Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://mfsus-my.sharepoint.com/:u:/p/jmaldonado/ETgv2ykDZTZFqqQuEgMT5HYBmLmp6Wc681CQdzzQhFcYJQ?e=deM7Fd

Overview

General Information

Sample URL:https://mfsus-my.sharepoint.com/:u:/p/jmaldonado/ETgv2ykDZTZFqqQuEgMT5HYBmLmp6Wc681CQdzzQhFcYJQ?e=deM7Fd
Analysis ID:1624119
Infos:

Detection

HTMLPhisher
Score:76
Range:0 - 100
Confidence:100%

Signatures

AI detected phishing page
Antivirus detection for URL or domain
Yara detected HtmlPhish77
AI detected landing page (webpage, office document or email)
AI detected suspicious URL
Phishing site or detected (based on various text indicators)
Detected non-DNS traffic on DNS port
HTML body contains low number of good links
HTML body contains password input but no form action
HTML body with high number of embedded SVGs detected
HTML body with high number of embedded images detected
HTML page contains hidden javascript code
HTML title does not match URL
Invalid 'forgot password' link found
Invalid T&C link found
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 5948 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 6616 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2080 --field-trial-handle=1968,i,5836294590199637173,7389191903258325094,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 6308 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://mfsus-my.sharepoint.com/:u:/p/jmaldonado/ETgv2ykDZTZFqqQuEgMT5HYBmLmp6Wc681CQdzzQhFcYJQ?e=deM7Fd" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
SourceRuleDescriptionAuthorStrings
5.13.pages.csvJoeSecurity_HtmlPhish_77Yara detected HtmlPhish_77Joe Security
    No Sigma rule has matched
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2025-02-25T21:37:28.076190+010020242282Possible Social Engineering Attempted104.21.74.221443192.168.2.1656498TCP
    2025-02-25T21:37:28.531337+010020242282Possible Social Engineering Attempted104.21.74.221443192.168.2.1656497TCP
    2025-02-25T21:37:29.747461+010020242282Possible Social Engineering Attempted104.21.74.221443192.168.2.1656501TCP

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: https://login.dunmhumby.com/cdn-cgi/challenge-platform/scripts/jsd/main.jsAvira URL Cloud: Label: phishing
    Source: https://login.dunmhumby.com/cdn-cgi/challenge-platform/h/b/scripts/jsd/b0e4a89976ce/main.js?Avira URL Cloud: Label: phishing
    Source: https://login.dunmhumby.com/4E75UUJFQzqj2DyvLCuNTz77rYDZw93kS06Co4fSPmcgPARThK1kv8rrGNX1tPOHklbi6o9lGhHnsQXIwoIYWKdMBaMEWO8cf9SpscqeoY5BfguLsltFQvGa0Cpbp1tM5hjLzJBiTXw0A2Rudqn8yR/verifyAvira URL Cloud: Label: phishing
    Source: https://login.dunmhumby.com/4E75UUJFQzqj2DyvLCuNTz77rYDZw93kS06Co4fSPmcgPARThK1kv8rrGNX1tPOHklbi6o9lGhHnsQXIwoIYWKdMBaMEWO8cf9SpscqeoY5BfguLsltFQvGa0Cpbp1tM5hjLzJBiTXw0A2Rudqn8yR/indexAvira URL Cloud: Label: phishing
    Source: https://login.dunmhumby.com/page/styles/app.cssAvira URL Cloud: Label: phishing
    Source: https://login.dunmhumby.com/page/images/verify_app.pngAvira URL Cloud: Label: phishing
    Source: https://login.dunmhumby.com/page/images/info.pngAvira URL Cloud: Label: phishing
    Source: https://login.dunmhumby.com/page/images/verify.pngAvira URL Cloud: Label: phishing
    Source: https://login.dunmhumby.com/page/images/back.pngAvira URL Cloud: Label: phishing
    Source: https://login.dunmhumby.com/page/images/verify_code.pngAvira URL Cloud: Label: phishing
    Source: https://login.dunmhumby.com/page/images/verify_sms.pngAvira URL Cloud: Label: phishing
    Source: https://login.dunmhumby.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.jsAvira URL Cloud: Label: phishing
    Source: https://login.dunmhumby.com/page/images/logo.pngAvira URL Cloud: Label: phishing
    Source: https://login.dunmhumby.com/page/images/appnotif2.pngAvira URL Cloud: Label: phishing

    Phishing

    barindex
    Source: https://login.dunmhumby.com/4E75UUJFQzqj2DyvLCuNTz77rYDZw93kS06Co4fSPmcgPARThK1kv8rrGNX1tPOHklbi6o9lGhHnsQXIwoIYWKdMBaMEWO8cf9SpscqeoY5BfguLsltFQvGa0Cpbp1tM5hjLzJBiTXw0A2Rudqn8yR/verifyJoe Sandbox AI: Score: 9 Reasons: The brand 'Microsoft' is well-known and typically associated with the domain 'microsoft.com'., The URL 'login.dunmhumby.com' does not match the legitimate domain name for Microsoft., The domain 'dunmhumby.com' is not related to Microsoft, which raises suspicion., The presence of Microsoft-related input fields (Email, phone, or Skype) on a non-Microsoft domain is a common phishing tactic. DOM: 5.13.pages.csv
    Source: Yara matchFile source: 5.13.pages.csv, type: HTML
    Source: https://mfsus-my.sharepoint.com/:u:/p/jmaldonado/ETgv2ykDZTZFqqQuEgMT5HYBmLmp6Wc681CQdzzQhFcYJQ?rtime=vhsaD9xV3UgJoe Sandbox AI: Page contains button: 'VIEW DOCUMENT' Source: '2.0.pages.csv'
    Source: https://login.dunmhumby.comJoe Sandbox AI: The URL 'https://login.dunmhumby.com' closely resembles the legitimate URL 'https://login.dunnhumby.com', which is associated with the known brand 'dunnhumby'. The primary difference is the substitution of 'nn' with 'nm', which is a common visual character substitution that can lead to user confusion. The use of the subdomain 'login' is typical for legitimate login pages, adding to the potential for confusion. The domain extension '.com' is standard and does not suggest a different legitimate purpose. Given the high visual similarity and the context of a login page, this URL is likely a typosquatting attempt.
    Source: Chrome DOM: 3.10OCR Text: 0.1 Microsoft www.microsoftonline.com Please stand by, while we are cheking if the site connection is secure Verifying v.. CLOUDFLARE Ten-rs Did you know there are Verified Bats that are allowed around the internet because they help provide services we use day ta day? Microsoft needs to review the security of your connection before proceeding. Performance & security by Microsoft
    Source: Chrome DOM: 3.9OCR Text: 0.1 Microsoft www.microsoftonline.com Please stand by, while we are cheking if the site connection is secure Verifying,.. CLOUDFLARE Ten-rs Did you know there are Verified Bats that are allowed around the internet because they help provide services we use day ta day? Microsoft needs to review the security of your connection before proceeding. Performance & security by Microsoft
    Source: https://login.dunmhumby.com/4E75UUJFQzqj2DyvLCuNTz77rYDZw93kS06Co4fSPmcgPARThK1kv8rrGNX1tPOHklbi6o9lGhHnsQXIwoIYWKdMBaMEWO8cf9SpscqeoY5BfguLsltFQvGa0Cpbp1tM5hjLzJBiTXw0A2Rudqn8yR/verifyHTTP Parser: Number of links: 0
    Source: https://login.dunmhumby.com/4E75UUJFQzqj2DyvLCuNTz77rYDZw93kS06Co4fSPmcgPARThK1kv8rrGNX1tPOHklbi6o9lGhHnsQXIwoIYWKdMBaMEWO8cf9SpscqeoY5BfguLsltFQvGa0Cpbp1tM5hjLzJBiTXw0A2Rudqn8yR/verifyHTTP Parser: <input type="password" .../> found but no <form action="...
    Source: https://mfsus-my.sharepoint.com/:u:/p/jmaldonado/ETgv2ykDZTZFqqQuEgMT5HYBmLmp6Wc681CQdzzQhFcYJQ?rtime=vhsaD9xV3UgHTTP Parser: Total embedded SVG size: 161677
    Source: https://login.dunmhumby.com/4E75UUJFQzqj2DyvLCuNTz77rYDZw93kS06Co4fSPmcgPARThK1kv8rrGNX1tPOHklbi6o9lGhHnsQXIwoIYWKdMBaMEWO8cf9SpscqeoY5BfguLsltFQvGa0Cpbp1tM5hjLzJBiTXw0A2Rudqn8yR/verifyHTTP Parser: Total embedded image size: 30653
    Source: https://mfsus-my.sharepoint.com/:u:/p/jmaldonado/ETgv2ykDZTZFqqQuEgMT5HYBmLmp6Wc681CQdzzQhFcYJQ?rtime=vhsaD9xV3UgHTTP Parser: Base64 decoded: {"siteid":"42a26e9d-9df1-4f00-aa7a-d56a972bc346","aud":"00000003-0000-0ff1-ce00-000000000000/mfsus-my.sharepoint.com@6f708c90-65ae-4f02-ae15-f7b52b5d44a4","exp":"1740551779"}
    Source: https://login.dunmhumby.com/4E75UUJFQzqj2DyvLCuNTz77rYDZw93kS06Co4fSPmcgPARThK1kv8rrGNX1tPOHklbi6o9lGhHnsQXIwoIYWKdMBaMEWO8cf9SpscqeoY5BfguLsltFQvGa0Cpbp1tM5hjLzJBiTXw0A2Rudqn8yR/verifyHTTP Parser: Title: Verify your credentials does not match URL
    Source: https://login.dunmhumby.com/4E75UUJFQzqj2DyvLCuNTz77rYDZw93kS06Co4fSPmcgPARThK1kv8rrGNX1tPOHklbi6o9lGhHnsQXIwoIYWKdMBaMEWO8cf9SpscqeoY5BfguLsltFQvGa0Cpbp1tM5hjLzJBiTXw0A2Rudqn8yR/verifyHTTP Parser: Invalid link: Forgot password?
    Source: https://login.dunmhumby.com/4E75UUJFQzqj2DyvLCuNTz77rYDZw93kS06Co4fSPmcgPARThK1kv8rrGNX1tPOHklbi6o9lGhHnsQXIwoIYWKdMBaMEWO8cf9SpscqeoY5BfguLsltFQvGa0Cpbp1tM5hjLzJBiTXw0A2Rudqn8yR/verifyHTTP Parser: Invalid link: Terms of use
    Source: https://login.dunmhumby.com/4E75UUJFQzqj2DyvLCuNTz77rYDZw93kS06Co4fSPmcgPARThK1kv8rrGNX1tPOHklbi6o9lGhHnsQXIwoIYWKdMBaMEWO8cf9SpscqeoY5BfguLsltFQvGa0Cpbp1tM5hjLzJBiTXw0A2Rudqn8yR/verifyHTTP Parser: Invalid link: Privacy & cookies
    Source: https://login.dunmhumby.com/4E75UUJFQzqj2DyvLCuNTz77rYDZw93kS06Co4fSPmcgPARThK1kv8rrGNX1tPOHklbi6o9lGhHnsQXIwoIYWKdMBaMEWO8cf9SpscqeoY5BfguLsltFQvGa0Cpbp1tM5hjLzJBiTXw0A2Rudqn8yR/verifyHTTP Parser: <input type="password" .../> found
    Source: https://login.dunmhumby.com/HTTP Parser: No favicon
    Source: https://login.dunmhumby.com/4E75UUJFQzqj2DyvLCuNTz77rYDZw93kS06Co4fSPmcgPARThK1kv8rrGNX1tPOHklbi6o9lGhHnsQXIwoIYWKdMBaMEWO8cf9SpscqeoY5BfguLsltFQvGa0Cpbp1tM5hjLzJBiTXw0A2Rudqn8yR/verifyHTTP Parser: No <meta name="author".. found
    Source: https://login.dunmhumby.com/4E75UUJFQzqj2DyvLCuNTz77rYDZw93kS06Co4fSPmcgPARThK1kv8rrGNX1tPOHklbi6o9lGhHnsQXIwoIYWKdMBaMEWO8cf9SpscqeoY5BfguLsltFQvGa0Cpbp1tM5hjLzJBiTXw0A2Rudqn8yR/verifyHTTP Parser: No <meta name="copyright".. found
    Source: chrome.exeMemory has grown: Private usage: 9MB later: 30MB
    Source: global trafficTCP traffic: 192.168.2.16:65208 -> 1.1.1.1:53
    Source: global trafficTCP traffic: 192.168.2.16:65208 -> 1.1.1.1:53
    Source: global trafficTCP traffic: 192.168.2.16:56160 -> 1.1.1.1:53
    Source: global trafficTCP traffic: 192.168.2.16:65208 -> 1.1.1.1:53
    Source: global trafficTCP traffic: 192.168.2.16:56160 -> 1.1.1.1:53
    Source: global trafficTCP traffic: 192.168.2.16:65208 -> 1.1.1.1:53
    Source: global trafficTCP traffic: 192.168.2.16:56160 -> 1.1.1.1:53
    Source: global trafficTCP traffic: 192.168.2.16:65208 -> 1.1.1.1:53
    Source: global trafficTCP traffic: 192.168.2.16:56160 -> 1.1.1.1:53
    Source: global trafficTCP traffic: 192.168.2.16:65208 -> 1.1.1.1:53
    Source: global trafficTCP traffic: 192.168.2.16:56160 -> 1.1.1.1:53
    Source: global trafficTCP traffic: 192.168.2.16:65208 -> 1.1.1.1:53
    Source: global trafficTCP traffic: 192.168.2.16:56160 -> 1.1.1.1:53
    Source: global trafficTCP traffic: 192.168.2.16:65208 -> 1.1.1.1:53
    Source: global trafficTCP traffic: 192.168.2.16:56160 -> 1.1.1.1:53
    Source: global trafficTCP traffic: 192.168.2.16:65208 -> 1.1.1.1:53
    Source: global trafficTCP traffic: 192.168.2.16:56160 -> 1.1.1.1:53
    Source: global trafficTCP traffic: 192.168.2.16:65208 -> 1.1.1.1:53
    Source: global trafficTCP traffic: 192.168.2.16:56160 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2024228 - Severity 2 - ET PHISHING Suspicious HTML Decimal Obfuscated Title - Possible Phishing Landing Apr 19 2017 : 104.21.74.221:443 -> 192.168.2.16:56501
    Source: Network trafficSuricata IDS: 2024228 - Severity 2 - ET PHISHING Suspicious HTML Decimal Obfuscated Title - Possible Phishing Landing Apr 19 2017 : 104.21.74.221:443 -> 192.168.2.16:56497
    Source: Network trafficSuricata IDS: 2024228 - Severity 2 - ET PHISHING Suspicious HTML Decimal Obfuscated Title - Possible Phishing Landing Apr 19 2017 : 104.21.74.221:443 -> 192.168.2.16:56498
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
    Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
    Source: unknownTCP traffic detected without corresponding DNS query: 2.17.190.73
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
    Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
    Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
    Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
    Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
    Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
    Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
    Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
    Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
    Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
    Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficHTTP traffic detected: GET /:u:/p/jmaldonado/ETgv2ykDZTZFqqQuEgMT5HYBmLmp6Wc681CQdzzQhFcYJQ?e=deM7Fd HTTP/1.1Host: mfsus-my.sharepoint.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /personal/jmaldonado_mfsus_com/_layouts/15/Doc.aspx?sourcedoc=%7B29db2f38-6503-4536-aaa4-2e120313e476%7D&action=default&slrid=fd0f85a1-10a2-8000-1a73-b507b8f48a5b&originalPath=aHR0cHM6Ly9tZnN1cy1teS5zaGFyZXBvaW50LmNvbS86dTovcC9qbWFsZG9uYWRvL0VUZ3YyeWtEWlRaRnFxUXVFZ01UNUhZQm1MbXA2V2M2ODFDUWR6elFoRmNZSlE_cnRpbWU9dmhzYUQ5eFYzVWc&CID=4bdf9ee6-3edc-4723-8c5c-bd35d1945668&_SRM=0:G:241 HTTP/1.1Host: mfsus-my.sharepoint.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentsec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: FedAuth=77u/PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0idXRmLTgiPz48U1A+VjEzLDBoLmZ8bWVtYmVyc2hpcHx1cm4lM2FzcG8lM2Fhbm9uIzJkMjUzZWVjYTdjNTdkYzYyZTliY2JkYTAxMGJiYmRhZmZhM2VlNDQxMGVkOTE5MDBiZjUwMGUwMjY2YzNlNjEsMCMuZnxtZW1iZXJzaGlwfHVybiUzYXNwbyUzYWFub24jMmQyNTNlZWNhN2M1N2RjNjJlOWJjYmRhMDEwYmJiZGFmZmEzZWU0NDEwZWQ5MTkwMGJmNTAwZTAyNjZjM2U2MSwxMzM4NDk4OTY3ODAwMDAwMDAsMCwxMzM4NTA3NTc3OTA3MDEyNjgsMC4wLjAuMCwyNTgsNmY3MDhjOTAtNjVhZS00ZjAyLWFlMTUtZjdiNTJiNWQ0NGE0LCwsNmY1ZDUxMjQtNGI4Ny00NTM5LTlmYWMtM2FiMDVlMDliYWRkLDZmNWQ1MTI0LTRiODctNDUzOS05ZmFjLTNhYjA1ZTA5YmFkZCw3RDN5dWUrWjZrV3lFc01raEFDZzh3LDAsMCwwLCwsLDI2NTA0Njc3NDM5OTk5OTk5OTksMCwsLCwsLCwwLCwxOTM1NzIsdVhlaFFKUGxlVmpOQ2Jha1VoR0Q2SXlGUVFrLHFaOWt4R3o4RzlSb2hrakt4b24zVlhzV2NBRjI4aVJRNmJPc0FhVDdaN1RBVFdEdmY3Q0ZvcTI2TnZ1SCtza1d3MTZCdmVmODFmTE5CbkREeGUvMTFibFBkbUxKdVVQdnJqRm9SOUVuVkh5NERmN1dNazgvZEZGMTNXZ1lWOFd4QUlFb0VsZUFHOGhuVHRYYTRuTXU0SzM4N2R6L2dCYWp3RGpDdXliTzFMN1F6VGJKWWljTTRNWXAzY21RTWR3WWpZSGg3WTh3N2J1WnJBMmkrZVJHeGR4UDBWZWErKytsL3kxSmROVjR0M2I4RGQzSlVPMGs1M0NJYVhpcnZzZXorU0Q3aWtEZDNyVE5aVkE0ckkyc0pBYzQ5WjRoeFgyQS85NHpVbTlDR2tHYzBFR3ZzWEpsV3FncklYU2FGM1ozbDNaV21lRlgraHM0ZUdlNkFzQnlLZz09PC9TUD4=
    Source: global trafficHTTP traffic detected: GET /personal/jmaldonado_mfsus_com/_api/v2.1/drives/b!nW6iQvGdAE-qetVqlyvDRrh_bBcVVUFOpvuhp5PdeZ-IgjmDnIDFSYQTfXrZeC6w/items/01UC4W2QBYF7NSSA3FGZC2VJBOCIBRHZDW/streams/content_preview_Ofv.json/streamContent?tempauth=v1.eyJzaXRlaWQiOiI0MmEyNmU5ZC05ZGYxLTRmMDAtYWE3YS1kNTZhOTcyYmMzNDYiLCJhdWQiOiIwMDAwMDAwMy0wMDAwLTBmZjEtY2UwMC0wMDAwMDAwMDAwMDAvbWZzdXMtbXkuc2hhcmVwb2ludC5jb21ANmY3MDhjOTAtNjVhZS00ZjAyLWFlMTUtZjdiNTJiNWQ0NGE0IiwiZXhwIjoiMTc0MDU1MTc3OSJ9.CiMKCXNoYXJpbmdpZBIWN0QzeXVlK1o2a1d5RXNNa2hBQ2c4dwoLCgRzbmlkEgMxMDQSCwi8wKL-wvnqPRAFGgw4LjQ2LjEyMy4xODkiFG1pY3Jvc29mdC5zaGFyZXBvaW50KiwzbC8ycE56MWRRSThMclJCU1QwL0d2WFc2a1ZvVXhqZmNHL2lIRVg3Uk1JPTC6ATgBQhChhQ__0zAAgBZEzNoKqA-rShBoYXNoZWRwcm9vZnRva2VuYgR0cnVlcmEwaC5mfG1lbWJlcnNoaXB8dXJuJTNhc3BvJTNhYW5vbiMyZDI1M2VlY2E3YzU3ZGM2MmU5YmNiZGEwMTBiYmJkYWZmYTNlZTQ0MTBlZDkxOTAwYmY1MDBlMDI2NmMzZTYxegEwwgFhMCMuZnxtZW1iZXJzaGlwfHVybiUzYXNwbyUzYWFub24jMmQyNTNlZWNhN2M1N2RjNjJlOWJjYmRhMDEwYmJiZGFmZmEzZWU0NDEwZWQ5MTkwMGJmNTAwZTAyNjZjM2U2McgBAQ.7-Aft3l0je9L038zbtW6zw2_PAE69pwo-ZwQqScqjnA&usecachedssr=1&prefetchSSRCorrelationId=ff0f85a1-30d3-8000-1644-ccda0aa80fab HTTP/1.1Host: mfsus-my.sharepoint.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-originSec-Fetch-Mode: corsSec-Fetch-Dest: emptyReferer: https://mfsus-my.sharepoint.com/personal/jmaldonado_mfsus_com/_layouts/15/Doc.aspx?sourcedoc=%7B29db2f38-6503-4536-aaa4-2e120313e476%7D&action=default&slrid=fd0f85a1-10a2-8000-1a73-b507b8f48a5b&originalPath=aHR0cHM6Ly9tZnN1cy1teS5zaGFyZXBvaW50LmNvbS86dTovcC9qbWFsZG9uYWRvL0VUZ3YyeWtEWlRaRnFxUXVFZ01UNUhZQm1MbXA2V2M2ODFDUWR6elFoRmNZSlE_cnRpbWU9dmhzYUQ5eFYzVWc&CID=4bdf9ee6-3edc-4723-8c5c-bd35d1945668&_SRM=0:G:241Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: FedAuth=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
    Source: global trafficHTTP traffic detected: GET /personal/jmaldonado_mfsus_com/_api/v2.1/drives/b!nW6iQvGdAE-qetVqlyvDRrh_bBcVVUFOpvuhp5PdeZ-IgjmDnIDFSYQTfXrZeC6w/items/01UC4W2QBYF7NSSA3FGZC2VJBOCIBRHZDW/streams/content_preview_Ofpd.png/streamContent?tempauth=v1.eyJzaXRlaWQiOiI0MmEyNmU5ZC05ZGYxLTRmMDAtYWE3YS1kNTZhOTcyYmMzNDYiLCJhdWQiOiIwMDAwMDAwMy0wMDAwLTBmZjEtY2UwMC0wMDAwMDAwMDAwMDAvbWZzdXMtbXkuc2hhcmVwb2ludC5jb21ANmY3MDhjOTAtNjVhZS00ZjAyLWFlMTUtZjdiNTJiNWQ0NGE0IiwiZXhwIjoiMTc0MDU1MTc3OSJ9.CiMKCXNoYXJpbmdpZBIWN0QzeXVlK1o2a1d5RXNNa2hBQ2c4dwoLCgRzbmlkEgMxMDQSCwi8wKL-wvnqPRAFGgw4LjQ2LjEyMy4xODkiFG1pY3Jvc29mdC5zaGFyZXBvaW50KiwzbC8ycE56MWRRSThMclJCU1QwL0d2WFc2a1ZvVXhqZmNHL2lIRVg3Uk1JPTC6ATgBQhChhQ__0zAAgBZEzNoKqA-rShBoYXNoZWRwcm9vZnRva2VuYgR0cnVlcmEwaC5mfG1lbWJlcnNoaXB8dXJuJTNhc3BvJTNhYW5vbiMyZDI1M2VlY2E3YzU3ZGM2MmU5YmNiZGEwMTBiYmJkYWZmYTNlZTQ0MTBlZDkxOTAwYmY1MDBlMDI2NmMzZTYxegEwwgFhMCMuZnxtZW1iZXJzaGlwfHVybiUzYXNwbyUzYWFub24jMmQyNTNlZWNhN2M1N2RjNjJlOWJjYmRhMDEwYmJiZGFmZmEzZWU0NDEwZWQ5MTkwMGJmNTAwZTAyNjZjM2U2McgBAQ.7-Aft3l0je9L038zbtW6zw2_PAE69pwo-ZwQqScqjnA&usecachedssr=1&prefetchSSRCorrelationId=ff0f85a1-30d3-8000-1644-ccda0aa80fab HTTP/1.1Host: mfsus-my.sharepoint.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://mfsus-my.sharepoint.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: same-originSec-Fetch-Mode: corsSec-Fetch-Dest: imageReferer: https://mfsus-my.sharepoint.com/personal/jmaldonado_mfsus_com/_layouts/15/Doc.aspx?sourcedoc=%7B29db2f38-6503-4536-aaa4-2e120313e476%7D&action=default&slrid=fd0f85a1-10a2-8000-1a73-b507b8f48a5b&originalPath=aHR0cHM6Ly9tZnN1cy1teS5zaGFyZXBvaW50LmNvbS86dTovcC9qbWFsZG9uYWRvL0VUZ3YyeWtEWlRaRnFxUXVFZ01UNUhZQm1MbXA2V2M2ODFDUWR6elFoRmNZSlE_cnRpbWU9dmhzYUQ5eFYzVWc&CID=4bdf9ee6-3edc-4723-8c5c-bd35d1945668&_SRM=0:G:241Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: FedAuth=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
    Source: global trafficHTTP traffic detected: GET /personal/jmaldonado_mfsus_com/_api/v2.1/drives/b!nW6iQvGdAE-qetVqlyvDRrh_bBcVVUFOpvuhp5PdeZ-IgjmDnIDFSYQTfXrZeC6w/items/01UC4W2QBYF7NSSA3FGZC2VJBOCIBRHZDW/streams/content_preview_Ofv.json/streamContent?tempauth=v1.eyJzaXRlaWQiOiI0MmEyNmU5ZC05ZGYxLTRmMDAtYWE3YS1kNTZhOTcyYmMzNDYiLCJhdWQiOiIwMDAwMDAwMy0wMDAwLTBmZjEtY2UwMC0wMDAwMDAwMDAwMDAvbWZzdXMtbXkuc2hhcmVwb2ludC5jb21ANmY3MDhjOTAtNjVhZS00ZjAyLWFlMTUtZjdiNTJiNWQ0NGE0IiwiZXhwIjoiMTc0MDU1MTc3OSJ9.CiMKCXNoYXJpbmdpZBIWN0QzeXVlK1o2a1d5RXNNa2hBQ2c4dwoLCgRzbmlkEgMxMDQSCwi8wKL-wvnqPRAFGgw4LjQ2LjEyMy4xODkiFG1pY3Jvc29mdC5zaGFyZXBvaW50KiwzbC8ycE56MWRRSThMclJCU1QwL0d2WFc2a1ZvVXhqZmNHL2lIRVg3Uk1JPTC6ATgBQhChhQ__0zAAgBZEzNoKqA-rShBoYXNoZWRwcm9vZnRva2VuYgR0cnVlcmEwaC5mfG1lbWJlcnNoaXB8dXJuJTNhc3BvJTNhYW5vbiMyZDI1M2VlY2E3YzU3ZGM2MmU5YmNiZGEwMTBiYmJkYWZmYTNlZTQ0MTBlZDkxOTAwYmY1MDBlMDI2NmMzZTYxegEwwgFhMCMuZnxtZW1iZXJzaGlwfHVybiUzYXNwbyUzYWFub24jMmQyNTNlZWNhN2M1N2RjNjJlOWJjYmRhMDEwYmJiZGFmZmEzZWU0NDEwZWQ5MTkwMGJmNTAwZTAyNjZjM2U2McgBAQ.7-Aft3l0je9L038zbtW6zw2_PAE69pwo-ZwQqScqjnA&usecachedssr=1&prefetchSSRCorrelationId=ff0f85a1-30d3-8000-1644-ccda0aa80fab HTTP/1.1Host: mfsus-my.sharepoint.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: FedAuth=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
    Source: global trafficHTTP traffic detected: GET /personal/jmaldonado_mfsus_com/_api/v2.1/drives/b!nW6iQvGdAE-qetVqlyvDRrh_bBcVVUFOpvuhp5PdeZ-IgjmDnIDFSYQTfXrZeC6w/items/01UC4W2QBYF7NSSA3FGZC2VJBOCIBRHZDW/streams/content_preview_Ofpd.png/streamContent?tempauth=v1.eyJzaXRlaWQiOiI0MmEyNmU5ZC05ZGYxLTRmMDAtYWE3YS1kNTZhOTcyYmMzNDYiLCJhdWQiOiIwMDAwMDAwMy0wMDAwLTBmZjEtY2UwMC0wMDAwMDAwMDAwMDAvbWZzdXMtbXkuc2hhcmVwb2ludC5jb21ANmY3MDhjOTAtNjVhZS00ZjAyLWFlMTUtZjdiNTJiNWQ0NGE0IiwiZXhwIjoiMTc0MDU1MTc3OSJ9.CiMKCXNoYXJpbmdpZBIWN0QzeXVlK1o2a1d5RXNNa2hBQ2c4dwoLCgRzbmlkEgMxMDQSCwi8wKL-wvnqPRAFGgw4LjQ2LjEyMy4xODkiFG1pY3Jvc29mdC5zaGFyZXBvaW50KiwzbC8ycE56MWRRSThMclJCU1QwL0d2WFc2a1ZvVXhqZmNHL2lIRVg3Uk1JPTC6ATgBQhChhQ__0zAAgBZEzNoKqA-rShBoYXNoZWRwcm9vZnRva2VuYgR0cnVlcmEwaC5mfG1lbWJlcnNoaXB8dXJuJTNhc3BvJTNhYW5vbiMyZDI1M2VlY2E3YzU3ZGM2MmU5YmNiZGEwMTBiYmJkYWZmYTNlZTQ0MTBlZDkxOTAwYmY1MDBlMDI2NmMzZTYxegEwwgFhMCMuZnxtZW1iZXJzaGlwfHVybiUzYXNwbyUzYWFub24jMmQyNTNlZWNhN2M1N2RjNjJlOWJjYmRhMDEwYmJiZGFmZmEzZWU0NDEwZWQ5MTkwMGJmNTAwZTAyNjZjM2U2McgBAQ.7-Aft3l0je9L038zbtW6zw2_PAE69pwo-ZwQqScqjnA&usecachedssr=1&prefetchSSRCorrelationId=ff0f85a1-30d3-8000-1644-ccda0aa80fab HTTP/1.1Host: mfsus-my.sharepoint.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: FedAuth=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
    Source: global trafficHTTP traffic detected: GET /:u:/p/jmaldonado/ETgv2ykDZTZFqqQuEgMT5HYBmLmp6Wc681CQdzzQhFcYJQ?rtime=vhsaD9xV3Ug&wdreloadsessionid=e787110c-effc-6f26-b59d-912facae4bb6&wdreloadcount=1 HTTP/1.1Host: mfsus-my.sharepoint.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Sec-Fetch-Site: same-originSec-Fetch-Mode: navigateSec-Fetch-Dest: documentReferer: https://mfsus-my.sharepoint.com/:u:/p/jmaldonado/ETgv2ykDZTZFqqQuEgMT5HYBmLmp6Wc681CQdzzQhFcYJQ?rtime=vhsaD9xV3UgAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: FedAuth=77u/PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0idXRmLTgiPz48U1A+VjEzLDBoLmZ8bWVtYmVyc2hpcHx1cm4lM2FzcG8lM2Fhbm9uIzJkMjUzZWVjYTdjNTdkYzYyZTliY2JkYTAxMGJiYmRhZmZhM2VlNDQxMGVkOTE5MDBiZjUwMGUwMjY2YzNlNjEsMCMuZnxtZW1iZXJzaGlwfHVybiUzYXNwbyUzYWFub24jMmQyNTNlZWNhN2M1N2RjNjJlOWJjYmRhMDEwYmJiZGFmZmEzZWU0NDEwZWQ5MTkwMGJmNTAwZTAyNjZjM2U2MSwxMzM4NDk4OTY3ODAwMDAwMDAsMCwxMzM4NTA3NTc3OTA3MDEyNjgsMC4wLjAuMCwyNTgsNmY3MDhjOTAtNjVhZS00ZjAyLWFlMTUtZjdiNTJiNWQ0NGE0LCwsNmY1ZDUxMjQtNGI4Ny00NTM5LTlmYWMtM2FiMDVlMDliYWRkLDZmNWQ1MTI0LTRiODctNDUzOS05ZmFjLTNhYjA1ZTA5YmFkZCw3RDN5dWUrWjZrV3lFc01raEFDZzh3LDAsMCwwLCwsLDI2NTA0Njc3NDM5OTk5OTk5OTksMCwsLCwsLCwwLCwxOTM1NzIsdVhlaFFKUGxlVmpOQ2Jha1VoR0Q2SXlGUVFrLHFaOWt4R3o4RzlSb2hrakt4b24zVlhzV2NBRjI4aVJRNmJPc0FhVDdaN1RBVFdEdmY3Q0ZvcTI2TnZ1SCtza1d3MTZCdmVmODFmTE5CbkREeGUvMTFibFBkbUxKdVVQdnJqRm9SOUVuVkh5NERmN1dNazgvZEZGMTNXZ1lWOFd4QUlFb0VsZUFHOGhuVHRYYTRuTXU0SzM4N2R6L2dCYWp3RGpDdXliTzFMN1F6VGJKWWljTTRNWXAzY21RTWR3WWpZSGg3WTh3N2J1WnJBMmkrZVJHeGR4UDBWZWErKytsL3kxSmROVjR0M2I4RGQzSlVPMGs1M0NJYVhpcnZzZXorU0Q3aWtEZDNyVE5aVkE0ckkyc0pBYzQ5WjRoeFgyQS85NHpVbTlDR2tHYzBFR3ZzWEpsV3FncklYU2FGM1ozbDNaV21lRlgraHM0ZUdlNkFzQnlLZz09PC9TUD4=; MicrosoftApplicationsTelemetryDeviceId=be7cb1e8-2c38-423c-80c3-afd345bf36d3; ai_session=AjPhhQvdUeJ7bILqAIklr8|1740515782146|1740515782150
    Source: global trafficHTTP traffic detected: GET /:u:/p/jmaldonado/ETgv2ykDZTZFqqQuEgMT5HYBmLmp6Wc681CQdzzQhFcYJQ?rtime=vhsaD9xV3Ug&wdreloadsessionid=e787110c-effc-6f26-b59d-912facae4bb6&wdreloadcount=1 HTTP/1.1Host: mfsus-my.sharepoint.comConnection: keep-aliveCache-Control: max-age=0sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Sec-Fetch-Site: same-originSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentReferer: https://mfsus-my.sharepoint.com/:u:/p/jmaldonado/ETgv2ykDZTZFqqQuEgMT5HYBmLmp6Wc681CQdzzQhFcYJQ?rtime=vhsaD9xV3UgAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: FedAuth=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; MicrosoftApplicationsTelemetryDeviceId=be7cb1e8-2c38-423c-80c3-afd345bf36d3; ai_session=AjPhhQvdUeJ7bILqAIklr8|1740515782146|1740515782150
    Source: global trafficHTTP traffic detected: GET /personal/jmaldonado_mfsus_com/_api/v2.1/drives/b!nW6iQvGdAE-qetVqlyvDRrh_bBcVVUFOpvuhp5PdeZ-IgjmDnIDFSYQTfXrZeC6w/items/01UC4W2QBYF7NSSA3FGZC2VJBOCIBRHZDW/streams/content_preview_Ofv.json/streamContent?tempauth=v1.eyJzaXRlaWQiOiI0MmEyNmU5ZC05ZGYxLTRmMDAtYWE3YS1kNTZhOTcyYmMzNDYiLCJhdWQiOiIwMDAwMDAwMy0wMDAwLTBmZjEtY2UwMC0wMDAwMDAwMDAwMDAvbWZzdXMtbXkuc2hhcmVwb2ludC5jb21ANmY3MDhjOTAtNjVhZS00ZjAyLWFlMTUtZjdiNTJiNWQ0NGE0IiwiZXhwIjoiMTc0MDU1MTc5OCJ9.CiMKCXNoYXJpbmdpZBIWN0QzeXVlK1o2a1d5RXNNa2hBQ2c4dwoLCgRzbmlkEgMxMDQSCwi4-JayxPnqPRAFGgw4LjQ2LjEyMy4xODkiFG1pY3Jvc29mdC5zaGFyZXBvaW50KiwzbC8ycE56MWRRSThMclJCU1QwL0d2WFc2a1ZvVXhqZmNHL2lIRVg3Uk1JPTC6ATgBQhChhRAEY4AAgBy25s4WR9VWShBoYXNoZWRwcm9vZnRva2VuYgR0cnVlcmEwaC5mfG1lbWJlcnNoaXB8dXJuJTNhc3BvJTNhYW5vbiMyZDI1M2VlY2E3YzU3ZGM2MmU5YmNiZGEwMTBiYmJkYWZmYTNlZTQ0MTBlZDkxOTAwYmY1MDBlMDI2NmMzZTYxegEwwgFhMCMuZnxtZW1iZXJzaGlwfHVybiUzYXNwbyUzYWFub24jMmQyNTNlZWNhN2M1N2RjNjJlOWJjYmRhMDEwYmJiZGFmZmEzZWU0NDEwZWQ5MTkwMGJmNTAwZTAyNjZjM2U2McgBAQ.6UkxhmweuH5xRhrV7xpOv6l-4BO8-6-fuzNacQQPaw0&usecachedssr=1&prefetchSSRCorrelationId=041085a1-8063-8000-1cb6-e6ce1647d556 HTTP/1.1Host: mfsus-my.sharepoint.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-originSec-Fetch-Mode: corsSec-Fetch-Dest: emptyReferer: https://mfsus-my.sharepoint.com/:u:/p/jmaldonado/ETgv2ykDZTZFqqQuEgMT5HYBmLmp6Wc681CQdzzQhFcYJQ?rtime=vhsaD9xV3UgAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: FedAuth=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; MicrosoftApplicationsTelemetryDeviceId=be7cb1e8-2c38-423c-80c3-afd345bf36d3; ai_session=AjPhhQvdUeJ7bILqAIklr8|1740515782146|174051578
    Source: global trafficHTTP traffic detected: GET /personal/jmaldonado_mfsus_com/_api/v2.1/drives/b!nW6iQvGdAE-qetVqlyvDRrh_bBcVVUFOpvuhp5PdeZ-IgjmDnIDFSYQTfXrZeC6w/items/01UC4W2QBYF7NSSA3FGZC2VJBOCIBRHZDW/streams/content_preview_Ofpd.png/streamContent?tempauth=v1.eyJzaXRlaWQiOiI0MmEyNmU5ZC05ZGYxLTRmMDAtYWE3YS1kNTZhOTcyYmMzNDYiLCJhdWQiOiIwMDAwMDAwMy0wMDAwLTBmZjEtY2UwMC0wMDAwMDAwMDAwMDAvbWZzdXMtbXkuc2hhcmVwb2ludC5jb21ANmY3MDhjOTAtNjVhZS00ZjAyLWFlMTUtZjdiNTJiNWQ0NGE0IiwiZXhwIjoiMTc0MDU1MTc5OCJ9.CiMKCXNoYXJpbmdpZBIWN0QzeXVlK1o2a1d5RXNNa2hBQ2c4dwoLCgRzbmlkEgMxMDQSCwi4-JayxPnqPRAFGgw4LjQ2LjEyMy4xODkiFG1pY3Jvc29mdC5zaGFyZXBvaW50KiwzbC8ycE56MWRRSThMclJCU1QwL0d2WFc2a1ZvVXhqZmNHL2lIRVg3Uk1JPTC6ATgBQhChhRAEY4AAgBy25s4WR9VWShBoYXNoZWRwcm9vZnRva2VuYgR0cnVlcmEwaC5mfG1lbWJlcnNoaXB8dXJuJTNhc3BvJTNhYW5vbiMyZDI1M2VlY2E3YzU3ZGM2MmU5YmNiZGEwMTBiYmJkYWZmYTNlZTQ0MTBlZDkxOTAwYmY1MDBlMDI2NmMzZTYxegEwwgFhMCMuZnxtZW1iZXJzaGlwfHVybiUzYXNwbyUzYWFub24jMmQyNTNlZWNhN2M1N2RjNjJlOWJjYmRhMDEwYmJiZGFmZmEzZWU0NDEwZWQ5MTkwMGJmNTAwZTAyNjZjM2U2McgBAQ.6UkxhmweuH5xRhrV7xpOv6l-4BO8-6-fuzNacQQPaw0&usecachedssr=1&prefetchSSRCorrelationId=041085a1-8063-8000-1cb6-e6ce1647d556 HTTP/1.1Host: mfsus-my.sharepoint.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://mfsus-my.sharepoint.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: same-originSec-Fetch-Mode: corsSec-Fetch-Dest: imageReferer: https://mfsus-my.sharepoint.com/:u:/p/jmaldonado/ETgv2ykDZTZFqqQuEgMT5HYBmLmp6Wc681CQdzzQhFcYJQ?rtime=vhsaD9xV3UgAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: FedAuth=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; MicrosoftApplicationsTelemetryDe
    Source: global trafficHTTP traffic detected: GET /personal/jmaldonado_mfsus_com/_api/v2.1/drives/b!nW6iQvGdAE-qetVqlyvDRrh_bBcVVUFOpvuhp5PdeZ-IgjmDnIDFSYQTfXrZeC6w/items/01UC4W2QBYF7NSSA3FGZC2VJBOCIBRHZDW/streams/content_preview_Ofv.json/streamContent?tempauth=v1.eyJzaXRlaWQiOiI0MmEyNmU5ZC05ZGYxLTRmMDAtYWE3YS1kNTZhOTcyYmMzNDYiLCJhdWQiOiIwMDAwMDAwMy0wMDAwLTBmZjEtY2UwMC0wMDAwMDAwMDAwMDAvbWZzdXMtbXkuc2hhcmVwb2ludC5jb21ANmY3MDhjOTAtNjVhZS00ZjAyLWFlMTUtZjdiNTJiNWQ0NGE0IiwiZXhwIjoiMTc0MDU1MTc5OCJ9.CiMKCXNoYXJpbmdpZBIWN0QzeXVlK1o2a1d5RXNNa2hBQ2c4dwoLCgRzbmlkEgMxMDQSCwi4-JayxPnqPRAFGgw4LjQ2LjEyMy4xODkiFG1pY3Jvc29mdC5zaGFyZXBvaW50KiwzbC8ycE56MWRRSThMclJCU1QwL0d2WFc2a1ZvVXhqZmNHL2lIRVg3Uk1JPTC6ATgBQhChhRAEY4AAgBy25s4WR9VWShBoYXNoZWRwcm9vZnRva2VuYgR0cnVlcmEwaC5mfG1lbWJlcnNoaXB8dXJuJTNhc3BvJTNhYW5vbiMyZDI1M2VlY2E3YzU3ZGM2MmU5YmNiZGEwMTBiYmJkYWZmYTNlZTQ0MTBlZDkxOTAwYmY1MDBlMDI2NmMzZTYxegEwwgFhMCMuZnxtZW1iZXJzaGlwfHVybiUzYXNwbyUzYWFub24jMmQyNTNlZWNhN2M1N2RjNjJlOWJjYmRhMDEwYmJiZGFmZmEzZWU0NDEwZWQ5MTkwMGJmNTAwZTAyNjZjM2U2McgBAQ.6UkxhmweuH5xRhrV7xpOv6l-4BO8-6-fuzNacQQPaw0&usecachedssr=1&prefetchSSRCorrelationId=041085a1-8063-8000-1cb6-e6ce1647d556 HTTP/1.1Host: mfsus-my.sharepoint.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: FedAuth=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; MicrosoftApplicationsTelemetryDeviceId=be7cb1e8-2c38-423c-80c3-afd345bf36d3; ai_session=AjPhhQvdUeJ7bILqAIklr8|1740515782146|1740515798282
    Source: global trafficHTTP traffic detected: GET /personal/jmaldonado_mfsus_com/_api/v2.1/drives/b!nW6iQvGdAE-qetVqlyvDRrh_bBcVVUFOpvuhp5PdeZ-IgjmDnIDFSYQTfXrZeC6w/items/01UC4W2QBYF7NSSA3FGZC2VJBOCIBRHZDW/streams/content_preview_Ofpd.png/streamContent?tempauth=v1.eyJzaXRlaWQiOiI0MmEyNmU5ZC05ZGYxLTRmMDAtYWE3YS1kNTZhOTcyYmMzNDYiLCJhdWQiOiIwMDAwMDAwMy0wMDAwLTBmZjEtY2UwMC0wMDAwMDAwMDAwMDAvbWZzdXMtbXkuc2hhcmVwb2ludC5jb21ANmY3MDhjOTAtNjVhZS00ZjAyLWFlMTUtZjdiNTJiNWQ0NGE0IiwiZXhwIjoiMTc0MDU1MTc5OCJ9.CiMKCXNoYXJpbmdpZBIWN0QzeXVlK1o2a1d5RXNNa2hBQ2c4dwoLCgRzbmlkEgMxMDQSCwi4-JayxPnqPRAFGgw4LjQ2LjEyMy4xODkiFG1pY3Jvc29mdC5zaGFyZXBvaW50KiwzbC8ycE56MWRRSThMclJCU1QwL0d2WFc2a1ZvVXhqZmNHL2lIRVg3Uk1JPTC6ATgBQhChhRAEY4AAgBy25s4WR9VWShBoYXNoZWRwcm9vZnRva2VuYgR0cnVlcmEwaC5mfG1lbWJlcnNoaXB8dXJuJTNhc3BvJTNhYW5vbiMyZDI1M2VlY2E3YzU3ZGM2MmU5YmNiZGEwMTBiYmJkYWZmYTNlZTQ0MTBlZDkxOTAwYmY1MDBlMDI2NmMzZTYxegEwwgFhMCMuZnxtZW1iZXJzaGlwfHVybiUzYXNwbyUzYWFub24jMmQyNTNlZWNhN2M1N2RjNjJlOWJjYmRhMDEwYmJiZGFmZmEzZWU0NDEwZWQ5MTkwMGJmNTAwZTAyNjZjM2U2McgBAQ.6UkxhmweuH5xRhrV7xpOv6l-4BO8-6-fuzNacQQPaw0&usecachedssr=1&prefetchSSRCorrelationId=041085a1-8063-8000-1cb6-e6ce1647d556 HTTP/1.1Host: mfsus-my.sharepoint.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: FedAuth=77u/PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0idXRmLTgiPz48U1A+VjEzLDBoLmZ8bWVtYmVyc2hpcHx1cm4lM2FzcG8lM2Fhbm9uIzJkMjUzZWVjYTdjNTdkYzYyZTliY2JkYTAxMGJiYmRhZmZhM2VlNDQxMGVkOTE5MDBiZjUwMGUwMjY2YzNlNjEsMCMuZnxtZW1iZXJzaGlwfHVybiUzYXNwbyUzYWFub24jMmQyNTNlZWNhN2M1N2RjNjJlOWJjYmRhMDEwYmJiZGFmZmEzZWU0NDEwZWQ5MTkwMGJmNTAwZTAyNjZjM2U2MSwxMzM4NDk4OTY3ODAwMDAwMDAsMCwxMzM4NTA3NTc3OTA3MDEyNjgsMC4wLjAuMCwyNTgsNmY3MDhjOTAtNjVhZS00ZjAyLWFlMTUtZjdiNTJiNWQ0NGE0LCwsNmY1ZDUxMjQtNGI4Ny00NTM5LTlmYWMtM2FiMDVlMDliYWRkLDZmNWQ1MTI0LTRiODctNDUzOS05ZmFjLTNhYjA1ZTA5YmFkZCw3RDN5dWUrWjZrV3lFc01raEFDZzh3LDAsMCwwLCwsLDI2NTA0Njc3NDM5OTk5OTk5OTksMCwsLCwsLCwwLCwxOTM1NzIsdVhlaFFKUGxlVmpOQ2Jha1VoR0Q2SXlGUVFrLHFaOWt4R3o4RzlSb2hrakt4b24zVlhzV2NBRjI4aVJRNmJPc0FhVDdaN1RBVFdEdmY3Q0ZvcTI2TnZ1SCtza1d3MTZCdmVmODFmTE5CbkREeGUvMTFibFBkbUxKdVVQdnJqRm9SOUVuVkh5NERmN1dNazgvZEZGMTNXZ1lWOFd4QUlFb0VsZUFHOGhuVHRYYTRuTXU0SzM4N2R6L2dCYWp3RGpDdXliTzFMN1F6VGJKWWljTTRNWXAzY21RTWR3WWpZSGg3WTh3N2J1WnJBMmkrZVJHeGR4UDBWZWErKytsL3kxSmROVjR0M2I4RGQzSlVPMGs1M0NJYVhpcnZzZXorU0Q3aWtEZDNyVE5aVkE0ckkyc0pBYzQ5WjRoeFgyQS85NHpVbTlDR2tHYzBFR3ZzWEpsV3FncklYU2FGM1ozbDNaV21lRlgraHM0ZUdlNkFzQnlLZz09PC9TUD4=; MicrosoftApplicationsTelemetryDeviceId=be7cb1e8-2c38-423c-80c3-afd345bf36d3; ai_session=AjPhhQvdUeJ7bILqAIklr8|1740515782146|1740515798282
