

Score:23
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

HTML page contains hidden URLs
HTML body contains low number of good links
HTML page contains hidden javascript code
HTML title does not match URL
Queries the volume information (name, serial number etc) of a device
Sigma detected: Office Autorun Keys Modification
Stores files to the Windows start menu directory
Stores large binary data to the registry

Classification

  • System is w10x64_ra
  • OUTLOOK.EXE (PID: 6732 cmdline: "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /f "C:\Users\user\Desktop\RE Leander - Lighting and Control Devices Submittal.msg" MD5: 91A5292942864110ED734005B7E005C0)
    • ai.exe (PID: 6904 cmdline: "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "18DDC3D9-60B1-4CC8-A052-101385A51363" "75FE8FA7-E046-4BFD-82F3-FC3C528AFC7D" "6732" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx" MD5: EC652BEDD90E089D9406AFED89A8A8BD)
    • chrome.exe (PID: 4800 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://link.edgepilot.com/s/c6c5d4e5/oz5uFPEm10aK_RBwkmVvzQ?u=https://aro365150672-my.sharepoint.com/:b:/g/personal/rdhamija_gignac-associates_com/EVNHaSacx5JNmFtGs0SXCbIBgI50GJjSp_v8M3rndVz0Qg MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 3168 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1892,i,11123967806587712953,1727944414528326139,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 6352 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://link.edgepilot.com/s/12f296c1/mkNEkUsCaUyhM6_YKKlYig?u=https://gignacarchitects.sharefile.com/public/share/web-sd99ebbc5c56741ceb96a1e5404c17f68 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 6944 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1628 --field-trial-handle=2004,i,4363723415511824311,15844602367193859722,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No yara matches
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE, ProcessId: 6732, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Addins\OneNote.OutlookAddin\1
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

Phishing

barindex
Source: https://link.edgepilot.com/s/12f296c1/mkNEkUsCaUyhM6_YKKlYig?u=https://gignacarchitects.sharefile.com/public/share/web-sd99ebbc5c56741ceb96a1e5404c17f68HTTP Parser: https://gignacarchitects.sharefile.com/public/share/web-sd99ebbc5c56741ceb96a1e5404c17f68
Source: https://link.edgepilot.com/s/c6c5d4e5/oz5uFPEm10aK_RBwkmVvzQ?u=https://aro365150672-my.sharepoint.com/:b:/g/personal/rdhamija_gignac-associates_com/EVNHaSacx5JNmFtGs0SXCbIBgI50GJjSp_v8M3rndVz0QgHTTP Parser: https://aro365150672-my.sharepoint.com/:b:/g/personal/rdhamija_gignac-associates_com/EVNHaSacx5JNmFtGs0SXCbIBgI50GJjSp_v8M3rndVz0Qg
Source: https://login.microsoftonline.com/8e0de89c-298f-4cee-a7bd-0c3a67bd030b/oauth2/authorize?client%5Fid=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&response%5Fmode=form%5Fpost&response%5Ftype=code%20id%5Ftoken&resource=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&scope=openid&nonce=F2323C8FF525C2A7526302954E043B41CE166CC903330A89%2D7371B92DB53EFB3713F428DD35FD600BD9A89A2E528BCF9D9E03AE85AFCD407D&redirect%5Furi=https%3A%2F%2Faro365150672%2Dmy%2Esharepoint%2Ecom%2F%5Fforms%2Fdefault%2Easpx&state=OD0w&claims=%7B%22id%5Ftoken%22%3A%7B%22xms%5Fcc%22%3A%7B%22values%22%3A%5B%22CP1%22%5D%7D%7D%7D&wsucxt=1&cobrandid=11bd8083%2D87e0%2D41b5%2Dbb78%2D0bc43c8a8e8a&client%2Drequest%2Did=03b05ea1%2Dc09d%2D6000%2Dbd7a%2D8ac0579730a2HTTP Parser: Number of links: 0
Source: https://login.microsoftonline.com/8e0de89c-298f-4cee-a7bd-0c3a67bd030b/oauth2/authorize?client%5Fid=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&response%5Fmode=form%5Fpost&response%5Ftype=code%20id%5Ftoken&resource=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&scope=openid&nonce=F2323C8FF525C2A7526302954E043B41CE166CC903330A89%2D7371B92DB53EFB3713F428DD35FD600BD9A89A2E528BCF9D9E03AE85AFCD407D&redirect%5Furi=https%3A%2F%2Faro365150672%2Dmy%2Esharepoint%2Ecom%2F%5Fforms%2Fdefault%2Easpx&state=OD0w&claims=%7B%22id%5Ftoken%22%3A%7B%22xms%5Fcc%22%3A%7B%22values%22%3A%5B%22CP1%22%5D%7D%7D%7D&wsucxt=1&cobrandid=11bd8083%2D87e0%2D41b5%2Dbb78%2D0bc43c8a8e8a&client%2Drequest%2Did=03b05ea1%2Dc09d%2D6000%2Dbd7a%2D8ac0579730a2&sso_reload=trueHTTP Parser: Number of links: 0
Source: https://link.edgepilot.com/s/c6c5d4e5/oz5uFPEm10aK_RBwkmVvzQ?u=https://aro365150672-my.sharepoint.com/:b:/g/personal/rdhamija_gignac-associates_com/EVNHaSacx5JNmFtGs0SXCbIBgI50GJjSp_v8M3rndVz0QgHTTP Parser: Base64 decoded: https://aro365150672-my.sharepoint.com/:b:/g/personal/rdhamija_gignac-associates_com/EVNHaSacx5JNmFtGs0SXCbIBgI50GJjSp_v8M3rndVz0Qg
Source: https://login.microsoftonline.com/8e0de89c-298f-4cee-a7bd-0c3a67bd030b/oauth2/authorize?client%5Fid=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&response%5Fmode=form%5Fpost&response%5Ftype=code%20id%5Ftoken&resource=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&scope=openid&nonce=F2323C8FF525C2A7526302954E043B41CE166CC903330A89%2D7371B92DB53EFB3713F428DD35FD600BD9A89A2E528BCF9D9E03AE85AFCD407D&redirect%5Furi=https%3A%2F%2Faro365150672%2Dmy%2Esharepoint%2Ecom%2F%5Fforms%2Fdefault%2Easpx&state=OD0w&claims=%7B%22id%5Ftoken%22%3A%7B%22xms%5Fcc%22%3A%7B%22values%22%3A%5B%22CP1%22%5D%7D%7D%7D&wsucxt=1&cobrandid=11bd8083%2D87e0%2D41b5%2Dbb78%2D0bc43c8a8e8a&client%2Drequest%2Did=03b05ea1%2Dc09d%2D6000%2Dbd7a%2D8ac0579730a2HTTP Parser: Title: Redirecting does not match URL
Source: https://login.microsoftonline.com/8e0de89c-298f-4cee-a7bd-0c3a67bd030b/oauth2/authorize?client%5Fid=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&response%5Fmode=form%5Fpost&response%5Ftype=code%20id%5Ftoken&resource=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&scope=openid&nonce=F2323C8FF525C2A7526302954E043B41CE166CC903330A89%2D7371B92DB53EFB3713F428DD35FD600BD9A89A2E528BCF9D9E03AE85AFCD407D&redirect%5Furi=https%3A%2F%2Faro365150672%2Dmy%2Esharepoint%2Ecom%2F%5Fforms%2Fdefault%2Easpx&state=OD0w&claims=%7B%22id%5Ftoken%22%3A%7B%22xms%5Fcc%22%3A%7B%22values%22%3A%5B%22CP1%22%5D%7D%7D%7D&wsucxt=1&cobrandid=11bd8083%2D87e0%2D41b5%2Dbb78%2D0bc43c8a8e8a&client%2Drequest%2Did=03b05ea1%2Dc09d%2D6000%2Dbd7a%2D8ac0579730a2&sso_reload=trueHTTP Parser: Title: Sign in to your account does not match URL
Source: https://login.microsoftonline.com/8e0de89c-298f-4cee-a7bd-0c3a67bd030b/oauth2/authorize?client%5Fid=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&response%5Fmode=form%5Fpost&response%5Ftype=code%20id%5Ftoken&resource=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&scope=openid&nonce=F2323C8FF525C2A7526302954E043B41CE166CC903330A89%2D7371B92DB53EFB3713F428DD35FD600BD9A89A2E528BCF9D9E03AE85AFCD407D&redirect%5Furi=https%3A%2F%2Faro365150672%2Dmy%2Esharepoint%2Ecom%2F%5Fforms%2Fdefault%2Easpx&state=OD0w&claims=%7B%22id%5Ftoken%22%3A%7B%22xms%5Fcc%22%3A%7B%22values%22%3A%5B%22CP1%22%5D%7D%7D%7D&wsucxt=1&cobrandid=11bd8083%2D87e0%2D41b5%2Dbb78%2D0bc43c8a8e8a&client%2Drequest%2Did=03b05ea1%2Dc09d%2D6000%2Dbd7a%2D8ac0579730a2&sso_reload=trueHTTP Parser: <input type="password" .../> found
Source: https://link.edgepilot.com/s/c6c5d4e5/oz5uFPEm10aK_RBwkmVvzQ?u=https://aro365150672-my.sharepoint.com/:b:/g/personal/rdhamija_gignac-associates_com/EVNHaSacx5JNmFtGs0SXCbIBgI50GJjSp_v8M3rndVz0QgHTTP Parser: No favicon
Source: https://login.microsoftonline.com/8e0de89c-298f-4cee-a7bd-0c3a67bd030b/oauth2/authorize?client%5Fid=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&response%5Fmode=form%5Fpost&response%5Ftype=code%20id%5Ftoken&resource=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&scope=openid&nonce=F2323C8FF525C2A7526302954E043B41CE166CC903330A89%2D7371B92DB53EFB3713F428DD35FD600BD9A89A2E528BCF9D9E03AE85AFCD407D&redirect%5Furi=https%3A%2F%2Faro365150672%2Dmy%2Esharepoint%2Ecom%2F%5Fforms%2Fdefault%2Easpx&state=OD0w&claims=%7B%22id%5Ftoken%22%3A%7B%22xms%5Fcc%22%3A%7B%22values%22%3A%5B%22CP1%22%5D%7D%7D%7D&wsucxt=1&cobrandid=11bd8083%2D87e0%2D41b5%2Dbb78%2D0bc43c8a8e8a&client%2Drequest%2Did=03b05ea1%2Dc09d%2D6000%2Dbd7a%2D8ac0579730a2HTTP Parser: No favicon
Source: https://link.edgepilot.com/s/12f296c1/mkNEkUsCaUyhM6_YKKlYig?u=https://gignacarchitects.sharefile.com/public/share/web-sd99ebbc5c56741ceb96a1e5404c17f68HTTP Parser: No favicon
Source: https://login.microsoftonline.com/8e0de89c-298f-4cee-a7bd-0c3a67bd030b/oauth2/authorize?client%5Fid=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&response%5Fmode=form%5Fpost&response%5Ftype=code%20id%5Ftoken&resource=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&scope=openid&nonce=F2323C8FF525C2A7526302954E043B41CE166CC903330A89%2D7371B92DB53EFB3713F428DD35FD600BD9A89A2E528BCF9D9E03AE85AFCD407D&redirect%5Furi=https%3A%2F%2Faro365150672%2Dmy%2Esharepoint%2Ecom%2F%5Fforms%2Fdefault%2Easpx&state=OD0w&claims=%7B%22id%5Ftoken%22%3A%7B%22xms%5Fcc%22%3A%7B%22values%22%3A%5B%22CP1%22%5D%7D%7D%7D&wsucxt=1&cobrandid=11bd8083%2D87e0%2D41b5%2Dbb78%2D0bc43c8a8e8a&client%2Drequest%2Did=03b05ea1%2Dc09d%2D6000%2Dbd7a%2D8ac0579730a2HTTP Parser: No <meta name="author".. found
Source: https://login.microsoftonline.com/8e0de89c-298f-4cee-a7bd-0c3a67bd030b/oauth2/authorize?client%5Fid=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&response%5Fmode=form%5Fpost&response%5Ftype=code%20id%5Ftoken&resource=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&scope=openid&nonce=F2323C8FF525C2A7526302954E043B41CE166CC903330A89%2D7371B92DB53EFB3713F428DD35FD600BD9A89A2E528BCF9D9E03AE85AFCD407D&redirect%5Furi=https%3A%2F%2Faro365150672%2Dmy%2Esharepoint%2Ecom%2F%5Fforms%2Fdefault%2Easpx&state=OD0w&claims=%7B%22id%5Ftoken%22%3A%7B%22xms%5Fcc%22%3A%7B%22values%22%3A%5B%22CP1%22%5D%7D%7D%7D&wsucxt=1&cobrandid=11bd8083%2D87e0%2D41b5%2Dbb78%2D0bc43c8a8e8a&client%2Drequest%2Did=03b05ea1%2Dc09d%2D6000%2Dbd7a%2D8ac0579730a2&sso_reload=trueHTTP Parser: No <meta name="author".. found
Source: https://login.microsoftonline.com/8e0de89c-298f-4cee-a7bd-0c3a67bd030b/oauth2/authorize?client%5Fid=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&response%5Fmode=form%5Fpost&response%5Ftype=code%20id%5Ftoken&resource=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&scope=openid&nonce=F2323C8FF525C2A7526302954E043B41CE166CC903330A89%2D7371B92DB53EFB3713F428DD35FD600BD9A89A2E528BCF9D9E03AE85AFCD407D&redirect%5Furi=https%3A%2F%2Faro365150672%2Dmy%2Esharepoint%2Ecom%2F%5Fforms%2Fdefault%2Easpx&state=OD0w&claims=%7B%22id%5Ftoken%22%3A%7B%22xms%5Fcc%22%3A%7B%22values%22%3A%5B%22CP1%22%5D%7D%7D%7D&wsucxt=1&cobrandid=11bd8083%2D87e0%2D41b5%2Dbb78%2D0bc43c8a8e8a&client%2Drequest%2Did=03b05ea1%2Dc09d%2D6000%2Dbd7a%2D8ac0579730a2&sso_reload=trueHTTP Parser: No <meta name="author".. found
Source: https://login.microsoftonline.com/8e0de89c-298f-4cee-a7bd-0c3a67bd030b/oauth2/authorize?client%5Fid=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&response%5Fmode=form%5Fpost&response%5Ftype=code%20id%5Ftoken&resource=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&scope=openid&nonce=F2323C8FF525C2A7526302954E043B41CE166CC903330A89%2D7371B92DB53EFB3713F428DD35FD600BD9A89A2E528BCF9D9E03AE85AFCD407D&redirect%5Furi=https%3A%2F%2Faro365150672%2Dmy%2Esharepoint%2Ecom%2F%5Fforms%2Fdefault%2Easpx&state=OD0w&claims=%7B%22id%5Ftoken%22%3A%7B%22xms%5Fcc%22%3A%7B%22values%22%3A%5B%22CP1%22%5D%7D%7D%7D&wsucxt=1&cobrandid=11bd8083%2D87e0%2D41b5%2Dbb78%2D0bc43c8a8e8a&client%2Drequest%2Did=03b05ea1%2Dc09d%2D6000%2Dbd7a%2D8ac0579730a2HTTP Parser: No <meta name="copyright".. found
Source: https://login.microsoftonline.com/8e0de89c-298f-4cee-a7bd-0c3a67bd030b/oauth2/authorize?client%5Fid=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&response%5Fmode=form%5Fpost&response%5Ftype=code%20id%5Ftoken&resource=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&scope=openid&nonce=F2323C8FF525C2A7526302954E043B41CE166CC903330A89%2D7371B92DB53EFB3713F428DD35FD600BD9A89A2E528BCF9D9E03AE85AFCD407D&redirect%5Furi=https%3A%2F%2Faro365150672%2Dmy%2Esharepoint%2Ecom%2F%5Fforms%2Fdefault%2Easpx&state=OD0w&claims=%7B%22id%5Ftoken%22%3A%7B%22xms%5Fcc%22%3A%7B%22values%22%3A%5B%22CP1%22%5D%7D%7D%7D&wsucxt=1&cobrandid=11bd8083%2D87e0%2D41b5%2Dbb78%2D0bc43c8a8e8a&client%2Drequest%2Did=03b05ea1%2Dc09d%2D6000%2Dbd7a%2D8ac0579730a2&sso_reload=trueHTTP Parser: No <meta name="copyright".. found
Source: https://login.microsoftonline.com/8e0de89c-298f-4cee-a7bd-0c3a67bd030b/oauth2/authorize?client%5Fid=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&response%5Fmode=form%5Fpost&response%5Ftype=code%20id%5Ftoken&resource=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&scope=openid&nonce=F2323C8FF525C2A7526302954E043B41CE166CC903330A89%2D7371B92DB53EFB3713F428DD35FD600BD9A89A2E528BCF9D9E03AE85AFCD407D&redirect%5Furi=https%3A%2F%2Faro365150672%2Dmy%2Esharepoint%2Ecom%2F%5Fforms%2Fdefault%2Easpx&state=OD0w&claims=%7B%22id%5Ftoken%22%3A%7B%22xms%5Fcc%22%3A%7B%22values%22%3A%5B%22CP1%22%5D%7D%7D%7D&wsucxt=1&cobrandid=11bd8083%2D87e0%2D41b5%2Dbb78%2D0bc43c8a8e8a&client%2Drequest%2Did=03b05ea1%2Dc09d%2D6000%2Dbd7a%2D8ac0579730a2&sso_reload=trueHTTP Parser: No <meta name="copyright".. found
Source: unknownTCP traffic detected without corresponding DNS query: 93.184.221.240
Source: unknownTCP traffic detected without corresponding DNS query: 93.184.221.240
Source: unknownTCP traffic detected without corresponding DNS query: 93.184.221.240
Source: unknownTCP traffic detected without corresponding DNS query: 93.184.221.240
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.73
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.73
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.73
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.73
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.73
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.73
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.73
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.73
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.73
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.73
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.73
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.73
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.73
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: link.edgepilot.com
Source: global trafficDNS traffic detected: DNS query: maxcdn.bootstrapcdn.com
Source: global trafficDNS traffic detected: DNS query: code.jquery.com
Source: global trafficDNS traffic detected: DNS query: aro365150672-my.sharepoint.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: login.microsoftonline.com
Source: global trafficDNS traffic detected: DNS query: aadcdn.msftauth.net
Source: global trafficDNS traffic detected: DNS query: identity.nel.measure.office.net
Source: global trafficDNS traffic detected: DNS query: gignacarchitects.sharefile.com
Source: global trafficDNS traffic detected: DNS query: 0093b71e39a6.us-east-1.sdk.awswaf.com
Source: global trafficDNS traffic detected: DNS query: 0093b71e39a6.11de9b12.us-east-1.token.awswaf.com
Source: global trafficDNS traffic detected: DNS query: app.launchdarkly.com
Source: global trafficDNS traffic detected: DNS query: gignacarchitects.sf-api.com
Source: global trafficDNS traffic detected: DNS query: citrix-sharefile-content.customer.pendo.io
Source: global trafficDNS traffic detected: DNS query: piletfeed-cdn.sharefile.io
Source: global trafficDNS traffic detected: DNS query: o49063.ingest.sentry.io
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49865
Source: unknownNetwork traffic detected: HTTP traffic on port 49817 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49864
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49863
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49862
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49861
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49860
Source: unknownNetwork traffic detected: HTTP traffic on port 49789 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49800 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49898 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49875 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49852 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49795 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49859
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49858
Source: unknownNetwork traffic detected: HTTP traffic on port 49881 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49857
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49856
Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49855
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
Source: unknownNetwork traffic detected: HTTP traffic on port 49841 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49854
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49853
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49852
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49851
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49850
Source: unknownNetwork traffic detected: HTTP traffic on port 49812 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49858 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49893 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49806 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49823 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49849
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49848
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49847
Source: unknownNetwork traffic detected: HTTP traffic on port 49886 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49846
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
Source: unknownNetwork traffic detected: HTTP traffic on port 49790 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49845
Source: unknownNetwork traffic detected: HTTP traffic on port 49869 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49844
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49843
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49841
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49840
Source: unknownNetwork traffic detected: HTTP traffic on port 49834 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49892 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49828 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49839
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49838
Source: unknownNetwork traffic detected: HTTP traffic on port 49904 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49837
Source: unknownNetwork traffic detected: HTTP traffic on port 49847 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49836
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49835
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49834
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49833
Source: unknownNetwork traffic detected: HTTP traffic on port 49887 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49832
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49831
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49830
Source: unknownNetwork traffic detected: HTTP traffic on port 49839 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49864 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49822 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49870 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49853 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49796 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49829
Source: unknownNetwork traffic detected: HTTP traffic on port 49811 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49828
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49827
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49826
Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49825
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49824
Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49823
Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49822
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49787
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49786
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
Source: unknownNetwork traffic detected: HTTP traffic on port 49836 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49807 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49845 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49868 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49885 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49899
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49898
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49897
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49896
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49895
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
Source: unknownNetwork traffic detected: HTTP traffic on port 49862 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49894
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49893
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49892
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49891
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49890
Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49897 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49879 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49851 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49830 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49905 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49889
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49888
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49887
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49886
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49885
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
Source: unknownNetwork traffic detected: HTTP traffic on port 49863 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49884
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49883
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49882
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49881
Source: unknownNetwork traffic detected: HTTP traffic on port 49840 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49880
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49857 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49896 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49797 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49801 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49824 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49879
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49878
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49877
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49876
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49875
Source: unknownNetwork traffic detected: HTTP traffic on port 49891 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49874
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49873
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49872
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
Source: unknownNetwork traffic detected: HTTP traffic on port 49818 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49871
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49870
Source: unknownNetwork traffic detected: HTTP traffic on port 49835 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49786 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49874 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49829 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49880 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
Source: unknownNetwork traffic detected: HTTP traffic on port 49846 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49869
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
Source: unknownNetwork traffic detected: HTTP traffic on port 49792 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49868
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49867
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49866
Source: unknownNetwork traffic detected: HTTP traffic on port 49890 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49878 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49803 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49826 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49849 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49889 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49900 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49866 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49820 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49837 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49872 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49855 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49798 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49861 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49901 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49819 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49844 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49873 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49787 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49850 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49831 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49799
Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49798
Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49797
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49796
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49795
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49794
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49793
Source: unknownNetwork traffic detected: HTTP traffic on port 49814 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49792
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49790
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49856 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49895 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49825 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49808 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49884 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49867 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49789
Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49821
Source: unknownNetwork traffic detected: HTTP traffic on port 49865 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49820
Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49859 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49871 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49894 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49833 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49819
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49818
Source: unknownNetwork traffic detected: HTTP traffic on port 49799 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49810 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49817
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49816
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49815
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49814
Source: unknownNetwork traffic detected: HTTP traffic on port 49902 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49812
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49811
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49810
Source: unknownNetwork traffic detected: HTTP traffic on port 49816 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49794 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49827 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49876 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49809
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49808
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49807
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49806
Source: unknownNetwork traffic detected: HTTP traffic on port 49848 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49882 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49804
Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49803
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49801
Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49800
Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49838 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49821 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49815 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49877 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49854 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49809 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49860 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49883 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49843 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49899 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49804 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49832 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49905
Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49904
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49903
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49902
Source: unknownNetwork traffic detected: HTTP traffic on port 49903 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49901
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49900
Source: unknownNetwork traffic detected: HTTP traffic on port 49888 -> 443
Source: classification engineClassification label: sus23.phis.winMSG@26/85@56/237
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\Documents\Outlook Files\~Outlook Data File - NoEmail.pst.tmp
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_16827_20130-20241029T1108400621-6732.etl
Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /f "C:\Users\user\Desktop\RE Leander - Lighting and Control Devices Submittal.msg"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "18DDC3D9-60B1-4CC8-A052-101385A51363" "75FE8FA7-E046-4BFD-82F3-FC3C528AFC7D" "6732" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "18DDC3D9-60B1-4CC8-A052-101385A51363" "75FE8FA7-E046-4BFD-82F3-FC3C528AFC7D" "6732" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://link.edgepilot.com/s/c6c5d4e5/oz5uFPEm10aK_RBwkmVvzQ?u=https://aro365150672-my.sharepoint.com/:b:/g/personal/rdhamija_gignac-associates_com/EVNHaSacx5JNmFtGs0SXCbIBgI50GJjSp_v8M3rndVz0Qg
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1892,i,11123967806587712953,1727944414528326139,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://link.edgepilot.com/s/c6c5d4e5/oz5uFPEm10aK_RBwkmVvzQ?u=https://aro365150672-my.sharepoint.com/:b:/g/personal/rdhamija_gignac-associates_com/EVNHaSacx5JNmFtGs0SXCbIBgI50GJjSp_v8M3rndVz0Qg
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1892,i,11123967806587712953,1727944414528326139,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://link.edgepilot.com/s/12f296c1/mkNEkUsCaUyhM6_YKKlYig?u=https://gignacarchitects.sharefile.com/public/share/web-sd99ebbc5c56741ceb96a1e5404c17f68
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1628 --field-trial-handle=2004,i,4363723415511824311,15844602367193859722,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://link.edgepilot.com/s/12f296c1/mkNEkUsCaUyhM6_YKKlYig?u=https://gignacarchitects.sharefile.com/public/share/web-sd99ebbc5c56741ceb96a1e5404c17f68
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1628 --field-trial-handle=2004,i,4363723415511824311,15844602367193859722,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: apphelp.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: c2r64.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: userenv.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: msasn1.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: kernel.appcore.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptsp.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: rsaenh.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: gpapi.dll
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\ClickToRun\REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{ED475410-B0D6-11D2-8C3B-00104B2A6676}\InprocServer32
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEWindow found: window name: SysTabControl32
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\Common
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\outlook\ConfigContextData 1
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile Volume queried: C:\Windows\SysWOW64 FullSizeInformation
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information queried: ProcessInformation
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeQueries volume information: C:\Program Files (x86)\Microsoft Office\root\Office16\AI\WordCombinedFloatieLreOnline.onnx VolumeInformation
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Masquerading
OS Credential Dumping1
Process Discovery
Remote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
Registry Run Keys / Startup Folder
1
DLL Side-Loading
1
Modify Registry
LSASS Memory13
System Information Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
Registry Run Keys / Startup Folder
1
Process Injection
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
link.edgepilot.com
199.30.234.133
truefalse
    unknown
    dual-spo-0005.spo-msedge.net
    13.107.136.10
    truefalse
      unknown
      gignacarchitects.sf-api.com
      76.223.1.166
      truefalse
        unknown
        gignacarchitects.sharefile.com
        13.248.193.251
        truetrue
          unknown
          0093b71e39a6.us-east-1.sdk.awswaf.com
          13.32.121.66
          truefalse
            unknown
            maxcdn.bootstrapcdn.com
            104.18.11.207
            truefalse
              unknown
              s-part-0017.t-0009.t-msedge.net
              13.107.246.45
              truefalse
                unknown
                piletfeed-cdn.sharefile.io
                3.165.190.39
                truefalse
                  unknown
                  0093b71e39a6.11de9b12.us-east-1.token.awswaf.com
                  18.173.205.42
                  truefalse
                    unknown
                    51.138.111.34.bc.googleusercontent.com
