Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
INV00663.docx

Overview

General Information

Sample name:INV00663.docx
Analysis ID:1538699
MD5:28005f53e787bd2a5c277d7c452e6a42
SHA1:8bfc4a9d4f99fdb7907948ef31e4c46a89e75c9e
SHA256:b85c6430623ed7f1491b29bc1d06cc03d923db5909adeb586adcb0251d3641ae

Detection

HTMLPhisher
Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected phishing page
Yara detected HtmlPhish54
AI detected landing page (webpage, office document or email)
Phishing site detected (based on favicon image match)
Phishing site detected (based on image similarity)
Detected non-DNS traffic on DNS port
HTML body contains low number of good links
HTML body with high number of embedded images detected
HTML page contains hidden javascript code
HTML title does not match URL
Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • WINWORD.EXE (PID: 6288 cmdline: "C:\Program Files (x86)\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\user\Desktop\INV00663.docx" /o "" MD5: 1A0C2C2E7D9C4BC18E91604E9B0C7678)
  • chrome.exe (PID: 6792 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://main.d32s46dadgryfu.amplifyapp.com/ MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
    • chrome.exe (PID: 7012 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 --field-trial-handle=2112,i,11013826420682303039,12709766816576758015,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
  • rundll32.exe (PID: 8176 cmdline: C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
SourceRuleDescriptionAuthorStrings
0.52.id.script.csvJoeSecurity_HtmlPhish_54Yara detected HtmlPhish_54Joe Security
    0.66.i.script.csvJoeSecurity_HtmlPhish_54Yara detected HtmlPhish_54Joe Security
      No Sigma rule has matched
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      Phishing

      barindex
      Source: https://main.d32s46dadgryfu.amplifyapp.com/LLM: Score: 8 Reasons: The brand 'Office' is associated with Microsoft Office, which is a well-known brand., The legitimate domain for Microsoft Office is 'office.com'., The URL 'main.d32s46dadgryfu.amplifyapp.com' does not match the legitimate domain 'office.com'., The URL uses a subdomain structure typical of cloud hosting services (e.g., AWS Amplify), which can be used for legitimate purposes but is also commonly exploited for phishing., The URL contains a random string 'd32s46dadgryfu', which is suspicious and not typically associated with legitimate brand domains., The presence of an input field asking for an email address is a common tactic used in phishing sites to collect personal information. DOM: 1.0.pages.csv
      Source: https://log1n-microso.ftlivedocsportal.com/common/oauth2/authorize?client_id=00000002-0000-0ff1-ce00-000000000000&redirect_uri=https%3a%2f%2foutlook.office365.com%2fowa%2f&resource=00000002-0000-0ff1-ce00-000000000000&response_mode=form_post&response_type=code+id_token&scope=openid&msafed=1&msaredir=1&client-request-id=6023e391-1453-e0c8-f8fc-fede41e255e8&protectedtoken=true&claims=%7b%22id_token%22%3a%7b%22xms_cc%22%3a%7b%22values%22%3a%5b%22CP1%22%5d%7d%7d%7d&nonce=638651200858971466.9aab0b09-e84d-49bb-aacf-5c4cac9882e0&state=DctBFoAgCABRrNdxSDRFOA6YbVt2_Vj82U0CgD1sIVEEBl_CvVQi6aKjNOZTzZycFJe0G5u6o9l8sM82bapIXZTiPfL7Wf4B&sso_reload=true#firstname.lastname@domain.com=LLM: Score: 9 Reasons: The brand 'Microsoft' is well-known and typically associated with the domain 'microsoft.com'., The URL 'log1n-microso.ftlivedocsportal.com' contains suspicious elements such as 'log1n' and 'microso', which are misspellings and alterations of 'login' and 'microsoft'., The domain 'ftlivedocsportal.com' does not match the legitimate domain 'microsoft.com'., The use of a hyphen and the misspelling of 'microsoft' in the subdomain are common phishing tactics., The presence of a login-related subdomain ('log1n') is often used in phishing attempts to mimic legitimate login pages. DOM: 7.10.pages.csv