    Source: global trafficHTTP traffic detected: GET /personal/jmaldonado_mfsus_com/_api/v2.1/drives/b!nW6iQvGdAE-qetVqlyvDRrh_bBcVVUFOpvuhp5PdeZ-IgjmDnIDFSYQTfXrZeC6w/items/01UC4W2QBYF7NSSA3FGZC2VJBOCIBRHZDW/streams/content_preview_Odi2.json/streamContent?tempauth=v1.eyJzaXRlaWQiOiI0MmEyNmU5ZC05ZGYxLTRmMDAtYWE3YS1kNTZhOTcyYmMzNDYiLCJhdWQiOiIwMDAwMDAwMy0wMDAwLTBmZjEtY2UwMC0wMDAwMDAwMDAwMDAvbWZzdXMtbXkuc2hhcmVwb2ludC5jb21ANmY3MDhjOTAtNjVhZS00ZjAyLWFlMTUtZjdiNTJiNWQ0NGE0IiwiZXhwIjoiMTc0MDU1MTc5OCJ9.CiMKCXNoYXJpbmdpZBIWN0QzeXVlK1o2a1d5RXNNa2hBQ2c4dwoLCgRzbmlkEgMxMDQSCwi4-JayxPnqPRAFGgw4LjQ2LjEyMy4xODkiFG1pY3Jvc29mdC5zaGFyZXBvaW50KiwzbC8ycE56MWRRSThMclJCU1QwL0d2WFc2a1ZvVXhqZmNHL2lIRVg3Uk1JPTC6ATgBQhChhRAEY4AAgBy25s4WR9VWShBoYXNoZWRwcm9vZnRva2VuYgR0cnVlcmEwaC5mfG1lbWJlcnNoaXB8dXJuJTNhc3BvJTNhYW5vbiMyZDI1M2VlY2E3YzU3ZGM2MmU5YmNiZGEwMTBiYmJkYWZmYTNlZTQ0MTBlZDkxOTAwYmY1MDBlMDI2NmMzZTYxegEwwgFhMCMuZnxtZW1iZXJzaGlwfHVybiUzYXNwbyUzYWFub24jMmQyNTNlZWNhN2M1N2RjNjJlOWJjYmRhMDEwYmJiZGFmZmEzZWU0NDEwZWQ5MTkwMGJmNTAwZTAyNjZjM2U2McgBAQ.6UkxhmweuH5xRhrV7xpOv6l-4BO8-6-fuzNacQQPaw0&usecachedssr=1&prefetchSSRCorrelationId=041085a1-8063-8000-1cb6-e6ce1647d556 HTTP/1.1Host: mfsus-my.sharepoint.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: */*Origin: https://usc-visio.officeapps.live.comSec-Fetch-Site: cross-siteSec-Fetch-Mode: corsSec-Fetch-Dest: emptyReferer: https://usc-visio.officeapps.live.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /personal/jmaldonado_mfsus_com/_api/v2.1/drives/b!nW6iQvGdAE-qetVqlyvDRrh_bBcVVUFOpvuhp5PdeZ-IgjmDnIDFSYQTfXrZeC6w/items/01UC4W2QBYF7NSSA3FGZC2VJBOCIBRHZDW/streams/content_preview_Odi2.json/streamContent?tempauth=v1.eyJzaXRlaWQiOiI0MmEyNmU5ZC05ZGYxLTRmMDAtYWE3YS1kNTZhOTcyYmMzNDYiLCJhdWQiOiIwMDAwMDAwMy0wMDAwLTBmZjEtY2UwMC0wMDAwMDAwMDAwMDAvbWZzdXMtbXkuc2hhcmVwb2ludC5jb21ANmY3MDhjOTAtNjVhZS00ZjAyLWFlMTUtZjdiNTJiNWQ0NGE0IiwiZXhwIjoiMTc0MDU1MTc5OCJ9.CiMKCXNoYXJpbmdpZBIWN0QzeXVlK1o2a1d5RXNNa2hBQ2c4dwoLCgRzbmlkEgMxMDQSCwi4-JayxPnqPRAFGgw4LjQ2LjEyMy4xODkiFG1pY3Jvc29mdC5zaGFyZXBvaW50KiwzbC8ycE56MWRRSThMclJCU1QwL0d2WFc2a1ZvVXhqZmNHL2lIRVg3Uk1JPTC6ATgBQhChhRAEY4AAgBy25s4WR9VWShBoYXNoZWRwcm9vZnRva2VuYgR0cnVlcmEwaC5mfG1lbWJlcnNoaXB8dXJuJTNhc3BvJTNhYW5vbiMyZDI1M2VlY2E3YzU3ZGM2MmU5YmNiZGEwMTBiYmJkYWZmYTNlZTQ0MTBlZDkxOTAwYmY1MDBlMDI2NmMzZTYxegEwwgFhMCMuZnxtZW1iZXJzaGlwfHVybiUzYXNwbyUzYWFub24jMmQyNTNlZWNhN2M1N2RjNjJlOWJjYmRhMDEwYmJiZGFmZmEzZWU0NDEwZWQ5MTkwMGJmNTAwZTAyNjZjM2U2McgBAQ.6UkxhmweuH5xRhrV7xpOv6l-4BO8-6-fuzNacQQPaw0&usecachedssr=1&prefetchSSRCorrelationId=041085a1-8063-8000-1cb6-e6ce1647d556 HTTP/1.1Host: mfsus-my.sharepoint.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: FedAuth=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; MicrosoftApplicationsTelemetryDeviceId=be7cb1e8-2c38-423c-80c3-afd345bf36d3; ai_session=AjPhhQvdUeJ7bILqAIklr8|1740515782146|1740515798282
    Source: global trafficHTTP traffic detected: GET /mydata/myprofile/expressionprofile/profilephoto:UserTileStatic,UserTileSmall/MeControlMediumUserTile?ck=1&ex=24&fofoff=1&sc=1740515812869 HTTP/1.1Host: storage.live.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: same-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://usc-visio.officeapps.live.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /campaignmetadataaggregator?country=US&locale=en-US&app=2159&platform=Web&version=16.0.18615.40602&campaignParams=pageWidth%3D1280%26pageHeight%3D907%26screenWidth%3D1280%26screenHeight%3D1024%26colorDepth%3D24%26more%3Dtrue%26OFC_Audience%3DProduction%26Datacenter%3DPUS9%26TenantId%3D6f708c90-65ae-4f02-ae15-f7b52b5d44a4%26SelfTriggerActivity%3D%26&contentType=CampaignContent%3BDynamicSettings&puid=&OFC_FLIGHTS=&ageGroup=0&sessionUserType=2 HTTP/1.1Host: messaging.engagement.office.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"x-correlationid: 3773840a-69e8-4265-a7aa-40d217ea0d66sec-ch-ua-mobile: ?0x-clientsessionid: f64b595b-4529-4897-f1e6-cd526bf433dfUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: */*Origin: https://usc-visio.officeapps.live.comSec-Fetch-Site: cross-siteSec-Fetch-Mode: corsSec-Fetch-Dest: emptyReferer: https://usc-visio.officeapps.live.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /campaignmetadataaggregator?country=US&locale=en-US&app=2159&platform=Web&version=16.0.18615.40602&campaignParams=pageWidth%3D1280%26pageHeight%3D907%26screenWidth%3D1280%26screenHeight%3D1024%26colorDepth%3D24%26more%3Dtrue%26OFC_Audience%3DProduction%26Datacenter%3DPUS9%26TenantId%3D6f708c90-65ae-4f02-ae15-f7b52b5d44a4%26SelfTriggerActivity%3D%26&contentType=CampaignContent%3BDynamicSettings&puid=&OFC_FLIGHTS=&ageGroup=0&sessionUserType=2 HTTP/1.1Host: messaging.engagement.office.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: login.dunmhumby.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Sec-Fetch-Site: cross-siteSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: login.dunmhumby.comConnection: keep-aliveCache-Control: max-age=0sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Sec-Fetch-Site: same-originSec-Fetch-Mode: navigateSec-Fetch-Dest: documentReferer: https://login.dunmhumby.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: PHPSESSID=37kbftd56ffb19ctotlkaj2cg5
    Source: global trafficHTTP traffic detected: GET /turnstile/v0/api.js?onload=onloadTurnstileCallback HTTP/1.1Host: challenges.cloudflare.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptReferer: https://login.dunmhumby.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /cdn-cgi/challenge-platform/scripts/jsd/main.js HTTP/1.1Host: login.dunmhumby.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: PHPSESSID=37kbftd56ffb19ctotlkaj2cg5
    Source: global trafficHTTP traffic detected: GET /turnstile/v0/b/b0e4a89976ce/api.js HTTP/1.1Host: challenges.cloudflare.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptReferer: https://login.dunmhumby.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /suite/RemoteTelemetry.ashx?usid=1ce43ee8-615f-7e0b-2097-d34a357d778c HTTP/1.1Host: common.online.office.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv/ow4xx/0x4AAAAAAA9n1hEmnDQG_XsU/auto/fbE/new/normal/auto/ HTTP/1.1Host: challenges.cloudflare.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Sec-Fetch-Site: cross-siteSec-Fetch-Mode: navigateSec-Fetch-Dest: iframeReferer: https://login.dunmhumby.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /turnstile/v0/b/b0e4a89976ce/api.js HTTP/1.1Host: challenges.cloudflare.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /cdn-cgi/challenge-platform/h/b/scripts/jsd/b0e4a89976ce/main.js? HTTP/1.1Host: login.dunmhumby.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: PHPSESSID=37kbftd56ffb19ctotlkaj2cg5
    Source: global trafficHTTP traffic detected: GET /cdn-cgi/challenge-platform/h/b/orchestrate/chl_api/v1?ray=917a7de74ec76a53&lang=auto HTTP/1.1Host: challenges.cloudflare.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptReferer: https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv/ow4xx/0x4AAAAAAA9n1hEmnDQG_XsU/auto/fbE/new/normal/auto/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /cdn-cgi/challenge-platform/h/b/cmg/1 HTTP/1.1Host: challenges.cloudflare.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv/ow4xx/0x4AAAAAAA9n1hEmnDQG_XsU/auto/fbE/new/normal/auto/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /cdn-cgi/challenge-platform/h/b/scripts/jsd/b0e4a89976ce/main.js? HTTP/1.1Host: login.dunmhumby.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: PHPSESSID=37kbftd56ffb19ctotlkaj2cg5
    Source: global trafficHTTP traffic detected: GET /cdn-cgi/challenge-platform/h/b/cmg/1 HTTP/1.1Host: challenges.cloudflare.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /cdn-cgi/challenge-platform/h/b/orchestrate/chl_api/v1?ray=917a7de74ec76a53&lang=auto HTTP/1.1Host: challenges.cloudflare.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /cdn-cgi/challenge-platform/h/b/jsd/r/0.5227171664807244:1740514320:84IteOpH3cCblDY-7DfBfT7vahJJlIegxpCKu3AS4Q4/917a7dd99add0f60 HTTP/1.1Host: login.dunmhumby.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: PHPSESSID=37kbftd56ffb19ctotlkaj2cg5
    Source: global trafficHTTP traffic detected: GET /cdn-cgi/challenge-platform/h/b/flow/ov1/1498478848:1740514570:OxqVV2jWMl8KzD9q1Etws-pcJlMygklZR-DPIJeInz0/917a7de74ec76a53/CbyK50qLS0ucCHMBEbOmw0Rz8pI.IRlX9.UXV4w.yvg-1740515830-1.1.1.1-7wTLZL9EkU0nyTmBKjStrWaz8E9K2zZqbDw.k8wij2t2Yi7Z13Sq2T.cCuLIQWZy HTTP/1.1Host: challenges.cloudflare.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /cdn-cgi/challenge-platform/h/b/d/917a7de74ec76a53/1740515832747/pVgEGKyvRiK0zvr HTTP/1.1Host: challenges.cloudflare.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv/ow4xx/0x4AAAAAAA9n1hEmnDQG_XsU/auto/fbE/new/normal/auto/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /cdn-cgi/challenge-platform/h/b/d/917a7de74ec76a53/1740515832747/pVgEGKyvRiK0zvr HTTP/1.1Host: challenges.cloudflare.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /cdn-cgi/challenge-platform/h/b/pat/917a7de74ec76a53/1740515832751/91a0102f78d5d0a40fc22b9d25b79d69ca553fdfc8394257da29f5607a52568c/iY7IdUmXfBWZzjD HTTP/1.1Host: challenges.cloudflare.comConnection: keep-aliveCache-Control: max-age=0sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-originSec-Fetch-Mode: corsSec-Fetch-Dest: emptyReferer: https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv/ow4xx/0x4AAAAAAA9n1hEmnDQG_XsU/auto/fbE/new/normal/auto/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /cdn-cgi/challenge-platform/h/b/flow/ov1/1498478848:1740514570:OxqVV2jWMl8KzD9q1Etws-pcJlMygklZR-DPIJeInz0/917a7de74ec76a53/CbyK50qLS0ucCHMBEbOmw0Rz8pI.IRlX9.UXV4w.yvg-1740515830-1.1.1.1-7wTLZL9EkU0nyTmBKjStrWaz8E9K2zZqbDw.k8wij2t2Yi7Z13Sq2T.cCuLIQWZy HTTP/1.1Host: challenges.cloudflare.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /cdn-cgi/challenge-platform/h/b/flow/ov1/1498478848:1740514570:OxqVV2jWMl8KzD9q1Etws-pcJlMygklZR-DPIJeInz0/917a7de74ec76a53/CbyK50qLS0ucCHMBEbOmw0Rz8pI.IRlX9.UXV4w.yvg-1740515830-1.1.1.1-7wTLZL9EkU0nyTmBKjStrWaz8E9K2zZqbDw.k8wij2t2Yi7Z13Sq2T.cCuLIQWZy HTTP/1.1Host: challenges.cloudflare.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /?cf-turnstile-response=0.onaef4vVCuJxDKqDZKLTU6tShXnNX5lFy1elSn6escSumYK7lkSptkhoN8oznWjVzPd6iEGVzjkOADtbAoRFYtDaN3ubY5_KNF506FXAlnGLLDOuNkrvkB-zXkOfwxFX0gEnA9QFovcpUkMZsnrK_8hETZKCDMvsclXxacVab2-IfUnJhDn_MldWzFyVcVyJGzuD5DL40M-7-ccTzr-Pldz3eS4X1Cp2R2ZFWkfRIi-bf9QhH68ta1oQQ5TURCU4DX9gOud02j-Acsky2DvvGD-HCeVG0nCKuhXHZyYhaHHxj348AyaGcVFARYy_dpvWp2bAZ1NK9G3k-TCJRxO5IMCFDh01SzHGw4RUZePcGQB_SBUp_k_PaTy7fkWvSFCOnNx0TBb4c4sLHCquiPffCAX__PUnSuWTHI2GjXZq2oMbJ2rhIz_7aGXSD0A5KUkaHVDiZU6CnKV5KzzAmnWBXbbU09IUCnvi6C1Go5QuWosAxdCu11ypDEdbNKly05u_iBqjQ0fUcS1dB7-e-DCBsSMyAqxcl46mXOyhj4Jt9xr0lW8CoAUYBHMXbSp--kmskMgrjs6QyVsa89TQYYcSZtUNeraYT2ZY9_9fdMl2t5m8NKohojL_74OcEaZ85G8NiaOastRFCqL6y6ar_7y4fvgDz4LU2nSd4V9O56WPvNVE4X06DZKVT6EEFrQGT0WfgdMfou2hmXzChsbjV1MM4wLiizllOfkqe_haEWtcnMXpq6S0D58VJ1VJoFP_juluWy2G8CHCz1MjIlKUjMLj3426MMMOstms0nOtNcm9So_-x_-M2ueSYMfgdW0nWFzjtIA6Orl2GFaCDH6l_xy-Gw.9mZilzTLYg9uKfffTDDBug.5e0cef458cc5ce3c21e5e5bdc6436a7de4a6c30049962214e61c7fcbcb1da83b HTTP/1.1Host: login.dunmhumby.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Sec-Fetch-Site: same-originSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentReferer: https://login.dunmhumby.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: PHPSESSID=37kbftd56ffb19ctotlkaj2cg5; cf_clearance=jl8phWNzg1SDCpFL70W4OtP__H4OrYAs7p2wZOf2QXg-1740515832-1.2.1.1-0TUJ_mHyfNxTmB9hojkh4eS220W5p2P0UZ_azsPzAJ8Y2BcS47kowrI_P5GBpbxpXnpB8FooEzPFTndMLx.ygOxOG6An9jIaeuloat8GlfTygXd1ZpCelm3eyx51EkfZTLjXhVMevn0DMnQqw7rdrgYhAlveNhsuSbnNEp4gRxqh51.ocriAiFGHanBEl9cpnPC2HhrR9Fv5Gey96lBdDrIpLqrsUwhDZjtqPXlD_WNThXwvpi2LJbjQBWA_u.sCFnTn04apjv69dl9XqViQQDPjmoH59fbckOwUew99OO0
    Source: global trafficHTTP traffic detected: GET /4E75UUJFQzqj2DyvLCuNTz77rYDZw93kS06Co4fSPmcgPARThK1kv8rrGNX1tPOHklbi6o9lGhHnsQXIwoIYWKdMBaMEWO8cf9SpscqeoY5BfguLsltFQvGa0Cpbp1tM5hjLzJBiTXw0A2Rudqn8yR/index HTTP/1.1Host: login.dunmhumby.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Sec-Fetch-Site: same-originSec-Fetch-Mode: navigateSec-Fetch-Dest: documentReferer: https://login.dunmhumby.com/?cf-turnstile-response=0.onaef4vVCuJxDKqDZKLTU6tShXnNX5lFy1elSn6escSumYK7lkSptkhoN8oznWjVzPd6iEGVzjkOADtbAoRFYtDaN3ubY5_KNF506FXAlnGLLDOuNkrvkB-zXkOfwxFX0gEnA9QFovcpUkMZsnrK_8hETZKCDMvsclXxacVab2-IfUnJhDn_MldWzFyVcVyJGzuD5DL40M-7-ccTzr-Pldz3eS4X1Cp2R2ZFWkfRIi-bf9QhH68ta1oQQ5TURCU4DX9gOud02j-Acsky2DvvGD-HCeVG0nCKuhXHZyYhaHHxj348AyaGcVFARYy_dpvWp2bAZ1NK9G3k-TCJRxO5IMCFDh01SzHGw4RUZePcGQB_SBUp_k_PaTy7fkWvSFCOnNx0TBb4c4sLHCquiPffCAX__PUnSuWTHI2GjXZq2oMbJ2rhIz_7aGXSD0A5KUkaHVDiZU6CnKV5KzzAmnWBXbbU09IUCnvi6C1Go5QuWosAxdCu11ypDEdbNKly05u_iBqjQ0fUcS1dB7-e-DCBsSMyAqxcl46mXOyhj4Jt9xr0lW8CoAUYBHMXbSp--kmskMgrjs6QyVsa89TQYYcSZtUNeraYT2ZY9_9fdMl2t5m8NKohojL_74OcEaZ85G8NiaOastRFCqL6y6ar_7y4fvgDz4LU2nSd4V9O56WPvNVE4X06DZKVT6EEFrQGT0WfgdMfou2hmXzChsbjV1MM4wLiizllOfkqe_haEWtcnMXpq6S0D58VJ1VJoFP_juluWy2G8CHCz1MjIlKUjMLj3426MMMOstms0nOtNcm9So_-x_-M2ueSYMfgdW0nWFzjtIA6Orl2GFaCDH6l_xy-Gw.9mZilzTLYg9uKfffTDDBug.5e0cef458cc5ce3c21e5e5bdc6436a7de4a6c30049962214e61c7fcbcb1da83bAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: PHPSESSID=37kbftd56ffb19ctotlkaj2cg5; cf_clearance=jl8phWNzg1SDCpFL70W4OtP__H4OrYAs7p2wZOf2QXg-1740515832-1.2.1.1-0TUJ_mHyfNxTmB9hojkh4eS220W5p2P0UZ_azsPzAJ8Y2BcS47kowrI_P5GBpbxpXnpB8FooEzPFTndMLx.ygOxOG6An9jIaeuloat8GlfTygXd1ZpCelm3eyx51EkfZTLjXhVMevn0DMnQqw7rdrgYhAlveNhsuSbnNEp4gRxqh51.ocriAiFGHanBEl9cpnPC2HhrR9Fv5Gey96lBdDrIpLqrsUwhDZjtqPXlD_WNThXwvpi2LJbjQBWA_u.sCFnTn04apjv69dl9XqViQQDPjmoH59fbckOwUew99OO0
    Source: global trafficHTTP traffic detected: GET /gh/syntaxerror019/HTML-STO/ld.min.js HTTP/1.1Host: cdn.jsdelivr.netConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptReferer: https://login.dunmhumby.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /4E75UUJFQzqj2DyvLCuNTz77rYDZw93kS06Co4fSPmcgPARThK1kv8rrGNX1tPOHklbi6o9lGhHnsQXIwoIYWKdMBaMEWO8cf9SpscqeoY5BfguLsltFQvGa0Cpbp1tM5hjLzJBiTXw0A2Rudqn8yR/verify HTTP/1.1Host: login.dunmhumby.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Sec-Fetch-Site: same-originSec-Fetch-Mode: navigateSec-Fetch-Dest: documentReferer: https://login.dunmhumby.com/4E75UUJFQzqj2DyvLCuNTz77rYDZw93kS06Co4fSPmcgPARThK1kv8rrGNX1tPOHklbi6o9lGhHnsQXIwoIYWKdMBaMEWO8cf9SpscqeoY5BfguLsltFQvGa0Cpbp1tM5hjLzJBiTXw0A2Rudqn8yR/indexAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: PHPSESSID=37kbftd56ffb19ctotlkaj2cg5; cf_clearance=jl8phWNzg1SDCpFL70W4OtP__H4OrYAs7p2wZOf2QXg-1740515832-1.2.1.1-0TUJ_mHyfNxTmB9hojkh4eS220W5p2P0UZ_azsPzAJ8Y2BcS47kowrI_P5GBpbxpXnpB8FooEzPFTndMLx.ygOxOG6An9jIaeuloat8GlfTygXd1ZpCelm3eyx51EkfZTLjXhVMevn0DMnQqw7rdrgYhAlveNhsuSbnNEp4gRxqh51.ocriAiFGHanBEl9cpnPC2HhrR9Fv5Gey96lBdDrIpLqrsUwhDZjtqPXlD_WNThXwvpi2LJbjQBWA_u.sCFnTn04apjv69dl9XqViQQDPjmoH59fbckOwUew99OO0
    Source: global trafficHTTP traffic detected: GET /gh/syntaxerror019/HTML-STO/ld.min.js HTTP/1.1Host: cdn.jsdelivr.netConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /page/styles/app.css HTTP/1.1Host: login.dunmhumby.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: text/css,*/*;q=0.1Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: styleReferer: https://login.dunmhumby.com/4E75UUJFQzqj2DyvLCuNTz77rYDZw93kS06Co4fSPmcgPARThK1kv8rrGNX1tPOHklbi6o9lGhHnsQXIwoIYWKdMBaMEWO8cf9SpscqeoY5BfguLsltFQvGa0Cpbp1tM5hjLzJBiTXw0A2Rudqn8yR/verifyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: PHPSESSID=37kbftd56ffb19ctotlkaj2cg5; cf_clearance=jl8phWNzg1SDCpFL70W4OtP__H4OrYAs7p2wZOf2QXg-1740515832-1.2.1.1-0TUJ_mHyfNxTmB9hojkh4eS220W5p2P0UZ_azsPzAJ8Y2BcS47kowrI_P5GBpbxpXnpB8FooEzPFTndMLx.ygOxOG6An9jIaeuloat8GlfTygXd1ZpCelm3eyx51EkfZTLjXhVMevn0DMnQqw7rdrgYhAlveNhsuSbnNEp4gRxqh51.ocriAiFGHanBEl9cpnPC2HhrR9Fv5Gey96lBdDrIpLqrsUwhDZjtqPXlD_WNThXwvpi2LJbjQBWA_u.sCFnTn04apjv69dl9XqViQQDPjmoH59fbckOwUew99OO0
    Source: global trafficHTTP traffic detected: GET /jquery-3.6.0.min.js HTTP/1.1Host: code.jquery.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptReferer: https://login.dunmhumby.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /page/images/back.png HTTP/1.1Host: login.dunmhumby.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://login.dunmhumby.com/4E75UUJFQzqj2DyvLCuNTz77rYDZw93kS06Co4fSPmcgPARThK1kv8rrGNX1tPOHklbi6o9lGhHnsQXIwoIYWKdMBaMEWO8cf9SpscqeoY5BfguLsltFQvGa0Cpbp1tM5hjLzJBiTXw0A2Rudqn8yR/verifyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: PHPSESSID=37kbftd56ffb19ctotlkaj2cg5; cf_clearance=jl8phWNzg1SDCpFL70W4OtP__H4OrYAs7p2wZOf2QXg-1740515832-1.2.1.1-0TUJ_mHyfNxTmB9hojkh4eS220W5p2P0UZ_azsPzAJ8Y2BcS47kowrI_P5GBpbxpXnpB8FooEzPFTndMLx.ygOxOG6An9jIaeuloat8GlfTygXd1ZpCelm3eyx51EkfZTLjXhVMevn0DMnQqw7rdrgYhAlveNhsuSbnNEp4gRxqh51.ocriAiFGHanBEl9cpnPC2HhrR9Fv5Gey96lBdDrIpLqrsUwhDZjtqPXlD_WNThXwvpi2LJbjQBWA_u.sCFnTn04apjv69dl9XqViQQDPjmoH59fbckOwUew99OO0
    Source: global trafficHTTP traffic detected: GET /page/images/logo.png HTTP/1.1Host: login.dunmhumby.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://login.dunmhumby.com/4E75UUJFQzqj2DyvLCuNTz77rYDZw93kS06Co4fSPmcgPARThK1kv8rrGNX1tPOHklbi6o9lGhHnsQXIwoIYWKdMBaMEWO8cf9SpscqeoY5BfguLsltFQvGa0Cpbp1tM5hjLzJBiTXw0A2Rudqn8yR/verifyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: PHPSESSID=37kbftd56ffb19ctotlkaj2cg5; cf_clearance=jl8phWNzg1SDCpFL70W4OtP__H4OrYAs7p2wZOf2QXg-1740515832-1.2.1.1-0TUJ_mHyfNxTmB9hojkh4eS220W5p2P0UZ_azsPzAJ8Y2BcS47kowrI_P5GBpbxpXnpB8FooEzPFTndMLx.ygOxOG6An9jIaeuloat8GlfTygXd1ZpCelm3eyx51EkfZTLjXhVMevn0DMnQqw7rdrgYhAlveNhsuSbnNEp4gRxqh51.ocriAiFGHanBEl9cpnPC2HhrR9Fv5Gey96lBdDrIpLqrsUwhDZjtqPXlD_WNThXwvpi2LJbjQBWA_u.sCFnTn04apjv69dl9XqViQQDPjmoH59fbckOwUew99OO0
    Source: global trafficHTTP traffic detected: GET /jquery-3.6.0.min.js HTTP/1.1Host: code.jquery.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /page/images/info.png HTTP/1.1Host: login.dunmhumby.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://login.dunmhumby.com/4E75UUJFQzqj2DyvLCuNTz77rYDZw93kS06Co4fSPmcgPARThK1kv8rrGNX1tPOHklbi6o9lGhHnsQXIwoIYWKdMBaMEWO8cf9SpscqeoY5BfguLsltFQvGa0Cpbp1tM5hjLzJBiTXw0A2Rudqn8yR/verifyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: PHPSESSID=37kbftd56ffb19ctotlkaj2cg5; cf_clearance=jl8phWNzg1SDCpFL70W4OtP__H4OrYAs7p2wZOf2QXg-1740515832-1.2.1.1-0TUJ_mHyfNxTmB9hojkh4eS220W5p2P0UZ_azsPzAJ8Y2BcS47kowrI_P5GBpbxpXnpB8FooEzPFTndMLx.ygOxOG6An9jIaeuloat8GlfTygXd1ZpCelm3eyx51EkfZTLjXhVMevn0DMnQqw7rdrgYhAlveNhsuSbnNEp4gRxqh51.ocriAiFGHanBEl9cpnPC2HhrR9Fv5Gey96lBdDrIpLqrsUwhDZjtqPXlD_WNThXwvpi2LJbjQBWA_u.sCFnTn04apjv69dl9XqViQQDPjmoH59fbckOwUew99OO0
    Source: global trafficHTTP traffic detected: GET /cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js HTTP/1.1Host: login.dunmhumby.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptReferer: https://login.dunmhumby.com/4E75UUJFQzqj2DyvLCuNTz77rYDZw93kS06Co4fSPmcgPARThK1kv8rrGNX1tPOHklbi6o9lGhHnsQXIwoIYWKdMBaMEWO8cf9SpscqeoY5BfguLsltFQvGa0Cpbp1tM5hjLzJBiTXw0A2Rudqn8yR/verifyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: PHPSESSID=37kbftd56ffb19ctotlkaj2cg5; cf_clearance=jl8phWNzg1SDCpFL70W4OtP__H4OrYAs7p2wZOf2QXg-1740515832-1.2.1.1-0TUJ_mHyfNxTmB9hojkh4eS220W5p2P0UZ_azsPzAJ8Y2BcS47kowrI_P5GBpbxpXnpB8FooEzPFTndMLx.ygOxOG6An9jIaeuloat8GlfTygXd1ZpCelm3eyx51EkfZTLjXhVMevn0DMnQqw7rdrgYhAlveNhsuSbnNEp4gRxqh51.ocriAiFGHanBEl9cpnPC2HhrR9Fv5Gey96lBdDrIpLqrsUwhDZjtqPXlD_WNThXwvpi2LJbjQBWA_u.sCFnTn04apjv69dl9XqViQQDPjmoH59fbckOwUew99OO0
    Source: global trafficHTTP traffic detected: GET /page/images/appnotif2.png HTTP/1.1Host: login.dunmhumby.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://login.dunmhumby.com/4E75UUJFQzqj2DyvLCuNTz77rYDZw93kS06Co4fSPmcgPARThK1kv8rrGNX1tPOHklbi6o9lGhHnsQXIwoIYWKdMBaMEWO8cf9SpscqeoY5BfguLsltFQvGa0Cpbp1tM5hjLzJBiTXw0A2Rudqn8yR/verifyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: PHPSESSID=37kbftd56ffb19ctotlkaj2cg5; cf_clearance=jl8phWNzg1SDCpFL70W4OtP__H4OrYAs7p2wZOf2QXg-1740515832-1.2.1.1-0TUJ_mHyfNxTmB9hojkh4eS220W5p2P0UZ_azsPzAJ8Y2BcS47kowrI_P5GBpbxpXnpB8FooEzPFTndMLx.ygOxOG6An9jIaeuloat8GlfTygXd1ZpCelm3eyx51EkfZTLjXhVMevn0DMnQqw7rdrgYhAlveNhsuSbnNEp4gRxqh51.ocriAiFGHanBEl9cpnPC2HhrR9Fv5Gey96lBdDrIpLqrsUwhDZjtqPXlD_WNThXwvpi2LJbjQBWA_u.sCFnTn04apjv69dl9XqViQQDPjmoH59fbckOwUew99OO0
    Source: global trafficHTTP traffic detected: GET /page/images/verify.png HTTP/1.1Host: login.dunmhumby.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://login.dunmhumby.com/4E75UUJFQzqj2DyvLCuNTz77rYDZw93kS06Co4fSPmcgPARThK1kv8rrGNX1tPOHklbi6o9lGhHnsQXIwoIYWKdMBaMEWO8cf9SpscqeoY5BfguLsltFQvGa0Cpbp1tM5hjLzJBiTXw0A2Rudqn8yR/verifyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: PHPSESSID=37kbftd56ffb19ctotlkaj2cg5; cf_clearance=jl8phWNzg1SDCpFL70W4OtP__H4OrYAs7p2wZOf2QXg-1740515832-1.2.1.1-0TUJ_mHyfNxTmB9hojkh4eS220W5p2P0UZ_azsPzAJ8Y2BcS47kowrI_P5GBpbxpXnpB8FooEzPFTndMLx.ygOxOG6An9jIaeuloat8GlfTygXd1ZpCelm3eyx51EkfZTLjXhVMevn0DMnQqw7rdrgYhAlveNhsuSbnNEp4gRxqh51.ocriAiFGHanBEl9cpnPC2HhrR9Fv5Gey96lBdDrIpLqrsUwhDZjtqPXlD_WNThXwvpi2LJbjQBWA_u.sCFnTn04apjv69dl9XqViQQDPjmoH59fbckOwUew99OO0
    Source: global trafficHTTP traffic detected: GET /page/images/verify_app.png HTTP/1.1Host: login.dunmhumby.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://login.dunmhumby.com/4E75UUJFQzqj2DyvLCuNTz77rYDZw93kS06Co4fSPmcgPARThK1kv8rrGNX1tPOHklbi6o9lGhHnsQXIwoIYWKdMBaMEWO8cf9SpscqeoY5BfguLsltFQvGa0Cpbp1tM5hjLzJBiTXw0A2Rudqn8yR/verifyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: PHPSESSID=37kbftd56ffb19ctotlkaj2cg5; cf_clearance=jl8phWNzg1SDCpFL70W4OtP__H4OrYAs7p2wZOf2QXg-1740515832-1.2.1.1-0TUJ_mHyfNxTmB9hojkh4eS220W5p2P0UZ_azsPzAJ8Y2BcS47kowrI_P5GBpbxpXnpB8FooEzPFTndMLx.ygOxOG6An9jIaeuloat8GlfTygXd1ZpCelm3eyx51EkfZTLjXhVMevn0DMnQqw7rdrgYhAlveNhsuSbnNEp4gRxqh51.ocriAiFGHanBEl9cpnPC2HhrR9Fv5Gey96lBdDrIpLqrsUwhDZjtqPXlD_WNThXwvpi2LJbjQBWA_u.sCFnTn04apjv69dl9XqViQQDPjmoH59fbckOwUew99OO0
    Source: global trafficHTTP traffic detected: GET /page/images/back.png HTTP/1.1Host: login.dunmhumby.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: PHPSESSID=37kbftd56ffb19ctotlkaj2cg5
    Source: global trafficHTTP traffic detected: GET /page/images/logo.png HTTP/1.1Host: login.dunmhumby.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: PHPSESSID=37kbftd56ffb19ctotlkaj2cg5
    Source: global trafficHTTP traffic detected: GET /page/images/verify_code.png HTTP/1.1Host: login.dunmhumby.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://login.dunmhumby.com/4E75UUJFQzqj2DyvLCuNTz77rYDZw93kS06Co4fSPmcgPARThK1kv8rrGNX1tPOHklbi6o9lGhHnsQXIwoIYWKdMBaMEWO8cf9SpscqeoY5BfguLsltFQvGa0Cpbp1tM5hjLzJBiTXw0A2Rudqn8yR/verifyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: PHPSESSID=37kbftd56ffb19ctotlkaj2cg5; cf_clearance=jl8phWNzg1SDCpFL70W4OtP__H4OrYAs7p2wZOf2QXg-1740515832-1.2.1.1-0TUJ_mHyfNxTmB9hojkh4eS220W5p2P0UZ_azsPzAJ8Y2BcS47kowrI_P5GBpbxpXnpB8FooEzPFTndMLx.ygOxOG6An9jIaeuloat8GlfTygXd1ZpCelm3eyx51EkfZTLjXhVMevn0DMnQqw7rdrgYhAlveNhsuSbnNEp4gRxqh51.ocriAiFGHanBEl9cpnPC2HhrR9Fv5Gey96lBdDrIpLqrsUwhDZjtqPXlD_WNThXwvpi2LJbjQBWA_u.sCFnTn04apjv69dl9XqViQQDPjmoH59fbckOwUew99OO0
    Source: global trafficHTTP traffic detected: GET /cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js HTTP/1.1Host: login.dunmhumby.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: PHPSESSID=37kbftd56ffb19ctotlkaj2cg5
    Source: global trafficHTTP traffic detected: GET /page/images/verify_sms.png HTTP/1.1Host: login.dunmhumby.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://login.dunmhumby.com/4E75UUJFQzqj2DyvLCuNTz77rYDZw93kS06Co4fSPmcgPARThK1kv8rrGNX1tPOHklbi6o9lGhHnsQXIwoIYWKdMBaMEWO8cf9SpscqeoY5BfguLsltFQvGa0Cpbp1tM5hjLzJBiTXw0A2Rudqn8yR/verifyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: PHPSESSID=37kbftd56ffb19ctotlkaj2cg5; cf_clearance=jl8phWNzg1SDCpFL70W4OtP__H4OrYAs7p2wZOf2QXg-1740515832-1.2.1.1-0TUJ_mHyfNxTmB9hojkh4eS220W5p2P0UZ_azsPzAJ8Y2BcS47kowrI_P5GBpbxpXnpB8FooEzPFTndMLx.ygOxOG6An9jIaeuloat8GlfTygXd1ZpCelm3eyx51EkfZTLjXhVMevn0DMnQqw7rdrgYhAlveNhsuSbnNEp4gRxqh51.ocriAiFGHanBEl9cpnPC2HhrR9Fv5Gey96lBdDrIpLqrsUwhDZjtqPXlD_WNThXwvpi2LJbjQBWA_u.sCFnTn04apjv69dl9XqViQQDPjmoH59fbckOwUew99OO0
    Source: global trafficHTTP traffic detected: GET /page/images/info.png HTTP/1.1Host: login.dunmhumby.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: PHPSESSID=37kbftd56ffb19ctotlkaj2cg5
    Source: global trafficHTTP traffic detected: GET /page/images/appnotif2.png HTTP/1.1Host: login.dunmhumby.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: PHPSESSID=37kbftd56ffb19ctotlkaj2cg5
    Source: global trafficHTTP traffic detected: GET /page/images/verify.png HTTP/1.1Host: login.dunmhumby.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: PHPSESSID=37kbftd56ffb19ctotlkaj2cg5
    Source: global trafficHTTP traffic detected: GET /page/images/verify_app.png HTTP/1.1Host: login.dunmhumby.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: PHPSESSID=37kbftd56ffb19ctotlkaj2cg5
    Source: global trafficHTTP traffic detected: GET /page/images/verify_code.png HTTP/1.1Host: login.dunmhumby.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: PHPSESSID=37kbftd56ffb19ctotlkaj2cg5
    Source: global trafficHTTP traffic detected: GET /page/images/verify_sms.png HTTP/1.1Host: login.dunmhumby.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: PHPSESSID=37kbftd56ffb19ctotlkaj2cg5
    Source: global trafficDNS traffic detected: DNS query: mfsus-my.sharepoint.com
    Source: global trafficDNS traffic detected: DNS query: common.online.office.com
    Source: global trafficDNS traffic detected: DNS query: www.google.com
    Source: global trafficDNS traffic detected: DNS query: m365cdn.nel.measure.office.net
    Source: global trafficDNS traffic detected: DNS query: storage.live.com
    Source: global trafficDNS traffic detected: DNS query: messaging.engagement.office.com
    Source: global trafficDNS traffic detected: DNS query: login.dunmhumby.com
    Source: global trafficDNS traffic detected: DNS query: challenges.cloudflare.com
    Source: global trafficDNS traffic detected: DNS query: a.nel.cloudflare.com
    Source: global trafficDNS traffic detected: DNS query: visioonline.nel.measure.office.net
    Source: global trafficDNS traffic detected: DNS query: spo.nel.measure.office.net
    Source: global trafficDNS traffic detected: DNS query: cdn.jsdelivr.net
    Source: global trafficDNS traffic detected: DNS query: code.jquery.com
    Source: unknownHTTP traffic detected: POST /suite/RemoteUls.ashx?usid=e787110c-effc-6f26-b59d-912facae4bb6&officeserverversion= HTTP/1.1Host: common.online.office.comConnection: keep-aliveContent-Length: 626sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-platform: "Windows"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Content-Type: text/plain;charset=UTF-8Accept: */*Origin: https://mfsus-my.sharepoint.comSec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyReferer: https://mfsus-my.sharepoint.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
    Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56566 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49852 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56457 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56537 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56514 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49858
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
    Source: unknownNetwork traffic detected: HTTP traffic on port 49841 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49852
    Source: unknownNetwork traffic detected: HTTP traffic on port 56497 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56525 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56451 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49858 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 65226 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56342 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56508 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56416 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56293
    Source: unknownNetwork traffic detected: HTTP traffic on port 56543 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
    Source: unknownNetwork traffic detected: HTTP traffic on port 56440 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56486 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56519 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49847
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49841
    Source: unknownNetwork traffic detected: HTTP traffic on port 56507 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56532 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56475 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56498 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56481 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49847 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56445 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56462 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
    Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56507
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56508
    Source: unknownNetwork traffic detected: HTTP traffic on port 56502 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56509
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56503
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56504
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56505
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56506
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56500
    Source: unknownNetwork traffic detected: HTTP traffic on port 56439 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56501
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56502
    Source: unknownNetwork traffic detected: HTTP traffic on port 56456 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56538 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
    Source: unknownNetwork traffic detected: HTTP traffic on port 56513 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 65217
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
    Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56530 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56509 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56438 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56450 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56356
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56478