                    34.111.138.51
                    truefalse
                      unknown
                      code.jquery.com
                      151.101.66.137
                      truefalse
                        unknown
                        o49063.ingest.sentry.io
                        34.120.195.249
                        truefalse
                          unknown
                          sni1gl.wpc.omegacdn.net
                          152.199.21.175
                          truefalse
                            unknown
                            www.google.com
                            142.250.185.228
                            truefalse
                              unknown
                              app.launchdarkly.com
                              unknown
                              unknownfalse
                                unknown
                                aadcdn.msftauth.net
                                unknown
                                unknownfalse
                                  unknown
                                  aro365150672-my.sharepoint.com
                                  unknown
                                  unknowntrue
                                    unknown
                                    citrix-sharefile-content.customer.pendo.io
                                    unknown
                                    unknownfalse
                                      unknown
                                      identity.nel.measure.office.net
                                      unknown
                                      unknownfalse
                                        unknown
                                        login.microsoftonline.com
                                        unknown
                                        unknownfalse
                                          unknown
                                          NameMaliciousAntivirus DetectionReputation
                                          https://link.edgepilot.com/s/12f296c1/mkNEkUsCaUyhM6_YKKlYig?u=https://gignacarchitects.sharefile.com/public/share/web-sd99ebbc5c56741ceb96a1e5404c17f68true
                                            unknown
                                            https://gignacarchitects.sharefile.com/public/share/web-sd99ebbc5c56741ceb96a1e5404c17f68true
                                              unknown
                                              https://login.microsoftonline.com/8e0de89c-298f-4cee-a7bd-0c3a67bd030b/oauth2/authorize?client%5Fid=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&response%5Fmode=form%5Fpost&response%5Ftype=code%20id%5Ftoken&resource=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&scope=openid&nonce=F2323C8FF525C2A7526302954E043B41CE166CC903330A89%2D7371B92DB53EFB3713F428DD35FD600BD9A89A2E528BCF9D9E03AE85AFCD407D&redirect%5Furi=https%3A%2F%2Faro365150672%2Dmy%2Esharepoint%2Ecom%2F%5Fforms%2Fdefault%2Easpx&state=OD0w&claims=%7B%22id%5Ftoken%22%3A%7B%22xms%5Fcc%22%3A%7B%22values%22%3A%5B%22CP1%22%5D%7D%7D%7D&wsucxt=1&cobrandid=11bd8083%2D87e0%2D41b5%2Dbb78%2D0bc43c8a8e8a&client%2Drequest%2Did=03b05ea1%2Dc09d%2D6000%2Dbd7a%2D8ac0579730a2&sso_reload=truefalse
                                                unknown
                                                https://link.edgepilot.com/s/c6c5d4e5/oz5uFPEm10aK_RBwkmVvzQ?u=https://aro365150672-my.sharepoint.com/:b:/g/personal/rdhamija_gignac-associates_com/EVNHaSacx5JNmFtGs0SXCbIBgI50GJjSp_v8M3rndVz0Qgtrue
                                                  unknown
                                                  https://login.microsoftonline.com/8e0de89c-298f-4cee-a7bd-0c3a67bd030b/oauth2/authorize?client%5Fid=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&response%5Fmode=form%5Fpost&response%5Ftype=code%20id%5Ftoken&resource=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&scope=openid&nonce=F2323C8FF525C2A7526302954E043B41CE166CC903330A89%2D7371B92DB53EFB3713F428DD35FD600BD9A89A2E528BCF9D9E03AE85AFCD407D&redirect%5Furi=https%3A%2F%2Faro365150672%2Dmy%2Esharepoint%2Ecom%2F%5Fforms%2Fdefault%2Easpx&state=OD0w&claims=%7B%22id%5Ftoken%22%3A%7B%22xms%5Fcc%22%3A%7B%22values%22%3A%5B%22CP1%22%5D%7D%7D%7D&wsucxt=1&cobrandid=11bd8083%2D87e0%2D41b5%2Dbb78%2D0bc43c8a8e8a&client%2Drequest%2Did=03b05ea1%2Dc09d%2D6000%2Dbd7a%2D8ac0579730a2false
                                                    unknown
                                                    • No. of IPs < 25%
                                                    • 25% < No. of IPs < 50%
                                                    • 50% < No. of IPs < 75%
                                                    • 75% < No. of IPs
                                                    IPDomainCountryFlagASNASN NameMalicious
                                                    199.30.234.133
                                                    link.edgepilot.comUnited States
                                                    13380ASN-CUSTUSfalse
                                                    142.250.186.67
                                                    unknownUnited States
                                                    15169GOOGLEUSfalse
                                                    142.250.185.228
                                                    www.google.comUnited States
                                                    15169GOOGLEUSfalse
                                                    13.107.136.10
                                                    dual-spo-0005.spo-msedge.netUnited States
                                                    8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                    40.126.32.140
                                                    unknownUnited States
                                                    8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                    52.109.89.18
                                                    unknownUnited States
                                                    8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                    173.194.76.84
                                                    unknownUnited States
                                                    15169GOOGLEUSfalse
                                                    2.19.126.89
                                                    unknownEuropean Union
                                                    16625AKAMAI-ASUSfalse
                                                    151.101.130.217
                                                    unknownUnited States
                                                    54113FASTLYUSfalse
                                                    20.42.65.88
                                                    unknownUnited States
                                                    8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                    13.248.193.251
                                                    gignacarchitects.sharefile.comUnited States
                                                    16509AMAZON-02UStrue
                                                    52.109.68.129
                                                    unknownUnited States
                                                    8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                    13.32.121.66
                                                    0093b71e39a6.us-east-1.sdk.awswaf.comUnited States
                                                    16509AMAZON-02USfalse
                                                    151.101.194.217
                                                    unknownUnited States
                                                    54113FASTLYUSfalse
                                                    2.19.126.160
                                                    unknownEuropean Union
                                                    16625AKAMAI-ASUSfalse
                                                    151.101.66.137
                                                    code.jquery.comUnited States
                                                    54113FASTLYUSfalse
                                                    52.111.243.41
                                                    unknownUnited States
                                                    8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                    216.58.212.170
                                                    unknownUnited States
                                                    15169GOOGLEUSfalse
                                                    52.113.194.132
                                                    unknownUnited States
                                                    8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                    1.1.1.1
                                                    unknownAustralia
                                                    13335CLOUDFLARENETUSfalse
                                                    142.250.186.163
                                                    unknownUnited States
                                                    15169GOOGLEUSfalse
                                                    18.173.205.42
                                                    0093b71e39a6.11de9b12.us-east-1.token.awswaf.comUnited States
                                                    3MIT-GATEWAYSUSfalse
                                                    3.165.190.39
                                                    piletfeed-cdn.sharefile.ioUnited States
                                                    16509AMAZON-02USfalse
                                                    142.250.185.238
                                                    unknownUnited States
                                                    15169GOOGLEUSfalse
                                                    104.18.11.207
                                                    maxcdn.bootstrapcdn.comUnited States
                                                    13335CLOUDFLARENETUSfalse
                                                    151.101.2.137
                                                    unknownUnited States
                                                    54113FASTLYUSfalse
                                                    34.111.138.51
                                                    51.138.111.34.bc.googleusercontent.comUnited States
                                                    15169GOOGLEUSfalse
                                                    40.126.31.73
                                                    unknownUnited States
                                                    8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                    239.255.255.250
                                                    unknownReserved
                                                    unknownunknownfalse
                                                    13.224.189.90
                                                    unknownUnited States
                                                    16509AMAZON-02USfalse
                                                    152.199.21.175
                                                    sni1gl.wpc.omegacdn.netUnited States
                                                    15133EDGECASTUSfalse
                                                    184.28.90.27
                                                    unknownUnited States
                                                    16625AKAMAI-ASUSfalse
                                                    76.223.1.166
                                                    gignacarchitects.sf-api.comUnited States
                                                    16509AMAZON-02USfalse
                                                    34.120.195.249
                                                    o49063.ingest.sentry.ioUnited States
                                                    15169GOOGLEUSfalse
                                                    IP
                                                    192.168.2.16
                                                    192.168.2.6
                                                    Joe Sandbox version:41.0.0 Charoite
                                                    Analysis ID:1544659
                                                    Start date and time:2024-10-29 16:08:04 +01:00
                                                    Joe Sandbox product:CloudBasic
                                                    Overall analysis duration:
                                                    Hypervisor based Inspection enabled:false
                                                    Report type:full
                                                    Cookbook file name:defaultwindowsinteractivecookbook.jbs
                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                    Number of analysed new started processes analysed:17
                                                    Number of new started drivers analysed:0
                                                    Number of existing processes analysed:0
                                                    Number of existing drivers analysed:0
                                                    Number of injected processes analysed:0
                                                    Technologies:
                                                    • EGA enabled
                                                    Analysis Mode:stream
                                                    Analysis stop reason:Timeout
                                                    Sample name:RE Leander - Lighting and Control Devices Submittal.msg
                                                    Detection:SUS
                                                    Classification:sus23.phis.winMSG@26/85@56/237
                                                    Cookbook Comments:
                                                    • Found application associated with file extension: .msg
                                                    • Exclude process from analysis (whitelisted): dllhost.exe, SgrmBroker.exe, svchost.exe
                                                    • Excluded IPs from analysis (whitelisted): 184.28.90.27, 52.109.89.18, 52.113.194.132, 52.109.68.129, 2.19.126.160, 2.19.126.151, 52.111.243.41, 52.111.243.40, 52.111.243.42, 52.111.243.43, 20.42.65.88
                                                    • Excluded domains from analysis (whitelisted): omex.cdn.office.net, slscr.update.microsoft.com, weu-azsc-config.officeapps.live.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, eur.roaming1.live.com.akadns.net, ecs-office.s-0005.s-msedge.net, roaming.officeapps.live.com, login.live.com, e16604.g.akamaiedge.net, frc-azsc-000.roaming.officeapps.live.com, officeclient.microsoft.com, prod.fs.microsoft.com.akadns.net, a1864.dscd.akamai.net, ecs.office.com, self-events-data.trafficmanager.net, fs.microsoft.com, prod.configsvc1.live.com.akadns.net, self.events.data.microsoft.com, osiprod-frc-buff-azsc-000.francecentral.cloudapp.azure.com, onedscolprdeus08.eastus.cloudapp.azure.com, prod.roaming1.live.com.akadns.net, s-0005-office.config.skype.com, fe3cr.delivery.mp.microsoft.com, prod1.naturallanguageeditorservice.osi.office.net.akadns.net, nleditor.osi.office.net, prod-eu-resolver.naturallanguageeditorservice.osi.office.net.akadns.net, s-0005.s-msedge.net, con
                                                    • Not all processes where analyzed, report is missing behavior information
                                                    • Report size getting too big, too many NtQueryAttributesFile calls found.
                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                    • VT rate limit hit for: RE Leander - Lighting and Control Devices Submittal.msg
                                                    InputOutput
                                                    URL: Model: claude-3-5-sonnet-latest
                                                    {
                                                        "explanation": [
                                                            "This appears to be a legitimate business email thread between architecture/engineering firms discussing document sharing",
                                                            "The email addresses and domains match legitimate companies (MS2 Consulting Engineers and Gignac Architects)",
                                                            "The conversation flow is natural with appropriate business context about sharing lighting submittal documents"
                                                        ],
                                                        "phishing": false,
                                                        "confidence": 9
                                                    }
                                                    {
                                                        "date": "Mon, 28 Oct 2024 14:23:48 +0100", 
                                                        "subject": "RE: Leander - Lighting and Control Devices Submittal", 
                                                        "communications": [
                                                            "Thank you  I got it\n\nGidget R. Rosemond\nTechnical Secretary\n\nMS2 Consulting Engineers\n8200 W Interstate 10, Suite 312\nSan Antonio, TX 78230\nOffice: 210-736-4265\n[cid:image001.png@01DB2912.B5B1A530]\nwww.MS2-inc.com<https://link.edgepilot.com/s/0f9ef154/NJX5AYObG0_RqDaxWmgWHw?u=http://www.ms2-inc.com/>\n\n\n\n", 
                                                            "From: Rohini Dhamija <rdhamija@gignac-associates.com>\nSent: Monday, October 28, 2024 8:12 AM\nTo: Gidget Rosemond <grosemond@ms2-inc.com>\nSubject: Re: Leander - Lighting and Control Devices Submittal\n\nHere you go Gidget\n\nSharefile link\n\nhttps://gignacarchitects.sharefile.com/public/share/web-sd99ebbc5c56741ceb96a1e5404c17f68<https://link.edgepilot.com/s/12f296c1/mkNEkUsCaUyhM6_YKKlYig?u=https://gignacarchitects.sharefile.com/public/share/web-sd99ebbc5c56741ceb96a1e5404c17f68>\n\nI sent you the sharefile notification as well.\n\nLet me know.\n\n\nR O H I N I  D H A M I J A\n3 6 1 . 8 8 4 . 2 6 6 1   |   r d h a m i j a @ g i g n a c - a s s o c i a t e s . c o m\n[cid:image002.png@01DB2912.B5B1A530]\nG I G N A C  A R C H I T E C T S\nC O R P U S   C H R I S T I  |  M C A L L E N  |  H A R L I N G E N  |  D A L L A S\nwww.GIGNACARCHITECTS.com<https://link.edgepilot.com/s/ade9b597/HQxofOzvWEyNyAE96HbHug?u=http://www.gignacarchitects.com/>\n\n\n\n________________________________\n", 
                                                            "From: Gidget Rosemond <grosemond@ms2-inc.com<mailto:grosemond@ms2-inc.com>>\nSent: Monday, October 28, 2024 8:06 AM\nTo: Rohini Dhamija <rdhamija@gignac-associates.com<mailto:rdhamija@gignac-associates.com>>\nSubject: RE: Leander - Lighting and Control Devices Submittal\n\n\nThis is what I am getting:\n\n\n\nThat didn't work\n\nWe're sorry, but grosemond@ms2-inc.com<mailto:grosemond@ms2-inc.com> can't be found in the aro365150672-my.sharepoint.com directory. Please try again later, while we try to automatically fix this for you.\n\nHere are a few ideas:\n\n[cid:image003.gif@01DB2912.B5B1A530]\n\nClick here to sign in with a different account to this site.\nThis will sign you out of all other Office 365 services that you're signed into at this time.\n\n[cid:image003.gif@01DB2912.B5B1A530]\n\nIf you're using this account on another site and don't want to sign out, start your browser in Private Browsing mode for this site (show me how)<https://link.edgepilot.com/s/2b2e1abb/KtvhvhqXjkKjRyYXtt4Wpg?u=https://go.microsoft.com/fwlink/?LinkId=282736>.\n\n\n\n\n\nIs there anyway you can just send me the PDF.\n\n\n\nThank you\n\n\n\nGidget R. Rosemond\n\nTechnical Secretary\n\n\n\nMS2 Consulting Engineers\n\n8200 W Interstate 10, Suite 312\n\nSan Antonio, TX 78230\n\nOffice: 210-736-4265\n\n[cid:image001.png@01DB2912.B5B1A530]\n\n<https://link.edgepilot.com/s/b771c850/2sRH6keKCk6dCgG_rak-Xg?u=http://www.ms2-inc.com/>www.MS2-inc.com<https://link.edgepilot.com/s/0f9ef154/NJX5AYObG0_RqDaxWmgWHw?u=http://www.ms2-inc.com/>\n\n\n\n\n\n\n\n", 
                                                            "From: Rohini Dhamija <rdhamija@gignac-associates.com<mailto:rdhamija@gignac-associates.com>>\nSent: Monday, October 28, 2024 8:02 AM\nTo: Gidget Rosemond <grosemond@ms2-inc.com<mailto:grosemond@ms2-inc.com>>; Apolonio Esquivel <aesquivel@gignac-associates.com<mailto:aesquivel@gignac-associates.com>>\nSubject: Re: Leander - Lighting and Control Devices Submittal\n\n\n\nGood morning Gidget,\n\n\n\nPlease see link below\n\n\n\n[https://res.public.onecdn.static.microsoft/assets/mail/file-icon/png/pdf_16x16.png]SBM-260923-01A Lighting and Control Devices PD_compressed.pdf<https://link.edgepilot.com/s/86987e6b/eoCDpZj3VUe0XJud0aJ5dA?u=https://aro365150672-my.sharepoint.com/:b:/g/personal/rdhamija_gignac-associates_com/EdWD_te5iP9It7yMckMinMYB8bGfSGNWIoW2BXu2VqVfaQ>\n\n\n\n\n\nLet me know if you have trouble with this link. I will send a sharefile  instead of this one drive.\n\n\n\nHave an awesome week.\n\n\n\nR O H I N I  D H A M I J A\n\n3 6 1 . 8 8 4 . 2 6 6 1   |   r d h a m i j a @ g i g n a c - a s s o c i a t e s . c o m\n\n[cid:image002.png@01DB2912.B5B1A530]\n\nG I G N A C  A R C H I T E C T S\n\nC O R P U S   C H R I S T I  |  M C A L L E N  |  H A R L I N G E N  |  D A L L A S\n\n<https://link.edgepilot.com/s/ce74dfd0/yerjqLmRl0WeANjx62uNAA?u=http://www.gignacarchitects.com/>www.GIGNACARCHITECTS.com<https://link.edgepilot.com/s/ade9b597/HQxofOzvWEyNyAE96HbHug?u=http://www.gignacarchitects.com/>\n\n\n\n________________________________\n\n", 
                                                            "From: Gidget Rosemond <grosemond@ms2-inc.com<mailto:grosemond@ms2-inc.com>>\nSent: Monday, October 28, 2024 7:31 AM\nTo: Rohini Dhamija <rdhamija@gignac-associates.com<mailto:rdhamija@gignac-associates.com>>; Apolonio Esquivel <aesquivel@gignac-associates.com<mailto:aesquivel@gignac-associates.com>>\nSubject: RE: Leander - Lighting and Control Devices Submittal\n\n\n\nCan you please resend the link.  It is giving me an error message.\n\n\n\nThank you\n\n\n\nGidget R. Rosemond\n\nTechnical Secretary\n\n\n\nMS2 Consulting Engineers\n\n8200 W Interstate 10, Suite 312\n\nSan Antonio, TX 78230\n\nOffice: 210-736-4265\n\n[cid:image001.png@01DB2912.B5B1A530]\n\n<https://link.edgepilot.com/s/b771c850/2sRH6keKCk6dCgG_rak-Xg?u=http://www.ms2-inc.com/>www.MS2-inc.com<https://link.edgepilot.com/s/0f9ef154/NJX5AYObG0_RqDaxWmgWHw?u=http://www.ms2-inc.com/>\n\n\n\n\n\n\n\n", 
                                                            "From: Rohini Dhamija <rdhamija@gignac-associates.com<mailto:rdhamija@gignac-associates.com>>\nSent: Friday, October 25, 2024 3:36 PM\nTo: Victor Olivares <VOlivares@ms2-inc.com<mailto:VOlivares@ms2-inc.com>>; Gidget Rosemond <grosemond@ms2-inc.com<mailto:grosemond@ms2-inc.com>>\nCc: Apolonio Esquivel <aesquivel@gignac-associates.com<mailto:aesquivel@gignac-associates.com>>\nSubject: Leander - Lighting and Control Devices Submittal\n\n\n\nGood afternoon Victor, Gidget\n\n\n\nPlease find link below to the Lighting submittal for leander.\n\n\n\n[https://res.public.onecdn.static.microsoft/assets/mail/file-icon/png/pdf_16x16.png]SBM-260923-01A Lighting and Control Devices PD.pdf<https://link.edgepilot.com/s/c6c5d4e5/oz5uFPEm10aK_RBwkmVvzQ?u=https://aro365150672-my.sharepoint.com/:b:/g/personal/rdhamija_gignac-associates_com/EVNHaSacx5JNmFtGs0SXCbIBgI50GJjSp_v8M3rndVz0Qg>\n\n\n\nAlso, see attached email from the subcontractor with respect to the VE\n\n\n\nThank you\n\n\n\nR O H I N I  D H A M I J A\n\n3 6 1 . 8 8 4 . 2 6 6 1   |   r d h a m i j a @ g i g n a c - a s s o c i a t e s . c o m\n\n[cid:image002.png@01DB2912.B5B1A530]\n\nG I G N A C  A R C H I T E C T S\n\nC O R P U S   C H R I S T I  |  M C A L L E N  |  H A R L I N G E N  |  D A L L A S\n\n<https://link.edgepilot.com/s/ce74dfd0/yerjqLmRl0WeANjx62uNAA?u=http://www.gignacarchitects.com/>www.GIGNACARCHITECTS.com<https://link.edgepilot.com/s/ade9b597/HQxofOzvWEyNyAE96HbHug?u=http://www.gignacarchitects.com/>\n\n\n\n\nLinks contained in this email have been replaced. If you click on a link in the email above, the link will be analyzed for known threats. If a known threat is found, you will not be able to proceed to the destination. If suspicious content is detected, you will see a warning.\n\n\nLinks contained in this email have been replaced. If you click on a link in the email above, the link will be analyzed for known threats. If a known threat is found, you will not be able to proceed to the destination. If suspicious content is detected, you will see a warning.\n\n\nLinks contained in this email have been replaced. If you click on a link in the email above, the link will be analyzed for known threats. If a known threat is found, you will not be able to proceed to the destination. If suspicious content is detected, you will see a warning.\n"
                                                        ], 
                                                        "from": "Gidget Rosemond <grosemond@ms2-inc.com>", 
                                                        "to": "Rohini Dhamija <rdhamija@gignac-associates.com>", 
                                                        "attachements": [
                                                            "image001.png", 
                                                            "image002.png", 
                                                            "image003.gif"
                                                        ]
                                                    }
                                                    URL: Email Model: claude-3-haiku-20240307
                                                    ```json
                                                    {
                                                      "contains_trigger_text": true,
                                                      "trigger_text": "Click here to view document",
                                                      "prominent_button_name": "Sharefile link",
                                                      "text_input_field_labels": "unknown",
                                                      "pdf_icon_visible": false,
                                                      "has_visible_captcha": false,
                                                      "has_urgent_text": false,
                                                      "has_visible_qrcode": false
                                                    }
                                                    URL: Email Model: claude-3-haiku-20240307
                                                    ```json
                                                    {
                                                      "brands": [
                                                        "MS2 CONSULTING ENGINEERS",
                                                        "GIGNAC ARCHITECTS"
                                                      ]
                                                    }
                                                    URL: https://link.edgepilot.com/s/c6c5d4e5/oz5uFPEm10aK_RBwkmVvzQ?u=https://aro365150672-my.sharepoint.com/:b:/g/personal/rdhamija_gignac-associates_com/EVNHaSacx5JNmFtGs0SXCbIBgI50GJjSp_v8M3rndVz0Qg Model: claude-3-haiku-20240307
                                                    ```json
                                                    {
                                                      "contains_trigger_text": true,
                                                      "trigger_text": "Select this button if you are not automatically redirected.",
                                                      "prominent_button_name": "Select this button if you are not automatically redirected.",
                                                      "text_input_field_labels": "unknown",
                                                      "pdf_icon_visible": false,
                                                      "has_visible_captcha": false,
                                                      "has_urgent_text": false,
                                                      "has_visible_qrcode": false
                                                    }
                                                    URL: Model: claude-3-5-sonnet-latest
                                                    {
                                                        "typosquatting": false,
                                                        "unusual_query_string": true,
                                                        "suspicious_tld": false,
                                                        "ip_in_url": false,
                                                        "long_subdomain": true,
                                                        "malicious_keywords": false,
                                                        "encoded_characters": true,
                                                        "redirection": true,
                                                        "contains_email_address": false,
                                                        "known_domain": true,
                                                        "brand_spoofing_attempt": false,
                                                        "third_party_hosting": true
                                                    }
                                                    URL: URL: https://link.edgepilot.com/s/c6c5d4e5/oz5uFPEm10aK_RBwkmVvzQ?u=https://aro365150672-my.sharepoint.com/:b:/g/personal/rdhamija_gignac-associates_com/EVNHaSacx5JNmFtGs0SXCbIBgI50GJjSp_v8M3rndVz0Qg
                                                    URL: https://link.edgepilot.com/s/c6c5d4e5/oz5uFPEm10aK_RBwkmVvzQ?u=https://aro365150672-my.sharepoint.com/:b:/g/personal/rdhamija_gignac-associates_com/EVNHaSacx5JNmFtGs0SXCbIBgI50GJjSp_v8M3rndVz0Qg Model: claude-3-haiku-20240307
                                                    ```json
                                                    {
                                                      "brands": []
                                                    }
                                                    URL: Model: claude-3-5-sonnet-latest
                                                    {
                                                        "typosquatting": false,
                                                        "unusual_query_string": false,
                                                        "suspicious_tld": false,
                                                        "ip_in_url": false,
                                                        "long_subdomain": false,
                                                        "malicious_keywords": false,
                                                        "encoded_characters": true,
                                                        "redirection": true,
                                                        "contains_email_address": false,
                                                        "known_domain": true,
                                                        "brand_spoofing_attempt": false,
                                                        "third_party_hosting": false
                                                    }
                                                    URL: URL: https://login.microsoftonline.com/8e0de89c-298f-4cee-a7bd-0c3a67bd030b/oauth2/authorize?client%5Fid=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&response%5Fmode=form%5Fpost&response%5Ftype=code%20id%5Ftoken&resource=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&scope=openid&nonce=F2323C8FF525C2A7526302954E043B41CE166CC903330A89%2D7371B92DB53EFB3713F428DD35FD600BD9A89A2E528BCF9D9E03AE85AFCD407D&redirect%5Furi=https%3A%2F%2Faro365150672%2Dmy%2Esharepoint%2Ecom%2F%5Fforms%2Fdefault%2Easpx&state=OD0w&claims=%7B%22id%5Ftoken%22%3A%7B%22xms%5Fcc%22%3A%7B%22values%22%3A%5B%22CP1%22%5D%7D%7D%7D&wsucxt=1&cobrandid=11bd8083%2D87e0%2D41b5%2Dbb78%2D0bc43c8a8e8a&client%2Drequest%2Did=03b05ea1%2Dc09d%2D6000%2Dbd7a%2D8ac0579730a2
                                                    URL: https://login.microsoftonline.com/8e0de89c-298f-4cee-a7bd-0c3a67bd030b/oauth2/authorize?client%5Fid=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&response%5Fmode=form%5Fpost&response%5Ftype=code%20id%5Ftoken&resource=00000003%2D0000%2D0ff1%2Dce00%2D0000000 Model: claude-3-haiku-20240307
                                                    ```json
                                                    {
                                                      "contains_trigger_text": true,
                                                      "trigger_text": "Sign in",
                                                      "prominent_button_name": "Next",
                                                      "text_input_field_labels": [
                                                        "Email, phone, or Skype"
                                                      ],
                                                      "pdf_icon_visible": false,
                                                      "has_visible_captcha": false,
                                                      "has_urgent_text": false,
                                                      "has_visible_qrcode": false
                                                    }
