Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
FW Expiration Pending Support Care HIPAA Acknowledgement Form 2024.eml

Overview

General Information

Sample name:FW Expiration Pending Support Care HIPAA Acknowledgement Form 2024.eml
Analysis ID:1562769
MD5:63e3c96b5b6b003cbf76e93366dfc448
SHA1:ec106a42c03b9d318cca209aa246c47f902641ac
SHA256:d3a10154ed35ebb629c6d51680ce422a7e5c4e1fcf9b716bc1ef01e9219df745
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected landing page (webpage, office document or email)
AI detected potential phishing Email
Suspicious MSG / EML detected (based on various text indicators)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Office Autorun Keys Modification
Stores files to the Windows start menu directory
Stores large binary data to the registry

Classification

  • System is w10x64_ra
  • OUTLOOK.EXE (PID: 6896 cmdline: "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml "C:\Users\user\Desktop\FW Expiration Pending Support Care HIPAA Acknowledgement Form 2024.eml" MD5: 91A5292942864110ED734005B7E005C0)
    • ai.exe (PID: 6192 cmdline: "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "7A878081-2B7C-49F8-B191-8B71F04F6AFC" "7D45DD20-BFB0-4C1B-8DE0-1C5790D14BFD" "6896" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx" MD5: EC652BEDD90E089D9406AFED89A8A8BD)
    • chrome.exe (PID: 2980 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://na3.docusign.net/Signing/EmailStart.aspx?a=52a62e08-52ab-4deb-9961-052cba101116&etti=24&acct=07df84b5-c8f5-4e7f-a831-b605f464f6f9&er=4156e787-bddd-48bf-b932-5329c6a60a23 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
      • chrome.exe (PID: 7056 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1980,i,2667196118707451285,13180892797666329255,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
  • cleanup
No yara matches
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE, ProcessId: 6896, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Addins\OneNote.OutlookAddin\1
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

Phishing

barindex
Source: EmailJoe Sandbox AI: Page contains button: 'REVIEW DOCUMENT' Source: 'Email'
Source: EmailJoe Sandbox AI: Email contains prominent button: 'review document'
Source: EmailJoe Sandbox AI: Detected potential phishing email: The email claims to be from DocuSign but uses a suspicious security code format and urgent expiration timeline to create pressure. The sender's domain 'docusign.net' attempts to look legitimate but the overall formatting and structure differs from genuine DocuSign emails. The email contains multiple tracking links and suspicious URLs masked as legitimate DocuSign resources
Source: MSG / EMLOCR Text: External Sender: See below. Phishing email. Armando Villanueva Finance 562-677-4940 Main: armando.villanueva@24hrcares.com E: www.24hrcares.com w: 200 N. Pacific Coast Hwy I Suite 300 | El Segundo, CA 90245 From: DocuSign NA3 System <dse NA3@docusign.net> Sent: Sunday, November 24, 2024 1:23 AM To: Armando Villanueva <armando.villanueva@24hrcares.com> Subject: Expiration Pending: Support Care HIPAA Acknowledgement Form 2024 Do not click links or open attachments unless you trust the sender] EXTERNAL EMAIL: Pictu re Of Hello, HR Compliance sent you a document to review and sign. REVIEW DOCUMENT HR Compliance compliancehub@24hrcares.com At your earliest convenience, we ask that you review the 24 Hour Home care HIPAA training Guidebook and sign the acknowledgement form to update your records. Thank you! 24 Hour Home care Expiration Pending: This document will expire on December 24, 2024 | 15:59. Powered by docusign Do Not Share This Email This email contains a secure link to Docusign. Please do not share this email, link, or access code with others.
Source: unknownHTTPS traffic detected: 52.149.20.212:443 -> 192.168.2.17:49815 version: TLS 1.2
Source: chrome.exeMemory has grown: Private usage: 1MB later: 26MB
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.177.83
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.177.83
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.177.83
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.177.83
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.177.83
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.177.83
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.177.83
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.177.83
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.13
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.13
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.13
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.13
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.13
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.13
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.13
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: global trafficDNS traffic detected: DNS query: na3.docusign.net
Source: global trafficDNS traffic detected: DNS query: docucdn-a.akamaihd.net
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: a.docusign.com
Source: global trafficDNS traffic detected: DNS query: api.mixpanel.com
Source: global trafficDNS traffic detected: DNS query: cdn.optimizely.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
Source: unknownNetwork traffic detected: HTTP traffic on port 49838 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49695 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49815 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49691 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49831 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49838
Source: unknownNetwork traffic detected: HTTP traffic on port 49680 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49815
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49835
Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49831
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49696
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49695
Source: unknownNetwork traffic detected: HTTP traffic on port 49696 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49691
Source: unknownNetwork traffic detected: HTTP traffic on port 49835 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49825 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49825
Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
Source: unknownHTTPS traffic detected: 52.149.20.212:443 -> 192.168.2.17:49815 version: TLS 1.2
Source: classification engineClassification label: mal52.phis.winEML@17/80@24/226
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\Documents\Outlook Files\~Outlook Data File - NoEmail.pst.tmp
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_16827_20130-20241125T1857470348-6896.etl
Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml "C:\Users\user\Desktop\FW Expiration Pending Support Care HIPAA Acknowledgement Form 2024.eml"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "7A878081-2B7C-49F8-B191-8B71F04F6AFC" "7D45DD20-BFB0-4C1B-8DE0-1C5790D14BFD" "6896" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "7A878081-2B7C-49F8-B191-8B71F04F6AFC" "7D45DD20-BFB0-4C1B-8DE0-1C5790D14BFD" "6896" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://na3.docusign.net/Signing/EmailStart.aspx?a=52a62e08-52ab-4deb-9961-052cba101116&etti=24&acct=07df84b5-c8f5-4e7f-a831-b605f464f6f9&er=4156e787-bddd-48bf-b932-5329c6a60a23
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1980,i,2667196118707451285,13180892797666329255,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://na3.docusign.net/Signing/EmailStart.aspx?a=52a62e08-52ab-4deb-9961-052cba101116&etti=24&acct=07df84b5-c8f5-4e7f-a831-b605f464f6f9&er=4156e787-bddd-48bf-b932-5329c6a60a23
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1980,i,2667196118707451285,13180892797666329255,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: apphelp.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: c2r64.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: userenv.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: msasn1.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: kernel.appcore.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptsp.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: rsaenh.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: gpapi.dll
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\ClickToRun\REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{799ED9EA-FB5E-11D1-B7D6-00C04FC2AAE2}\InprocServer32
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEWindow found: window name: SysTabControl32
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\Common
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\outlook\ConfigContextData 1
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information queried: ProcessInformation
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeQueries volume information: C:\Program Files (x86)\Microsoft Office\root\Office16\AI\WordCombinedFloatieLreOnline.onnx VolumeInformation
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation2
Browser Extensions
1
Process Injection
1
Masquerading
OS Credential Dumping1
Process Discovery
Remote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
DLL Side-Loading
1
Modify Registry
LSASS Memory12
System Information Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
Registry Run Keys / Startup Folder
1
Registry Run Keys / Startup Folder
1
Process Injection
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
Extra Window Memory Injection
1
DLL Side-Loading
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Extra Window Memory Injection
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
cdn.optimizely.com
104.18.65.57
truefalse
    high
    www.google.com
    142.250.181.100
    truefalse
      high
      api.mixpanel.com
      35.190.25.25
      truefalse
        high
        default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
        84.201.208.68
        truefalse
          high
          arya-1323461286.us-west-2.elb.amazonaws.com
          52.43.183.255
          truefalse
            high
            na3.docusign.net
            unknown
            unknownfalse
              high
              a.docusign.com
              unknown
              unknownfalse
                high
                docucdn-a.akamaihd.net
                unknown
                unknownfalse
                  high
                  NameMaliciousAntivirus DetectionReputation
                  https://na3.docusign.net/Signing/?ti=ebc1a2abb3b74da183969718fa12744efalse
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    52.113.194.132
                    unknownUnited States
                    8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                    52.43.183.255
                    arya-1323461286.us-west-2.elb.amazonaws.comUnited States
                    16509AMAZON-02USfalse
                    35.164.51.148
                    unknownUnited States
                    16509AMAZON-02USfalse
                    172.217.19.227
                    unknownUnited States
                    15169GOOGLEUSfalse
                    172.217.19.238
                    unknownUnited States
                    15169GOOGLEUSfalse
                    104.18.66.57
                    unknownUnited States
                    13335CLOUDFLARENETUSfalse
                    1.1.1.1
                    unknownAustralia
                    13335CLOUDFLARENETUSfalse
                    104.18.65.57
                    cdn.optimizely.comUnited States
                    13335CLOUDFLARENETUSfalse
                    172.217.17.67
                    unknownUnited States
                    15169GOOGLEUSfalse
                    172.217.17.78
                    unknownUnited States
                    15169GOOGLEUSfalse
                    20.42.65.84
                    unknownUnited States
                    8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                    23.64.59.59
                    unknownUnited States
                    812ROGERS-COMMUNICATIONSCAfalse
                    52.111.252.18
                    unknownUnited States
                    8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                    84.201.208.68
                    default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comPoland
                    34390NPLAYTELEKOM-AS-PONPLfalse
                    23.218.208.109
                    unknownUnited States
                    6453AS6453USfalse
                    142.250.181.100
                    www.google.comUnited States
                    15169GOOGLEUSfalse
                    64.207.218.235
                    unknownUnited States
                    62856DOCUS-6-PRODUSfalse
                    35.190.25.25
                    api.mixpanel.comUnited States
                    15169GOOGLEUSfalse
                    74.125.205.84
                    unknownUnited States
                    15169GOOGLEUSfalse
                    239.255.255.250
                    unknownReserved
                    unknownunknownfalse
                    23.54.81.216
                    unknownUnited States
                    20940AKAMAI-ASN1EUfalse
                    52.109.76.243
                    unknownUnited States
                    8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                    IP
                    192.168.2.17
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1562769
                    Start date and time:2024-11-26 00:57:12 +01:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:defaultwindowsinteractivecookbook.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:25
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • EGA enabled
                    Analysis Mode:stream
                    Analysis stop reason:Timeout
                    Sample name:FW Expiration Pending Support Care HIPAA Acknowledgement Form 2024.eml
                    Detection:MAL
                    Classification:mal52.phis.winEML@17/80@24/226
                    Cookbook Comments:
                    • Found application associated with file extension: .eml
                    • Exclude process from analysis (whitelisted): dllhost.exe, RuntimeBroker.exe, backgroundTaskHost.exe
                    • Excluded IPs from analysis (whitelisted): 52.113.194.132, 23.218.208.109, 52.109.76.243, 23.64.59.59, 23.64.59.19, 52.111.252.18, 52.111.252.16, 52.111.252.15, 52.111.252.17, 84.201.208.68, 64.207.218.235, 23.54.81.216, 23.54.81.195, 20.42.65.84
                    • Excluded domains from analysis (whitelisted): omex.cdn.office.net, na3-da.docusign.net.akadns.net, slscr.update.microsoft.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, eur.roaming1.live.com.akadns.net, neu-azsc-000.roaming.officeapps.live.com, ecs-office.s-0005.s-msedge.net, roaming.officeapps.live.com, a1737.b.akamai.net, login.live.com, e16604.g.akamaiedge.net, onedscolprdeus02.eastus.cloudapp.azure.com, prod.fs.microsoft.com.akadns.net, wu-b-net.trafficmanager.net, na3.docusign.net.akadns.net, a1864.dscd.akamai.net, ecs.office.com, self-events-data.trafficmanager.net, fs.microsoft.com, prod-all.naturallanguageeditorservice.osi.office.net.akadns.net, prod-inc-resolver.naturallanguageeditorservice.osi.office.net.akadns.net, ctldl.windowsupdate.com.delivery.microsoft.com, self.events.data.microsoft.com, ctldl.windowsupdate.com, prod.roaming1.live.com.akadns.net, s-0005-office.config.skype.com, docucdn-a.akamaihd.net.edgesuite.net, fe3cr.delivery.mp.m
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtQueryAttributesFile calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                    • VT rate limit hit for: FW Expiration Pending Support Care HIPAA Acknowledgement Form 2024.eml
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):338
                    Entropy (8bit):3.471639254206456
                    Encrypted:false
                    SSDEEP:
                    MD5:75FAE2659A70261DE8AA9972E3B4BE17
                    SHA1:3BFFBF6FDE223F37AD01F9E3D20CBC70405C03C0
                    SHA-256:DB391338A43494301C50D005D3C019AF70660E4E7F88E2C496E32F2401D22E1C
                    SHA-512:361AC0B9620780FF3AE4B03F03926D319B6F00F3A5AEC747DB89B9CD064BAD2BA6CB839F036CF7285E4F4E148CA5D70EFFEB736EB2A04C22B3E2C2540E7FC40D
                    Malicious:false
                    Reputation:unknown
                    Preview:p...... ............?..(...............................................B:.VZ.. .........p.........$...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.d.i.s.a.l.l.o.w.e.d.c.e.r.t.s.t.l...c.a.b...".7.4.6.7.8.7.a.3.f.0.d.9.1.:.0."...
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):231348
                    Entropy (8bit):4.391049036419561
                    Encrypted:false
                    SSDEEP:
                    MD5:3B6B7A6CF6DD8AD35564A10CEAECDD50
                    SHA1:1628E0464BA8EA356AE240F80F441A6E0FEEB4B1
                    SHA-256:4B6EA29C753824B00B10ABF022715649E1B00E3BA8312F6DACE4BC91FDD178DE
                    SHA-512:DF2E997461F09DE45AAC5233EBA2007313D289217408329F776F0AB4B0896F5DED086D54974DD7D7B5B833FE5B1216C445D8C51DBFCCF0304AEFD91A07879A39
                    Malicious:false
                    Reputation:unknown
                    Preview:TH02...... .0...?......SM01X...,...`...?..........IPM.Activity...........h...............h............H..ht..........%...h............H..h\tor ...AppD...h....0.........h..L..$........h........_`.k...h...L@...I.+w...h....H...8..k...0....T...............d.........2h...............k..............!h.............. h.+...........#h....8.........$h........8....."h..............'h..............1h..L<.........0h....4.....k../h....h......kH..h(.$.p...t.....-h .............+hQ..L....h................... ..............F7..............FIPM.Activity.st.Form.e..Standard.tanJournal Entry.pdIPM.Microsoft.FolderDesign.FormsDescription................F.k..........1122110020000000.000Microsoft.ofThis form is used to create journal entries.........kf...... ..........&...........(.......(... ...@.....................................................................................................................fffffffff........wwwwwwww.p....pp..............p...............pw..............pw..DDDDO..
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:XML 1.0 document, ASCII text, with very long lines (1869), with no line terminators
                    Category:modified
                    Size (bytes):1869
                    Entropy (8bit):5.088726879529934
                    Encrypted:false
                    SSDEEP:
                    MD5:4EEA7CFA81FD72200ADB72D5161EA722
                    SHA1:CB2AD6B7DE2F7AB42FE5592E3766856C5FDF0DA7
                    SHA-256:3E1C7280ACBC7B833DBAC7AF8190006BED1643D73142B7CA866970913C08C5BB
                    SHA-512:A1A2053BA3B21A4BE1713E88C25C5CADA60A343F40F84CA6E060ACF1E485C72E40C800B5FE5A4F339787B8A6D969A8AD84F434AA3D835CE3C74CC9CAFAF87ACA
                    Malicious:false
                    Reputation:unknown
                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?><root><version>1</version><Count>12</Count><Resource><Id>Aptos_26215680</Id><LAT>2024-11-25T23:57:48Z</LAT><key>29939506207.ttf</key><folder>Aptos</folder><type>4</type></Resource><Resource><Id>Aptos_45876480</Id><LAT>2023-10-06T09:55:52Z</LAT><key>27160079615.ttf</key><folder>Aptos</folder><type>4</type></Resource><Resource><Id>Aptos Display_26215680</Id><LAT>2023-10-06T09:55:52Z</LAT><key>23001069669.ttf</key><folder>Aptos Display</folder><type>4</type></Resource><Resource><Id>Aptos Narrow_26215426</Id><LAT>2023-10-06T09:55:52Z</LAT><key>37262344671.ttf</key><folder>Aptos Narrow</folder><type>4</type></Resource><Resource><Id>Aptos Display_26215682</Id><LAT>2023-10-06T09:55:52Z</LAT><key>28367963232.ttf</key><folder>Aptos Display</folder><type>4</type></Resource><Resource><Id>Aptos Narrow_45876224</Id><LAT>2023-10-06T09:55:52Z</LAT><key>24153076628.ttf</key><folder>Aptos Narrow</folder><type>4</type></Resource><Resource><Id>Aptos_
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:JSON data
                    Category:dropped
                    Size (bytes):521377
                    Entropy (8bit):4.9084889265453135
                    Encrypted:false
                    SSDEEP:
                    MD5:C37972CBD8748E2CA6DA205839B16444
                    SHA1:9834B46ACF560146DD7EE9086DB6019FBAC13B4E
                    SHA-256:D4CFBB0E8B9D3E36ECE921B9B51BD37EF1D3195A9CFA1C4586AEA200EB3434A7
                    SHA-512:02B4D134F84122B6EE9A304D79745A003E71803C354FB01BAF986BD15E3BA57BA5EF167CC444ED67B9BA5964FF5922C50E2E92A8A09862059852ECD9CEF1A900
                    Malicious:false
                    Reputation:unknown
                    Preview:{"MajorVersion":4,"MinorVersion":40,"Expiration":14,"Fonts":[{"a":[4294966911],"f":"Abadi","fam":[],"sf":[{"c":[1,0],"dn":"Abadi","fs":32696,"ful":[{"lcp":983041,"lsc":"Latn","ltx":"Abadi"}],"gn":"Abadi","id":"23643452060","p":[2,11,6,4,2,1,4,2,2,4],"sub":[],"t":"ttf","u":[2147483651,0,0,0],"v":197263,"w":26215680},{"c":[1,0],"dn":"Abadi Extra Light","fs":22180,"ful":[{"lcp":983042,"lsc":"Latn","ltx":"Abadi Extra Light"}],"gn":"Abadi Extra Light","id":"17656736728","p":[2,11,2,4,2,1,4,2,2,4],"sub":[],"t":"ttf","u":[2147483651,0,0,0],"v":197263,"w":13108480}]},{"a":[4294966911],"f":"ADLaM Display","fam":[],"sf":[{"c":[536870913,0],"dn":"ADLaM Display Regular","fs":140072,"ful":[{"lcp":983040,"lsc":"Latn","ltx":"ADLaM Display"}],"gn":"ADLaM Display","id":"31965479471","p":[2,1,0,0,0,0,0,0,0,0],"sub":[],"t":"ttf","u":[2147491951,1107296330,0,0],"v":131072,"w":26215680}]},{"a":[4294966911],"f":"Agency FB","fam":[],"sf":[{"c":[536870913,0],"dn":"Agency FB Bold","fs":54372,"ful":[{"lcp":9830
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:TrueType Font data, 10 tables, 1st "OS/2", 7 names, Microsoft, language 0x409, \251 2018 Microsoft Corporation. All Rights Reserved.msofp_4_40RegularVersion 4.40;O365
                    Category:dropped
                    Size (bytes):773040
                    Entropy (8bit):6.55939673749297
                    Encrypted:false
                    SSDEEP:
                    MD5:4296A064B917926682E7EED650D4A745
                    SHA1:3953A6AA9100F652A6CA533C2E05895E52343718
                    SHA-256:E04E41C74D6C78213BA1588BACEE64B42C0EDECE85224C474A714F39960D8083
                    SHA-512:A25388DDCE58D9F06716C0F0BDF2AEFA7F68EBCA7171077533AF4A9BE99A08E3DCD8DFE1A278B7AA5DE65DA9F32501B4B0B0ECAB51F9AF0F12A3A8A75363FF2C
                    Malicious:false
                    Reputation:unknown
                    Preview:........... OS/29....(...`cmap.s.,.......pglyf..&....|....head2..........6hheaE.@v.......$hmtx...........@loca.U.....8...Dmaxp........... name.P+........post...<...... .........b~1_.<...........<......r......Aa...................Q....Aa....Aa.........................~...................................................3..............................MS .@.......(...Q................. ...........d...........0...J.......8.......>..........+a..#...,................................................/...K.......z...............N......*...!...-...+........z.......h..%^..3...&j..+...+%..'R..+..."....................k......$A...,.......g...&...=.......X..&........*......&....B..(B...............#.......j...............+...P...5...@...)..........#...)Q...............*...{.. ....?..'...#....N...7......<...;>.............. ]...........5......#....s.......$.......$.......^..................+...>....H.......%...7.......6.......O...V...........K......"........c...N......!...............$...&...*p..