      Source: Yara matchFile source: 0.52.id.script.csv, type: HTML
      Source: Yara matchFile source: 0.66.i.script.csv, type: HTML
      Source: https://log1n-microso.ftlivedocsportal.com/common/oauth2/authorize?client_id=00000002-0000-0ff1-ce00-000000000000&redirect_uri=https%3a%2f%2foutlook.office365.com%2fowa%2f&resource=00000002-0000-0ff1-ce00-000000000000&response_mode=form_post&response_type=code+id_token&scope=openid&msafed=1&msaredir=1&client-request-id=6023e391-1453-e0c8-f8fc-fede41e255e8&protectedtoken=true&claims=%7b%22id_token%22%3a%7b%22xms_cc%22%3a%7b%22values%22%3a%5b%22CP1%22%5d%7d%7d%7d&nonce=638651200858971466.9aab0b09-e84d-49bb-aacf-5c4cac9882e0&state=DctBFoAgCABRrNdxSDRFOA6YbVt2_Vj82U0CgD1sIVEEBl_CvVQi6aKjNOZTzZycFJe0G5u6o9l8sM82bapIXZTiPfL7Wf4B&sso_reload=true#firstname.lastname@domain.com=Matcher: Template: microsoft matched with high similarity
      Source: https://log1n-microso.ftlivedocsportal.com/common/oauth2/authorize?client_id=00000002-0000-0ff1-ce00-000000000000&redirect_uri=https%3a%2f%2foutlook.office365.com%2fowa%2f&resource=00000002-0000-0ff1-ce00-000000000000&response_mode=form_post&response_type=code+id_token&scope=openid&msafed=1&msaredir=1&client-request-id=6023e391-1453-e0c8-f8fc-fede41e255e8&protectedtoken=true&claims=%7b%22id_token%22%3a%7b%22xms_cc%22%3a%7b%22values%22%3a%5b%22CP1%22%5d%7d%7d%7d&nonce=638651200858971466.9aab0b09-e84d-49bb-aacf-5c4cac9882e0&state=DctBFoAgCABRrNdxSDRFOA6YbVt2_Vj82U0CgD1sIVEEBl_CvVQi6aKjNOZTzZycFJe0G5u6o9l8sM82bapIXZTiPfL7Wf4B&sso_reload=true#firstname.lastname@domain.com=Matcher: Found strong image similarity, brand: MICROSOFT
      Source: https://main.d32s46dadgryfu.amplifyapp.com/HTTP Parser: Number of links: 0
      Source: https://log1n-microso.ftlivedocsportal.com/common/oauth2/authorize?client_id=00000002-0000-0ff1-ce00-000000000000&redirect_uri=https%3a%2f%2foutlook.office365.com%2fowa%2f&resource=00000002-0000-0ff1-ce00-000000000000&response_mode=form_post&response_type=code+id_token&scope=openid&msafed=1&msaredir=1&client-request-id=6023e391-1453-e0c8-f8fc-fede41e255e8&protectedtoken=true&claims=%7b%22id_token%22%3a%7b%22xms_cc%22%3a%7b%22values%22%3a%5b%22CP1%22%5d%7d%7d%7d&nonce=638651200858971466.9aab0b09-e84d-49bb-aacf-5c4cac9882e0&state=DctBFoAgCABRrNdxSDRFOA6YbVt2_Vj82U0CgD1sIVEEBl_CvVQi6aKjNOZTzZycFJe0G5u6o9l8sM82bapIXZTiPfL7Wf4B&sso_reload=true#firstname.lastname@domain.com=HTTP Parser: Number of links: 0
      Source: https://www.google.com/search?q=EMAIL+ADDRESS+EXAMPLE&oq=EMAIL+ADDRESS+EXAMPLE&gs_lcrp=EgZjaHJvbWUyBggAEEUYOTIKCAEQABixAxiABDIKCAIQABixAxiABDIKCAMQABixAxiABDIKCAQQABixAxiABDIKCAUQABixAxiABDIKCAYQABixAxiABDIKCAcQABixAxiABDIKCAgQABixAxiABDIKCAkQABixAxiABNIBCDI5MzhqMGo3qAIAsAIA&sourceid=chrome&ie=UTF-8HTTP Parser: Total embedded image size: 54005
      Source: https://l0g1n-microso.ftlivedocsportal.com/o365#firstname.lastname@domain.comHTTP Parser: Base64 decoded: <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><path fill="#B20F03" d="M16 3a13 13 0 1 0 13 13A13.015 13.015 0 0 0 16 3m0 24a11 11 0 1 1 11-11 11.01 11.01 0 0 1-11 11"/><path fill="#B20F03" d="M17.038 18.615H14.87L14.563 9.5h2....