                                                    URL: Model: claude-3-5-sonnet-latest
                                                    {
                                                        "typosquatting": false,
                                                        "unusual_query_string": false,
                                                        "suspicious_tld": false,
                                                        "ip_in_url": false,
                                                        "long_subdomain": false,
                                                        "malicious_keywords": false,
                                                        "encoded_characters": true,
                                                        "redirection": true,
                                                        "contains_email_address": false,
                                                        "known_domain": true,
                                                        "brand_spoofing_attempt": false,
                                                        "third_party_hosting": false
                                                    }
                                                    URL: URL: https://login.microsoftonline.com/8e0de89c-298f-4cee-a7bd-0c3a67bd030b/oauth2/authorize?client%5Fid=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&response%5Fmode=form%5Fpost&response%5Ftype=code%20id%5Ftoken&resource=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&scope=openid&nonce=F2323C8FF525C2A7526302954E043B41CE166CC903330A89%2D7371B92DB53EFB3713F428DD35FD600BD9A89A2E528BCF9D9E03AE85AFCD407D&redirect%5Furi=https%3A%2F%2Faro365150672%2Dmy%2Esharepoint%2Ecom%2F%5Fforms%2Fdefault%2Easpx&state=OD0w&claims=%7B%22id%5Ftoken%22%3A%7B%22xms%5Fcc%22%3A%7B%22values%22%3A%5B%22CP1%22%5D%7D%7D%7D&wsucxt=1&cobrandid=11bd8083%2D87e0%2D41b5%2Dbb78%2D0bc43c8a8e8a&client%2Drequest%2Did=03b05ea1%2Dc09d%2D6000%2Dbd7a%2D8ac0579730a2&sso_reload=true
                                                    URL: https://login.microsoftonline.com/8e0de89c-298f-4cee-a7bd-0c3a67bd030b/oauth2/authorize?client%5Fid=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&response%5Fmode=form%5Fpost&response%5Ftype=code%20id%5Ftoken&resource=00000003%2D0000%2D0ff1%2Dce00%2D0000000 Model: claude-3-haiku-20240307
                                                    ```json
                                                    {
                                                      "brands": [
                                                        "Microsoft"
                                                      ]
                                                    }
                                                    URL: Model: claude-3-5-sonnet-latest
                                                    {
                                                        "typosquatting": false,
                                                        "unusual_query_string": true,
                                                        "suspicious_tld": false,
                                                        "ip_in_url": false,
                                                        "long_subdomain": false,
                                                        "malicious_keywords": false,
                                                        "encoded_characters": true,
                                                        "redirection": true,
                                                        "contains_email_address": false,
                                                        "known_domain": false,
                                                        "brand_spoofing_attempt": false,
                                                        "third_party_hosting": true
                                                    }
                                                    URL: URL: https://link.edgepilot.com/s/12f296c1/mkNEkUsCaUyhM6_YKKlYig?u=https://gignacarchitects.sharefile.com/public/share/web-sd99ebbc5c56741ceb96a1e5404c17f68
                                                    URL: Model: claude-3-5-sonnet-latest
                                                    {
                                                        "typosquatting": false,
                                                        "unusual_query_string": false,
                                                        "suspicious_tld": false,
                                                        "ip_in_url": false,
                                                        "long_subdomain": false,
                                                        "malicious_keywords": false,
                                                        "encoded_characters": false,
                                                        "redirection": false,
                                                        "contains_email_address": false,
                                                        "known_domain": true,
                                                        "brand_spoofing_attempt": false,
                                                        "third_party_hosting": true
                                                    }
                                                    URL: URL: https://gignacarchitects.sharefile.com/public/share/web-sd99ebbc5c56741ceb96a1e5404c17f68
                                                    URL: Model: claude-3-5-sonnet-latest
                                                    {
                                                        "typosquatting": false,
                                                        "unusual_query_string": false,
                                                        "suspicious_tld": false,
                                                        "ip_in_url": false,
                                                        "long_subdomain": false,
                                                        "malicious_keywords": false,
                                                        "encoded_characters": false,
                                                        "redirection": false,
                                                        "contains_email_address": false,
                                                        "known_domain": false,
                                                        "brand_spoofing_attempt": false,
                                                        "third_party_hosting": false
                                                    }
                                                    URL: URL: https://edgepilot.com
                                                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                    File Type:XML 1.0 document, ASCII text, with very long lines (1869), with no line terminators
                                                    Category:dropped
                                                    Size (bytes):1869
                                                    Entropy (8bit):5.086835744352688
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:E137E4BCA98E7E28D53FADCDE2DAE5BA
                                                    SHA1:6E4FDECA55164ED2CBE1CC1E79C35D9A153C4A63
                                                    SHA-256:A6EE4D9DC27535C991A2267428C2232609FDA8A5A6F697E4FBAE55C68896CAFA
                                                    SHA-512:7E176B0A916C4EA4D4C06C994674120121F8D0CB4BCAD3F4A712BD453668CEF942FC3E0F8ACBCF82ACC9093C8AC1994926C3198E61A88304ECC4312ACD8596D3
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?><root><version>1</version><Count>12</Count><Resource><Id>Aptos_26215680</Id><LAT>2024-10-29T15:08:44Z</LAT><key>29939506207.ttf</key><folder>Aptos</folder><type>4</type></Resource><Resource><Id>Aptos_45876480</Id><LAT>2023-10-06T09:25:29Z</LAT><key>27160079615.ttf</key><folder>Aptos</folder><type>4</type></Resource><Resource><Id>Aptos Narrow_26215424</Id><LAT>2023-10-06T09:25:29Z</LAT><key>31558910439.ttf</key><folder>Aptos Narrow</folder><type>4</type></Resource><Resource><Id>Aptos Display_26215680</Id><LAT>2024-10-29T15:08:44Z</LAT><key>23001069669.ttf</key><folder>Aptos Display</folder><type>4</type></Resource><Resource><Id>Aptos Narrow_45876224</Id><LAT>2023-10-06T09:25:29Z</LAT><key>24153076628.ttf</key><folder>Aptos Narrow</folder><type>4</type></Resource><Resource><Id>Aptos Display_45876480</Id><LAT>2023-10-06T09:25:29Z</LAT><key>30264859306.ttf</key><folder>Aptos Display</folder><type>4</type></Resource><Resource><Id>Aptos_
                                                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                    File Type:JSON data
                                                    Category:dropped
                                                    Size (bytes):521377
                                                    Entropy (8bit):4.9084889265453135
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:C37972CBD8748E2CA6DA205839B16444
                                                    SHA1:9834B46ACF560146DD7EE9086DB6019FBAC13B4E
                                                    SHA-256:D4CFBB0E8B9D3E36ECE921B9B51BD37EF1D3195A9CFA1C4586AEA200EB3434A7
                                                    SHA-512:02B4D134F84122B6EE9A304D79745A003E71803C354FB01BAF986BD15E3BA57BA5EF167CC444ED67B9BA5964FF5922C50E2E92A8A09862059852ECD9CEF1A900
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:{"MajorVersion":4,"MinorVersion":40,"Expiration":14,"Fonts":[{"a":[4294966911],"f":"Abadi","fam":[],"sf":[{"c":[1,0],"dn":"Abadi","fs":32696,"ful":[{"lcp":983041,"lsc":"Latn","ltx":"Abadi"}],"gn":"Abadi","id":"23643452060","p":[2,11,6,4,2,1,4,2,2,4],"sub":[],"t":"ttf","u":[2147483651,0,0,0],"v":197263,"w":26215680},{"c":[1,0],"dn":"Abadi Extra Light","fs":22180,"ful":[{"lcp":983042,"lsc":"Latn","ltx":"Abadi Extra Light"}],"gn":"Abadi Extra Light","id":"17656736728","p":[2,11,2,4,2,1,4,2,2,4],"sub":[],"t":"ttf","u":[2147483651,0,0,0],"v":197263,"w":13108480}]},{"a":[4294966911],"f":"ADLaM Display","fam":[],"sf":[{"c":[536870913,0],"dn":"ADLaM Display Regular","fs":140072,"ful":[{"lcp":983040,"lsc":"Latn","ltx":"ADLaM Display"}],"gn":"ADLaM Display","id":"31965479471","p":[2,1,0,0,0,0,0,0,0,0],"sub":[],"t":"ttf","u":[2147491951,1107296330,0,0],"v":131072,"w":26215680}]},{"a":[4294966911],"f":"Agency FB","fam":[],"sf":[{"c":[536870913,0],"dn":"Agency FB Bold","fs":54372,"ful":[{"lcp":9830
                                                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                    File Type:TrueType Font data, 10 tables, 1st "OS/2", 7 names, Microsoft, language 0x409, \251 2018 Microsoft Corporation. All Rights Reserved.msofp_4_40RegularVersion 4.40;O365
                                                    Category:dropped
                                                    Size (bytes):773040
                                                    Entropy (8bit):6.55939673749297
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:4296A064B917926682E7EED650D4A745
                                                    SHA1:3953A6AA9100F652A6CA533C2E05895E52343718
                                                    SHA-256:E04E41C74D6C78213BA1588BACEE64B42C0EDECE85224C474A714F39960D8083
                                                    SHA-512:A25388DDCE58D9F06716C0F0BDF2AEFA7F68EBCA7171077533AF4A9BE99A08E3DCD8DFE1A278B7AA5DE65DA9F32501B4B0B0ECAB51F9AF0F12A3A8A75363FF2C
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:........... OS/29....(...`cmap.s.,.......pglyf..&....|....head2..........6hheaE.@v.......$hmtx...........@loca.U.....8...Dmaxp........... name.P+........post...<...... .........b~1_.<...........<......r......Aa...................Q....Aa....Aa.........................~...................................................3..............................MS .@.......(...Q................. ...........d...........0...J.......8.......>..........+a..#...,................................................/...K.......z...............N......*...!...-...+........z.......h..%^..3...&j..+...+%..'R..+..."....................k......$A...,.......g...&...=.......X..&........*......&....B..(B...............#.......j...............+...P...5...@...)..........#...)Q...............*...{.. ....?..'...#....N...7......<...;>.............. ]...........5......#....s.......$.......$.......^..................+...>....H.......%...7.......6.......O...V...........K......"........c...N......!...............$...&...*p..
                                                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                    File Type:ASCII text, with very long lines (65536), with no line terminators
                                                    Category:dropped
                                                    Size (bytes):322260
                                                    Entropy (8bit):4.000299760592446
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:CC90D669144261B198DEAD45AA266572
                                                    SHA1:EF164048A8BC8BD3A015CF63E78BDAC720071305
                                                    SHA-256:89C701EEFF939A44F28921FD85365ECD87041935DCD0FE0BAF04957DA12C9899
                                                    SHA-512:16F8A8A6DCBAEAEFB88C7CFF910BCCC71B76A723CF808B810F500E28E543112C2FAE2491D4D209569BD810490EDFF564A2B084709B02963BCAF6FDF1AEEC59AC
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:51253fe60063c31af0d295afb42228b0:v2:2:1:1590:2:8479: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
                                                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                    File Type:ASCII text, with no line terminators
                                                    Category:modified
                                                    Size (bytes):10
                                                    Entropy (8bit):2.721928094887362
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:7B5AD13733ED84A345CAB492D98C19A7
                                                    SHA1:53AD14F2F8BE7B64E620F7F4621C2CACEF7B058F
                                                    SHA-256:53D361CFECC59A06ED622B10062FFC7C2B5E5947D2A4A29EDC3389611C640EEA
                                                    SHA-512:A38A98A4759F672670F3F4F464D485E76BF597B621DB8FAA9F7707B6D583DB2C8A27834C6F18A354F4217A1C7F49552319A0EC45EA8742EF4F12CFE31552BB48
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:1730214530
                                                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):180288
                                                    Entropy (8bit):5.291008329384788
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:BD870E4C5F3A75EE3F83272310153761
                                                    SHA1:B2F3D2570C6BC2C13A51DAA6B037FF5EA7C19455
                                                    SHA-256:56E73864EB7391CA529CA640F9C7C30A468015249D7FE29F7EE6D88144F09EA3
                                                    SHA-512:04C4E2EDBBD58CBF7DBB9F96C258FB29D501062C29C2F1B56818A718C7511EDDAACAB66041FCEE4EBF722243825E3C42361781983080870BD912C57DCB1F3D74
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:<?xml version="1.0" encoding="utf-8"?>..<o:OfficeConfig xmlns:o="urn:schemas-microsoft-com:office:office">.. <o:services o:GenerationTime="2024-10-29T15:08:42">.. Build: 16.0.18222.40125-->.. <o:default>.. <o:ticket o:headerName="Authorization" o:headerValue="{}" />.. </o:default>.. <o:service o:name="Research">.. <o:url>https://word-edit.officeapps.live.com/we/rrdiscovery.ashx</o:url>.. </o:service>.. <o:service o:name="ORedir">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ORedirSSL">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ClViewClientHelpId" o:authentication="1">.. <o:url>https://[MAX.BaseHost]/client/results</o:url>.. <o:ticket o:policy="MBI_SSL_SHORT" o:idprovider="1" o:target="[MAX.AuthHost]" o:headerValue="Passport1.4 from-PP='{}&amp;p='" />.. <o:ticket o:idprovider="3" o:headerValue="Bearer {}" o:resourceId="[
                                                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                    File Type:SQLite 3.x database, last written using SQLite version 3023002, writer version 2, read version 2, file counter 2, database pages 1, cookie 0, schema 0, largest root page 1, unknown 0 encoding, version-valid-for 2
                                                    Category:dropped
                                                    Size (bytes):4096
                                                    Entropy (8bit):0.09216609452072291
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:F138A66469C10D5761C6CBB36F2163C3
                                                    SHA1:EEA136206474280549586923B7A4A3C6D5DB1E25
                                                    SHA-256:C712D6C7A60F170A0C6C5EC768D962C58B1F59A2D417E98C7C528A037C427AB6
                                                    SHA-512:9D25F943B6137DD2981EE75D57BAF3A9E0EE27EEA2DF19591D580F02EC8520D837B8E419A8B1EB7197614A3C6D8793C56EBC848C38295ADA23C31273DAA302D9
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:SQLite format 3......@ .......................................................................... .....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                    File Type:SQLite Rollback Journal
                                                    Category:dropped
                                                    Size (bytes):4616
                                                    Entropy (8bit):0.1370048545379396
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:5AF755BFA0410BB06949BA7953F56E04
                                                    SHA1:AE0DCC26EAD6181C0CB6693D76C61CB9F5E6AF8B
                                                    SHA-256:429669638A7F57980107949BB2F924F1F1A7D0EB32AFF2BFD83E2B0A41A12F19
                                                    SHA-512:8FEBC0A9EEDC7050EC5961CD9E324F15D8680B029289D253C00556BC75C01C945A94272BB092D9E3BCE4D2A1B5D33D5103602BF8C9E6F1ED9320E864B960EE66
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:.... .c......9......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................SQLite format 3......@ .......................................................................... .................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):32768
                                                    Entropy (8bit):0.04458434447999482
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:DA463BC13029D09CFE444BDD0C8E21B9
                                                    SHA1:14FAB63D55CC881ABD0E3D267B60B2A39D61E60B
                                                    SHA-256:25A31E89B5423E1E83C1F71062EAB3926A129D12390B9A953A17BF0448BE0D52
                                                    SHA-512:98EE4287F83E898320FA820189430529304A8BF71BE1A3F6F85CC15C819AB67A3199EB27A98C7AE1715129459DD56C6A0D7E815E1754235C7166A3EFF8E4DAF5
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:..-.......................X.7.......2.$..#.<9+....-.......................X.7.......2.$..#.<9+..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                    File Type:SQLite Write-Ahead Log, version 3007000
                                                    Category:dropped
                                                    Size (bytes):45352
                                                    Entropy (8bit):0.3944493166365068
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:DCBABDC5E1DBFE787111C01A93C664DD
                                                    SHA1:5881E50C0DAE4616BF2553616FD89408027CBB7A
                                                    SHA-256:44B31A67DE843365E70DDCB9A73D8C2682FBEEA7C35EDD68171CB791FE0D2ED9
                                                    SHA-512:30319E51C88E8CBC4C7F4A2CF0E1BC7B23CEE755AD34EE2BE43AD01562D12DF496256D9905944AF60D7F89E5B26919A836B67AC3D00CFF05AC3CCE4823EEE3DE
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:7....-..............2.$.b.....t............2.$.U...7.EjSQLite format 3......@ .......................................................................... .............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                    File Type:PNG image data, 1480 x 395, 8-bit/color RGB, non-interlaced
                                                    Category:dropped
                                                    Size (bytes):26359
                                                    Entropy (8bit):7.876325808649776
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:2E0658B591424D8C6A3288461AC6AB72
                                                    SHA1:BAA1925A2731AF1D5434A4EE3B2D66B903FACCE5
                                                    SHA-256:C89DE6C1D5F3505DE18B4E979B07DC42E9A837744CA1DB759E55D05D6A2D20F7
                                                    SHA-512:4506B21E213BB0E51477E8A3F22FEA8A38B2CBEC1CB95F0081DC59FB40DBB054268E8DD7F16A49532B5E74837472B67BEE6F24AD9EC9775A9489B685A320E52E
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:.PNG........IHDR.............|.......pHYs...#...#.x.?v.. .IDATx...Ol..~...O..~........p..(G..n6u9.....n.,..0.&W......Er.3.v[k..q.S...@.*..E5...........X.B..X..g1..+Y...!.../.E.K.NdQ..g..{^....................@R........."X.......D....... .`......@......... ........A.+........V................"X.......D....... .`......@......... ........A.+........V................"X.......D....... .`......@......... ........A.+........V................"X.......D....... .`......@......... ........A.+........V................"X.......D....... .`......@......... ........A.+........V................"X.......D....... .`......@......... ........A.+........V................"X.......D....... .`......@......... ........A.+........V................"X.......D....... .`......@......... ........A.+........V........".. I......A^9;.0....s..x.'.F].UU.>.......~....y.m.8..|.=z.}..=...j....*.2=yu......W..''./O.K./ .m..9.....;...tN.5.......i..i#...1...l..qcc.0...........|*}...2....'......J....V...q..
                                                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                    File Type:PNG image data, 406 x 220, 8-bit/color RGBA, non-interlaced
                                                    Category:dropped
                                                    Size (bytes):10305
                                                    Entropy (8bit):7.898508391032606
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:A00E69C9FB03071D3D174BCF822CC7E9
                                                    SHA1:8BD4E17B58C0C5182745E0CAD57C7620B1BA6FBC
                                                    SHA-256:88C14F538A175165FA7675CDD43159867A8DAA7F21AA3FE91C77D74B555EB4F1
                                                    SHA-512:E90B277E891145EB1CF7C1DEF6864F9CD006DAD0F8C50B8B6AE9416A71294A358690C9777254B670B7377181F322802F1F016417EEBBDA5495C6E0C72107CCF7
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:.PNG........IHDR.............SL.(....sRGB.........gAMA......a.....pHYs..!...!........'.IDATx^...,Gy./.a..Ib5 .t.,BB.gF..`.c,..I..C...l.......c0!...A`............a...B..A,2 .|?....W.U.=.....<...{..?.U..B.!..B.!..B.!..B.!..B.!..B.!..B.!..B.!..B.!..B.!..B.!..B.!..B.!..B.!..B.!..B.!..B.!..B.!..B.!..B.!..W.Z......x!.....-. |.|../.+`....;{.;...W......'.....-.Y.........."..B......r..G.~.>...6wv.<.|.%...\|....w...b.........qU>...../B..V...3. ..O....[<....bz..b...*....^.>...s.l.c..7.'..G.....?e.|.Z..d.WTut..U....cl.......O....3wOYG.w.9....0.X#........C..............w<.x..5N.!)..3 k.....l........./..g.../..I..k.k..=&)..c k..q2d..n......../..y...L.V.....b.P...C..J..k.l......3...:.u......_.X.t.....N.}........X.*.%.=.c..X....C......M(..{Z.}.C.nl..Z..o.. .#....{ [gU....a..^.:.1z..w].8,..5:...&...}3..u!..|...l.{..!04.L...v.;...u.....{..h......P.....9...'d...U..:.^.Y]..|.R&gL.c......=.8XXC..L(.OjR1..i..G.v../.(..Y..z.\:.g..T^............c(......:...A.}H.
                                                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                    File Type:GIF image data, version 89a, 16 x 16
                                                    Category:dropped
                                                    Size (bytes):1648
                                                    Entropy (8bit):7.1118899277200756
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:F31144BFE98229DD0363CEB2178F897E
                                                    SHA1:2588391F4778BA41D50EBDA1D3F201837DEE94E6
                                                    SHA-256:C6F2EC9E0316C2C8EFD02BFBF97D486C33B2EBE163E5BCD88212FC0959016E47
                                                    SHA-512:7BC29B9717AA6896800ADF0EC8E5C82E4812EE0158EFEBCE0C8AC41AA498B7CD3B20EBCB50230B2D2686918ADB11C773529E5696584752BB0DAAE1649EB1BD66
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:GIF89a.....\.e...x..z.(..3..).........u....%...y.8...........C..E.....5..V..K...............d......../...t.z...x._.....~.......R...s.....O..s..h.....X......y..t...F...u.......k..i....f..J..-..N........=..o..r......#....$....."..a..{....{........l.........................r.............................................................................................................!..XMP DataXMP<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.3-c011 66.145661, 2012/02/06-14:56:27 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CS6 (Windows)" xmpMM:InstanceID="xmp.iid:EDAB9A76455F11E2870CCEE9A7329D41" xmpMM:DocumentID="xmp.did:EDAB9A77455F11E2870CCEE9A7329D41"> <xmpMM:Deriv
                                                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):45276
                                                    Entropy (8bit):3.792985279818962
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:F3C0D00120C820A0EC662DD4DD4A5856
                                                    SHA1:08955A2BCAFA376411F53C3A7582195F07B62879
                                                    SHA-256:FA71C7A9DFFC1C40F109AAE76BA8DBD57477B44056C3F9D809760396D16EFD09
                                                    SHA-512:7036D4FF18BD9AD728BFDD0279067C35DC999BC7742B581D86A76EEE84E9E7FA21D238CCB8E588F50C4C2ACF895CC59E1308744FDB003C55A5F7373F83FE5748
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:....T.h.a.n.k. .y.o.u. .. .I. .g.o.t. .i.t.....G.i.d.g.e.t. .R... .R.o.s.e.m.o.n.d...T.e.c.h.n.i.c.a.l. .S.e.c.r.e.t.a.r.y.....M.S.2. .C.o.n.s.u.l.t.i.n.g. .E.n.g.i.n.e.e.r.s...8.2.0.0. .W. .I.n.t.e.r.s.t.a.t.e. .1.0.,. .S.u.i.t.e. .3.1.2...S.a.n. .A.n.t.o.n.i.o.,. .T.X. .7.8.2.3.0...O.f.f.i.c.e.:. .2.1.0.-.7.3.6.-.4.2.6.5...........................................................................................................................................................................................................0...V...~...................H...H...h...j...l...n...........&...(...F...H...................0...2.......................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                    File Type:ASCII text, with very long lines (860), with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):20971520
                                                    Entropy (8bit):0.015202463739323694
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:F7BF2DCDFFBC35FADA97465DAA0AEF62
                                                    SHA1:C9245E7A3B9AAE8DCF7138076930C5654BB18CEA
                                                    SHA-256:12635240193F31DCEBA5C7AA8114AA6FA9B96D1DFD2B649798BA7DE92CF2CC24
                                                    SHA-512:0FCC0FFECDE4142E32419EA5267D3A95CE4A707F6403312BF4C50251BCCE4B941F8A28E9E271ED946B9353EE5F8C80B61D730CFE6AA165F9D878B6C4C0A11EC8
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:Timestamp.Process.TID.Area.Category.EventID.Level.Message.Correlation..10/29/2024 15:08:40.908.OUTLOOK (0x1A4C).0x1A48.Microsoft Outlook.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.System.GracefulExit.GracefulAppExitDesktop","Flags":33777014402039809,"InternalSequenceNumber":17,"Time":"2024-10-29T15:08:40.908Z","Data.PreviousAppMajor":16,"Data.PreviousAppMinor":0,"Data.PreviousAppBuild":16827,"Data.PreviousAppRevision":20130,"Data.PreviousSessionId":"53BCAE02-2E8E-4032-A885-FB6A5ADE178C","Data.PreviousSessionInitTime":"2024-10-29T15:08:18.490Z","Data.PreviousSessionUninitTime":"2024-10-29T15:08:21.803Z","Data.SessionFlags":2147483652,"Data.InstallMethod":0,"Data.OfficeUILang":1033,"Data.PreviousBuild":"Unknown","Data.EcsETag":"\"\"","Data.ProcessorArchitecture":"x64"}...10/29/2024 15:08:40.924.OUTLOOK (0x1A4C).0x1A30.Microsoft Outlook.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.Telemetry.LoadXmlRules","Flags":33777014401990913,"InternalSequenceNumber":21
                                                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):20971520
                                                    Entropy (8bit):0.0
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:8F4E33F3DC3E414FF94E5FB6905CBA8C
                                                    SHA1:9674344C90C2F0646F0B78026E127C9B86E3AD77
                                                    SHA-256:CD52D81E25F372E6FA4DB2C0DFCEB59862C1969CAB17096DA352B34950C973CC
                                                    SHA-512:7FB91E868F3923BBD043725818EF3A5D8D08EBF1059A18AC0FE07040D32EEBA517DA11515E6A4AFAEB29BCC5E0F1543BA2C595B0FE8E6167DDC5E6793EDEF5BB
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                    File Type:data
                                                    Category:modified
                                                    Size (bytes):118784
                                                    Entropy (8bit):4.663455855095849
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:F0FE1682CCCA76FBF766B8095FE21697
                                                    SHA1:FA81FF33172847BA9074DF0FDEA73CF317A6F190
                                                    SHA-256:E4C0B00548D954B0B51589BF93B7F11D64DDF31E3830B7C6BD82A96EF57A78CF
                                                    SHA-512:F3362A6197D4B9603C5DC7144F289017435D186009005E90C4B5B5526F28CBF92B78302C2ECAD2AB6CE05E7EE1934A86E45B1D3187F59C21FA5DE48BCB1BF3C7
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:............................................................................`...H...L...T..p.*..................eJ..............Zb..2...................................,...@.t.z.r.e.s...d.l.l.,.-.1.1.2.......................................................@.t.z.r.e.s...d.l.l.,.-.1.1.1..............................................................i.Y..........T..p.*..........v.2._.O.U.T.L.O.O.K.:.1.a.4.c.:.f.8.5.6.b.7.b.8.2.2.5.0.4.e.1.6.a.2.e.6.e.a.2.f.1.0.7.1.f.3.9.5...C.:.\.U.s.e.r.s.\.c.a.l.i.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.O.u.t.l.o.o.k. .L.o.g.g.i.n.g.\.O.U.T.L.O.O.K._.1.6._.0._.1.6.8.2.7._.2.0.1.3.0.-.2.0.2.4.1.0.2.9.T.1.1.0.8.4.0.0.6.2.1.-.6.7.3.2...e.t.l.......P.P.H...L...-\.p.*..........................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):163840
                                                    Entropy (8bit):0.47266603846256516
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:F88DA65024A7716A99F6509D85CB0320
                                                    SHA1:90DCABFC2D8F13D00F7CA1847ACB382A43DCB4E4
                                                    SHA-256:BCC7F2495AE8A8A76FA7EBC6840C661CA83362CB263B60277A18971030CB03AF
                                                    SHA-512:E1360EBD222508D23D47B450993F858CC94C156073FB952C3831F21F18CC22FE7E7462CEC4E482A95A3B3D6917089003FD919E55EFDC2551E29E9D9A1A84B314
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):30
                                                    Entropy (8bit):1.2389205950315936
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:5047E38EB56CBE2AAD9497510AD470BD
                                                    SHA1:3199FB89F8D07ACC912C17BEEDC4BDA27DCC8178
                                                    SHA-256:AA03834773A411407AEEC3023F28A8EB24D402527691C7EA1059F36FAC89741A
                                                    SHA-512:0A871469F45E68A4D3DAEB5E4C779AB7D6C36E65AD26169624505DE7CD9BA55B6DABC0BF5063DE8CDECB7FC8E396944654B9A0BC4E3EE1299CF16D778D16A16A
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:..............................
                                                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                    Category:dropped
                                                    Size (bytes):16384
                                                    Entropy (8bit):0.6700989209548942
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:16FF3CBC70760FD705FEF326F33DEE55
                                                    SHA1:F7AC007A595E9EB30A7100E2581BB74D547259BE
                                                    SHA-256:0F98F31D8C6D1CF202EAADBDFD6345DAFD60C6ED09A61B5C84BC151C00D260F2
                                                    SHA-512:D6421FFDFA895BF13CED93029227C112C2852CD24A5CB6161406C21DC166156BDEC196ED140F27F543D0D6C942D4233C50BCF4E67A0E88C72957814C5F8FFE87
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):14
                                                    Entropy (8bit):2.699513850319966
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:C5A12EA2F9C2D2A79155C1BC161C350C
                                                    SHA1:75004B4B6C6C4EE37BE7C3FD7EE4AF4A531A1B1A
                                                    SHA-256:61EC0DAA23CBC92167446DADEFB919D86E592A31EBBD0AB56E64148EBF82152D
                                                    SHA-512:B3D5AF7C4A9CB09D27F0522671503654D06891740C36D3089BB5CB21E46AB235B0FA3DC2585A383B9F89F5C6DAE78F49F72B0AD58E6862DE39F440C4D6FF460B
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:..c.a.l.i.....