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:ASCII text, with very long lines (65536), with no line terminators
                    Category:dropped
                    Size (bytes):322260
                    Entropy (8bit):4.000299760592446
                    Encrypted:false
                    SSDEEP:
                    MD5:CC90D669144261B198DEAD45AA266572
                    SHA1:EF164048A8BC8BD3A015CF63E78BDAC720071305
                    SHA-256:89C701EEFF939A44F28921FD85365ECD87041935DCD0FE0BAF04957DA12C9899
                    SHA-512:16F8A8A6DCBAEAEFB88C7CFF910BCCC71B76A723CF808B810F500E28E543112C2FAE2491D4D209569BD810490EDFF564A2B084709B02963BCAF6FDF1AEEC59AC
                    Malicious:false
                    Reputation:unknown
                    Preview:51253fe60063c31af0d295afb42228b0:v2:2:1:1590:2:8479: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
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:ASCII text, with no line terminators
                    Category:dropped
                    Size (bytes):10
                    Entropy (8bit):2.6464393446710153
                    Encrypted:false
                    SSDEEP:
                    MD5:B288ACEAA981E02B301499F8E860ABAE
                    SHA1:853ED7283145A8469989AFD0F77EAA39DF0A4A74
                    SHA-256:CABC11EF29CAA0E7209BF952B6BAE07F845C5EFF2D1E26D69F75309634DBB4F9
                    SHA-512:9ED5497B42DAD05A8C92D470CBECEB546B545BFA56A428E1C5AA08D38B51CC15A7E0909EF9C7BB4A7AB1F712F811CD852FFE1781CCB7DC180DC51A39682E9D80
                    Malicious:false
                    Reputation:unknown
                    Preview:1732579073
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:SQLite 3.x database, last written using SQLite version 3023002, writer version 2, read version 2, file counter 2, database pages 1, cookie 0, schema 0, largest root page 1, unknown 0 encoding, version-valid-for 2
                    Category:dropped
                    Size (bytes):4096
                    Entropy (8bit):0.09216609452072291
                    Encrypted:false
                    SSDEEP:
                    MD5:F138A66469C10D5761C6CBB36F2163C3
                    SHA1:EEA136206474280549586923B7A4A3C6D5DB1E25
                    SHA-256:C712D6C7A60F170A0C6C5EC768D962C58B1F59A2D417E98C7C528A037C427AB6
                    SHA-512:9D25F943B6137DD2981EE75D57BAF3A9E0EE27EEA2DF19591D580F02EC8520D837B8E419A8B1EB7197614A3C6D8793C56EBC848C38295ADA23C31273DAA302D9
                    Malicious:false
                    Reputation:unknown
                    Preview:SQLite format 3......@ .......................................................................... .....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:SQLite Rollback Journal
                    Category:dropped
                    Size (bytes):4616
                    Entropy (8bit):0.13700485453793962
                    Encrypted:false
                    SSDEEP:
                    MD5:52145A21FF960A4754322BD17B6C46A4
                    SHA1:1D8D712612292A20CDA27889C776740F62A7463B
                    SHA-256:79614FB5AB1AE205998FB10FF6868DD7FA9BAFEACA73D0D92528A1A0E57F5EC9
                    SHA-512:CF6C5EF626F286B13ED9C4FF0794C239F908D5F99D4E38ECC63979F81C76F18674D15747789D5F9A0B82BAD958F006140E5116AFCB30A941BA09F7BF8F392D07
                    Malicious:false
                    Reputation:unknown
                    Preview:.... .c.......3.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................SQLite format 3......@ .......................................................................... .................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):32768
                    Entropy (8bit):0.04450027198542196
                    Encrypted:false
                    SSDEEP:
                    MD5:FFAE20A77367BB1487DF5D358FF895BA
                    SHA1:81A30567D0E8904B87726774942FEA1237250EF1
                    SHA-256:C1D08E8816341597C91D611B6963F12D0627594A494ED1EC74E6B0147F55F0B4
                    SHA-512:FBBBDB1F5E7225E4F86469774D612563D3D6C8EEA7DF81ED1AF21B5C90A95558B9C990F89DCDC94D3900FD64AA7FFEC35938CC0CE1993DEB1ED45CA3691FC13E
                    Malicious:false
                    Reputation:unknown
                    Preview:..-...........................=..{.t{.q9.5......-...........................=..{.t{.q9.5............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:SQLite Write-Ahead Log, version 3007000
                    Category:dropped
                    Size (bytes):45352
                    Entropy (8bit):0.393626816947564
                    Encrypted:false
                    SSDEEP:
                    MD5:D4E56BA6F1377EA1744911370869F247
                    SHA1:CF3BE9DCE0B3AF400EAE4C22E9708250ADB1864D
                    SHA-256:84C4419100BBDC2F344B6CDFE48B4BE1D8205DF310E0D20DC23C842D741D0AE5
                    SHA-512:BF50CF4454F4BA6DE2BB7F78F87CB16D87E76900466A1E5D89F5DF80D3A5727E3727AC45194B1250F9E19D97C42659E1D6BAE47031E916696366C8CBE03E47DB
                    Malicious:false
                    Reputation:unknown
                    Preview:7....-..........=..{.t{.O.P.Q.........=..{.t{..H.F.).tSQLite format 3......@ .......................................................................... .............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):2278
                    Entropy (8bit):3.8539686727831954
                    Encrypted:false
                    SSDEEP:
                    MD5:2EDB5F0E85B58450024DF15DB9220E1D
                    SHA1:E6D730B34DBEB17695A216564AE5B827A0052F2B
                    SHA-256:E45D827344C6EBD6A4BD7F20CDF70434B596CFC613FE0AB88253FF01FD805940
                    SHA-512:F725E0E5BDDA493579A316975316186671CCB70071D63CF8C21B1EC5B5E532CB556D3F88F21DA5CFF6C1C0AB4AFED4A1600E65C8D58D8B8CB0E953D3C6A99ACF
                    Malicious:false
                    Reputation:unknown
                    Preview:{.".T.B.D.a.t.a.S.t.o.r.e.O.b.j.e.c.t.".:.{.".H.e.a.d.e.r.".:.{.".O.b.j.e.c.t.T.y.p.e.".:.".T.o.k.e.n.R.e.s.p.o.n.s.e.".,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.a.j.o.r.".:.2.,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.i.n.o.r.".:.1.}.,.".O.b.j.e.c.t.D.a.t.a.".:.{.".S.y.s.t.e.m.D.e.f.i.n.e.d.P.r.o.p.e.r.t.i.e.s.".:.{.".R.e.q.u.e.s.t.I.n.d.e.x.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".C.J.1.m.u.g.S.o.z.s.S.9.x.S.Z./.Q.v.O.c.+.E.J.4.u.2.c.=.".}.,.".E.x.p.i.r.a.t.i.o.n.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".A.A.7.y.N.Z.4./.2.w.E.=.".}.,.".S.t.a.t.u.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".A.A.A.A.A.A.=.=.".}.,.".R.e.s.p.o.n.s.e.B.y.t.e.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.t.r.u.e.,.".V.a.l.u.e.".:.".A.Q.A.A.A.N.C.M.n.d.8.B.F.d.E.R.j.H.o.A.w.E./.C.l.+.s.B.A.A.A.A.2.j.d.y./.W.
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):2684
                    Entropy (8bit):3.908282060671273
                    Encrypted:false
                    SSDEEP:
                    MD5:467A0EE6A55C8419E88FB936C2AFCC75
                    SHA1:7DCAEAA35E069A182A1CCDFE6F128E69DA3F3BF3
                    SHA-256:533E36F086EC2552D4F12C2BD7C32E99FAE087C933D3CE487297DED2B954FB61
                    SHA-512:7FB18292AD1F2BCF9771C9EF11802AA3B33E1990551118FDFAE12C5D095EF6E6964568AE291523293026EB296787DBC8988D43EE55F16E19279AEF091FBC5559
                    Malicious:false
                    Reputation:unknown
                    Preview:{.".T.B.D.a.t.a.S.t.o.r.e.O.b.j.e.c.t.".:.{.".H.e.a.d.e.r.".:.{.".O.b.j.e.c.t.T.y.p.e.".:.".T.o.k.e.n.R.e.s.p.o.n.s.e.".,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.a.j.o.r.".:.2.,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.i.n.o.r.".:.1.}.,.".O.b.j.e.c.t.D.a.t.a.".:.{.".S.y.s.t.e.m.D.e.f.i.n.e.d.P.r.o.p.e.r.t.i.e.s.".:.{.".R.e.q.u.e.s.t.I.n.d.e.x.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".V.H.X.L.G.R.5.H.j.D.k.3.C.i.F.b.L.a.m.K.N.+.n.c.g.T.0.=.".}.,.".E.x.p.i.r.a.t.i.o.n.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".X.A.s.p.T.W.d.e.3.A.E.=.".}.,.".S.t.a.t.u.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".A.A.A.A.A.A.=.=.".}.,.".R.e.s.p.o.n.s.e.B.y.t.e.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.t.r.u.e.,.".V.a.l.u.e.".:.".A.Q.A.A.A.N.C.M.n.d.8.B.F.d.E.R.j.H.o.A.w.E./.C.l.+.s.B.A.A.A.A.2.j.d.y./.W.
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):4542
                    Entropy (8bit):3.99342278617096
                    Encrypted:false
                    SSDEEP:
                    MD5:FC78E18C6668418868D3D3C12CABE6D1
                    SHA1:9974737DF32C61AE1104E5E5B5F64081E1CB114A
                    SHA-256:DAC1B43D0AED89BE7E9762F31A604035D4F4D75C6A301CD74A342BB52BDCB065
                    SHA-512:55106B92431D04E41E6BC9DCF020DC8A6BC17743AC89D34A4D3C6A4784C49605859A6824E67F0B90BBAED34F6E335338D2498F5AE50C7284C9699E929C4D90D7
                    Malicious:false
                    Reputation:unknown
                    Preview:{.".T.B.D.a.t.a.S.t.o.r.e.O.b.j.e.c.t.".:.{.".H.e.a.d.e.r.".:.{.".O.b.j.e.c.t.T.y.p.e.".:.".T.o.k.e.n.R.e.s.p.o.n.s.e.".,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.a.j.o.r.".:.2.,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.i.n.o.r.".:.1.}.,.".O.b.j.e.c.t.D.a.t.a.".:.{.".S.y.s.t.e.m.D.e.f.i.n.e.d.P.r.o.p.e.r.t.i.e.s.".:.{.".R.e.q.u.e.s.t.I.n.d.e.x.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".V.q.Y.a.6.3.X.Y.9.b.4.Y.b.C.Z.g.f.0.u.y.E.6.v.n.x.e.w.=.".}.,.".E.x.p.i.r.a.t.i.o.n.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".N.C.m.z.G.5.Y./.2.w.E.=.".}.,.".S.t.a.t.u.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".A.w.A.A.A.A.=.=.".}.,.".R.e.s.p.o.n.s.e.B.y.t.e.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.t.r.u.e.,.".V.a.l.u.e.".:.".A.Q.A.A.A.N.C.M.n.d.8.B.F.d.E.R.j.H.o.A.w.E./.C.l.+.s.B.A.A.A.A.2.j.d.y./.W.
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:PNG image data, 5 x 23, 8-bit/color RGBA, non-interlaced
                    Category:dropped
                    Size (bytes):1782
                    Entropy (8bit):5.77311811423247
                    Encrypted:false
                    SSDEEP:
                    MD5:834A4209CE463FEE69EA2D053CEB95BF
                    SHA1:0C4456B733F1F8A823BD3B3AC71766A5FBA2B326
                    SHA-256:8B6CB44CE509E5AC3E586EFC604FAC0831E861B70A042C9F984A54A511F41F54
                    SHA-512:6F297D563391ED11B46D5F2CEDE2DA013569AA9678C9CBC7401C19739E235D5B1C66B0B3688F8745DBE89E0A7F5FBE85EBA2293F01C099923F4F810436822A15
                    Malicious:false
                    Reputation:unknown
                    Preview:.PNG........IHDR..............q.u....pHYs.................iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c142 79.160924, 2017/07/13-01:06:39 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/" xmp:CreatorTool="Adobe Photoshop CC (Windows)" xmp:CreateDate="2020-08-17T16:48:11+06:00" xmp:ModifyDate="2020-08-17T16:56:30+06:00" xmp:MetadataDate="2020-08-17T16:56:30+06:00" xmpMM:InstanceID="xmp.iid:8b70e2b2-6042-fb4f-9797-97933852af65" xmpMM:DocumentID="xmp.did:24F8DAF6E07711EABED18C2016519CC4" xmpMM:OriginalDocumentID="xmp.did:24F8DAF6E077
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):49088
                    Entropy (8bit):4.160289326139006
                    Encrypted:false
                    SSDEEP:
                    MD5:01F33155C998260E4B2EBEDF3A6F74E7
                    SHA1:327623684585D0A4F2488E074E7A703B2F0E8225
                    SHA-256:C728EFD46DC36685C65A99D77E40361EC9B17B246DCB788B0BBE69462A4A4CCF
                    SHA-512:1D019AA8FD187F8EC0F6F3152DF9E276245A71D709F406C45D9A1C04D8B50684B686E5A16D2EAE06729D6D8CF327A91CF1703E99CB5A2B2DF541C4A6EFB47FCA
                    Malicious:false
                    Reputation:unknown
                    Preview:....E.x.t.e.r.n.a.l. .S.e.n.d.e.r.:.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................&...*...H...............&...(....................!...!...)..(*..**..,*.................................................................................................................................................................................................................................................................................................$.a$.*...$..$.If........!v..h.#v....:V.......t.....6......5.......4........4........a...........-D..M................
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:GIF image data, version 89a, 834 x 834
                    Category:dropped
                    Size (bytes):32966
                    Entropy (8bit):7.976643656543348
                    Encrypted:false
                    SSDEEP:
                    MD5:FF815D5C160DCF604CC8C1CE3EB4B480
                    SHA1:6E582061703AE0800D59A951654D34F03AF6566F
                    SHA-256:832FFA5710A9C9D96248CDD073AB2145B3A70AFF5831685F5BE4885D8AD1193A
                    SHA-512:FAAEBB481D5B869C7FC6D35912BF0408271A73F1299B988D51BFDD27AAA7F3EFCECCEFBAD57C195A173B30C3DA1757230DC3E4E5182CC628E90EEEF86CF01262
                    Malicious:false
                    Reputation:unknown
                    Preview:GIF89aB.B.........3..f..........+..+3.+f.+..+..+..U..U3.Uf.U..U..U......3..f..............3..f..............3..f.............3..f.........3..3.33.f3..3..3..3+.3+33+f3+.3+.3+.3U.3U33Uf3U.3U.3U.3..3.33.f3..3..3..3..3.33.f3..3..3..3..3.33.f3.3..3..3..3.33.f3..3..3..f..f.3f.ff..f..f..f+.f+3f+ff+.f+.f+.fU.fU3fUffU.fU.fU.f..f.3f.ff..f..f..f..f.3f.ff..f..f..f..f.3f.ff.f..f..f..f.3f.ff..f..f.......3..f.........+..+3.+f.+..+.+..U..U3.Uf.U..U.U......3..f.............3..f.............3..f............3..f.............3..f..........+..+3.+f.+..+..+..U..U3.Uf.U..U..U....3.f.........3.f...........3..f.............3..f..............3..f..........+..+3.+f.+..+..+..U..U3.Uf.U..U..U......3..f..............3..f..............3..f.............3..f.....................!.......,....B.B........H......*\....#J.H....3j.... C..I...(S.\...0c.I...8s.....@...J...H.*]...P.J.J...X.j....`..K...h.]...p..K...x..........L.....+^....#K.L....G3k.....C..M....S.^....
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:PNG image data, 128 x 27, 8-bit/color RGBA, non-interlaced
                    Category:dropped
                    Size (bytes):2042
                    Entropy (8bit):7.773707672923882
                    Encrypted:false
                    SSDEEP:
                    MD5:96D8807F272D946A37AD501C0E688BD4
                    SHA1:1AB2289435C63BC32BD76968F5B5AC421A50DF59
                    SHA-256:DA97D0D672285ECAAB74BCE2B8D40B178759FC099A1DE15A60BA199B864A7888
                    SHA-512:67B9D41EF400E726A4FC96AEDDE1DB56804A9C8BD8C0DD76A25DEF9A321499CB3504F01FB4C664EB9D50AB206D656B8743E48C2A3F9C8E66FF9B5ADDB469A820
                    Malicious:false
                    Reputation:unknown
                    Preview:.PNG........IHDR................K....sRGB.........IDAThC.Z]lTE.>.n....&&TD...E..^..QcL|.b.1."Q.....V..]*....H.b...'..E~.-..D..R.j..1..J..;.^z..s..-..;s.....3s...;.7....!.$.......S:..@p.?.Bz......s.{...LN k..rO..:.A.+b$5...@...r.SsZ.$..Zo|....j.N!..e..;.n.OF././.......H....V...1.j.JB....Y.. ..........@..)n4.?r..vm.'...#.i..b.q.~._/.4..,....N:...c......(...3...g......1.s.G.....*p.........#.<.3......Pp..V<y....#).........z.....y..T........P}...C.M2".@..X.'...Tv[........@.R.....:....Mkw.+K..../..)..i6.1!<.....+...Q....;.M...........CN..s>o.Z.S..@x.......~....!.1.9.......%!..@.U.`./nJ...j1...r3................K....?.z.-"...^6.D.-).0.>..X.....H`...o......@.N.V....Kt.i8..u....7.L[F..z.K*.h.g.......(....oN...`k.V)....%>....'...Dw......$$E;.SL..#.5...........Q:..z..P....v..@....E..7...SZIH..0.*...'#N.q..P>..@._...t.t..D6.D..=.l.....&.....}DF...k"..v.^.."..._Z..2...oU@9E.I..:8......i@p.....y.f......*.9.T!'....S.$.....c...mm>_.....}o.....`.......9_
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:PNG image data, 150 x 150, 8-bit/color RGBA, non-interlaced
                    Category:dropped
                    Size (bytes):2555
                    Entropy (8bit):7.88910627682238
                    Encrypted:false
                    SSDEEP:
                    MD5:6A78B0944A1DA4F3892D0F4A0163DA25
                    SHA1:EDBEE8BAECF4D272F1B52BFA4C823DDC50E5486D
                    SHA-256:C9903CB4027BD617227A5F968C1B48883F9FFC3C140A629C418A413A3C14991C
                    SHA-512:1ECB84B1B369B7CF3BFA9184B527B9AB5885B1A8BE20A4AA408619D769379DC96ED56616400149381F14204C193FF359C86D7A7113089C6510A109705BF0C089
                    Malicious:false
                    Reputation:unknown
                    Preview:.PNG........IHDR.............<.q.....tEXtSoftware.Adobe ImageReadyq.e<....IDATx..q.:..mO......Ax...K..s..U.u`_.N*.]...p.y.N...$..j....1...."...B...#./.$u...,.......r.."...z..-Q...A$`y...&..@.&..%..f...&..Wy..UQ..Z._.Z.v.X.a.$L...":.]~......~..kW9H..\ [3.j....,..-.....g..N..........R..h...^&;zv.*.R..I%.....wLZ...9.%..C...e..D.9.......S...l~.J........MZ....B..)&..BG....b.@...X.^.*/.(n.@..L|......c$Nf....Y..B.0..]..j.qB!9....2@.c.e.....-.8.....L.+..zUl.^.a.e4!.r.{...[CKK....k4.3Tp}~]#...9a.L./Li.Sp...*.S..].........7......(.@.P..W..T..".WE..C..1U.1.J.R@...l.J..*.....8...<0...aH%..;.ENb.eXOU.*/.%.uR.m:.J+...s7e.B..N..A...."..M...J..K....h.>..f.........xk....C.* .R.u6.....YL...*.6D.....Y`...P..m.Zg.K,..A....i...Z.......R..k..bx.Xp..`........}H..`...S[..7..V.{.&.Z!Y.1.i.t....X....Z...\...{..G.......|...Z.X.).(..z....>..T....X+.3...B...Y.a.'.....X.._u.....0.P..I.P.......r....&.`.\;/.2..9TA..'.V.9.7...9T.G@.s..+...57xZ.T..]Z..R..CwH..RzG.`.p....1A.
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:PNG image data, 228 x 50, 8-bit/color RGBA, non-interlaced
                    Category:modified
                    Size (bytes):2684
                    Entropy (8bit):7.901894652512653
                    Encrypted:false
                    SSDEEP:
                    MD5:B4F8F0DCDA279711CB9224C2239323D4
                    SHA1:3C1B1B68CD9D2D25FF5D7FB2C7A61271DFFBF41B
                    SHA-256:53D92718DD6001A4EBF49D631AB9DF5B8194E6AF220790B1D8CF57164E38C6B0
                    SHA-512:E97F783AF2EECCAFD684BDDE181C1509414997D2970405CC2AD7B9182439EF471EE6BF58253E6661A7B4491DD80523CC23C4544B0F9CF5AA0E9BFF4F20E7CA92
                    Malicious:false
                    Reputation:unknown
                    Preview:.PNG........IHDR.......2.....L0w.....pHYs.................sRGB.........gAMA......a.....IDATx...n....#...C.y..R .!.So..s.J.%7..@..h..v.@.[....}....^.^.*r3Z.(.C.h3?s...q.....J.......3$.$..# ..D"..*.k...(..#..$Q........o."...{.).d.n.R.e...?.t5...._....2.+..... .....B..l...yQ*.....*..2.....e.X.}.{PG.SH....J.|..#....3D.FZ.Eh...d..............3..0......?."...x......4J.-....g..a8..9B$..e8....s.q...4JF[2....a.>.~3...6B.....D4d3*......o.....r#.....=.jK...1.?...o..YW..Hdgyx.7.[.....?x.......P.........K.fT..5Y&.%CbyS\.a.a.....6..y....._`.....r..!...G<...0......B.E...=:......#.p...6........!+..!MQ....t.....m.6RhO.:..odmu@P#....m.......]...|.ndS.PU\.]..`.f.Z...?.Ds]9....F).w....... ..W.........fW.R..J..4\.d4!.d.l..h..T.Rh/.+.z..R..5.h......-.{.n..@......V.k]..RR.H....(.+...C.MIl.\.LDG....C...k*...)..H0qM.{.._..A+.'.c.....-..WY......pG....A.. .......Y)EG.#t.....(...._..H....".....>.Zl.:..g...W_[I............@=Zh.75t.9.y\...N.e|..$....6...,9..h......3..fs.'9.