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56484
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56486
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56480
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56481
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56482
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56483
    Source: unknownNetwork traffic detected: HTTP traffic on port 56521 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56332 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56504 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56476 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56455 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56495
    Source: unknownNetwork traffic detected: HTTP traffic on port 56515 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56564 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56482 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56496
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56497
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56498
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56494
    Source: unknownNetwork traffic detected: HTTP traffic on port 56536 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56444 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56461 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56503 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56526 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56494 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56499
    Source: unknownNetwork traffic detected: HTTP traffic on port 56565 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56542 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
    Source: unknownNetwork traffic detected: HTTP traffic on port 56531 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
    Source: unknownNetwork traffic detected: HTTP traffic on port 56499 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56520 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56528 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56505 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56438
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56439
    Source: unknownNetwork traffic detected: HTTP traffic on port 56419 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56454 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56440
    Source: unknownNetwork traffic detected: HTTP traffic on port 56540 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56562
    Source: unknownNetwork traffic detected: HTTP traffic on port 65217 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56483 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56563 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56563
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56564
    Source: unknownNetwork traffic detected: HTTP traffic on port 56460 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56500 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56448
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56569
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56444
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56565
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56445
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56566
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56567
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56447
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56568
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56451
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56452
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56332
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56453
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56454
    Source: unknownNetwork traffic detected: HTTP traffic on port 56511 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56450
    Source: unknownNetwork traffic detected: HTTP traffic on port 56402 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56356 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56448 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56459
    Source: unknownNetwork traffic detected: HTTP traffic on port 56522 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56455
    Source: unknownNetwork traffic detected: HTTP traffic on port 56459 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56456
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56457
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56458
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56462
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56342
    Source: unknownNetwork traffic detected: HTTP traffic on port 56516 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56478 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56460
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56461
    Source: unknownNetwork traffic detected: HTTP traffic on port 56535 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56527 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56495 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56510 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56469
    Source: unknownNetwork traffic detected: HTTP traffic on port 56453 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56569 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56473
    Source: unknownNetwork traffic detected: HTTP traffic on port 56408 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56474
    Source: unknownNetwork traffic detected: HTTP traffic on port 56541 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56475
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56476
    Source: unknownNetwork traffic detected: HTTP traffic on port 56484 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56496 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56518
    Source: unknownNetwork traffic detected: HTTP traffic on port 56501 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56519
    Source: unknownNetwork traffic detected: HTTP traffic on port 56524 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56514
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56515
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56516
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56517
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56510
    Source: unknownNetwork traffic detected: HTTP traffic on port 56473 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56511
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56512
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56513
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56520
    Source: unknownNetwork traffic detected: HTTP traffic on port 56518 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56401 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56533 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56447 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 65226
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56408
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56525
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56526
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56527
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56407
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56528
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56521
    Source: unknownNetwork traffic detected: HTTP traffic on port 56567 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56401
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56522
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56402
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56523
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56524
    Source: unknownNetwork traffic detected: HTTP traffic on port 56458 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56530
    Source: unknownNetwork traffic detected: HTTP traffic on port 56430 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56531
    Source: unknownNetwork traffic detected: HTTP traffic on port 56469 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56419
    Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56536
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56416
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56537
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56538
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56418
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56539
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56532
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56533
    Source: unknownNetwork traffic detected: HTTP traffic on port 56452 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56534
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56535
    Source: unknownNetwork traffic detected: HTTP traffic on port 56568 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56539 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56407 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56540
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56541
    Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56542
    Source: unknownNetwork traffic detected: HTTP traffic on port 56512 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56506 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56523 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56474 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56429
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56543
    Source: unknownNetwork traffic detected: HTTP traffic on port 56418 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56430
    Source: unknownNetwork traffic detected: HTTP traffic on port 56517 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56562 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56293 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56534 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56480 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 56429 -> 443
    Source: classification engineClassification label: mal76.phis.win@28/85@56/294
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
    Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2080 --field-trial-handle=1968,i,5836294590199637173,7389191903258325094,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
    Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://mfsus-my.sharepoint.com/:u:/p/jmaldonado/ETgv2ykDZTZFqqQuEgMT5HYBmLmp6Wc681CQdzzQhFcYJQ?e=deM7Fd"
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2080 --field-trial-handle=1968,i,5836294590199637173,7389191903258325094,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation2
    Browser Extensions
    1
    Process Injection
    1
    Masquerading
    OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/Job1
    Registry Run Keys / Startup Folder
    1
    Registry Run Keys / Startup Folder
    1
    Process Injection
    LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media3
    Non-Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
    Extra Window Memory Injection
    1
    Extra Window Memory Injection
    Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive4
    Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
    Ingress Tool Transfer
    Traffic DuplicationData Destruction

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    https://mfsus-my.sharepoint.com/:u:/p/jmaldonado/ETgv2ykDZTZFqqQuEgMT5HYBmLmp6Wc681CQdzzQhFcYJQ?e=deM7Fd0%Avira URL Cloudsafe
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://mfsus-my.sharepoint.com/personal/jmaldonado_mfsus_com/_layouts/15/Doc.aspx?sourcedoc=%7B29db2f38-6503-4536-aaa4-2e120313e476%7D&action=default&slrid=fd0f85a1-10a2-8000-1a73-b507b8f48a5b&originalPath=aHR0cHM6Ly9tZnN1cy1teS5zaGFyZXBvaW50LmNvbS86dTovcC9qbWFsZG9uYWRvL0VUZ3YyeWtEWlRaRnFxUXVFZ01UNUhZQm1MbXA2V2M2ODFDUWR6elFoRmNZSlE_cnRpbWU9dmhzYUQ5eFYzVWc&CID=4bdf9ee6-3edc-4723-8c5c-bd35d1945668&_SRM=0:G:2410%Avira URL Cloudsafe
    https://m365cdn.nel.measure.office.net/api/report?FrontEnd=AkamaiCDNWorldWide&DestinationEndpoint=DUSSELDORF&ASN=20940&Country=DE&Region=NW&RequestIdentifier=0.5c6edd58.1740515782.16413042&TotalRTCDNTime=79&CompressionType=gzip&FileSize=572510%Avira URL Cloudsafe
    https://mfsus-my.sharepoint.com/personal/jmaldonado_mfsus_com/_api/v2.1/drives/b!nW6iQvGdAE-qetVqlyvDRrh_bBcVVUFOpvuhp5PdeZ-IgjmDnIDFSYQTfXrZeC6w/items/01UC4W2QBYF7NSSA3FGZC2VJBOCIBRHZDW/streams/content_preview_Ofpd.png/streamContent?tempauth=v1.eyJzaXRlaWQiOiI0MmEyNmU5ZC05ZGYxLTRmMDAtYWE3YS1kNTZhOTcyYmMzNDYiLCJhdWQiOiIwMDAwMDAwMy0wMDAwLTBmZjEtY2UwMC0wMDAwMDAwMDAwMDAvbWZzdXMtbXkuc2hhcmVwb2ludC5jb21ANmY3MDhjOTAtNjVhZS00ZjAyLWFlMTUtZjdiNTJiNWQ0NGE0IiwiZXhwIjoiMTc0MDU1MTc3OSJ9.CiMKCXNoYXJpbmdpZBIWN0QzeXVlK1o2a1d5RXNNa2hBQ2c4dwoLCgRzbmlkEgMxMDQSCwi8wKL-wvnqPRAFGgw4LjQ2LjEyMy4xODkiFG1pY3Jvc29mdC5zaGFyZXBvaW50KiwzbC8ycE56MWRRSThMclJCU1QwL0d2WFc2a1ZvVXhqZmNHL2lIRVg3Uk1JPTC6ATgBQhChhQ__0zAAgBZEzNoKqA-rShBoYXNoZWRwcm9vZnRva2VuYgR0cnVlcmEwaC5mfG1lbWJlcnNoaXB8dXJuJTNhc3BvJTNhYW5vbiMyZDI1M2VlY2E3YzU3ZGM2MmU5YmNiZGEwMTBiYmJkYWZmYTNlZTQ0MTBlZDkxOTAwYmY1MDBlMDI2NmMzZTYxegEwwgFhMCMuZnxtZW1iZXJzaGlwfHVybiUzYXNwbyUzYWFub24jMmQyNTNlZWNhN2M1N2RjNjJlOWJjYmRhMDEwYmJiZGFmZmEzZWU0NDEwZWQ5MTkwMGJmNTAwZTAyNjZjM2U2McgBAQ.7-Aft3l0je9L038zbtW6zw2_PAE69pwo-ZwQqScqjnA&usecachedssr=1&prefetchSSRCorrelationId=ff0f85a1-30d3-8000-1644-ccda0aa80fab0%Avira URL Cloudsafe
    https://common.online.office.com/suite/RemoteUls.ashx?usid=e787110c-effc-6f26-b59d-912facae4bb6&officeserverversion=0%Avira URL Cloudsafe
    https://mfsus-my.sharepoint.com/personal/jmaldonado_mfsus_com/_api/v2.1/drives/b!nW6iQvGdAE-qetVqlyvDRrh_bBcVVUFOpvuhp5PdeZ-IgjmDnIDFSYQTfXrZeC6w/items/01UC4W2QBYF7NSSA3FGZC2VJBOCIBRHZDW/streams/content_preview_Ofv.json/streamContent?tempauth=v1.eyJzaXRlaWQiOiI0MmEyNmU5ZC05ZGYxLTRmMDAtYWE3YS1kNTZhOTcyYmMzNDYiLCJhdWQiOiIwMDAwMDAwMy0wMDAwLTBmZjEtY2UwMC0wMDAwMDAwMDAwMDAvbWZzdXMtbXkuc2hhcmVwb2ludC5jb21ANmY3MDhjOTAtNjVhZS00ZjAyLWFlMTUtZjdiNTJiNWQ0NGE0IiwiZXhwIjoiMTc0MDU1MTc3OSJ9.CiMKCXNoYXJpbmdpZBIWN0QzeXVlK1o2a1d5RXNNa2hBQ2c4dwoLCgRzbmlkEgMxMDQSCwi8wKL-wvnqPRAFGgw4LjQ2LjEyMy4xODkiFG1pY3Jvc29mdC5zaGFyZXBvaW50KiwzbC8ycE56MWRRSThMclJCU1QwL0d2WFc2a1ZvVXhqZmNHL2lIRVg3Uk1JPTC6ATgBQhChhQ__0zAAgBZEzNoKqA-rShBoYXNoZWRwcm9vZnRva2VuYgR0cnVlcmEwaC5mfG1lbWJlcnNoaXB8dXJuJTNhc3BvJTNhYW5vbiMyZDI1M2VlY2E3YzU3ZGM2MmU5YmNiZGEwMTBiYmJkYWZmYTNlZTQ0MTBlZDkxOTAwYmY1MDBlMDI2NmMzZTYxegEwwgFhMCMuZnxtZW1iZXJzaGlwfHVybiUzYXNwbyUzYWFub24jMmQyNTNlZWNhN2M1N2RjNjJlOWJjYmRhMDEwYmJiZGFmZmEzZWU0NDEwZWQ5MTkwMGJmNTAwZTAyNjZjM2U2McgBAQ.7-Aft3l0je9L038zbtW6zw2_PAE69pwo-ZwQqScqjnA&usecachedssr=1&prefetchSSRCorrelationId=ff0f85a1-30d3-8000-1644-ccda0aa80fab0%Avira URL Cloudsafe
    https://mfsus-my.sharepoint.com/:u:/p/jmaldonado/ETgv2ykDZTZFqqQuEgMT5HYBmLmp6Wc681CQdzzQhFcYJQ?rtime=vhsaD9xV3Ug&wdreloadsessionid=e787110c-effc-6f26-b59d-912facae4bb6&wdreloadcount=10%Avira URL Cloudsafe
    https://messaging.engagement.office.com/campaignmetadataaggregator?country=US&locale=en-US&app=2159&platform=Web&version=16.0.18615.40602&campaignParams=pageWidth%3D1280%26pageHeight%3D907%26screenWidth%3D1280%26screenHeight%3D1024%26colorDepth%3D24%26more%3Dtrue%26OFC_Audience%3DProduction%26Datacenter%3DPUS9%26TenantId%3D6f708c90-65ae-4f02-ae15-f7b52b5d44a4%26SelfTriggerActivity%3D%26&contentType=CampaignContent%3BDynamicSettings&puid=&OFC_FLIGHTS=&ageGroup=0&sessionUserType=20%Avira URL Cloudsafe
    https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/orchestrate/chl_api/v1?ray=917a7de74ec76a53&lang=auto0%Avira URL Cloudsafe
    https://common.online.office.com/suite/RemoteTelemetry.ashx?usid=1ce43ee8-615f-7e0b-2097-d34a357d778c0%Avira URL Cloudsafe
    https://common.online.office.com/suite/RemoteUls.ashx?usid=1ce43ee8-615f-7e0b-2097-d34a357d778c&officeserverversion=0%Avira URL Cloudsafe
    https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/flow/ov1/1498478848:1740514570:OxqVV2jWMl8KzD9q1Etws-pcJlMygklZR-DPIJeInz0/917a7de74ec76a53/CbyK50qLS0ucCHMBEbOmw0Rz8pI.IRlX9.UXV4w.yvg-1740515830-1.1.1.1-7wTLZL9EkU0nyTmBKjStrWaz8E9K2zZqbDw.k8wij2t2Yi7Z13Sq2T.cCuLIQWZy0%Avira URL Cloudsafe
    https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/d/917a7de74ec76a53/1740515832747/pVgEGKyvRiK0zvr0%Avira URL Cloudsafe
    https://login.dunmhumby.com/cdn-cgi/challenge-platform/scripts/jsd/main.js100%Avira URL Cloudphishing
    https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/pat/917a7de74ec76a53/1740515832751/91a0102f78d5d0a40fc22b9d25b79d69ca553fdfc8394257da29f5607a52568c/iY7IdUmXfBWZzjD0%Avira URL Cloudsafe
    https://login.dunmhumby.com/cdn-cgi/challenge-platform/h/b/scripts/jsd/b0e4a89976ce/main.js?100%Avira URL Cloudphishing
    https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv/ow4xx/0x4AAAAAAA9n1hEmnDQG_XsU/auto/fbE/new/normal/auto/0%Avira URL Cloudsafe
    https://m365cdn.nel.measure.office.net/api/report?FrontEnd=AkamaiCDNWorldWide&DestinationEndpoint=DUSSELDORF&ASN=20940&Country=DE&Region=NW&RequestIdentifier=0.ef0d7b5c.1740515818.bbb776e8&TotalRTCDNTime=89&CompressionType=gzip&FileSize=10000%Avira URL Cloudsafe
    https://visioonline.nel.measure.office.net/api/report?FrontEnd=NoAFD&DestinationEndpoint=None&DC=&FileSource=0%Avira URL Cloudsafe
    https://a.nel.cloudflare.com/report/v4?s=jDaMzt874OsCMNIDXV9vTJlHcgQ9sf5YoQUixLpLlip%2BAgqzAkYlfiQNH%2B1td4h3jm6%2FRIdd%2BayH4YgO6Zmm7m%2Fj6IJ2D%2BKdA05pWTwiJwg4DkQ0%2BH%2BOOAFSKuMLYTfIAfnIdo990%Avira URL Cloudsafe
    https://m365cdn.nel.measure.office.net/api/report?FrontEnd=AkamaiCDNWorldWide&DestinationEndpoint=DUSSELDORF&ASN=20940&Country=DE&Region=NW&RequestIdentifier=0.5c6edd58.1740515819.1642015b&TotalRTCDNTime=79&CompressionType=gzip&FileSize=10000%Avira URL Cloudsafe
    https://login.dunmhumby.com/4E75UUJFQzqj2DyvLCuNTz77rYDZw93kS06Co4fSPmcgPARThK1kv8rrGNX1tPOHklbi6o9lGhHnsQXIwoIYWKdMBaMEWO8cf9SpscqeoY5BfguLsltFQvGa0Cpbp1tM5hjLzJBiTXw0A2Rudqn8yR/verify100%Avira URL Cloudphishing
    https://spo.nel.measure.office.net/api/report?tenantId=00000000-0000-0000-0000-000000000000&destinationEndpoint=Edge-Prod-EWR31r5b&frontEnd=AFD&RemoteIP=8.46.123.00%Avira URL Cloudsafe
    https://login.dunmhumby.com/4E75UUJFQzqj2DyvLCuNTz77rYDZw93kS06Co4fSPmcgPARThK1kv8rrGNX1tPOHklbi6o9lGhHnsQXIwoIYWKdMBaMEWO8cf9SpscqeoY5BfguLsltFQvGa0Cpbp1tM5hjLzJBiTXw0A2Rudqn8yR/index100%Avira URL Cloudphishing
    https://login.dunmhumby.com/page/styles/app.css100%Avira URL Cloudphishing
    https://login.dunmhumby.com/page/images/verify_app.png100%Avira URL Cloudphishing
    https://login.dunmhumby.com/page/images/info.png100%Avira URL Cloudphishing
    https://login.dunmhumby.com/page/images/verify.png100%Avira URL Cloudphishing
    https://login.dunmhumby.com/page/images/back.png100%Avira URL Cloudphishing
    https://login.dunmhumby.com/page/images/verify_code.png100%Avira URL Cloudphishing
    https://login.dunmhumby.com/page/images/verify_sms.png100%Avira URL Cloudphishing
    https://login.dunmhumby.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js100%Avira URL Cloudphishing
    https://login.dunmhumby.com/page/images/logo.png100%Avira URL Cloudphishing
    https://login.dunmhumby.com/page/images/appnotif2.png100%Avira URL Cloudphishing
    NameIPActiveMaliciousAntivirus DetectionReputation
    jsdelivr.map.fastly.net
    151.101.193.229
    truefalse
      high
      dual-spo-0005.spo-msedge.net
      13.107.136.10
      truefalse
        high
        a.nel.cloudflare.com
        35.190.80.1
        truefalse
          high
          login.dunmhumby.com
          104.21.74.221
          truetrue
            unknown
            b-0004.b-msedge.net
            13.107.6.156
            truefalse
              high
              a1894.dscb.akamai.net
              2.19.11.102
              truefalse
                high
                wac-0003.wac-msedge.net
                52.108.8.12
                truefalse
                  high
                  prod-campaignaggregator.omexexternallfb.office.net.akadns.net
                  52.111.232.11
                  truefalse
                    high
                    code.jquery.com
                    151.101.2.137
                    truefalse
                      high
                      a726.dscd.akamai.net
                      2.16.100.169
                      truefalse
                        high
                        challenges.cloudflare.com
                        104.18.94.41
                        truefalse
                          high
                          i-am3p-cor007.api.p001.1drv.com
                          13.104.158.183
                          truefalse
                            unknown
                            www.google.com
                            142.250.184.228
                            truefalse
                              high
                              s-0005.dual-s-msedge.net
                              52.123.129.14
                              truefalse
                                high
                                cdn.jsdelivr.net
                                unknown
                                unknownfalse
                                  high
                                  visioonline.nel.measure.office.net
                                  unknown
                                  unknownfalse
                                    high
                                    storage.live.com
                                    unknown
                                    unknownfalse
                                      high
                                      m365cdn.nel.measure.office.net
                                      unknown
                                      unknownfalse
                                        high
                                        spo.nel.measure.office.net
                                        unknown
                                        unknownfalse
                                          high
                                          mfsus-my.sharepoint.com
                                          unknown
                                          unknownfalse
                                            unknown
                                            common.online.office.com
                                            unknown
                                            unknownfalse
                                              high
                                              messaging.engagement.office.com
                                              unknown
                                              unknownfalse
                                                high
                                                NameMaliciousAntivirus DetectionReputation
                                                https://mfsus-my.sharepoint.com/:u:/p/jmaldonado/ETgv2ykDZTZFqqQuEgMT5HYBmLmp6Wc681CQdzzQhFcYJQ?e=deM7Fdfalse
                                                  unknown
                                                  https://common.online.office.com/suite/RemoteTelemetry.ashx?usid=1ce43ee8-615f-7e0b-2097-d34a357d778cfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  https://mfsus-my.sharepoint.com/:u:/p/jmaldonado/ETgv2ykDZTZFqqQuEgMT5HYBmLmp6Wc681CQdzzQhFcYJQ?rtime=vhsaD9xV3Ugtrue
                                                    unknown
                                                    https://mfsus-my.sharepoint.com/:u:/p/jmaldonado/ETgv2ykDZTZFqqQuEgMT5HYBmLmp6Wc681CQdzzQhFcYJQ?rtime=vhsaD9xV3Ug&wdreloadsessionid=e787110c-effc-6f26-b59d-912facae4bb6&wdreloadcount=1true
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    https://code.jquery.com/jquery-3.6.0.min.jsfalse
                                                      high
                                                      https://cdn.jsdelivr.net/gh/syntaxerror019/HTML-STO/ld.min.jsfalse
                                                        high
                                                        https://common.online.office.com/suite/RemoteUls.ashx?usid=1ce43ee8-615f-7e0b-2097-d34a357d778c&officeserverversion=false
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv/ow4xx/0x4AAAAAAA9n1hEmnDQG_XsU/auto/fbE/new/normal/auto/false
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        https://m365cdn.nel.measure.office.net/api/report?FrontEnd=AkamaiCDNWorldWide&DestinationEndpoint=DUSSELDORF&ASN=20940&Country=DE&Region=NW&RequestIdentifier=0.ef0d7b5c.1740515818.bbb776e8&TotalRTCDNTime=89&CompressionType=gzip&FileSize=1000false
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        https://login.dunmhumby.com/page/images/info.pngtrue
                                                        • Avira URL Cloud: phishing
                                                        unknown
                                                        https://mfsus-my.sharepoint.com/personal/jmaldonado_mfsus_com/_layouts/15/Doc.aspx?sourcedoc=%7B29db2f38-6503-4536-aaa4-2e120313e476%7D&action=default&slrid=fd0f85a1-10a2-8000-1a73-b507b8f48a5b&originalPath=aHR0cHM6Ly9tZnN1cy1teS5zaGFyZXBvaW50LmNvbS86dTovcC9qbWFsZG9uYWRvL0VUZ3YyeWtEWlRaRnFxUXVFZ01UNUhZQm1MbXA2V2M2ODFDUWR6elFoRmNZSlE_cnRpbWU9dmhzYUQ5eFYzVWc&CID=4bdf9ee6-3edc-4723-8c5c-bd35d1945668&_SRM=0:G:241false
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        https://messaging.engagement.office.com/campaignmetadataaggregator?country=US&locale=en-US&app=2159&platform=Web&version=16.0.18615.40602&campaignParams=pageWidth%3D1280%26pageHeight%3D907%26screenWidth%3D1280%26screenHeight%3D1024%26colorDepth%3D24%26more%3Dtrue%26OFC_Audience%3DProduction%26Datacenter%3DPUS9%26TenantId%3D6f708c90-65ae-4f02-ae15-f7b52b5d44a4%26SelfTriggerActivity%3D%26&contentType=CampaignContent%3BDynamicSettings&puid=&OFC_FLIGHTS=&ageGroup=0&sessionUserType=2false
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        https://login.dunmhumby.com/page/images/logo.pngtrue
                                                        • Avira URL Cloud: phishing
                                                        unknown
                                                        https://login.dunmhumby.com/page/images/verify_app.pngtrue
                                                        • Avira URL Cloud: phishing
                                                        unknown
                                                        https://challenges.cloudflare.com/turnstile/v0/api.js?onload=onloadTurnstileCallbackfalse
                                                          high
                                                          https://login.dunmhumby.com/cdn-cgi/challenge-platform/scripts/jsd/main.jstrue
                                                          • Avira URL Cloud: phishing
                                                          unknown
                                                          https://login.dunmhumby.com/page/images/verify_code.pngtrue
                                                          • Avira URL Cloud: phishing
                                                          unknown
                                                          https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/cmg/1false
                                                            high
                                                            https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/flow/ov1/1498478848:1740514570:OxqVV2jWMl8KzD9q1Etws-pcJlMygklZR-DPIJeInz0/917a7de74ec76a53/CbyK50qLS0ucCHMBEbOmw0Rz8pI.IRlX9.UXV4w.yvg-1740515830-1.1.1.1-7wTLZL9EkU0nyTmBKjStrWaz8E9K2zZqbDw.k8wij2t2Yi7Z13Sq2T.cCuLIQWZyfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/d/917a7de74ec76a53/1740515832747/pVgEGKyvRiK0zvrfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://a.nel.cloudflare.com/report/v4?s=jDaMzt874OsCMNIDXV9vTJlHcgQ9sf5YoQUixLpLlip%2BAgqzAkYlfiQNH%2B1td4h3jm6%2FRIdd%2BayH4YgO6Zmm7m%2Fj6IJ2D%2BKdA05pWTwiJwg4DkQ0%2BH%2BOOAFSKuMLYTfIAfnIdo99false
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://visioonline.nel.measure.office.net/api/report?FrontEnd=NoAFD&DestinationEndpoint=None&DC=&FileSource=false
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://login.dunmhumby.com/4E75UUJFQzqj2DyvLCuNTz77rYDZw93kS06Co4fSPmcgPARThK1kv8rrGNX1tPOHklbi6o9lGhHnsQXIwoIYWKdMBaMEWO8cf9SpscqeoY5BfguLsltFQvGa0Cpbp1tM5hjLzJBiTXw0A2Rudqn8yR/verifytrue
                                                            • Avira URL Cloud: phishing
                                                            unknown
                                                            https://login.dunmhumby.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.jstrue
                                                            • Avira URL Cloud: phishing
                                                            unknown
                                                            https://login.dunmhumby.com/cdn-cgi/challenge-platform/h/b/scripts/jsd/b0e4a89976ce/main.js?true
                                                            • Avira URL Cloud: phishing
                                                            unknown
                                                            https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/orchestrate/chl_api/v1?ray=917a7de74ec76a53&lang=autofalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://login.dunmhumby.com/page/images/verify.pngtrue
                                                            • Avira URL Cloud: phishing
                                                            unknown
                                                            https://login.dunmhumby.com/page/images/back.pngtrue
                                                            • Avira URL Cloud: phishing
                                                            unknown
                                                            https://m365cdn.nel.measure.office.net/api/report?FrontEnd=AkamaiCDNWorldWide&DestinationEndpoint=DUSSELDORF&ASN=20940&Country=DE&Region=NW&RequestIdentifier=0.5c6edd58.1740515819.1642015b&TotalRTCDNTime=79&CompressionType=gzip&FileSize=1000false