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 29 14:09:38 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                    Category:dropped
                                                    Size (bytes):2673
                                                    Entropy (8bit):3.983058571442551
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:C570494EE7B7A6D7C8FD6C3260B89BA9
                                                    SHA1:C480BCD78920ED4012667DDD61AB0F9EE0841786
                                                    SHA-256:235673340A51718FF2FB1DA6ACDBDC4BFA4168B1F811AA12D1338410C95AE04C
                                                    SHA-512:591865C6922684F13DE486708EB7F11C07D6B81ECC2476C32E33F8A23C1E0007CD3A48AD44993B106C7F456FB20F1440C8BE643FB1141EEDDB3409CF3C4AE4F3
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:L..................F.@.. ...$+.,.....I{..*..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I]Y.y....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V]Y2y....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V]Y2y....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V]Y2y..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V]Y4y...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........&2)......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 29 14:09:38 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                    Category:dropped
                                                    Size (bytes):2675
                                                    Entropy (8bit):3.998166320693701
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:0800F06D947AB6DDF1E29A87D5F6979D
                                                    SHA1:46780BA0F4959DD07DD85E88485EB866D3ED2C64
                                                    SHA-256:F8401AD6965AEF14495F666ED4A9BF54DCB44F18C3981784BDDC91138A89BA0E
                                                    SHA-512:E79741B579F24EA8596D62C01492C161AC4EF2754EA9174B62AAA2D6A6C1BE5F528A9E14F7FD7B407BB66DFA2106F64B8CA2AA15BF047FAE246F3C4FBFB2DE85
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:L..................F.@.. ...$+.,......l..*..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I]Y.y....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V]Y2y....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V]Y2y....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V]Y2y..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V]Y4y...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........&2)......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                    Category:dropped
                                                    Size (bytes):2689
                                                    Entropy (8bit):4.007335213652469
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:7AF4C2161C55F60CA2B1474EE36969B7
                                                    SHA1:D1D4455814C88D56B72B39222EA7133CD4FCB9A9
                                                    SHA-256:8087CBD91F5EE19BEA1CDFE4090672E2F089C78BCD2DDD7E2161CB651F6426D6
                                                    SHA-512:99F190A68CBC66730AF683287C218069B4F1819F48746CFD2999F5C005505D001AC8639A48D9D8990CB5021A79D050045FEC3002218E2A54091B4CBAC15B9A6E
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I]Y.y....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V]Y2y....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V]Y2y....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V]Y2y..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........&2)......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 29 14:09:38 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                    Category:dropped
                                                    Size (bytes):2677
                                                    Entropy (8bit):3.9958944090496042
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:3FACEA52E0F3A90C05A7A6A98DF8C0DB
                                                    SHA1:256223D951DF9A9A7674597894FF075CFAD46CFA
                                                    SHA-256:8E70F7937686D856E8F3AF69964D19618F5BDE9F6D9C0B33CE740A648A3557E7
                                                    SHA-512:6B041D6C0E6468BD50410D82149B7D35E6A79CF0BC9BBB9F74686EEF521E14C58924C3114B95486D4946D0C3C17179AA9DB329C6F85A1C8390762619F881F74C
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:L..................F.@.. ...$+.,....S.^..*..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I]Y.y....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V]Y2y....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V]Y2y....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V]Y2y..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V]Y4y...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........&2)......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 29 14:09:38 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                    Category:dropped
                                                    Size (bytes):2677
                                                    Entropy (8bit):3.9844970747692052
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:9A75E87782CDBA18F49A3452DF36F39A
                                                    SHA1:A09F70D61678B6C25D5A8FA373A814525461531B
                                                    SHA-256:4CAF61B73D9164185C562DE78193B631153A7F7FB85A6D9674D2FE8E473B4B0C
                                                    SHA-512:80D05E464532DFD953348690CBECCA61EEF63F25A06288CE3F91FC16C4EA4211AD41F0C4E60A8C282502DB44DD75223C7A62EBBF5FAD3469564F44FF65EA571D
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:L..................F.@.. ...$+.,......t..*..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I]Y.y....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V]Y2y....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V]Y2y....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V]Y2y..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V]Y4y...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........&2)......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 29 14:09:38 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                    Category:dropped
                                                    Size (bytes):2679
                                                    Entropy (8bit):3.991006181296644
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:21C32C4F2F3ECB74BA3466059FD18346
                                                    SHA1:B25877E8F3B1077C73594FE59AE51EF7D303A453
                                                    SHA-256:754EF3FEE2D35D4C1F678CF441604C293662803B7C74D4100D854BEA3B3E22E0
                                                    SHA-512:FC774FA993750C387B1602F2B2950C4086BEBBB7294A5F39B19B7F42AD3D9BB4D82607573FA2607D85ABACA68C7D67AA63AAA5FEBE8A9F2D0A897E51DBBA42B4
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:L..................F.@.. ...$+.,....IeR..*..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I]Y.y....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V]Y2y....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V]Y2y....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V]Y2y..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V]Y4y...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........&2)......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                    File Type:Microsoft Outlook email folder (>=2003)
                                                    Category:dropped
                                                    Size (bytes):271360
                                                    Entropy (8bit):1.5231834315265922
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:63EF33E72FF889727AF615AD8472B073
                                                    SHA1:C075413B190EC3B19D83377D0C774BFC92A4DE3A
                                                    SHA-256:381A299542376135FC419E6D4EEE07DFA7ADC1C2EFFB653E9F918BE18BD1A9B5
                                                    SHA-512:7269458B8A15661EE07B22B76EE08E30B21A0764731B3C7EE3CEA61999F09261550DE75C55782A8F01DC5CE94D424EEC464917C69F16FC16C3AFC503F5C8CAD4
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:!BDNGx.gSM......\........,..............]................@...........@...@...................................@...........................................................................$.......D..................................................................................................................................................................................................................................................................................................................................H........:..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                    File Type:DOS executable (COM, 0x8C-variant)
                                                    Category:dropped
                                                    Size (bytes):131072
                                                    Entropy (8bit):1.115221332696745
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:6E546BB93A630A7B4A046D1980774333
                                                    SHA1:2BE7753C5F276A4D4086D2BA599BF8D3AD5E2185
                                                    SHA-256:1DF3CD4E6CC0ADA85CB53C163AA422B31F5BAA2A7B508F032E48DB22223E3C95
                                                    SHA-512:0C0C52635AB61AED019C663C99E0C58607B3616653C354FCD37ADA4AE4557C27B3AD9E2B6B9CE7C4339DDAAAF69E3BE3635007E601DF230D2B4910A326EC12FE
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:..wM0...V.......L... 9.o.*.......D............#.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................a.K..D....../`..0...W.......L... 9.o.*.......B............#.........................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:Unicode text, UTF-8 text, with very long lines (65455)
                                                    Category:downloaded
                                                    Size (bytes):775350
                                                    Entropy (8bit):5.700291031990132
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:67DD564568419099F49EBDED11913E6C
                                                    SHA1:D6C7A69E75B7D3198A2B7C6328F5749AE4404E44
                                                    SHA-256:29308B97856BB4C6561F2736C6034D4DE750F6AAFD63076752E699C17DB20D24
                                                    SHA-512:C709F2203DA7328E18ED1E23816D891EED082CE72AD75F47E5EA7989F1CE97EAFF0F1BEFE2E9B10F775779689F153A2C810F604E4CF25728F34DDF83A7148426
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://piletfeed-cdn.sharefile.io/sharefile-web/sharefiledev-esign-pilet/1.220.5/package/dist/index.js
                                                    Preview://@pilet v:2(webpackChunkpr_sharefiledevesignpilet,{}).System.register(["@citrite/sf-api","@sharefiledev/antd-config","antd","react","react-dom","react-router-dom","tslib"],(function(e,t){var n={},i={},o={},r={},a={},s={},l={};return Object.defineProperty(r,"__esModule",{value:!0}),{setters:[function(e){n.AccountsEntity=e.AccountsEntity,n.Api=e.Api,n.ContactListType=e.ContactListType,n.ContactsEntity=e.ContactsEntity,n.CustomWorkflowBundleType=e.CustomWorkflowBundleType,n.FileVirusStatus=e.FileVirusStatus,n.IntegrationProvider=e.IntegrationProvider,n.IntegrationsEntity=e.IntegrationsEntity,n.ItemOperations=e.ItemOperations,n.ItemOrderingMode=e.ItemOrderingMode,n.ItemsEntity=e.ItemsEntity,n.RightSignatureEntity=e.RightSignatureEntity,n.Uploader=e.Uploader,n.UserRole=e.UserRole,n.UsersEntity=e.UsersEntity,n.createFolder=e.createFolder,n.isCustomWorkflowBundle=e.isCustomWorkflowBundle,n.isFile=e.isFile,n.isFolder=e.isFolder,n.isLink=e.isLink,n.isMedicalStudyBundle=e.isMedicalStudyBundle,n
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:HTML document, ASCII text, with very long lines (3450), with CRLF line terminators
                                                    Category:downloaded
                                                    Size (bytes):3452
                                                    Entropy (8bit):5.117912766689607
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:CB06E9A552B197D5C0EA600B431A3407
                                                    SHA1:04E167433F2F1038C78F387F8A166BB6542C2008
                                                    SHA-256:1F4EDBD2416E15BD82E61BA1A8E5558D44C4E914536B1B07712181BF57934021
                                                    SHA-512:1B4A3919E442EE4D2F30AE29B1C70DF7274E5428BCB6B3EDD84DCB92D60A0D6BDD9FA6D9DDE8EAB341FF4C12DE00A50858BF1FC5B6135B71E9E177F5A9ED34B9
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://login.live.com/Me.htm?v=3
                                                    Preview:<script type="text/javascript">!function(t,e){for(var s in e)t[s]=e[s]}(this,function(t){function e(n){if(s[n])return s[n].exports;var i=s[n]={exports:{},id:n,loaded:!1};return t[n].call(i.exports,i,i.exports,e),i.loaded=!0,i.exports}var s={};return e.m=t,e.c=s,e.p="",e(0)}([function(t,e){function s(t){for(var e=f[S],s=0,n=e.length;s<n;++s)if(e[s]===t)return!0;return!1}function n(t){if(!t)return null;for(var e=t+"=",s=document.cookie.split(";"),n=0,i=s.length;n<i;n++){var a=s[n].replace(/^\s*(\w+)\s*=\s*/,"$1=").replace(/(\s+$)/,"");if(0===a.indexOf(e))return a.substring(e.length)}return null}function i(t,e,s){if(t)for(var n=t.split(":"),i=null,a=0,r=n.length;a<r;++a){var c=null,S=n[a].split("$");if(0===a&&(i=parseInt(S.shift()),!i))return;var l=S.length;if(l>=1){var p=o(i,S[0]);if(!p||s[p])continue;c={signInName:p,idp:"msa",isSignedIn:!0}}if(l>=3&&(c.firstName=o(i,S[1]),c.lastName=o(i,S[2])),l>=4){var f=S[3],d=f.split("|");c.otherHashedAliases=d}if(l>=5){var h=parseInt(S[4],16);h&&(c.
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (61177)
                                                    Category:downloaded
                                                    Size (bytes):113378
                                                    Entropy (8bit):5.285066693137765
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:9C837C2B6C9C441656C3C64BE6FC6401
                                                    SHA1:D44AA83093C4109DDD8FFAEA60755F05D1BFE7D3
                                                    SHA-256:68C2994E21A564345EB3B4091DD2334C9CBDDB0AECDA45EE963C6DE2E1629B93
                                                    SHA-512:AF04835BCC621FE1793C4661FDB03EDEA16219BAA77F1198AA419F771B6B3DCDAC3DA92676568C207022251483AB79C75AB6DF2CE94924748FF9CEBF64AFF5A2
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://aadcdn.msftauth.net/ests/2.1/content/cdnbundles/converged.v2.login.min_nin8k2ycrbzww8zl5vxkaq2.css
                                                    Preview:/*! Copyright (C) Microsoft Corporation. All rights reserved. *//*!.------------------------------------------- START OF THIRD PARTY NOTICE -----------------------------------------..This file is based on or incorporates material from the projects listed below (Third Party IP). The original copyright notice and the license under which Microsoft received such Third Party IP, are set forth below. Such licenses and notices are provided for informational purposes only. Microsoft licenses the Third Party IP to you under the licensing terms for the Microsoft product. Microsoft reserves all other rights not expressly granted under this agreement, whether by implication, estoppel or otherwise...//-----------------------------------------------------------------------------.twbs-bootstrap-sass (3.3.0).//-----------------------------------------------------------------------------..The MIT License (MIT)..Copyright (c) 2013 Twitter, Inc..Permission is hereby granted, free of charge, to any person
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (65472)
                                                    Category:downloaded
                                                    Size (bytes):113286
                                                    Entropy (8bit):5.351711706081523
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:2C38C5498D5FB32EC1F06835620A80B8
                                                    SHA1:C7C604C6A1179D6D402164B321088E118A4C8321
                                                    SHA-256:90AEA3E25E9064E6293A290587C5EA08A52F98A8D67BFC28A904AA82DC42A8C8
                                                    SHA-512:5402605B0916CC1C800E76CEE01A83C5F8931C4B1B0DA11E6CD262B6E51FCBBE9F8CF2E1186CA2FE68F41839D23F7B452E22E7F6DB0BBBD452154FC6CCF5B213
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://piletfeed-cdn.sharefile.io/sharefile-web/sharefiledev-audit-collector-pilet/0.20.0/package/dist/index.js
                                                    Preview://@pilet v:2(webpackChunkpr_sharefiledevauditcollectorpilet,{}).System.register(["antd","react","tslib"],(function(e,t){var r={},n={},o={};return Object.defineProperty(n,"__esModule",{value:!0}),{setters:[function(e){r.App=e.App,r.Button=e.Button,r.DatePicker=e.DatePicker,r.Form=e.Form,r.Input=e.Input,r.Space=e.Space,r.Spin=e.Spin},function(e){Object.keys(e).forEach((function(t){n[t]=e[t]}))},function(e){o.__awaiter=e.__awaiter}],execute:function(){e((()=>{var e,i,a,s,c={4386:(e,t,r)=>{"use strict";r.d(t,{j:()=>u});var n=r(8109);function o(e){return o="function"==typeof Symbol&&"symbol"==typeof Symbol.iterator?function(e){return typeof e}:function(e){return e&&"function"==typeof Symbol&&e.constructor===Symbol&&e!==Symbol.prototype?"symbol":typeof e},o(e)}function i(){i=function(){return t};var e,t={},r=Object.prototype,n=r.hasOwnProperty,a=Object.defineProperty||function(e,t,r){e[t]=r.value},s="function"==typeof Symbol?Symbol:{},c=s.iterator||"@@iterator",u=s.asyncIterator||"@@asyncIte
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (46591)
                                                    Category:downloaded
                                                    Size (bytes):142367
                                                    Entropy (8bit):5.430597817875451
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:CCAA31FD031C4C856EB7B986FD9F447B
                                                    SHA1:0A809EABCDB95FA04DE5F8409B3BC994ED65CBD1
                                                    SHA-256:3D40B4129B8B4C284908636AE46D72EA053F286FB5FE45DB78351B5B2CFC1EB9
                                                    SHA-512:4B5B2271DB5F640FEBF13A7C0BDBD630C73530000F1593046D090585D1752E239D894614E23E801BE4C6A379406B6EF521423FA27C3865C3CD4ABB0A64823780
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://aadcdn.msftauth.net/shared/1.0/content/js/BssoInterrupt_Core_zKox_QMcTIVut7mG_Z9Eew2.js
                                                    Preview:/*!. * ------------------------------------------- START OF THIRD PARTY NOTICE -----------------------------------------. * . * This file is based on or incorporates material from the projects listed below (Third Party IP). The original copyright notice and the license under which Microsoft received such Third Party IP, are set forth below. Such licenses and notices are provided for informational purposes only. Microsoft licenses the Third Party IP to you under the licensing terms for the Microsoft product. Microsoft reserves all other rights not expressly granted under this agreement, whether by implication, estoppel or otherwise.. * . * json2.js (2016-05-01). * https://github.com/douglascrockford/JSON-js. * License: Public Domain. * . * Provided for Informational Purposes Only. * . * ----------------------------------------------- END OF THIRD PARTY NOTICE ------------------------------------------. */!function(e){function t(t){for(var n,r,i=t[0],a=t[1],s=0,u=[];s<i.length;s++)
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (65479)
                                                    Category:dropped
                                                    Size (bytes):167028
                                                    Entropy (8bit):5.295519979527004
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:D415917C44EDB49D2128CF696D92474C
                                                    SHA1:C97E2316EDEC31A6E56CF0C7DA7A61EDF8CDF316
                                                    SHA-256:6ECF8E88C098C14C975873C9EDC0C842F5FC17B03B2FB52291DCE1266F23C124
                                                    SHA-512:68D8A8DAEA2810E490FDD1A33499BCC0277971A264C436EA94D2EF55A52708D7422470370333615827D044211F5DBE26C673C5B2A0B5B9E897DB98E66F20FE55
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview://@pilet v:2(webpackChunkpr_sharefiledevrubiconpilet,{}).System.register(["@citrite/sf-api","@sharefiledev/antd-config","antd","react","react-dom","react-router","react-router-dom","tslib"],(function(e,t){var n={},r={},i={},o={},s={},a={},u={},c={};return Object.defineProperty(o,"__esModule",{value:!0}),Object.defineProperty(c,"__esModule",{value:!0}),{setters:[function(e){n.UserRole=e.UserRole},function(e){r.sizes=e.sizes},function(e){i.Alert=e.Alert,i.App=e.App,i.Button=e.Button,i.Carousel=e.Carousel,i.Checkbox=e.Checkbox,i.Col=e.Col,i.Divider=e.Divider,i.Drawer=e.Drawer,i.Flex=e.Flex,i.Form=e.Form,i.Grid=e.Grid,i.Image=e.Image,i.Input=e.Input,i.Layout=e.Layout,i.List=e.List,i.Menu=e.Menu,i.Modal=e.Modal,i.Popconfirm=e.Popconfirm,i.Result=e.Result,i.Row=e.Row,i.Skeleton=e.Skeleton,i.Space=e.Space,i.Spin=e.Spin,i.Tag=e.Tag,i.Tooltip=e.Tooltip,i.Typography=e.Typography,i.theme=e.theme},function(e){Object.keys(e).forEach((function(t){o[t]=e[t]}))},function(e){s.createPortal=e.createPort
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:SVG Scalable Vector Graphics image
                                                    Category:downloaded
                                                    Size (bytes):1864
                                                    Entropy (8bit):5.222032823730197
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:BC3D32A696895F78C19DF6C717586A5D
                                                    SHA1:9191CB156A30A3ED79C44C0A16C95159E8FF689D
                                                    SHA-256:0E88B6FCBB8591EDFD28184FA70A04B6DD3AF8A14367C628EDD7CABA32E58C68
                                                    SHA-512:8D4F38907F3423A86D90575772B292680F7970527D2090FC005F9B096CC81D3F279D59AD76EAFCA30C3D4BBAF2276BBAA753E2A46A149424CF6F1C319DED5A64
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://aadcdn.msftauth.net/shared/1.0/content/images/backgrounds/2_11d9e3bcdfede9ce5ce5ace2d129f1c4.svg
                                                    Preview:<svg xmlns="http://www.w3.org/2000/svg" width="1920" height="1080" fill="none"><g opacity=".2" clip-path="url(#E)"><path d="M1466.4 1795.2c950.37 0 1720.8-627.52 1720.8-1401.6S2416.77-1008 1466.4-1008-254.4-380.482-254.4 393.6s770.428 1401.6 1720.8 1401.6z" fill="url(#A)"/><path d="M394.2 1815.6c746.58 0 1351.8-493.2 1351.8-1101.6S1140.78-387.6 394.2-387.6-957.6 105.603-957.6 714-352.38 1815.6 394.2 1815.6z" fill="url(#B)"/><path d="M1548.6 1885.2c631.92 0 1144.2-417.45 1144.2-932.4S2180.52 20.4 1548.6 20.4 404.4 437.85 404.4 952.8s512.276 932.4 1144.2 932.4z" fill="url(#C)"/><path d="M265.8 1215.6c690.246 0 1249.8-455.595 1249.8-1017.6S956.046-819.6 265.8-819.6-984-364.005-984 198-424.445 1215.6 265.8 1215.6z" fill="url(#D)"/></g><defs><radialGradient id="A" cx="0" cy="0" r="1" gradientUnits="userSpaceOnUse" gradientTransform="translate(1466.4 393.6) rotate(90) scale(1401.6 1720.8)"><stop stop-color="#107c10"/><stop offset="1" stop-color="#c4c4c4" stop-opacity="0"/></radialGradient><r
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:SVG Scalable Vector Graphics image
                                                    Category:dropped
                                                    Size (bytes):3651
                                                    Entropy (8bit):4.094801914706141
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:EE5C8D9FB6248C938FD0DC19370E90BD
                                                    SHA1:D01A22720918B781338B5BBF9202B241A5F99EE4
                                                    SHA-256:04D29248EE3A13A074518C93A18D6EFC491BF1F298F9B87FC989A6AE4B9FAD7A
                                                    SHA-512:C77215B729D0E60C97F075998E88775CD0F813B4D094DC2FDD13E5711D16F4E5993D4521D0FBD5BF7150B0DBE253D88B1B1FF60901F053113C5D7C1919852D58
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:<svg xmlns="http://www.w3.org/2000/svg" width="108" height="24" viewBox="0 0 108 24"><title>assets</title><path d="M44.836,4.6V18.4h-2.4V7.583H42.4L38.119,18.4H36.531L32.142,7.583h-.029V18.4H29.9V4.6h3.436L37.3,14.83h.058L41.545,4.6Zm2,1.049a1.268,1.268,0,0,1,.419-.967,1.413,1.413,0,0,1,1-.39,1.392,1.392,0,0,1,1.02.4,1.3,1.3,0,0,1,.4.958,1.248,1.248,0,0,1-.414.953,1.428,1.428,0,0,1-1.01.385A1.4,1.4,0,0,1,47.25,6.6a1.261,1.261,0,0,1-.409-.948M49.41,18.4H47.081V8.507H49.41Zm7.064-1.694a3.213,3.213,0,0,0,1.145-.241,4.811,4.811,0,0,0,1.155-.635V18a4.665,4.665,0,0,1-1.266.481,6.886,6.886,0,0,1-1.554.164,4.707,4.707,0,0,1-4.918-4.908,5.641,5.641,0,0,1,1.4-3.932,5.055,5.055,0,0,1,3.955-1.545,5.414,5.414,0,0,1,1.324.168,4.431,4.431,0,0,1,1.063.39v2.233a4.763,4.763,0,0,0-1.1-.611,3.184,3.184,0,0,0-1.15-.217,2.919,2.919,0,0,0-2.223.9,3.37,3.37,0,0,0-.847,2.416,3.216,3.216,0,0,0,.813,2.338,2.936,2.936,0,0,0,2.209.837M65.4,8.343a2.952,2.952,0,0,1,.5.039,2.1,2.1,0,0,1,.375.1v2.358a2.04,2.04,0,0,0-.
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:HTML document, ASCII text
                                                    Category:downloaded
                                                    Size (bytes):1310
                                                    Entropy (8bit):5.34821857415734
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:5FD6C81E2D45BD71EF47570F15EB622A
                                                    SHA1:474672BAF3BF959B770A21ED2AD0FD6C3EAC424C
                                                    SHA-256:C0F777284D7D75A641591D10D3CD99457F19F816FB3C6E2E6AB295F3EDA52E99
                                                    SHA-512:5BF4DA717F0C50FAC0C6690F9FE176719DB74FF7A923F2B25FA52D197D71A880A8B008EB64AB4DAA8E8400FB338B1C1ED1D59DB44B3627D88F7F5194D6AC6023
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://link.edgepilot.com/favicon.ico
                                                    Preview:<html>. <head>. <meta charset="utf-8">. <meta name="viewport" content="width=device-width, initial-scale=1" />. <title>404 - page not found</title>. <link href="/css/app.css?v=1" rel="stylesheet">. <link href="//maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/bootstrap.min.css" rel="stylesheet" integrity="sha384-BVYiiSIFeK1dGmJRAkycuHAHRg32OmUcww7on3RYdg4Va+PmSTsz/K68vbdEjh4u" crossorigin="anonymous">. <script src="//code.jquery.com/jquery-3.2.1.min.js" integrity="sha256-hwg4gsxgFZhOsEEamdOYGBf13FyQuiTwlAQgxVSNgt4=" crossorigin="anonymous"></script>. <script src="//maxcdn.bootstrapcdn.com/bootstrap/3.3.7/js/bootstrap.min.js" integrity="sha384-Tc5IQib027qvyjSMfHjOMaLkfuWVxZxUPnCJA7l2mCWNIpG9mGCD8wGNIcPD7Txa" crossorigin="anonymous"></script>. <meta name="norton-safeweb-site-verification" content="vo5jo2vr2es9toa19icr3h7q2hi6r6wqxg2e2qy7s06inecm48l-xszjfgzrt97-wwnlobyo8751zji5y68-iv6m14v35a8xr0is-usi88c7u6tn57czk90oepmrfgw1" />. </head>. <body>. <nav class="navb
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (65479)
                                                    Category:downloaded
                                                    Size (bytes):199868
                                                    Entropy (8bit):5.41109186682965
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:114E798D503A347AAB2A537702E1593F
                                                    SHA1:EDC8A8C19A54D81944F8EA870D826E06A7362161
                                                    SHA-256:091AB89F90FE0DBAEDE5C8C9C5308C702C75D49A9CD809CECB9F001F98788C38
                                                    SHA-512:06CE751BE294ABF4D171F9A9BA070FEBB75A29E45615125F3AD8E9D1905A8484E990CB7CD97092F2953E3FBF1596B4617933FF85C3EA74F40C5FB94237E80DC3
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://piletfeed-cdn.sharefile.io/sharefile-web/sharefiledev-task-mgt-pilet/1.7.0/package/dist/index.js
                                                    Preview://@pilet v:2(webpackChunkpr_sharefiledevtaskmgtpilet,{}).System.register(["@sharefiledev/antd-config","antd","react","react-dom","tslib"],(function(e,t){var n={},r={},o={},i={},a={};return Object.defineProperty(o,"__esModule",{value:!0}),Object.defineProperty(i,"__esModule",{value:!0}),{setters:[function(e){n.sizes=e.sizes},function(e){r.Alert=e.Alert,r.Button=e.Button,r.Card=e.Card,r.Col=e.Col,r.Divider=e.Divider,r.Empty=e.Empty,r.Flex=e.Flex,r.Input=e.Input,r.Layout=e.Layout,r.Menu=e.Menu,r.Popconfirm=e.Popconfirm,r.Result=e.Result,r.Row=e.Row,r.Select=e.Select,r.Skeleton=e.Skeleton,r.Space=e.Space,r.Spin=e.Spin,r.Tabs=e.Tabs,r.Typography=e.Typography,r.theme=e.theme},function(e){Object.keys(e).forEach((function(t){o[t]=e[t]}))},function(e){Object.keys(e).forEach((function(t){i[t]=e[t]}))},function(e){a.__assign=e.__assign,a.__awaiter=e.__awaiter,a.__generator=e.__generator,a.__makeTemplateObject=e.__makeTemplateObject,a.__spreadArray=e.__spreadArray}],execute:function(){e((()=>{var
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (65475)
                                                    Category:dropped
                                                    Size (bytes):92489
                                                    Entropy (8bit):5.301704644724007
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:C5427AFAC37FF069E0CB72A8345A1C43
                                                    SHA1:8E701F6834119B9B6400150405B2D1B37DDF35B1
                                                    SHA-256:AD142FFBC6C4D48AAA7020993EF9CFA34FFC2B569707D71E25C9A2587562E575
                                                    SHA-512:9A295E8309C70D508D72BEF073C473CCD38EFC3FA0855D887006EBD83BC316037802BE0CE075F8581EC1F049283570D06A0421D9095610E43B5B06DDF2D21139
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview://@pilet v:2(webpackChunkpr_sharefiledevpermissionspilet,{}).System.register(["@citrite/sf-api","@sharefiledev/antd-config","antd","react","react-dom","react-router-dom","tslib"],(function(e,t){var n={},r={},o={},i={},a={},s={},u={};return Object.defineProperty(i,"__esModule",{value:!0}),{setters:[function(e){n.AccountsEntity=e.AccountsEntity,n.ContactListType=e.ContactListType,n.ContactsEntity=e.ContactsEntity,n.UserRole=e.UserRole},function(e){r.colorPalette=e.colorPalette,r.sizes=e.sizes},function(e){o.Alert=e.Alert,o.Avatar=e.Avatar,o.Badge=e.Badge,o.Button=e.Button,o.Card=e.Card,o.Checkbox=e.Checkbox,o.Col=e.Col,o.Collapse=e.Collapse,o.Divider=e.Divider,o.Drawer=e.Drawer,o.Dropdown=e.Dropdown,o.Flex=e.Flex,o.Form=e.Form,o.Input=e.Input,o.Layout=e.Layout,o.List=e.List,o.Modal=e.Modal,o.Popconfirm=e.Popconfirm,o.Row=e.Row,o.Select=e.Select,o.Skeleton=e.Skeleton,o.Space=e.Space,o.Spin=e.Spin,o.Switch=e.Switch,o.Tooltip=e.Tooltip,o.Typography=e.Typography,o.notification=e.notification
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (32033)
                                                    Category:downloaded
                                                    Size (bytes):37045
                                                    Entropy (8bit):5.174934618594778
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:5869C96CC8F19086AEE625D670D741F9
                                                    SHA1:430A443D74830FE9BE26EFCA431F448C1B3740F9
                                                    SHA-256:53964478A7C634E8DAD34ECC303DD8048D00DCE4993906DE1BACF67F663486EF
                                                    SHA-512:8B3B64A1BB2F9E329F02D4CD7479065630184EBAED942EE61A9FF9E1CE34C28C0EECB854458977815CF3704A8697FA8A5D096D2761F032B74B70D51DA3E37F45
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/js/bootstrap.min.js
                                                    Preview:/*!. * Bootstrap v3.3.7 (http://getbootstrap.com). * Copyright 2011-2016 Twitter, Inc.. * Licensed under the MIT license. */.if("undefined"==typeof jQuery)throw new Error("Bootstrap's JavaScript requires jQuery");+function(a){"use strict";var b=a.fn.jquery.split(" ")[0].split(".");if(b[0]<2&&b[1]<9||1==b[0]&&9==b[1]&&b[2]<1||b[0]>3)throw new Error("Bootstrap's JavaScript requires jQuery version 1.9.1 or higher, but lower than version 4")}(jQuery),+function(a){"use strict";function b(){var a=document.createElement("bootstrap"),b={WebkitTransition:"webkitTransitionEnd",MozTransition:"transitionend",OTransition:"oTransitionEnd otransitionend",transition:"transitionend"};for(var c in b)if(void 0!==a.style[c])return{end:b[c]};return!1}a.fn.emulateTransitionEnd=function(b){var c=!1,d=this;a(this).one("bsTransitionEnd",function(){c=!0});var e=function(){c||a(d).trigger(a.support.transition.end)};return setTimeout(e,b),this},a(function(){a.support.transition=b(),a.support.transition&&(a.event.