      Source: https://main.d32s46dadgryfu.amplifyapp.com/HTTP Parser: Title: Advanced Protection does not match URL
      Source: https://log1n-microso.ftlivedocsportal.com/common/oauth2/authorize?client_id=00000002-0000-0ff1-ce00-000000000000&redirect_uri=https%3a%2f%2foutlook.office365.com%2fowa%2f&resource=00000002-0000-0ff1-ce00-000000000000&response_mode=form_post&response_type=code+id_token&scope=openid&msafed=1&msaredir=1&client-request-id=6023e391-1453-e0c8-f8fc-fede41e255e8&protectedtoken=true&claims=%7b%22id_token%22%3a%7b%22xms_cc%22%3a%7b%22values%22%3a%5b%22CP1%22%5d%7d%7d%7d&nonce=638651200858971466.9aab0b09-e84d-49bb-aacf-5c4cac9882e0&state=DctBFoAgCABRrNdxSDRFOA6YbVt2_Vj82U0CgD1sIVEEBl_CvVQi6aKjNOZTzZycFJe0G5u6o9l8sM82bapIXZTiPfL7Wf4B&sso_reload=true#firstname.lastname@domain.com=HTTP Parser: Title: Sign in to Outlook does not match URL
      Source: https://log1n-microso.ftlivedocsportal.com/common/oauth2/authorize?client_id=00000002-0000-0ff1-ce00-000000000000&redirect_uri=https%3a%2f%2foutlook.office365.com%2fowa%2f&resource=00000002-0000-0ff1-ce00-000000000000&response_mode=form_post&response_type=code+id_token&scope=openid&msafed=1&msaredir=1&client-request-id=6023e391-1453-e0c8-f8fc-fede41e255e8&protectedtoken=true&claims=%7b%22id_token%22%3a%7b%22xms_cc%22%3a%7b%22values%22%3a%5b%22CP1%22%5d%7d%7d%7d&nonce=638651200858971466.9aab0b09-e84d-49bb-aacf-5c4cac9882e0&state=DctBFoAgCABRrNdxSDRFOA6YbVt2_Vj82U0CgD1sIVEEBl_CvVQi6aKjNOZTzZycFJe0G5u6o9l8sM82bapIXZTiPfL7Wf4B&sso_reload=true#firstname.lastname@domain.com=HTTP Parser: Iframe src: https://l0g1n-microso.ftlivedocsportal.com/owa/prefetch.aspx
      Source: https://log1n-microso.ftlivedocsportal.com/common/oauth2/authorize?client_id=00000002-0000-0ff1-ce00-000000000000&redirect_uri=https%3a%2f%2foutlook.office365.com%2fowa%2f&resource=00000002-0000-0ff1-ce00-000000000000&response_mode=form_post&response_type=code+id_token&scope=openid&msafed=1&msaredir=1&client-request-id=6023e391-1453-e0c8-f8fc-fede41e255e8&protectedtoken=true&claims=%7b%22id_token%22%3a%7b%22xms_cc%22%3a%7b%22values%22%3a%5b%22CP1%22%5d%7d%7d%7d&nonce=638651200858971466.9aab0b09-e84d-49bb-aacf-5c4cac9882e0&state=DctBFoAgCABRrNdxSDRFOA6YbVt2_Vj82U0CgD1sIVEEBl_CvVQi6aKjNOZTzZycFJe0G5u6o9l8sM82bapIXZTiPfL7Wf4B&sso_reload=true#firstname.lastname@domain.com=HTTP Parser: Iframe src: https://l0g1n-microso.ftlivedocsportal.com/owa/prefetch.aspx
      Source: https://log1n-microso.ftlivedocsportal.com/common/oauth2/authorize?client_id=00000002-0000-0ff1-ce00-000000000000&redirect_uri=https%3a%2f%2foutlook.office365.com%2fowa%2f&resource=00000002-0000-0ff1-ce00-000000000000&response_mode=form_post&response_type=code+id_token&scope=openid&msafed=1&msaredir=1&client-request-id=6023e391-1453-e0c8-f8fc-fede41e255e8&protectedtoken=true&claims=%7b%22id_token%22%3a%7b%22xms_cc%22%3a%7b%22values%22%3a%5b%22CP1%22%5d%7d%7d%7d&nonce=638651200858971466.9aab0b09-e84d-49bb-aacf-5c4cac9882e0&state=DctBFoAgCABRrNdxSDRFOA6YbVt2_Vj82U0CgD1sIVEEBl_CvVQi6aKjNOZTzZycFJe0G5u6o9l8sM82bapIXZTiPfL7Wf4B&sso_reload=true#firstname.lastname@domain.com=HTTP Parser: <input type="password" .../> found
      Source: https://main.d32s46dadgryfu.amplifyapp.com/HTTP Parser: No favicon
      Source: https://www.google.com/search?q=EMAIL+ADDRESS+EXAMPLE&oq=EMAIL+ADDRESS+EXAMPLE&gs_lcrp=EgZjaHJvbWUyBggAEEUYOTIKCAEQABixAxiABDIKCAIQABixAxiABDIKCAMQABixAxiABDIKCAQQABixAxiABDIKCAUQABixAxiABDIKCAYQABixAxiABDIKCAcQABixAxiABDIKCAgQABixAxiABDIKCAkQABixAxiABNIBCDI5MzhqMGo3qAIAsAIA&sourceid=chrome&ie=UTF-8HTTP Parser: No favicon
      Source: https://www.google.com/search?q=EMAIL+ADDRESS+EXAMPLE&oq=EMAIL+ADDRESS+EXAMPLE&gs_lcrp=EgZjaHJvbWUyBggAEEUYOTIKCAEQABixAxiABDIKCAIQABixAxiABDIKCAMQABixAxiABDIKCAQQABixAxiABDIKCAUQABixAxiABDIKCAYQABixAxiABDIKCAcQABixAxiABDIKCAgQABixAxiABDIKCAkQABixAxiABNIBCDI5MzhqMGo3qAIAsAIA&sourceid=chrome&ie=UTF-8HTTP Parser: No favicon
      Source: https://l0g1n-microso.ftlivedocsportal.com/o365#firstname.lastname@domain.comHTTP Parser: No favicon
      Source: https://l0g1n-microso.ftlivedocsportal.com/o365?__cf_chl_tk=qXuNFZQD0kxP9qw4DYvGakgFjOgEsIQUm5r5w325HD8-1729523271-1.0.1.1-YO8ziuJE_JijfWI9sE.yIO3fGnK3uzviRZcFJrTiSFQ#firstname.lastname@domain.comHTTP Parser: No favicon
      Source: https://log1n-microso.ftlivedocsportal.com/common/oauth2/authorize?client_id=00000002-0000-0ff1-ce00-000000000000&redirect_uri=https%3a%2f%2foutlook.office365.com%2fowa%2f&resource=00000002-0000-0ff1-ce00-000000000000&response_mode=form_post&response_type=code+id_token&scope=openid&msafed=1&msaredir=1&client-request-id=6023e391-1453-e0c8-f8fc-fede41e255e8&protectedtoken=true&claims=%7b%22id_token%22%3a%7b%22xms_cc%22%3a%7b%22values%22%3a%5b%22CP1%22%5d%7d%7d%7d&nonce=638651200858971466.9aab0b09-e84d-49bb-aacf-5c4cac9882e0&state=DctBFoAgCABRrNdxSDRFOA6YbVt2_Vj82U0CgD1sIVEEBl_CvVQi6aKjNOZTzZycFJe0G5u6o9l8sM82bapIXZTiPfL7Wf4B#firstname.lastname@domain.comHTTP Parser: No favicon
      Source: https://log1n-microso.ftlivedocsportal.com/common/oauth2/authorize?client_id=00000002-0000-0ff1-ce00-000000000000&redirect_uri=https%3a%2f%2foutlook.office365.com%2fowa%2f&resource=00000002-0000-0ff1-ce00-000000000000&response_mode=form_post&response_type=code+id_token&scope=openid&msafed=1&msaredir=1&client-request-id=6023e391-1453-e0c8-f8fc-fede41e255e8&protectedtoken=true&claims=%7b%22id_token%22%3a%7b%22xms_cc%22%3a%7b%22values%22%3a%5b%22CP1%22%5d%7d%7d%7d&nonce=638651200858971466.9aab0b09-e84d-49bb-aacf-5c4cac9882e0&state=DctBFoAgCABRrNdxSDRFOA6YbVt2_Vj82U0CgD1sIVEEBl_CvVQi6aKjNOZTzZycFJe0G5u6o9l8sM82bapIXZTiPfL7Wf4B&sso_reload=true#firstname.lastname@domain.com=HTTP Parser: No favicon