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://m365cdn.nel.measure.office.net/api/report?FrontEnd=AkamaiCDNWorldWide&DestinationEndpoint=DUSSELDORF&ASN=20940&Country=DE&Region=NW&RequestIdentifier=0.5c6edd58.1740515782.16413042&TotalRTCDNTime=79&CompressionType=gzip&FileSize=57251false
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://login.dunmhumby.com/page/images/appnotif2.pngtrue
                                                            • Avira URL Cloud: phishing
                                                            unknown
                                                            https://login.dunmhumby.com/page/images/verify_sms.pngtrue
                                                            • Avira URL Cloud: phishing
                                                            unknown
                                                            https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/pat/917a7de74ec76a53/1740515832751/91a0102f78d5d0a40fc22b9d25b79d69ca553fdfc8394257da29f5607a52568c/iY7IdUmXfBWZzjDfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://login.dunmhumby.com/true
                                                              unknown
                                                              https://mfsus-my.sharepoint.com/personal/jmaldonado_mfsus_com/_api/v2.1/drives/b!nW6iQvGdAE-qetVqlyvDRrh_bBcVVUFOpvuhp5PdeZ-IgjmDnIDFSYQTfXrZeC6w/items/01UC4W2QBYF7NSSA3FGZC2VJBOCIBRHZDW/streams/content_preview_Ofpd.png/streamContent?tempauth=v1.eyJzaXRlaWQiOiI0MmEyNmU5ZC05ZGYxLTRmMDAtYWE3YS1kNTZhOTcyYmMzNDYiLCJhdWQiOiIwMDAwMDAwMy0wMDAwLTBmZjEtY2UwMC0wMDAwMDAwMDAwMDAvbWZzdXMtbXkuc2hhcmVwb2ludC5jb21ANmY3MDhjOTAtNjVhZS00ZjAyLWFlMTUtZjdiNTJiNWQ0NGE0IiwiZXhwIjoiMTc0MDU1MTc3OSJ9.CiMKCXNoYXJpbmdpZBIWN0QzeXVlK1o2a1d5RXNNa2hBQ2c4dwoLCgRzbmlkEgMxMDQSCwi8wKL-wvnqPRAFGgw4LjQ2LjEyMy4xODkiFG1pY3Jvc29mdC5zaGFyZXBvaW50KiwzbC8ycE56MWRRSThMclJCU1QwL0d2WFc2a1ZvVXhqZmNHL2lIRVg3Uk1JPTC6ATgBQhChhQ__0zAAgBZEzNoKqA-rShBoYXNoZWRwcm9vZnRva2VuYgR0cnVlcmEwaC5mfG1lbWJlcnNoaXB8dXJuJTNhc3BvJTNhYW5vbiMyZDI1M2VlY2E3YzU3ZGM2MmU5YmNiZGEwMTBiYmJkYWZmYTNlZTQ0MTBlZDkxOTAwYmY1MDBlMDI2NmMzZTYxegEwwgFhMCMuZnxtZW1iZXJzaGlwfHVybiUzYXNwbyUzYWFub24jMmQyNTNlZWNhN2M1N2RjNjJlOWJjYmRhMDEwYmJiZGFmZmEzZWU0NDEwZWQ5MTkwMGJmNTAwZTAyNjZjM2U2McgBAQ.7-Aft3l0je9L038zbtW6zw2_PAE69pwo-ZwQqScqjnA&usecachedssr=1&prefetchSSRCorrelationId=ff0f85a1-30d3-8000-1644-ccda0aa80fabfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              https://spo.nel.measure.office.net/api/report?tenantId=00000000-0000-0000-0000-000000000000&destinationEndpoint=Edge-Prod-EWR31r5b&frontEnd=AFD&RemoteIP=8.46.123.0false
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              https://common.online.office.com/suite/RemoteUls.ashx?usid=e787110c-effc-6f26-b59d-912facae4bb6&officeserverversion=false
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              https://login.dunmhumby.com/page/styles/app.csstrue
                                                              • Avira URL Cloud: phishing
                                                              unknown
                                                              https://mfsus-my.sharepoint.com/personal/jmaldonado_mfsus_com/_api/v2.1/drives/b!nW6iQvGdAE-qetVqlyvDRrh_bBcVVUFOpvuhp5PdeZ-IgjmDnIDFSYQTfXrZeC6w/items/01UC4W2QBYF7NSSA3FGZC2VJBOCIBRHZDW/streams/content_preview_Ofv.json/streamContent?tempauth=v1.eyJzaXRlaWQiOiI0MmEyNmU5ZC05ZGYxLTRmMDAtYWE3YS1kNTZhOTcyYmMzNDYiLCJhdWQiOiIwMDAwMDAwMy0wMDAwLTBmZjEtY2UwMC0wMDAwMDAwMDAwMDAvbWZzdXMtbXkuc2hhcmVwb2ludC5jb21ANmY3MDhjOTAtNjVhZS00ZjAyLWFlMTUtZjdiNTJiNWQ0NGE0IiwiZXhwIjoiMTc0MDU1MTc3OSJ9.CiMKCXNoYXJpbmdpZBIWN0QzeXVlK1o2a1d5RXNNa2hBQ2c4dwoLCgRzbmlkEgMxMDQSCwi8wKL-wvnqPRAFGgw4LjQ2LjEyMy4xODkiFG1pY3Jvc29mdC5zaGFyZXBvaW50KiwzbC8ycE56MWRRSThMclJCU1QwL0d2WFc2a1ZvVXhqZmNHL2lIRVg3Uk1JPTC6ATgBQhChhQ__0zAAgBZEzNoKqA-rShBoYXNoZWRwcm9vZnRva2VuYgR0cnVlcmEwaC5mfG1lbWJlcnNoaXB8dXJuJTNhc3BvJTNhYW5vbiMyZDI1M2VlY2E3YzU3ZGM2MmU5YmNiZGEwMTBiYmJkYWZmYTNlZTQ0MTBlZDkxOTAwYmY1MDBlMDI2NmMzZTYxegEwwgFhMCMuZnxtZW1iZXJzaGlwfHVybiUzYXNwbyUzYWFub24jMmQyNTNlZWNhN2M1N2RjNjJlOWJjYmRhMDEwYmJiZGFmZmEzZWU0NDEwZWQ5MTkwMGJmNTAwZTAyNjZjM2U2McgBAQ.7-Aft3l0je9L038zbtW6zw2_PAE69pwo-ZwQqScqjnA&usecachedssr=1&prefetchSSRCorrelationId=ff0f85a1-30d3-8000-1644-ccda0aa80fabfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              https://login.dunmhumby.com/4E75UUJFQzqj2DyvLCuNTz77rYDZw93kS06Co4fSPmcgPARThK1kv8rrGNX1tPOHklbi6o9lGhHnsQXIwoIYWKdMBaMEWO8cf9SpscqeoY5BfguLsltFQvGa0Cpbp1tM5hjLzJBiTXw0A2Rudqn8yR/indextrue
                                                              • Avira URL Cloud: phishing
                                                              unknown
                                                              https://challenges.cloudflare.com/turnstile/v0/b/b0e4a89976ce/api.jsfalse
                                                                high
                                                                • No. of IPs < 25%
                                                                • 25% < No. of IPs < 50%
                                                                • 50% < No. of IPs < 75%
                                                                • 75% < No. of IPs
                                                                IPDomainCountryFlagASNASN NameMalicious
                                                                13.107.6.156
                                                                b-0004.b-msedge.netUnited States
                                                                8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                                142.250.185.206
                                                                unknownUnited States
                                                                15169GOOGLEUSfalse
                                                                13.107.136.10
                                                                dual-spo-0005.spo-msedge.netUnited States
                                                                8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                                13.104.158.183
                                                                i-am3p-cor007.api.p001.1drv.comUnited States
                                                                8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                                151.101.193.229
                                                                jsdelivr.map.fastly.netUnited States
                                                                54113FASTLYUSfalse
                                                                20.189.173.5
                                                                unknownUnited States
                                                                8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                                52.111.232.11
                                                                prod-campaignaggregator.omexexternallfb.office.net.akadns.netUnited States
                                                                8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                                104.18.94.41
                                                                challenges.cloudflare.comUnited States
                                                                13335CLOUDFLARENETUSfalse
                                                                52.123.129.14
                                                                s-0005.dual-s-msedge.netUnited States
                                                                8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                                142.250.185.227
                                                                unknownUnited States
                                                                15169GOOGLEUSfalse
                                                                142.250.181.234
                                                                unknownUnited States
                                                                15169GOOGLEUSfalse
                                                                52.108.216.26
                                                                unknownUnited States
                                                                8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                                2.19.11.117
                                                                unknownEuropean Union
                                                                719ELISA-ASHelsinkiFinlandEUfalse
                                                                142.250.81.238
                                                                unknownUnited States
                                                                15169GOOGLEUSfalse
                                                                52.108.9.12
                                                                unknownUnited States
                                                                8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                                2.19.11.111
                                                                unknownEuropean Union
                                                                719ELISA-ASHelsinkiFinlandEUfalse
                                                                172.217.23.110
                                                                unknownUnited States
                                                                15169GOOGLEUSfalse
                                                                40.126.31.131
                                                                unknownUnited States
                                                                8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                                184.86.251.212
                                                                unknownUnited States
                                                                20940AKAMAI-ASN1EUfalse
                                                                2.16.100.169
                                                                a726.dscd.akamai.netEuropean Union
                                                                20940AKAMAI-ASN1EUfalse
                                                                104.21.74.221
                                                                login.dunmhumby.comUnited States
                                                                13335CLOUDFLARENETUStrue
                                                                35.190.80.1
                                                                a.nel.cloudflare.comUnited States
                                                                15169GOOGLEUSfalse
                                                                142.250.184.228
                                                                www.google.comUnited States
                                                                15169GOOGLEUSfalse
                                                                20.42.73.25
                                                                unknownUnited States
                                                                8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                                108.177.15.84
                                                                unknownUnited States
                                                                15169GOOGLEUSfalse
                                                                2.19.11.98
                                                                unknownEuropean Union
                                                                719ELISA-ASHelsinkiFinlandEUfalse
                                                                104.18.95.41
                                                                unknownUnited States
                                                                13335CLOUDFLARENETUSfalse
                                                                52.123.128.14
                                                                unknownUnited States
                                                                8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                                52.108.8.12
                                                                wac-0003.wac-msedge.netUnited States
                                                                8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                                151.101.2.137
                                                                code.jquery.comUnited States
                                                                54113FASTLYUSfalse
                                                                2.19.11.102
                                                                a1894.dscb.akamai.netEuropean Union
                                                                719ELISA-ASHelsinkiFinlandEUfalse
                                                                20.190.159.4
                                                                unknownUnited States
                                                                8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                                20.189.173.26
                                                                unknownUnited States
                                                                8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                                239.255.255.250
                                                                unknownReserved
                                                                unknownunknownfalse
                                                                88.221.110.96
                                                                unknownEuropean Union
                                                                20940AKAMAI-ASN1EUfalse
                                                                142.250.185.195
                                                                unknownUnited States
                                                                15169GOOGLEUSfalse
                                                                74.125.155.41
                                                                unknownUnited States
                                                                15169GOOGLEUSfalse
                                                                20.42.73.31
                                                                unknownUnited States
                                                                8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                                IP
                                                                192.168.2.16
                                                                192.168.2.5
                                                                Joe Sandbox version:42.0.0 Malachite
                                                                Analysis ID:1624119
                                                                Start date and time:2025-02-25 21:35:44 +01:00
                                                                Joe Sandbox product:CloudBasic
                                                                Overall analysis duration:
                                                                Hypervisor based Inspection enabled:false
                                                                Report type:full
                                                                Cookbook file name:defaultwindowsinteractivecookbook.jbs
                                                                Sample URL:https://mfsus-my.sharepoint.com/:u:/p/jmaldonado/ETgv2ykDZTZFqqQuEgMT5HYBmLmp6Wc681CQdzzQhFcYJQ?e=deM7Fd
                                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                Number of analysed new started processes analysed:13
                                                                Number of new started drivers analysed:0
                                                                Number of existing processes analysed:0
                                                                Number of existing drivers analysed:0
                                                                Number of injected processes analysed:0
                                                                Technologies:
                                                                • EGA enabled
                                                                Analysis Mode:stream
                                                                Analysis stop reason:Timeout
                                                                Detection:MAL
                                                                Classification:mal76.phis.win@28/85@56/294
                                                                • Exclude process from analysis (whitelisted): svchost.exe
                                                                • Excluded IPs from analysis (whitelisted): 142.250.185.227, 142.250.185.206, 108.177.15.84, 142.250.184.206, 199.232.214.172, 142.250.185.142
                                                                • Excluded domains from analysis (whitelisted): clients2.google.com, accounts.google.com, redirector.gvt1.com, ctldl.windowsupdate.com, clientservices.googleapis.com, res-1.cdn.office.net, clients.l.google.com, res-stls-prod.edgesuite.net
                                                                • Not all processes where analyzed, report is missing behavior information
                                                                • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                • VT rate limit hit for: https://mfsus-my.sharepoint.com/:u:/p/jmaldonado/ETgv2ykDZTZFqqQuEgMT5HYBmLmp6Wc681CQdzzQhFcYJQ?e=deM7Fd
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Feb 25 19:36:18 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                                Category:dropped
                                                                Size (bytes):2673
                                                                Entropy (8bit):3.9962180129624336
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:344006714E1E14BFE0D10E45A6E2F94A
                                                                SHA1:5EA0CCFF3053B43449E87A699043C5B6BB662FD5
                                                                SHA-256:6914A41C0C7318148FE75773A46C104A3BBF435782F954527F9FD7FB68FE8C18
                                                                SHA-512:13C64147AAD8BD89111A26D977F1552710C6BA418BA7451EA93148B937880C5330B66D8BBEFB632DEF3E28DAD7A8E72F712717D0C6D37F091024B930163AF330
                                                                Malicious:false
                                                                Reputation:unknown
                                                                Preview:L..................F.@.. ...$+.,......`....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IYZ}.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VYZ......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VYZ......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VYZ............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VYZ.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............X.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Feb 25 19:36:18 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                                Category:dropped
                                                                Size (bytes):2675
                                                                Entropy (8bit):4.011233295646539
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:A08A9961D358A5361D4CB94B2DCCD594
                                                                SHA1:C325CE273102EA85AE2E4322EA1590241A6CAA60
                                                                SHA-256:56A7FA49787697EF64BC4A16140AC483B30B3B7047B8CE2764A11B4FC7157AF1
                                                                SHA-512:5C054918E7BD2118018F09376C14BB0B56765B9B0546F3618432BBD7D2287572ECA307117A60776D5C0ECA80198BFAAFC1F355A679ECC3EC5B0D7219B74D124D
                                                                Malicious:false
                                                                Reputation:unknown
                                                                Preview:L..................F.@.. ...$+.,.....,U....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IYZ}.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VYZ......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VYZ......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VYZ............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VYZ.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............X.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                                Category:dropped
                                                                Size (bytes):2689
                                                                Entropy (8bit):4.0177063797460635
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:8D861F55E0769DDF1B33B60F546CD659
                                                                SHA1:CA5C130BABEF5C4536E16736D916085035529C35
                                                                SHA-256:3822BFF8C09BE27A2BCB21FCCABDD5A355DA52E93BB63833919D7C168CEF9F86
                                                                SHA-512:C40E6E8966EC754774DC290BBD1AE87CEB94DCAD4531C7109AD67D02C34F432E6ED7E508668B5BD7A2A88297ADA0948C0961D1B3EDE64FE8833D694CDCAD8FFD
                                                                Malicious:false
                                                                Reputation:unknown
                                                                Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IYZ}.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VYZ......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VYZ......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VYZ............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............X.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Feb 25 19:36:18 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                                Category:dropped
                                                                Size (bytes):2677
                                                                Entropy (8bit):4.007971583414809
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:739429A0FF148FE7024CD6CA7C29F0D9
                                                                SHA1:AF1B46FE7A83DF8EDAB9FA40F45908C6030B38DF
                                                                SHA-256:1311D502FFCB14A008CAA47D0C19A937AE40BAD027F37F8D5217BD2186DB2F90
                                                                SHA-512:62B355B2DEA3CF180709AF55EF64F7F1A2584A4EB2D711964DF930969A37973A83C7318176D6160046ED5EFB736E44E4430C89318B6FD7FD0F001124ED2B4F30
                                                                Malicious:false
                                                                Reputation:unknown
                                                                Preview:L..................F.@.. ...$+.,....K`O....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IYZ}.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VYZ......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VYZ......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VYZ............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VYZ.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............X.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Feb 25 19:36:18 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                                Category:dropped
                                                                Size (bytes):2677
                                                                Entropy (8bit):3.997746004631658
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:1B027DB4528159543C86657244347BDE
                                                                SHA1:DDCBE5DAF381D257F95E1267726E38C1F38E852E
                                                                SHA-256:159509560802E48BFFA9426C2F21C51B7F9E3123B5AAE9B3209F1D52DC550234
                                                                SHA-512:BA4BBCC313723C0F3A86D0C2320CEB8BC61E018FE9381CC4F968C7055A9780455A674FA3FB8FFA707DCD0DDFEFA11B5A573C81EBF5F388ED393BB8A2A9FE2AA4
                                                                Malicious:false
                                                                Reputation:unknown
                                                                Preview:L..................F.@.. ...$+.,......Z....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IYZ}.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VYZ......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VYZ......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VYZ............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VYZ.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............X.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Feb 25 19:36:18 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                                Category:dropped
                                                                Size (bytes):2679
                                                                Entropy (8bit):4.005129702487677
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:7688D37FE19866B568EEA565D16F17B7
                                                                SHA1:1FE76287181B2DEB16A2872C598EDF0C786CED33
                                                                SHA-256:659ABEFFEDF04CE386D8D57904D54CADCC33FFEC091F4F273ABCA72B683DB055
                                                                SHA-512:1E13744BCDD51E868AF13C365113DFE264666C0C424D07BF81AD2538B26429271E3F142F62919322DCA7E843353F46716B3F42238BFCEDCED96899BF58E17F5F
                                                                Malicious:false
                                                                Reputation:unknown
                                                                Preview:L..................F.@.. ...$+.,....~.A....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IYZ}.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VYZ......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VYZ......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VYZ............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VYZ.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............X.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:JSON data
                                                                Category:dropped
                                                                Size (bytes):72
                                                                Entropy (8bit):4.241202481433726
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:9E576E34B18E986347909C29AE6A82C6
                                                                SHA1:532C767978DC2B55854B3CA2D2DF5B4DB221C934
                                                                SHA-256:88BDF5AF090328963973990DE427779F9C4DF3B8E1F5BADC3D972BAC3087006D
                                                                SHA-512:5EF6DCFFD93434D45760888BF4B95FF134D53F34DA9DC904AD3C5EBEDC58409073483F531FEA4233869ED3EC75F38B022A70B2E179A5D3A13BDB10AB5C46B124
                                                                Malicious:false
                                                                Reputation:unknown
                                                                Preview:{"Message":"The requested resource does not support http method 'GET'."}
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:PNG image data, 108 x 24, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):1400
                                                                Entropy (8bit):7.808470583085035
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:333EE830E5AB72C41DD9126A27B4D878
                                                                SHA1:12D8D66EBB3076F3D6069E133C3212F97C8774E1
                                                                SHA-256:8702292CBC365E9F0488143E2B309B85EFE09C61FD2E0A2E21C53735A309313C
                                                                SHA-512:3413ED624241877C1D44FEE23FD37745CB214C12AE73FACFAFA07B47FA1CB9E5DAA3CB7F542564E04075FFE8BA744C962FBDD78F08A643A90C0EC1118C05BBF8
                                                                Malicious:false
                                                                Reputation:unknown
                                                                Preview:.PNG........IHDR...l................?IDAThC.X.n.A..K.. ..H8.....7P..p...&......>..4.'.y.`$Z...$1..9..;...w.|...zvvv.............b..Y....B...Dq..&\....pe..r.X.P...3.n...M.j.....+..r}}.t:...fa.mmm5U........)dwww...j...q<<<<L.}ggg.......k.O.?....^.gE.6....B..%U..w#H...y....~......h.....Q.E;.....T...E.W..X=..{.;..+.. ..`.(:2...A.*.U.....Y....z..l.r.S..<K...x.E.... .....U.,.`.....<::............MSiE.2w.!z.T...PWl.).0...Z....Z.'~.5zP.o..-. ......q..x..w.....y......5|v..i...........@w.c...j..3....w,/.3.).....u.......b.}..R........ `.*.....`mH$.U..B.H1...jx..3..$k ...........Z......4....A.>..X.a/...0N.&?q..........F#w&o."L:...l.c...x.P...@e..&.&|Y...!.i....gac..1C.....I..t...e~q.&.6.2B.}.*V.p.B.."...'..M..s.s.....V%-.?8yC.?m......z...&]\.VN.s....j.`....kY.....64.Y..(_ea[.r...1B.......5....i.u.......aQ.+z.x.......<,~..a...z,.I.T.b.P.^.`...y.58..,|Q...u.-.._....m.1...|k.j.7.,x.....X....ez..a....X...\E.$..-...s.../.9L.9*.(9..U...x$#.C...Nm...p.....J...