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:PNG image data, 36 x 36, 8-bit/color RGBA, non-interlaced
                    Category:dropped
                    Size (bytes):445
                    Entropy (8bit):7.318768335834397
                    Encrypted:false
                    SSDEEP:
                    MD5:E03518ED70845F60E54D995516FC7814
                    SHA1:F70C7019C0989B62CC691B6CD34859D8FC506C01
                    SHA-256:6F1AE1C2D727A21E023D4C687EDBD6FB7AA97BE003E3B17E4E6A2505F2B2B82C
                    SHA-512:D8E73BE08FDC026BF5733C276E165AB9E93F562F99A4AFAAC46C9097CB6CE80FC45BA0FF9733391EC1A51727B1A1715394D03F6F167CFA22D8B4720D053B7E22
                    Malicious:false
                    Reputation:unknown
                    Preview:.PNG........IHDR...$...$.............IDATx..?N.A......4.+..7....[.h(....9.z......... z...5..Zl....&..;..3._23..m...Y.&..|..'0..{..i8....].F.............<n=~....[B........8.d.g.*9./..#[-O.."TF.-...*..8.we.V.rm.......Qj|......g?sQ..Z.!".]]'.....X...N..G.z...(g...0..d....T.Im 5.|..J.Hle....^`.....[B.b...Q@..pI...7..|...u.@..MNl..N.3.;..{BR.q.9].Q.u.?@...&...*1.<...".j?$.1.....C.X..#vB........A...p...~.'.r...NM....IEND.B`.
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:ASCII text, with very long lines (860), with CRLF line terminators
                    Category:dropped
                    Size (bytes):20971520
                    Entropy (8bit):0.01387970725849909
                    Encrypted:false
                    SSDEEP:
                    MD5:A47052B1196462B404575F9E1382113C
                    SHA1:4A2EE1E28A840470804ADC1FE6DDEC85595E1F34
                    SHA-256:35878CE05486EED1A29453C7EAC32C771F7A257A78066DF72DABC34054BBB499
                    SHA-512:8F430A5F7E4D0597F2DF7392BFB9D68EB7BBDD877F57F0572750223337002A5C48CE8A654CBBB703CE4D253490508360B93D2D27B68FD7BFA7398A92EAFDD893
                    Malicious:false
                    Reputation:unknown
                    Preview:Timestamp.Process.TID.Area.Category.EventID.Level.Message.Correlation..11/25/2024 23:57:47.572.OUTLOOK (0x1AF0).0x1AF4.Microsoft Outlook.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.System.GracefulExit.GracefulAppExitDesktop","Flags":33777014402039809,"InternalSequenceNumber":21,"Time":"2024-11-25T23:57:47.572Z","Data.PreviousAppMajor":16,"Data.PreviousAppMinor":0,"Data.PreviousAppBuild":16827,"Data.PreviousAppRevision":20130,"Data.PreviousSessionId":"54E7A98F-F65C-477F-8024-711A8F887869","Data.PreviousSessionInitTime":"2024-11-25T23:57:24.506Z","Data.PreviousSessionUninitTime":"2024-11-25T23:57:27.803Z","Data.SessionFlags":2147483652,"Data.InstallMethod":0,"Data.OfficeUILang":1033,"Data.PreviousBuild":"Unknown","Data.EcsETag":"\"\"","Data.ProcessorArchitecture":"x64"}...11/25/2024 23:57:47.588.OUTLOOK (0x1AF0).0x1B60.Microsoft Outlook.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.Telemetry.LoadXmlRules","Flags":33777014401990913,"InternalSequenceNumber":28
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):20971520
                    Entropy (8bit):0.0
                    Encrypted:false
                    SSDEEP:
                    MD5:8F4E33F3DC3E414FF94E5FB6905CBA8C
                    SHA1:9674344C90C2F0646F0B78026E127C9B86E3AD77
                    SHA-256:CD52D81E25F372E6FA4DB2C0DFCEB59862C1969CAB17096DA352B34950C973CC
                    SHA-512:7FB91E868F3923BBD043725818EF3A5D8D08EBF1059A18AC0FE07040D32EEBA517DA11515E6A4AFAEB29BCC5E0F1543BA2C595B0FE8E6167DDC5E6793EDEF5BB
                    Malicious:false
                    Reputation:unknown
                    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:data
                    Category:modified
                    Size (bytes):204800
                    Entropy (8bit):4.896234251993631
                    Encrypted:false
                    SSDEEP:
                    MD5:B890060E8B90E3020166E162C89C9A61
                    SHA1:23D9A350FDD9B0DCFC4DEACA5E6F6EB44362BD3B
                    SHA-256:DD30B511C3E78ECEFA22B70882D9E782114C488438E6313829AF2E9C33C38A4E
                    SHA-512:261F5D6D3113017EB872B5BE97239882958DD2CD2E0D805A085F7EB0BDF0E81CB149ADF044C4449F5412E3E3C465D956C5256AE984DD04267148931C5D2AFE41
                    Malicious:false
                    Reputation:unknown
                    Preview:............................................................................d............)..?..................eJ..............Zb..2...................................,...@.t.z.r.e.s...d.l.l.,.-.1.1.2.......................................................@.t.z.r.e.s...d.l.l.,.-.1.1.1...........................................................0....Y...........)..?..........v.2._.O.U.T.L.O.O.K.:.1.a.f.0.:.2.8.c.1.3.5.3.c.9.0.a.8.4.f.7.9.8.2.a.6.c.6.7.e.5.f.f.6.f.8.8.6...C.:.\.U.s.e.r.s.\.t.o.r.r.e.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.O.u.t.l.o.o.k. .L.o.g.g.i.n.g.\.O.U.T.L.O.O.K._.1.6._.0._.1.6.8.2.7._.2.0.1.3.0.-.2.0.2.4.1.1.2.5.T.1.8.5.7.4.7.0.3.4.8.-.6.8.9.6...e.t.l...........P.P..........)..?..................................................................................................................................................................................................................................................................................................
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):30
                    Entropy (8bit):1.2389205950315936
                    Encrypted:false
                    SSDEEP:
                    MD5:40B0707A5CD82D7B8E8BC2817A27279D
                    SHA1:53878CC0A90BED8C929E25A16E2C435792CF45E6
                    SHA-256:98FA4CEAC697E335BD5A68FB1D399E172C087E6CB756EFEA57D0D425479EA61F
                    SHA-512:B33E5FCF2409F621EC79D769F7848D44020A1E59281C4E8189547A600D6CBC51D06AFD7AED550CCD29DB63DA3B78F0DC1775967F71B9F965E59A7701931A8614
                    Malicious:false
                    Reputation:unknown
                    Preview:....e.........................
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:Composite Document File V2 Document, Cannot read section info
                    Category:dropped
                    Size (bytes):16384
                    Entropy (8bit):0.6697626309766027
                    Encrypted:false
                    SSDEEP:
                    MD5:185E94A7172C76D487A25E5935D26E34
                    SHA1:9C32179963228229F64D0E6B200B54ECCE5FAB0F
                    SHA-256:9B084581FBC942A71668D0079E01036DE74E49A38C965B6DDCE05EDCC346FE21
                    SHA-512:22C779128F5D758ED252DD3226A44A8242EE7C730654B77E21F53F0461F8D02D09847AB8957D5D1D525239545F20773F62E17C4AC320B2F5A69683890925E787
                    Malicious:true
                    Reputation:unknown
                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):18
                    Entropy (8bit):2.725480556997868
                    Encrypted:false
                    SSDEEP:
                    MD5:A5E51FDFAF429614FB5218AB559D299A
                    SHA1:262EC76760BB9A83BCFF955C985E70820DF567AE
                    SHA-256:3E82E9F60CE38815C28B0E5323268BDA212A84C3A9C7ACCC731360F998DF0240
                    SHA-512:9B68F1C04BDE0024CECFC05A37932368CE2F09BD96C72AB0442E16C8CF5456ED9BB995901095AC1BBDF645255014A5E43AADEE475564F01CA6BE3889C96C29C9
                    Malicious:false
                    Reputation:unknown
                    Preview:..t.o.r.r.e.s.....
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Nov 25 22:58:05 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2677
                    Entropy (8bit):3.993141443191904
                    Encrypted:false
                    SSDEEP:
                    MD5:57F15829AF9DA04BA3CABBF5DDD14556
                    SHA1:0FC0569E437CF1EA6EDE4DB3AD13B04422E31A30
                    SHA-256:6F991BFF13391BC12D3C4B368B79CF320ABF5136BD966D93C6112399D7461452
                    SHA-512:78D745B390A5C7A2427B5DCA3A3973D212222A893D69EDA1CF922B654354C247EF74724C371F73A4E6BBAC4CF12FE52F022803A366C6DF9F2D86B69336A0F376
                    Malicious:false
                    Reputation:unknown
                    Preview:L..................F.@.. ...$+.,.....3..?......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.IyY-.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VyYB.....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.VyYB.....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.VyYB............................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VyYC............................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Nov 25 22:58:05 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2679
                    Entropy (8bit):4.0087439057692045
                    Encrypted:false
                    SSDEEP:
                    MD5:F543579C246844B8858FF714DEFCAF79
                    SHA1:7F7D7BFDED94ABE0BE5F69311AFE35253BEB63EB
                    SHA-256:66096CECFA54E6ED7A7DA0F070AB45CF8CFAD71EFD3E5A3D92B1D93E115C24EF
                    SHA-512:65364A0A24235940476260279988A6968576C870F8797AE2CB13B397617DD020740750EBA754B417D23A37982C8048DA73EB648E11D05A4D598E342C10ED7E37
                    Malicious:false
                    Reputation:unknown
                    Preview:L..................F.@.. ...$+.,....O.{.?......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.IyY-.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VyYB.....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.VyYB.....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.VyYB............................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VyYC............................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:54:41 2023, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2693
                    Entropy (8bit):4.017813334750449
                    Encrypted:false
                    SSDEEP:
                    MD5:7696441C7F4F42D75FEE7F7EE636F834
                    SHA1:B7DD3ADBD21AE39D06665116B16245ACDA9B0095
                    SHA-256:FA5F87F4049C9779C928DB265ED99B8505E52BA466AFE8629CCD4D119B4B5704
                    SHA-512:1D00642144490B2CA3073707D8483EE05A8FE12D72D45F628BA6F31C5F8756BDD6597072829DB662461EF2BF69344AED039C0F6450637837EBDBD75FEADAFE88
                    Malicious:false
                    Reputation:unknown
                    Preview:L..................F.@.. ...$+.,.....v. ;.......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.IyY-.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VyYB.....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.VyYB.....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.VyYB............................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VFW.N...........................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Nov 25 22:58:05 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2681
                    Entropy (8bit):4.0055939939081515
                    Encrypted:false
                    SSDEEP:
                    MD5:97B0F9492DC4136175907C923B166A51
                    SHA1:89FB97494D101B28293FAF3400FEDFF45E3E466E
                    SHA-256:94F5CBF52B0DB7A625A402270178FA99BE6DBD16173084B23344C966D5A24A96
                    SHA-512:A0E5353552447FB95949CC60ABB9B6BC2D473E65D0C0A7B5834424981722DC6C804B9A63D88EA29E71E6A251E74CD1FD0E3F8BCE8F5EBD5B7F89BB466A44C98C
                    Malicious:false
                    Reputation:unknown
                    Preview:L..................F.@.. ...$+.,.....6u.?......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.IyY-.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VyYB.....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.VyYB.....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.VyYB............................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VyYC............................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Nov 25 22:58:05 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2681
                    Entropy (8bit):3.9941367262172314
                    Encrypted:false
                    SSDEEP:
                    MD5:A2CD18BF140409C94A127CB7DC2FAE03
                    SHA1:3F5E64E8CA3C506EB5994E32C9AFB49F7D5C2675
                    SHA-256:69F61F5F4EEFC454037C67B91BA5D903418B2AD39AA56A2B4EC76BEE7C825C62
                    SHA-512:B467C51D7130AD80E89358344249EC07E639C45CD1BEFE88503C64624A9F75D9D2E317F9E0C63A2B2057A8FB66A49EEB9C33030E767BDAEDA7A4302D7CADE19F
                    Malicious:false
                    Reputation:unknown
                    Preview:L..................F.@.. ...$+.,....1...?......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.IyY-.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VyYB.....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.VyYB.....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.VyYB............................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VyYC............................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Nov 25 22:58:05 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                    Category:dropped
                    Size (bytes):2683
                    Entropy (8bit):4.004806605572436
                    Encrypted:false
                    SSDEEP:
                    MD5:203A186250E1D168FAB8319EC26D5FCD
                    SHA1:9A110ABD0F8754FFB2CC9E8A437AA09F2E546243
                    SHA-256:062BEAAEAA94F00C36CE5876A893B81B9C667E6F17BB1A8D73D95403FFA25343
                    SHA-512:E165BFEFC03E62649AA16C645B65692CA2D8294081675E72AD7EB06A3595D308A9FF8AEF5306E984C2CFADB10D4B16505783E59772F8BFF532BAA3E0446F4FBF
                    Malicious:false
                    Reputation:unknown
                    Preview:L..................F.@.. ...$+.,......k.?......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.IyY-.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VyYB.....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.VyYB.....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.VyYB............................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VyYC............................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:Microsoft Outlook email folder (>=2003)
                    Category:dropped
                    Size (bytes):271360
                    Entropy (8bit):3.449416622308556
                    Encrypted:false
                    SSDEEP:
                    MD5:2828ADA174AE5C92C0D1FC9A5BD6C31F
                    SHA1:8BE90AB5ACCD3921AFAD4F640B96E73142E83DE7
                    SHA-256:EB0C46B89DC959B47AB2E6BCD80CF7D4FBA2A90D6831795C651B9D1A411E7103
                    SHA-512:FFA20B1219DD59B92EAF8F1F97C2881D0B2387F49BB6FD6CA0FC8ED234B3A2548C0C4CB1945865C828F80443B04AEECF93CBCCA077C677B965A290818F69DCF6
                    Malicious:true
                    Reputation:unknown
                    Preview:!BDN....SM......\...............Y.......c................@...........@...@...................................@...........................................................................$.......D......................I...............W...........................................................................................................................................................................................................................................................................................l.......N-...67.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):131072
                    Entropy (8bit):4.530887898272419
                    Encrypted:false
                    SSDEEP:
                    MD5:501A4B5C3D64819539C7D6AB06302E0B
                    SHA1:2336132FBD4399A3B5F9C4B8CE03D4FCFCF92BF7
                    SHA-256:5BE0129A9A128F7EA7BC1FF702EEE5FEAA99F36D1D67592B72646FC9600D7BB2
                    SHA-512:1F76EC40AC9446B4F8556B48E90911720073A1715D4D1F23F5B004A191894088609F3E3CFA0A293B3D76CAB99B96EEE0C68921ED3045FFE38F0D4D5211367B16
                    Malicious:true
                    Reputation:unknown
                    Preview:..g.0...v..............?.......D............#..............}....................?...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................x.D.......G7.0...w..............?.......B............#.........................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:Unicode text, UTF-8 text, with very long lines (30984)
                    Category:dropped
                    Size (bytes):31159
                    Entropy (8bit):5.242540707783587
                    Encrypted:false
                    SSDEEP:
                    MD5:48BC933608F733A9283F2218C73A941F
                    SHA1:E04E625C70A5E8505B77A51D82D9A73AFA9F3547
                    SHA-256:FCBC395A3D24699D9229846A30C9FE245D77A7AFDBC8386838A03A837C6672AA
                    SHA-512:DED1BDD62FAAD01AF0B6F05A28A8D8721080B862EFDD5866EBDB4672A21A8EE15D3965B523C691784B7EF8817296707D5A3217F7B8CE713B212520EE9170329B
                    Malicious:false