      Source: https://main.d32s46dadgryfu.amplifyapp.com/HTTP Parser: No <meta name="author".. found
      Source: https://log1n-microso.ftlivedocsportal.com/common/oauth2/authorize?client_id=00000002-0000-0ff1-ce00-000000000000&redirect_uri=https%3a%2f%2foutlook.office365.com%2fowa%2f&resource=00000002-0000-0ff1-ce00-000000000000&response_mode=form_post&response_type=code+id_token&scope=openid&msafed=1&msaredir=1&client-request-id=6023e391-1453-e0c8-f8fc-fede41e255e8&protectedtoken=true&claims=%7b%22id_token%22%3a%7b%22xms_cc%22%3a%7b%22values%22%3a%5b%22CP1%22%5d%7d%7d%7d&nonce=638651200858971466.9aab0b09-e84d-49bb-aacf-5c4cac9882e0&state=DctBFoAgCABRrNdxSDRFOA6YbVt2_Vj82U0CgD1sIVEEBl_CvVQi6aKjNOZTzZycFJe0G5u6o9l8sM82bapIXZTiPfL7Wf4B&sso_reload=true#firstname.lastname@domain.com=HTTP Parser: No <meta name="author".. found
      Source: https://log1n-microso.ftlivedocsportal.com/common/oauth2/authorize?client_id=00000002-0000-0ff1-ce00-000000000000&redirect_uri=https%3a%2f%2foutlook.office365.com%2fowa%2f&resource=00000002-0000-0ff1-ce00-000000000000&response_mode=form_post&response_type=code+id_token&scope=openid&msafed=1&msaredir=1&client-request-id=6023e391-1453-e0c8-f8fc-fede41e255e8&protectedtoken=true&claims=%7b%22id_token%22%3a%7b%22xms_cc%22%3a%7b%22values%22%3a%5b%22CP1%22%5d%7d%7d%7d&nonce=638651200858971466.9aab0b09-e84d-49bb-aacf-5c4cac9882e0&state=DctBFoAgCABRrNdxSDRFOA6YbVt2_Vj82U0CgD1sIVEEBl_CvVQi6aKjNOZTzZycFJe0G5u6o9l8sM82bapIXZTiPfL7Wf4B&sso_reload=true#firstname.lastname@domain.com=HTTP Parser: No <meta name="author".. found
      Source: https://main.d32s46dadgryfu.amplifyapp.com/HTTP Parser: No <meta name="copyright".. found
      Source: https://log1n-microso.ftlivedocsportal.com/common/oauth2/authorize?client_id=00000002-0000-0ff1-ce00-000000000000&redirect_uri=https%3a%2f%2foutlook.office365.com%2fowa%2f&resource=00000002-0000-0ff1-ce00-000000000000&response_mode=form_post&response_type=code+id_token&scope=openid&msafed=1&msaredir=1&client-request-id=6023e391-1453-e0c8-f8fc-fede41e255e8&protectedtoken=true&claims=%7b%22id_token%22%3a%7b%22xms_cc%22%3a%7b%22values%22%3a%5b%22CP1%22%5d%7d%7d%7d&nonce=638651200858971466.9aab0b09-e84d-49bb-aacf-5c4cac9882e0&state=DctBFoAgCABRrNdxSDRFOA6YbVt2_Vj82U0CgD1sIVEEBl_CvVQi6aKjNOZTzZycFJe0G5u6o9l8sM82bapIXZTiPfL7Wf4B&sso_reload=true#firstname.lastname@domain.com=HTTP Parser: No <meta name="copyright".. found
      Source: https://log1n-microso.ftlivedocsportal.com/common/oauth2/authorize?client_id=00000002-0000-0ff1-ce00-000000000000&redirect_uri=https%3a%2f%2foutlook.office365.com%2fowa%2f&resource=00000002-0000-0ff1-ce00-000000000000&response_mode=form_post&response_type=code+id_token&scope=openid&msafed=1&msaredir=1&client-request-id=6023e391-1453-e0c8-f8fc-fede41e255e8&protectedtoken=true&claims=%7b%22id_token%22%3a%7b%22xms_cc%22%3a%7b%22values%22%3a%5b%22CP1%22%5d%7d%7d%7d&nonce=638651200858971466.9aab0b09-e84d-49bb-aacf-5c4cac9882e0&state=DctBFoAgCABRrNdxSDRFOA6YbVt2_Vj82U0CgD1sIVEEBl_CvVQi6aKjNOZTzZycFJe0G5u6o9l8sM82bapIXZTiPfL7Wf4B&sso_reload=true#firstname.lastname@domain.com=HTTP Parser: No <meta name="copyright".. found
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\Chrome\Application\Dictionaries
      Source: unknownHTTPS traffic detected: 20.190.159.0:443 -> 192.168.2.17:49707 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 4.245.163.56:443 -> 192.168.2.17:49714 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.17:49722 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.17:49725 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 4.245.163.56:443 -> 192.168.2.17:49780 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 20.190.159.0:443 -> 192.168.2.17:50679 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 13.107.5.88:443 -> 192.168.2.17:50680 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 2.23.209.176:443 -> 192.168.2.17:50681 version: TLS 1.2
      Source: chrome.exeMemory has grown: Private usage: 11MB later: 27MB
      Source: winword.exeMemory has grown: Private usage: 22MB later: 47MB
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: global trafficTCP traffic: 192.168.2.17:50477 -> 1.1.1.1:53
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.0
      Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.0
      Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.0
      Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.0
      Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
      Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
      Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
      Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.0
      Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.0
      Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.0
      Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.0
      Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.0
      Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
      Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
      Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
      Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
      Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
      Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
      Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
      Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
      Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
      Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.13
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.13
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.13
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
      Source: global trafficDNS traffic detected: DNS query: main.d32s46dadgryfu.amplifyapp.com
      Source: global trafficDNS traffic detected: DNS query: www.google.com
      Source: global trafficDNS traffic detected: DNS query: apis.google.com
      Source: global trafficDNS traffic detected: DNS query: play.google.com
      Source: global trafficDNS traffic detected: DNS query: dns-tunnel-check.googlezip.net
      Source: global trafficDNS traffic detected: DNS query: tunnel.googlezip.net
      Source: global trafficDNS traffic detected: DNS query: i.ytimg.com
      Source: global trafficDNS traffic detected: DNS query: www.youtube.com
      Source: global trafficDNS traffic detected: DNS query: l0g1n-microso.ftlivedocsportal.com
      Source: global trafficDNS traffic detected: DNS query: a.nel.cloudflare.com
      Source: global trafficDNS traffic detected: DNS query: challenges.cloudflare.com
      Source: global trafficDNS traffic detected: DNS query: log1n-microso.ftlivedocsportal.com
      Source: global trafficDNS traffic detected: DNS query: aadcdn.msftauth.net
      Source: global trafficDNS traffic detected: DNS query: live.ftlivedocsportal.com
      Source: global trafficDNS traffic detected: DNS query: r4.res.office365.com
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50612
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50611
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50614
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50613
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50616
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50615
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50618
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50617
      Source: unknownNetwork traffic detected: HTTP traffic on port 50617 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50610
      Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50670 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50619
      Source: unknownNetwork traffic detected: HTTP traffic on port 50641 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50532 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50584 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50664 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50502
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50623
      Source: unknownNetwork traffic detected: HTTP traffic on port 50635 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50501
      Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50622
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50504
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50625
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50503
      Source: unknownNetwork traffic detected: HTTP traffic on port 50578 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50624
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50506
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50627
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50505
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50626
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50629
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50628
      Source: unknownNetwork traffic detected: HTTP traffic on port 50652 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50595 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50500
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50621
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50620
      Source: unknownNetwork traffic detected: HTTP traffic on port 50589 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50600 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50646 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50537 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50629 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50634
      Source: unknownNetwork traffic detected: HTTP traffic on port 50502 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50512
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50633
      Source: unknownNetwork traffic detected: HTTP traffic on port 50634 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
      Source: unknownNetwork traffic detected: HTTP traffic on port 50577 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50636
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50635
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50517
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50638
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50637
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50519
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50518
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50639
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50630
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50511
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50632
      Source: unknownNetwork traffic detected: HTTP traffic on port 50487 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50631
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