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:JSON data
                                                                Category:downloaded
                                                                Size (bytes):18047
                                                                Entropy (8bit):4.933707654124589
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:FD2CF5F6CCD92D5E6AAEAE9F60DDE3AC
                                                                SHA1:6AEBDCB4856DD2EA7CBDE9FBC266177BE49F7C23
                                                                SHA-256:E63E5F1CEF81B136EF1CC1C4A6C6F29F93DAFE1B9638D7D1FE5B5C87C559CC25
                                                                SHA-512:F625587572E45BB8710C56FA3688E81EB51DC1E0AF9CDD13E087DEB10D6B322A07E0A6FE3BC62DB1511AE7EE4C9699DFE3BD8CC52E4D1836317AFC0AF1B64DA5
                                                                Malicious:false
                                                                Reputation:unknown
                                                                URL:https://res-1.cdn.office.net/officeonline/v/s/161861540602_App_Scripts/suiteux-shell/strings/en/shellstrings.json
                                                                Preview:{. "Microsoft": "Microsoft",. "FlexpaneCloseButton": "Close pane",. "Me_Header": "My account",. "MePhotoAriaLabel": "{0} {1} Current account's user photo",. "ChangePhotoAriaLabel": "{0} {1} Change the photo that appears in IM. This may open a new window.",. "MePhotoTitle": "Current account's user photo",. "ChangePhotoTitle": "Change the photo that appears in IM. This may open a new window.",. "AppLauncherAriaLabel": "App launcher opened",. "AppLauncherCloseAriaLabel": "Close the app launcher",. "AppLauncherHomeAriaLabel": "Microsoft 365, will be open in new tab",. "AppLauncherHomeAriaLabelM365Copilot": "Microsoft 365 Copilot, will be open in new tab",. "AppsModuleHeading": "Apps",. "Microsoft365": "Microsoft 365",. "Microsoft365Copilot": "Microsoft 365 Copilot",. "AppsModuleAllApps": "All apps",. "AppsModuleAllAppsTooltip": "Open all apps",. "AllViewGroupShowMore": "Show More",. "AllViewGroupShowLess": "Show Less",. "AllViewBack": "Back",. "AllViewNewGroupHeading":
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:JSON data
                                                                Category:downloaded
                                                                Size (bytes):2459
                                                                Entropy (8bit):5.154298230467064
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:7649AE32EAC0FDBB7163679B210FE4AF
                                                                SHA1:D0D7E1A017AE5ED8F801D7BE2F2C81D2F6AC1A84
                                                                SHA-256:C970644F7544E5865EBE552EB1434544E00C580D3ABAC4142BE32E198E5E0FF8
                                                                SHA-512:60416944520076767A04139F9B67C410B068E28DD5585A54CA80A6EA3133FC64EBC9C7AE5737A3BAD924FE9ACDB0991B4D99FA19ED2AA26791AC53342ED01607
                                                                Malicious:false
                                                                Reputation:unknown
                                                                URL:https://admin.microsoft.com/admin/api/uxversion?bldVer=v1
                                                                Preview:{"floodgate":{"cdnUrl":"https://res.cdn.office.net/admincenter/admin-main/2025.2.20.2/","loaderSpec":{"type":"scriptUrl","content":"https://res.cdn.office.net/admincenter/admin-main/2025.2.20.2/floodgate.en.bundle.js"},"version":"2025.2.20.2"},"ariaLoggerId":"ea84b6a3285140258eaeb7caaab5884a-9d3ca75b-b3ee-42b8-a22c-ab0759ad4d38-7330","euAriaLoggerId":"","hostingAppUrls":"{\"M365AdminPortal\":\"https://admin.microsoft.com\",\"EXOAdminPortal\":\"https://admin.exchange.microsoft.com\",\"SPOAdminPortal\":\"https://admin.microsoft.com/sharepoint\",\"TeamsAdminPortal\":\"https://admin-int.teams.microsoft.net/\",\"MSGraphEndPoint\":\"https://graph.microsoft.com\",\"CDNContentURL\":\"https://res.cdn.office.net/admincenter/admin-content\",\"AriaLoggerGlobalCollectorEndpoint\":\"https://mobile.events.data.microsoft.com/Collector/3.0\",\"AriaLoggerEUCollectorEndpoint\":\"https://eu-mobile.events.data.microsoft.com/Collector/3.0\",\"AriaLoggerId\":\"ea84b6a3285140258eaeb7caaab5884a-9d3ca75b-b3ee-4
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:JSON data
                                                                Category:downloaded
                                                                Size (bytes):31474
                                                                Entropy (8bit):5.171833096545269
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:6029A6A0EB2CF31A84F65F14D1815174
                                                                SHA1:F4E7F9CC4EB5BB8676C4F055DA6335552F6CA0C4
                                                                SHA-256:FA5F268D39CA27F0FD0E108CAE9A1941E8BCC952AE95E2B0E178A5B8B8BB681B
                                                                SHA-512:932CA8C6AE6872B3555019D1080206407A83AC8F8F2F58578EA8311B57FAA29EF0F624B06CAA5C1CFAAC1827B4574ABD43F81AB0CE50B3B30D207B786016D5A5
                                                                Malicious:false
                                                                Reputation:unknown
                                                                URL:https://res-1.cdn.office.net/shellux/api/ShellBootInfo/consumer/OneShell/en-us
                                                                Preview:{"Architecture":1,"Audience":0,"Resources":{"Version":"1.20250217.2.0","CatalogXml":"<ResourceCatalog>\r\n <Resources>\r\n <Resource Key=\"_store_mecontrol-fluent-web_3_28_4-preview_4-37322c2e7276631293e5_node_modules_mecontrol_flue-025b9b\" Type=\"LTRRTLPath\">\r\n <RTLPath>suiteux.shell._store_mecontrol-fluent-web_3_28_4-preview_4-37322c2e7276631293e5_node_modules_mecontrol_flue-025b9b.5d5438e04a39aeded7c4.rtl.js</RTLPath>\r\n <LTRPath>suiteux.shell._store_mecontrol-fluent-web_3_28_4-preview_4-37322c2e7276631293e5_node_modules_mecontrol_flue-025b9b.5d5438e04a39aeded7c4.js</LTRPath>\r\n </Resource>\r\n <Resource Key=\"_store_mecontrol-fluent-web_3_28_4-preview_4-37322c2e7276631293e5_node_modules_mecontrol_flue-172a27\" Type=\"LTRRTLPath\">\r\n <RTLPath>suiteux.shell._store_mecontrol-fluent-web_3_28_4-preview_4-37322c2e7276631293e5_node_modules_mecontrol_flue-172a27.c221a31ed272fc1f6b66.rtl.js</RTLPath>\r\n <LTRPath>suiteux.shell._store_mecontrol-fluent-we
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:ASCII text, with very long lines (65536), with no line terminators
                                                                Category:dropped
                                                                Size (bytes):1851170
                                                                Entropy (8bit):5.812726959883366
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:162AB9B22632CEB280BD48680F7DB2FF
                                                                SHA1:94009A86D517C35027C11673CC949F1BFAB8CBE3
                                                                SHA-256:EE2732B30B7A3C3796E0EFAD3D15E740D4CE3E224E27FFE04B1E742CD69677B0
                                                                SHA-512:80D9F7BDDAD64C447E149AF3D6B9F9C0FDF7EDC43FA649B104E9825819145C86C2C7DA968CA365EC739B68417A9F0C04B9E5A52B6F5887F3EE6EC5DABA2EF8FF
                                                                Malicious:false
                                                                Reputation:unknown
                                                                Preview:(globalThis.visioOnlineChunks=globalThis.visioOnlineChunks||[]).push([[306],{43541:function(e,t,o){var n=o(84933),r=o(8327);"string"==typeof n&&(n=[[e.id,n]]);for(var i=0;i<n.length;i++)r.loadStyles(n[i][1],!1);n.locals&&(e.exports=n.locals)},84933:function(e,t,o){var n=o(90384),r=o(18161)(n);r.push([e.id,'svg>path.OfficeIconColors_m20 {\r\n fill: #FAFAFAFF;\r\n}\r\nsvg>path.OfficeIconColors_m21 {\r\n fill: #C8C6C4FF;\r\n}\r\nsvg>path.OfficeIconColors_m22 {\r\n fill: #3A3A38FF;\r\n}\r\nsvg>path.OfficeIconColors_m23 {\r\n fill: #797774FF;\r\n}\r\nsvg>path.OfficeIconColors_m24 {\r\n fill: #1E8BCDFF;\r\n}\r\nsvg>path.OfficeIconColors_m25 {\r\n fill: #0063B1FF;\r\n}\r\nsvg>path.OfficeIconColors_m26 {\r\n fill: #83BEECFF;\r\n}\r\nsvg>path.OfficeIconColors_m27 {\r\n fill: #379E4EFF;\r\n}\r\nsvg>path.OfficeIconColors_m28 {\r\n fill: #309048FF;\r\n}\r\nsvg>path.OfficeIconColors_m29 {\r\n fill: #A1DDAAFF;\r\n}\r\nsvg>path.OfficeIconColors_m210 {\r\n fill: #DE6C0
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:downloaded
                                                                Size (bytes):60
                                                                Entropy (8bit):4.842749405075779
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:3E3A9DBE5828D868CF824DB636665521
                                                                SHA1:96E9874716E098DDAEAFE1A30A3AD201085B1A28
                                                                SHA-256:F9A7BA5B9CEFD0301A4367E653D5EFBE8F6913977C6CB137811D554CE936E941
                                                                SHA-512:C4C3A4A94F2CAB65AA70BB5A99D63F0DF55A26A814BB4B753C9886D9C48CAC96F57BF7E06027E18450830287CF975B0783B47E2A9F065F976EAEB4494056D60F
                                                                Malicious:false
                                                                Reputation:unknown
                                                                URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISEAnnbXq7HeozAxIFDc8jKv8SEAm6d67VaelfBhIFDcWTxCQSEAnpLYgqgHWy0BIFDXVfuUESEAlb01elsOenehIFDXVfuUE=?alt=proto
                                                                Preview:CgkKBw3PIyr/GgAKCQoHDcWTxCQaAAoJCgcNdV+5QRoACgkKBw11X7lBGgA=
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:assembler source, ASCII text, with very long lines (496)
                                                                Category:downloaded
                                                                Size (bytes):8390
                                                                Entropy (8bit):4.859481128380926
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:CDF90F3517EE6CA9B704681368DAF1CB
                                                                SHA1:BECB98AE7A483339F6ACF03201A4B089CF4673F0
                                                                SHA-256:9C812D66179E70116FF42E7F6191883B0F0797EF797831C75B294F4684383248
                                                                SHA-512:AF4E05A67DB3966D7C883A34C74D8C74EA963D317EC04A387AE7950B2CF02B0B5AFEEEDE6C228CDF57804BE49534079A31D5C5A12D10A3D7232C45B64BD461BE
                                                                Malicious:false
                                                                Reputation:unknown
                                                                URL:https://login.dunmhumby.com/page/styles/app.css
                                                                Preview:* {. padding: 0;. margin: 0;. box-sizing: border-box;. font-family: "Segoe UI", "Helvetica Neue", "Lucida Grande", "Roboto", "Ebrima", "Nirmala UI", "Gadugi", "Segoe Xbox Symbol", "Segoe UI Symbol", "Meiryo UI", "Khmer UI", "Tunga", "Lao UI", "Raavi", "Iskoola Pota", "Latha", "Leelawadee", "Microsoft YaHei UI", "Microsoft JhengHei UI", "Malgun Gothic", "Estrangelo Edessa", "Microsoft Himalaya", "Microsoft New Tai Lue", "Microsoft PhagsPa", "Microsoft Tai Le", "Microsoft Yi Baiti", "Mongolian Baiti", "MV Boli", "Myanmar Text", "Cambria Math";.}..html,.body {. background-color: #e2e5d3;. color: #1b1b1b;.}..section {. display: table-cell;. vertical-align: middle;. height: 100vh;. width: 1000rem;. max-width: 100%;.}.../* Wrapper styling */...auth-wrapper {. position: relative;. max-width: 440px;. width: calc(100% - 40px);. padding: 44px;. margin: auto;. margin-bottom: 28px;. background-color: #fff;. -webkit-box-shadow: 0 2px 6px rgba
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:ASCII text, with very long lines (65447)
                                                                Category:dropped
                                                                Size (bytes):89501
                                                                Entropy (8bit):5.289893677458563
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:8FB8FEE4FCC3CC86FF6C724154C49C42
                                                                SHA1:B82D238D4E31FDF618BAE8AC11A6C812C03DD0D4
                                                                SHA-256:FF1523FB7389539C84C65ABA19260648793BB4F5E29329D2EE8804BC37A3FE6E
                                                                SHA-512:F3DE1813A4160F9239F4781938645E1589B876759CD50B7936DBD849A35C38FFAED53F6A61DBDD8A1CF43CF4A28AA9FFFBFDDEEC9A3811A1BB4EE6DF58652B31
                                                                Malicious:false
                                                                Reputation:unknown
                                                                Preview:/*! jQuery v3.6.0 | (c) OpenJS Foundation and other contributors | jquery.org/license */.!function(e,t){"use strict";"object"==typeof module&&"object"==typeof module.exports?module.exports=e.document?t(e,!0):function(e){if(!e.document)throw new Error("jQuery requires a window with a document");return t(e)}:t(e)}("undefined"!=typeof window?window:this,function(C,e){"use strict";var t=[],r=Object.getPrototypeOf,s=t.slice,g=t.flat?function(e){return t.flat.call(e)}:function(e){return t.concat.apply([],e)},u=t.push,i=t.indexOf,n={},o=n.toString,v=n.hasOwnProperty,a=v.toString,l=a.call(Object),y={},m=function(e){return"function"==typeof e&&"number"!=typeof e.nodeType&&"function"!=typeof e.item},x=function(e){return null!=e&&e===e.window},E=C.document,c={type:!0,src:!0,nonce:!0,noModule:!0};function b(e,t,n){var r,i,o=(n=n||E).createElement("script");if(o.text=e,t)for(r in c)(i=t[r]||t.getAttribute&&t.getAttribute(r))&&o.setAttribute(r,i);n.head.appendChild(o).parentNode.removeChild(o)}funct
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:PNG image data, 263 x 31, 8-bit/color RGBA, non-interlaced
                                                                Category:downloaded
                                                                Size (bytes):4022
                                                                Entropy (8bit):7.933685664446488
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:EF984B9CE53801ADAE1FAE29B5A5792F
                                                                SHA1:653DE3EACDAA9B38634892A021FF63CC46D84C2E
                                                                SHA-256:C2B2CA401F18B83BB197CED34FB80BAE4A3E3E2259F86CE4946EFE36BB7ACADF
                                                                SHA-512:1D447C32A79198B4EAAAB54A6A7483D9E107A41721CDB2DE88EE282F57ED97ADEB9CAFD6AA77C30CF36D7A886FC48960FE317B225FE1CF1035DCD9F10631334D
                                                                Malicious:false
                                                                Reputation:unknown
                                                                URL:https://login.dunmhumby.com/page/images/verify.png
                                                                Preview:.PNG........IHDR..............Y......sRGB.........gAMA......a.....pHYs..........o.d...KIDATx^...Us......J4...,.DQ..[..5BH5.aj"..)!#2...-.*..5.....8....N.=.{.{......w..=.......s_..Gj.....1C../.O.U.VI.N..;..v.!8*.&.p.B...e........./;.s.7......H~..W.....W^yE...`O&.....z.r..g.k.....p..5k.rJ..s...w....c.9..R<.R..a....v...G..4q>p.7.|sxn....U.....<..#2v.Xy.7d..2o.`.z....&...?.l..s.=..C.u.C.5Z?.h.{.9.>|....;r.-...S.=..b.u.....K.....L.O>..-..~..?.0X.....e.M6..*..k..K....#./.."...j.&r..7./.(.?..<..C.e.`OJUc...\...K..i.....0..1e>...P9..d..z...).."].v.&M..W^.!.E...O?u.(..].H....zJ..G.9..Se.M7.+..B.>..`..n..?. .<.\t.E.....{2._p.....>...e.e...B@....h..}z...}....xV.^...4(<.e...%%%.5...-].4....`...[.n....b..~.N?..P....b.6i...7.~...2..VA6..E...d..6.....i.!%%?.B@.].v...{.....~..'{.[NII.0....D.w..!...J....m..6..z..G..).ww.g.]wu..Y.$...g.....r8..#..d..<.@...........;.m...(1=......t.I...?.G...w...=..........._....CZ*..O..z,..(+W
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:ASCII text, with very long lines (65536), with no line terminators
                                                                Category:dropped
                                                                Size (bytes):101803
                                                                Entropy (8bit):5.333052740426743
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:2F1D74149F052D3354358E9856375219
                                                                SHA1:8019F7A2EA824930F91C3EC375D926B650FB1CFF
                                                                SHA-256:66C70312DE6CA4E1D7EF1E858307764C241A80E7411CEE686EA2FC2D74152749
                                                                SHA-512:2B1C4E057DBF59E89C3AA9C5DAB1FE8F512ED400088B13592E493B3D48AA334544A7999CA2DDEFA34C23D2F96A2F98B93DD0AAC80C3CF7C37D85B49C5A85A6E6
                                                                Malicious:false
                                                                Reputation:unknown
                                                                Preview:var otelWorker=function(e){var n={};function t(r){if(n[r])return n[r].exports;var i=n[r]={i:r,l:!1,exports:{}};return e[r].call(i.exports,i,i.exports,t),i.l=!0,i.exports}return t.m=e,t.c=n,t.d=function(e,n,r){t.o(e,n)||Object.defineProperty(e,n,{enumerable:!0,get:r})},t.r=function(e){"undefined"!=typeof Symbol&&Symbol.toStringTag&&Object.defineProperty(e,Symbol.toStringTag,{value:"Module"}),Object.defineProperty(e,"__esModule",{value:!0})},t.t=function(e,n){if(1&n&&(e=t(e)),8&n)return e;if(4&n&&"object"==typeof e&&e&&e.__esModule)return e;var r=Object.create(null);if(t.r(r),Object.defineProperty(r,"default",{enumerable:!0,value:e}),2&n&&"string"!=typeof e)for(var i in e)t.d(r,i,function(n){return e[n]}.bind(null,i));return r},t.n=function(e){var n=e&&e.__esModule?function(){return e.default}:function(){return e};return t.d(n,"a",n),n},t.o=function(e,n){return Object.prototype.hasOwnProperty.call(e,n)},t.p="",t(t.s=7)}([function(e,n,t){"use strict";t.d(n,"h",(function(){return r})),t.d(
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:ASCII text, with very long lines (640)
                                                                Category:downloaded
                                                                Size (bytes):355063
                                                                Entropy (8bit):5.623955866977898
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:F2B80BA69DFD20349E9EF7C786E10223
                                                                SHA1:9BE252084C0F1444010BE3DFAD4A8F221E83BAFC
                                                                SHA-256:2AF3CE762E921A569592595970758D6688EF3468E02583AF15E2224EA1A3A019
                                                                SHA-512:9B584F1796873A8FA79B2EB69FE136AB6D22E211DC01BA0374701388D9FDDDA7F958CC3D5DAF7432512C1BC9F0D40A7B786605F163B6FEA6ED5FCDEBBF59BEEE
                                                                Malicious:false
                                                                Reputation:unknown
                                                                URL:https://res-1.cdn.office.net/officeonline/v/s/h2AF3CE762E921A56_App_Scripts/VisioWebConsumption.appsforoffice.js
                                                                Preview:/*. Version=16.0.10001.10000 */.(globalThis.dullscriptWebpackJsonp=globalThis.dullscriptWebpackJsonp||[]).push([[1],{34412:function(Ja,Ec,Wa){function jb(B){if(!pc){var E=K.AFrameworkApplication.H.getStringFeatureGate("Microsoft.Office.SharedOnline.AddinTitleIdMappingOverride","");E=E.trim();if(0!=E.length){E=E.split("|");for(ia of E)ia.split(";")}pc=!0}var ia=Sd;if(B&&B.toLowerCase()in ia)return ia[B.toLowerCase()]}async function Pa(B,E,ia=Yc.AssetId){const Ca=jb(B);return Ca?{titleId:Ca}:new Promise(Ta=>{E.queryAppDetailByIdFromMos(B,.ia,(wb,Zb)=>{0===wb&&0<Zb?.titleId?.length?Ta(Zb):(U.ULS.sendTraceTag(506505233,220,50,`getAddinTitleIdMapping: cannot get titleId from Mos for solutionId ${B}.`),Ta(void 0))})})}function Ya(B,E){var ia=document.getElementById(B);Le.a.zk("efb1a590;e7deb809");const Ca=!!K.AFrameworkApplication.H&&K.AFrameworkApplication.H.getBooleanFeatureGate("Microsoft.Office.WordOnline.isInnerHTMLWordEditorPolicyEnabled",!1);ia?E?ia.innerHTML=Ca?Se.a.createHTML(E):E:i
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:PNG image data, 61 x 73, 8-bit/color RGBA, non-interlaced
                                                                Category:downloaded
                                                                Size (bytes):4082
                                                                Entropy (8bit):7.932033069392358
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:F69BD1A8C5D18C08C140445DC8DBC7E2
                                                                SHA1:ED7CBF47983BD9B39D188A531C350C3B3D05DB0E
                                                                SHA-256:C6E325A690B4378B2C1E25F604A4E1F197910F75B55218A495FACFF076ADF97B
                                                                SHA-512:F411945CF6124CA7FC7547F647A47180E87FA5670B7F1EAA85865122B12C07F0E97F708223B5371D056AA648563F79268E17EA2D8B313A51479E4E05C19407A6
                                                                Malicious:false
                                                                Reputation:unknown
                                                                URL:https://login.dunmhumby.com/page/images/verify_app.png
                                                                Preview:.PNG........IHDR...=...I........>....sRGB.........IDATx^.[{P.W.O@@.....u,.W.*m...H..SGg.qv...#.*.........DA."...k...:"....P......ug....@....^>.....fbLr..w..u/b.$?....p:.............EO.>.V....M.:U$..E+V......[.ry.$.$.O....]Z.....;w..}..($$D444.-.....L..."88X422"....I$..TTT.KII.>....tsss.G.}t....2.Y.(.=....9((...._......g.\YY.A.R...|.@..rSCCC2......I......3...tY....o.qS@G..7.l6y.....T*}2888....^.4...%.%-{......w.&66..S...b....f..T.......d....q2_............A..H.RQoo/g.555oi4......V..6l.;..(...w.D.I..,Y..A...h.O.6.%..'.....z.Z...+p.AK$...(0.2.7..g...<90.... i[..0....=.N.R.T.......Z...Z.Zr4`..i...!.e.B`X.M.(..;..hM.Ry...n.+.}...E.W..%.HD}}}.......t....a.^_?{..[YYY_'$$p!.`0.B.555.M&...ad=d.d-.C...V.*.B..-p.5....}..`.`.L......1<...}]QQ.K.cr......X82.A...!P8=.T:.p8...f.x.Z.P.......9sf...W!..3g.tuu..!...vFF......*Y...X..w.>}..4o...tddd...F......EFF.8.......!M.......y``...!.!.p..........w0X..A.QQQ.O.<..F........l...fsX....4...-..N......<6.2;...`.......-
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:ASCII text, with very long lines (65536), with no line terminators
                                                                Category:downloaded
                                                                Size (bytes):193897
                                                                Entropy (8bit):5.3989080001749326
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:BCED5ED53761336ECCB802FFFA798DE4
                                                                SHA1:BE6736CF4D35D3A1B4B8B10D43F3B00BAD54642E
                                                                SHA-256:FC8D37FC1A13C9C238A7B1E1122D394DDE3DD4D9365B752A32197A268616D6EE
                                                                SHA-512:1B1351BCD0718A2FDFD9EF26482FE8B5B9F628765726AAACD1813DCAD1DFD0A65C29A416DD896A0D9781F232C120CBD3B202BFB99505E60950DEA0F81BD98B51
                                                                Malicious:false
                                                                Reputation:unknown
                                                                URL:https://res-1.cdn.office.net/wise/owl/visio.boot.c1a87cfa9ed69142a38a.js
                                                                Preview:var Microsoft="object"==typeof Microsoft?Microsoft:{};Microsoft.Office=Microsoft.Office||{},Microsoft.Office.Visio=function(t){var i={};function e(s){if(i[s])return i[s].exports;var o=i[s]={i:s,l:!1,exports:{}};return t[s].call(o.exports,o,o.exports,e),o.l=!0,o.exports}return e.m=t,e.c=i,e.d=function(t,i,s){e.o(t,i)||Object.defineProperty(t,i,{enumerable:!0,get:s})},e.r=function(t){"undefined"!=typeof Symbol&&Symbol.toStringTag&&Object.defineProperty(t,Symbol.toStringTag,{value:"Module"}),Object.defineProperty(t,"__esModule",{value:!0})},e.t=function(t,i){if(1&i&&(t=e(t)),8&i)return t;if(4&i&&"object"==typeof t&&t&&t.__esModule)return t;var s=Object.create(null);if(e.r(s),Object.defineProperty(s,"default",{enumerable:!0,value:t}),2&i&&"string"!=typeof t)for(var o in t)e.d(s,o,function(i){return t[i]}.bind(null,o));return s},e.n=function(t){var i=t&&t.__esModule?function(){return t.default}:function(){return t};return e.d(i,"a",i),i},e.o=function(t,i){return Object.prototype.hasOwnPrope
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:PNG image data, 49 x 63, 8-bit/color RGBA, non-interlaced
                                                                Category:downloaded
                                                                Size (bytes):6626
                                                                Entropy (8bit):7.863868068132476
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:3AFF8064BB4CA017473290B5E3B9F949
                                                                SHA1:D3F110D0C60CD21D3F7A2725157FC419F5B9DD99
                                                                SHA-256:153A445447F6DC712D29916BE3B172055729D7E132B5E75041C34BCF4AF19951
                                                                SHA-512:D785FDF9B9E7345A23803E2047ED2F749390E92CB9E2167B3B8F1D05562B4A1D9DF46027B390D5BD90E9D78FAF244E85E13FE2237C91888662E30A56C4AFD885
                                                                Malicious:false
                                                                Reputation:unknown
                                                                URL:https://login.dunmhumby.com/page/images/info.png
                                                                Preview:.PNG........IHDR...1...?.....I. l...miCCPICC Profile..H..W.XS...[.... .... R.H....^..!.$......]Tp."..].Ql+ v....bAAY.u...&$....}s.3g.S.L.=..?..<T..|I.,!<.9:-.I... .m@.F<.\....P....w7.5.k.J....W....|....g...|.O....Ke....z...R%........J%.V..J...G.m..8._.@.........B~6......D ..@..q._..@..}X~.D%.....K!...V.w...........*.~....y...gi....).|..A.."..........T..$.1..ZC.A,P...."RD$..Q....... v..B. 6.8L.....gf.....N..p. 6.x.P.....$......e.8l..<O..W.."7....#.r...V.().b....... v..&F.mF..81.62E.2~k.....`.?V.%.KP......6....5._ J.P..;.....s...%.....|t.@..aH.*w.C(INT.|...'....i^......+...{....k...9U.x.. .I.'^...S./...B..(....A...t.w._..0..2....Y..X..?#..DP...H....g.....jUWg..?[.".<.8.D.<.[.J2.-.<...?.....x..P..{......5.j.b.#.>`I.%..#.aD.......hx....g.>.y|.'<#....n...w&..e?D9..A.0u-2...n.9=.`...Cf..7........gO...VV.....2..i...d.<..D..q..... .....G.k.`.9.3?..|W}..G.h.-..`.....V...q..k.*...z....%...y....S.TVR.Z....Y5W .R.<x...2q....o.!.+..c...y..|.......C...o.......
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:ASCII text, with very long lines (65536), with no line terminators
                                                                Category:dropped
                                                                Size (bytes):916296
                                                                Entropy (8bit):5.428529129822641
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:80530AF459860F64C0946BEF86047061
                                                                SHA1:F7E750AEFCB98362565FF8B503F15BC690931FE7
                                                                SHA-256:9DAE3D9E3C1F5A9A566CBC27261A28DA975277753C3DD14B4C4B1DC8F4E16C58
                                                                SHA-512:A5E163BD0B16BB6AC09F49AA43D8D24C0A93869622BCDBE75CE522E8C20A02435149D6B37AC913136F694DC058532CF65A236A174E70F75E1B88F4C79959B6DE
                                                                Malicious:false
                                                                Reputation:unknown
                                                                Preview:(globalThis.visioOnlineChunks=globalThis.visioOnlineChunks||[]).push([[227],{90815:function(e){function t(e,t,o,n){var i,r=null==(i=n)||"number"==typeof i||"boolean"==typeof i?n:o(n),s=t.get(r);return void 0===s&&(s=e.call(this,n),t.set(r,s)),s}function o(e,t,o){var n=Array.prototype.slice.call(arguments,3),i=o(n),r=t.get(i);return void 0===r&&(r=e.apply(this,n),t.set(i,r)),r}function n(e,t,o,n,i){return o.bind(t,e,n,i)}function i(e,i){return n(e,this,1===e.length?t:o,i.cache.create(),i.serializer)}function r(){return JSON.stringify(arguments)}function s(){this.cache=Object.create(null)}s.prototype.has=function(e){return e in this.cache},s.prototype.get=function(e){return this.cache[e]},s.prototype.set=function(e,t){this.cache[e]=t};var a={create:function(){return new s}};e.exports=function(e,t){var o=t&&t.cache?t.cache:a,n=t&&t.serializer?t.serializer:r;return(t&&t.strategy?t.strategy:i)(e,{cache:o,serializer:n})},e.exports.strategies={variadic:function(e,t){return n(e,this,o,t.cache.
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:ASCII text, with very long lines (600)
                                                                Category:dropped
                                                                Size (bytes):396843
                                                                Entropy (8bit):5.479700129948887
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:D0B4E3FAE0905271BC10B88E182985E9
                                                                SHA1:BD353116C027883C12CC46D59B5611E96AFFAAC5
                                                                SHA-256:C2EB7F1266EAB9D0CBD4931256E385433856329C2A383271AE50FAD5B7A82738
                                                                SHA-512:8DBDF0CC4734206D3324488B05BD58A550544B3AC1F931577E69F705AAEEFA7BE5FBA2826D96D812121D5FC07565908C9780570FDC0FE57DCB2CA9395272F1F1
                                                                Malicious:false
                                                                Reputation:unknown
                                                                Preview:(globalThis.dullscriptWebpackJsonp=globalThis.dullscriptWebpackJsonp||[]).push([[2],{3175:function(Ja,Ec,Wa){Ja=Wa(29496);var jb=Wa(32731),Pa=Wa(26705),Ya=Wa(52278),C=Wa(86170),P=Wa(80937),e=Wa(44284),d=Wa(53366),f=Wa(66205);class m{constructor(){this.oee="getAddinShortcutsPreference";this.pee="saveAddinShortcutsPreference";this.qee="{0}RoamingServiceHandler.ashx?action={1}&{2}";this.s7b=6E4;this.yMa=this.Uy=this.Kt=null}J$b(pa){return String.format(this.qee,C.AFrameworkApplication.H.appSettings.RoamingServiceHandlerWebServiceBase||."",pa,C.AFrameworkApplication.mg)}executeRequest(pa,ma,cb,Sb,nc=null){if(C.AFrameworkApplication.H.getBooleanFeatureGate("Microsoft.Office.SharedOnline.WatcAddinShortcutsPreferenceSettingHelper",!1)){const Jc=new f.a;m.SZ.Bx(pa).then(()=>{m.SZ.ZK(pa,ma,nc,null,!1,2,null,cb,Sb,!1,null,this.s7b).continueWith(xd=>{Jc.setResult(xd.result)})});return Jc.task}return m.SZ.ZK(pa,ma,nc,null,!1,2,null,cb,Sb,!1,null,this.s7b)}saveSetting(pa,ma,cb,Sb,nc){return this.ex
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:ASCII text, with very long lines (58562)
                                                                Category:downloaded
                                                                Size (bytes):264504
                                                                Entropy (8bit):5.329333335780168
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:5BBA61433FEB927B528BB395E595F33E
                                                                SHA1:D5295BE4A6FDF3A347EB9D276C56710F84FF7D34
                                                                SHA-256:0F9B15AB991DE28ADBD5B583F02EB841A283246816C5246552D21391FA323121
                                                                SHA-512:47432AA40A59FDF89A498C3E861B0AE2E8D42D2E13EE04471F4309733516CFFDCD95B4187F5C7C0042CF98E803414972A16C3E7F4C5564D7A99C3F414E7AC523
                                                                Malicious:false
                                                                Reputation:unknown
                                                                URL:https://res-1.cdn.office.net/files/odsp-web-prod_2025-02-07.012/wacowlhostwebpack/16.js
                                                                Preview:/*! For license information please see 16.js.LICENSE.txt */.(self.odspNextWebpackJsonp=self.odspNextWebpackJsonp||[]).push([[16],{730:(e,t,n)=>{"use strict";var a;n.d(t,{a:()=>a,b:()=>i}),function(e){e[e.CRITICAL=1]="CRITICAL",e[e.WARNING=2]="WARNING"}(a||(a={}));var i={BrowserDoesNotSupportLocalStorage:0,BrowserCannotReadLocalStorage:1,BrowserCannotReadSessionStorage:2,BrowserCannotWriteLocalStorage:3,BrowserCannotWriteSessionStorage:4,BrowserFailedRemovalFromLocalStorage:5,BrowserFailedRemovalFromSessionStorage:6,CannotSendEmptyTelemetry:7,ClientPerformanceMathError:8,ErrorParsingAISessionCookie:9,ErrorPVCalc:10,ExceptionWhileLoggingError:11,FailedAddingTelemetryToBuffer:12,FailedMonitorAjaxAbort:13,FailedMonitorAjaxDur:14,FailedMonitorAjaxOpen:15,FailedMonitorAjaxRSC:16,FailedMonitorAjaxSend:17,FailedMonitorAjaxGetCorrelationHeader:18,FailedToAddHandlerForOnBeforeUnload:19,FailedToSendQueuedTelemetry:20,FailedToReportDataLoss:21,FlushFailed:22,MessageLimitPerPVExceeded:23,MissingReq
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:JSON data
                                                                Category:downloaded
                                                                Size (bytes):399
                                                                Entropy (8bit):5.448187609025384
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:3C7E149D36B40E08BFA20E525E1E194D
                                                                SHA1:17A44012B34E1546A0803F6E4A33B2DFF2446524
                                                                SHA-256:5EB1CE49147508BD2137358F9E8A10BDD03CC9B36AB795AC8B6ED6D406A707D4
                                                                SHA-512:580EFC31F8CA0AFF06FC7E4E8B1303AA160D0B2B9EB4CCF46B98A8ED9FA65A955DA93BB630E12F1722254D8241F8FA2F065A233297B4C9306418DDB033D55EA3
                                                                Malicious:false
                                                                Reputation:unknown
                                                                URL:https://ecs.office.com/config/v1/OneShell/1.0.0.0?agents=OneShell&IsConsumer=true&WorkloadId=VisioOnline&TenantId=84df9e7f-e9f6-40af-b435-aaaaaaaaaaaa&UserId=null&UPN=null
                                                                Preview:{"OneShell":{"M365CopilotRebrandingEnabled":true,"UpdatedConsumerAppList":true,"M365StartEnabled":true,"DisableM365StartIntentsModule":false,"default":true},"Headers":{"ETag":"\"9btqTzDiElwLNfZkRp7wFewLNoXKAK6cxU5RSHQIYfE=\"","Expires":"Tue, 25 Feb 2025 21:36:52 GMT","CountryCode":"US","StatusCode":"200"},"ConfigIDs":{"OneShell":"P-R-1535312-4-8,P-R-1157040-4-8,P-R-1131228-4-17,P-D-1117449-1-4"}}
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:ASCII text, with very long lines (33654)
                                                                Category:downloaded
                                                                Size (bytes):33712
                                                                Entropy (8bit):5.312964320999572
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:B6E215C559C24CAFD09273E9BFAFD357
                                                                SHA1:ECCF0B92955DACEAF6FAD3A9DE7C36EB65B341CB
                                                                SHA-256:DAF0C5F563BBD6915BEA269FA160B52176BAE7AA972FFA7F0D9345165A4825F3
                                                                SHA-512:06FDF7EC3F675C5B458F16E206FE8F64624A3046531EA5484C72CA58136D449DF1638B9AE9CD78C0E355A4A05D373E18D89F96743CCAFF5700DECD1BD52620E9
                                                                Malicious:false
                                                                Reputation:unknown
                                                                URL:https://res-1.cdn.office.net/officeonline/v/s/hDAF0C5F563BBD691_App_Scripts/healthSmallOffline.worker.min.js
                                                                Preview:!function(e){var t={};function i(s){if(t[s])return t[s].exports;var r=t[s]={i:s,l:!1,exports:{}};return e[s].call(r.exports,r,r.exports,i),r.l=!0,r.exports}i.m=e,i.c=t,i.d=function(e,t,s){i.o(e,t)||Object.defineProperty(e,t,{enumerable:!0,get:s})},i.r=function(e){"undefined"!=typeof Symbol&&Symbol.toStringTag&&Object.defineProperty(e,Symbol.toStringTag,{value:"Module"}),Object.defineProperty(e,"__esModule",{value:!0})},i.t=function(e,t){if(1&t&&(e=i(e)),8&t)return e;if(4&t&&"object"==typeof e&&e&&e.__esModule)return e;var s=Object.create(null);if(i.r(s),Object.defineProperty(s,"default",{enumerable:!0,value:e}),2&t&&"string"!=typeof e)for(var r in e)i.d(s,r,function(t){return e[t]}.bind(null,r));return s},i.n=function(e){var t=e&&e.__esModule?function(){return e.default}:function(){return e};return i.d(t,"a",t),t},i.o=function(e,t){return Object.prototype.hasOwnProperty.call(e,t)},i.p="",i(i.s=0)}([function(e,t,i){"use strict";var s;function r(e){if(!e)return;const t={};return e.forEac
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:PNG image data, 24 x 24, 8-bit/color RGBA, non-interlaced
                                                                Category:downloaded
                                                                Size (bytes):231
                                                                Entropy (8bit):6.725074433303473
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:547988BAC5584B4608466D761E16F370
                                                                SHA1:C11BB71049702528402A31027F200184910A7E23
                                                                SHA-256:70E32B2DB3F079BB0295A85A0DB15ED9E5926294DD947938D6CFA595F5AB18B4
                                                                SHA-512:C4A76F6E94982D1CC02C2B67523A334E76BFDE525C1014D32DB9E7ECA0FA39A06F291ECFA94C8C6A49D488EA3ACF9C10DDF3CAD9515562010440863D0F08FBA3
                                                                Malicious:false
                                                                Reputation:unknown
                                                                URL:https://login.dunmhumby.com/page/images/back.png
                                                                Preview:.PNG........IHDR..............w=.....sRGB.........IDATHK...1...Z......... #$#..-.. $$3..H...q.x.>.x..yY.|.@h.......$.B/..*Ec...J.}.....Rl..^.......#-...f.6p.cJigf...G.<.!.z..>a.+j....&U.....E/.._.`.d...~_....7...4`....IEND.B`.