                    Reputation:unknown
                    Preview:/*! For license information please see signing_iframeless_mobile.9788.js.LICENSE.txt */.(self.webpackChunk_ds_signing=self.webpackChunk_ds_signing||[]).push([[9788],{44903:function(e,t,n){var i,o;"undefined"!=typeof self&&self,i=function(){"function"!=typeof Promise&&function(t){function n(e,t){return function(){e.apply(t,arguments)}}function i(e){if("object"!=typeof this)throw new TypeError("Promises must be constructed via new");if("function"!=typeof e)throw new TypeError("not a function");this._state=null,this._value=null,this._deferreds=[],c(e,n(r,this),n(a,this))}function o(e){var t=this;return null===this._state?void this._deferreds.push(e):void p((function(){var n=t._state?e.onFulfilled:e.onRejected;if(null!==n){var i;try{i=n(t._value)}catch(t){return void e.reject(t)}e.resolve(i)}else(t._state?e.resolve:e.reject)(t._value)}))}function r(e){try{if(e===this)throw new TypeError("A promise cannot be resolved with itself.");if(e&&("object"==typeof e||"function"==typeof e)){var t=e.t
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (17329)
                    Category:dropped
                    Size (bytes):17500
                    Entropy (8bit):5.316856666332215
                    Encrypted:false
                    SSDEEP:
                    MD5:BC03940CFAB2484BAC8A2D41FE9E4C53
                    SHA1:7E050C5FA27B3792A117745CBB1C63D42FF117EF
                    SHA-256:0E1D410DD2C0ABB80B9FA543A104A97D927A411D3D8A81FE614BD7D6ECEF632D
                    SHA-512:D7099E1D5920D25683208C2DFF6122D4116D69E6141F0A6F7D5B0C1F0D1DF1DE69E139952A0BD809630527A93ED69E4310BF836E4D2850E3D7E4622E899C515C
                    Malicious:false
                    Reputation:unknown
                    Preview:/*! For license information please see signing_iframeless_mobile.5524.js.LICENSE.txt */."use strict";(self.webpackChunk_ds_signing=self.webpackChunk_ds_signing||[]).push([[5524],{55524:function(e,t,o){o.d(t,{P:function(){return ue}});var n=o(97032),r=o(27026),a=o(48079),i=o.n(a),l=o(96540),d=o(5556),s=o.n(d),c=o(59579),p=o(38008),u=o(26207),f=o(51544),b=o(90812),v=o(74111),x=o(92742),m=o(31824),h=o(10330),w=o(24914),g=o(59793),A=o(19747),y=o(90508),C=o(45603),k=(0,l.createContext)({dark:!1,imagePosition:void 0});function I(){return(0,l.useContext)(k)}var E=o(57838),B=o(94801),S=o(64056),O=o(36689),F=o(11393),R=o.n(F),W=o(68150),q="8px",j="7px";function T(e){return"small"===e?"320px":"medium"===e?"384px":"large"===e?"480px":"xlarge"===e?"640px":void 0}var P={base:()=>({default:{popover:{maxWidth:"100%",zIndex:O.A.Callout},wrap:{color:S.A.black,display:"block",position:"relative"},innerWrap:{minHeight:"100%"},closeButton:{position:"absolute",zIndex:O.A.aboveBaseLevel}},initialFocus:{outl
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (65438)
                    Category:dropped
                    Size (bytes):107050
                    Entropy (8bit):5.52879253457099
                    Encrypted:false
                    SSDEEP:
                    MD5:C9A178E87EF9D67207B744DD8252556E
                    SHA1:32A11476141AE8CC9E0881E56743DFA0DBC0843E
                    SHA-256:4298AB8A22EEDA2DEEEACBA50E9AB4E86696CEF95E639F4ACB8DA89C8187809E
                    SHA-512:24979165888C055E80601CB5787F8062127FF64BFDA8BFD18D0E5597557D832524E0731C8FEEE6F13F0143D305AF8E113033B07BBCA54F35F2A317E5F7F6ABF2
                    Malicious:false
                    Reputation:unknown
                    Preview:/*! For license information please see signing_iframeless_mobile.optimizely-sdk.js.LICENSE.txt */.(self.webpackChunk_ds_signing=self.webpackChunk_ds_signing||[]).push([[7068],{66501:function(e,t,r){"use strict";Object.defineProperty(t,"__esModule",{value:!0});var n=r(24391),i=function(){function e(){this.errorCount=0}return e.prototype.getDelay=function(){return 0===this.errorCount?0:1e3*n.BACKOFF_BASE_WAIT_SECONDS_BY_ERROR_COUNT[Math.min(n.BACKOFF_BASE_WAIT_SECONDS_BY_ERROR_COUNT.length-1,this.errorCount)]+Math.round(1e3*Math.random())},e.prototype.countError=function(){this.errorCount<n.BACKOFF_BASE_WAIT_SECONDS_BY_ERROR_COUNT.length-1&&this.errorCount++},e.prototype.reset=function(){this.errorCount=0},e}();t.default=i},82128:function(e,t,r){"use strict";var n,i=this&&this.__extends||(n=function(e,t){return n=Object.setPrototypeOf||{__proto__:[]}instanceof Array&&function(e,t){e.__proto__=t}||function(e,t){for(var r in t)t.hasOwnProperty(r)&&(e[r]=t[r])},n(e,t)},function(e,t){functio
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (65448)
                    Category:dropped
                    Size (bytes):119521
                    Entropy (8bit):5.282600334417372
                    Encrypted:false
                    SSDEEP:
                    MD5:57DF0E34273CB75DC3A46C4F4C805D84
                    SHA1:88D61F0784F25731D468B72F0F48319A112A0414
                    SHA-256:48E41A664A5F60ACEEAAA1C32BCC7FEBFEF091C3B79AA62F2429B03B18152F76
                    SHA-512:A4DB244A0CABB4F33870A89D8AEE20F1D107CB8E7036D5B250113B1DF6FA8891ADDF10DC835246FAAB5B2E680AC73856B13AB99E5AD736E7C19431A4B4E442BE
                    Malicious:false
                    Reputation:unknown
                    Preview:/*! For license information please see signing_iframeless_mobile.7837.js.LICENSE.txt */.(self.webpackChunk_ds_signing=self.webpackChunk_ds_signing||[]).push([[7837],{90564:function(a,n,t){"use strict";t.d(n,{l:function(){return e}});var e=function(){return"undefined"!=typeof window&&"documentMode"in window.document}},26823:function(a,n,t){"use strict";t.d(n,{P:function(){return i},o:function(){return c}});var e=t(49763),o=t.n(e),i=["*[contenteditable]",'*[tabindex]:not([tabindex="-1"])',"details","embed","iframe","a[href]","audio[controls]","img[usemap]",'menu[type="toolbar"]',"object[usemap]","video[controls]","button:not([disabled])",'input:not([disabled]):not([type="hidden"])',"select:not([disabled])","textarea:not([disabled])"].join(", "),c=function(a){return o()(a.querySelectorAll(i))}},56342:function(a,n,t){"use strict";t.d(n,{D9:function(){return s},KD:function(){return r},KG:function(){return v},KL:function(){return i},Ob:function(){return f},RI:function(){return c},Zu:function
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (65440)
                    Category:dropped
                    Size (bytes):903952
                    Entropy (8bit):5.339089010265062
                    Encrypted:false
                    SSDEEP:
                    MD5:5B34F77F2A7BDCD695F205886AFC5F3D
                    SHA1:90629FA500198EA078AC71FF3FBE0A7BB7EF9DC2
                    SHA-256:2726B24B18B694BB1992FFBFC096078BC5054EFF0A41E6CE32077178145D34F4
                    SHA-512:16AFA7360412D33A39DD62CB3E10DF88D21064BFE5A85CA74A3994B56688E608F928A11AE77C2ADAD35225961DD01D9979F9E552A8CD8598A52C6DF40AA27809
                    Malicious:false
                    Reputation:unknown
                    Preview:/*! For license information please see signing_iframeless_mobile.backbone-app.js.LICENSE.txt */.(self.webpackChunk_ds_signing=self.webpackChunk_ds_signing||[]).push([[2618,3920],{443:function(e,t,n){var a=n(93633);e.exports=(a.default||a).template({compiler:[8,">= 4.3.0"],main:function(e,t,n,a,l){var i,o=null!=t?t:e.nullContext||{},r=e.hooks.helperMissing,s=e.escapeExpression,c="function",u=e.lookupProperty||function(e,t){if(Object.prototype.hasOwnProperty.call(e,t))return e[t]};return'<div id="simple-verify-dialog" class="modal-wrap dialog" data-qa="simple-dialog"><div class="modal-content" role="dialog" aria-labelledby="simple-verify-dialog-title" aria-describedby="simple-verify-dialog-content"><button type="button" class="icon icon-times x-close close" data-action="canceled"><span class="btn-label">'+s((u(n,"$")||t&&u(t,"$")||r).call(o,"DocuSign_Close",{name:"$",hash:{},data:l,loc:{start:{line:1,column:322},end:{line:1,column:344}}}))+'</span></button><div class="header"><h1 id="sim
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (9874)
                    Category:downloaded
                    Size (bytes):10045
                    Entropy (8bit):5.2965890952604955
                    Encrypted:false
                    SSDEEP:
                    MD5:BEB8B66AB72084608723E3FE8054C93A
                    SHA1:6829D76B076820BBC0080D16CDF69EC3450582EC
                    SHA-256:8D7B65A0D96C9BAB1972D98C546E3BEE9F2BCE67AA10CACBCDC6274D6BD5F766
                    SHA-512:C7042C995166583ABFD7E753EBEDA999E8031787DDFEDBBDFC7AA8C10B9F766651315DBE29280F62A7908410C8948126C51629B5B42F77654FCE8D3298D28973
                    Malicious:false
                    Reputation:unknown
                    URL:https://docucdn-a.akamaihd.net/production/1ds/widgets/@ds/signing/24.11.38-8/signing_iframeless_mobile.4942.js?cs=2a007fef5724a6152eed
                    Preview:/*! For license information please see signing_iframeless_mobile.4942.js.LICENSE.txt */."use strict";(self.webpackChunk_ds_signing=self.webpackChunk_ds_signing||[]).push([[4942],{18049:function(e,t,i){i(40590),i(15195),i(18665),i(14913),i(87136),i(6048),i(14602);var s=i(21391),n=i.n(s),o=i(4523);function a(e,t){(null==t||t>e.length)&&(t=e.length);for(var i=0,s=new Array(t);i<t;i++)s[i]=e[i];return s}function r(e,t,i){var s,a=(i=i||{})._isSideEffect,r=null===(s=this.computed)||void 0===s?void 0:s[e],d=r&&this.computed[e].set,l={};return r&&(l=o.default.extend({useTwoWayBinding:!0,useModel:this},this.computedDefaults)),a||!r?n().Model.prototype.set.call(this,e,t,i):d?d.call(this,t,i):l.useTwoWayBinding&&g.call(this,e,t,i),this}function d(e,t){var i,s,n=(t=t||{}).useModel||this,o=t.useAttribute,r=t.useAttributes;return o?e=o:null!=r&&r.length&&(e=(i=r,s=1,function(e){if(Array.isArray(e))return e}(i)||function(e,t){var i=null==e?null:"undefined"!=typeof Symbol&&e[Symbol.iterator]||e["@@ite
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (9377)
                    Category:downloaded
                    Size (bytes):9548
                    Entropy (8bit):5.251903031243172
                    Encrypted:false
                    SSDEEP:
                    MD5:DB19C71E2E3A20DB637D018D5B641ADE
                    SHA1:64059292B782CCBD0334898D7D742CE7D4B3DCA5
                    SHA-256:A2E7FF838CF122F5AEB0A62B298553EB3318A34E1AFA2C45CF62FDB6B7CD5EED
                    SHA-512:1B939CC18E2DFB5B1837EDDFC51C9191FDDBE647A3809DD8CF354E6C79DB4AFD6716D74F480729AB52EC2BB58EB7165E608456FC86E2E37D73230C8390BD3C94
                    Malicious:false
                    Reputation:unknown
                    URL:https://docucdn-a.akamaihd.net/production/1ds/widgets/@ds/signing/24.11.38-8/signing_iframeless_mobile.9904.js?cs=a40b3681b8f8b6c693e2
                    Preview:/*! For license information please see signing_iframeless_mobile.9904.js.LICENSE.txt */."use strict";(self.webpackChunk_ds_signing=self.webpackChunk_ds_signing||[]).push([[9904],{79904:function(t,e,i){i.d(e,{A:function(){return u}});var n=i(8784),a=i(13861),s=i(16297),r=function(t){this._make(t)};a.A.extend(r.prototype,{_make:function(t){this._data=a.A.cloneDeep(t)},id:function(){return this._data.documentId},name:function(){return this._data.name},number:function(){return this._data.order},numberOfPages:function(t,e){var i=this._data.pages;return arguments.length&&t!==i&&(this._data.pages=t,s.A.send("document:change:numberOfPages",a.A.extend({},{id:this.id(),numberOfPages:this.numberOfPages()},e))),this._data.pages},displayType:function(){return this._data.displayType||""},includeInDownload:function(){return this._data.includeInDownload},thumbnailsCollapsed:function(t){"boolean"!=typeof this._data.thumbnailsCollapsed&&(this._data.thumbnailsCollapsed=!1);var e=this._data.thumbnailsColl
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (65448)
                    Category:downloaded
                    Size (bytes):345147
                    Entropy (8bit):5.372408329602014
                    Encrypted:false
                    SSDEEP:
                    MD5:66CB0BA84C866A3247B18C4E5ED80356
                    SHA1:1F68BB87B3113200EE4D51E8FA0F1D4D0F2EB34C
                    SHA-256:B4452B79618142577FB11DDAC0AF96DB53868A97A79D7F944D6A5E59517E9676
                    SHA-512:98C1DEE6D164BBD95E2CCFE69CC07936C6E539C45BEB59385E0AC03ADF365DCF245DAD9D253267AF74D757D129DF35592186215A84E75D0B78791A820890299F
                    Malicious:false
                    Reputation:unknown
                    URL:https://docucdn-a.akamaihd.net/production/1ds/widgets/@ds/signing/24.11.38-8/signing_iframeless_mobile.4759.js?cs=dd4878f0dd17b3327969
                    Preview:/*! For license information please see signing_iframeless_mobile.4759.js.LICENSE.txt */.(self.webpackChunk_ds_signing=self.webpackChunk_ds_signing||[]).push([[4759],{51544:function(e,t,n){"use strict";n.d(t,{dF:function(){return a},fC:function(){return u},mB:function(){return l}});var r=n(39653),o=n(56213),i=n(49859),a=function(){function e(t){(0,r.A)(this,e),(0,i.A)(this,"thunk",void 0),this.thunk=t}return(0,o.A)(e,[{key:"value",get:function(){return this.thunk()}}]),e}(),u=new a((function(){return window})),l=new a((function(){return document}))},34861:function(e,t,n){"use strict";n.d(t,{$oX:function(){return h},EZk:function(){return p},EcY:function(){return y},EyF:function(){return v},Gpd:function(){return b},MRs:function(){return m},Md_:function(){return g},P6x:function(){return u},RJC:function(){return d},T1N:function(){return o},Tmo:function(){return S},W5p:function(){return a},Yro:function(){return i},Zkh:function(){return c},atX:function(){return l},ekt:function(){return f},f3R
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:Unicode text, UTF-8 text, with very long lines (13823)
                    Category:dropped
                    Size (bytes):13996
                    Entropy (8bit):5.411528102699808
                    Encrypted:false
                    SSDEEP:
                    MD5:E7E019E41003F5579677352C65822381
                    SHA1:E54EC42B7E034BD95776E856A826A02E9FF4C0F5
                    SHA-256:09F919ADF0A7F4C3EE28D2547F000283D2C3F9C9B2C4BCB41511882F25756B8B
                    SHA-512:A974614226241C240EFAA5E04BF9B4442B5AF2B18FB491E4B2B73ED4BDB3D6AC110D07DD0212BC8104C418E70EDDD3C73E4AA83131D4FCE576EC5B2D96F23774
                    Malicious:false
                    Reputation:unknown
                    Preview:/*! For license information please see signing_iframeless_mobile.5334.js.LICENSE.txt */."use strict";(self.webpackChunk_ds_signing=self.webpackChunk_ds_signing||[]).push([[5334],{95648:function(e,t,r){r.d(t,{h:function(){return y}});var a=r(97032),n=r(38008),i=r(27026),o=r(96540),d=r(5556),l=r.n(d),s=r(90812),c=r(78786),u=r(24914),p=r(59793),f=r(53811),m=r(11393),b=r.n(m),x=r(68150),h={base:e=>{var t,r=e.tokens;return{default:{wrapper:{display:"flex",background:r.formControlBgColorDefault,border:"1px solid ".concat(r.formControlBorderColorDefault),borderRadius:"2px",width:"100%",outline:"1px solid transparent",outlineOffset:"-".concat(r.focusWidth),transitionDuration:"100ms",transitionProperty:"border, outline","&:hover":{borderColor:r.formControlBorderColorHover}},input:(0,f.A)((0,f.A)({},r.fontBodyM),{},{textOverflow:"ellipsis",width:"100%",appearance:"none",background:"transparent",border:"none",color:r.fontColorDefault,height:"auto",margin:0,"::-webkit-calendar-picker-indicator":{d
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (61773)
                    Category:dropped
                    Size (bytes):61944
                    Entropy (8bit):5.304447875025489
                    Encrypted:false
                    SSDEEP:
                    MD5:BF3A9D5151C8B9D586CCEE2347368C3B
                    SHA1:C86D8899D703C46EE2E3660ED7D0FA48423D8CEB
                    SHA-256:0A9CD92388893914A5DEC03A5D7CAB4832A9912C1B30E5B5FF0EF67D61CC6D2B
                    SHA-512:ECFA1CAC35A7D02E42A0D73479FDEAEDD1377E9DAB3CC01EE0E0AB08278A64FE944C4C0E506B6D37CFDAA0A0FCE4AC8368FCED838D095D28E2F7D9426A7920D7
                    Malicious:false
                    Reputation:unknown
                    Preview:/*! For license information please see signing_iframeless_mobile.7675.js.LICENSE.txt */."use strict";(self.webpackChunk_ds_signing=self.webpackChunk_ds_signing||[]).push([[7675],{49810:function(e,t,r){r.d(t,{A:function(){return s}});var n=r(96540),o=r(56289),i=r(3574),a=r(28936),u=r(79943),l=r(52738),c=r(52474),f=r(42134);function s(){var e,t,r=(0,f.A)(),s=(0,a.remToPx)(25),d=!(null==r||null===(e=r.recipient)||void 0===e||!e.emailAddress)&&(null==r?void 0:r.isCompleteState)&&(null==r||null===(t=r.recipient)||void 0===t?void 0:t.isAccountless),y=(0,u.GV)(l.JU)<o.SL.small+(isNaN(s)?400:s)||(0,i.Fr)();return{style:(0,n.useMemo)((()=>(0,c.YG)(y)),[y]),isMobileLayout:y,isEnabled:d}}},52474:function(e,t,r){r.d(t,{UA:function(){return o},YG:function(){return i},pG:function(){return a}});var n=r(17437),o=(e,t,r,o)=>({container:(0,n.css)({position:e?"relative":"fixed",zIndex:o&&t&&r.modalIsShowing&&!r.finishLineSlideUpShowing?800:void 0},"","")}),i=e=>(0,n.css)({display:"flex",flexDirection:e?"