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (65474)
                                                    Category:downloaded
                                                    Size (bytes):199512
                                                    Entropy (8bit):5.361186797681031
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:38596D901C05CDCB1B7DB1F4D6D21BA7
                                                    SHA1:8A86524AAEE7B7462081A6A3C6F9FBCF6174C80A
                                                    SHA-256:159C798B7CB0A3F271E179FBFF2D2862394D1F2832F248D6F71802C7F253C04E
                                                    SHA-512:3FFB8DF04864002AE61D41DCF30B55BDBB3285E0843425EDDD0BFB2258CEA89FE540123F98F5B896673C3E41A5D096123E87BB6E519FD3B8639C10438ABD9D7D
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://piletfeed-cdn.sharefile.io/sharefile-web/sharefiledev-entitlements-pilet/0.1.54/package/dist/index.js
                                                    Preview://@pilet v:2(webpackChunkpr_sharefiledeventitlementspilet,{}).System.register(["@sharefiledev/antd-config","antd","react","react-router-dom","tslib"],(function(e,t){var n={},r={},o={},i={},a={};return Object.defineProperty(o,"__esModule",{value:!0}),{setters:[function(e){n.sizes=e.sizes},function(e){r.Alert=e.Alert,r.Button=e.Button,r.Card=e.Card,r.Col=e.Col,r.Divider=e.Divider,r.Flex=e.Flex,r.Image=e.Image,r.Layout=e.Layout,r.Row=e.Row,r.Skeleton=e.Skeleton,r.Space=e.Space,r.Spin=e.Spin,r.Typography=e.Typography,r.notification=e.notification,r.theme=e.theme},function(e){Object.keys(e).forEach((function(t){o[t]=e[t]}))},function(e){i.useHistory=e.useHistory,i.useLocation=e.useLocation},function(e){a.__awaiter=e.__awaiter,a.__rest=e.__rest}],execute:function(){e((()=>{var e,s,u,c,l={439:(e,t,n)=>{"use strict";n.d(t,{z1:()=>k,cM:()=>y});var r=n(2456),o=n(6250),i=2,a=.16,s=.05,u=.05,c=.15,l=5,f=4,d=[{index:7,opacity:.15},{index:6,opacity:.25},{index:5,opacity:.3},{index:5,opacity:.45},{in
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (65476)
                                                    Category:downloaded
                                                    Size (bytes):120056
                                                    Entropy (8bit):5.389199436611293
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:33040C25DCD11460D4FCAF829905E8BD
                                                    SHA1:9FF06962F665FF8F73E63B2334A33ADC5A8CE22A
                                                    SHA-256:044AAAC4452227A53E27DED5C4B3314735974E392E836D2D0489712B0BDD8AF7
                                                    SHA-512:0C2E4169A77DA124DD18423441B698693526940DA0E75A1732298CDEF3F6FC532B754358880F6997A850310A6B3EA66A80BFCE56D313388645F2A1B25A9D6CF5
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://piletfeed-cdn.sharefile.io/sharefile-web/sharefiledev-view-engine-pilet/1.24.0/package/dist/index.js
                                                    Preview://@pilet v:2(webpackChunkpr_sharefiledevviewenginepilet,{}).System.register(["@sharefiledev/antd-config","antd","react","react-router","react-router-dom","tslib"],(function(e,t){var n={},r={},o={},i={},a={},s={};return Object.defineProperty(o,"__esModule",{value:!0}),{setters:[function(e){n.sizes=e.sizes},function(e){r.Alert=e.Alert,r.Badge=e.Badge,r.Button=e.Button,r.Card=e.Card,r.Checkbox=e.Checkbox,r.Col=e.Col,r.ConfigProvider=e.ConfigProvider,r.DatePicker=e.DatePicker,r.Divider=e.Divider,r.Dropdown=e.Dropdown,r.Empty=e.Empty,r.Flex=e.Flex,r.Form=e.Form,r.Grid=e.Grid,r.Input=e.Input,r.InputNumber=e.InputNumber,r.Layout=e.Layout,r.List=e.List,r.Menu=e.Menu,r.Modal=e.Modal,r.Popconfirm=e.Popconfirm,r.Radio=e.Radio,r.Result=e.Result,r.Row=e.Row,r.Select=e.Select,r.Skeleton=e.Skeleton,r.Slider=e.Slider,r.Space=e.Space,r.Spin=e.Spin,r.Switch=e.Switch,r.Tabs=e.Tabs,r.Tag=e.Tag,r.Tooltip=e.Tooltip,r.Typography=e.Typography,r.theme=e.theme},function(e){Object.keys(e).forEach((function(t){o[
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (65473)
                                                    Category:downloaded
                                                    Size (bytes):77544
                                                    Entropy (8bit):5.226997072902139
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:7B642EB641428D924027759152BD26F4
                                                    SHA1:766963F144406D2019108B5D88F94A5442E8EF14
                                                    SHA-256:EB209A2C45816EAD1F57DD45FDDA92ECF0B25D8EE874523DE3C0ECA3E7B3C6FE
                                                    SHA-512:FD7636C1A83F2105EB181341700BAD335744E995764072503F0C7A000DD01AB30E6AC7D04B9EB2C9E83E58B4EA8678BDE582F4157B482BA6FD6A56AE8589C6DF
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://piletfeed-cdn.sharefile.io/sharefile-web/sharefiledev-conversations-pilet/1.94.10/package/dist/index.js
                                                    Preview://@pilet v:2(webpackChunkpr_sharefiledevconversationspilet,{}).System.register(["@citrite/sf-api","@sharefiledev/antd-config","antd","react","react-dom","react-router","react-router-dom","tslib"],(function(t,e){var n={},r={},i={},s={},a={},o={},u={},c={};return Object.defineProperty(s,"__esModule",{value:!0}),{setters:[function(t){n.Api=t.Api,n.ItemsEntity=t.ItemsEntity,n.Uploader=t.Uploader,n.UsersEntity=t.UsersEntity,n.ZoneService=t.ZoneService,n.createFile=t.createFile},function(t){r.colorPalette=t.colorPalette,r.sizes=t.sizes},function(t){i.Avatar=t.Avatar,i.Badge=t.Badge,i.Button=t.Button,i.Flex=t.Flex,i.Form=t.Form,i.Grid=t.Grid,i.Input=t.Input,i.Skeleton=t.Skeleton,i.Spin=t.Spin,i.Typography=t.Typography,i.notification=t.notification,i.theme=t.theme},function(t){Object.keys(t).forEach((function(e){s[e]=t[e]}))},function(t){a["default"]=t["default"],a.findDOMNode=t.findDOMNode,a.flushSync=t.flushSync},function(t){o.useHistory=t.useHistory},function(t){u.Link=t.Link,u.useHistory=t
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:Unicode text, UTF-8 text, with very long lines (65240)
                                                    Category:downloaded
                                                    Size (bytes):1264534
                                                    Entropy (8bit):5.582406148482046
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:C0B3C7F34B57F4B83ABD690EAD43636F
                                                    SHA1:A9529F3DB8DB4BC3178E4DE61FBC925E3863BC5E
                                                    SHA-256:0AF67FCC3A172CF8869E3434208041A599D9A71CE21050FA52F47CB850821DA9
                                                    SHA-512:FB0366497F81998B17B693717D5EE7885DF1B988D10AC5A7129B82AF7E438A463ABDB8FBC51B4878C384ACC7B038CFA3B8AA0BE10AFD60B415FAE93E8E5F292F
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://piletfeed-cdn.sharefile.io/sharefile-web/sharefiledev-doc-gen-pilet/1.2.105/package/dist/index.js
                                                    Preview://@pilet v:2(webpackChunkpr_sharefiledevdocgenpilet,{}).System.register(["@citrite/sf-api","@sharefiledev/antd-config","antd","react","react-dom","react-router-dom","tslib"],(function(__WEBPACK_DYNAMIC_EXPORT__,__system_context__){var __WEBPACK_EXTERNAL_MODULE__8222__={},__WEBPACK_EXTERNAL_MODULE__4634__={},__WEBPACK_EXTERNAL_MODULE__4876__={},__WEBPACK_EXTERNAL_MODULE__4726__={},__WEBPACK_EXTERNAL_MODULE__1867__={},__WEBPACK_EXTERNAL_MODULE__2965__={},__WEBPACK_EXTERNAL_MODULE__8109__={};return Object.defineProperty(__WEBPACK_EXTERNAL_MODULE__4726__,"__esModule",{value:!0}),{setters:[function(e){__WEBPACK_EXTERNAL_MODULE__8222__.AccountsEntity=e.AccountsEntity,__WEBPACK_EXTERNAL_MODULE__8222__.Api=e.Api,__WEBPACK_EXTERNAL_MODULE__8222__.ContactListType=e.ContactListType,__WEBPACK_EXTERNAL_MODULE__8222__.ContactsEntity=e.ContactsEntity,__WEBPACK_EXTERNAL_MODULE__8222__.CustomWorkflowBundleType=e.CustomWorkflowBundleType,__WEBPACK_EXTERNAL_MODULE__8222__.FileVirusStatus=e.FileVirusStatu
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text
                                                    Category:dropped
                                                    Size (bytes):19
                                                    Entropy (8bit):3.6818808028034042
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:595E88012A6521AAE3E12CBEBE76EB9E
                                                    SHA1:DA3968197E7BF67AA45A77515B52BA2710C5FC34
                                                    SHA-256:B16E15764B8BC06C5C3F9F19BC8B99FA48E7894AA5A6CCDAD65DA49BBF564793
                                                    SHA-512:FD13C580D15CC5E8B87D97EAD633209930E00E85C113C776088E246B47F140EFE99BDF6AB02070677445DB65410F7E62EC23C71182F9F78E9D0E1B9F7FDA0DC3
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:404 page not found.
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (65475)
                                                    Category:dropped
                                                    Size (bytes):261475
                                                    Entropy (8bit):5.454849456214367
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:48252B007677ADFABB0EA62C8028A30E
                                                    SHA1:09B5B74B71F55FAFF7EE55E44CF4ED5FA01162D2
                                                    SHA-256:FA747E224CA94227FD110B638E6D45E1AAAD1C38E8CDCB18FDF1035EAB8C018C
                                                    SHA-512:BC054C876647F042FEFD102F7C884B7ABA0CF8528CB28FC203E0881968FADAA7CC9B664EB7D8D8BFED1783C129D49945D5A1F2511C621AE10DDA729BF7135416
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview://@pilet v:2(webpackChunkpr_sharefiledevrequestlistpilet,{}).System.register(["@citrite/sf-api","@sharefiledev/antd-config","antd","react","react-dom","react-router","react-router-dom","tslib"],(function(e,t){var n={},r={},o={},a={},i={},s={},c={},u={};return Object.defineProperty(a,"__esModule",{value:!0}),Object.defineProperty(u,"__esModule",{value:!0}),{setters:[function(e){n.AccountsEntity=e.AccountsEntity,n.Api=e.Api,n.BundleType=e.BundleType,n.CapabilitiesEntity=e.CapabilitiesEntity,n.CapabilityName=e.CapabilityName,n.ContactListType=e.ContactListType,n.ContactsEntity=e.ContactsEntity,n.CustomWorkflowBundleType=e.CustomWorkflowBundleType,n.DocumentApprovalWorkflowAction=e.DocumentApprovalWorkflowAction,n.EncryptedEmailsEntity=e.EncryptedEmailsEntity,n.ExceptionReason=e.ExceptionReason,n.FileAction=e.FileAction,n.FileLockEntity=e.FileLockEntity,n.FileVirusStatus=e.FileVirusStatus,n.IntegrationProvider=e.IntegrationProvider,n.IntegrationsEntity=e.IntegrationsEntity,n.ItemOperations
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (64612)
                                                    Category:dropped
                                                    Size (bytes):113769
                                                    Entropy (8bit):5.492540089333064
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:C6C029BA88D52E5312FEC69603A00340
                                                    SHA1:079011F6F0662C11AE907C773EFE8E0C9338EAD0
                                                    SHA-256:DDD0BB1C19B3D2D045BFCDE85D2020BBA57854C887A6691B66DBA3DA1BB3AFBE
                                                    SHA-512:7DF09CD949A43D53D62D9013718158966508DEC2338491FFB38DC33D2EB85FF5C699792AE578975DA0E4F03CC7EA03774624208D06924EEA4C2EAC92E6E22C60
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:/*!. * ------------------------------------------- START OF THIRD PARTY NOTICE -----------------------------------------. * . * This file is based on or incorporates material from the projects listed below (Third Party IP). The original copyright notice and the license under which Microsoft received such Third Party IP, are set forth below. Such licenses and notices are provided for informational purposes only. Microsoft licenses the Third Party IP to you under the licensing terms for the Microsoft product. Microsoft reserves all other rights not expressly granted under this agreement, whether by implication, estoppel or otherwise.. * . * json2.js (2016-05-01). * https://github.com/douglascrockford/JSON-js. * License: Public Domain. * . * Provided for Informational Purposes Only. * . * ----------------------------------------------- END OF THIRD PARTY NOTICE ------------------------------------------. */.(window.webpackJsonp=window.webpackJsonp||[]).push([[37],{1373:function(e,t,
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (65536), with no line terminators
                                                    Category:downloaded
                                                    Size (bytes):1099135
                                                    Entropy (8bit):5.139151858449958
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:AD1E6258EB8E7E2067F46D2ABD18CF20
                                                    SHA1:98B21502E3DB0C2273D578F1B9EC1BFB1D0832F1
                                                    SHA-256:87B41C98333FB4BD72D936A2C8B59D8CB71E604F70DC3F574EBC362F00906C31
                                                    SHA-512:0D4123075F0E12777FF81B7723978148C4FAC45B1BC84AB24A055004BC83D2AD47B89BE91AD8B5818A83C8104E435733A6189E686A80C7F4313FDC48A23BA64C
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://0093b71e39a6.11de9b12.us-east-1.token.awswaf.com/0093b71e39a6/478ed03bbf12/challenge.js
                                                    Preview:var a0_0x49b7=['MAX_AGE_SECONDS','{283807B5-2C60-11D0-A31D-00AA00B92C03}','startDecrypting','signedDataValidator','Could\x20not\x20compute\x20certificate\x20digest.\x20Unknown\x20message\x20digest\x20algorithm\x20OID.','Leftmost\x20octets\x20not\x20zero\x20as\x20expected','PuTTY-User-Key-File-2:\x20','X509\x20CERTIFICATE','getMetrics','__lastWatirPrompt','rsa','6029GpcwZv','collectedData','randomBytes','client\x20finished','forge.setImmediate','Certificate.signatureValue','3DES-CBC','Arno\x20Pro\x20Display','macKey','Garamond\x20Premr\x20Pro','Bradley\x20Hand\x20ITC','srcdoc','AES-ECB','1.2.840.113549.1.9.22.1','no_renegotiation','RC2-64-CBC','client_write_MAC_key','699nNwIod','gain','Certificate.TBSCertificate.validity.notBefore\x20(utc)','prefilled','messageLength64','captchaBlob','forge.pki.CertificateUnknown','generateLocalKeyId','capsEl','1.2.840.113549.3.7','verbose','rsapss','\x22maxline\x22\x20must\x20be\x20a\x20number.','hasOwnProperty','3075734tkrHMH','Encryption\x20block\x20
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (46236)
                                                    Category:dropped
                                                    Size (bytes):133361
                                                    Entropy (8bit):5.385645967304008
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:9ED43B72B16055C52552CB1BD7CAA86C
                                                    SHA1:45463B84D9B09AA80E5B5DDBE8B62CCBB7799528
                                                    SHA-256:20D9355AA5469AAA70754E9781549CEE10F9A5D6D67DB5E06B0A3816B0AE80B7
                                                    SHA-512:3DBBB0915F06F524D6EBE3A8D9FF6BF48DA5D0E0E877191F48F2203A7AD4EBA031BC893C437CB6F8B4C5CB89F125EAD7BCECD9F64E049014416A1A8E55DA5BDB
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview://@pilet v:2(webpackChunkpr_sharefiledevdynamicformspilet,{}).System.register(["@citrite/sf-api","@sharefiledev/antd-config","antd","react","react-dom","react-router-dom","tslib"],(function(e,t){var r={},n={},o={},i={},a={},s={},c={};return Object.defineProperty(i,"__esModule",{value:!0}),Object.defineProperty(c,"__esModule",{value:!0}),{setters:[function(e){r.ItemsEntity=e.ItemsEntity,r.Uploader=e.Uploader,r.UserRole=e.UserRole,r.UsersEntity=e.UsersEntity,r.ZoneService=e.ZoneService,r.createFile=e.createFile},function(e){n.colorPalette=e.colorPalette,n.sizes=e.sizes},function(e){o.Alert=e.Alert,o.App=e.App,o.Badge=e.Badge,o.Breadcrumb=e.Breadcrumb,o.Button=e.Button,o.Card=e.Card,o.Checkbox=e.Checkbox,o.Col=e.Col,o.Collapse=e.Collapse,o.DatePicker=e.DatePicker,o.Divider=e.Divider,o.Drawer=e.Drawer,o.Dropdown=e.Dropdown,o.Empty=e.Empty,o.Flex=e.Flex,o.Form=e.Form,o.Input=e.Input,o.InputNumber=e.InputNumber,o.Layout=e.Layout,o.Modal=e.Modal,o.Pagination=e.Pagination,o.Popconfirm=e.Popcon
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (65473)
                                                    Category:dropped
                                                    Size (bytes):463080
                                                    Entropy (8bit):5.533244118000855
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:B4C879D3598119E0E769C9A0E8A15BF0
                                                    SHA1:71033E9E99D02BEE24EACC78F53B732D015A5180
                                                    SHA-256:76DC987A272ADD4B49B7320E0BE515E771B22F08F29E6B6C434AC31EB60634BD
                                                    SHA-512:541C1A7EEB290C4C126A5C8DB3D3019D0B9291E7A20875B3537463A8F71B6E6EC25031B1FA96FCE5DF74B5B756DF04E149D6A8848B1E06EE9B18CCAA3DC42451
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview://@pilet v:2(webpackChunkpr_sharefiledevnotificationcenter,{}).System.register(["@citrite/sf-api","@sharefiledev/antd-config","antd","react","react-dom","react-router","tslib"],(function(e,t){var n={},r={},i={},a={},s={},o={},c={};return{setters:[function(e){n.UsersEntity=e.UsersEntity},function(e){r.colorPalette=e.colorPalette,r.sizes=e.sizes},function(e){i.Alert=e.Alert,i.Avatar=e.Avatar,i.Button=e.Button,i.Card=e.Card,i.Col=e.Col,i.Divider=e.Divider,i.Drawer=e.Drawer,i.Dropdown=e.Dropdown,i.Popover=e.Popover,i.Result=e.Result,i.Row=e.Row,i.Skeleton=e.Skeleton,i.Space=e.Space,i.Spin=e.Spin,i.Switch=e.Switch,i.Typography=e.Typography,i.notification=e.notification},function(e){a.Children=e.Children,a.createContext=e.createContext,a.createElement=e.createElement,a["default"]=e["default"],a.forwardRef=e.forwardRef,a.isValidElement=e.isValidElement,a.useCallback=e.useCallback,a.useContext=e.useContext,a.useEffect=e.useEffect,a.useReducer=e.useReducer,a.useRef=e.useRef,a.useState=e.useStat
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:Unicode text, UTF-8 text, with very long lines (65464)
                                                    Category:downloaded
                                                    Size (bytes):1482911
                                                    Entropy (8bit):5.889391822283771
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:514D63F3F284BF031A2EFD85CF5D7027
                                                    SHA1:3D7C7E1E045BF01305076602C5688F73D5EFBE5C
                                                    SHA-256:B1B12A07462EBB7E15E1FDDAD206153D52DB55A5ADAAC6C12D273E522BEEACCC
                                                    SHA-512:E50CC0BFE8D98F3287E10C3C8F7A74F284CFA370FB1D019E4CA87B67CD7AC3BFE4C77F27D00DBFD4D69BCE1F08EAD139793779D5B6EAEEAFBBDC1271D51C5780
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://piletfeed-cdn.sharefile.io/sharefile-web/sharefiledev-workflows-pilet/0.120.9/package/dist/index.js
                                                    Preview://@pilet v:2(webpackChunkpr_sharefiledevworkflowspilet,{}).System.register(["react","antd","react-dom","tslib","@citrite/sf-api","react-router-dom","@sharefiledev/antd-config","react-router"],(function(e,t){var n={},r={},o={},a={},i={},s={},l={},c={};return Object.defineProperty(n,"__esModule",{value:!0}),Object.defineProperty(o,"__esModule",{value:!0}),{setters:[function(e){Object.keys(e).forEach((function(t){n[t]=e[t]}))},function(e){r.Alert=e.Alert,r.App=e.App,r.Avatar=e.Avatar,r.Badge=e.Badge,r.Button=e.Button,r.Card=e.Card,r.Col=e.Col,r.Divider=e.Divider,r.Dropdown=e.Dropdown,r.Flex=e.Flex,r.Form=e.Form,r.Input=e.Input,r.List=e.List,r.Menu=e.Menu,r.Modal=e.Modal,r.Row=e.Row,r.Select=e.Select,r.Skeleton=e.Skeleton,r.Spin=e.Spin,r.Steps=e.Steps,r.Switch=e.Switch,r.Tabs=e.Tabs,r.Tooltip=e.Tooltip,r.Typography=e.Typography,r.notification=e.notification,r.theme=e.theme},function(e){Object.keys(e).forEach((function(t){o[t]=e[t]}))},function(e){a.__assign=e.__assign,a.__awaiter=e.__await
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (65476)
                                                    Category:downloaded
                                                    Size (bytes):355264
                                                    Entropy (8bit):5.467504857512104
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:CD405D48FDFD34CB6BE76832783F37FC
                                                    SHA1:FDBDB25E7AD92F6FD62795628245DE63889260C8
                                                    SHA-256:87B9B8A9111F396AAD39CFBD33812CC9DB2F5F0C2B27C103E3D9F54F4A68A092
                                                    SHA-512:27D0C4BB8D4DC7DCF685F6CB44281F9DC5FCD5B71C9428ED173522C933C59051CE209FEF9104E96F0C48E700F15F13F4459C81721B23982872C6DA0386B25223
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://piletfeed-cdn.sharefile.io/sharefile-web/sharefiledev-client-dashboard/0.181.0/package/dist/index.js
                                                    Preview://@pilet v:2(webpackChunkpr_sharefiledevclientdashboard,{}).System.register(["@citrite/sf-api","@sharefiledev/antd-config","antd","react","react-router-dom","tslib"],(function(e,t){var n={},r={},l={},o={},i={},c={};return{setters:[function(e){n.AccountsEntity=e.AccountsEntity,n.ItemsEntity=e.ItemsEntity},function(e){r.colorPalette=e.colorPalette,r.sizes=e.sizes},function(e){l.Avatar=e.Avatar,l.Button=e.Button,l.Divider=e.Divider,l.Dropdown=e.Dropdown,l.Flex=e.Flex,l.Grid=e.Grid,l.Image=e.Image,l.Layout=e.Layout,l.Popover=e.Popover,l.Skeleton=e.Skeleton,l.Space=e.Space,l.Spin=e.Spin,l.Typography=e.Typography,l.theme=e.theme},function(e){o.Children=e.Children,o.Fragment=e.Fragment,o.Suspense=e.Suspense,o.createContext=e.createContext,o.createElement=e.createElement,o["default"]=e["default"],o.forwardRef=e.forwardRef,o.isValidElement=e.isValidElement,o.lazy=e.lazy,o.useCallback=e.useCallback,o.useContext=e.useContext,o.useEffect=e.useEffect,o.useLayoutEffect=e.useLayoutEffect,o.useMemo=e.