      Source: unknownNetwork traffic detected: HTTP traffic on port 49680 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50628 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50524
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50645
      Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50523
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50644
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50647
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50646
      Source: unknownNetwork traffic detected: HTTP traffic on port 50555 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50549 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50648
      Source: unknownNetwork traffic detected: HTTP traffic on port 50572 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50529
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50520
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50641
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50640
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50522
      Source: unknownNetwork traffic detected: HTTP traffic on port 50612 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50643
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50642
      Source: unknownNetwork traffic detected: HTTP traffic on port 50623 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50671 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50566 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
      Source: unknownNetwork traffic detected: HTTP traffic on port 50606 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50640 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50556 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50494
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50496
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50495
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50497
      Source: unknownNetwork traffic detected: HTTP traffic on port 50651 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50499
      Source: unknownNetwork traffic detected: HTTP traffic on port 50645 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50479 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50622 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50610 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50662 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50656 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50574 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50639 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50522 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50501 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50585 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50533 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50568 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50497 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50604 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50611 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50506 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50573 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50596 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50638 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50540 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50672 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50480 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50567 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50534 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50666 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50511 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50496 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50605 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50600
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50603
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50602
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50605
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50604
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50607
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50606
      Source: unknownNetwork traffic detected: HTTP traffic on port 50616 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50633 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50650 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50590 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50562 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50609
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50608
      Source: unknownNetwork traffic detected: HTTP traffic on port 50627 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50644 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50491 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50552 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50575 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50578
      Source: unknownNetwork traffic detected: HTTP traffic on port 50661 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50581 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50546 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50571
      Source: unknownNetwork traffic detected: HTTP traffic on port 50523 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50573
      Source: unknownNetwork traffic detected: HTTP traffic on port 50655 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50572