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (631), with no line terminators
                    Category:downloaded
                    Size (bytes):631
                    Entropy (8bit):5.161960443143843
                    Encrypted:false
                    SSDEEP:
                    MD5:C7FF0481BA4714B2A8EC37C636E9F48E
                    SHA1:B143A63B5285650603ACC063565B3769621063F0
                    SHA-256:38D3B5338C0DC8754CA866D7068A7089A49C1167E240669BF8FF0ABD17B4C3E9
                    SHA-512:F0C1EADFB2DB6A27094AEEB919B131CB10EF2C4250D5A7A698665D7085C33CC2D6C5AA6E1F699384B2709C4E411B2A7A39BBA95FA0A0FEE98DD14329607A5F07
                    Malicious:false
                    Reputation:unknown
                    URL:https://a.docusign.com/ds_arya_wrapper.min.js?f=1
                    Preview:(function(){var u=this;!function(n,t,i,f,r,e,o){if("function"==typeof define&&define.amd)return define(o);f&&f[r]?f[r]=o(n,0,!0,f,r,e):u[n]=o(n,0,!0,f,r,e)}("DS_Arya",0,0,u.module,"exports","length",function(t,i,n,f,r,e,o){"use strict";var u={},c=(s(function(){}),s({})),a=s("");function d(n){throw t+"-"+n}function s(n){var t=typeof n;return function(n){return typeof n==t}}function h(n){for(var t in n)u[t]=n[t]}return{i:function(n){i++?d(1):n!==o&&c(n)&&!n[e]?h(n):d(11)},g:function(n,t){return n&&a(n)?t&&t(u[n])||u[n]||!1:t&&t(u)||u||!1}}})}).call(this);;DS_Arya.i({"DS_A":"6538a7ab-081f-4f5c-8f9d-d44b0653dc48","DS_A_C":""});
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (46070)
                    Category:downloaded
                    Size (bytes):46239
                    Entropy (8bit):5.323637453572971
                    Encrypted:false
                    SSDEEP:
                    MD5:9FF6C771D8F1571EE4ED5A15C75741C8
                    SHA1:402F8577AE1E7175F354A7F3532CF90CAA61040D
                    SHA-256:647E0D35687A333F02B80F7C4605EA7B32DAF7A4314C5654B1F1F825AAFB9CF7
                    SHA-512:86455944731ED9D64979E6E3F261F1E04ECC728CBBD95D29905260B26BAD141BB987466ABCE5CD70013424AF8700160DA8F4CDB13027659C08B49D4C371EEC9D
                    Malicious:false
                    Reputation:unknown
                    URL:https://docucdn-a.akamaihd.net/production/1ds/widgets/@ds/signing/24.11.38-8/signing_iframeless_mobile.661.js?cs=9f9ef8c4690411d24923
                    Preview:/*! For license information please see signing_iframeless_mobile.661.js.LICENSE.txt */."use strict";(self.webpackChunk_ds_signing=self.webpackChunk_ds_signing||[]).push([[661],{54707:function(t,e,r){r.d(e,{C:function(){return _},R:function(){return P}}),r(40590),r(15195),r(18665),r(14913),r(87136),r(6048),r(14602);var n=r(96540),o=r(90993),a=r(19069),i=r(22434),c=r(51552),l=r(20621),u=(r(80115),r(47746),r(7918),r(79073),r(43148),r(40173),r(68329),r(56639),r(83725),r(29838),r(79404),r(39982),r(57399),r(86970),r(11048),r(2236),r(71650),r(26884),r(58710),r(63617),r(83019),r(98657),r(53380),r(58379),r(74692)),s=r.n(u),h=r(5984),f=r(60862),p=r(79361),d=r(75550),y=r(3574),v=r(7456),m=r(63868);function g(t,e){return function(t){if(Array.isArray(t))return t}(t)||function(t,e){var r=null==t?null:"undefined"!=typeof Symbol&&t[Symbol.iterator]||t["@@iterator"];if(null!=r){var n,o,a,i,c=[],l=!0,u=!1;try{if(a=(r=r.call(t)).next,0===e){if(Object(r)!==r)return;l=!1}else for(;!(l=(n=a.call(r)).done)&&
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:Unicode text, UTF-8 text, with very long lines (16859)
                    Category:downloaded
                    Size (bytes):17031
                    Entropy (8bit):5.306521448060462
                    Encrypted:false
                    SSDEEP:
                    MD5:DEC04B57977555D02A949E88B04CA086
                    SHA1:68CBDFCC8A9B00B93B4681986B88941C229F4FD9
                    SHA-256:1E78776195DAC7AF74183205A1916FD78F21F150FFCF62F8D9AB0491D8DD6F41
                    SHA-512:74C9499FD8D11C7BF856B5ADD280601298A10482A9D25537A1865FDC6118ED7663B3ECEABC879BE566543FAEFF60C81092C446949F8A055D0AD92C26BA326454
                    Malicious:false
                    Reputation:unknown
                    URL:https://docucdn-a.akamaihd.net/production/1ds/widgets/@ds/signing/24.11.38-8/signing_iframeless_mobile.2088.js?cs=2de7373c65c21923c5a6
                    Preview:/*! For license information please see signing_iframeless_mobile.2088.js.LICENSE.txt */."use strict";(self.webpackChunk_ds_signing=self.webpackChunk_ds_signing||[]).push([[2088],{52088:function(e,n,a){a.d(n,{T:function(){return t}});var r=a(96459),s=a(25514);function t(e,n){try{var a=(0,s.FJ)(),i=(0,r.T)(e,n);return(0,s.QK)(t.name,a),i}catch(n){return(0,s.UD)(t.name,n),e}}},96459:function(e,n,a){a.d(n,{T:function(){return x},k:function(){return w}});var r,s=a(11393),t=a.n(s),i=a(22204),l=a(71426),u=a.n(l),o=a(50697),d=a.n(o),c=["ar","bg_bg","cs_cz","da_dk","de_de","el_gr","en_au","en_gb","en_us","es_es","es_mx","et_ee","fa_ir","fi_fi","fr_ca","fr_fr","he_il","hi_in","hr_hr","hu_hu","hy_am","id_id","it_it","ja_jp","ko_kr","lt_lt","lv_lv","ms_my","nb_no","nl_nl","pl_pl","pt_br","pt_pt","ro_ro","ru_ru","sk_sk","sl_si","sr","sv_se","th_th","tr_tr","uk_ua","vi_vn","zh_cn","zh_tw","en_ca","en_ie","en_ph","en_in","en_za","en_nz","es_co","es_pr","fr_be","nl_be","es_ar","es_cr","es_cl","es_pe",
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (65448)
                    Category:dropped
                    Size (bytes):85044
                    Entropy (8bit):5.1891096742958975
                    Encrypted:false
                    SSDEEP:
                    MD5:D625021888FB263923D555D11F4D41A4
                    SHA1:F0274774A841DF73E1FBC138ABF0A9EB4F64AFA1
                    SHA-256:45643151800C77DBB83D3D24C5D90BD5BB989BB11E7E862F533584C00D9352D6
                    SHA-512:659A02FE9C416A8A6FD08FAF9ACC15DE266826612330A36A84B58D7040F81523DD20CB0700AF86CD82AF63DE656D858FB459AAF0AD574CBEE0BEFBC5DA09A9B2
                    Malicious:false
                    Reputation:unknown
                    Preview:/*! For license information please see signing_iframeless_mobile.9764.js.LICENSE.txt */."use strict";(self.webpackChunk_ds_signing=self.webpackChunk_ds_signing||[]).push([[9764],{95390:function(t,e,r){r.d(e,{_d:function(){return n},NA:function(){return p},aJ:function(){return w},bI:function(){return v},_q:function(){return h}});var n="https://a.docusign.com/f",o=(r(40590),r(27727),r(17),r(18665),r(10557),r(14913),r(31586),r(96982),r(3101),r(69193),r(44154),r(56639),r(83725),r(35019),r(29838),r(58379),r(14602),r(29827)),i=r(40010),a=r(79248);function c(){c=function(){return e};var t,e={},r=Object.prototype,n=r.hasOwnProperty,o=Object.defineProperty||function(t,e,r){t[e]=r.value},i="function"==typeof Symbol?Symbol:{},a=i.iterator||"@@iterator",u=i.asyncIterator||"@@asyncIterator",l=i.toStringTag||"@@toStringTag";function s(t,e,r){return Object.defineProperty(t,e,{value:r,enumerable:!0,configurable:!0,writable:!0}),t[e]}try{s({},"")}catch(t){s=function(t,e,r){return t[e]=r}}function f(t,e
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:HTML document, ASCII text, with very long lines (65448)
                    Category:dropped
                    Size (bytes):127211
                    Entropy (8bit):5.390308144034802
                    Encrypted:false
                    SSDEEP:
                    MD5:CD34838FD5BB396CB816821D6E77F649
                    SHA1:18BC0B2FAB1124614B321526237D980363A735B5
                    SHA-256:FFE96356B533198165293502713767D2FD6A0645F979BA5D0D21B1592404668D
                    SHA-512:BD4271F7483D97B71E7FCC23B0C13A4D01FAC228E6D241329592C770E99EF6CCC341A7B8B8AAAC675C237723977955DDC6114782B3A1D57B1AA719E2115A11ED
                    Malicious:false
                    Reputation:unknown
                    Preview:/*! For license information please see signing_iframeless_mobile.7797.js.LICENSE.txt */.(self.webpackChunk_ds_signing=self.webpackChunk_ds_signing||[]).push([[7797],{40139:function(e,t,n){var r=n(93633);e.exports=(r.default||r).template({1:function(e,t,n,r,o){var i=e.lookupProperty||function(e,t){if(Object.prototype.hasOwnProperty.call(e,t))return e[t]};return" "+e.escapeExpression((i(n,"getResource")||t&&i(t,"getResource")||e.hooks.helperMissing).call(null!=t?t:e.nullContext||{},"DocuSign_NotarizeError",{name:"getResource",hash:{},data:o,loc:{start:{line:1,column:57},end:{line:1,column:97}}}))+" "},3:function(e,t,n,r,o){var i=e.lookupProperty||function(e,t){if(Object.prototype.hasOwnProperty.call(e,t))return e[t]};return" "+e.escapeExpression((i(n,"getResource")||t&&i(t,"getResource")||e.hooks.helperMissing).call(null!=t?t:e.nullContext||{},"DocuSign_NotarizeWarning",{name:"getResource",hash:{},data:o,loc:{start:{line:1,column:107},end:{line:1,column:149}}}))+" "},5:function(e,t,n,r,o
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text
                    Category:downloaded
                    Size (bytes):119869
                    Entropy (8bit):4.18401975910281
                    Encrypted:false
                    SSDEEP:
                    MD5:ECE7A224F69AB2205D90900589AE1D05
                    SHA1:3D861B816A5DA892C8A88D5755A5537C036239DE
                    SHA-256:FFA8C6A4CE199BFD9E32B05E0E4DECE330C6A577FB3A0E8518291619C658C486
                    SHA-512:EEF4BDD54AF95BE42224FFE605BB627293DAEA0C58A50B328ACC8B56040C81FDCB5EC8406F56856FC617A552E4D6DD28BB892467666889D27F03EE8BFCD16D7B
                    Malicious:false
                    Reputation:unknown
                    URL:https://docucdn-a.akamaihd.net/v/static/mixpanel-2-2-1b.js
                    Preview:/*. * DocuSign modified version of Mixpanel JS Library v2.2.1. * $initial_referer and $referer have been removed, as not to send any senstive information. * $initial_referring_domain and referring_domain have been retained.. *. * Mixpanel JS Library v2.2.1. *. *. * Copyright 2012, Mixpanel, Inc. All Rights Reserved. * http://mixpanel.com/. *. * Includes portions of Underscore.js. * http://documentcloud.github.com/underscore/. * (c) 2011 Jeremy Ashkenas, DocumentCloud Inc.. * Released under the MIT License.. */..// ==ClosureCompiler==.// @compilation_level ADVANCED_OPTIMIZATIONS.// @output_file_name mixpanel-2.2.min.js.// ==/ClosureCompiler==../*.Will export window.mixpanel.*/../*.SIMPLE STYLE GUIDE:..this.x == public function.this._x == internal - only use within this file.this.__x == private - only use within the class..Globals should be all caps.*/.(function(mixpanel) {. /*. * Saved references to long variable names, so that closure compiler can. * minimize file size.. */. var
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:Unicode text, UTF-8 text, with very long lines (65439)
                    Category:downloaded
                    Size (bytes):485328
                    Entropy (8bit):5.849285959572288
                    Encrypted:false
                    SSDEEP:
                    MD5:06573B4089B6AE15BA75CDA15CDC26DC
                    SHA1:AB9BB4BF549A58346755D5F5682ABB0C68BF4014
                    SHA-256:94F1B29EA884DD3C743B21B789169206B93364AD249DE66EF6F7A073C83824DE
                    SHA-512:02444971483BA13654323821FF2504135F928B7DAD68D2BC11AD1A3623C2C9AC61EB9D9401602752B7FE7CB9B6E64E45F9C2C20A1748CF7E4FBCB37AF9C90FC8
                    Malicious:false
                    Reputation:unknown
                    URL:https://docucdn-a.akamaihd.net/production/1ds/widgets/@ds/signing/24.11.38-8/signing_iframeless_mobile.7991.js?cs=41ac448436650aa906e9
                    Preview:/*! For license information please see signing_iframeless_mobile.7991.js.LICENSE.txt */.(self.webpackChunk_ds_signing=self.webpackChunk_ds_signing||[]).push([[7991],{1643:function(e,t,a){"use strict";a.d(t,{A:function(){return v}});var n,o=a(59028),r=a(49859),i=a(53811),s=a(38008),l=a(38573),c=(n={"Powered by":{translation:"Powered by {{DOCUSIGN_LOGO}}"},"Contact Us":{translation:"Contact Us"},"Terms of Use":{translation:"Terms of Use"},Privacy:{translation:"Privacy"},"Intellectual Property":{translation:"Intellectual Property"},"xDTM Compliant":{translation:"xDTM Compliant"},"FOOTER:TRUST":{translation:"Trust"},"Copyright . {{CURRENT_YEAR}} DocuSign, Inc. All rights reserved":{translation:"Copyright . {{CURRENT_YEAR}} Docusign, Inc. All rights reserved"},Feedback:{translation:"Feedback"},"Aria-language-selector":{translation:"language selector"},"CMTS:NAME_NOT_AVAILABLE":{translation:"Name not available"},"CMTS:SELECTED_TEXT_LABEL":{translation:"SELECTED:"},"CMTS:PRIVACY_DESCRIPTION
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (65448)
                    Category:downloaded
                    Size (bytes):398830
                    Entropy (8bit):5.723161832804715
                    Encrypted:false
                    SSDEEP:
                    MD5:DAAD01ADC359B47B49908A74ECD07F2D
                    SHA1:BE29F6DC813A64F11D18E08CE79734E535DC8721
                    SHA-256:56409FCCE2E54B4570CB4A69827D0000CC0530A67A41B911516A2D90C61F2F71
                    SHA-512:E716C88D56DF5431DA387E8730DEE1A0E2FEEDC17137599A1DCF4373FE392EA57D1444FD1DBF0497BF7A01DD03F596EF393B70E51EC4B331D0B97E1062F400AD
                    Malicious:false
                    Reputation:unknown
                    URL:https://docucdn-a.akamaihd.net/production/1ds/widgets/@ds/signing/24.11.38-8/signing_iframeless_mobile.2191.js?cs=829a8778baf83ab1c4c1
                    Preview:/*! For license information please see signing_iframeless_mobile.2191.js.LICENSE.txt */.(self.webpackChunk_ds_signing=self.webpackChunk_ds_signing||[]).push([[2191,1976],{82715:function(e,t,r){"use strict";r.d(t,{pF:function(){return b},sf:function(){return L},_T:function(){return M},Xo:function(){return w},CK:function(){return H},xw:function(){return D},j0:function(){return O},sS:function(){return E}});var n=r(22204),o=r(71426),a=r.n(o),i=r(50697),s=r.n(i),c=r(59261),u=r.n(c),l=r(74707),_=r.n(l),f=r(11393),v=r.n(f),m=r(49763),d=r.n(m),p=r(25514),h="other";var A=r(38987),C=r(49166),E=function(e,t,r){var n=a()(t).call(t,(function(t){return void 0!==t[e]}));if(n){var o=n[e];if("string"==typeof o)return g(o,r);var i=T(e,n,r);if(i)return g(i,r)}return e},g=function(e,t){return t?s()(t).reduce((function(e,r){return e.replace(new RegExp("{{\\s*"+r+"\\s*}}","g"),t[r]+"")}),e):e},T=function(e,t,r){var o=t[e];if("object"===(0,n.A)(o)){var a,i=r?r.PLURAL_COUNT:void 0,s=null!==(a=t._LOCALE)&&void
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (65448)
                    Category:dropped
                    Size (bytes):91852
                    Entropy (8bit):5.15613176351478
                    Encrypted:false
                    SSDEEP:
                    MD5:82A99203D8F176022C5C5894591C1978
                    SHA1:A7F9F02E9C09A9E2CEF865CA57C24E86EEAB88B6
                    SHA-256:9471F5DC3C5BB27444DA82E4B80E056FB2F9AB4E020FDA0482C4070801E1BA51
                    SHA-512:DA3DE6E4C387F1C4B668EDA4981BB8A8A378F63A6BDBE5810054B9C8455DEFBBD0CF336383BCAEB6237CA7CAB6F70CA6CC17CA079C50F710E0424543405D2A94
                    Malicious:false
                    Reputation:unknown
                    Preview:/*! For license information please see signing_iframeless_mobile.8919.js.LICENSE.txt */."use strict";(self.webpackChunk_ds_signing=self.webpackChunk_ds_signing||[]).push([[8919],{83201:function(e,t,n){function r(){r=function(){return t};var e,t={},n=Object.prototype,o=n.hasOwnProperty,i=Object.defineProperty||function(e,t,n){e[t]=n.value},a="function"==typeof Symbol?Symbol:{},s=a.iterator||"@@iterator",u=a.asyncIterator||"@@asyncIterator",c=a.toStringTag||"@@toStringTag";function p(e,t,n){return Object.defineProperty(e,t,{value:n,enumerable:!0,configurable:!0,writable:!0}),e[t]}try{p({},"")}catch(e){p=function(e,t,n){return e[t]=n}}function d(e,t,n,r){var o=t&&t.prototype instanceof h?t:h,a=Object.create(o.prototype),s=new I(r||[]);return i(a,"_invoke",{value:E(e,n,s)}),a}function g(e,t,n){try{return{type:"normal",arg:e.call(t,n)}}catch(e){return{type:"throw",arg:e}}}t.wrap=d;var m="suspendedStart",f="suspendedYield",l="executing",w="completed",v={};function h(){}function b(){}function
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (28371)
                    Category:dropped
                    Size (bytes):28542
                    Entropy (8bit):5.379722889825617
                    Encrypted:false
                    SSDEEP:
                    MD5:1317A57B938133F1C22F70606779D939
                    SHA1:129E47D1946C50AE3338EA3F5A73634FF9DF2347
                    SHA-256:FB67EF14210E956333D25A5586E120ECF3AAACF4CAF7C61E9699E82D6E5766E0
                    SHA-512:37F4D91FAB5D5148D9AF851E36BC7F931717463E490986284898AEA8E222E142F0B52D8BE43288B3AAE373124507DB438C6EB6746FB56E845B77A8802F940E10
                    Malicious:false
                    Reputation:unknown
                    Preview:/*! For license information please see signing_iframeless_mobile.3329.js.LICENSE.txt */."use strict";(self.webpackChunk_ds_signing=self.webpackChunk_ds_signing||[]).push([[3329],{62247:function(e,t,r){r.r(t),r.d(t,{default:function(){return z},registerTabLookup:function(){return W}});var n={};r.r(n),r.d(n,{cleanUpTelemetryArr:function(){return L},getShouldUseSendBeaconForSave:function(){return j},isTelemetryFeatureEnabled:function(){return R},promiseToSwallowErrors:function(){return I},save:function(){return _},swallowErrors:function(){return C},telemetryRecorder:function(){return N}});var o=r(72398),a=(r(40590),r(17),r(3101),r(44154),r(56639),r(83725),r(35019),r(29838),r(58379),r(28936)),i=r(40010),c=r(46887);function u(e,t){var r=Object.keys(e);if(Object.getOwnPropertySymbols){var n=Object.getOwnPropertySymbols(e);t&&(n=n.filter((function(t){return Object.getOwnPropertyDescriptor(e,t).enumerable}))),r.push.apply(r,n)}return r}function l(e){for(var t=1;t<arguments.length;t++){var r=nu
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (65449)
                    Category:dropped
                    Size (bytes):148254
                    Entropy (8bit):5.312609346851331
                    Encrypted:false
                    SSDEEP:
                    MD5:6AF741F5310E43427B2A14CA21A4250B
                    SHA1:1EB292B49588E755BC2D8B0A32D137B7F2892AC8
                    SHA-256:37E8D2F7EF20885AD907BFC83FFDC21ED318BB0F05C3D64D146212B738B7A830
                    SHA-512:6AB525A79CE18D7BB164C21CFC1DEC2DBC730B378C673ADE3F7AB2E849411ABA78C681625C90E92C178ADE42F925074B1CA4B696CCBC1A57DE6FD8BA3954615B
                    Malicious:false
                    Reputation:unknown
                    Preview:/*! For license information please see signing_iframeless_mobile.201.js.LICENSE.txt */.(self.webpackChunk_ds_signing=self.webpackChunk_ds_signing||[]).push([[201],{65945:function(e,t,n){"use strict";n.d(t,{s:function(){return s}});var r=n(11393),o=n.n(r),i=n(87425),a=n.n(i),s=function(e){var t,n=arguments.length>1&&void 0!==arguments[1]?arguments[1]:10;return o()(t="".concat(e||"")).call(t,a()(n))}},87425:function(e){for(var t=self.crypto||self.msCrypto,n="-_",r=36;r--;)n+=r.toString(36);for(r=36;r---10;)n+=r.toString(36).toUpperCase();e.exports=function(e){var o="",i=t.getRandomValues(new Uint8Array(e||21));for(r=e||21;r--;)o+=n[63&i[r]];return o}},69586:function(e,t,n){"use strict";n.r(t),n.d(t,{Motion:function(){return va},MotionPresence:function(){return Aa},MotionVariant:function(){return ha},disableMotion:function(){return ia},enableMotion:function(){return aa}});var r=n(39653);"undefined"==typeof Proxy&&(self.Proxy=function e(){(0,r.A)(this,e)});var o=n(97032),i=n(27026),a=n(965
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:JSON data
                    Category:downloaded
                    Size (bytes):36374
                    Entropy (8bit):5.0734452911471974
                    Encrypted:false
                    SSDEEP:
                    MD5:0ED07B1FB00F2FFF56C8FF113CAA18C7
                    SHA1:5A95A2018CF0004706E3C7E95DDC678DAD6F426E
                    SHA-256:9E4B24CBC3D4CAE2BF90AE2F48AE43C490CDA68D05373399808B2951A1EF5193
                    SHA-512:AC85F799A537A0B77121F76AF8F46B9B9C2290E58EB6F15536F0E48594C579C6EE9B0A6F97B20B768DCE4F515CC95FA1E2A5C69E5B49D82F4E870A046D5510E9
                    Malicious:false