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (65473)
                                                    Category:downloaded
                                                    Size (bytes):131500
                                                    Entropy (8bit):5.345244687137005
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:275AF639A62E1F77EA95FD60B6EA5296
                                                    SHA1:ADE0AB5543F039088DF130177EDD0D0898B7E4D7
                                                    SHA-256:58D80FF423BA00AFBEE0537681FA3C525030C84159056C280B4FD11A84556E53
                                                    SHA-512:F04AB97484B008372C702EED51D3B049C2828380C925571D2356891B37EC0A9DA552711370F0D725747F1C3DFDFD47B941ACBA1243E5897BAD57AE65C5EDA502
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://piletfeed-cdn.sharefile.io/sharefile-web/sharefiledev-storage-plugin-pilet/1.2.0/package/dist/index.js
                                                    Preview://@pilet v:2(webpackChunkpr_sharefiledevstoragepluginpilet,{}).System.register(["@citrite/sf-api","@sharefiledev/antd-config","antd","react","react-dom","react-router-dom","tslib"],(function(e,t){var n={},r={},o={},i={},a={},s={},u={};return Object.defineProperty(i,"__esModule",{value:!0}),Object.defineProperty(u,"__esModule",{value:!0}),{setters:[function(e){n.AccountsEntity=e.AccountsEntity,n.Api=e.Api,n.CapabilitiesEntity=e.CapabilitiesEntity,n.CapabilityName=e.CapabilityName,n.ContactListType=e.ContactListType,n.ContactsEntity=e.ContactsEntity,n.CustomWorkflowBundleType=e.CustomWorkflowBundleType,n.DocumentApprovalWorkflowAction=e.DocumentApprovalWorkflowAction,n.EncryptedEmailsEntity=e.EncryptedEmailsEntity,n.ExceptionReason=e.ExceptionReason,n.FileAction=e.FileAction,n.FileLockEntity=e.FileLockEntity,n.FileVirusStatus=e.FileVirusStatus,n.IntegrationProvider=e.IntegrationProvider,n.IntegrationsEntity=e.IntegrationsEntity,n.ItemOperations=e.ItemOperations,n.ItemOrderingMode=e.ItemO
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text
                                                    Category:downloaded
                                                    Size (bytes):819
                                                    Entropy (8bit):4.7468253845545645
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:959F46F67438369C413F903156848BD0
                                                    SHA1:0DAF348389DA6CE4DCC2CBE71E0589C26F6BBDAB
                                                    SHA-256:8C52987FBC48500C2A81BD52F81D44324E31E7ECADBEBD111A02F912BE232CFD
                                                    SHA-512:D3385ABE556BB749AAEDF1400A66BF7FBBE5A57562CB0A0D133BA0399320C3FB4DE2860339287D1CF04AC04A10DBA5D7A230E2633C6B24BD3EE836E5178F6594
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://link.edgepilot.com/css/app.css?v=1
                                                    Preview:nav.navbar {. min-height: 80px ! important;. background-color: inherit ! important;. border-color: transparent ! important;. margin-bottom: 5px ! important;.}.nav.navbar > * {. min-height: 80px;.}..navbar-brand {. height: 70px;. margin: 0 0 0 0;. padding: 0 0 0 20px;.}.li.navbar-brand {. vertical-align: middle ! important;. line-height: 70px;.}.#logo {. height: 70px;. padding: 0 0 0 0;. margin: 0 0 0 0;.}.#details-toggle {. font-size: 16px;. color: #333333;. display: inline-block;. margin-top: 15px;.}..filter-explanation-link {. color: #333333;.}.#filter-details {. margin-top: 15px;.}.#score-breakdown {. height: 300px;. line-height: 300px;.}.#score-table {. margin-top: 30px;.}.#loading-animation {. margin-top: -50px;. margin-bottom: -50px;.}.* {. word-break: break-all ! important;.}.
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (65371)
                                                    Category:downloaded
                                                    Size (bytes):121200
                                                    Entropy (8bit):5.0982146191887106
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:EC3BB52A00E176A7181D454DFFAEA219
                                                    SHA1:6527D8BF3E1E9368BAB8C7B60F56BC01FA3AFD68
                                                    SHA-256:F75E846CC83BD11432F4B1E21A45F31BC85283D11D372F7B19ACCD1BF6A2635C
                                                    SHA-512:E8C5DAF01EAE68ED7C1E277A6E544C7AD108A0FA877FB531D6D9F2210769B7DA88E4E002C7B0BE3B72154EBF7CBF01A795C8342CE2DAD368BD6351E956195F8B
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/bootstrap.min.css
                                                    Preview:/*!. * Bootstrap v3.3.7 (http://getbootstrap.com). * Copyright 2011-2016 Twitter, Inc.. * Licensed under MIT (https://github.com/twbs/bootstrap/blob/master/LICENSE). *//*! normalize.css v3.0.3 | MIT License | github.com/necolas/normalize.css */html{font-family:sans-serif;-webkit-text-size-adjust:100%;-ms-text-size-adjust:100%}body{margin:0}article,aside,details,figcaption,figure,footer,header,hgroup,main,menu,nav,section,summary{display:block}audio,canvas,progress,video{display:inline-block;vertical-align:baseline}audio:not([controls]){display:none;height:0}[hidden],template{display:none}a{background-color:transparent}a:active,a:hover{outline:0}abbr[title]{border-bottom:1px dotted}b,strong{font-weight:700}dfn{font-style:italic}h1{margin:.67em 0;font-size:2em}mark{color:#000;background:#ff0}small{font-size:80%}sub,sup{position:relative;font-size:75%;line-height:0;vertical-align:baseline}sup{top:-.5em}sub{bottom:-.25em}img{border:0}svg:not(:root){overflow:hidden}figure{margin:1em 40px}hr
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (65475)
                                                    Category:dropped
                                                    Size (bytes):1036348
                                                    Entropy (8bit):5.817151661206228
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:EF6C50332B5E5E567F6A99C5D5F87E56
                                                    SHA1:A34CB792FCA2BBFBC571A44F9C985087551A2DCC
                                                    SHA-256:EEB76B0472A03DA11EC3081F315D44D8D47387040B8252C5944343A1F9A7D52A
                                                    SHA-512:7C05821AF219393764D7F6B1D207288B4CD1F1536704A03EE3D30C0E1E396B2E7DB8859ACE6A16A57FB2F4CEF7EE89843ED99ED88E2A3B1448AC617EF92C4AD0
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview://@pilet v:2(webpackChunkpr_sharefiledevresourcegenpilet,{}).System.register(["@citrite/sf-api","@sharefiledev/antd-config","antd","react","react-router-dom","tslib"],(function(e,t){var n={},r={},i={},a={},s={},o={};return Object.defineProperty(a,"__esModule",{value:!0}),{setters:[function(e){n.Api=e.Api},function(e){r.colorPalette=e.colorPalette},function(e){i.Alert=e.Alert,i.Button=e.Button,i.Checkbox=e.Checkbox,i.Collapse=e.Collapse,i.DatePicker=e.DatePicker,i.Divider=e.Divider,i.Drawer=e.Drawer,i.Flex=e.Flex,i.Form=e.Form,i.Input=e.Input,i.Select=e.Select,i.Slider=e.Slider,i.Space=e.Space,i.Spin=e.Spin,i.Typography=e.Typography,i.theme=e.theme},function(e){Object.keys(e).forEach((function(t){a[t]=e[t]}))},function(e){s.Redirect=e.Redirect},function(e){o.__awaiter=e.__awaiter,o.__rest=e.__rest}],execute:function(){e((()=>{var e,l,c={5655:(e,t,n)=>{"use strict";n.d(t,{A:()=>ae});var r=function(){function e(e){var t=this;this._insertTag=function(e){var n;n=0===t.tags.length?t.insertio
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (65479)
                                                    Category:dropped
                                                    Size (bytes):225101
                                                    Entropy (8bit):5.408121493868668
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:17F623A8A7BE369C0194D4F492D9DCBF
                                                    SHA1:2BB9D23EA232DDC8C1DCB4613EBEE202CC27D5E0
                                                    SHA-256:B92A0D95FDC24ADD33A8F3984DEA9346029DD88A0ABF81BBC27B65850E517166
                                                    SHA-512:FD80FCB01D0D8B1131CAFE7DB216B615EC7E77525F13ACFACF02CB93A98893BB5280C1AC27984018A7CBEA24DC899B1CD4D868C8B0609C00076A6260D79672FA
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview://@pilet v:2(webpackChunkpr_sharefiledevpackagepilet,{}).System.register(["@citrite/sf-api","@sharefiledev/antd-config","antd","react","tslib"],(function(e,t){var r={},n={},i={},o={},a={};return Object.defineProperty(i,"__esModule",{value:!0}),Object.defineProperty(o,"__esModule",{value:!0}),Object.defineProperty(a,"__esModule",{value:!0}),{setters:[function(e){r.ItemsEntity=e.ItemsEntity,r.Uploader=e.Uploader,r.UserRole=e.UserRole,r.ZoneService=e.ZoneService,r.createFile=e.createFile},function(e){n.sizes=e.sizes},function(e){Object.keys(e).forEach((function(t){i[t]=e[t]}))},function(e){Object.keys(e).forEach((function(t){o[t]=e[t]}))},function(e){Object.keys(e).forEach((function(t){a[t]=e[t]}))}],execute:function(){e((()=>{var e,s,u,c,l={80780:(e,t,r)=>{"use strict";r.d(t,{A:()=>de});var n=r(58168),i=r(64467);function o(e,t){var r=Object.keys(e);if(Object.getOwnPropertySymbols){var n=Object.getOwnPropertySymbols(e);t&&(n=n.filter((function(t){return Object.getOwnPropertyDescriptor(e,t
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:SVG Scalable Vector Graphics image
                                                    Category:dropped
                                                    Size (bytes):1592
                                                    Entropy (8bit):4.205005284721148
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:4E48046CE74F4B89D45037C90576BFAC
                                                    SHA1:4A41B3B51ED787F7B33294202DA72220C7CD2C32
                                                    SHA-256:8E6DB1634F1812D42516778FC890010AA57F3E39914FB4803DF2C38ABBF56D93
                                                    SHA-512:B2BBA2A68EDAA1A08CFA31ED058AFB5E6A3150AABB9A78DB9F5CCC2364186D44A015986A57707B57E2CC855FA7DA57861AD19FC4E7006C2C239C98063FE903CF
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:<svg xmlns="http://www.w3.org/2000/svg" width="48" height="48" viewBox="0 0 48 48"><defs><style>.a{fill:none;}.b{fill:#404040;}</style></defs><rect class="a" width="48" height="48"/><path class="b" d="M40,32.578V40H32V36H28V32H24V28.766A10.689,10.689,0,0,1,19,30a10.9,10.9,0,0,1-5.547-1.5,11.106,11.106,0,0,1-2.219-1.719A11.373,11.373,0,0,1,9.5,24.547a10.4,10.4,0,0,1-1.109-2.625A11.616,11.616,0,0,1,8,19a10.9,10.9,0,0,1,1.5-5.547,11.106,11.106,0,0,1,1.719-2.219A11.373,11.373,0,0,1,13.453,9.5a10.4,10.4,0,0,1,2.625-1.109A11.616,11.616,0,0,1,19,8a10.9,10.9,0,0,1,5.547,1.5,11.106,11.106,0,0,1,2.219,1.719A11.373,11.373,0,0,1,28.5,13.453a10.4,10.4,0,0,1,1.109,2.625A11.616,11.616,0,0,1,30,19a10.015,10.015,0,0,1-.125,1.578,10.879,10.879,0,0,1-.359,1.531Zm-2,.844L27.219,22.641a14.716,14.716,0,0,0,.562-1.782A7.751,7.751,0,0,0,28,19a8.786,8.786,0,0,0-.7-3.5,8.9,8.9,0,0,0-1.938-2.859A9.269,9.269,0,0,0,22.5,10.719,8.9,8.9,0,0,0,19,10a8.786,8.786,0,0,0-3.5.7,8.9,8.9,0,0,0-2.859,1.938A9.269,9.269,0,0,0,
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (65477)
                                                    Category:downloaded
                                                    Size (bytes):188870
                                                    Entropy (8bit):5.316783423719702
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:3EB98FC30E286B34AE6A699333C2B13C
                                                    SHA1:77C23C14692750726264F041C4A4A5AE8500F342
                                                    SHA-256:A32F71A5A80553B0D31399E96A2288F045B600E289446F601D032909AB5B6614
                                                    SHA-512:A1D7564C6D92A10087C813DC68FAA3C4B031B5BD97FB435B4C7470B8FF73218A6D74B24F5AA6786F0A98FF1C8BF2457728358BADE24037FCFF4732B2ED2E21AC
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://piletfeed-cdn.sharefile.io/sharefile-web/sharefiledev-publisher-pilet/0.17.11/package/dist/index.js
                                                    Preview://@pilet v:2(webpackChunkpr_sharefiledevpublisherpilet,{}).System.register(["react","react-dom","tslib"],(function(e,t){var r={},n={},o={};return Object.defineProperty(r,"__esModule",{value:!0}),Object.defineProperty(n,"__esModule",{value:!0}),{setters:[function(e){Object.keys(e).forEach((function(t){r[t]=e[t]}))},function(e){Object.keys(e).forEach((function(t){n[t]=e[t]}))},function(e){o.__awaiter=e.__awaiter,o.__rest=e.__rest}],execute:function(){e((()=>{var e,i,s={2910:(e,t,r)=>{"use strict";r.d(t,{FK:()=>ke,Y:()=>Te,FD:()=>je});var n=r(4848),o=r(4726);var i=function(){function e(e){var t=this;this._insertTag=function(e){var r;r=0===t.tags.length?t.insertionPoint?t.insertionPoint.nextSibling:t.prepend?t.container.firstChild:t.before:t.tags[t.tags.length-1].nextSibling,t.container.insertBefore(e,r),t.tags.push(e)},this.isSpeedy=e.speedy===undefined||e.speedy,this.tags=[],this.ctr=0,this.nonce=e.nonce,this.key=e.key,this.container=e.container,this.prepend=e.prepend,this.insertionPoint
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (65536), with no line terminators
                                                    Category:dropped
                                                    Size (bytes):1099135
                                                    Entropy (8bit):5.139089463221325
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:DAA625E701A448D22851BDC9C02F8FD4
                                                    SHA1:61E93275A97FC91C5AFD2D7394A0CDCE3A69E24C
                                                    SHA-256:73CD7B955AF5BFFFEBE2C2AE7B8F97FDB5223D6208AA25798740CC17DD2A0237
                                                    SHA-512:840ED60CC0AC907CA68DED88CCD958C2A3FA5D2921F652D615E2F6BBB9A6D3B988FE248ABC297807DBB820C5357561C1B5D6E3E151D1DB4F1072809ACB1FC0DE
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:var a0_0x49b7=['MAX_AGE_SECONDS','{283807B5-2C60-11D0-A31D-00AA00B92C03}','startDecrypting','signedDataValidator','Could\x20not\x20compute\x20certificate\x20digest.\x20Unknown\x20message\x20digest\x20algorithm\x20OID.','Leftmost\x20octets\x20not\x20zero\x20as\x20expected','PuTTY-User-Key-File-2:\x20','X509\x20CERTIFICATE','getMetrics','__lastWatirPrompt','rsa','6029GpcwZv','collectedData','randomBytes','client\x20finished','forge.setImmediate','Certificate.signatureValue','3DES-CBC','Arno\x20Pro\x20Display','macKey','Garamond\x20Premr\x20Pro','Bradley\x20Hand\x20ITC','srcdoc','AES-ECB','1.2.840.113549.1.9.22.1','no_renegotiation','RC2-64-CBC','client_write_MAC_key','699nNwIod','gain','Certificate.TBSCertificate.validity.notBefore\x20(utc)','prefilled','messageLength64','captchaBlob','forge.pki.CertificateUnknown','generateLocalKeyId','capsEl','1.2.840.113549.3.7','verbose','rsapss','\x22maxline\x22\x20must\x20be\x20a\x20number.','hasOwnProperty','3075734tkrHMH','Encryption\x20block\x20
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:downloaded
                                                    Size (bytes):36
                                                    Entropy (8bit):4.503258334775644
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:06B313E93DD76909460FBFC0CD98CB6B
                                                    SHA1:C4F9B2BBD840A4328F85F54873C434336A193888
                                                    SHA-256:B4532478707B495D0BB1C21C314AEF959DD1A5E0F66E52DAD5FC332C8B697CBA
                                                    SHA-512:EFD7E8195D9C126883C71FED3EFEDE55916848B784F8434ED2677DF5004436F7EDE9F80277CB4675C4DEB8F243B2705A3806B412FAA8842E039E9DC467C11645
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISFwmCAmly1gHbXRIFDdFbUVISBQ1Xevf9?alt=proto
                                                    Preview:ChgKDQ3RW1FSGgQIVhgCIAEKBw1Xevf9GgA=
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:Unicode text, UTF-8 text, with very long lines (65399)
                                                    Category:downloaded
                                                    Size (bytes):904512
                                                    Entropy (8bit):5.71994782288608
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:4BCA71B5E96BA1017D2F126850C99835
                                                    SHA1:E48A42C801197D142912941554398979EEE0A639
                                                    SHA-256:6B98719775F73C629E39427EDF4D3A67506C6AF5E7ED2C9C80F630A1EE0ED03E
                                                    SHA-512:9524339F39E746523AC7931388045BB5DDDDDD7D7E777543236188B95C78E4FEF1A493045C8BD6E48BC52B55017B3EE44B6A6E7577235AF6FA8C101D277F273B
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://piletfeed-cdn.sharefile.io/sharefile-web/sharefiledev-threatalert-mgt-pilet/1.14.0/package/dist/index.js
                                                    Preview://@pilet v:2(webpackChunkpr_sharefiledevthreatalertmgtpilet,{"@citrite/citrix-ui@25.46.0":"citrite-citrix-ui.js"}).System.register(["react","@citrite/citrix-ui@25.46.0","tslib","react-dom"],(function(e,t){var n={},r={},o={},i={};return Object.defineProperty(n,"__esModule",{value:!0}),{setters:[function(e){Object.keys(e).forEach((function(t){n[t]=e[t]}))},function(e){r.AlertErrorIcon=e.AlertErrorIcon,r.Button=e.Button,r.Checkbox=e.Checkbox,r.CircleOutlinedXIcon=e.CircleOutlinedXIcon,r.EmptyState=e.EmptyState,r.LoadingPrimary=e.LoadingPrimary,r.PageTitle=e.PageTitle,r.SettingsField=e.SettingsField,r.ThemeColor=e.ThemeColor,r.Toggle=e.Toggle,r.fromThemeColors=e.fromThemeColors,r.notifyError=e.notifyError,r.notifySuccess=e.notifySuccess},function(e){o.__assign=e.__assign,o.__awaiter=e.__awaiter},function(e){i["default"]=e["default"],i.findDOMNode=e.findDOMNode,i.flushSync=e.flushSync}],execute:function(){e((()=>{var e={9272:(e,t,n)=>{"use strict";var r=n(723),o=[],i=[],a=r.makeRequestCallF
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (45797)
                                                    Category:downloaded
                                                    Size (bytes):406986
                                                    Entropy (8bit):5.31836569617146
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:E40761677762EAB0692F86B259C7D744
                                                    SHA1:34A9B50CEC6E1163CEEFCD4D394DB6524C89A854
                                                    SHA-256:DA4A8DF0C326292B5BEE9C732B3C962FD67AAF2F99D850F1BF65068D573C5619
                                                    SHA-512:04FA1D6074AD24E3ABAB53D1DE116A6B39B4BE3DFABC082427F1C5A169E50527561F160CC133C2AC4AEDC4E7AC404572F60E531A4618111EA74D138B2B0DD034
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://aadcdn.msftauth.net/shared/1.0/content/js/asyncchunk/convergedlogin_pcustomizationloader_117b650bccea354984d8.js
                                                    Preview:/*!. * ------------------------------------------- START OF THIRD PARTY NOTICE -----------------------------------------. * . * This file is based on or incorporates material from the projects listed below (Third Party IP). The original copyright notice and the license under which Microsoft received such Third Party IP, are set forth below. Such licenses and notices are provided for informational purposes only. Microsoft licenses the Third Party IP to you under the licensing terms for the Microsoft product. Microsoft reserves all other rights not expressly granted under this agreement, whether by implication, estoppel or otherwise.. * . * json2.js (2016-05-01). * https://github.com/douglascrockford/JSON-js. * License: Public Domain. * . * Provided for Informational Purposes Only. * . * ----------------------------------------------- END OF THIRD PARTY NOTICE ------------------------------------------. */.(window.webpackJsonp=window.webpackJsonp||[]).push([[8],Array(533).concat([f
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (65479)
                                                    Category:downloaded
                                                    Size (bytes):98732
                                                    Entropy (8bit):5.344399340470534
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:CDCA5117242386D7CABB8C5CDEE3F9A1
                                                    SHA1:E79CED8986A52C729CBBD2C876D0DC25C0FFD33D
                                                    SHA-256:579901D2E27F2ED03F94DE3602CF3A15EDB7C307E6D0E325E663A8A75C81B036
                                                    SHA-512:961A123E53AFFD196AF2F61AFF83A72DCC7EE36B98680ABB1EEE796FBE1409EC767B5E49652D9663EA10BF6C59EDB7A1B16E79CDB2D4D6A3F0E0337FE40D8666
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://piletfeed-cdn.sharefile.io/sharefile-web/sharefiledev-billing-pilet/0.1.121/package/dist/index.js
                                                    Preview://@pilet v:2(webpackChunkpr_sharefiledevbillingpilet,{}).System.register(["@citrite/sf-api","@sharefiledev/antd-config","antd","react","react-dom","react-router","react-router-dom","tslib"],(function(e,t){var n={},r={},i={},o={},a={},s={},u={},c={};return Object.defineProperty(o,"__esModule",{value:!0}),{setters:[function(e){n.AccountFeatures=e.AccountFeatures,n.Api=e.Api,n.BillingEntity=e.BillingEntity,n.CountriesEntity=e.CountriesEntity,n.CurrencyCode=e.CurrencyCode,n.PaymentAuthorizationEntity=e.PaymentAuthorizationEntity,n.UserRole=e.UserRole},function(e){r.colorPalette=e.colorPalette,r.sizes=e.sizes},function(e){i.Alert=e.Alert,i.App=e.App,i.Button=e.Button,i.Card=e.Card,i.Col=e.Col,i.Divider=e.Divider,i.Flex=e.Flex,i.Form=e.Form,i.Grid=e.Grid,i.Image=e.Image,i.Input=e.Input,i.InputNumber=e.InputNumber,i.Layout=e.Layout,i.Modal=e.Modal,i.Radio=e.Radio,i.Row=e.Row,i.Segmented=e.Segmented,i.Select=e.Select,i.Skeleton=e.Skeleton,i.Space=e.Space,i.Spin=e.Spin,i.Table=e.Table,i.Tag=e.T
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (65477)
                                                    Category:downloaded
                                                    Size (bytes):694747
                                                    Entropy (8bit):5.968637255720328
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:30F6FF4CC9B4CB4A5FC2BA1C682CCE69
                                                    SHA1:95DC0821774F314043A6ABEC663BDB1CE6E31C34
                                                    SHA-256:6B435B612F427B879177B34777497EFA3FBE15FB075541CAFAD9B000A6911D8E
                                                    SHA-512:F083DD24DA79446238A7061B03930DB29366C8F8061791833E442E0852481695A405C4A36AA3E25AE516D39B465FB2E63966866E24B6A9AE8FAA869F81CB4600
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://piletfeed-cdn.sharefile.io/sharefile-web/sharefiledev-templates-pilet/0.110.3/package/dist/index.js
                                                    Preview://@pilet v:2(webpackChunkpr_sharefiledevtemplatespilet,{}).System.register(["@citrite/sf-api","@sharefiledev/antd-config","antd","react","react-dom","react-router","react-router-dom","tslib"],(function(e,t){var n={},r={},a={},i={},s={},o={},l={},u={};return Object.defineProperty(i,"__esModule",{value:!0}),Object.defineProperty(s,"__esModule",{value:!0}),Object.defineProperty(u,"__esModule",{value:!0}),{setters:[function(e){n.ItemsEntity=e.ItemsEntity,n.Uploader=e.Uploader,n.UsersEntity=e.UsersEntity,n.ZoneService=e.ZoneService,n.createFile=e.createFile},function(e){r.colorPalette=e.colorPalette,r.sizes=e.sizes},function(e){a.Alert=e.Alert,a.App=e.App,a.Avatar=e.Avatar,a.Button=e.Button,a.Card=e.Card,a.Checkbox=e.Checkbox,a.Col=e.Col,a.Collapse=e.Collapse,a.Divider=e.Divider,a.Drawer=e.Drawer,a.Dropdown=e.Dropdown,a.Flex=e.Flex,a.Form=e.Form,a.Input=e.Input,a.Layout=e.Layout,a.List=e.List,a.Menu=e.Menu,a.Modal=e.Modal,a.Result=e.Result,a.Row=e.Row,a.Select=e.Select,a.Skeleton=e.Skeleton
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (1456)
                                                    Category:downloaded
                                                    Size (bytes):1492
                                                    Entropy (8bit):5.158827164846835
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:F17CADE455C1E9DF4641950A02B898EC
                                                    SHA1:416716233F1A8EA7201A7DC0F218178516CC0E37
                                                    SHA-256:06D24BF97F48A83E5D0AA3C508620BA5BEC38AD6959626CD1BA631D1C9520914
                                                    SHA-512:D2D557FAE36537BE89518AF4A0608FAFB4B92CAEA3CED070C2AA693EB51E606D865932823C56D90423DB8217353C9166FC77732201364AFA3F76D7DA5731C56A
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://piletfeed-cdn.sharefile.io/sharefile-web/sharefiledev-dynamic-forms-pilet/1.31.0/package/dist/main.css
                                                    Preview:@font-face{ascent-override:95%;font-family:PPMori;font-style:normal;font-weight:300;src:url(402b74053d26323596b3.woff2) format("woff2"),url(822249fd1980c2cf76d8.woff) format("woff")}@font-face{ascent-override:95%;font-family:PPMori;font-style:italic;font-weight:300;src:url(d539f1e6177630654d7a.woff2) format("woff2"),url(03d1fbfb34140c8b62bb.woff) format("woff")}@font-face{ascent-override:95%;font-family:PPMori;font-style:normal;font-weight:400;src:url(af15e31c70fab7cfd55c.woff2) format("woff2"),url(4d713186ee128a842a8a.woff) format("woff")}@font-face{ascent-override:95%;font-family:PPMori;font-style:italic;font-weight:400;src:url(f1e72df265e116587589.woff2) format("woff2"),url(0e2359dcf69d17da12a3.woff) format("woff")}@font-face{ascent-override:95%;font-family:PPMori;font-style:normal;font-weight:500;src:url(91306a69f84f808e9310.woff2) format("woff2"),url(6eea0c96234d4e052d5a.woff) format("woff")}@font-face{ascent-override:95%;font-family:PPMori;font-style:italic;font-weight:500;src:ur
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (65474)
                                                    Category:downloaded
                                                    Size (bytes):636552
                                                    Entropy (8bit):5.522591624289252
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:FA4A01AFB66CFCB3D038114EA3A75CA7
                                                    SHA1:232758611DCD454B457AFFF3ACAAFF84347CC9CD
                                                    SHA-256:54F92E21B8BC4258314DF0A816700DDE22456B914D35A6AB6A522EA1767C577B
                                                    SHA-512:38D02C94FF4C52E3F8D9CF32B1D8EEF75770FEEEDD46A66CAFF35C34D44CEE19A915F807F6E5B0A8E60DB4C03038B94CE8112E83F19D9552D31AE36698744A8E
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://piletfeed-cdn.sharefile.io/sharefile-web/sharefiledev-integrations-pilet/0.0.175/package/dist/index.js