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:ASCII text, with very long lines (9768)
                                                                Category:downloaded
                                                                Size (bytes):498247
                                                                Entropy (8bit):5.5008745250821525
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:F09A27511DC2AD949E863601D921C352
                                                                SHA1:B39E6503D69C079E65F2367D83493438E0A55844
                                                                SHA-256:1160106C536428BE3584369BBB57C7E9B7FAA7D59683135533A42982848ED3C0
                                                                SHA-512:870234592A27EF2368060D4027A25B3D562EE448CDE3DB7BCDDA4F150FD18F1C28D230E72A2C222D84CD47CFEEBD1BA40613CB6288BEA72A2BA519E84E9EA1FF
                                                                Malicious:false
                                                                Reputation:unknown
                                                                URL:https://res-1.cdn.office.net/files/odsp-web-prod_2025-02-07.012/wacowlhostwebpack/wacowlhostwebpack.js
                                                                Preview:/*! For license information please see wacowlhostwebpack.js.LICENSE.txt */.(()=>{var e=document.currentScript;define("odsp-next/roots/WacOwlHost",["odsp.react.lib"],()=>{var t;return(()=>{"use strict";var n=[(e,t,n)=>{n.r(t),n.d(t,{__assign:()=>r,__asyncDelegator:()=>S,__asyncGenerator:()=>y,__asyncValues:()=>D,__await:()=>v,__awaiter:()=>l,__classPrivateFieldGet:()=>w,__classPrivateFieldSet:()=>E,__createBinding:()=>f,__decorate:()=>s,__exportStar:()=>p,__extends:()=>i,__generator:()=>u,__importDefault:()=>O,__importStar:()=>C,__makeTemplateObject:()=>I,__metadata:()=>d,__param:()=>c,__read:()=>_,__rest:()=>o,__spread:()=>h,__spreadArray:()=>g,__spreadArrays:()=>b,__values:()=>m});var a=function(e,t){return a=Object.setPrototypeOf||{__proto__:[]}instanceof Array&&function(e,t){e.__proto__=t}||function(e,t){for(var n in t)Object.prototype.hasOwnProperty.call(t,n)&&(e[n]=t[n])},a(e,t)};function i(e,t){if("function"!=typeof t&&null!==t)throw new TypeError("Class extends value "+String(t)
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:HTML document, ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):1208
                                                                Entropy (8bit):5.4647615085670616
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:D29FA9F2AB3A72F2608E8E82C8C3D1C6
                                                                SHA1:8B21CC06752837B4B6B8FEF8D54F50EB2C7CCA8F
                                                                SHA-256:E1B0A10649C4B92F828523EFC2EBE135EA9488179A2816888D1E84F786202DBF
                                                                SHA-512:824A207E3F5AF4934B7B50FE5E3F8585FAECA571C3C39E510C06DC8FBDF3E64B07811CAAE06239936BDDDDFA4C90E534F03C0DA8147AF9294042DEA6B0FBCB94
                                                                Malicious:false
                                                                Reputation:unknown
                                                                Preview:<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">..<html xmlns="http://www.w3.org/1999/xhtml">..<head>..<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/>..<title>500 - Internal server error.</title>..<style type="text/css">.. ..body{margin:0;font-size:.7em;font-family:Verdana, Arial, Helvetica, sans-serif;background:#EEEEEE;}..fieldset{padding:0 15px 10px 15px;} ..h1{font-size:2.4em;margin:0;color:#FFF;}..h2{font-size:1.7em;margin:0;color:#CC0000;} ..h3{font-size:1.2em;margin:10px 0 0 0;color:#000000;} ..#header{width:96%;margin:0 0 0 0;padding:6px 2% 6px 2%;font-family:"trebuchet MS", Verdana, sans-serif;color:#FFF;..background-color:#555555;}..#content{margin:0 0 0 2%;position:relative;}...content-container{background:#FFF;width:96%;margin-top:8px;padding:10px;position:relative;}..-->..</style>..</head>..<body>..<div id="header"><h1>Server Error</h1></div>..<div id="content">.. <div class="content-
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:ASCII text, with very long lines (6042), with no line terminators
                                                                Category:downloaded
                                                                Size (bytes):6042
                                                                Entropy (8bit):5.018454487556217
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:A55176635E66B80522E25E4CCCA05A90
                                                                SHA1:48AA2527313440869A4CE79E0C0D2329903C4C08
                                                                SHA-256:CBA89239522795D55FCF43087637399562C8FB25CF3BAADF59F488BB97BFFD6D
                                                                SHA-512:F82703D63B252D92B346AE73555F8D7A28AB390B0BF54B91CAE8B3E634EFF9EDAAA583C44E5EF30A52C4EBEB03FD7A1F79308D17027A2F315284D83AF68C9DCD
                                                                Malicious:false
                                                                Reputation:unknown
                                                                URL:https://res-1.cdn.office.net/officeonline/v/s/hCBA89239522795D5_App_Scripts/Compat.js
                                                                Preview:function __loadCompat(n){n.Debug=function(){};n.Debug._fail=function(n){throw new Error(n);};n.Debug.writeln=function(n){window.console&&window.console.debug(n)};n.__getNonTextNode=function(n){try{while(n&&n.nodeType!=1)n=n.parentNode}catch(t){n=null}return n}}function _loadSafariCompat(){Node.prototype.__defineGetter__("text",function(){return this.textContent});Node.prototype.__defineSetter__("text",function(n){this.textContent=n});Node.prototype.selectNodes=function(n){var t=this.ownerDocument;return selectNodes(t,n,this)};Node.prototype.selectSingleNode=function(n){var t=this.ownerDocument;return selectSingleNode(t,n,this)};Document.prototype.selectNodes=function(n){return selectNodes(this,n,this.documentElement)};Document.prototype.selectSingleNode=function(n){return selectSingleNode(this,n,this.documentElement)}}function _loadMozillaCompat(n){n.navigate=function(n){window.setTimeout('window.location = "'+n+'";',0)};var t=function(n,t){t._mozillaEventHandler=function(n){return win
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:HTML document, Unicode text, UTF-8 text, with very long lines (17678), with CRLF, LF line terminators
                                                                Category:downloaded
                                                                Size (bytes):361588
                                                                Entropy (8bit):5.6100245652754275
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:ADCC6DAA192213D3A3B9377E89DA96A0
                                                                SHA1:6ED80298F98C316C6A226170A735CFB996A6B71D
                                                                SHA-256:4104F9C948D94AAD123CBC213CF0A0F0D9A9795F8B27D330947373429F0C4C92
                                                                SHA-512:59FB263AE4C8A3D0C29755F897225BED9FE3E5F3A201FF0924244B3AC2621C634235C652F0C0DD85BC8AE00C33DD90FDAB674B74149C945BA44F160BD39BD942
                                                                Malicious:false
                                                                Reputation:unknown
                                                                URL:https://usc-visio.officeapps.live.com/v/visioframe.aspx?visioview=ConsumptionView&ui=en-US&rs=en-US&wopisrc=https%3A%2F%2Fmfsus-my.sharepoint.com%2Fpersonal%2Fjmaldonado_mfsus_com%2F_vti_bin%2Fwopi.ashx%2Ffiles%2F29db2f3865034536aaa42e120313e476&wdenableroaming=1&mscc=0&wdodb=1&hid=FF0F85A1-30D3-8000-1644-CCDA0AA80FAB.0&uih=sharepointcom&wdlcid=en-US&jsapi=1&jsapiver=v2&corrid=e787110c-effc-6f26-b59d-912facae4bb6&usid=e787110c-effc-6f26-b59d-912facae4bb6&newsession=1&sftc=1&uihit=docaspx&muv=1&cac=1&mtf=1&sfp=1&sdp=1&hch=1&hwfh=1&readonly=1&dchat=1&sc=%7B%22pmo%22%3A%22https%3A%2F%2Fmfsus-my.sharepoint.com%22%2C%22pmshare%22%3Atrue%7D&ctp=LeastProtected&rct=Normal&wdorigin=Sharing.ClientRedirect&pmorigin=https%3A%2F%2Fmfsus-my.sharepoint.com&filesrc=sharepointcom&fastpreview=true
                                                                Preview:<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"><html xmlns="http://www.w3.org/1999/xhtml" lang="en-US"><head><meta http-equiv="X-UA-Compatible" content="IE=10" /><meta HTTP-EQUIV="Content-Type" content="text/html; charset=utf-8" /><meta HTTP-EQUIV="Expires" content="0" /><script type="text/javascript"> var g_firstByte = new Date(); function highResTimeStamp() { if (performance && performance.now) { return performance.now(); } return 0; } var g_firstByteHighhResTime = highResTimeStamp(); var g_pageInitStartTimeHighResTime; var g_jsLTHighhResTime = {}; if (performance && performance.mark) performance.mark("g_firstByte"); var g_cssLT; var g_jsLT; var g_bootScriptsStartTime; var g_bootScriptsEndTime; </script><![if gte IE 8]><style type="text/css"> #load_back{width:100%;height:100%;opacity:1.0;background-color:#fff;position:absolute;z-index:1050;text-align:center;} #load_img{width:100%;height:100%;position:absolute;text-align:center;display
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:Unicode text, UTF-8 text, with very long lines (26125)
                                                                Category:dropped
                                                                Size (bytes):383708
                                                                Entropy (8bit):4.774009647684611
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:4A9FA858FE408CDF68D03A2E167BF221
                                                                SHA1:DEEE8AD0A585B224191C49CFF1A1408E4898868B
                                                                SHA-256:2C9126297ED18F44BD7020DF0792B317AEC7BBA258E551D84A03785D13712FF9
                                                                SHA-512:11EBAE66DD93B0ABF8ABD5593A4A9D8784B7D027C8B8EB0322953A8A08EE56360251C59C8618E221FF0E1B1FC93E0167D799BF7A3F021035F3E4D46EC1D82B34
                                                                Malicious:false
                                                                Reputation:unknown
                                                                Preview:"use strict";var VisioRibbonStrings={About:"About",Accessibility:"Accessibility",AddConnector:"Connector",AddConnector_ToolTip:"Draw connector (Alt+3)",AddConnectorMac_ToolTip:"Draw connector (.+3)",AddInsKeytipPrefix:"Y",AddLayerLabel:"Add Layer",Align:"Align",AlignAndPosition:"Align and Position",AlignBottom:"Align Bottom",AlignCenter:"Align Center",AlignLeft:"Align Left",Alignment:"Alignment",AlignMiddle:"Align Middle",AlignRight:"Align Right",AlignShapes:"Align Shapes",AlignTextBottom:"Align Text Bottom",AlignTextLeft:"Align Text Left",AlignTextMiddle:"Align Text Middle",AlignTextRight:"Align Text Right",AlignTextTitle:"Align Text",AlignTextTop:"Align Text Top",AlignTop:"Align Top",AltText:"Alt-Text",ArrangeShapes:"Arrange Shapes",AssignToLayer:"Assign To Layer",Black:"Black",BlankDrawing:"Blank drawing",Blue:"Blue",BlueGray:"Blue Gray",Bold:"Bold",BringForward:"Bring Forward",BringForward_Callout:"Forward",BringToFront:"Bring to Front",BubbleTheme:"Bubble",Cancel:"Cancel",CatchU
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:ASCII text, with very long lines (6774)
                                                                Category:dropped
                                                                Size (bytes):6824
                                                                Entropy (8bit):5.297713112367227
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:497209A58B535743C997F346EF25CBCE
                                                                SHA1:80116319BB2973950ED6D52EA4C6FCB5902EFD5D
                                                                SHA-256:36C02BA0C2CB6F8F5A461987CAE584A0CF6D1FFD9152A04B080AF3C5BDD58129
                                                                SHA-512:FC090E026EA4851D31B1D1F2B9EE2181A05114B5734A4BA373A88625C64D7EA489A78B1E7F691DBF4E31C4A66D3624B31C4111918A116BE12999DA6CD70D58C6
                                                                Malicious:false
                                                                Reputation:unknown
                                                                Preview:var appResourceLoader;!function(){"use strict";var e,n,t,r,o={89030:function(e,n,t){n.Ts=function(e,n,r){o=e,i=r,t.p=n,u=!0},n.oL=function(e,n){const t=o(e,n);return(0,r.loadScript)(e,t,"anonymous",5)},n.iP=function(e,n){return function t(r){if(!u)throw new Error("appResourceLoader not initialized");if(a.has(r))return a.get(r);const o=Date.now();let c=-1;const s=[];if(e[r]&&e[r].dependencies)for(const n of e[r].dependencies)s.push(t(n));let d;return d=0===s.length?n(r):Promise.all(s).then((()=>(c=Date.now()-o,n(r)))),d=d.then((e=>{if(i){let e=`Chunk ${r} loaded in ${Date.now()-o} ms`;-1!==c&&(e+=` (${c} ms for extra ${s.length} deps)`),i(512235483,306,50,e)}return e})).catch((e=>{throw i&&i(512235482,306,10,e),e})),a.set(r,d),d}};const r=t(44591);let o,i,u=!1;const a=new Map},44591:function(e,n){function t(e,n,r,o,i,u,a){return new Promise(((c,s)=>{const d=document.createElement("script");d.async=!1,d.src=n,void 0!==r&&(d.crossOrigin=r),i&&""!==i&&(d.setAttribute("integrity",`sha256-${
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:ASCII text, with very long lines (30291)
                                                                Category:dropped
                                                                Size (bytes):105787
                                                                Entropy (8bit):5.39019257062293
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:F5C0476A8F1F29E52008D5328694A63A
                                                                SHA1:AD3F5F53B9BDD37DE93D3D5DF6AB33FA16C83A5C
                                                                SHA-256:CD825B2E6DD97378534FCCDBFC3918224D71302599A9C80A3873F1871E243D24
                                                                SHA-512:26891D370279C71E04AFBA144E2811F7A8377144E1F69164EFA6AA4F8ADB6F2176957D3E8599FE51C20EA409083386A3DB8CA02FC85762F5A874E14E8AD6A46E
                                                                Malicious:false
                                                                Reputation:unknown
                                                                Preview:var shellPerformance=window.performance,HighResolutionTimingSupported=!!shellPerformance&&"function"==typeof shellPerformance.mark;HighResolutionTimingSupported&&shellPerformance.mark("shell_otellogging_start"),(self["suiteux_shell_webpackJsonp_suiteux-main"]=self["suiteux_shell_webpackJsonp_suiteux-main"]||[]).push([["otellogging"],{76626:function(n,t,e){var r=e(92855),i=e(41230),o=e(68340),u=e(8101),a=e(15164),c=e(27039),s=e(75184),f=e(62657),l=e(84414),d=function(n){function t(){var e=n.call(this)||this;return e.pluginVersionStringArr=[],(0,i.A)(t,e,(function(n,t){n.logger&&n.logger.queue||(n.logger=new o.wq({loggingLevelConsole:1})),n.initialize=function(e,r,i,s){(0,u.r2)(n,(function(){return"AppInsightsCore.initialize"}),(function(){var u=n.pluginVersionStringArr;if(e){e.endpointUrl||(e.endpointUrl=f.S);var l=e.propertyStorageOverride;!l||l.getProperty&&l.setProperty||(0,a.$8)("Invalid property storage override passed."),e.channels&&(0,a.Iu)(e.channels,(function(n){n&&(0,a.Iu)(n,(
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:PNG image data, 13 x 40, 8-bit/color RGB, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):61
                                                                Entropy (8bit):3.9902101553250042
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:0E6263CD724EE01C5862A7E4A96F7580
                                                                SHA1:6898ABD94244C1F48328C85361F876046724B382
                                                                SHA-256:42403D7F4CC23C1DB24673A9F0D7F4E4708D7DCCA01BFD8336464C088F13593F
                                                                SHA-512:DF0940301D816EE928F2558ADA1FA3B659531E9A96C374B4388EC7758E25DD03D5BD0E0861B6D1C5BCC9F9AFAAA89CFD4DE6A8F1DF11E536867935BC753387EB
                                                                Malicious:false
                                                                Reputation:unknown
                                                                Preview:.PNG........IHDR.......(............IDAT.....$.....IEND.B`.
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):175719
                                                                Entropy (8bit):4.255303968193695
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:9CFEFB2D46D6102DAC2A24C606F47FEA
                                                                SHA1:076B63F4F46CE28648201E2507BBC67FB4F990C5
                                                                SHA-256:43C5939CB732D8AA2D20FCE97F359F46B7C3B937E60ED576B752AE0A2E73314F
                                                                SHA-512:C56812F0A9DCBC53E8AFA542923F20E911DE172C1D87B9868DB42A01F2FC303BBECE6509925E43E8F877DC8A3C7904FAE731C1C19BD35B5FAD18582B7498E24D
                                                                Malicious:false
                                                                Reputation:unknown
                                                                Preview:var __extends = (this && this.__extends) || (function () {.. var extendStatics = function (d, b) {.. extendStatics = Object.setPrototypeOf ||.. ({ __proto__: [] } instanceof Array && function (d, b) { d.__proto__ = b; }) ||.. function (d, b) { for (var p in b) if (b.hasOwnProperty(p)) d[p] = b[p]; };.. return extendStatics(d, b);.. };.. return function (d, b) {.. extendStatics(d, b);.. function __() { this.constructor = d; }.. d.prototype = b === null ? Object.create(b) : (__.prototype = b.prototype, new __());.. };..})();..var OfficeExtension;..(function (OfficeExtension) {.. var WacRuntime;.. (function (WacRuntime) {.. var ApiFlags;.. (function (ApiFlags) {.. ApiFlags[ApiFlags["none"] = 0] = "none";.. ApiFlags[ApiFlags["restrictedResource"] = 4] = "restrictedResource";.. ApiFlags[ApiFlags["makerSafe"] = 128] = "makerSafe";.. ApiFlags[ApiFlags["excludedF
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:Unicode text, UTF-8 text, with very long lines (65535), with no line terminators
                                                                Category:downloaded
                                                                Size (bytes):76571
                                                                Entropy (8bit):5.364259301211758
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:4DE42314D6EDDA70DF9779762ACC12B8
                                                                SHA1:2AF63137ABC68C0910107F8598B7DE48FD5BBD9C
                                                                SHA-256:7E86DF2AC06E3524CB7BC6F0B8EB07565BA6D103EAF3CF1A30AC4C78F11A4EAA
                                                                SHA-512:4465A7B79288AC5B75B4B21DDE3EA774F94AC209DDADFF99DA7741ED841C739C1F82DAEB550DC707A986FFFED8B9B84F45CA7705F40244A993D0CE34BD65B02B
                                                                Malicious:false
                                                                Reputation:unknown
                                                                URL:https://res-1.cdn.office.net/officeonline/v/s/161861540602_App_Scripts/Feedback/latest/officebrowserfeedback_ecs_client.js
                                                                Preview:!function(e,t){"object"==typeof exports&&"object"==typeof module?module.exports=t():"function"==typeof define&&define.amd?define([],t):"object"==typeof exports?exports.FloodgateDynamicCampaign=t():e.FloodgateDynamicCampaign=t()}(self,(function(){return function(){var e={7222:function(e,t,n){"use strict";var r=this&&this.__createBinding||(Object.create?function(e,t,n,r){void 0===r&&(r=n),Object.defineProperty(e,r,{enumerable:!0,get:function(){return t[n]}})}:function(e,t,n,r){void 0===r&&(r=n),e[r]=t[n]}),i=this&&this.__exportStar||function(e,t){for(var n in e)"default"===n||Object.prototype.hasOwnProperty.call(t,n)||r(t,e,n)};Object.defineProperty(t,"__esModule",{value:!0}),t.IFloodgateHostPlatform=t.GovernedChannelType=t.ICampaignDefinitions=t.Api=void 0,i(n(7560),t),t.Api=n(7560),i(n(2783),t),i(n(8262),t),i(n(234),t);var o=n(9556);Object.defineProperty(t,"ICampaignDefinitions",{enumerable:!0,get:function(){return o.ICampaignDefinitions}});var s=n(8445);Object.defineProperty(t,"Govern
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:ASCII text, with very long lines (2224), with no line terminators
                                                                Category:dropped
                                                                Size (bytes):2224
                                                                Entropy (8bit):5.029670917384203
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:96EC242EA2E25558F7EC13FA88D9D793
                                                                SHA1:B0BB7F6BD5206CC1FFB572CBD4A6AD2F88D42433
                                                                SHA-256:850C54CE960E710757379C19601C65C00CF7D485063115F34AA30AE193CCEA43
                                                                SHA-512:8C732012F96C7A9B4434F1BC27262A07080F05FCDF54E64B9CB4F37C20D3D8A85FAC2387C934798056D137B03F918D5CE4847C835CC013EDD4485686993D5F4F
                                                                Malicious:false
                                                                Reputation:unknown
                                                                Preview:OfficeBrowserFeedback.setUiStrings({FeedbackSubtitle:"Send Feedback to Microsoft",PrivacyStatement:"Privacy Statement",Form:{CommentPlaceholder:"Please do not include any confidential or personal information in your comment",CategoryPlaceholder:"Select a category (optional)",EmailPlaceholder:"Email (optional)",RatingLabel:"Rating",ScreenshotLabel:"Include screenshot",Submit:"Submit",Cancel:"Cancel",EmailCheckBoxLabel:"You can contact me about this feedback",PrivacyConsent:"IT admins for your organization will be able to view and manage your feedback data.",PrivacyLabel:"By pressing submit, your feedback will be used to improve Microsoft products and services. ",ScreenshotImgAltText:"Screenshot Preview"},SingleForm:{Title:"Please provide feedback"},SmileForm:{Anchor:"I like something",Title:"What did you like?"},FrownForm:{Anchor:"I don't like something",Title:"What did you not like?"},IdeaForm:{Anchor:"I have a suggestion",Title:"What do you suggest?"},BugForm:{Anchor:"File a bug",Titl
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:ASCII text, with very long lines (8431), with no line terminators
                                                                Category:downloaded
                                                                Size (bytes):8431
                                                                Entropy (8bit):5.742928300726937
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:DAFCBE4801E2AFAD2CF1E0D7DB2108D0
                                                                SHA1:A50CC490C50D36BDCAAC85A48EC4730BD66E7E19
                                                                SHA-256:6B4310CA3095D6B6882B85609511C94E09239CCB7E568EB7106FDB5FED286335
                                                                SHA-512:C2B14FF8E07E7C0682C9973B48F721B167E29D65A07DFCD013B0F0EA15B29AE057295FD72DD702513D4153FB86EF833803E2AC4FDB5054F12587410654F5D64E
                                                                Malicious:false
                                                                Reputation:unknown
                                                                URL:https://login.dunmhumby.com/cdn-cgi/challenge-platform/h/b/scripts/jsd/b0e4a89976ce/main.js?
                                                                Preview:window._cf_chl_opt={cFPWv:'b'};~function(W,h,i,j,k,l,s,v){W=b,function(c,e,V,f,g){for(V=b,f=c();!![];)try{if(g=-parseInt(V(530))/1*(-parseInt(V(503))/2)+-parseInt(V(592))/3*(parseInt(V(518))/4)+parseInt(V(489))/5+-parseInt(V(550))/6+-parseInt(V(484))/7+-parseInt(V(497))/8+-parseInt(V(491))/9*(-parseInt(V(508))/10),g===e)break;else f.push(f.shift())}catch(E){f.push(f.shift())}}(a,474621),h=this||self,i=h[W(594)],j=function(X,e,f,g){return X=W,e=String[X(589)],f={'h':function(E){return null==E?'':f.g(E,6,function(F,Y){return Y=b,Y(515)[Y(567)](F)})},'g':function(E,F,G,Z,H,I,J,K,L,M,N,O,P,Q,R,S,T,U){if(Z=X,null==E)return'';for(I={},J={},K='',L=2,M=3,N=2,O=[],P=0,Q=0,R=0;R<E[Z(547)];R+=1)if(S=E[Z(567)](R),Object[Z(507)][Z(509)][Z(496)](I,S)||(I[S]=M++,J[S]=!0),T=K+S,Object[Z(507)][Z(509)][Z(496)](I,T))K=T;else{if(Object[Z(507)][Z(509)][Z(496)](J,K)){if(256>K[Z(538)](0)){for(H=0;H<N;P<<=1,F-1==Q?(Q=0,O[Z(511)](G(P)),P=0):Q++,H++);for(U=K[Z(538)](0),H=0;8>H;P=1.26&U|P<<1.2,F-1==Q?(Q=0,O[Z(51
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:ASCII text, with very long lines (65536), with no line terminators
                                                                Category:downloaded
                                                                Size (bytes):215657
                                                                Entropy (8bit):5.515228060418657
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:53B56124C5053AED676FD7599DE0FEDF
                                                                SHA1:C9B9B3EACA1B9DABED6D087F815C922037112A55
                                                                SHA-256:C8D1F0FB6C5C1D191A7B8951869A8F381B9E12BEAABEC83E6A579DEEEDCED9D2
                                                                SHA-512:E82F02246259A381E683D77B80EEF495F6920F1CDD0F78F615F5D5CF532B4FEDE7FE9906571CEA5566206717BE2C5952DA4519B3BDB974E04D5D8135864AC12A
                                                                Malicious:false
                                                                Reputation:unknown
                                                                URL:https://wise.public.cdn.office.net/wise/owl/owl.3f3cb2f327aa56119523.js
                                                                Preview:var Microsoft;!function(){"use strict";var t,e,n,o,r={3045:function(t,e,n){n.d(e,{h:function(){return s}});var o=n(72379),r=n(14521),i=n(39292),s=function(t){function e(){var e=null!==t&&t.apply(this,arguments)||this;return e.value=null,e.hasNext=!1,e.hasCompleted=!1,e}return o.C6(e,t),e.prototype.N=function(e){return this.hasError?(e.error(this.thrownError),i.y.EMPTY):this.hasCompleted&&this.hasNext?(e.next(this.value),e.complete(),i.y.EMPTY):t.prototype.N.call(this,e)},e.prototype.next=function(t){this.hasCompleted||(this.value=t,this.hasNext=!0)},e.prototype.error=function(e){this.hasCompleted||t.prototype.error.call(this,e)},e.prototype.complete=function(){this.hasCompleted=!0,this.hasNext&&t.prototype.next.call(this,this.value),t.prototype.complete.call(this)},e}(r.B7)},44739:function(t,e,n){n.d(e,{t:function(){return s}});var o=n(72379),r=n(14521),i=n(46624),s=function(t){function e(e){var n=t.call(this)||this;return n.tt=e,n}return o.C6(e,t),Object.defineProperty(e.prototype,"va
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:ASCII text, with very long lines (65536), with no line terminators
                                                                Category:downloaded
                                                                Size (bytes):851126
                                                                Entropy (8bit):5.4040276718111135
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:694CE0CB8AF3A0C3B3E11EC7662EAB08
                                                                SHA1:2EA167406A566CBE1C562751D208E28AFB7CC427
                                                                SHA-256:42846E90FF8F6C61117AB96EBDD817B338369E0455F96304B4B6F3256CA72B82
                                                                SHA-512:30F3789A6B770C67BC06F29BDAC74D8F7C6672D63E40AEA4E9E67A4900CF75E59AE43430E238C467307CFA338902F0F61F3FB03EAC5FB2F5620CA05ED0D3BAE0
                                                                Malicious:false
                                                                Reputation:unknown
                                                                URL:https://res-1.cdn.office.net/officeonline/v/s/h42846E90FF8F6C61_App_Scripts/wp5/common.min.js
                                                                Preview:(globalThis.visioOnlineChunks=globalThis.visioOnlineChunks||[]).push([[76],{48477:function(e,t,n){t._default=n(54966).default},54966:function(e,t,n){"use strict";e.exports=n(53023)},53023:function(e,t){"use strict";t.default=function(e){for(var t,n=0,r=0,o=e.length;o>=4;++r,o-=4)t=1540483477*(65535&(t=255&e.charCodeAt(r)|(255&e.charCodeAt(++r))<<8|(255&e.charCodeAt(++r))<<16|(255&e.charCodeAt(++r))<<24))+(59797*(t>>>16)<<16),n=1540483477*(65535&(t^=t>>>24))+(59797*(t>>>16)<<16)^1540483477*(65535&n)+(59797*(n>>>16)<<16);switch(o){case 3:n^=(255&e.charCodeAt(r+2))<<16;case 2:n^=(255&e.charCodeAt(r+1))<<8;case 1:n=1540483477*(65535&(n^=255&e.charCodeAt(r)))+(59797*(n>>>16)<<16)}return(((n=1540483477*(65535&(n^=n>>>13))+(59797*(n>>>16)<<16))^n>>>15)>>>0).toString(36)}},6671:function(e,t,n){"use strict";n.d(t,{s:function(){return o}});var r=n(56182);function o(e,t,n){void 0===n&&(n=!0);var o=!1;if(e&&t)if(n)if(e===t)o=!0;else for(o=!1;t;){var i=(0,r.P)(t);if(i===e){o=!0;break}t=i}else e.con
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:Unicode text, UTF-8 text, with very long lines (63700), with no line terminators
                                                                Category:downloaded
                                                                Size (bytes):1053137
                                                                Entropy (8bit):5.45681490215492
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:CAB9CCC0DBAE95BDBA37E76DFB7B1A85
                                                                SHA1:8585DCFF2018FD6C8EEC351CD5F1EEC312EB8CF3
                                                                SHA-256:F23B665D4426AF0C358B2AF7097E123C11A9EB43C8C701161E3C4377693C308F
                                                                SHA-512:255BCA3E918AAB10BEBA8869F15F0BD554B4A92AE9F99438140238CD6919BFB521AAD02D07026EAF6C0787EC9099080FBF2E04382DDF75F8987F03FAE9705175
                                                                Malicious:false
                                                                Reputation:unknown
                                                                URL:https://res-1.cdn.office.net/officeonline/v/s/hF23B665D4426AF0C_App_Scripts/wp5/common50.min.js
                                                                Preview:(globalThis.visioOnlineChunks=globalThis.visioOnlineChunks||[]).push([[243],{8998:function(e,t){"use strict";Object.defineProperty(t,"__esModule",{value:!0}),t.readPropertyInfo=void 0,t.readPropertyInfo=function(e){return Array.isArray(e)&&2===e.length&&"opt-field"===e[0]?[!0,e[1]]:[!1,e]}},95417:function(e,t,o){"use strict";function n(e,t){for(var o=0;o<t.length;o++){var n=t[o];n.enumerable=n.enumerable||!1,n.configurable=!0,"value"in n&&(n.writable=!0),Object.defineProperty(e,n.key,n)}}Object.defineProperty(t,"__esModule",{value:!0}),t.CustomTypeRegistry=void 0;const r=o(94977);let i=function(){return e=function e(){!function(e,t){if(!(e instanceof t))throw new TypeError("Cannot call a class as a function")}(this,e),this.typeInfos={},this.typeInfosCache=[],this.externalTypes={}},(t=[{key:"constuctor",value:function(e=!1){this.throwOnError=e}},{key:"registerTypeInfos",value:function(e){if(-1===this.typeInfosCache.indexOf(e)){this.typeInfosCache.push(e);for(const t of Object.keys(e)){c
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:ASCII text, with very long lines (65536), with no line terminators
                                                                Category:downloaded
                                                                Size (bytes):184425
                                                                Entropy (8bit):5.522230990232701
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:F92B3BB04D3FDC1BACE965CD41AEB71C
                                                                SHA1:50CCA2B493C35D91CA3437FA9ECB4A45DAC4B11A
                                                                SHA-256:B32B6735EFB06A520D99444A1348CA092771C5C528B58CE597409DB845D504D1
                                                                SHA-512:02AE7555A3AF32DA37D07E446FAB8C086E9CECD3D0EBB0F24F84E584CE8EA0FF8C4F54AB21BF51ED7D1AFD9817A80F0EEE3831820CAFE2102A3A57C71288CEA7
                                                                Malicious:false
                                                                Reputation:unknown
                                                                URL:https://res-1.cdn.office.net/wise/owl/owl.slim.87c7fa355cf3dfacb0cd.js
                                                                Preview:var Microsoft;!function(){"use strict";var t,e,n,o,i={3045:function(t,e,n){n.d(e,{h:function(){return s}});var o=n(72379),i=n(14521),r=n(39292),s=function(t){function e(){var e=null!==t&&t.apply(this,arguments)||this;return e.value=null,e.hasNext=!1,e.hasCompleted=!1,e}return o.C6(e,t),e.prototype.U=function(e){return this.hasError?(e.error(this.thrownError),r.y.EMPTY):this.hasCompleted&&this.hasNext?(e.next(this.value),e.complete(),r.y.EMPTY):t.prototype.U.call(this,e)},e.prototype.next=function(t){this.hasCompleted||(this.value=t,this.hasNext=!0)},e.prototype.error=function(e){this.hasCompleted||t.prototype.error.call(this,e)},e.prototype.complete=function(){this.hasCompleted=!0,this.hasNext&&t.prototype.next.call(this,this.value),t.prototype.complete.call(this)},e}(i.B7)},44739:function(t,e,n){n.d(e,{t:function(){return s}});var o=n(72379),i=n(14521),r=n(46624),s=function(t){function e(e){var n=t.call(this)||this;return n.N=e,n}return o.C6(e,t),Object.defineProperty(e.prototype,"val
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:JSON data
                                                                Category:downloaded
                                                                Size (bytes):1217
                                                                Entropy (8bit):5.8731145802346845
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:11B7EFF3176EF4993319DECC2143020F
                                                                SHA1:2868FF0B38791DE3A481B9377B4890ECC64910AE
                                                                SHA-256:209A88B6848314D8C8B6CDCC92F7AB3834B52F7FC0DC5932E9FC0A13D505D00E
                                                                SHA-512:2D732CAADBB9A9BEBD5C687CB5C7F6A9A5FC960B2B468182AC76F71F11133FE9DF513A1F10945012B73D17135A4C66253005C0632E5CBCAF272F9459227B0D70
                                                                Malicious:false
                                                                Reputation:unknown
                                                                URL:https://wise-m.public.cdn.office.net/wise-m/owl/5mttl/production/100/manifest.json
                                                                Preview:{"clientVersion":"20250221.1","files":{"owl.js":["owl.3f3cb2f327aa56119523.js","sha384-NS/nyg3zUEAgVdVhncPduDrHJx3NN2FMha/kuxqOUahRvgj77eTNQMgr37PualZ3"],"owl.slim.js":["owl.slim.87c7fa355cf3dfacb0cd.js","sha384-GFNjW+q9E3fv5CMnXwwarQhLtudp9RcQLZk17kt2VcwAQnpsFhhQilLzXgJkuPeA"],"owlnest.js":["owlnest.f25acd19d342cf456f8f.js","sha384-3OzfX/jp+ussKus4wiFPtCRplRgl+uU1azSoaZH4QkC3QPTDJp2X4L7C/Fsh+N2i"],"sharedauthclientmsal.js":["sharedauthclientmsal.381856b8ce0760acfbea.js","sha384-gm2jgPUSNvKAtK9103Vylbw8DfdDyYDpxT0+jySX/XTyuUr0jt3oGXO6R0t4zMdW"],"word.boot.js":["word.boot.bba58a005b7093edb5b5.js","sha384-OLq3S8ctW6CNvQKP7PiajsHxzIYrz9VujlF+hW8+/LdLEscN9PBhTPwUR4IxrjOZ"],"onenote-boot.js":["onenote-boot.7cf3b91bf26b957ab55b.js","sha384-pGv1IbG8PsIXoO0GizdZsP0tqk8KnKK4CtFlMc+ouaPFfSmzIaBYm47AVKSNTXd3"],"visio.boot.js":["visio.boot.c1a87cfa9ed69142a38a.js","sha384-keze9MaPN8rOuXkM9d+bHJ+r0wxto8soY44V2tWfuLHhGjYZzwMkpgOS6xoXRTtJ"],"excel-boot.js":["excel-boot.0e76d6db95ef75b97d41.js","sha38
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:GIF image data, version 89a, 300 x 5
                                                                Category:dropped
                                                                Size (bytes):19682
                                                                Entropy (8bit):7.76037140300199
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:31A2C91A8B6C9B2F6998D01F88380E4B
                                                                SHA1:5826D59FB15FE4F377F90A75DE7BA3783A1D49A2
                                                                SHA-256:4DC18BFCCCD5CBCD52B3AD7CB9014ED8A73F8E887E0E9237B6CDA583D9637F11
                                                                SHA-512:AD883423C8FE37A8B49B38E0BE6EF33571C4D3DA3C0EDCD672D7B8E5F5EF10E16F783B21A10AEF8716E257A6B3A48C3298D2D7B787A89FE971F805C2333A25B2
                                                                Malicious:false
                                                                Reputation:unknown
                                                                Preview:GIF89a,.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................!..NETSCAPE2.0.....!.......,....,.......!H. &...).pb....Fd..R$..]...B....P.0.BhH..oN<9.b..*<|.YA....:r..1...`:h........$H eB..3..0 ........0.C..(..(P...h.]...p.l.....m......5_=. @...2H.41.@.$.I&HI.G.........C.D
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:Web Open Font Format, TrueType, length 6784, version 3.30147
                                                                Category:downloaded
                                                                Size (bytes):6784
                                                                Entropy (8bit):7.904750792584749
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:14EC2D31F37BB0F43FD441D11E771D50
                                                                SHA1:48F83A9581A5E37AD1CCD0D4848EFC7FA64C17CF
                                                                SHA-256:43C551EA819A83B1100F566ECF6BD70DB5A019F165D221200AF2DF11C4448627
                                                                SHA-512:51CABEBB52DC3036CC584B0D03F0107AC7170DCC124A756B6CBFF098893506D8DAB4877FEFD71E3C83016262FACC9735F2BD1BF5D0EC4B6097E3013D287F4BA0
                                                                Malicious:false
                                                                Reputation:unknown
                                                                URL:https://res.cdn.office.net/files/fabric-cdn-prod_20241209.001/assets/icons/fabric-icons-a13498cf.woff
                                                                Preview:wOFF..............-<..u.....................OS/2...D...H...`1Fy.cmap.......#.....<.dcvt ....... ...*....fpgm...........Y...gasp................glyf...........,=_..head.......2...6....hhea...........$....hmtx.......N...x....loca...P...v...v.^..maxp........... .`..name...............Rpost........... .Q..prep............x...x.c`a..8.....u..1...4.f...$..........@ ...........>....!$.X.........F..x.c```f.`..F ..x..c..Y.7......V.....y..=....\..s..2....>..n.....s..9..w>_...../.^Lx1...3^l.q...O^.y......._Y..z...7_..|......................6..).h...6.x......&IF....%.$>K...$.Q..{...w$nH<..,qTb.D.D.D.D.D..M...v.6.V.t..q;q[q3qM..b...D.\.n.......<.xX0]`..&.....~..BB.>...~v.V.....x.c.b.e(`h`X.......x............x.]..N.@..s$..'@:!.u*C....K$.%%...J.......n..b.........|.s...|v..G*)V.7........!O.6eaL.yV.e.j..kN..M.h....Lm....-b....p.N.m.v.....U<..#...O.}.K..,V..&...^...L.c.x.....?ug..l9e..Ns.D....D...K........m..A.M....a.....g.P..`....d.............x..Y.tT.....g....2L..$/..I.