                    Reputation:unknown
                    URL:https://cdn.optimizely.com/datafiles/MUGKFLCdCtxUSgrSTyhbw.json
                    Preview:{"accountId":"275532918","projectId":"28979720534","revision":"172","attributes":[{"id":"28960590398","key":"senderAccountId"},{"id":"28995200462","key":"account_id"},{"id":"29059960131","key":"ring"},{"id":"29732750086","key":"isCaptiveRecipient"},{"id":"29742800020","key":"language"},{"id":"29754640024","key":"isAccountless"},{"id":"29766230035","key":"recipientEmailDomain"},{"id":"29771920059","key":"environment"},{"id":"30161890713","key":"userLanguage"},{"id":"30233280179","key":"browserLanguage"},{"id":"30247090071","key":"isMobile"},{"id":"4739065589792768","key":"isNotary"},{"id":"5038366994464768","key":"isBranded"},{"id":"5361812727136256","key":"senderAccountPlanName"},{"id":"6039513536397312","key":"senderAccountDistributorCode"}],"audiences":[{"name":"signer_monetization","conditions":"[\"or\", {\"match\": \"exact\", \"name\": \"$opt_dummy_attribute\", \"type\": \"custom_attribute\", \"value\": \"$opt_dummy_value\"}]","id":"29771490115"},{"name":"fv_USAA_accounts","conditi
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (65536), with no line terminators
                    Category:downloaded
                    Size (bytes):240748
                    Entropy (8bit):5.092451370734677
                    Encrypted:false
                    SSDEEP:
                    MD5:2C73DD9B48CB342C5FEB81C8A378B291
                    SHA1:FA52BCA3CF57FFE2FBA82D3C923B1A3DE1E38E76
                    SHA-256:DA90AEA8421C31DDAB9FADDF17FC9D1F7EE9B466786C8113F0C523DB8CB3F00C
                    SHA-512:FA16248370983FFFE7DD3E1F68B988FF24D11633CC61C796EE285D06CB4368FBF647CE7805B57B6736038D7E961FD242529D7254938CB6F38217DFC1759B4047
                    Malicious:false
                    Reputation:unknown
                    URL:https://docucdn-a.akamaihd.net/production/1ds/widgets/@ds/signing/24.11.38-8/olive/17.20.0/css/olive.min.css
                    Preview:@font-face{font-family:olive-icons;font-style:normal;font-weight:400;src:url(../fonts/olive-icons.eot);src:url(../fonts/olive-icons.eot?#iefix) format("eot"),url(../fonts/olive-icons.woff) format("woff"),url(../fonts/olive-icons.ttf) format("truetype"),url(../fonts/olive-icons.svg#olive-icons) format("svg")}@-webkit-keyframes slightFadeInUp{0%{opacity:0;-webkit-transform:translate3d(0,5px,0);transform:translate3d(0,5px,0)}to{opacity:1;-webkit-transform:none;transform:none}}@keyframes slightFadeInUp{0%{opacity:0;-webkit-transform:translate3d(0,5px,0);transform:translate3d(0,5px,0)}to{opacity:1;-webkit-transform:none;transform:none}}@-webkit-keyframes scaleIn{0%{-webkit-transform:scale(0);transform:scale(0)}to{-webkit-transform:scale(1);transform:scale(1)}}@keyframes scaleIn{0%{-webkit-transform:scale(0);transform:scale(0)}to{-webkit-transform:scale(1);transform:scale(1)}}/*! normalize.css v3.0.1 | MIT License | git.io/normalize */html{-ms-text-size-adjust:100%;-webkit-text-size-adjust:1
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (65443)
                    Category:dropped
                    Size (bytes):259784
                    Entropy (8bit):5.364810568708785
                    Encrypted:false
                    SSDEEP:
                    MD5:661EE6E67109C19C4F1231FA688B2B10
                    SHA1:C4D4466C0A8D1F52DAE1D209A26F29D43A88AFC8
                    SHA-256:4B57DB57C5DBCC7B491ABA41E551E89F744E79CEEE79AA42AC6C22244C662487
                    SHA-512:1DB724B084CB89666AAC2C4A010731B6FE0329BC2B80DC27231476D5F935CCC4ABC713C552875AD03656B69A98622AE8469D69793BACA08B73259FB94790A674
                    Malicious:false
                    Reputation:unknown
                    Preview:/*! For license information please see signing_iframeless_mobile.react-app.js.LICENSE.txt */.(self.webpackChunk_ds_signing=self.webpackChunk_ds_signing||[]).push([[4210,2522],{15324:function(e,t,r){var n=r(93633);e.exports=(n.default||n).template({compiler:[8,">= 4.3.0"],main:function(e,t,r,n,o){var i,a=e.lambda,l=e.escapeExpression,c=e.lookupProperty||function(e,t){if(Object.prototype.hasOwnProperty.call(e,t))return e[t]};return'<div class="center-content"><div class="text-wrap"><h3>'+l(a(null!=(i=null!=t?c(t,"resources"):t)?c(i,"slideUpTitle"):i,t))+"</h3> <p>"+(null!=(i=a(null!=(i=null!=t?c(t,"resources"):t)?c(i,"slideUpText"):i,t))?i:"")+'</p></div><button type="button" class="finish-button btn btn-main btn-lg" data-action="action-bar-finish" data-qa="slide-up-bar-finish-button" id="slide-up-bar-finish-button" aria-label="Finish" data-allow-unprompted-exit disabled="disabled"> '+l(a(null!=(i=null!=t?c(t,"resources"):t)?c(i,"slideUpButton"):i,t))+" </button></div>"},useData:!0})},6
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (24600)
                    Category:downloaded
                    Size (bytes):24771
                    Entropy (8bit):5.16649553919226
                    Encrypted:false
                    SSDEEP:
                    MD5:3A048EA7BE88ABF0FEC5899DF72EA291
                    SHA1:9E55AD7A3831A792FD826A40CE75845737D9097D
                    SHA-256:AE697CD440125DBC55C2C885FF02503330876535812CE1EF53918E5FE42D74D8
                    SHA-512:B97D812BEE3386702A3A7EF1EE5CE992E47B5EC2B758508482088456680156A408FCC4D9D4A2AB7FC3B18EEF3D23FFF0BB2E16698AC323E063F4FDDF6E4A3B61
                    Malicious:false
                    Reputation:unknown
                    URL:https://docucdn-a.akamaihd.net/production/1ds/widgets/@ds/signing/24.11.38-8/signing_iframeless_mobile.9028.js?cs=22872eaeb7dadb7137d1
                    Preview:/*! For license information please see signing_iframeless_mobile.9028.js.LICENSE.txt */."use strict";(self.webpackChunk_ds_signing=self.webpackChunk_ds_signing||[]).push([[9028],{33617:function(e,t,r){r.d(t,{e:function(){return re}});var n=r(53811),s=r(34963),a=r(39653),i=r(56213),o=r(49859),u=r(44828),c=r.n(u),l=r(61240),h=r.n(l),d=r(50697),f=r.n(d),p=r(96319),v=r.n(p),y=r(11393),k=r.n(y),m={get:function(){return null},has:function(){return!1},forEach:function(){return""}},A=function e(t,r,n,s){(0,a.A)(this,e),(0,o.A)(this,"status",void 0),(0,o.A)(this,"description",void 0),(0,o.A)(this,"request",void 0),(0,o.A)(this,"error",void 0),(0,o.A)(this,"willRetry",void 0),(0,o.A)(this,"attempt",void 0),this.request=n,this.description=r,this.status=t,this.error=s},q=r(11922),g=r(49166),T=r(13101),b=r(35352),w=r(85569),R=r.n(w),x=(r(78624),r(56152),r(8628)),C=r.n(x),E=r(165),L=r.n(E),H=function(){function e(){(0,a.A)(this,e)}var t,r,n,o,u;return(0,i.A)(e,[{key:"get",value:(u=(0,s.A)(c().mark((
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (65448)
                    Category:downloaded
                    Size (bytes):74443
                    Entropy (8bit):5.342806467692451
                    Encrypted:false
                    SSDEEP:
                    MD5:9F5EDE38B0D1D7FE0EE6E2A72BB52655
                    SHA1:DD7C0784B957C8103AEEF4200A1B658EFFDE28C5
                    SHA-256:83F8ECFA94B75E542672E438B4CFA06B7A819F78CD130BDD700FD2269EE4C44E
                    SHA-512:DC978E280B74078254CE1EA21A319BFF87027A0291EA10FEA353A35039021549DB4E280792A6F0477EF14512EFEC52D13BE2A9509760F7781C8DEA041BF1D536
                    Malicious:false
                    Reputation:unknown
                    URL:https://docucdn-a.akamaihd.net/production/1ds/widgets/@ds/signing/24.11.38-8/signing_iframeless_mobile.6693.js?cs=3bb8fb45a63a282fc513
                    Preview:/*! For license information please see signing_iframeless_mobile.6693.js.LICENSE.txt */.(self.webpackChunk_ds_signing=self.webpackChunk_ds_signing||[]).push([[6693],{57279:function(t,e,n){"use strict";var r=n(5946);Object.defineProperty(e,"__esModule",{value:!0}),e.default=void 0;var a=r(n(61240)),o=r(n(20271)),i=r(n(43563)),u=r(n(70533)),c=function(){function t(){(0,o.default)(this,t),(0,u.default)(this,"queue",new Array),(0,u.default)(this,"workingOnPromise",!1)}return(0,i.default)(t,[{key:"enqueue",value:function(t){var e=this;return new a.default((function(n,r){e.queue.push({worker:t,resolve:n,reject:r}),e.dequeue()}))}},{key:"dequeue",value:function(){var t=this;if(this.workingOnPromise)return!1;var e=this.queue.shift();if(!e)return!1;try{this.workingOnPromise=!0,e.worker().then((function(n){t.workingOnPromise=!1,e.resolve(n),t.dequeue()})).catch((function(n){t.workingOnPromise=!1,e.reject(n),t.dequeue()}))}catch(t){this.workingOnPromise=!1,e.reject(t),this.dequeue()}return!0}}]),
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:Unicode text, UTF-8 text, with very long lines (61850), with LF, NEL line terminators
                    Category:dropped
                    Size (bytes):348802
                    Entropy (8bit):5.446933234812093
                    Encrypted:false
                    SSDEEP:
                    MD5:ED516E6BE9429849D1704B6C35A417EA
                    SHA1:4C88BE47B062EDF1C2745B7355C057EB55388B02
                    SHA-256:A7CBAB07C5097E23745F62CA8B5914F1B93938258D670E23F2D18B5CCC3C323D
                    SHA-512:C9E5CC564B19250947E4AE8C4E5DFF64DAE1B35911D9DC755B0F0A04B13C9DD260C2E73B236B5835149C4AA300065109403B69D8886A1D8C90057DBF0178387B
                    Malicious:false
                    Reputation:unknown
                    Preview:/*! For license information please see signing_iframeless_mobile.js.LICENSE.txt */.!function(){var t,e,r,n,o,i={79100:function(t,e,r){"use strict";r.d(e,{_:function(){return s}});var n=r(38729),o=function(){function t(){}return t.prototype.active=function(){return n.l},t.prototype.with=function(t,e,r){for(var n=[],o=3;o<arguments.length;o++)n[o-3]=arguments[o];return e.call.apply(e,function(t,e,r){if(r||2===arguments.length)for(var n,o=0,i=e.length;o<i;o++)!n&&o in e||(n||(n=Array.prototype.slice.call(e,0,o)),n[o]=e[o]);return t.concat(n||Array.prototype.slice.call(e))}([r],function(t,e){var r="function"==typeof Symbol&&t[Symbol.iterator];if(!r)return t;var n,o,i=r.call(t),a=[];try{for(;(void 0===e||e-- >0)&&!(n=i.next()).done;)a.push(n.value)}catch(t){o={error:t}}finally{try{n&&!n.done&&(r=i.return)&&r.call(i)}finally{if(o)throw o.error}}return a}(n),!1))},t.prototype.bind=function(t,e){return e},t.prototype.enable=function(){return this},t.prototype.disable=function(){return this},t}
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (7965)
                    Category:downloaded
                    Size (bytes):8136
                    Entropy (8bit):5.128500116202406
                    Encrypted:false
                    SSDEEP:
                    MD5:692906E147A4306A10623B24511EE10C
                    SHA1:CE92C758DE9440D5195B04E2F71A57476F2EF444
                    SHA-256:F7B86D4053EF73B861F31139C0A3FC374CC14310E84261131FA0A34F4C92138E
                    SHA-512:42B69323BA7119E8463343DFDAFB65536D458F96E7615FCDD7583B515DF0276A2EE95271BDFA0B9DF1D3A3F6A4901CA9458C070166D09D398240E1AD8BE20051
                    Malicious:false
                    Reputation:unknown
                    URL:https://docucdn-a.akamaihd.net/production/1ds/widgets/@ds/signing/24.11.38-8/signing_iframeless_mobile.1946.js?cs=3ef732a0608ed868f4de
                    Preview:/*! For license information please see signing_iframeless_mobile.1946.js.LICENSE.txt */."use strict";(self.webpackChunk_ds_signing=self.webpackChunk_ds_signing||[]).push([[1946],{1946:function(e,t,a){a(83995),a(83725),a(52598);var i=a(74692),n=a.n(i),o=a(4523),d=a(19753),l=a(973),r=a(3147),c=a(23664),s=a(89221),h=a(85919),u=a(19839),g=a(51552),p=a(6232),v=0,f=h.A.extend({tagName:"div",className:"modal",events:{"click .close":"cancelOrClose"},dialogId:null,uri:null,useCache:!0,$lastActiveElement:n()([]),initialize(e){},mapUriData(e){return e},update(e,t){t=t||{},e=e||{};var a=this;function i(e){var t=!!e;if(d.default.envelope){var i=e.resources||{},n=d.default.envelope.resources||{};(e=o.default.extend({},d.default.envelope,e)).resources=o.default.extend({},n,i)}t?a.reload(a.mapUriData(e)):a.render(),a.$el.attr("modal-ready","")}"envelope"!==this.uri&&d.default[this.uri]?(i(d.default[this.uri]),t.afterUpdate&&t.afterUpdate()):this.uri&&!d.default[this.uri]?(t.showProgress&&g.A.trigger("
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (27974)
                    Category:downloaded
                    Size (bytes):28145
                    Entropy (8bit):5.111932567512103
                    Encrypted:false
                    SSDEEP:
                    MD5:F03BC80FE19576E53EE79979463F9024
                    SHA1:3B2AE70F8ECC97DDA978AE7473146C83BE499262
                    SHA-256:955EC39E298442113983D14E7EBCB49C8C57F301E88A3DAA05705AD34556286B
                    SHA-512:5D16125CB1C83A9C7863FDCF019714CDDE1A20D3F453D29D9E312A7669D6A5025807F45DA647E554C72862AA20688862CFBA5ABAF2736FB508293D0C2477EFC4
                    Malicious:false
                    Reputation:unknown
                    URL:https://docucdn-a.akamaihd.net/production/1ds/widgets/@ds/signing/24.11.38-8/signing_iframeless_mobile.1882.js?cs=24c1d6df45358823acd7
                    Preview:/*! For license information please see signing_iframeless_mobile.1882.js.LICENSE.txt */."use strict";(self.webpackChunk_ds_signing=self.webpackChunk_ds_signing||[]).push([[1882],{6648:function(n,r,t){var u=t(65077),e=t(18679),i=TypeError,o=Object.getOwnPropertyDescriptor,f=u&&!function(){if(void 0!==this)return!0;try{Object.defineProperty([],"length",{writable:!1}).length=1}catch(n){return n instanceof TypeError}}();n.exports=f?function(n,r){if(e(n)&&!o(n,"length").writable)throw i("Cannot set read only .length");return n.length=r}:function(n,r){return n.length=r}},24881:function(n,r,t){var u=t(13838),e=TypeError;n.exports=function(n,r){if(!delete n[r])throw e("Cannot delete property "+u(r)+" of "+u(n))}},68763:function(n,r,t){var u=t(51605),e=t(92612),i=t(6539),o=t(79328),f=t(23493),c=t(6648),a=t(57242),l=t(62998),s=t(52057),p=t(24881),h=t(45634)("splice"),v=Math.max,d=Math.min;u({target:"Array",proto:!0,forced:!h},{splice:function(n,r){var t,u,h,y,g,m,b=e(this),w=f(b),j=i(n,w),x=argu
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:Unicode text, UTF-8 text, with very long lines (65427)
                    Category:downloaded
                    Size (bytes):197180
                    Entropy (8bit):5.034348131679163
                    Encrypted:false
                    SSDEEP:
                    MD5:CEEB59F1BBE389D85F0C979D844BF008
                    SHA1:F80ECC9AD12577493D269217EBE8C78FC37DCDB8
                    SHA-256:BC7851B900A19E676C51C4BDE04639CC0B27E47C384370AB517C5BE72EA01DA5
                    SHA-512:8E4C8B6219F9DC13CEBCC442AF622D22CC1EF7FD9158C2B9824E038DD529BCD2CCEB8F08D62E2D525DBC16A57565D90F8C3B08363EA196FA2E36C5B054C77593
                    Malicious:false
                    Reputation:unknown
                    URL:https://docucdn-a.akamaihd.net/production/1ds/widgets/@ds/signing/24.11.38-8/signing_iframeless_mobile.5889.js?cs=f1f6116f126a2a72f4ae
                    Preview:/*! For license information please see signing_iframeless_mobile.5889.js.LICENSE.txt */."use strict";(self.webpackChunk_ds_signing=self.webpackChunk_ds_signing||[]).push([[5889],{5889:function(e,t,n){n.d(t,{M:function(){return y},W:function(){return b}}),n(40590),n(27727),n(18665),n(10557),n(14913),n(31586),n(96982),n(69193),n(56639),n(83725),n(29838),n(58379),n(14602);var i=n(18719),a=n(59028),r=n(34248),o=(n(80115),n(15195),n(84095),n(75670),n(87136),n(6048),n(40173),n(82715));function s(e,t,n,i,a,r,o){try{var s=e[r](o),l=s.value}catch(e){return void n(e)}s.done?t(l):Promise.resolve(l).then(i,a)}function l(){l=function(){return t};var e,t={},n=Object.prototype,i=n.hasOwnProperty,a=Object.defineProperty||function(e,t,n){e[t]=n.value},r="function"==typeof Symbol?Symbol:{},o=r.iterator||"@@iterator",s=r.asyncIterator||"@@asyncIterator",c=r.toStringTag||"@@toStringTag";function u(e,t,n){return Object.defineProperty(e,t,{value:n,enumerable:!0,configurable:!0,writable:!0}),e[t]}try{u({},""
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (32843)
                    Category:downloaded
                    Size (bytes):33014
                    Entropy (8bit):5.3799032238217945
                    Encrypted:false
                    SSDEEP:
                    MD5:30FE3DC6C28C79767CC85DFB34E487EB
                    SHA1:3A11F5A934DCBD5B9475D7B2B750C7DF3FAE1E30
                    SHA-256:A8E02E733FAB3CEE73485F3C26CC6CDFB7C3DEE3C1FBDDFBEC38F59D375F06D3
                    SHA-512:D0C6E399760624835536EE08F855A08009C66213F1352550515BC07EEB9B1757A3B57BDDDE8B181B2B6D1B01D0D565CA6D71238568C86194AF7037DC8B90A7FB
                    Malicious:false
                    Reputation:unknown
                    URL:https://docucdn-a.akamaihd.net/production/1ds/widgets/@ds/signing/24.11.38-8/signing_iframeless_mobile.9350.js?cs=b852bf7f83744943d133
                    Preview:/*! For license information please see signing_iframeless_mobile.9350.js.LICENSE.txt */.(self.webpackChunk_ds_signing=self.webpackChunk_ds_signing||[]).push([[9350],{32627:function(e,t,n){"use strict";n.d(t,{k:function(){return i}});var o=n(96540),i=function(e){var t=(0,o.useRef)();return void 0===t.current&&(t.current={value:e()}),t.current.value}},44164:function(e,t,n){"use strict";n.d(t,{B:function(){return r}});var o=n(38008),i=n(96540);function r(e,t){var n=(0,i.useState)(!1),r=(0,o.A)(n,2),a=r[0],s=r[1];return(0,i.useEffect)((function(){var n=new IntersectionObserver((function(e){(0,o.A)(e,1)[0].intersectionRatio<1?s(!0):s(!1)}),{root:t,threshold:1});return e&&n.observe(e),function(){n.disconnect()}}),[t,e]),a}n(95127)},45268:function(e,t,n){"use strict";n.d(t,{p:function(){return i}});var o=n(96540);function i(){var e=(0,o.useRef)(!1),t={get mounted(){return!!e.current}};return(0,o.useLayoutEffect)((function(){return e.current=!0,function(){e.current=!1}}),[]),t}},9729:function(
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (16718)
                    Category:dropped
                    Size (bytes):16889
                    Entropy (8bit):5.305771559126156
                    Encrypted:false
                    SSDEEP:
                    MD5:7E0A5ABCB31199770B38DD9A0F557491
                    SHA1:D4719F356E6800A6F664BCE7B3DDF7715607E5A3
                    SHA-256:0EE7DF63AA74F1623D01D69A016D845FD9024854A2F034D229ADE68D801DE4AA
                    SHA-512:FD96C650BE8A5714BA3A92BD6EBA045B5CBDD9666163BE3701B9357F2046F9966C9FFFEACE28F69713695B2351ADA9268511286680D2CC722A78D5DCAD260E7C
                    Malicious:false
                    Reputation:unknown
                    Preview:/*! For license information please see signing_iframeless_mobile.6463.js.LICENSE.txt */."use strict";(self.webpackChunk_ds_signing=self.webpackChunk_ds_signing||[]).push([[6463],{96463:function(e,t,s){s(19693),s(68763),s(79073),s(87136),s(6048),s(40173),s(68329);var n=s(74692),i=s.n(n),r=s(89221),o=s(75550);t.A=function(e,t,s){var n,a,l,u=e.ss||{},p=/^\s+/,h=/\s+$/,c=/[xy]/g,d=/.*(\/|\\)/,f=/.*[.]/,_=/[\t\r\n]/g,g=Object.prototype.toString.call(e.HTMLElement).indexOf("Constructor")>0,m=t.createElement("input");return m.type="file",n="multiple"in m&&"undefined"!=typeof File&&void 0!==(new XMLHttpRequest).upload,u.obj2string=function(e,t){var s=[];for(var n in e)if(Object.prototype.hasOwnProperty.call(e,n)){var i=t?t+"["+n+"]":n,r=e[n];s.push("object"==typeof r?u.obj2string(r,i):encodeURIComponent(i)+"="+encodeURIComponent(r))}return s.join("&")},u.extendObj=function(e,t){for(var s in t)Object.prototype.hasOwnProperty.call(t,s)&&(e[s]=t[s])},u.contains=function(e,t){for(var s=e.length;s-
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (65448)
                    Category:downloaded
                    Size (bytes):84993
                    Entropy (8bit):5.266878130239354
                    Encrypted:false
                    SSDEEP:
                    MD5:388BD04B69B4A51F32438DCEFC4BA950
                    SHA1:2628528AAB473325DFB08F0F8B27F8A9CC4A3C06
                    SHA-256:F7AAB38FBB9AA270C41CFAC7E8A9CF9DD8DF3FC830C702183000D1ABDF236A8A
                    SHA-512:2BF22B5E6E3C4B59945A9741783149F5D37653683B6A2793065A257F556072A92124F2995040CE060734574B98210A93CADA67EC6A6132EB5E1C2331C7866D1E