                                                    Preview://@pilet v:2(webpackChunkpr_sharefiledevintegrationspilet,{}).System.register(["@sharefiledev/antd-config","antd","react","react-dom"],(function(e,t){var n={},r={},o={},i={};return Object.defineProperty(o,"__esModule",{value:!0}),{setters:[function(e){n.sizes=e.sizes},function(e){r.Alert=e.Alert,r.AutoComplete=e.AutoComplete,r.Avatar=e.Avatar,r.Badge=e.Badge,r.Button=e.Button,r.Col=e.Col,r.Collapse=e.Collapse,r.ConfigProvider=e.ConfigProvider,r.Divider=e.Divider,r.Drawer=e.Drawer,r.Flex=e.Flex,r.Form=e.Form,r.Input=e.Input,r.Layout=e.Layout,r.Menu=e.Menu,r.Modal=e.Modal,r.Row=e.Row,r.Select=e.Select,r.Space=e.Space,r.Spin=e.Spin,r.Table=e.Table,r.Tabs=e.Tabs,r.Tag=e.Tag,r.Typography=e.Typography,r.notification=e.notification,r.theme=e.theme},function(e){Object.keys(e).forEach((function(t){o[t]=e[t]}))},function(e){i["default"]=e["default"],i.findDOMNode=e.findDOMNode,i.flushSync=e.flushSync}],execute:function(){e((()=>{var e,a,s={9178:(e,t,n)=>{"use strict";function r(e){var t,n,r=argu
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (65480)
                                                    Category:dropped
                                                    Size (bytes):178957
                                                    Entropy (8bit):5.329232951768454
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:826DA847895415A16E1D242AFD0F2BA7
                                                    SHA1:77C1F5AF0C7C230640B74C163313BE93427F3B51
                                                    SHA-256:8E68E217EEC68E833BE390E850C8E9DB8FE30FEA29AFEC22F2FF00CA3E80C25D
                                                    SHA-512:85E1368585DF066AF2BAC194AE9E1D611E7B973535659D83CB490273C294DEDBB180DC3DB5718225B5C660BD9A92DD3B4B8F999FA197EA6B48CF85F74B903F78
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview://@pilet v:2(webpackChunkpr_sharefiledevclientpilet,{}).System.register(["@citrite/sf-api","@sharefiledev/antd-config","antd","react","react-dom","react-router","react-router-dom","tslib"],(function(e,n){var t={},r={},i={},o={},a={},s={},u={},c={};return Object.defineProperty(o,"__esModule",{value:!0}),{setters:[function(e){t.AccountsEntity=e.AccountsEntity,t.Api=e.Api,t.AppsEntity=e.AppsEntity,t.CapabilitiesEntity=e.CapabilitiesEntity,t.CapabilityName=e.CapabilityName,t.ContactListType=e.ContactListType,t.ContactsEntity=e.ContactsEntity,t.CustomWorkflowBundleType=e.CustomWorkflowBundleType,t.DocumentApprovalWorkflowAction=e.DocumentApprovalWorkflowAction,t.EncryptedEmailsEntity=e.EncryptedEmailsEntity,t.ExceptionReason=e.ExceptionReason,t.FavoritesEntity=e.FavoritesEntity,t.FileAction=e.FileAction,t.FileLockEntity=e.FileLockEntity,t.FileVirusStatus=e.FileVirusStatus,t.IntegrationProvider=e.IntegrationProvider,t.IntegrationsEntity=e.IntegrationsEntity,t.ItemOperations=e.ItemOperations,
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:Unicode text, UTF-8 text, with very long lines (48708)
                                                    Category:dropped
                                                    Size (bytes):197483
                                                    Entropy (8bit):5.368235778531096
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:22848DD2F996EF7B688FBC1CA0D957A1
                                                    SHA1:8C9D056B71B327AD7EF79611468E910A480F5B4E
                                                    SHA-256:C99418F90B1EBAEFF643C88B8528779D2AE882E1ED7560FD27FEA12FAC29C457
                                                    SHA-512:E193D93E98131767E8F2B6F3AA66B976DEB68A054644F7126257BEB675881918D149CB9921D7266C6D00E3C8253201E95979E7F740E8A3ACF6BD013A61D61C1B
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview://@pilet v:2(webpackChunkpr_sharefiledevdcpilet,{}).System.register(["@citrite/sf-api","@sharefiledev/antd-config","antd","react","react-dom","react-router","react-router-dom","tslib"],(function(e,t){var n={},r={},a={},i={},o={},s={},l={},c={};return Object.defineProperty(i,"__esModule",{value:!0}),Object.defineProperty(o,"__esModule",{value:!0}),{setters:[function(e){n.AccountsEntity=e.AccountsEntity,n.ContactListType=e.ContactListType,n.ItemsEntity=e.ItemsEntity,n.Uploader=e.Uploader,n.UserRole=e.UserRole,n.UsersEntity=e.UsersEntity,n.ZoneService=e.ZoneService,n.createFile=e.createFile},function(e){r.colorPalette=e.colorPalette,r.sizes=e.sizes},function(e){a.Badge=e.Badge,a.Button=e.Button,a.Card=e.Card,a.Col=e.Col,a.DatePicker=e.DatePicker,a.Drawer=e.Drawer,a.Dropdown=e.Dropdown,a.Flex=e.Flex,a.Form=e.Form,a.Image=e.Image,a.Input=e.Input,a.InputNumber=e.InputNumber,a.Modal=e.Modal,a.Popover=e.Popover,a.Row=e.Row,a.Select=e.Select,a.Skeleton=e.Skeleton,a.Space=e.Space,a.Spin=e.Spin,a
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:Unicode text, UTF-8 text, with very long lines (65402)
                                                    Category:downloaded
                                                    Size (bytes):221391
                                                    Entropy (8bit):5.505848799267894
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:B5D95B131A56925ED34B1CF110473319
                                                    SHA1:92E638C9042CEA3E57F02C110ABF2F76B69E7EE2
                                                    SHA-256:D0AE89E960445A175B51BB797B1EBC7E144A775C377900CF4EAB1B239104A206
                                                    SHA-512:9AC8D18DB3AFEBCB0E034154D91311411B0831C1BDE1E1DB8384B843E797B170E9880AB04E6E68AE9629E1159A2FE6E5C106E8AE145C9A9337C805B03CBE71B4
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://piletfeed-cdn.sharefile.io/sharefile-web/sharefiledev-user-actions-pilet/1.15.0/package/dist/index.js
                                                    Preview://@pilet v:2(webpackChunkpr_sharefiledevuseractionspilet,{"@citrite/citrix-ui@25.46.0":"citrite-citrix-ui.js"}).System.register(["@citrite/citrix-ui@25.46.0","react","react-router"],(function(e,t){var r={},n={},o={};return{setters:[function(e){r.confirmModal=e.confirmModal,r.notifyError=e.notifyError,r.notifySuccess=e.notifySuccess,r.warningConfirmModal=e.warningConfirmModal},function(e){n.createElement=e.createElement,n["default"]=e["default"]},function(e){o.useHistory=e.useHistory}],execute:function(){e((()=>{var e={9669:(e,t,r)=>{e.exports=r(1609)},5448:(e,t,r)=>{"use strict";var n=r(4867),o=r(6026),i=r(4372),s=r(5327),a=r(4097),u=r(4109),c=r(7985),l=r(7874),f=r(2648),d=r(644),p=r(205);e.exports=function(e){return new Promise((function(t,r){var h,g=e.data,m=e.headers,v=e.responseType;function y(){e.cancelToken&&e.cancelToken.unsubscribe(h),e.signal&&e.signal.removeEventListener("abort",h)}n.isFormData(g)&&n.isStandardBrowserEnv()&&delete m["Content-Type"];var b=new XMLHttpRequest;if
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:HTML document, ASCII text
                                                    Category:downloaded
                                                    Size (bytes):2631
                                                    Entropy (8bit):5.351339270258419
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:5AF927625E6EC5FA132F224E2F2BDBB9
                                                    SHA1:8EDC8CA3EF2A2A9BD7F74B2F1FF8F2076D01C090
                                                    SHA-256:A31C70D51A2D4FD1DC1BAA818EC0E6D936EE415F364C661EB789EAEC1A46BEC8
                                                    SHA-512:4C56AF64A3AD8F44C070138B11834A4C4C4D7A0FD83C7880FDE9D82E1C621849A3CA0C17FB77F10630F08B10BB4FC0D2553FAB947AA457FD8ED4DF41C0D45E1B
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://link.edgepilot.com/s/c6c5d4e5/oz5uFPEm10aK_RBwkmVvzQ?u=https://aro365150672-my.sharepoint.com/:b:/g/personal/rdhamija_gignac-associates_com/EVNHaSacx5JNmFtGs0SXCbIBgI50GJjSp_v8M3rndVz0Qg
                                                    Preview:<html>. <head>. <meta charset="utf-8">. <meta name="viewport" content="width=device-width, initial-scale=1" />. <title>Checking link...</title>. <link href="/css/app.css?v=1" rel="stylesheet">. <link href="//maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/bootstrap.min.css" rel="stylesheet" integrity="sha384-BVYiiSIFeK1dGmJRAkycuHAHRg32OmUcww7on3RYdg4Va+PmSTsz/K68vbdEjh4u" crossorigin="anonymous">. <script src="//code.jquery.com/jquery-3.2.1.min.js" integrity="sha256-hwg4gsxgFZhOsEEamdOYGBf13FyQuiTwlAQgxVSNgt4=" crossorigin="anonymous"></script>. <script src="//maxcdn.bootstrapcdn.com/bootstrap/3.3.7/js/bootstrap.min.js" integrity="sha384-Tc5IQib027qvyjSMfHjOMaLkfuWVxZxUPnCJA7l2mCWNIpG9mGCD8wGNIcPD7Txa" crossorigin="anonymous"></script>. <meta name="norton-safeweb-site-verification" content="vo5jo2vr2es9toa19icr3h7q2hi6r6wqxg2e2qy7s06inecm48l-xszjfgzrt97-wwnlobyo8751zji5y68-iv6m14v35a8xr0is-usi88c7u6tn57czk90oepmrfgw1" />. </head>. <body>. <nav class="navbar n
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (64616)
                                                    Category:downloaded
                                                    Size (bytes):449972
                                                    Entropy (8bit):5.4486277762255035
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:2330EDFA5D02BA27B4818454A04935E7
                                                    SHA1:405CDD0091FA7D25CE504F71086F488A6193BBD2
                                                    SHA-256:6379D57694ECB499626F889744FB47D1979DDE32C9F95BCAF48E318642A8C292
                                                    SHA-512:895E0ABAFD9444621E421EEEA49C722DFC4590765F7E76C1CFD38ADFA9430F03BBFEA23A37FDF8D8536DBA54ACDF315EF40224FB3D77836531016A341BC9B3D7
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://aadcdn.msftauth.net/shared/1.0/content/js/ConvergedLogin_PCore_IzDt-l0Cuie0gYRUoEk15w2.js
                                                    Preview:/*!. * ------------------------------------------- START OF THIRD PARTY NOTICE -----------------------------------------. * . * This file is based on or incorporates material from the projects listed below (Third Party IP). The original copyright notice and the license under which Microsoft received such Third Party IP, are set forth below. Such licenses and notices are provided for informational purposes only. Microsoft licenses the Third Party IP to you under the licensing terms for the Microsoft product. Microsoft reserves all other rights not expressly granted under this agreement, whether by implication, estoppel or otherwise.. * . * json2.js (2016-05-01). * https://github.com/douglascrockford/JSON-js. * License: Public Domain. * . * Provided for Informational Purposes Only. * . * ----------------------------------------------- END OF THIRD PARTY NOTICE ------------------------------------------. */!function(e){function n(n){for(var t,i,o=n[0],r=n[1],s=0,c=[];s<o.length;s++)
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
                                                    Category:dropped
                                                    Size (bytes):17174
                                                    Entropy (8bit):2.9129715116732746
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:12E3DAC858061D088023B2BD48E2FA96
                                                    SHA1:E08CE1A144ECEAE0C3C2EA7A9D6FBC5658F24CE5
                                                    SHA-256:90CDAF487716184E4034000935C605D1633926D348116D198F355A98B8C6CD21
                                                    SHA-512:C5030C55A855E7A9E20E22F4C70BF1E0F3C558A9B7D501CFAB6992AC2656AE5E41B050CCAC541EFA55F9603E0D349B247EB4912EE169D44044271789C719CD01
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview:..............h(..f...HH...........(..00......h....6.. ...........=...............@..........(....A..(....................(....................................."P.........................................."""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333""""""""""""""""""""""""""
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:Unicode text, UTF-8 text, with very long lines (65455)
                                                    Category:dropped
                                                    Size (bytes):172013
                                                    Entropy (8bit):5.431081569709545
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:1B4BEF66080AA287B1D9E5454FB07741
                                                    SHA1:621C5DBABD3ED48B1FA2064891EA257CAE258DB1
                                                    SHA-256:484C55D3B30B3EC6E1A967A348DAE66E5BF17DF6AEF6ABBF90D6BD824CBCA983
                                                    SHA-512:A5AC1F4515BF497CF8E3C07795001F247B3A092A8AB3E755D884075A99C731E5782E303011E6BAB28596BE0637CF775E713FFA1B1DD34016A63364E1595D80DE
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview://@pilet v:2(webpackChunkpr_sharefiledevtenantmgtpilet,{}).System.register(["react","react-dom","react-router-dom","tslib"],(function(e,t){var r={},n={},o={},i={};return Object.defineProperty(r,"__esModule",{value:!0}),{setters:[function(e){Object.keys(e).forEach((function(t){r[t]=e[t]}))},function(e){n["default"]=e["default"],n.findDOMNode=e.findDOMNode,n.flushSync=e.flushSync},function(e){o.Route=e.Route,o.Router=e.Router,o.Switch=e.Switch,o.useHistory=e.useHistory},function(e){i.__assign=e.__assign,i.__awaiter=e.__awaiter,i.__generator=e.__generator,i.__makeTemplateObject=e.__makeTemplateObject,i.__spreadArray=e.__spreadArray}],execute:function(){e((()=>{var e,a,s={458:(e,t,r)=>{"use strict";r.d(t,{AE:()=>j,jQ:()=>O,Qj:()=>C});var n=r(9669),o=r.n(n),i=r(4998),a=undefined&&undefined.__assign||function(){return a=Object.assign||function(e){for(var t,r=1,n=arguments.length;r<n;r++)for(var o in t=arguments[r])Object.prototype.hasOwnProperty.call(t,o)&&(e[o]=t[o]);return e},a.apply(this,
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:HTML document, ASCII text
                                                    Category:downloaded
                                                    Size (bytes):2590
                                                    Entropy (8bit):5.326455340471443
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:F3D4403ED51271F74C9CA939DF2BD46A
                                                    SHA1:2928C9802B43F45A7FFBECF8EDBB33D70229AF3A
                                                    SHA-256:A8C77EB91F8759642DEBAB71D26C58546E1E6BABF0C90DC2D08E8A95E26BC781
                                                    SHA-512:77793BFDE5CF91B47F766183BED8E330001C47AA9DDBFACB5D2EB319D113D86EA1343B7FB31BBFACC2ADCD236CCEDA15EBB5A29F6FA47E2E1DC6858B6C45C3D0
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://link.edgepilot.com/s/12f296c1/mkNEkUsCaUyhM6_YKKlYig?u=https://gignacarchitects.sharefile.com/public/share/web-sd99ebbc5c56741ceb96a1e5404c17f68
                                                    Preview:<html>. <head>. <meta charset="utf-8">. <meta name="viewport" content="width=device-width, initial-scale=1" />. <title>Checking link...</title>. <link href="/css/app.css?v=1" rel="stylesheet">. <link href="//maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/bootstrap.min.css" rel="stylesheet" integrity="sha384-BVYiiSIFeK1dGmJRAkycuHAHRg32OmUcww7on3RYdg4Va+PmSTsz/K68vbdEjh4u" crossorigin="anonymous">. <script src="//code.jquery.com/jquery-3.2.1.min.js" integrity="sha256-hwg4gsxgFZhOsEEamdOYGBf13FyQuiTwlAQgxVSNgt4=" crossorigin="anonymous"></script>. <script src="//maxcdn.bootstrapcdn.com/bootstrap/3.3.7/js/bootstrap.min.js" integrity="sha384-Tc5IQib027qvyjSMfHjOMaLkfuWVxZxUPnCJA7l2mCWNIpG9mGCD8wGNIcPD7Txa" crossorigin="anonymous"></script>. <meta name="norton-safeweb-site-verification" content="vo5jo2vr2es9toa19icr3h7q2hi6r6wqxg2e2qy7s06inecm48l-xszjfgzrt97-wwnlobyo8751zji5y68-iv6m14v35a8xr0is-usi88c7u6tn57czk90oepmrfgw1" />. </head>. <body>. <nav class="navbar n
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (32058)
                                                    Category:downloaded
                                                    Size (bytes):86659
                                                    Entropy (8bit):5.36781915816204
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:C9F5AEECA3AD37BF2AA006139B935F0A
                                                    SHA1:1055018C28AB41087EF9CCEFE411606893DABEA2
                                                    SHA-256:87083882CC6015984EB0411A99D3981817F5DC5C90BA24F0940420C5548D82DE
                                                    SHA-512:DCFF2B5C2B8625D3593A7531FF4DDCD633939CC9F7ACFEB79C18A9E6038FDAA99487960075502F159D44F902D965B0B5AED32B41BFA66A1DC07D85B5D5152B58
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://code.jquery.com/jquery-3.2.1.min.js
                                                    Preview:/*! jQuery v3.2.1 | (c) JS Foundation and other contributors | jquery.org/license */.!function(a,b){"use strict";"object"==typeof module&&"object"==typeof module.exports?module.exports=a.document?b(a,!0):function(a){if(!a.document)throw new Error("jQuery requires a window with a document");return b(a)}:b(a)}("undefined"!=typeof window?window:this,function(a,b){"use strict";var c=[],d=a.document,e=Object.getPrototypeOf,f=c.slice,g=c.concat,h=c.push,i=c.indexOf,j={},k=j.toString,l=j.hasOwnProperty,m=l.toString,n=m.call(Object),o={};function p(a,b){b=b||d;var c=b.createElement("script");c.text=a,b.head.appendChild(c).parentNode.removeChild(c)}var q="3.2.1",r=function(a,b){return new r.fn.init(a,b)},s=/^[\s\uFEFF\xA0]+|[\s\uFEFF\xA0]+$/g,t=/^-ms-/,u=/-([a-z])/g,v=function(a,b){return b.toUpperCase()};r.fn=r.prototype={jquery:q,constructor:r,length:0,toArray:function(){return f.call(this)},get:function(a){return null==a?f.call(this):a<0?this[a+this.length]:this[a]},pushStack:function(a){var
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (65310)
                                                    Category:downloaded
                                                    Size (bytes):509377
                                                    Entropy (8bit):5.331730273171785
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:2FB4684AF0B434A8ECBDA2FC0688B883
                                                    SHA1:736F13F532FC6EF6CB086A0A8A49DC27C730DE74
                                                    SHA-256:BF0B3D04738F5A0E05AF0361C9FC376155F1AE9B629BC610DDA2161CD8A747D9
                                                    SHA-512:7A266E32B28F06771B12BF0B51AB891AD461F58ED22168FBACD9726C6F647DE409B1150535A92B883E004553E2C8E959F72CBA980A17B45781294836F3FAEBBB
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://citrix-sharefile-content.customer.pendo.io/agent/static/74b07336-7560-45fc-7cd1-95032a784d52/pendo.js
                                                    Preview:// Pendo Agent Wrapper.// Copyright 2024 Pendo.io, Inc..// Environment: production.// Agent Version: 2.252.0.// Installed: 2024-10-29T14:13:20Z.(function (PendoConfig) {./*.@license https://agent.pendo.io/licenses.*/.!function(rw,ow,aw){!function(){var A=Array.prototype.slice;try{A.call(ow.documentElement)}catch(Ut){Array.prototype.slice=function(e,t){if(t=void 0!==t?t:this.length,"[object Array]"===Object.prototype.toString.call(this))return A.call(this,e,t);var n,i=[],r=this.length,o=e||0,a=(t<0?r+t:t||r)-(o=0<=o?o:r+o);if(0<a)if(i=new Array(a),this.charAt)for(n=0;n<a;n++)i[n]=this.charAt(o+n);else for(n=0;n<a;n++)i[n]=this[o+n];return i}}String.prototype.trim||(String.prototype.trim=function(){return this.replace(/^[\s\uFEFF\xA0]+|[\s\uFEFF\xA0]+$/g,"")});var R=function(){var a="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_".split("");return{uint8ToBase64:function(e){var t,n,i,r=e.length%3,o="";for(t=0,i=e.length-r;t<i;t+=3)n=(e[t]<<16)+(e[t+1]<<8)+e[t+2]
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (65476)
                                                    Category:downloaded
                                                    Size (bytes):823484
                                                    Entropy (8bit):5.445433279908095
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:28551A66F6A4E79041914B0A94D857C9
                                                    SHA1:A5954E7DD7C627649A4E7F9AD153E0D906A8519E
                                                    SHA-256:5D69F3E8774704033A214DB0563A0337ADC675BCFCC3F796197D28F8F42FF547
                                                    SHA-512:844A3BB644D61E0A3100017B09269B895DD46F3B7557E1B17BF2B71120BD00AE06B27D0AF1AA354E7AE3F316F3743279D2BCF7601AD19EFC0A2D3EFA3F366BB9
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://piletfeed-cdn.sharefile.io/sharefile-web/sharefiledev-fileviewer-pilet/1.32.0/package/dist/index.js
                                                    Preview://@pilet v:2(webpackChunkpr_sharefiledevfileviewerpilet,{}).System.register(["@sharefiledev/antd-config","antd","react","tslib"],(function(t,e){var n={},i={},r={},s={};return{setters:[function(t){n.colorPalette=t.colorPalette,n.defaultAntDConfig=t.defaultAntDConfig,n.sizes=t.sizes},function(t){i.Alert=t.Alert,i.Button=t.Button,i.Checkbox=t.Checkbox,i.Col=t.Col,i.Divider=t.Divider,i.Flex=t.Flex,i.Input=t.Input,i.Layout=t.Layout,i.Modal=t.Modal,i.Row=t.Row,i.Skeleton=t.Skeleton,i.Spin=t.Spin,i.Tree=t.Tree,i.Typography=t.Typography},function(t){r.Children=t.Children,r.Fragment=t.Fragment,r.Suspense=t.Suspense,r.createContext=t.createContext,r.createElement=t.createElement,r.default=t.default,r.forwardRef=t.forwardRef,r.isValidElement=t.isValidElement,r.lazy=t.lazy,r.useCallback=t.useCallback,r.useContext=t.useContext,r.useEffect=t.useEffect,r.useLayoutEffect=t.useLayoutEffect,r.useRef=t.useRef,r.useState=t.useState,r.version=t.version},function(t){s.__awaiter=t.__awaiter}],execute:functio
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (55320)
                                                    Category:downloaded
                                                    Size (bytes):55384
                                                    Entropy (8bit):5.402007343018523
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:D7FA53958E5BA828FEBE01A45075469E
                                                    SHA1:1AE6A7607029209F55A13F68B5CFDF1CCA95082B
                                                    SHA-256:44C772C0BDD957C95564D589FA388D7622B0CF17C20B2CAF21760E4FC66E0DC4
                                                    SHA-512:25462206E25766922831E0A667FF295F063E202EFE4B21271059CEC70F50AE241B9F205D58EAAE0CF6BAE3832B4D54154BD8695CD91B40ECD7EF4CD92187EA60
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://piletfeed-cdn.sharefile.io/sharefile-web/sharefiledev-review-approval-pilet/0.27.6/package/dist/index.js
                                                    Preview://@pilet v:2(webpackChunkpr_sharefiledevreviewapprovalpilet,{}).System.register(["@citrite/sf-api","@sharefiledev/antd-config","antd","react","react-dom","tslib"],(function(e,t){var r={},n={},a={},o={},i={},c={};return Object.defineProperty(o,"__esModule",{value:!0}),{setters:[function(e){r.AccountsEntity=e.AccountsEntity,r.ContactListType=e.ContactListType,r.ContactsEntity=e.ContactsEntity,r.ItemsEntity=e.ItemsEntity,r.Uploader=e.Uploader,r.UserRole=e.UserRole,r.UsersEntity=e.UsersEntity,r.ZoneService=e.ZoneService,r.createFile=e.createFile},function(e){n.colorPalette=e.colorPalette,n.sizes=e.sizes},function(e){a.Alert=e.Alert,a.App=e.App,a.Avatar=e.Avatar,a.Button=e.Button,a.Checkbox=e.Checkbox,a.Col=e.Col,a.DatePicker=e.DatePicker,a.Divider=e.Divider,a.Dropdown=e.Dropdown,a.Flex=e.Flex,a.Form=e.Form,a.Input=e.Input,a.Modal=e.Modal,a.Row=e.Row,a.Select=e.Select,a.Space=e.Space,a.Spin=e.Spin,a.Steps=e.Steps,a.Tabs=e.Tabs,a.Tag=e.Tag,a.Tooltip=e.Tooltip,a.Typography=e.Typography,a.them
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (6378)
                                                    Category:dropped
                                                    Size (bytes):6490
                                                    Entropy (8bit):5.257387004754639
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:FAE76DAE7784930E96292B65FEEDBC0D
                                                    SHA1:AFFD25E6159BE1645F1FFE8CE4BAFBF8D9710C3C
                                                    SHA-256:69B7DBF013D733F4E7A1313102219E1D58DFA5F7D95D2ED590B88D935C8B1E84
                                                    SHA-512:6B345E391AAB93D802A5B11FEF39EB86814027124CE7A9E45CBC63007316285900B095455DF21B73F542E8C60FC38E3ADF38B01DAF35CC70E98F118C719D6A30
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview://@pilet v:2(webpackChunkpr_sharefiledevremediationpilet,{"@citrite/citrix-ui@25.46.0":"citrite-citrix-ui.js"}).System.register(["@citrite/citrix-ui@25.46.0","@sharefiledev/antd-config","antd","react","tslib"],(function(e,t){var r={},n={},o={},a={},i={};return{setters:[function(e){r.notifyError=e.notifyError,r.notifyInfo=e.notifyInfo,r.notifySuccess=e.notifySuccess},function(e){n.AntDConfigProvider=e.AntDConfigProvider,n.colorPalette=e.colorPalette},function(e){o.Button=e.Button,o.Card=e.Card,o.Col=e.Col,o.Divider=e.Divider,o.Flex=e.Flex,o.Modal=e.Modal,o.Row=e.Row,o.Space=e.Space,o.Switch=e.Switch,o.Tooltip=e.Tooltip,o.Typography=e.Typography,o.theme=e.theme},function(e){a.Fragment=e.Fragment,a.createContext=e.createContext,a.createElement=e.createElement,a.default=e.default,a.forwardRef=e.forwardRef,a.useContext=e.useContext,a.useEffect=e.useEffect,a.useRef=e.useRef,a.useState=e.useState},function(e){i.__awaiter=e.__awaiter}],execute:function(){e((()=>{var e,l,s={8569:(e,t,r)=>{"use
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:Unicode text, UTF-8 text, with very long lines (32009)
                                                    Category:downloaded
                                                    Size (bytes):57443
                                                    Entropy (8bit):5.372940573746363
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:D580777BB3A28B94F6F1D18EE17AEDA3
                                                    SHA1:E78833A2DB1AA97DA3F4A1994E6AF1F0D74D7CC7
                                                    SHA-256:81188E8A76162C79DB4A5C10AC933C9E874C5B9EAE10E47956AD9DF704E01B28
                                                    SHA-512:E3F5FFE3E7E54A7D640DF3BC06D336C9F936635D2594159B3EA5EDAEFBA6D6774060A532E0CBE0664FDC65806BD53E9BFC19C11F7946A5E157A9EC935C564378
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://aadcdn.msftauth.net/ests/2.1/content/cdnbundles/ux.converged.login.strings-en.min_1yb3e7oii5t28dgo4xrtow2.js
                                                    Preview:!function(e){function o(n){if(i[n])return i[n].exports;var t=i[n]={exports:{},id:n,loaded:!1};return e[n].call(t.exports,t,t.exports,o),t.loaded=!0,t.exports}var i={};return o.m=e,o.c=i,o.p="",o(0)}([function(e,o,i){i(2);var n=i(1),t=i(5),r=i(6),a=r.StringsVariantId,s=r.AllowedIdentitiesType;n.registerSource("str",function(e,o){if(e.WF_STR_SignupLink_AriaLabel_Text="Create a Microsoft account",e.WF_STR_SignupLink_AriaLabel_Generic_Text="Create a new account",e.CT_STR_CookieBanner_Link_AriaLabel="Learn more about Microsoft's Cookie Policy",e.WF_STR_HeaderDefault_Title=o.iLoginStringsVariantId===a.CombinedSigninSignupV2WelcomeTitle?"Welcome":"Sign in",e.STR_Footer_IcpLicense_Text=".ICP.13015306.-10",o.oAppCobranding&&o.oAppCobranding.friendlyAppName){var i=o.fBreakBrandingSigninString?"to continue to {0}":"Continue to {0}";e.WF_STR_App_Title=t.format(i,o.oAppCobranding.friendlyAppName)}switch(o.oAppCobranding&&o.oAppCobranding.signinDescription&&(e.WF_STR_Default_Desc=o.oAppCobrand