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:HTML document, ASCII text, with very long lines (1238)
                                                                Category:downloaded
                                                                Size (bytes):1239
                                                                Entropy (8bit):5.068464054671174
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:9E8F56E8E1806253BA01A95CFC3D392C
                                                                SHA1:A8AF90D7482E1E99D03DE6BF88FED2315C5DD728
                                                                SHA-256:2595496FE48DF6FCF9B1BC57C29A744C121EB4DD11566466BC13D2E52E6BBCC8
                                                                SHA-512:63F0F6F94FBABADC3F774CCAA6A401696E8A7651A074BC077D214F91DA080B36714FD799EB40FED64154972008E34FC733D6EE314AC675727B37B58FFBEBEBEE
                                                                Malicious:false
                                                                Reputation:unknown
                                                                URL:https://login.dunmhumby.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js
                                                                Preview:!function(){"use strict";function e(e){try{if("undefined"==typeof console)return;"error"in console?console.error(e):console.log(e)}catch(e){}}function t(e){return d.innerHTML='<a href="'+e.replace(/"/g,"&quot;")+'"></a>',d.childNodes[0].getAttribute("href")||""}function r(e,t){var r=e.substr(t,2);return parseInt(r,16)}function n(n,c){for(var o="",a=r(n,c),i=c+2;i<n.length;i+=2){var l=r(n,i)^a;o+=String.fromCharCode(l)}try{o=decodeURIComponent(escape(o))}catch(u){e(u)}return t(o)}function c(t){for(var r=t.querySelectorAll("a"),c=0;c<r.length;c++)try{var o=r[c],a=o.href.indexOf(l);a>-1&&(o.href="mailto:"+n(o.href,a+l.length))}catch(i){e(i)}}function o(t){for(var r=t.querySelectorAll(u),c=0;c<r.length;c++)try{var o=r[c],a=o.parentNode,i=o.getAttribute(f);if(i){var l=n(i,0),d=document.createTextNode(l);a.replaceChild(d,o)}}catch(h){e(h)}}function a(t){for(var r=t.querySelectorAll("template"),n=0;n<r.length;n++)try{i(r[n].content)}catch(c){e(c)}}function i(t){try{c(t),o(t),a(t)}catch(r){e(r
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:ASCII text, with very long lines (48238)
                                                                Category:downloaded
                                                                Size (bytes):48239
                                                                Entropy (8bit):5.343293551896254
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:781E3D70AD7285932B560AF603AE0CF5
                                                                SHA1:05DCF1FBCD9BE56DC5FC3C2816EF3C0283C59C1B
                                                                SHA-256:F3C3760A932B9639CC554025300C8917E00F4F62E261086F5606C9E3A30D4836
                                                                SHA-512:05411E974DCEFB50C9D20E932C91EFB50093FE815362893C511DCAC94A87B75436FA68301D8682CEBE49F6792BE61E7F39D5D1F0725A43A5D92F9AC17BD9F82C
                                                                Malicious:false
                                                                Reputation:unknown
                                                                URL:https://challenges.cloudflare.com/turnstile/v0/b/b0e4a89976ce/api.js
                                                                Preview:"use strict";(function(){function Ht(e,t,a,o,c,l,v){try{var h=e[l](v),s=h.value}catch(p){a(p);return}h.done?t(s):Promise.resolve(s).then(o,c)}function qt(e){return function(){var t=this,a=arguments;return new Promise(function(o,c){var l=e.apply(t,a);function v(s){Ht(l,o,c,v,h,"next",s)}function h(s){Ht(l,o,c,v,h,"throw",s)}v(void 0)})}}function V(e,t){return t!=null&&typeof Symbol!="undefined"&&t[Symbol.hasInstance]?!!t[Symbol.hasInstance](e):V(e,t)}function De(e,t,a){return t in e?Object.defineProperty(e,t,{value:a,enumerable:!0,configurable:!0,writable:!0}):e[t]=a,e}function Ve(e){for(var t=1;t<arguments.length;t++){var a=arguments[t]!=null?arguments[t]:{},o=Object.keys(a);typeof Object.getOwnPropertySymbols=="function"&&(o=o.concat(Object.getOwnPropertySymbols(a).filter(function(c){return Object.getOwnPropertyDescriptor(a,c).enumerable}))),o.forEach(function(c){De(e,c,a[c])})}return e}function Ir(e,t){var a=Object.keys(e);if(Object.getOwnPropertySymbols){var o=Object.getOwnPropertyS
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:Unicode text, UTF-8 text, with very long lines (65530), with no line terminators
                                                                Category:downloaded
                                                                Size (bytes):594025
                                                                Entropy (8bit):5.518544514691396
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:3004FD22A69461DBE6E4A4EF009D19EC
                                                                SHA1:19A1B8B085B9CE015DDC5B566E5058EF8F449DB0
                                                                SHA-256:5441F828CCF25A95ABD0D5CEE79807BAD339D1918CBFA7DEBC6547F99D621F64
                                                                SHA-512:C703182A415E27D3C392A615EAF36B7F4687A3B29FE4A17B300EAA1B952102686DDD7E1E4236D68B3A4FBB74B85DC5B17F4DFB0CB65835456211F47CD770D16A
                                                                Malicious:false
                                                                Reputation:unknown
                                                                URL:https://res-1.cdn.office.net/officeonline/v/s/h5441F828CCF25A95_App_Scripts/wp5/appChromeLazy.min.js
                                                                Preview:(globalThis.visioOnlineChunks=globalThis.visioOnlineChunks||[]).push([[868],{2918:function(){var e=window.performance,t=!!e&&"function"==typeof e.mark;t&&e.mark("shell_bootstrapper_start"),function(){var e,t,n,o,r={8763:function(e){e.exports="data:font/woff;charset=utf-8;base64,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
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:ASCII text, with very long lines (65536), with no line terminators
                                                                Category:downloaded
                                                                Size (bytes):317569
                                                                Entropy (8bit):5.248922236704358
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:BB4A4F9A3C211108B5BBC5E74185EDED
                                                                SHA1:41FD5B092AF9C223D6877576AE7488FAACE5158F
                                                                SHA-256:2D80956921F0A6E53A80E3F63ACF22DBF524B4266FACBBCE15F679E78F8FCBC6
                                                                SHA-512:4D3A3153FC3F56F14C36161910CA7845DB0240D74EC3351E09918360F97A07DD1ACA1EA3097AB92D6B823AF217281AFC631CD26038A177D9995BC3E3AD831A08
                                                                Malicious:false
                                                                Reputation:unknown
                                                                URL:https://res-1.cdn.office.net/officeonline/v/s/h2D80956921F0A6E5_resources/1033/VisioWeb.css
                                                                Preview:img{border:none;}.ci{display:inline-block;}.swBar{display:none;position:fixed !important;z-index:999;background-color:#fff;padding:20px 10px 10px 20px;top:30px;left:auto;right:auto;border:1px solid #b6b6b6;margin:10px;box-sizing:content-box;box-shadow:0px 1px 15px rgba(0,0,0,0.4);opacity:0;transition-property:opacity,top;transition-duration:0.5s;transition-timing-function:cubic-bezier(0,0,0,1);transition-delay:0s;width:600px;-moz-user-select:-moz-none;-khtml-user-select:none;-webkit-user-select:none;-ms-user-select:none;user-select:none;}.swBar:focus{outline:none;}.swBar.closeAnimation{transition-duration:0.2s;transition-timing-function:cubic-bezier(0.33,0,0.67,1);}.swBar.HeaderRtl.O365Switcher{padding-left:10px;padding-right:20px;}@media (min-width:660px){.swBar,.swBar.O365Switcher{width:600px;}}@media (min-width:900px){.swBar.O365Switcher{width:840px;}}@media (max-width:899px) and (min-width:780px){.swBar.O365Switcher{width:720px;}}@media (max-width:659px){.swBar,.swBar.O365Switcher{
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:ASCII text, with very long lines (11651), with no line terminators
                                                                Category:dropped
                                                                Size (bytes):11651
                                                                Entropy (8bit):5.434863883676432
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:8661A2259BFA19E02FC555ADBD26738A
                                                                SHA1:8B2F81F621F96EAC5C092366BA4F94D7C06C3AD6
                                                                SHA-256:C0476D989614E2920F317CFA5AF0D532BEA50B089058A9506446AC66F602593A
                                                                SHA-512:C0663EAA6ECC839FD623B38328BE47626A3088F414A71255093C921A56E889BA4C8687CC71CFCA51B6542A829CDB828BCC59BE3EB951F3D2E18D0902369DB322
                                                                Malicious:false
                                                                Reputation:unknown
                                                                Preview:var shellPerformance=window.performance,HighResolutionTimingSupported=!!shellPerformance&&"function"==typeof shellPerformance.mark;HighResolutionTimingSupported&&shellPerformance.mark("shell_consappdata_start"),(self["suiteux_shell_webpackJsonp_suiteux-bootstrapper"]=self["suiteux_shell_webpackJsonp_suiteux-bootstrapper"]||[]).push([["consappdata"],{9227:function(e,o,t){t.r(o),t.d(o,{loadConsumerAppData:function(){return _}});var l=t(6968);const n="auth=1";function s(e,o,t,l,s,r){const i=encodeURIComponent(o),a=s?encodeURIComponent(s):"",h=s?"login_hint="+a:void 0,m="https://www.microsoft365.com",u="https://outlook.com";let p=h?u+"?"+h:u;const f="https://outlook.live.com/calendar/";let d=h?f+"?"+h:f;const S="https://onedrive.live.com";let g=h?S+"?"+h:S;const w=m+"/launch/word?"+["username="+i,n].join("&");let C=h?w+"&"+h:w;const _=m+"/launch/excel?"+["username="+i,n].join("&");let O=h?_+"&"+h:_;const P=m+"/launch/powerpoint?"+["username="+i,n].join("&");let E=h?P+"&"+h:P;let y="https:/
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:PNG image data, 51 x 42, 8-bit/color RGBA, non-interlaced
                                                                Category:downloaded
                                                                Size (bytes):1229
                                                                Entropy (8bit):7.795282114082737
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:E198D3D3F75FF270E4DE1C36E0BF4A8A
                                                                SHA1:C9B68D5472B2B32B46CB0922CEC0FEA76ABB1DC3
                                                                SHA-256:029B50BBBC9BCE1593AE21671033736AE44111EE275E346B6316AE508DD61685
                                                                SHA-512:24A9385BB7AA23B8656843591B34200EDFBB13AE77062780892897C77005F299D31CD29325D62D48F2230DF016C98643D8BD0CB02CBEEDA08E7AF78A4EFC67F6
                                                                Malicious:false
                                                                Reputation:unknown
                                                                URL:https://login.dunmhumby.com/page/images/verify_sms.png
                                                                Preview:.PNG........IHDR...3...*......xcy....sRGB.........IDAThC..K+W....Q...P.....b....N2...nZZJW]va.....A]vU..A7....h...B)..n..F..5.d......G:30d&.s...{....vp.%".....~h...^...Oqm..8.6.E...$I..........&.^/U.U..0.....?uX...zy.R1.......\...5.Q.......a........_w..4M.G..&...............k...R.F.e...YF.J.$I.@..`.8.~.".........,...k.0B.r9844D.L..3;;k..E.p{{...*....r.?,.J.......6GFF.?...:.FQ...~.....tpp.QU....R.f...a..L........A6........(J...<CR.u...l&.`gg..0.1..b..>.....#.r^..g..a....SW..| I.+`.c..Q.0..y..3..........[`. ..j0^./........MD...(.r.A...v.u....cgD4...".=q....=n..Xa.....D6sj..........a..m3..q..Isss...)...X..6.cW..e.CEz..R...:......EQ.3..D.QK7...i.#`.c...I$.&....S`..$G..Y.....R..-A....f..h.C.}..1f...q3......Q...c.q..D.......RL.>..p.8.........Y.] (...J!R/.3C0......[6......b.....0....oR:S...../.0:......P.v.Dh.~...H&..J.....y.............I.R....|vvvf.t.. ...q...P(....!QI..b..i{.[\\.,..I...x$..9.N.......A...f...E..i|.z..W...t..F ..A,...
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:JSON data
                                                                Category:dropped
                                                                Size (bytes):399
                                                                Entropy (8bit):5.448640765585244
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:7198083A7D9E4A8EF416F4B01A9397CB
                                                                SHA1:6BB3D327CA52212E159EA018A0696D5B1F5BC9D1
                                                                SHA-256:12DFA94D5855A8F3A588E51B6521D37C6D2F9CD2C7C76B4BA7360D1D7A67872C
                                                                SHA-512:885E8446527A45FDA0DF42E1ED6648D566C98AFFC68D99D50162AC3A705F58783843733C151C3B97C011284419C5439545364EE247B508C32914358103A140AF
                                                                Malicious:false
                                                                Reputation:unknown
                                                                Preview:{"OneShell":{"M365CopilotRebrandingEnabled":true,"UpdatedConsumerAppList":true,"M365StartEnabled":true,"DisableM365StartIntentsModule":false,"default":true},"Headers":{"ETag":"\"9btqTzDiElwLNfZkRp7wFewLNoXKAK6cxU5RSHQIYfE=\"","Expires":"Tue, 25 Feb 2025 21:36:53 GMT","CountryCode":"US","StatusCode":"200"},"ConfigIDs":{"OneShell":"P-R-1535312-4-8,P-R-1157040-4-8,P-R-1131228-4-17,P-D-1117449-1-4"}}
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:ASCII text, with very long lines (64817)
                                                                Category:dropped
                                                                Size (bytes):739976
                                                                Entropy (8bit):5.273908881483383
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:22F157D8EA65578D02ADC8219636B121
                                                                SHA1:DBB77C6BA4B92D21F157779B0EAA51DBD9F0672E
                                                                SHA-256:EEC81DE74993D271C5C1A0B1F94086EDD4EB0B88D16C036AA553418E0A6AFFC9
                                                                SHA-512:68E3F523E6D19035A976873F46528FA826EC8D6EE20F887BFC5F0F85F97D64AD4C17D7E3FC7339F80AD4FA2155D53D5828080FD1E665EC39DFB32E8B84EF065D
                                                                Malicious:false
                                                                Reputation:unknown
                                                                Preview:/* Office runtime JavaScript library */../*..Copyright (c) Microsoft Corporation. All rights reserved..*/.../*. Your use of this file is governed by the Microsoft Services Agreement http://go.microsoft.com/fwlink/?LinkId=266419... This file also contains the following Promise implementation (with a few small modifications):. * @overview es6-promise - a tiny implementation of Promises/A+.. * @copyright Copyright (c) 2014 Yehuda Katz, Tom Dale, Stefan Penner and contributors (Conversion to ES6 API by Jake Archibald). * @license Licensed under MIT license. * See https://raw.githubusercontent.com/jakearchibald/es6-promise/master/LICENSE. * @version 2.3.0.*/.var __extends=this&&this.__extends||function(){var e=function(t,n){return e=Object.setPrototypeOf||{__proto__:[]}instanceof Array&&function(e,t){e.__proto__=t}||function(e,t){for(var n in t)Object.prototype.hasOwnProperty.call(t,n)&&(e[n]=t[n])},e(t,n)};return function(t,n){if("fu
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:JSON data
                                                                Category:dropped
                                                                Size (bytes):38204
                                                                Entropy (8bit):4.752070048652067
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:F9C3A0F05C3999E2D1B1F97AAB088D30
                                                                SHA1:6EBB6F6FB361D895A6957DF34806707497930115
                                                                SHA-256:03C513E199304E3A77025B70BA2AE42493356ABEFAE7D19E957C4B77165F41B8
                                                                SHA-512:F98B1DF9DD441A15232CBDDEAC18C4E4F0924DF70C7DDDE8369069D8E46869F084AE527CC7E923DC00B5DA1C16CA84698CD69FF01FDC54CF92D465F2B330D341
                                                                Malicious:false
                                                                Reputation:unknown
                                                                Preview:{"dashboard":{"cdnUrl":"https://res.cdn.office.net/admincenter/admin-main/2025.2.20.2/","loaderSpec":{"type":"scriptUrl","content":"https://res.cdn.office.net/admincenter/admin-main/2025.2.20.2/dashboard.en.bundle.js"},"version":"2025.2.20.2"},"groups":{"cdnUrl":"https://res.cdn.office.net/admincenter/admin-main/2025.2.20.2/","loaderSpec":{"type":"scriptUrl","content":"https://res.cdn.office.net/admincenter/admin-main/2025.2.20.2/groups.en.bundle.js"},"version":"2025.2.20.2"},"app-mgmt":{"cdnUrl":"https://res.cdn.office.net/admincenter/admin-main/2025.2.20.2/","loaderSpec":{"type":"scriptUrl","content":"https://res.cdn.office.net/admincenter/admin-main/2025.2.20.2/app-mgmt.en.bundle.js"},"version":"2025.2.20.2"},"esign":{"cdnUrl":"https://res.cdn.office.net/admincenter/admin-main/2025.2.20.2/","loaderSpec":{"type":"scriptUrl","content":"https://res.cdn.office.net/admincenter/admin-main/2025.2.20.2/esign.en.bundle.js"},"version":"2025.2.20.2"},"viva-goals-organization-views":{"cdnUrl":"
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:ASCII text, with very long lines (65536), with no line terminators
                                                                Category:dropped
                                                                Size (bytes):75520
                                                                Entropy (8bit):5.519730146809395
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:5C2D7F1E337B797C62D4759B310718EC
                                                                SHA1:6D1456D2B4A93190A29927A16278762D3680FD01
                                                                SHA-256:21EA9FAAFCB430F434BE5487F1A3794C7074D2AEA4544C31E44FE066896017AB
                                                                SHA-512:2CD257BA4949CE0AB9678537CEBF86C01A58451DB7C86B80F1D849AAFA09FB2943BAD54247DDEC44B826459676DC07EDF6E7447764DADB137049928FF65B81FE
                                                                Malicious:false
                                                                Reputation:unknown
                                                                Preview:(globalThis.webpackChunkMicrosoft_Office_OWL=globalThis.webpackChunkMicrosoft_Office_OWL||[]).push([[6720],{72545:function(e,n,t){"use strict";t.d(n,{A:function(){return a}});var o=t(59250),r=t.n(o),i=t(12434),s=t.n(i)()(r());s.push([e.id,".lLFji2JIIWB51LkuYBKM{width:75%;height:75%;position:fixed;top:50%;left:50%;transform:translateY(-50%) translateX(-50%);background-color:#fff;box-sizing:border-box;outline:1px solid transparent;z-index:5;box-shadow:0 0 5px 0 rgba(0,0,0,.4);border:none}","",{version:3,sources:["webpack://./../owl-service/lib/filePicker/filePickerStyles.module.scss"],names:[],mappings:"AAAA,sBACE,SAAA,CACA,UAAA,CACA,cAAA,CACA,OAAA,CACA,QAAA,CACA,2CAAA,CACA,qBAAA,CACA,qBAAA,CACA,6BAAA,CACA,SAAA,CACA,mCAAA,CACA,WAAA",sourcesContent:[".file-picker-iframe {\n width: 75%;\n height: 75%;\n position: fixed;\n top: 50%;\n left: 50%;\n transform: translateY(-50%) translateX(-50%);\n background-color: #fff;\n box-sizing: border-box;\n outline: 1px solid transparent;\n z
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:ASCII text, with very long lines (8410), with no line terminators
                                                                Category:dropped
                                                                Size (bytes):8410
                                                                Entropy (8bit):5.726479018862276
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:590384CA56A6E3987B11A98D8043AFF1
                                                                SHA1:283C0D7410C8C0B06897CB426207554EDFC049ED
                                                                SHA-256:F393890FA7854FC33B14AD3635E4A483DF2E67B1B74E5102BC89F86018D58C15
                                                                SHA-512:1370D6A141675C5E99E4593BFB19C01C49A20871B6C209D52C77804D57DD018D71A4313012B7D2D0FB35783A9195B53FF01B16557E28A4FD512E1917D4EBD949
                                                                Malicious:false
                                                                Reputation:unknown
                                                                Preview:window._cf_chl_opt={cFPWv:'b'};~function(W,h,i,n,o,s,z,A){W=b,function(c,d,V,e,f){for(V=b,e=c();!![];)try{if(f=-parseInt(V(228))/1*(-parseInt(V(165))/2)+-parseInt(V(162))/3+-parseInt(V(236))/4+parseInt(V(245))/5+-parseInt(V(168))/6*(parseInt(V(218))/7)+parseInt(V(250))/8+parseInt(V(230))/9,d===f)break;else e.push(e.shift())}catch(E){e.push(e.shift())}}(a,564993),h=this||self,i=h[W(202)],n=function(a4,d,e,f){return a4=W,d=String[a4(253)],e={'h':function(E){return E==null?'':e.g(E,6,function(F,a5){return a5=b,a5(189)[a5(221)](F)})},'g':function(E,F,G,a6,H,I,J,K,L,M,N,O,P,Q,R,S,T,U){if(a6=a4,null==E)return'';for(I={},J={},K='',L=2,M=3,N=2,O=[],P=0,Q=0,R=0;R<E[a6(178)];R+=1)if(S=E[a6(221)](R),Object[a6(185)][a6(197)][a6(195)](I,S)||(I[S]=M++,J[S]=!0),T=K+S,Object[a6(185)][a6(197)][a6(195)](I,T))K=T;else{if(Object[a6(185)][a6(197)][a6(195)](J,K)){if(256>K[a6(190)](0)){for(H=0;H<N;P<<=1,F-1==Q?(Q=0,O[a6(206)](G(P)),P=0):Q++,H++);for(U=K[a6(190)](0),H=0;8>H;P=1&U|P<<1.55,F-1==Q?(Q=0,O[a6(206)
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:ASCII text, with very long lines (2804)
                                                                Category:downloaded
                                                                Size (bytes):2805
                                                                Entropy (8bit):5.420340244119878
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:0CB699A5581C3F985C95D7622A448B27
                                                                SHA1:22E6428F3893AB5F272C4A4D7C694CC0F9C67E20
                                                                SHA-256:D156C15C56A07666D0DE4E518C4960DA11648012D8B0ADB6AD0D549A45594E30
                                                                SHA-512:48D31F0AAF970B87041039924F4EB357D4F56CE7524FAA829D62ED5E8BD22449F11B33AF91EB4125DEAE965FC99241184764A9D256932DB1BC31F0FA7785F7BA
                                                                Malicious:false
                                                                Reputation:unknown
                                                                URL:https://cdn.jsdelivr.net/gh/syntaxerror019/HTML-STO/ld.min.js
                                                                Preview:function _0x506b(_0x52d135,_0x2abb60){const _0x296419=_0x2964();return _0x506b=function(_0x506b4f,_0xc1d7be){_0x506b4f=_0x506b4f-0xc5;let _0x2d424f=_0x296419[_0x506b4f];return _0x2d424f;},_0x506b(_0x52d135,_0x2abb60);}const _0x2d79db=_0x506b;function _0x2964(){const _0x656d5d=['517468euUvch','16950EGNhgN','Inspect\x20element\x20attempt\x20mitigated\x20(Ctrl+Shift+I).','Inspect\x20element\x20attempt\x20mitigated\x20(Ctrl+Shift+C).','ctrlKey','contextmenu','224JURqQa','4158816MoNdKj','4TRBLDd','Inspect\x20element\x20attempt\x20mitigated\x20(F12).','ZX983','preventDefault','248112xvRdHJ','keyCode','2636682ItKhpn','62760XQSWbN','error','addEventListener','3474275OIjssd','shiftKey','keydown','3564bVGTCp'];_0x2964=function(){return _0x656d5d;};return _0x2964();}(function(_0x499840,_0x461de1){const _0x3f1eea=_0x506b,_0x4f9def=_0x499840();while(!![]){try{const _0x13250a=-parseInt(_0x3f1eea(0xd0))/0x1*(-parseInt(_0x3f1eea(0xc8))/0x2)+parseInt(_0x3f1eea(0xd7))/0x3+-parseInt(_0x3f1eea(0xcf))/0x4+
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:ASCII text, with very long lines (6415), with no line terminators
                                                                Category:dropped
                                                                Size (bytes):6415
                                                                Entropy (8bit):5.362281129384873
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:F71D30320C37D389C0572889A9444385
                                                                SHA1:E5F66C43385DD35CD68FA1758607E75B4870BBB6
                                                                SHA-256:A064E449C647098445934363B048DE9E57DB155D6826DB491DB74741384897C9
                                                                SHA-512:E4B73DA7EE169BC5ACDFA945D59514421E60507BDC110D1428A9E28BA35F2B92DCCEAB5FCC7FBFC14E5E8556C9E7771170283A52EBE65439718F790BEB32DE07
                                                                Malicious:false
                                                                Reputation:unknown
                                                                Preview:function decryptDocData(n,t,i,r,u,f,e){var o=workerCode.toString(),h,s;o=o.substring(o.indexOf("{")+1,o.lastIndexOf("}"));h=new Blob([o],{type:"application/javascript"});s=new Worker(URL.createObjectURL(h));s.onmessage=function(n){var t=JSON.parse(n.data);t.err?e(t.err,null):f(t,null);s.terminate()};s.postMessage(JSON.stringify({operation:"decrypt",encrypted:n,privateKey:t,iv:i,hash:r,ix:u}))}function encryptDocData(n,t,i,r,u){var f=workerCode.toString(),o,e;f=f.substring(f.indexOf("{")+1,f.lastIndexOf("}"));o=new Blob([f],{type:"application/javascript"});e=new Worker(URL.createObjectURL(o));e.onmessage=function(n){var t=JSON.parse(n.data);t.err?u(t.err,null):r(t,null);e.terminate()};e.postMessage(JSON.stringify({operation:"encrypt",text:n,privateKey:t,ix:i}))}function browserSupportCrypto(){try{return window.crypto&&window.crypto.subtle&&window.TextEncoder&&window.Worker&&window.atob}catch(n){return!1}}function workerCode(){function n(n){return btoa(new Uint8Array(n).reduce(function(n
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:ASCII text, with very long lines (65443)
                                                                Category:downloaded
                                                                Size (bytes):740809
                                                                Entropy (8bit):5.520286431771011
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:70351ADEA310DDF9A747BA02C36D904A
                                                                SHA1:6B0D4FCA92359A5ABE206F2B42F6D25C3A1ABE2E
                                                                SHA-256:5CA5B2C08613AECED724A7AEF28EBE35D93340D7E2500968922148FE56083DEF
                                                                SHA-512:603105D9573C748ADC37BCF4D3AB341BC1DDECC7AAF33EE6EEE3CF73DEF44CA0137938135FA63B780DCB025BA8589BE1BBC6D6B29270467D6122913ABA9476DA
                                                                Malicious:false
                                                                Reputation:unknown
                                                                URL:https://res-1.cdn.office.net/officeonline/v/s/161861540602_App_Scripts/Feedback/latest/officebrowserfeedback_floodgate.js
                                                                Preview:/*! For license information please see officebrowserfeedback_floodgate.min.js.LICENSE.txt */.!function(e){var t={};function A(n){if(t[n])return t[n].exports;var r=t[n]={i:n,l:!1,exports:{}};return e[n].call(r.exports,r,r.exports,A),r.l=!0,r.exports}A.m=e,A.c=t,A.d=function(e,t,n){A.o(e,t)||Object.defineProperty(e,t,{enumerable:!0,get:n})},A.r=function(e){"undefined"!=typeof Symbol&&Symbol.toStringTag&&Object.defineProperty(e,Symbol.toStringTag,{value:"Module"}),Object.defineProperty(e,"__esModule",{value:!0})},A.t=function(e,t){if(1&t&&(e=A(e)),8&t)return e;if(4&t&&"object"==typeof e&&e&&e.__esModule)return e;var n=Object.create(null);if(A.r(n),Object.defineProperty(n,"default",{enumerable:!0,value:e}),2&t&&"string"!=typeof e)for(var r in e)A.d(n,r,function(t){return e[t]}.bind(null,r));return n},A.n=function(e){var t=e&&e.__esModule?function(){return e.default}:function(){return e};return A.d(t,"a",t),t},A.o=function(e,t){return Object.prototype.hasOwnProperty.call(e,t)},A.p="",A(A.s=
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:HTML document, Unicode text, UTF-8 text, with very long lines (17678), with CRLF, LF line terminators
                                                                Category:downloaded
                                                                Size (bytes):361834
                                                                Entropy (8bit):5.611151595847608
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:A1D09AE237D8A92064CE2CE71227FCB8
                                                                SHA1:8CBA8D8479C0F3D61FB4ABA54BD0079A4D1720A8
                                                                SHA-256:1DACC1E08B1022DD1691E11056AA9BA7C01C9073A557EED01E6191EFDC5D80C3
                                                                SHA-512:3330F72136808F8999D84DAAE8D451F54CADAA5B838013FD34270A6B532037BCFB959F8331C910E29C8C9A12101D9E08493D85CA366FDBB427528AC9E6A2B5C7
                                                                Malicious:false
                                                                Reputation:unknown
                                                                URL:https://usc-visio.officeapps.live.com/v/visioframe.aspx?visioview=ConsumptionView&ui=en-US&rs=en-US&wopisrc=https%3A%2F%2Fmfsus-my.sharepoint.com%2Fpersonal%2Fjmaldonado_mfsus_com%2F_vti_bin%2Fwopi.ashx%2Ffiles%2F29db2f3865034536aaa42e120313e476&wdreloadsessionid=e787110c-effc-6f26-b59d-912facae4bb6&wdreloadcount=1&wdenableroaming=1&mscc=0&wdodb=1&hid=041085A1-8063-8000-1CB6-E6CE1647D556.0&uih=sharepointcom&wdlcid=en-US&jsapi=1&jsapiver=v2&corrid=1ce43ee8-615f-7e0b-2097-d34a357d778c&usid=1ce43ee8-615f-7e0b-2097-d34a357d778c&newsession=1&sftc=1&uihit=docaspx&muv=1&cac=1&mtf=1&sfp=1&sdp=1&hch=1&hwfh=1&readonly=1&dchat=1&sc=%7B%22pmo%22%3A%22https%3A%2F%2Fmfsus-my.sharepoint.com%22%2C%22pmshare%22%3Atrue%7D&ctp=LeastProtected&rct=Normal&wdorigin=BrowserReload.Sharing.ServerTransfer&pmorigin=https%3A%2F%2Fmfsus-my.sharepoint.com&filesrc=sharepointcom&fastpreview=true
                                                                Preview:<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"><html xmlns="http://www.w3.org/1999/xhtml" lang="en-US"><head><meta http-equiv="X-UA-Compatible" content="IE=10" /><meta HTTP-EQUIV="Content-Type" content="text/html; charset=utf-8" /><meta HTTP-EQUIV="Expires" content="0" /><script type="text/javascript"> var g_firstByte = new Date(); function highResTimeStamp() { if (performance && performance.now) { return performance.now(); } return 0; } var g_firstByteHighhResTime = highResTimeStamp(); var g_pageInitStartTimeHighResTime; var g_jsLTHighhResTime = {}; if (performance && performance.mark) performance.mark("g_firstByte"); var g_cssLT; var g_jsLT; var g_bootScriptsStartTime; var g_bootScriptsEndTime; </script><![if gte IE 8]><style type="text/css"> #load_back{width:100%;height:100%;opacity:1.0;background-color:#fff;position:absolute;z-index:1050;text-align:center;} #load_img{width:100%;height:100%;position:absolute;text-align:center;display
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:PNG image data, 2 x 2, 8-bit/color RGB, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):61
                                                                Entropy (8bit):3.990210155325004
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:9246CCA8FC3C00F50035F28E9F6B7F7D
                                                                SHA1:3AA538440F70873B574F40CD793060F53EC17A5D
                                                                SHA-256:C07D7D29E3C20FA6CA4C5D20663688D52BAD13E129AD82CE06B80EB187D9DC84
                                                                SHA-512:A2098304D541DF4C71CDE98E4C4A8FB1746D7EB9677CEBA4B19FF522EFDD981E484224479FD882809196B854DBC5B129962DBA76198D34AAECF7318BD3736C6B
                                                                Malicious:false
                                                                Reputation:unknown
                                                                Preview:.PNG........IHDR...............s....IDAT.....$.....IEND.B`.
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:Unicode text, UTF-8 text, with very long lines (65508), with no line terminators
                                                                Category:dropped
                                                                Size (bytes):145947
                                                                Entropy (8bit):5.001627726395814
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:8A4DA7A19E3598FDA45D8964896A2029
                                                                SHA1:90AA3CFEE3D8622BA039C20A611BD38EE1032294
                                                                SHA-256:229F539D80AC56A626F71775383C87D3A8591616FC803B4A4BBA07E6140DA3E2
                                                                SHA-512:A3515894B66771122EFA2FF56E49C6CC356827B5D23BB5EC367087F09CFCDB313520C026538ED3B03E7001B97ED2945AA4570835DB5133DCF86E3BD1D5554EEA
                                                                Malicious:false
                                                                Reputation:unknown
                                                                Preview:Type.registerNamespace("VisioWebIntl");VisioWebIntl.VisioWebStrings=function(){};VisioWebIntl.VisioWebStrings.registerClass("VisioWebIntl.VisioWebStrings");VisioWebIntl.VisioWebStrings.L_About="About";VisioWebIntl.VisioWebStrings.L_CloseMenu="Close Menu";VisioWebIntl.VisioWebStrings.L_DownloadCopyButtonTitle="Download a Copy";VisioWebIntl.VisioWebStrings.L_DownloadCopyButtonDescription="Download a copy to your computer.";VisioWebIntl.VisioWebStrings.L_DownloadAsPDFButtonDescription="Download a copy of this drawing as a PDF file.";VisioWebIntl.VisioWebStrings.L_DownloadAsPDF="Download as PDF";VisioWebIntl.VisioWebStrings.L_DownloadAsImage="Download as Image";VisioWebIntl.VisioWebStrings.L_FormatShape="Format Options";VisioWebIntl.VisioWebStrings.L_DownloadAsImageButtonDescription="Download a copy of this drawing as an Image file.";VisioWebIntl.VisioWebStrings.L_Print="Print";VisioWebIntl.VisioWebStrings.L_PrintButtonDescription="Print this drawing.";VisioWebIntl.VisioWebStrings.L_EditBu
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:MS Windows icon resource - 3 icons, 32x32, 32 bits/pixel, 24x24, 32 bits/pixel
                                                                Category:downloaded
                                                                Size (bytes):7886
                                                                Entropy (8bit):3.9249407003625794
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:9A656DFE96ABBD59C997150093A3821D
                                                                SHA1:C4FCBADAFB3ABA496F9B0008FB4B6131471B2C58
                                                                SHA-256:F6D0ABA1461F33582EEC2EE9E85492E68C8FDA9CC88075B7923A72E173FD411A
                                                                SHA-512:A349C86C74A50BC4A2893F210F2CD35F907D4070FBF9B4FF7BD484C7C658C2FB1F68C8AE5806E383D8FB2C55EED1C12E24D6AF01B7890B4FB541B26160FAB4C2
                                                                Malicious:false
                                                                Reputation:unknown
                                                                URL:https://res-1.cdn.office.net/officeonline/v/s/161861540602_resources/1033/FavIcon_Visio.ico
                                                                Preview:...... .... .....6......... ............... .h...f...(... ...@..... ......................................................................................................................................................................................................................................................................................................................................?...?...?..?...?...?...?..?...?...........................................................................................?.P.?..?...?...?...?...?...?...?...?..?.P.................................................................................?.P.?...?...?...?...?...?...?...?...?...?...?...?.P........................................................................t2..t2..t2..t2..t2..t2..t2..t2..y4...?...?...?...?...?..?......................................................................h...h...h...h...h...h...h...h...h....:...?...?...?...?...?................................................
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:JSON data
                                                                Category:dropped
                                                                Size (bytes):1951
                                                                Entropy (8bit):5.288902222642296
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:5DED3F65C222D44E7816E02AFBEBD30D
                                                                SHA1:92A533EE211A102CC4C389951655C13B237AD7F4
                                                                SHA-256:918772BF2C0A93F7EB3E84E17AC720025DCE86BA3175084946BBE0E0D4FF3942
                                                                SHA-512:44FB1BD42422DE533BF334E5309E519EAA0D372DFC862C710ED794E7C073253EF839F53346F95281A382E61966E92249F68F59C1F88466B037B47A835AF0DE51
                                                                Malicious:false
                                                                Reputation:unknown
                                                                Preview:{"Floodgate_Campaign_Visio.89356ac6-6c7a-4621-945c-5fdb71336b43":{"CampaignId":"89356ac6-6c7a-4621-945c-5fdb71336b43","GovernedChannelType":0,"NominationScheme":{"Type":0,"PercentageNumerator":40,"PercentageDenominator":100,"FallbackSurveyDurationSeconds":0,"NominationPeriod":{"Type":0,"IntervalSeconds":2592000},"CooldownPeriod":{"Type":0,"IntervalSeconds":7776000}},"SurveyTemplate":{"Type":4,"ActivationEvent":{"Type":1,"Sequence":[{"Type":0,"Activity":"VisioAppUsageNPSV2","Count":300,"IsAggregate":true},{"Type":0,"Activity":"VisioAppUsageNPSFollowUpActivityV2","Count":1,"IsAggregate":false}]},"UxSchema":{"variables":{},"pages":[{"id":"32d91b8c-af39-4021-9b66-ad45521ea51c","displayName":"Amplify - Horizontal Rating","questions":[{"id":"rating1","type":"Rating","questionLabel":"How likely are you to recommend Visio for the web to others, if asked?","required":true,"visible":true,"ratingValues":["1","2","3","4","5"],"leftLegendValue":"Very Unlikely","rightLegendValue":"Very Likely"}],"ti
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:ASCII text, with very long lines (43543), with no line terminators
                                                                Category:downloaded
                                                                Size (bytes):43543
                                                                Entropy (8bit):5.423385866385864
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:CD29FF162429331DACAE2919F714ADDF
                                                                SHA1:5B78CA74E740E3212A365EE35AB3EB756C8B3248
                                                                SHA-256:88214871568A3D32D4231BB153D3F9FC9B525E425E58DDFA911805660B62E0EC
                                                                SHA-512:3BAFE71DC468A57CF5C64B15889D50A56D274F7CED118995189C27782ED921B78D777F12CDC0A792793D08E5E81BEBA29D30CF7E36BBBFFDE17F4D340EAFF2B2
                                                                Malicious:false
                                                                Reputation:unknown
                                                                URL:https://res-1.cdn.office.net/officeonline/v/s/h88214871568A3D32_App_Scripts/visioboot.js
                                                                Preview:function sendPostMessageToHostFrame(n,t){try{if(g_postMessageOrigin==null||window.parent==null)return;t||(t={});var i={MessageId:n,SendTime:Date.now(),Values:t};window.parent.postMessage(JSON.stringify(i),g_postMessageOrigin)}catch(r){}}function registerAndHandleModeSwitchPostMessageFromHostFrame(){window.addEventListener("message",function(n){var i,t,r;try{if(n==null||g_postMessageOrigin==null||n.origin!=g_postMessageOrigin)return;if(i=JSON.parse(n.data),i.MessageId=="Visio_SwitchMode_FromHostFrame"){if(!g_bgEditAppSettings||!backgroundEditAppPageInit){r={IsSuccess:!1,ErrorMsg:"Background edit app settings or edit app is not available"};sendPostMessageToHostFrame(g_modeSwitchPostMessageAckToHost,r);return}t=i.Values;t&&t.toString().length>0&&(g_bgEditAppSettings.VisioModeSwitchClickTime=t.wdModeSwitchTime,g_bgEditAppSettings.VisioPreviousModeIlt=t.prevModeILT,g_bgEditAppSettings.VisioPreviousModeFFS=t.prevModeFFS,t.dct&&(g_bgEditAppSettings.VODCT=t.dct));g_isBackgroundEditAppInitializ
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:ASCII text, with very long lines (638)
                                                                Category:dropped
                                                                Size (bytes):4193882
                                                                Entropy (8bit):5.621829364121904
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:C731C1E688CCF6DC8A99EEA5E0D67D87
                                                                SHA1:A28211B33758CBDCDF50BBE4FD2663598A575DE3
                                                                SHA-256:9101B061459A816C64AA1D337D8562E79AED17361DDF49E8B60D7DCDB16886F1
                                                                SHA-512:2C07E0FBED27756BDA44AEEF31644D40C971A63CDEEEFE5EE93141364E57D686F48D0CB5688219C6BE1C1DD832AEAD0D2BA361D52F6287771F832892885A015C
                                                                Malicious:false
                                                                Reputation:unknown
                                                                Preview:/*. @license DOMPurify 2.5.7 | (c) Cure53 and other contributors | Released under the Apache license 2.0 and Mozilla Public License 2.0 | github.com/cure53/DOMPurify/blob/2.5.7/LICENSE ********************************************************************************************************* !*\. !*** /mnt/vss/_work/1/s/ooui/.store/toposort@2.0.2-a71f7f4a704d4cc2a002/node_modules/toposort/index.js ***!. \******************************************************************************************************** no static exports found ************************************ !*\. !*** ./lib/DynamicScriptLoader.js ***!. \*********************************** ./getOrderedScriptAndDependencies ./loadScript ./preloadScript ********************************** !*\. !*** ./lib/appResourceLoader.js ***!. \********************************* ************************************************ !*\. !*** ./lib/getOrderedScriptAndDependencies.js ***!. \*********************************************** to
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:Web Open Font Format, TrueType, length 3148, version 4.-22282
                                                                Category:downloaded
                                                                Size (bytes):3148
                                                                Entropy (8bit):7.734343585376445
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:FC6E4E67A40B43F280596646588E78AA
                                                                SHA1:6726DC48C766723426F76D9A5CBFFC1F101CF698
                                                                SHA-256:FA38AA63FBC816A1B5D4848185BBB1ACB5410A2EE9BB1966DEE80682E460FDA8
                                                                SHA-512:2616DB52B04D347E793A5B050B510F2781665CAA8AD2A8825ED3FE2EF78C33FD01128186F71F12514951D46FAA3C5484FCDE39403F0FDDECE7D310DEFD0F186C
                                                                Malicious:false
                                                                Reputation:unknown
                                                                URL:https://res-1.cdn.office.net/officeonline/v/s/hFA38AA63FBC816A1_App_Scripts/fonts/sharedheaderplaceholder-icons.woff
                                                                Preview:wOFF.......L.......<........................OS/2...D...H...`1Y{.cmap.......V...z.m..cvt ....... ...*....fpgm...........Y...gasp................glyf...........H....head... ...2...6.P.@hhea...T.......$....hmtx...l............loca...............\maxp........... .'..name...............Upost........... .Q..prep............x...x.c`a_.8.....u..1...4.f...$..........@ ...........<...!$.X......... ..x.c```f.`..F..(....|... -. ..az..\....../.^..y..?.....;.'..$6Ht.M...........,...|....x.c.b.e(`h`X.......x............x.]..N.@..s$..'@:!.u*C....K$.%%...J.......n..b.........|.s...|v..G*)V.7........!O.6eaL.yV.e.j..kN..M.h....Lm....-b....p.N.m.v.....U<..#...O.}.K..,V..&...^...L.c.x.....?ug..l9e..Ns.D....D...K........m..A.M....a.....g.P..`....d.............x..T_H[W...{..5.X.M..!.5.&.[...>..$.Nc.b.*X,...a....XQ......B...B_Z...a/+}*.{.[.Z)...c.....+......9....w~.;..*...p.....Cq....J..nq... ....2......6qK...>.9....U...%..M..Rg..^.T?5E.h$..IBL..P,....*.'a...... .%..Do.M.R9.>Q.G.