                    Malicious:false
                    Reputation:unknown
                    URL:https://docucdn-a.akamaihd.net/production/1ds/widgets/@ds/signing/24.11.38-8/signing_iframeless_mobile.6826.js?cs=8b9a2edefbbda32cdf88
                    Preview:/*! For license information please see signing_iframeless_mobile.6826.js.LICENSE.txt */."use strict";(self.webpackChunk_ds_signing=self.webpackChunk_ds_signing||[]).push([[6826],{45603:function(e,t,n){n.d(t,{k:function(){return u}});var r=n(38008),o=n(96540),i=n(82715),u=function(){var e=(0,o.useState)((0,i._T)()||""),t=(0,r.A)(e,2),n=t[0],u=t[1];return(0,o.useEffect)((function(){var e=function(){u(arguments.length>0&&void 0!==arguments[0]?arguments[0]:"")};return(0,i.pF)(e),function(){return(0,i.CK)(e)}}),[]),n}},92742:function(e,t,n){n.d(t,{A:function(){return S}});var r=n(53811),o=n(27026),i=n(48079),u=n.n(i),c=n(96319),l=n.n(c),s=n(8628),a=n.n(s),f=n(96540),d=n(45603),m=n(90812),p=n(6982),v=n(95361),g=n(34743),h=n(53289),y=n(18491),b=n(59793),w=n(94801),x=n(31824),E={flip:function(){return{mainAxis:!(arguments.length>0&&void 0!==arguments[0])||arguments[0],crossAxis:!(arguments.length>1&&void 0!==arguments[1])||arguments[1],fallbackAxisSideDirection:arguments.length>2&&void 0!==arg
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:Unicode text, UTF-8 text, with very long lines (65340)
                    Category:dropped
                    Size (bytes):410704
                    Entropy (8bit):5.3600762660869385
                    Encrypted:false
                    SSDEEP:
                    MD5:0F2CD48BDA5FB302C59EEDA4A9E9FAF7
                    SHA1:1E16F644C4C8A5AE131527814C7A9CA2E70A58C7
                    SHA-256:39F70165A1906138A5F5378223DA0C66933EC5FE1F70356D13D8E373C2686869
                    SHA-512:24679277C7F95CE46C2DD908F9B6339EB754F9DD678D4886C3D9005BF307915A9680E176CCCA006000B82885603006914C20276E9BA06044C0E539C759EEE762
                    Malicious:false
                    Reputation:unknown
                    Preview:/*! For license information please see signing_iframeless_mobile.7588.js.LICENSE.txt */.(self.webpackChunk_ds_signing=self.webpackChunk_ds_signing||[]).push([[7588],{95979:function(t,e,r){"use strict";var i=r(97032),a=r(96540);e.A=({accessibilityText:t,forwardedRef:e,...r})=>a.createElement("svg",(0,i.A)({xmlns:"http://www.w3.org/2000/svg",viewBox:"0 0 24 24",width:24,height:24,"aria-hidden":!t||void 0,"aria-label":t,focusable:!1,ref:e,role:t?"img":void 0},r),a.createElement("path",{d:"m15.66 22-9.41-9.41a.82.82 0 0 1 0-1.18L15.66 2 17 3.34 8.34 12 17 20.66z"}))},88497:function(t,e,r){"use strict";var i=r(97032),a=r(96540);e.A=({accessibilityText:t,forwardedRef:e,...r})=>a.createElement("svg",(0,i.A)({xmlns:"http://www.w3.org/2000/svg",viewBox:"0 0 24 24",width:24,height:24,"aria-hidden":!t||void 0,"aria-label":t,focusable:!1,ref:e,role:t?"img":void 0},r),a.createElement("path",{d:"M22 10v7a1 1 0 0 1-1 1H8l-6 4V5a1 1 0 0 1 1-1h13v2H4v12.26L7.39 16H20v-6zm2-6h-2V2h-2v2h-2v2h2v2h2V6h2zm-
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (65448)
                    Category:downloaded
                    Size (bytes):67961
                    Entropy (8bit):5.037518214459591
                    Encrypted:false
                    SSDEEP:
                    MD5:2F6738F90BAF8FD114F4E28D487E1CD9
                    SHA1:2735F84AE90C6478933E994286AFAAA8963B2136
                    SHA-256:4606370BE9E4BBE2053A4CBD3FA3E206AD15781EA465F8C0C3484170B6996678
                    SHA-512:B807B57EE3F2107761DBFE9E27968968220DB08556954F76753870AEF75CB09759C379A0A5CD2E361BDC42A601072D86D99394216C3ADBA9D51C17B30E0847FD
                    Malicious:false
                    Reputation:unknown
                    URL:https://docucdn-a.akamaihd.net/production/1ds/widgets/@ds/signing/24.11.38-8/signing_iframeless_mobile.8002.js?cs=0e59cfbca464a8e95496
                    Preview:/*! For license information please see signing_iframeless_mobile.8002.js.LICENSE.txt */."use strict";(self.webpackChunk_ds_signing=self.webpackChunk_ds_signing||[]).push([[8002],{15069:function(a,o,n){n.d(o,{x:function(){return c}});var t=n(96540),e=(0,t.createContext)({requiredAttribute:!1}),c=()=>(0,t.useContext)(e)},83784:function(a,o,n){n.d(o,{x:function(){return y}});var t=n(97032),e=n(27026),c=(n(96540),n(5556)),g=n.n(c),s=n(90812),i=n(46714),l=n(49956),r=n(19880),d=n(59793),p=n(53811),f={base:a=>{var o=a.tokens,n=a.props;return{default:{wrap:(0,p.A)((0,p.A)({},o.fontDetailS),{},{display:"error"===n.kind?"flex":void 0,margin:0,padding:0,"& > svg":{fill:"currentColor",flex:"error"===n.kind?"0 0 auto":void 0,marginInlineEnd:"8px"}})},helper:{wrap:{color:o.fontColorSubtle}},error:{wrap:{color:o.fontColorError}},disabled:{cursor:"not-allowed",opacity:o.opacityDisabled}}}},v=n(17437),u=["children","data-qa","disabled","id","kind"],m=["error","helper"];function y(a){var o=a.children,n=
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (65447)
                    Category:downloaded
                    Size (bytes):136176
                    Entropy (8bit):5.178395204770072
                    Encrypted:false
                    SSDEEP:
                    MD5:B996140AA55B4DCEFBE20B0EC96447B3
                    SHA1:5C715DD38582604148904BADAF0342982195F698
                    SHA-256:54C6DB3FC48C1F54FAD197E91744DA04EB8FB584FBDB581A5C1E92CD6E72E12D
                    SHA-512:529A34EEEE2EB0765F549CBD667238928DA1C57CC48B41B5674CABA9098E44E7706B0B7F7B3FB9A22C69CD5ACF29EB0546DCAC4515FA2E298C72A7CD5B034561
                    Malicious:false
                    Reputation:unknown
                    URL:https://docucdn-a.akamaihd.net/production/1ds/widgets/@ds/signing/24.11.38-8/signing_iframeless_mobile.olive.js?cs=e0740911f01cf8fd8c81
                    Preview:/*! For license information please see signing_iframeless_mobile.olive.js.LICENSE.txt */.(self.webpackChunk_ds_signing=self.webpackChunk_ds_signing||[]).push([[1540],{43466:function(e){e.exports=function(e){function t(i){if(n[i])return n[i].exports;var o=n[i]={exports:{},id:i,loaded:!1};return e[i].call(o.exports,o,o.exports,t),o.loaded=!0,o.exports}var n={};return t.m=e,t.c=n,t.p="/",t(0)}([function(e,t,n){"use strict";n(1),n(2),n(3);var i=n(76);i.keys().forEach((function(e){i(e)}))},function(e,t,n){"use strict";!function(e,t){e.config={closePopoverOnEsc:!0,closePopoverOnClickAnywhere:!0,debug:!1,isAutoInitEnabled:!0},e.version="17.20.0",e.KEYS={tab:9,enter:13,esc:27,left:37,up:38,right:39,down:40},e.l10n={close:"Close",characterLimit:"{{REMAINING}} (maximum {{MAX}} characters)"},e.init=function(e){var t=[],n={add:function(e){return t.push(e),n},run:function(){var e;for(e=0;e<t.length;e++)t[e]();return n},afterLoad:function(){e.config.isAutoInitEnabled&&e.init.run(),e.util.polyfillFle
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (65447)
                    Category:dropped
                    Size (bytes):98773
                    Entropy (8bit):5.267898464164609
                    Encrypted:false
                    SSDEEP:
                    MD5:43A277E2F62386005C60540A68415F97
                    SHA1:D69D78D6D10FF760F8068D87CE9C8ADB7A3E656E
                    SHA-256:B0F3FD10B52D4869B8ECBE459D12217E8BB8CF9E8B638546EFFBA3D377BF51ED
                    SHA-512:AD4FF273D1CDF04A266A2E8DEBF6214689B7413276629FB595E30AE63FF69B46937F14299BE1B236B57FB07AF7818977C0A138ACAF9F5DF1BABD145068925DA7
                    Malicious:false
                    Reputation:unknown
                    Preview:/*! For license information please see signing_iframeless_mobile.utils.js.LICENSE.txt */."use strict";(self.webpackChunk_ds_signing=self.webpackChunk_ds_signing||[]).push([[5738],{39412:function(t,e,r){var n=r(74692),o=r.n(n),i=r(40010),a=r(75550),u=!1;function c(t,e,r){u||o().ajax((0,i.tB)("monitoring"),{timeout:a.Ay.getValue("AppMonitoringRequestTimeout",50),type:"POST",contentType:"application/json",responseType:"json",data:JSON.stringify({EventSource:t,MonitoringProperties:e})}).always((function(){r&&r()}))}e.A={post:c,logEvent:function(t,e,r){c(t,e,r)},stopMonitoring:function(t){a.Ay.getValue("SIGN_28925_StopMonitoringCallsAfterEnd",!1)&&"boolean"==typeof t&&(u=t)}}},14932:function(t,e,r){r.d(e,{A:function(){return w}});var n=r(60258),o=r(97478),i=r(68238),a=r(47318),u=r(90694),c=r(42920),s=r(14968),l=r(3980),f=r(52353),h=r(40886),d=r(48084),p=r(3358),v={container:r(19086).Ay,tabs:u.Ay},y={butterBars:a.Ay,global:l.Ay,envelope:(0,i.HY)(v),toolbar:c.Ay,tools:s.Ay},g={browser:h.Ay,ds
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (7063)
                    Category:dropped
                    Size (bytes):7244
                    Entropy (8bit):5.279544393318315
                    Encrypted:false
                    SSDEEP:
                    MD5:72BE693F43302A8D874D1632E088EA1F
                    SHA1:9FF645EF334ED114EE6CE366FA4F4B9FBB0DF649
                    SHA-256:D2AE279844F8C0AEE147FA90ACE67575A6FEE5D56521BC553291646171FBF214
                    SHA-512:6370B9957E68C3F714C3D180D1B65697210D06ABF0A9E46F4E273E7C411E18A6272574823159C7063970921788A60400CFBA652C9EA8897F451C75FBB190FFF1
                    Malicious:false
                    Reputation:unknown
                    Preview:/*! For license information please see signing_iframeless_mobile.preloader.js.LICENSE.txt */.(self.webpackChunk_ds_signing=self.webpackChunk_ds_signing||[]).push([[9523],{64431:function(n,e){!function(){var t,r=Array.prototype.forEach,o=Object.prototype.hasOwnProperty,i=Array.prototype.slice,s=0,a={keys:Object.keys||function(n){if("object"!=typeof n&&"function"!=typeof n||null===n)throw new TypeError("keys() called on a non-object");var e,t=[];for(e in n)n.hasOwnProperty(e)&&(t[t.length]=e);return t},uniqueId:function(n){var e=++s+"";return n?n+e:e},has:function(n,e){return o.call(n,e)},each:function(n,e,t){if(null!=n)if(r&&n.forEach===r)n.forEach(e,t);else if(n.length===+n.length)for(var o=0,i=n.length;o<i;o++)e.call(t,n[o],o,n);else for(var s in n)this.has(n,s)&&e.call(t,n[s],s,n)},once:function(n){var e,t=!1;return function(){return t||(t=!0,e=n.apply(this,arguments),n=null),e}}};t={on:function(n,e,t){return u(this,"on",n,[e,t])&&e?(this._events||(this._events={}),(this._events[n]||
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:SVG Scalable Vector Graphics image
                    Category:dropped
                    Size (bytes):3728
                    Entropy (8bit):4.718277261919778
                    Encrypted:false
                    SSDEEP:
                    MD5:EC396047518A7FEF11D53D1B4F6BE65B
                    SHA1:E3BEC4CDAF5567641517A23019ADBFA2328B0A7F
                    SHA-256:8F77CFC832517C619BC1B8D82A6A478EE18D97442B4C78B006B0286CEC91E1A8
                    SHA-512:34AD62B5CC5EE5C950F340D65800102AE1CD06D34D24A611E7AC2CB9F23308AC96AC669D3B226C258DC6F862D985030EC3D5BB29609ECFEDF34E14F8F48529EB
                    Malicious:false
                    Reputation:unknown
                    Preview:<?xml version="1.0" encoding="utf-8"?>. Generator: Adobe Illustrator 28.1.0, SVG Export Plug-In . SVG Version: 6.00 Build 0) -->.<svg version="1.1" id="Layer_1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" x="0px" y="0px".. viewBox="0 0 1200 241.4" style="enable-background:new 0 0 1200 241.4;" xml:space="preserve">.<style type="text/css">...st0{fill:#4C00FF;}...st1{fill:#FF5252;}.</style>.<g>..<g>...<g>....<path d="M1169.2,109.7v78.7h-28.9v-73.5c0-17.9-7.7-27.9-22.7-27.9s-24.9,10.5-27.7,28.1c-0.8,4.2-1,10.7-1,24.4v48.8H1060v-125.....h25.6c0.1,1.1,0.7,12.3,0.7,13c0,0.9,1.1,1.4,1.8,0.8c10.6-8.4,22.3-16.2,38.6-16.2C1153.5,60.9,1169.2,79,1169.2,109.7z"/>....<path d="M1013.4,63.4l-0.9,14.3c-0.1,0.9-1.2,1.4-1.8,0.8c-3.5-3.3-16.4-17.5-38.3-17.5c-31.4,0-54.5,27.1-54.5,63.9l0,0.....c0,37.3,22.9,64.5,54.5,64.5c21.1,0,34-13.7,36.4-16.7c0.7-0.8,2-0.3,2,0.7c-0.3,3.8-0.8,13.3-4,21.4c-4,10.2-13,19.7-31.1,19.7.....c-14.9,0-28.1-5.7-40.6-17.9L920,217.3c13.7,15.5,35
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (19941)
                    Category:dropped
                    Size (bytes):20112
                    Entropy (8bit):5.3678378968826435
                    Encrypted:false
                    SSDEEP:
                    MD5:6FB7E52A614B256C595653C357859C65
                    SHA1:C37CC73DB881AF06249CC48EE699F99D0D07A952
                    SHA-256:6F74076F7C78230921B3E5D7591B7E410DE1102EE726DD5C8CCC72BC3028C6A3
                    SHA-512:F7D977E44BC508E3D391F3D8C1F923747CE9D58B740AFD67FB338FC0A324BEEC69932EF66221B8611FBE6902AF0BAD9A62625E3F684FBB28A40AF11159076B48
                    Malicious:false
                    Reputation:unknown
                    Preview:/*! For license information please see signing_iframeless_mobile.8743.js.LICENSE.txt */.(self.webpackChunk_ds_signing=self.webpackChunk_ds_signing||[]).push([[8743],{72490:function(t,o,e){"use strict";e.d(o,{S8:function(){return y},WL:function(){return A}});var r=e(39653),n=e(13101),i=e(35352),a=e(2989),l=e(80299),c=e.n(l),s=e(62193),d=e.n(s),p=e(61240),f=e.n(p),u=e(8628),g=e.n(u),h=e(85569),x=e.n(h),b=e(11393),v=e.n(b),m=e(5306),C=function(t){(0,n.A)(e,t);var o=(0,i.A)(e);function e(t){return(0,r.A)(this,e),o.call(this,t)}return e}((0,a.A)(Error)),w="TUTORIAL:";function y(t,o){return function(t,o){return new(f())((function(e,r){try{(function(t,o){if(!z(t))throw new C("Attempt to save tutorial failed...invalid key: "+I(t));var e=k(t),r=B(e);if(!r)throw new Error("Attempt to save tutorial before retrieved: "+I(t));var n=JSON.parse(r);if(!n.all){var i={all:o.all};o.all||(i.steps=c()(n.steps,o.steps)),S(e,x()(i||{}))}})(t,{steps:o}),e()}catch(t){R(t),r(t)}}))}(t,[o])}function A(t,o){retur
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:Unicode text, UTF-8 text, with very long lines (65247)
                    Category:downloaded
                    Size (bytes):126880
                    Entropy (8bit):5.464041228525119
                    Encrypted:false
                    SSDEEP:
                    MD5:38FE1AC6F7802BD4A7CB50998DD847EE
                    SHA1:1F729EF646053FFB10097FED54FF61E7C5F437A9
                    SHA-256:D1453DD658E92F2F73254893295635E304D4365579B0B72A1D847ACA44BD692E
                    SHA-512:8EA8D01D3D80094E3BF97ECE1924B50C7FC8255D0C902B1808CCE93E1F3BD5DF3DA7AA10C81D64861AD1CCCFA16C1F0A2FA428718C46F67F566B74A04ADD624F
                    Malicious:false
                    Reputation:unknown
                    URL:https://docucdn-a.akamaihd.net/production/1ds/widgets/@ds/signing/24.11.38-8/signing_iframeless_mobile.2126.js?cs=cad4365e2c2c48ad7299
                    Preview:/*! For license information please see signing_iframeless_mobile.2126.js.LICENSE.txt */.(self.webpackChunk_ds_signing=self.webpackChunk_ds_signing||[]).push([[2126],{49061:function(e,t,r){var n=r(1931),i=r(36526),a="EN-US";function s(e){return n.currencies[e.toUpperCase()]||""}function o(e,t){return i.formatNumber(e,i.getNumberFormat(t,n.numberFormats))}t.formatNumber=function(e,t){return o(e,t=t?i.unifyLocale(t):a)},t.formatCurrencyNumber=function(e,t,r,u){r=r?i.unifyLocale(r):a,t=t.toUpperCase();var c={num:o(e,r),sym:s(t),iso:t},l=i.getCurrencyFormat(t,r,n.currencyFormats);return l=u?l[1]:l[0],i.replacePlaceholders(l,c)},t.getSymbol=s},36526:function(e,t){t.unifyLocale=function(e){return e.replace("_","-").toUpperCase()},t.getNumberFormat=function e(t,r){var n=r[t]||r.DEFAULT;if(!n)return{LEAD_SEP:"",GROUP_SEP:"",DECIMAL_SEP:".",DECIMAL_NUM:2};var i=n.split("|");return 4!==i.length?e("DEFAULT",r):{LEAD_SEP:i[0],GROUP_SEP:i[1],DECIMAL_SEP:i[2],DECIMAL_NUM:parseInt(i[3])}},t.getCurrenc
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (19861)
                    Category:dropped
                    Size (bytes):20032
                    Entropy (8bit):5.490698444145211
                    Encrypted:false
                    SSDEEP:
                    MD5:C02F42AD6A3725BF2856CB80B2A99A02
                    SHA1:F42507B8E248CD804240CCFFA7E9787BAB14F2D1
                    SHA-256:68E6BB187BC0CAB3D9968CFBA124A68EF78289CDB2FC8194387AAACF7A730948
                    SHA-512:1985E7D315EC03FF554EE6866DCF8E8D59D6B23830A26C2BE758B1C7BD6EDC364A5377BB5C2F87ABA8A9D6C56AE88A5D0E7280823DB2B4EFE534B129E7DAD6E3
                    Malicious:false
                    Reputation:unknown
                    Preview:/*! For license information please see signing_iframeless_mobile.3188.js.LICENSE.txt */.(self.webpackChunk_ds_signing=self.webpackChunk_ds_signing||[]).push([[3188],{8306:function(t,e,n){"use strict";n.d(e,{G:function(){return w},IM:function(){return k},S0:function(){return N},dS:function(){return b}});var i=n(96319),r=n.n(i),s=n(11265),o=n.n(s),a=n(25514),h={first2:{firstN:2,lastN:0,cjk_validate:!1},last2:{firstN:0,lastN:2,cjk_validate:!1},first1last1:{firstN:1,lastN:1,cjk_validate:!1},last2_cjk:{firstN:0,lastN:2,cjk_validate:!0}},l={full:{numN:5,separator:" ",lastfirst:!1,cjk_validate:!1},first_middle_last:{numN:3,separator:" ",lastfirst:!1,cjk_validate:!1},lastfirst:{numN:1,separator:"",lastfirst:!0,cjk_validate:!1},last_first:{numN:2,separator:" ",lastfirst:!0,cjk_validate:!1},lastfirst_cjk:{numN:1,separator:"",lastfirst:!0,cjk_validate:!0},last_first_cjk:{numN:2,separator:" ",lastfirst:!0,cjk_validate:!0}};function c(t){return t>=12288&&t<=64255}function u(t){return t.toLowerCase(
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (4755)
                    Category:dropped
                    Size (bytes):4954
                    Entropy (8bit):5.237648060613005
                    Encrypted:false
                    SSDEEP:
                    MD5:E88D2659A955F0E1BE25B1F310458621
                    SHA1:072CCD61F941F37CDDE25954582AD9624F092E73
                    SHA-256:41A7957A1FAEDE768283CA6C2A8E262FDE64CC7E190E91372E8C064D09D8EA7A
                    SHA-512:CF6727C34DEC981312483D37A4E140D59A31B84E32CFDE1F6D6EDA88E6815E2ED2533ACC4792E3FE35B64C63F1E9530B9C9192A2D4F727674DFFFECFF5144F26
                    Malicious:false
                    Reputation:unknown
                    Preview:/*! For license information please see signing_iframeless_mobile.telemetry-recorder.js.LICENSE.txt */.(self.webpackChunk_ds_signing=self.webpackChunk_ds_signing||[]).push([[4043],{64431:function(t,e){!function(){var n,r=Array.prototype.forEach,i=Object.prototype.hasOwnProperty,o=Array.prototype.slice,c=0,s={keys:Object.keys||function(t){if("object"!=typeof t&&"function"!=typeof t||null===t)throw new TypeError("keys() called on a non-object");var e,n=[];for(e in t)t.hasOwnProperty(e)&&(n[n.length]=e);return n},uniqueId:function(t){var e=++c+"";return t?t+e:e},has:function(t,e){return i.call(t,e)},each:function(t,e,n){if(null!=t)if(r&&t.forEach===r)t.forEach(e,n);else if(t.length===+t.length)for(var i=0,o=t.length;i<o;i++)e.call(n,t[i],i,t);else for(var c in t)this.has(t,c)&&e.call(n,t[c],c,t)},once:function(t){var e,n=!1;return function(){return n||(n=!0,e=t.apply(this,arguments),t=null),e}}};n={on:function(t,e,n){return l(this,"on",t,[e,n])&&e?(this._events||(this._events={}),(this._ev
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                    Category:downloaded
                    Size (bytes):326
                    Entropy (8bit):6.860674885804344
                    Encrypted:false
                    SSDEEP:
                    MD5:AFE00DB89CE086B91A541C227EDBF136
                    SHA1:961B2EE6FB39C4D515BDC49EC1BA688B0916F104
                    SHA-256:E11827C678AF8519E702F364E525AC34509CAD49F8D839677E089949EDDA060E
                    SHA-512:85F265A917E83BA92FEDB2152FBFADA273FCFF2937A85B080641307FD2E61D0138493162883E016796C9F68062A01D79DA60F546EFC2CB1FB4078760EB3451F0
                    Malicious:false
                    Reputation:unknown
                    URL:https://docucdn-a.akamaihd.net/olive/images/2.63.0/global-assets/ds-icons-favicon-default-16x16.png
                    Preview:.PNG........IHDR................a....pHYs.................sRGB.........gAMA......a.....IDATx.....0...Uq...UP.|..v.K.>.O`.$.[.B....'pvJ}..B..P.h...I.!.rs.%.$....O"r!.I.m....J..........U.. ..F[.....j4<...6.b6.T!x..Y..]..;._.,..........K.F..b.~.$..M.......M....,...i....*.z...x8."C.r.{.2~.~........x...B.G.6.....IEND.B`.