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:Unicode text, UTF-8 text, with very long lines (65471)
                                                    Category:downloaded
                                                    Size (bytes):308129
                                                    Entropy (8bit):5.532445628001004
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:AAA88D2636DFEB090B5625DA19C6583B
                                                    SHA1:4B2A69A4DBE262EE61A895E662E6FAAB8975747F
                                                    SHA-256:24100E38A4398127141377D9B7FABCD8EB2F35BF68062306D6F3828133EA7E7B
                                                    SHA-512:18D0372BC9EB2DAE1664688FE7FFF3B8D9EA987070A6D4C68F9E2036D4DF1A9119766F1CED2070F21744201EFADE8119E1E8885A28AD847BD09E53508678963D
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://piletfeed-cdn.sharefile.io/sharefile-web/sharefiledev-projects-pilet/2.1.15/package/dist/index.js
                                                    Preview://@pilet v:2(webpackChunkpr_sharefiledevprojectspilet,{}).System.register(["@citrite/sf-api","@sharefiledev/antd-config","antd","react","react-dom","react-router","react-router-dom","tslib"],(function(e,t){var n={},r={},o={},a={},i={},c={},s={},u={};return Object.defineProperty(a,"__esModule",{value:!0}),{setters:[function(e){n.AccountsEntity=e.AccountsEntity,n.Api=e.Api,n.CapabilitiesEntity=e.CapabilitiesEntity,n.CapabilityName=e.CapabilityName,n.ContactListType=e.ContactListType,n.ContactsEntity=e.ContactsEntity,n.CustomWorkflowBundleType=e.CustomWorkflowBundleType,n.DocumentApprovalWorkflowAction=e.DocumentApprovalWorkflowAction,n.EncryptedEmailsEntity=e.EncryptedEmailsEntity,n.ExceptionReason=e.ExceptionReason,n.FileAction=e.FileAction,n.FileLockEntity=e.FileLockEntity,n.FileVirusStatus=e.FileVirusStatus,n.IntegrationProvider=e.IntegrationProvider,n.IntegrationsEntity=e.IntegrationsEntity,n.ItemOperations=e.ItemOperations,n.ItemOrderingMode=e.ItemOrderingMode,n.ItemsEntity=e.ItemsE
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:ASCII text, with very long lines (65472)
                                                    Category:downloaded
                                                    Size (bytes):124348
                                                    Entropy (8bit):5.387460323033051
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:4E4E4FD0B0580EF04C25C9DB829E370F
                                                    SHA1:4867DE5753E3320EF0A1AB5FE3E9CD1E4EFBF2F4
                                                    SHA-256:F699158E6689E3633E4553562FE73AE320E42781263E5E50906725B2E988D8BF
                                                    SHA-512:1D138579D2E563CE7454147700B13EA52CB487A716B39DA4A4C9E9508F567353DB7149F2F297050DD729A598A275F0014BEEB52EC7CB6844A3C856930B5B1BB4
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://piletfeed-cdn.sharefile.io/sharefile-web/sharefiledev-task-aggregator-pilet/1.0.23/package/dist/index.js
                                                    Preview://@pilet v:2(webpackChunkpr_sharefiledevtaskaggregatorpilet,{}).System.register(["@citrite/sf-api","@sharefiledev/antd-config","antd","react","react-dom","tslib"],(function(e,t){var n={},r={},o={},i={},a={},s={};return Object.defineProperty(i,"__esModule",{value:!0}),Object.defineProperty(s,"__esModule",{value:!0}),{setters:[function(e){n.Api=e.Api,n.CustomWorkflowBundleType=e.CustomWorkflowBundleType,n.ItemOrderingMode=e.ItemOrderingMode,n.ItemsEntity=e.ItemsEntity,n.UsersEntity=e.UsersEntity,n.createFolder=e.createFolder,n.isCustomWorkflowBundle=e.isCustomWorkflowBundle,n.isFile=e.isFile,n.isFolder=e.isFolder,n.isLink=e.isLink,n.isMedicalStudyBundle=e.isMedicalStudyBundle,n.isNote=e.isNote,n.isRequestListBundle=e.isRequestListBundle,n.isSymbolicLink=e.isSymbolicLink,n.isWorkflowBundle=e.isWorkflowBundle},function(e){r.colorPalette=e.colorPalette,r.sizes=e.sizes},function(e){o.Avatar=e.Avatar,o.Button=e.Button,o.Card=e.Card,o.Col=e.Col,o.Divider=e.Divider,o.Empty=e.Empty,o.Flex=e.Flex
                                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    File Type:Unicode text, UTF-8 text, with very long lines (65453)
                                                    Category:downloaded
                                                    Size (bytes):91744
                                                    Entropy (8bit):5.35315025267453
                                                    Encrypted:false
                                                    SSDEEP:
                                                    MD5:EC10A08ABEEA396244C7C88FFAA5ECF7
                                                    SHA1:29EA05BFC2B2A754AE77DF48FEBAC23A79352C48
                                                    SHA-256:E4126A1DD61B9AB0EB21038540041710DDCBDCD5E03C0D7C302F74E25EF34B8E
                                                    SHA-512:23B746B157D1DD8A2896FEDD3A86CDF13A755353FF7F9BB87A339CBE194B844B0EAEE32F038F73254BB355BEA29D02052496B28D0FB29EECA85B2CA29D343B1A
                                                    Malicious:false
                                                    Reputation:unknown
                                                    URL:https://piletfeed-cdn.sharefile.io/sharefile-web/sharefiledev-user-act-hist-pilet/1.7.0/package/dist/index.js
                                                    Preview://@pilet v:2(webpackChunkpr_sharefiledevuseracthistpilet,{}).System.register(["antd","react","react-dom","tslib"],(function(e,t){var r={},n={},o={},i={};return Object.defineProperty(n,"__esModule",{value:!0}),{setters:[function(e){r.Alert=e.Alert,r.Button=e.Button,r.Modal=e.Modal,r.Skeleton=e.Skeleton,r.Spin=e.Spin,r.Tabs=e.Tabs,r.Tag=e.Tag},function(e){Object.keys(e).forEach((function(t){n[t]=e[t]}))},function(e){o["default"]=e["default"],o.findDOMNode=e.findDOMNode,o.flushSync=e.flushSync},function(e){i.__awaiter=e.__awaiter,i.__rest=e.__rest}],execute:function(){e((()=>{var e,s,a={5916:(e,t,r)=>{"use strict";r.d(t,{XK:()=>C,jK:()=>x});var n=r(8830),o=r.n(n),i=r(4193),s=undefined&&undefined.__assign||function(){return s=Object.assign||function(e){for(var t,r=1,n=arguments.length;r<n;r++)for(var o in t=arguments[r])Object.prototype.hasOwnProperty.call(t,o)&&(e[o]=t[o]);return e},s.apply(this,arguments)};function a(e){return Promise.resolve(o()({method:e.method,url:e.url,withCredential
                                                    File type:CDFV2 Microsoft Outlook Message
                                                    Entropy (8bit):5.7430908062727015
                                                    TrID:
                                                    • Outlook Message (71009/1) 50.89%
                                                    • Outlook Form Template (41509/1) 29.75%
                                                    • Microsoft Word document (old ver.) (19008/1) 13.62%
                                                    • Generic OLE2 / Multistream Compound File (8008/1) 5.74%
                                                    File name:RE Leander - Lighting and Control Devices Submittal.msg
                                                    File size:195'072 bytes
                                                    MD5:655e4981b189d744500607d6d6c50b67
                                                    SHA1:1a08e7ec4556e86f9fcf5e6f3f12f946c1209be1
                                                    SHA256:6a381f857a36abbc651469b99f8ebf10f71a0b7dec47f72f1348aba672098923
                                                    SHA512:109ef4a6619ea805609f321597406e451796b453456220b3727ac02538fd1e8a874a671f1e8c18052a8e32a090b4a874af875f9076434dee8493a413c0ceca00
                                                    SSDEEP:3072:M1+UhtyKen+XoGHkmqgM7pxJMVn03O5Qu1vdQHpl1HpOKdcPy:MhtyKTq7TFkvMdcPy
                                                    TLSH:B714D52536FA0605F1B79FB544F252938936FD96AE34CA8F21D0334F06B2D51A861B3B
                                                    File Content Preview:........................>......................................................................................................................................................................................................................................
                                                    Subject:RE: Leander - Lighting and Control Devices Submittal
                                                    From:Gidget Rosemond <grosemond@ms2-inc.com>
                                                    To:Rohini Dhamija <rdhamija@gignac-associates.com>
                                                    Cc:
                                                    BCC:
                                                    Date:Mon, 28 Oct 2024 14:23:48 +0100
                                                    Communications:
                                                    • Thank you I got it Gidget R. Rosemond Technical Secretary MS2 Consulting Engineers 8200 W Interstate 10, Suite 312 San Antonio, TX 78230 Office: 210-736-4265 [cid:image001.png@01DB2912.B5B1A530] www.MS2-inc.com<https://link.edgepilot.com/s/0f9ef154/NJX5AYObG0_RqDaxWmgWHw?u=http://www.ms2-inc.com/>
                                                    • From: Rohini Dhamija <rdhamija@gignac-associates.com> Sent: Monday, October 28, 2024 8:12 AM To: Gidget Rosemond <grosemond@ms2-inc.com> Subject: Re: Leander - Lighting and Control Devices Submittal Here you go Gidget Sharefile link https://gignacarchitects.sharefile.com/public/share/web-sd99ebbc5c56741ceb96a1e5404c17f68<https://link.edgepilot.com/s/12f296c1/mkNEkUsCaUyhM6_YKKlYig?u=https://gignacarchitects.sharefile.com/public/share/web-sd99ebbc5c56741ceb96a1e5404c17f68> I sent you the sharefile notification as well. Let me know. R O H I N I D H A M I J A 3 6 1 . 8 8 4 . 2 6 6 1 | r d h a m i j a @ g i g n a c - a s s o c i a t e s . c o m [cid:image002.png@01DB2912.B5B1A530] G I G N A C A R C H I T E C T S C O R P U S C H R I S T I | M C A L L E N | H A R L I N G E N | D A L L A S www.GIGNACARCHITECTS.com<https://link.edgepilot.com/s/ade9b597/HQxofOzvWEyNyAE96HbHug?u=http://www.gignacarchitects.com/> ________________________________
                                                    • From: Gidget Rosemond <grosemond@ms2-inc.com<mailto:grosemond@ms2-inc.com>> Sent: Monday, October 28, 2024 8:06 AM To: Rohini Dhamija <rdhamija@gignac-associates.com<mailto:rdhamija@gignac-associates.com>> Subject: RE: Leander - Lighting and Control Devices Submittal This is what I am getting: That didn't work We're sorry, but grosemond@ms2-inc.com<mailto:grosemond@ms2-inc.com> can't be found in the aro365150672-my.sharepoint.com directory. Please try again later, while we try to automatically fix this for you. Here are a few ideas: [cid:image003.gif@01DB2912.B5B1A530] Click here to sign in with a different account to this site. This will sign you out of all other Office 365 services that you're signed into at this time. [cid:image003.gif@01DB2912.B5B1A530] If you're using this account on another site and don't want to sign out, start your browser in Private Browsing mode for this site (show me how)<https://link.edgepilot.com/s/2b2e1abb/KtvhvhqXjkKjRyYXtt4Wpg?u=https://go.microsoft.com/fwlink/?LinkId=282736>. Is there anyway you can just send me the PDF. Thank you Gidget R. Rosemond Technical Secretary MS2 Consulting Engineers 8200 W Interstate 10, Suite 312 San Antonio, TX 78230 Office: 210-736-4265 [cid:image001.png@01DB2912.B5B1A530] <https://link.edgepilot.com/s/b771c850/2sRH6keKCk6dCgG_rak-Xg?u=http://www.ms2-inc.com/>www.MS2-inc.com<https://link.edgepilot.com/s/0f9ef154/NJX5AYObG0_RqDaxWmgWHw?u=http://www.ms2-inc.com/>
                                                    • From: Rohini Dhamija <rdhamija@gignac-associates.com<mailto:rdhamija@gignac-associates.com>> Sent: Monday, October 28, 2024 8:02 AM To: Gidget Rosemond <grosemond@ms2-inc.com<mailto:grosemond@ms2-inc.com>>; Apolonio Esquivel <aesquivel@gignac-associates.com<mailto:aesquivel@gignac-associates.com>> Subject: Re: Leander - Lighting and Control Devices Submittal Good morning Gidget, Please see link below [https://res.public.onecdn.static.microsoft/assets/mail/file-icon/png/pdf_16x16.png]SBM-260923-01A Lighting and Control Devices PD_compressed.pdf<https://link.edgepilot.com/s/86987e6b/eoCDpZj3VUe0XJud0aJ5dA?u=https://aro365150672-my.sharepoint.com/:b:/g/personal/rdhamija_gignac-associates_com/EdWD_te5iP9It7yMckMinMYB8bGfSGNWIoW2BXu2VqVfaQ> Let me know if you have trouble with this link. I will send a sharefile instead of this one drive. Have an awesome week. R O H I N I D H A M I J A 3 6 1 . 8 8 4 . 2 6 6 1 | r d h a m i j a @ g i g n a c - a s s o c i a t e s . c o m [cid:image002.png@01DB2912.B5B1A530] G I G N A C A R C H I T E C T S C O R P U S C H R I S T I | M C A L L E N | H A R L I N G E N | D A L L A S <https://link.edgepilot.com/s/ce74dfd0/yerjqLmRl0WeANjx62uNAA?u=http://www.gignacarchitects.com/>www.GIGNACARCHITECTS.com<https://link.edgepilot.com/s/ade9b597/HQxofOzvWEyNyAE96HbHug?u=http://www.gignacarchitects.com/> ________________________________
                                                    • From: Gidget Rosemond <grosemond@ms2-inc.com<mailto:grosemond@ms2-inc.com>> Sent: Monday, October 28, 2024 7:31 AM To: Rohini Dhamija <rdhamija@gignac-associates.com<mailto:rdhamija@gignac-associates.com>>; Apolonio Esquivel <aesquivel@gignac-associates.com<mailto:aesquivel@gignac-associates.com>> Subject: RE: Leander - Lighting and Control Devices Submittal Can you please resend the link. It is giving me an error message. Thank you Gidget R. Rosemond Technical Secretary MS2 Consulting Engineers 8200 W Interstate 10, Suite 312 San Antonio, TX 78230 Office: 210-736-4265 [cid:image001.png@01DB2912.B5B1A530] <https://link.edgepilot.com/s/b771c850/2sRH6keKCk6dCgG_rak-Xg?u=http://www.ms2-inc.com/>www.MS2-inc.com<https://link.edgepilot.com/s/0f9ef154/NJX5AYObG0_RqDaxWmgWHw?u=http://www.ms2-inc.com/>
                                                    • From: Rohini Dhamija <rdhamija@gignac-associates.com<mailto:rdhamija@gignac-associates.com>> Sent: Friday, October 25, 2024 3:36 PM To: Victor Olivares <VOlivares@ms2-inc.com<mailto:VOlivares@ms2-inc.com>>; Gidget Rosemond <grosemond@ms2-inc.com<mailto:grosemond@ms2-inc.com>> Cc: Apolonio Esquivel <aesquivel@gignac-associates.com<mailto:aesquivel@gignac-associates.com>> Subject: Leander - Lighting and Control Devices Submittal Good afternoon Victor, Gidget Please find link below to the Lighting submittal for leander. [https://res.public.onecdn.static.microsoft/assets/mail/file-icon/png/pdf_16x16.png]SBM-260923-01A Lighting and Control Devices PD.pdf<https://link.edgepilot.com/s/c6c5d4e5/oz5uFPEm10aK_RBwkmVvzQ?u=https://aro365150672-my.sharepoint.com/:b:/g/personal/rdhamija_gignac-associates_com/EVNHaSacx5JNmFtGs0SXCbIBgI50GJjSp_v8M3rndVz0Qg> Also, see attached email from the subcontractor with respect to the VE Thank you R O H I N I D H A M I J A 3 6 1 . 8 8 4 . 2 6 6 1 | r d h a m i j a @ g i g n a c - a s s o c i a t e s . c o m [cid:image002.png@01DB2912.B5B1A530] G I G N A C A R C H I T E C T S C O R P U S C H R I S T I | M C A L L E N | H A R L I N G E N | D A L L A S <https://link.edgepilot.com/s/ce74dfd0/yerjqLmRl0WeANjx62uNAA?u=http://www.gignacarchitects.com/>www.GIGNACARCHITECTS.com<https://link.edgepilot.com/s/ade9b597/HQxofOzvWEyNyAE96HbHug?u=http://www.gignacarchitects.com/> Links contained in this email have been replaced. If you click on a link in the email above, the link will be analyzed for known threats. If a known threat is found, you will not be able to proceed to the destination. If suspicious content is detected, you will see a warning. Links contained in this email have been replaced. If you click on a link in the email above, the link will be analyzed for known threats. If a known threat is found, you will not be able to proceed to the destination. If suspicious content is detected, you will see a warning. Links contained in this email have been replaced. If you click on a link in the email above, the link will be analyzed for known threats. If a known threat is found, you will not be able to proceed to the destination. If suspicious content is detected, you will see a warning.
                                                    Attachments:
                                                    • image001.png
                                                    • image002.png
                                                    • image003.gif
                                                    Key Value
                                                    Receivedfrom SN4PR0601MB3710.namprd06.prod.outlook.com
                                                    (260310b6:a03:2e2::15) with Microsoft SMTP Server (version=TLS1_2,
                                                    HTTPS; Mon, 28 Oct 2024 1324:17 +0000
                                                    ARC-Seali=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none;
                                                    ARC-Message-Signaturei=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
                                                    h=FromDate:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
                                                    ARC-Authentication-Resultsi=1; mx.microsoft.com 1; spf=pass
                                                    by CH2PPF7F2DA00C1.namprd07.prod.outlook.com (260310b6:61f:fc00::27b) with
                                                    2024 1323:48 +0000
                                                    Transport; Mon, 28 Oct 2024 1324:01 +0000
                                                    Authentication-Resultsspf=fail (sender IP is 8.31.233.230)
                                                    Received-SPFFail (protection.outlook.com: domain of ms2-inc.com does not
                                                    15.20.8114.16 via Frontend Transport; Mon, 28 Oct 2024 1324:00 +0000
                                                    X-NoteLink Protection: 18 link(s) wrapped
                                                    with ESMTP id 321659792 for rdhamija@gignac-associates.com; Mon, 28 Oct 2024 0923:59 -0400
                                                    X-Note-AR-ScanTimeLocal10/28/2024 9:24:22 AM
                                                    X-Note-AR-ScanNone - PIPE
                                                    with PIPE id 60659537; Mon, 28 Oct 2024 0924:29 -0400
                                                    X-Resubmit1028132424894-60659518-251388
                                                    with PIPE id 60659518; Mon, 28 Oct 2024 0924:24 -0400
                                                    with ESMTPS id 60659511 for rdhamija@gignac-associates.com; Mon, 28 Oct 2024 0924:22 -0400
                                                    DKIM-Signaturev=1; a=rsa-sha256; c=relaxed/relaxed;
                                                    ([fe80:e063:fcd9:ecf4:f34a%2]) with mapi id 15.20.8069.016; Mon, 28 Oct 2024
                                                    1323:48 +0000
                                                    FromGidget Rosemond <grosemond@ms2-inc.com>
                                                    ToRohini Dhamija <rdhamija@gignac-associates.com>
                                                    SubjectRE: Leander - Lighting and Control Devices Submittal
                                                    Thread-TopicLeander - Lighting and Control Devices Submittal
                                                    Thread-IndexAQHbJxy3jFYhzsWtAEay33HeYxjuDbKcHCkQgAAHNPuAAAJgsIAAAOxvgAAETrA=
                                                    DateMon, 28 Oct 2024 13:23:48 +0000
                                                    Message-ID<SN4PR0601MB3710BF69177A0A838147E2C3B44A2@SN4PR0601MB3710.namprd06.prod.outlook.com>
                                                    References<BY5PR07MB80522BE509B4926C582CF2FE8A4F2@BY5PR07MB8052.namprd07.prod.outlook.com>
                                                    In-Reply-To<BY5PR07MB8052B599C8B7170BA670EA0D8A4A2@BY5PR07MB8052.namprd07.prod.outlook.com>
                                                    Accept-Languageen-US
                                                    X-MS-Has-Attachyes
                                                    X-MS-TNEF-Correlatormsip_labels:
                                                    Authentication-Results-Originaldkim=none (message not signed)
                                                    x-ms-traffictypediagnosticSN4PR0601MB3710:EE_|SJ0PR06MB7289:EE_|CH2PEPF00000143:EE_|CH2PPF7F2DA00C1:EE_|BY5PR07MB8052:EE_
                                                    X-MS-Office365-Filtering-Correlation-Idaf93b45d-ef71-4354-2831-08dcf753c913
                                                    x-ms-exchange-senderadcheck1
                                                    x-ms-exchange-antispam-relay0
                                                    X-Microsoft-Antispam-UntrustedBCL:0;ARA:13230040|69100299015|366016|376014|1800799024|8096899003|38070700018;
                                                    X-Microsoft-Antispam-Message-Info-Original=?us-ascii?Q?ebd3lvnqkvz8RYu2jvXx3wI9ALjix7zK9/VyAV0NhlmFKsldt59dkac5fJFy?=
                                                    X-Forefront-Antispam-Report-UntrustedCIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:SN4PR0601MB3710.namprd06.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(69100299015)(366016)(376014)(1800799024)(8096899003)(38070700018);DIR:OUT;SFP:1102;
                                                    X-MS-Exchange-Transport-CrossTenantHeadersStampedCH2PPF7F2DA00C1
                                                    Content-Languageen-US
                                                    Content-Typemultipart/related;
                                                    X-Policygignac-associates.com
                                                    X-Primaryrdhamija@gignac-associates.com
                                                    X-Note-Sendergrosemond@ms2-inc.com
                                                    X-Note-Envelope-RecipFAILURE,DELAY, <rdhamija@gignac-associates.com>
                                                    X-Virus-ScanV-
                                                    X-Note-SnifferID0
                                                    X-GBUdb-Analysis0, 40.107.223.114, Ugly c=0.331706 p=-0.12 Source Normal
                                                    X-Signature-Violations0-0-0-32767-c
                                                    X-Note-4190 ms. Fail:0 Chk:1460 of 1460 total
                                                    X-WarnREDIRECTHOLE Contains questionable phrase
                                                    X-Country-PathUnited States of America->LOCAL
                                                    X-Note-Sending-IP40.107.223.114
                                                    X-Note-Reverse-DNSail-dm6nam11on2114.outbound.protection.outlook.com
                                                    X-Note-Return-Pathgrosemond@ms2-inc.com
                                                    Return-Pathgrosemond@ms2-inc.com
                                                    X-MS-Exchange-Organization-ExpirationStartTime28 Oct 2024 13:24:00.7589
                                                    X-MS-Exchange-Organization-ExpirationStartTimeReasonOriginalSubmit
                                                    X-MS-Exchange-Organization-ExpirationInterval1:00:00:00.0000000
                                                    X-MS-Exchange-Organization-ExpirationIntervalReasonOriginalSubmit
                                                    X-MS-Exchange-Organization-Network-Message-Idaf93b45d-ef71-4354-2831-08dcf753c913
                                                    X-EOPAttributedMessage0
                                                    X-EOPTenantAttributedMessage8e0de89c-298f-4cee-a7bd-0c3a67bd030b:0
                                                    X-MS-Exchange-Organization-MessageDirectionalityIncoming
                                                    X-MS-Exchange-Transport-CrossTenantHeadersStrippedCH2PEPF00000143.namprd02.prod.outlook.com
                                                    X-MS-PublicTrafficTypeEmail
                                                    X-MS-Exchange-Organization-AuthSourceCH2PEPF00000143.namprd02.prod.outlook.com
                                                    X-MS-Exchange-Organization-AuthAsAnonymous
                                                    X-MS-Office365-Filtering-Correlation-Id-Prvs2cc4ceda-5569-4c2a-ad8f-08dcf753c1ca
                                                    X-MS-Exchange-AtpMessagePropertiesSA|SL
                                                    X-MS-Exchange-Organization-SCL-1
                                                    X-Microsoft-AntispamBCL:0;ARA:13230040|69100299015|35042699022|1032899013|8096899003|2066899003;
                                                    X-Forefront-Antispam-ReportCIP:8.31.233.230;CTRY:US;LANG:en;SCL:-1;SRV:;IPV:NLI;SFV:SFE;H:server555.appriver.com;PTR:stdeldal01.appriver.com;CAT:NONE;SFS:(13230040)(69100299015)(35042699022)(1032899013)(8096899003)(2066899003);DIR:INB;
                                                    X-MS-Exchange-CrossTenant-OriginalArrivalTime28 Oct 2024 13:24:00.4308
                                                    X-MS-Exchange-CrossTenant-Network-Message-Idaf93b45d-ef71-4354-2831-08dcf753c913
                                                    X-MS-Exchange-CrossTenant-Id8e0de89c-298f-4cee-a7bd-0c3a67bd030b
                                                    X-MS-Exchange-CrossTenant-AuthSourceCH2PEPF00000143.namprd02.prod.outlook.com
                                                    X-MS-Exchange-CrossTenant-AuthAsAnonymous
                                                    X-MS-Exchange-CrossTenant-FromEntityHeaderInternet
                                                    X-MS-Exchange-Transport-EndToEndLatency00:00:16.9977309
                                                    X-MS-Exchange-Processed-By-BccFoldering15.20.8093.023
                                                    X-Microsoft-Antispam-Mailbox-Deliverywl:1;pcwl:1;ucf:0;jmr:0;auth:0;dest:I;ENG:(910001)(944506478)(944626604)(920097)(811239)(255002)(410001)(930097)(140003);
                                                    X-Microsoft-Antispam-Message-Info=?Windows-1252?Q?XVInxc4txgQ/iK8vZ7rKzxMmPYzI9+kAsZz0TFOO/HFOktfWHZesGK7R?=
                                                    MIME-Version1.0
                                                    dateMon, 28 Oct 2024 14:23:48 +0100

                                                    Icon Hash:c4e1928eacb280a2