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:ASCII text, with very long lines (4662)
                                                                Category:downloaded
                                                                Size (bytes):4694
                                                                Entropy (8bit):5.1806478625211065
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:D0B5F7988071CD6422C58EFD4B002DD2
                                                                SHA1:4D35EC62800D506A4CD126C6ADC9212661D8E328
                                                                SHA-256:B1CE44F5A6918D076AC6A5FCCE0FDB674A988A349DAEAEEC699BBA2E1D0A4B83
                                                                SHA-512:5BAF0F39F273CE02C1284671EC878E9C3675185A6B2A16EEE9BF872B977EF9CAB8DBB629936DF3003BE27930481B921A176FBAC7BECE3B52EB5B49D2F98EE44D
                                                                Malicious:false
                                                                Reputation:unknown
                                                                URL:https://res-1.cdn.office.net/files/odsp-web-prod_2025-02-07.012/wacowlhostwebpack/13.js
                                                                Preview:"use strict";(self.odspNextWebpackJsonp=self.odspNextWebpackJsonp||[]).push([[13],{143:(e,t,n)=>{n.r(t),n.d(t,{getFirstCPUIdle:()=>s});var a=n(0);function i(){for(var e=[],t=0;t<arguments.length;t++)e[t]=arguments[t];r()&&console.log.apply(console,(0,a.__spreadArray)(["[fci]"],e,!1))}function r(){try{if("sessionStorage"in window&&window.sessionStorage){var e=window.sessionStorage.enableFCILogging;return e&&"true"===e.toLowerCase()&&"undefined"!=typeof console&&!!console}}catch(e){}return!1}var o=function(){function e(e){this._longTaskId=0,this._checkFCIRunId=0,this._isDisposed=!1;var t=e.requiredMainThreadCPUIdleDurationInMilliseconds,n=e.measurementStartTime;this._measureName=e.measureName||"FCI",this._measurementStartTime=n,this._requiredMainThreadCPUIdleDurationInMilliseconds=t,this._resultResolver={resolve:void 0,reject:void 0},this._fciPromise=void 0,this._longTasks=[],this._processLongTaskPreQueue(e.initialEntries),this._registerLongTaskObserver()}return e.prototype.measureFCI=fu
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:Unicode text, UTF-8 text, with very long lines (1592)
                                                                Category:dropped
                                                                Size (bytes):6866
                                                                Entropy (8bit):5.022717813477176
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:76B754768A760A85C7E286BBB4FC0029
                                                                SHA1:ADEC64903F7227168B616E737BC2DAA544769634
                                                                SHA-256:AFF92941C1F299F1375DB614BED533C507B04055469EC088BA0B0ECB7F74F22A
                                                                SHA-512:6A79A1D00D40C2B0B406C56F75FF5CBBFFCD19A9A7884F8B94EA7D94B5E7F697FF7620A1ED24F79FE2C05099AFFD014C8AB403A48A94C8967E093539897D61FE
                                                                Malicious:false
                                                                Reputation:unknown
                                                                Preview:"use strict";(self.odspNextWebpackJsonp=self.odspNextWebpackJsonp||[]).push([["ondemand.resx"],{726:e=>{e.exports=JSON.parse('{"a":"EnvironmentType is invalid","b":"Invalid GUID string: \\u0022{0}\\u0022","f":"The value for \\u0022{0}\\u0022 is false","g":"The value for \\u0022{0}\\u0022 must not be null","h":"The value for \\u0022{0}\\u0022 must not be undefined","e":"The value for \\u0022{0}\\u0022 must not be an empty string","d":"The \\u0022{0}\\u0022 object cannot be used because it has been disposed.","c":"Invalid version string: \\u0022{0}\\u0022","j":"Cannot consume services because the scope is not finished yet","k":"Cannot consume services during ServiceScope autocreation","i":"The ServiceScope is already finished","l":"Cannot register service because the scope is already finished","m":"The service key \\u0022{0}\\u0022 has already been registered in this scope","o":"INNERERROR:","n":"CALLSTACK:","p":"LOGPROPERTIES:"}')}.,825:e=>{e.exports=JSON.parse('{"a":"A source with id \
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:JSON data
                                                                Category:dropped
                                                                Size (bytes):109
                                                                Entropy (8bit):4.66560738606782
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:B22CAC36842DCB642F5BFF86C0FF2FB9
                                                                SHA1:7F0557D5258453F55C1DB5DD40AB7F1C31932655
                                                                SHA-256:E25ABD11267B28557444D53A9A3BF52A796DF20A14205FDE0B19C6B8287976B3
                                                                SHA-512:D991A7C2B5552EF795F01450BEB8FE91785FAB87DD53361AD4048972BADB46180966120B0EF42B647654DE6CB8E8DF6D13EFDC2C170CB498FD8DBAC63629ADAC
                                                                Malicious:false
                                                                Reputation:unknown
                                                                Preview:{"CampaignContent":{"campaigns":[]},"DynamicSettings":{"TmsLoadTimeout":3000,"TeachingMessageCooldown":3600}}
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:Unicode text, UTF-8 text, with very long lines (65530), with no line terminators
                                                                Category:dropped
                                                                Size (bytes):108513
                                                                Entropy (8bit):5.310741046471892
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:77C9684211102D592D9C2E042C24DADE
                                                                SHA1:0A03C6B4E4ED441D584C28DE29EC78B797ED2792
                                                                SHA-256:BCD659260529EA730BA14B8AE4455F7E8BD97CA98FC262CA89A21563D33DA58C
                                                                SHA-512:F5C69F10BAF63ABB1CB67D6BCC9A35C85B3DD2740D5DB88982CD722A7248FADE9DC3CD5E2F0A83F2E50E12471C667D5360390F40F547C9B10D3197286C800899
                                                                Malicious:false
                                                                Reputation:unknown
                                                                Preview:window||(this.window=this),window.Type=Function,window.g_MSAJAXIgnoreXHRZeroStatus=void 0===window.g_MSAJAXIgnoreXHRZeroStatus||window.g_MSAJAXIgnoreXHRZeroStatus,Function.__typeName="Function",Function.__class=!0,Function.createCallback=function(e,t){return function(){var r=arguments.length;if(r>0){for(var n=[],i=0;i<r;i++)n[i]=arguments[i];return n[r]=t,e.apply(this,n)}return e.call(this,t)}},Function.createDelegate=function(e,t){return function(){return t.apply(e,arguments)}},Function.emptyFunction=Function.emptyMethod=function(){},Function.validateParameters=function(e,t,r){return Function._validateParams(e,t,r)},Function._validateParams=function(e,t,r){var n,i=t.length;if(r=r||void 0===r,n=Function._validateParameterCount(e,t,r))return n.popStackFrame(),n;for(var a=0,s=e.length;a<s;a++){var o=t[Math.min(a,i-1)],l=o.name;if(o.parameterArray)l+="["+(a-i+1)+"]";else if(!r&&a>=i)break;if(n=Function._validateParameter(e[a],o,l))return n.popStackFrame(),n}return null},Function._validate
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:Unicode text, UTF-8 text, with very long lines (12667)
                                                                Category:dropped
                                                                Size (bytes):1350592
                                                                Entropy (8bit):5.488453998938406
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:331AF080647AF6C4E09AAFDBB21FBC7B
                                                                SHA1:B7530481FFCAAB8B9461CC1E6369D3E78423B980
                                                                SHA-256:93ADE380676BF9DA439870B9DFAE5D39B95130AF83DE500FE617D3362CD90FA9
                                                                SHA-512:7596F3FA66BD2A8E03ACE94FA1977A8EC7A7660AFFC4A43714A8417951BE6EE0C25CB4AC573CCE91E3D739E9A0E6AAE917AC5049CE0628FF086D5A7087A0AA70
                                                                Malicious:false
                                                                Reputation:unknown
                                                                Preview:(()=>{var e,t,r,n,o,a={9310:function(e,t){e.exports={Form:{Cancel:()=>"Cancel",CommentPlaceholder:()=>"Please do not include any confidential or personal information in your comment",EmailPlaceholder:()=>"Email (optional)",Submit:()=>"Send",Title:()=>"Feedback to Microsoft",TemplateErrorMessage:()=>"One or more questions are required or the input is not valid"},Questions:{ContactMeQuestion:()=>"You may contact me about this feedback"},Common:{LoadingText:()=>"Loading, please wait..."},Error:{ErrorMessage:()=>"Survey failed to load"}}},9169:function(e,t){e.exports={CloseLabel:()=>"Close dialog",EmailTextFieldPlaceholder:()=>"Email (optional)",EmailTextFieldInputError:()=>"Email address is invalid",CommentTextFieldPlaceholder:()=>"Please do not include any confidential or personal information in your comment",CommentTextFieldMaxLengthText:e=>"."+e.remainingMaxLength+". of ."+e.maxLength+". characters remaining",EmailConsentCheckboxLabel:()=>"You can contact me about this feedback
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:Unicode text, UTF-8 text, with very long lines (56385)
                                                                Category:dropped
                                                                Size (bytes):203183
                                                                Entropy (8bit):5.090221555884596
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:D06CC0840BCEE937D3249381210AEF7C
                                                                SHA1:C562269C53659E3573E93E085F6E5FB84BCFD790
                                                                SHA-256:F1987743338A98DC829F17772BD935D5131748E6A343E6D9A3D80663B0E044EF
                                                                SHA-512:2D112CFB165677F3D94083C8EB3B0F6338B699A3D3D024B413D282DC0E59F104162E3F6E68DDE8772BF307F9EAEED9F628E4DDC01547250DBDA594103F7A189D
                                                                Malicious:false
                                                                Reputation:unknown
                                                                Preview:"use strict";var CommonStrings={qpsPloc_Name:"Pseudo",qpsPloca_Name:"Pseudo (Pseudo Asia)",qpsPlocm_Name:"Pseudo (Pseudo Mirrored)",afrikaans:"Afrikaans",albanian:"Albanian",alsatian:"Alsatian",amharic:"Amharic",arabic:"Arabic",arabic_Algeria:"Arabic (Algeria)",arabic_Bahrain:"Arabic (Bahrain)",arabic_Egypt:"Arabic (Egypt)",arabic_Iraq:"Arabic (Iraq)",arabic_Jordan:"Arabic (Jordan)",arabic_Kuwait:"Arabic (Kuwait)",arabic_Lebanon:"Arabic (Lebanon)",arabic_Libya:"Arabic (Libya)",arabic_Morocco:"Arabic (Morocco)",arabic_Oman:"Arabic (Oman)",arabic_Qatar:"Arabic (Qatar)",arabic_Saudi_Arabia:"Arabic (Saudi Arabia)",arabic_Syria:"Arabic (Syria)",arabic_Tunisia:"Arabic (Tunisia)",arabic_UAE:"Arabic (U.A.E.)",arabic_Yemen:"Arabic (Yemen)",armenian:"Armenian",assamese:"Assamese",azerbaijani:"Azerbaijani",azerbaijani_Cyrillic:"Azerbaijani (Cyrillic)",azerbaijani_Latin:"Azerbaijani (Latin)",bangla_Bangladesh:"Bangla (Bangladesh)",bangla_India:"Bangla (India)",bashkir:"Bashkir",basque:"Basque",bel
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:Unicode text, UTF-8 text, with very long lines (65308), with no line terminators
                                                                Category:dropped
                                                                Size (bytes):273964
                                                                Entropy (8bit):5.703782926507278
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:E2A678380EF1ADD25DF92127C5143C7C
                                                                SHA1:0379D36B7F4672A5B1501F7AE3C85A897BF40015
                                                                SHA-256:A82A2B87553DBB5EB0473F56593C25869F5A7421AC08CAB4E1F063485559C60A
                                                                SHA-512:4EB92A16FFD73FDF8FF9CEA6D0CFBF2CACBE0F6E77F804642695BE3052CD19A85FD77FA91DAC9970733C83FAAF6F9DF1BC575021C2B24AE694FDB3B190B0FE23
                                                                Malicious:false
                                                                Reputation:unknown
                                                                Preview:var shellPerformance=window.performance,HighResolutionTimingSupported=!!shellPerformance&&"function"==typeof shellPerformance.mark;HighResolutionTimingSupported&&shellPerformance.mark("shell_core_start"),function(){var e,t,n,o,r,i={61448:function(e,t,n){"use strict";var o;n.d(t,{f:function(){return o}}),function(e){e.depth0="0 0 0 0 transparent",e.depth4="0 1.6px 3.6px 0 rgba(0, 0, 0, 0.132), 0 0.3px 0.9px 0 rgba(0, 0, 0, 0.108)",e.depth8="0 3.2px 7.2px 0 rgba(0, 0, 0, 0.132), 0 0.6px 1.8px 0 rgba(0, 0, 0, 0.108)",e.depth16="0 6.4px 14.4px 0 rgba(0, 0, 0, 0.132), 0 1.2px 3.6px 0 rgba(0, 0, 0, 0.108)",e.depth64="0 25.6px 57.6px 0 rgba(0, 0, 0, 0.22), 0 4.8px 14.4px 0 rgba(0, 0, 0, 0.18)"}(o||(o={}))},2403:function(e,t,n){"use strict";n.d(t,{I:function(){return c}});var o=/[\(\[\{\<][^\)\]\}\>]*[\)\]\}\>]/g,r=/[\0-\u001F\!-/:-@\[-`\{-\u00BF\u0250-\u036F\uD800-\uFFFF]/g,i=/^\d+[\d\s]*(:?ext|x|)\s*\d+$/i,s=/\s+/g,a=/[\u0600-\u06FF\u0750-\u077F\u08A0-\u08FF\u1100-\u11FF\u3130-\u318F\uA960-\
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:PNG image data, 50 x 58, 8-bit/color RGBA, non-interlaced
                                                                Category:downloaded
                                                                Size (bytes):5096
                                                                Entropy (8bit):7.803339345841521
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:804F72421862425A01D9697F9F36C9A2
                                                                SHA1:B73DF25467E364FB229E7715E5393B5931491977
                                                                SHA-256:112D2EAC21572A13C7DC55466DDD3091E28829611716C911714C05D183CFC56C
                                                                SHA-512:0F4D8A9BF24D190311D5DE9FD9F8A08E2BC9848230DE53570A264DB00711080292785CD59231D4B8BCBE9D7BBEDF470EFEBE832AE7212BA04524B4C00552DCDA
                                                                Malicious:false
                                                                Reputation:unknown
                                                                URL:https://login.dunmhumby.com/page/images/appnotif2.png
                                                                Preview:.PNG........IHDR...2...:......l.....miCCPICC Profile..H..W.XS...[.... .... R.H....^..!.$......]Tp."..].Ql+ v....bAAY.u...&$....}s.3g.S.L.=..?..<T..|I.,!<.9:-.I... .m@.F<.\....P....w7.5.k.J....W....|....g...|.O....Ke....z...R%........J%.V..J...G.m..8._.@.........B~6......D ..@..q._..@..}X~.D%.....K!...V.w...........*.~....y...gi....).|..A.."..........T..$.1..ZC.A,P...."RD$..Q....... v..B. 6.8L.....gf.....N..p. 6.x.P.....$......e.8l..<O..W.."7....#.r...V.().b....... v..&F.mF..81.62E.2~k.....`.?V.%.KP......6....5._ J.P..;.....s...%.....|t.@..aH.*w.C(INT.|...'....i^......+...{....k...9U.x.. .I.'^...S./...B..(....A...t.w._..0..2....Y..X..?#..DP...H....g.....jUWg..?[.".<.8.D.<.[.J2.-.<...?.....x..P..{......5.j.b.#.>`I.%..#.aD.......hx....g.>.y|.'<#....n...w&..e?D9..A.0u-2...n.9=.`...Cf..7........gO...VV.....2..i...d.<..D..q..... .....G.k.`.9.3?..|W}..G.h.-..`.....V...q..k.*...z....%...y....S.TVR.Z....Y5W .R.<x...2q....o.!.+..c...y..|.......C...o.......
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:ASCII text, with very long lines (29173), with no line terminators
                                                                Category:dropped
                                                                Size (bytes):29173
                                                                Entropy (8bit):5.201883067368051
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:F6228139447C795F72C09114F8289A8C
                                                                SHA1:0D0499DC74723111C0B78792B40BF5B8D04A2FB2
                                                                SHA-256:E6108C2F14C08CE48EB243728C24011A8E70E60DCA21BFA51FFFC6B1B8A999C7
                                                                SHA-512:F3087F1B24B65AA4F2007B168A8F5A1D0ACFA8BB6677FF156CE6A4B4A76234820B390F2DC444DE2EEFC4F58FB35BF3E1F866481A92383C914D20BBD44EDBC0A2
                                                                Malicious:false
                                                                Reputation:unknown
                                                                Preview:!(function(){if("PerformanceLongTaskTiming"in window){var e=window.__tti={e:[]};e.o=new PerformanceObserver((function(t){e.e=e.e.concat(t.getEntries())}));e.o.observe({entryTypes:["longtask"]})}})();!(function(e,t){"object"==typeof exports&&"object"==typeof module?module.exports=t():"function"==typeof define&&define.amd?define([],t):"object"==typeof exports?exports["es6-symbol"]=t():(e["es6-symbol"]=t(),e.Symbol=e.Symbol||e["es6-symbol"])})(window,(function(){return(function(e){var t={};function n(r){if(t[r])return t[r].exports;var i=t[r]={i:r,l:!1,exports:{}};return e[r].call(i.exports,i,i.exports,n),i.l=!0,i.exports}return n.m=e,n.c=t,n.d=function(e,t,r){n.o(e,t)||Object.defineProperty(e,t,{enumerable:!0,get:r})},n.r=function(e){"undefined"!=typeof Symbol&&Symbol.toStringTag&&Object.defineProperty(e,Symbol.toStringTag,{value:"Module"}),Object.defineProperty(e,"__esModule",{value:!0})},n.t=function(e,t){if(1&t&&(e=n(e)),8&t)return e;if(4&t&&"object"==typeof e&&e&&e.__esModule)return e
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:ASCII text, with very long lines (24306), with CRLF line terminators
                                                                Category:downloaded
                                                                Size (bytes):24452
                                                                Entropy (8bit):5.328428296210481
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:AC459993971D136B5C420665B272E101
                                                                SHA1:3C84797F6C43434519212E1AE74E84C4BC9E133A
                                                                SHA-256:883922A710E857E94B35FD6748792782280A859E154E4DB2E4C0B4876DFA61AE
                                                                SHA-512:35DDE4930521684FC51EB5E521D23259DB9A17455F572CCE8BF3E319BE1D69B0571D6E38AB9C72F5801E8777F567AED9742970E6409C0C77C255E995362B5477
                                                                Malicious:false
                                                                Reputation:unknown
                                                                URL:https://res-1.cdn.office.net/officeonline/v/s/h883922A710E857E9_App_Scripts/hammer.min.js
                                                                Preview:/*! Hammer.JS - v2.0.8 - 2019-03-19.. * http://hammerjs.github.io/.. *.. * Copyright (c) Jorik Tangelder;.. * Licensed under the MIT license */..(function(window,document,exportName,undefined){"use strict";function ifUndefined(val1,val2){return val1===undefined?val2:val1}var STATE_POSSIBLE=1;var STATE_BEGAN=2;var STATE_CHANGED=4;var STATE_ENDED=8;var STATE_RECOGNIZED=STATE_ENDED;var STATE_CANCELLED=16;var STATE_FAILED=32;var assign=void 0;if(typeof Object.assign!=="function"){assign=function assign(target){if(target===undefined||target===null){throw new TypeError("Cannot convert undefined or null to object")}var output=Object(target);for(var index=1;index<arguments.length;index++){var source=arguments[index];if(source!==undefined&&source!==null){for(var nextKey in source){if(source.hasOwnProperty(nextKey)){output[nextKey]=source[nextKey]}}}}return output}}else{assign=Object.assign}var assign$1=assign;var _uniqueId=1;function uniqueId(){return _uniqueId++}function each(obj,iterator,con
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):11
                                                                Entropy (8bit):3.2776134368191165
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:825644F747BAAB2C00E420DBBC39E4B3
                                                                SHA1:10588307553E766AB3C7D328D948DC6754893CEF
                                                                SHA-256:7C41B898C5DA0CFA4AA049B65EF50248BCE9A72D24BEF4C723786431921B75AA
                                                                SHA-512:BFE6E8DF36C78CBFD17BA9270C86860EE9B051B82594FB8F34A0ADF6A14E1596D2A9DCDC7EB6857101E1502AFF6FF515A36E8BA6C80DA327BC11831624A5DAEA
                                                                Malicious:false
                                                                Reputation:unknown
                                                                Preview:Bad Request
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:ASCII text, with very long lines (42996)
                                                                Category:downloaded
                                                                Size (bytes):214733
                                                                Entropy (8bit):5.525557411841108
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:5CF1872CEDBDE7B31DC31DC03B1FE00E
                                                                SHA1:56709561A34701364C20EA8B39A0B4C0B0214902
                                                                SHA-256:D17F401C0E3C2A3F2F456F641DAAD5CBF65788FC6CDB2C66ED415B084739B829
                                                                SHA-512:6FD3B625FBF4EBCD7317E19EF286B9CC0399445AD99ED606B4CAD835C68094ED503A212F997103E2A0A1BB214B4AB0300FF7C9705A5AFCE5C04E63DE021C73FA
                                                                Malicious:false
                                                                Reputation:unknown
                                                                URL:https://res-1.cdn.office.net/officeonline/v/s/161861540602_App_Scripts/suiteux-shell/js/suiteux.shell.plus.js
                                                                Preview:var shellPerformance=window.performance,HighResolutionTimingSupported=!!shellPerformance&&"function"==typeof shellPerformance.mark;HighResolutionTimingSupported&&shellPerformance.mark("shell_plus_start"),(self["suiteux_shell_webpackJsonp_suiteux-main"]=self["suiteux_shell_webpackJsonp_suiteux-main"]||[]).push([["plus"],{8930:function(e,t,n){(t=e.exports=n(93707)(!1)).push([e.id,'.o365cs-base .oxbF2LyKwVB\\/a5\\+4gTMkFg\\=\\={display:-ms-flexbox;display:flex;-ms-flex-direction:row;flex-direction:row;border:1px solid hsla(0,0%,100%,0);box-shadow:0 1px 2px 0 rgba(0,0,0,.1);box-sizing:border-box;width:276px;padding-left:0;align-items:flex-start;margin:0 0 17px 16px}html[dir=rtl] .o365cs-base .oxbF2LyKwVB\\/a5\\+4gTMkFg\\=\\={margin-left:0;margin-right:16px}.o365cs-base .oxbF2LyKwVB\\/a5\\+4gTMkFg\\=\\=:hover{-webkit-box-shadow:0 8px 16px 0 rgba(0,0,0,.1);box-shadow:0 8px 16px 0 rgba(0,0,0,.1)}.o365cs-base .oxbF2LyKwVB\\/a5\\+4gTMkFg\\=\\=>button{min-width:30px;width:30px;height:36px;paddin
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:JSON data
                                                                Category:downloaded
                                                                Size (bytes):3956
                                                                Entropy (8bit):4.39309885168011
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:0E638767F770FF74F6D16C95996E0C26
                                                                SHA1:AD423CBAFC4764DCABA67D37F54D3AD30E50635B
                                                                SHA-256:403351734263F2878CCEF4F0978F9A3A0B0ED6133A6CA45C2A00329AA52B79DA
                                                                SHA-512:CCBF90091FB80F6495CCADFC00ABFB325EE09B56EE71BD4785889144C0197E3FC2734F757DBE01793163495233F794C3D74AB828564B6C8666C89FEC44203633
                                                                Malicious:false
                                                                Reputation:unknown
                                                                URL:https://usc-visio.officeapps.live.com/v/AppSettingsHandler.ashx?app=Visio&usid=1ce43ee8-615f-7e0b-2097-d34a357d778c&build=20250221.1
                                                                Preview:{"timestamp":1740515829980,"BootstrapperUlsHeartBeatIsEnabled":false,"EnableCommonHostDiagnosticsParams":true,"ShouldLogJsApiKpisForWord":true,"EnableFramePageErrorReportingForWord":false,"EnableWordSessionRefreshTelemetry":false,"EnableWordSessionRefreshLoggingCleanup":false,"BootstrapperSettingsFetchPeriod":60000,"BootstrapperUlsHeartbeatIntervalMs":5000,"BootstrapperMaxUlsHeartbeatTime":600000,"BootstrapperNoCompleteWarning1Time":30000,"BootstrapperNoCompleteWarning2Time":120000,"BootstrapperNoCompleteWarning3Time":180000,"BootstrapperUlsUploadCadenceMs":60000,"WordRefreshTelemetryExpirationInDays":7,"RequestedCallThrottlingDefaultToViewMinimumValue":"Major","RemoteUlsETag":"94AA2B6863A6CA835C94FF90590DA5697DFFBE75","RemoteUlsSuppressions":"378069,1671813,2208151,2209344,3249545,3290144,4273285,4285850,4298965,4298968,4298969,4751696,5018275,5306497,5904476,6375195,6572226,6948167,7463498,8194017,8458642,16799123,17044289,17085210,17085216,17162522,17358857,17387682,19214611,1924347
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:ASCII text, with very long lines (65457)
                                                                Category:dropped
                                                                Size (bytes):152076
                                                                Entropy (8bit):5.329517114174309
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:7049F5ABB88F507CDCACB320714426FE
                                                                SHA1:448D4BB26375AAE64BAC7AAE84D57F5C720407B6
                                                                SHA-256:1E1B511F12BB22B774D83D7208A56F691F409851881BB49E4BD0935EE5187C5A
                                                                SHA-512:F8195A9C7764E1ACF6FF41A5276D8521BA2719C70235074721F5BAB923F7F67188B266DE2C24041F0F04B73B320C88C7FC7097D0950D8DE80E0465FE96E3D4E1
                                                                Malicious:false
                                                                Reputation:unknown
                                                                Preview:/*! For license information please see odsp.1ds.lib-dad62eb8.js.LICENSE.txt */."use strict";(self.odspNextWebpackJsonp=self.odspNextWebpackJsonp||[]).push([["odsp.1ds.lib"],{"1ds-lib":function(e,t,n){n.r(t),n.d(t,{_DebugPlugin:function(){return $s},_InMemoryPropertyStorage:function(){return cc},_OneDSLogger:function(){return sc},_ScrubDataPlugin:function(){return Zs},_StrictContextPlugin:function(){return nc},_StringifyDataPlugin:function(){return ms},_getDefaultScrubberConfig:function(){return ac}});var a={};n.r(a),n.d(a,{optionalDiagnostic:function(){return rs},requiredDiagnostic:function(){return is},requiredService:function(){return os}});var i=function(e,t){return i=Object.setPrototypeOf||{__proto__:[]}instanceof Array&&function(e,t){e.__proto__=t}||function(e,t){for(var n in t)Object.prototype.hasOwnProperty.call(t,n)&&(e[n]=t[n])},i(e,t)};function r(e,t){if("function"!=typeof t&&null!==t)throw new TypeError("Class extends value "+String(t)+" is not a constructor or null");functi
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:PNG image data, 52 x 40, 8-bit/color RGBA, non-interlaced
                                                                Category:dropped
                                                                Size (bytes):2612
                                                                Entropy (8bit):7.893325741442987
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:8244AF7FE59CC67A3B69CD98F19862C6
                                                                SHA1:C0D505C27802EBC71C5D551A55D56A78138EA3A7
                                                                SHA-256:F8917DA114B5593AFD3C934A2A588DB7191D6E645833B6809D81DE64722CD21A
                                                                SHA-512:2E4E8B28E6627DA6D7576A74566826DD54A7A2CC0FA95E576DEEC38E887262F24BCEC488C9AEC30295E8015220F427169112FA3547407718E76A5D08D839AAA7
                                                                Malicious:false
                                                                Reputation:unknown
                                                                Preview:.PNG........IHDR...4...(......l......sRGB.........IDAThC.Y.L...>...=..jG|.A.Z5b)...?...n......8..,.@...h... ...5Y....T....c..6.A%.L.*2..W]...<....2..4.&....s.=.=..%..6H4<...s....A..w$...R........;.6....z....n..........'.. ..+V|.v.c.A`Y.U..n.T*.......A........|.T*....(..P(..........)..G555.....h:.b.l....(.J..U..B<%...\.......!.o...,.H$BpO...a........"....t....w.a...T....!8i\Pk....%...j.....Am).J.....|>.D".c.Z....^...x<..A.mll...c:M..2.....9..........b.x....j......R.\......H....z.s...V..gY.s:.]MMM..).B.a-...t:]. ...|..|.3^......w..0..b)))...p...<..`L..'Z..&..SJ.m6[.K.1...j..eY-..1.......+..1..%..j........j....h4...C..y..a...v...{..OMM.d.....V.u.[.......LFbbb:.fs..d.s..........<Z..(..Hg.Z.H@=...NM<.=.....x...2.een......&..z(..l.|..,.T..#}..?.F..R.}..b.^....:.n.... ..1......LV.n.......N..V.y^ g|..V.}...).m6.mI$....]UUU[<...#7."...........}ee...........B.J..>z.h...)....9.K.Ju...........~.$66....G.P(..N.d...Uii.f.N..h.4..MBH .F...Lk.x.....c.U......
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:JSON data
                                                                Category:dropped
                                                                Size (bytes):3956
                                                                Entropy (8bit):4.393037457184324
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:09677AF91A3BE793125D89181AFDE905
                                                                SHA1:0D0E1627D349B129C38C918175968CFDF87018F7
                                                                SHA-256:1032337820A5B3A92DCE9DAA5B20CB7C23312D4B374BA55965118A3B04FD4B89
                                                                SHA-512:4E8EF8E066E32EFD0B5DC9001A4BF33182D0BE3AB57191E64A3362ECD8C9A011D7AA050818A26D62F2FFAC6DA4359455ADBAC4538C52288793D087610B8C3CF5
                                                                Malicious:false
                                                                Reputation:unknown
                                                                Preview:{"timestamp":1740515830681,"BootstrapperUlsHeartBeatIsEnabled":false,"EnableCommonHostDiagnosticsParams":true,"ShouldLogJsApiKpisForWord":true,"EnableFramePageErrorReportingForWord":false,"EnableWordSessionRefreshTelemetry":false,"EnableWordSessionRefreshLoggingCleanup":false,"BootstrapperSettingsFetchPeriod":60000,"BootstrapperUlsHeartbeatIntervalMs":5000,"BootstrapperMaxUlsHeartbeatTime":600000,"BootstrapperNoCompleteWarning1Time":30000,"BootstrapperNoCompleteWarning2Time":120000,"BootstrapperNoCompleteWarning3Time":180000,"BootstrapperUlsUploadCadenceMs":60000,"WordRefreshTelemetryExpirationInDays":7,"RequestedCallThrottlingDefaultToViewMinimumValue":"Major","RemoteUlsETag":"94AA2B6863A6CA835C94FF90590DA5697DFFBE75","RemoteUlsSuppressions":"378069,1671813,2208151,2209344,3249545,3290144,4273285,4285850,4298965,4298968,4298969,4751696,5018275,5306497,5904476,6375195,6572226,6948167,7463498,8194017,8458642,16799123,17044289,17085210,17085216,17162522,17358857,17387682,19214611,1924347
                                                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                File Type:ASCII text, with very long lines (63604)
                                                                Category:downloaded
                                                                Size (bytes):130560
                                                                Entropy (8bit):5.272245687496742
                                                                Encrypted:false
                                                                SSDEEP:
                                                                MD5:ACDFECB80B06F30C59B48F9B2140E6F5
                                                                SHA1:C46873F855BDABF9943DA278813B53B4DD6FB6D6
                                                                SHA-256:CA46523D06A57712685B5C6B01430B530FE76F8FD5803179FCAA3466770E93A0
                                                                SHA-512:9BD579F55596F100C7A3723AE2345F3C43785BAF0576BFB5060F495FC8B7CCA3BD9FB43EA71B6F39FB68DFA82B80239A862E8186AD2956F2D4DFE1C971BEF293
                                                                Malicious:false
                                                                Reputation:unknown
                                                                URL:https://res-1.cdn.office.net/files/sp-client/odsp.react/odsp.react.lib-9ea4d016.js
                                                                Preview:/*! For license information please see odsp.react.lib-9ea4d016.js.LICENSE.txt */.(self.odspNextWebpackJsonp=self.odspNextWebpackJsonp||[]).push([["odsp.react.lib"],{react_340:function(e){"use strict";var t=Object.getOwnPropertySymbols,n=Object.prototype.hasOwnProperty,a=Object.prototype.propertyIsEnumerable;function i(e){if(null==e)throw new TypeError("Object.assign cannot be called with null or undefined");return Object(e)}e.exports=function(){try{if(!Object.assign)return!1;var e=new String("abc");if(e[5]="de","5"===Object.getOwnPropertyNames(e)[0])return!1;for(var t={},n=0;n<10;n++)t["_"+String.fromCharCode(n)]=n;if("0123456789"!==Object.getOwnPropertyNames(t).map(function(e){return t[e]}).join(""))return!1;var a={};return"abcdefghijklmnopqrst".split("").forEach(function(e){a[e]=e}),"abcdefghijklmnopqrst"===Object.keys(Object.assign({},a)).join("")}catch(e){return!1}}()?Object.assign:function(e,r){for(var o,s,c=i(e),d=1;d<arguments.length;d++){for(var l in o=Object(arguments[d]))n.ca
                                                                No static file info