                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                    File Type:ASCII text, with very long lines (65448)
                    Category:dropped
                    Size (bytes):487758
                    Entropy (8bit):5.533069487831044
                    Encrypted:false
                    SSDEEP:
                    MD5:2CAA8D62C8FE6C1A1C79020F2009EA96
                    SHA1:CE29AF377761577BB77BDA38681DB915259C9CA5
                    SHA-256:E108946EF76C3B64F68DAACA5A67045C3F7FF01B52F648680F66364BCC233501
                    SHA-512:104F30C7715B7D5947A7799EB2E7D2AA19425FB7D3A7CFBF7F61FF7B004A8EED84C12B118AD2A8A06DAAEB969B02344D44E391C2DBB7751ABD9A3CC05BBB26DE
                    Malicious:false
                    Reputation:unknown
                    Preview:/*! For license information please see signing_iframeless_mobile.3664.js.LICENSE.txt */.(self.webpackChunk_ds_signing=self.webpackChunk_ds_signing||[]).push([[3664],{42584:function(e,t,n){var i=n(93633);e.exports=(i.default||i).template({1:function(e,t,n,i,a){var r,o,s=null!=t?t:e.nullContext||{},l=e.hooks.helperMissing,u="function",c=e.escapeExpression,d=e.lookupProperty||function(e,t){if(Object.prototype.hasOwnProperty.call(e,t))return e[t]};return" <"+c(typeof(o=null!=(o=d(n,"htmlTag")||(null!=t?d(t,"htmlTag"):t))?o:l)===u?o.call(s,{name:"htmlTag",hash:{},data:a,loc:{start:{line:3,column:3},end:{line:3,column:14}}}):o)+'\n class="pdf-ua_'+c(typeof(o=null!=(o=d(n,"tag")||(null!=t?d(t,"tag"):t))?o:l)===u?o.call(s,{name:"tag",hash:{},data:a,loc:{start:{line:4,column:18},end:{line:4,column:25}}}):o)+"_"+c(typeof(o=null!=(o=d(n,"pathString")||(null!=t?d(t,"pathString"):t))?o:l)===u?o.call(s,{name:"pathString",hash:{},data:a,loc:{start:{line:4,column:26},end:{line:4,column:40}}}):o)+"
                    File type:RFC 822 mail, ASCII text, with very long lines (422), with CRLF line terminators
                    Entropy (8bit):5.965238460270429
                    TrID:
                    • E-Mail message (Var. 5) (54515/1) 100.00%
                    File name:FW Expiration Pending Support Care HIPAA Acknowledgement Form 2024.eml
                    File size:42'797 bytes
                    MD5:63e3c96b5b6b003cbf76e93366dfc448
                    SHA1:ec106a42c03b9d318cca209aa246c47f902641ac
                    SHA256:d3a10154ed35ebb629c6d51680ce422a7e5c4e1fcf9b716bc1ef01e9219df745
                    SHA512:73c67038d3b67b2f2815761110829fd49e9ad6e4242a0737094ba1a24bb5a44227d48da63dd4edce37dbfd69078ce3bf9aa5a26555b38ece7b8243b56d528d49
                    SSDEEP:768:Iuf1PY5OtoTVdqA+Gt5/LAXv/j6Ek21Tdu4KDIVHe1:Ic1g5OtoTVdD+Gj/LAnj6ESaHe1
                    TLSH:FB135B1ADA9524D751F310F8B0177B46A7912D5EE3A28AF0B07AB1777E8E452334338E
                    File Content Preview:Received: from DS1PR13MB7100.namprd13.prod.outlook.com (2603:10b6:8:216::16).. by PH0PR13MB5615.namprd13.prod.outlook.com with HTTPS; Mon, 25 Nov 2024.. 18:13:12 +0000..ARC-Seal: i=3; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=pass;.. b=lRkgYwC
                    Subject:FW: Expiration Pending: Support Care HIPAA Acknowledgement Form 2024
                    From:Armando Villanueva <armando.villanueva@24hrcares.com>
                    To:24HR IT HelpDesk <ithelp@24hrcares.com>
                    Cc:
                    BCC:
                    Date:Mon, 25 Nov 2024 18:09:11 +0000
                    Communications:
                    • External Sender: See below. Phishing email. Armando Villanueva Finance Main: 562-677-4940<tel:562-677-4940> E: armando.villanueva@24hrcares.com<mailto:armando.villanueva@24hrcares.com> W: www.24hrcares.com<https://www.24hrcares.com/> 200 N. Pacific Coast Hwy | Suite 300 | El Segundo, CA 90245<https://goo.gl/maps/R2y2UQyNtSWd9BkF7>
                    • From: DocuSign NA3 System <dse_NA3@docusign.net> Sent: Sunday, November 24, 2024 1:23 AM To: Armando Villanueva <armando.villanueva@24hrcares.com> Subject: Expiration Pending: Support Care HIPAA Acknowledgement Form 2024 [EXTERNAL EMAIL: Do not click links or open attachments unless you trust the sender] [https://NA3.docusign.net/Member/Image.aspx?i=logo&l=122a3750-6640-4778-a779-170a9d8c35bb] [https://NA3.docusign.net/member/Images/email/docInvite-white.png] HR Compliance sent you a document to review and sign. REVIEW DOCUMENT <https://na3.docusign.net/Signing/EmailStart.aspx?a=52a62e08-52ab-4deb-9961-052cba101116&etti=24&acct=07df84b5-c8f5-4e7f-a831-b605f464f6f9&er=4156e787-bddd-48bf-b932-5329c6a60a23> [Picture of HR Compliance] HR Compliance compliancehub@24hrcares.com<mailto:compliancehub@24hrcares.com> Hello, At your earliest convenience, we ask that you review the 24 Hour Home care HIPAA training Guidebook and sign the acknowledgement form to update your records. Thank you! 24 Hour Home care Expiration Pending: This document will expire on December 24, 2024 | 15:59. Powered by [Docusign] Do Not Share This Email This email contains a secure link to Docusign. Please do not share this email, link, or access code with others. Alternate Signing Method Visit Docusign.com, click 'Access Documents', and enter the security code: 52A62E0852AB4DEB9961052CBA1011163 About Docusign Sign documents electronically in just minutes. It's safe, secure, and legally binding. Whether you're in an office, at home, on-the-go -- or even across the globe -- Docusign provides a professional trusted solution for Digital Transaction Management(tm). Questions about the Document? If you need to modify the document or have questions about the details in the document, please reach out to the sender by emailing them directly. Stop receiving this email Report this email<https://protect.docusign.net/report-abuse?e=AUtomjpFak9GlbPL0zFFi13mjGRoeatllTAFSt9Ec8VNeWeEshJ51i3qgAgwdSl_hHeGPq7fTPm1lgB8Kc-epl4rmN2S4rHZnzyGocNxUxoQrWHUEJ_Jan6p_gGNdbaNQycKcKlGlR7ELH3SXQUcn9Da5rPZxC8qa5_8oktPTnIrug_V5IR97iNc48vPMcSxwFf4pCF7ON_lOOhUYeqxmSpqlJDjEDN68fVeMlR3gUy609DkAFzAqtf19y51SIbknQ01tlM39pT-CreRo6SCnrD85eHARI9QOuRwAAU6DGvbNXnyO4C2oHW30PXD9qXtfAiNvVhMzNmZyMxVhBWXLS0EvNSmtpRFKw86fzGpGZ23JS6s2jLWxjETljmim0TLIkzZeWVzhuIGEDrFzf_wXyR4k4ybgZ7lzf-zz_ItoqTj5pV8Sbh7YEHN-_pRpz3Lv5NdNjwKuCIynoFn1lbPkck&lang=en> or read more about Declining to sign<https://support.docusign.com/en/guides/Declining-to-sign-DocuSign-Signer-Guide> and Managing notifications<https://support.docusign.com/en/articles/How-do-I-manage-my-email-notifications>. If you have trouble signing, visit "How to Sign a Document<https://support.docusign.com/s/articles/How-do-I-sign-a-DocuSign-document-Basic-Signing?language=en_US&utm_campaign=GBL_XX_DBU_UPS_2211_SignNotificationEmailFooter&utm_medium=product&utm_source=postsend>" on our Docusign Support Center<https://support.docusign.com/>, or browse our Docusign Community<https://community.docusign.com/esignature-111?utm_campaign=GBL_US_PRD_AWA_2405_CommunityCTA&utm_medium=email&utm_source=postsend> for more information. [https://docucdn-a.akamaihd.net/olive/images/2.62.0/global-assets/email-templates/icon-download-app.png]Download the Docusign App <https://www.docusign.com/features-and-benefits/mobile?utm_campaign=GBL_XX_DBU_UPS_2211_SignNotificationEmailFooter&utm_medium=product&utm_source=postsend> This message was sent to you by HR Compliance who is using the Docusign Electronic Signature Service. If you would rather not receive email from this sender you may contact the sender with your request.
                    Attachments:
                    • image001.png
                    Key Value
                    Receivedfrom BL1PR12MB5301.namprd12.prod.outlook.com ([fe80::2ba4:b394:4d10:ce01]) by BL1PR12MB5301.namprd12.prod.outlook.com ([fe80::2ba4:b394:4d10:ce01%5]) with mapi id 15.20.8182.019; Mon, 25 Nov 2024 18:09:11 +0000
                    ARC-Seali=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=J0uAbNXQtM+vLtfrZc/xskXCExoDe8v9l7Wgvr23QDKdtn4rcRVpr1F9cFq3Cl2E1DSkiQ/eFaNSmXhaCLpE3JZD1f/rII0YDoGbUogBEl6L1a/o+V7xv6JcNSSSsieRpNTJbHSt1YzUuXHNRYLqGfsfG3I5xb0DZqEW6KRjYPz469bn3fH3+km6Uk+YnYmkvlN0CCz3C2OZAPJmdUjjLPjObZKzbMch2I1Qxq6qEzvnTp8Wf60taRSb5mWzWFCC53sthYbr+YYCQP8zThBMxBcs3nZKQp8uNCIJnZDvd1Jz9jKy4kMyVhS3Ye6/gmEnikDZ0Eni4CTzZZW8eHDRfw==
                    ARC-Message-Signaturei=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=PAACSiuzkPtQSk/xePvw8ATgswj3AzNVZqfJC3FhpQs=; b=v3s30ZWEZUO0VG8LZTaASpKkLWu4KBfYtGWHDypf7O/pDsvLe8EPjLPaNPJO0n4jl9IevivPrfyryqYxGXzNc8gFvRsFL1wsNl13Xr1l8qaKow4pVyBIfwblWiSCRoBOaNkm0OiI9q7AABIrWp6d5ruGptYdrU4Ke4O26hp3EVT0BTXVUXp+mk6bd0JJLNkJgeJOjAVu4A9Klls0xHdG0RSFrbIL+sRTzQG4ZRRFzPaNjd0T0CMyOHv2UNPrlEvSPiycFTsQI3Cn059xpQqmOvbpX/dTu59IDh76QqQnjXoCMPm4kAOWKY0ZrUXxOO7/wqQioR7ZIsrg3ZCfInOp6g==
                    ARC-Authentication-Resultsi=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=24hrcares.com; dmarc=pass action=none header.from=24hrcares.com; dkim=pass header.d=24hrcares.com; arc=none
                    Authentication-Resultsspf=fail (sender IP is 205.139.110.120) smtp.mailfrom=24hrcares.com; dkim=fail (body hash did not verify) header.d=24hrcares.com;dmarc=fail action=quarantine header.from=24hrcares.com;compauth=none reason=451
                    Received-SPFFail (protection.outlook.com: domain of 24hrcares.com does not designate 205.139.110.120 as permitted sender) receiver=protection.outlook.com; client-ip=205.139.110.120; helo=us-smtp-inbound-delivery-1.mimecast.com;
                    Authentication-Results-Originalrelay.mimecast.com; dkim=pass header.d=24hrcares.com header.s=selector1 header.b=cqaCMO4s; arc=pass ("microsoft.com:s=arcselector10001:i=1"); dmarc=pass (policy=quarantine) header.from=24hrcares.com; spf=pass (relay.mimecast.com: domain of armando.villanueva@24hrcares.com designates 40.107.94.132 as permitted sender) smtp.mailfrom=armando.villanueva@24hrcares.com
                    X-MC-Unique7DnEBUDmOPOPQu40ftsUJA-1
                    X-Mimecast-MFC-AGG-ID7DnEBUDmOPOPQu40ftsUJA
                    DKIM-Signaturev=1; a=rsa-sha256; c=relaxed/relaxed; d=24hrcares.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=PAACSiuzkPtQSk/xePvw8ATgswj3AzNVZqfJC3FhpQs=; b=cqaCMO4sF06fpa5CcPZssqZd16Z4KBRu0H/f5EMC4VEO3+7D8s6nxGl05W802doJOLCk3SG1RekJNdD9eAhJTr9qiubpgo4BRclnctLwjYzX5PJQE5RIt3K/7cc/i0Wg84WiHE7QynHFd18/4S9d8lTTZw1E/uQ60R3vuNuDK14=
                    FromArmando Villanueva <armando.villanueva@24hrcares.com>
                    To24HR IT HelpDesk <ithelp@24hrcares.com>
                    SubjectFW: Expiration Pending: Support Care HIPAA Acknowledgement Form 2024
                    Thread-TopicExpiration Pending: Support Care HIPAA Acknowledgement Form 2024
                    Thread-IndexAQHbPlKG9s38GZoVeU2dAr3+OgdCWrLITYIg
                    DateMon, 25 Nov 2024 18:09:11 +0000
                    Message-ID<BL1PR12MB53013386F6752C94AA35C7698C2E2@BL1PR12MB5301.namprd12.prod.outlook.com>
                    References<ca1f41d1d08f4a39848b7df60503f41a@docusign.net>
                    In-Reply-To<ca1f41d1d08f4a39848b7df60503f41a@docusign.net>
                    Accept-Languageen-US
                    X-MS-Has-Attachyes
                    X-MS-TNEF-Correlator
                    x-ms-traffictypediagnostic BL1PR12MB5301:EE_|DM4PR12MB7622:EE_|BN2PEPF000044A2:EE_|DS1PR13MB7100:EE_|PH0PR13MB5615:EE_
                    X-MS-Office365-Filtering-Correlation-Idf2580f9f-6ac3-4fb4-9083-08dd0d7c5982
                    x-ld-processedf6d4f09d-81a8-4f0c-9385-3c6ca8d9ea14,ExtFwd
                    x-ms-exchange-senderadcheck1
                    x-ms-exchange-antispam-relay0
                    X-Microsoft-Antispam-Untrusted BCL:0;ARA:13230040|1800799024|366016|376014|69100299015|8096899003|38070700018
                    X-Microsoft-Antispam-Message-Info-Original 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
                    X-Forefront-Antispam-Report-Untrusted CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BL1PR12MB5301.namprd12.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(366016)(376014)(69100299015)(8096899003)(38070700018);DIR:OUT;SFP:1102
                    X-MS-Exchange-ForwardingLoop support@mydatapath.com;9ef5d077-23c6-453f-94f9-7809c35a837f
                    X-MS-Exchange-Transport-CrossTenantHeadersStampedDS1PR13MB7100
                    X-Mimecast-Spam-Score1
                    X-Mimecast-MFC-PROC-ID4YvloeTEPZoIVu7TqJvlvR0_cZzyRl0fegOTHYMG8hU_1732558184
                    X-Mimecast-Impersonation-ProtectPolicy=Default Impersonation Protect Definition;Similar Internal Domain=false;Similar Monitored External Domain=false;Custom External Domain=false;Mimecast External Domain=false;Newly Observed Domain=false;Internal User Name=false;Custom Display Name List=false;Reply-to Address Mismatch=false;Targeted Threat Dictionary=true;Mimecast Threat Dictionary=true;Custom Threat Dictionary=false
                    Content-Languageen-US
                    Content-Typemultipart/related; boundary="_004_BL1PR12MB53013386F6752C94AA35C7698C2E2BL1PR12MB5301namp_"; type="multipart/alternative"
                    Return-Patharmando.villanueva@24hrcares.com
                    X-MS-Exchange-Organization-ExpirationStartTime25 Nov 2024 18:09:48.5313 (UTC)
                    X-MS-Exchange-Organization-ExpirationStartTimeReasonOriginalSubmit
                    X-MS-Exchange-Organization-ExpirationInterval1:00:00:00.0000000
                    X-MS-Exchange-Organization-ExpirationIntervalReasonOriginalSubmit
                    X-MS-Exchange-Organization-Network-Message-Id f2580f9f-6ac3-4fb4-9083-08dd0d7c5982
                    X-EOPAttributedMessage0
                    X-EOPTenantAttributedMessage9ef5d077-23c6-453f-94f9-7809c35a837f:0
                    X-MS-Exchange-Organization-MessageDirectionalityIncoming
                    X-MS-Exchange-Transport-CrossTenantHeadersStripped BN2PEPF000044A2.namprd02.prod.outlook.com
                    X-MS-PublicTrafficTypeEmail
                    X-MS-Exchange-Organization-AuthSource BN2PEPF000044A2.namprd02.prod.outlook.com
                    X-MS-Exchange-Organization-AuthAsAnonymous
                    X-MS-Office365-Filtering-Correlation-Id-Prvs 7a89551c-e85b-4b49-f7d2-08dd0d7c439c
                    X-MS-Exchange-AtpMessagePropertiesSA|SL
                    X-MS-Exchange-Organization-SCL-1
                    X-Microsoft-Antispam BCL:0;ARA:13230040|31092699021|5073199012|5063199012|4073199012|4123199012|69100299015|1032899013|22103399003|82310400026|35042699022|2066899003|8096899003;
                    X-Forefront-Antispam-Report CIP:205.139.110.120;CTRY:US;LANG:en;SCL:-1;SRV:;IPV:CAL;SFV:SKN;H:us-smtp-inbound-delivery-1.mimecast.com;PTR:us-smtp-delivery-1.mimecast.com;CAT:NONE;SFS:(13230040)(31092699021)(5073199012)(5063199012)(4073199012)(4123199012)(69100299015)(1032899013)(22103399003)(82310400026)(35042699022)(2066899003)(8096899003);DIR:INB;
                    X-MS-Exchange-CrossTenant-OriginalArrivalTime25 Nov 2024 18:09:48.4531 (UTC)
                    X-MS-Exchange-CrossTenant-Network-Message-Idf2580f9f-6ac3-4fb4-9083-08dd0d7c5982
                    X-MS-Exchange-CrossTenant-Id9ef5d077-23c6-453f-94f9-7809c35a837f
                    X-MS-Exchange-CrossTenant-AuthSourceBN2PEPF000044A2.namprd02.prod.outlook.com
                    X-MS-Exchange-CrossTenant-AuthAsAnonymous
                    X-MS-Exchange-CrossTenant-FromEntityHeaderInternet
                    X-MS-Exchange-Transport-EndToEndLatency00:03:23.5534301
                    X-MS-Exchange-Processed-By-BccFoldering15.20.8182.018
                    X-Microsoft-Antispam-Mailbox-Delivery ucf:0;jmr:0;auth:0;dest:I;ENG:(910001)(944506478)(944626604)(920097)(930097)(140003);
                    X-Microsoft-Antispam-Message-Info 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
                    MIME-Version1.0

                    Icon Hash:46070c0a8e0c67d6