      Source: unknownNetwork traffic detected: HTTP traffic on port 50500 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50489 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50575
      Source: unknownNetwork traffic detected: HTTP traffic on port 50632 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50574
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50577
      Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50576
      Source: unknownNetwork traffic detected: HTTP traffic on port 50517 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50580
      Source: unknownNetwork traffic detected: HTTP traffic on port 50569 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50626 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50603 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50589
      Source: unknownNetwork traffic detected: HTTP traffic on port 50505 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50582
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49691
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50581
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50584
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50585
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50588
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50587
      Source: unknownNetwork traffic detected: HTTP traffic on port 50614 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50564 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50667 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50590
      Source: unknownNetwork traffic detected: HTTP traffic on port 50512 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50608 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50621 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50479
      Source: unknownNetwork traffic detected: HTTP traffic on port 50609 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50529 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50593
      Source: unknownNetwork traffic detected: HTTP traffic on port 50558 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50595
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50597
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50596
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50478
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50599
      Source: unknownNetwork traffic detected: HTTP traffic on port 50615 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50480
      Source: unknownNetwork traffic detected: HTTP traffic on port 50563 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50643 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50490 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50620 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50660 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50530 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50637 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50524 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50580 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50679 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50483
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50482
      Source: unknownNetwork traffic detected: HTTP traffic on port 50654 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50487
      Source: unknownNetwork traffic detected: HTTP traffic on port 50597 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50489
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50488
      Source: unknownNetwork traffic detected: HTTP traffic on port 50541 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50648 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50490
      Source: unknownNetwork traffic detected: HTTP traffic on port 50518 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50535 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50491
      Source: unknownNetwork traffic detected: HTTP traffic on port 50478 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50495 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50535
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50656
      Source: unknownNetwork traffic detected: HTTP traffic on port 50659 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50534
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50655
      Source: unknownNetwork traffic detected: HTTP traffic on port 50504 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50537
      Source: unknownNetwork traffic detected: HTTP traffic on port 50636 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50658
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50536
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50659
      Source: unknownNetwork traffic detected: HTTP traffic on port 50571 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49691 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50650
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50531
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50652
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50530
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50651
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50533
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50654
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50532
      Source: unknownNetwork traffic detected: HTTP traffic on port 50613 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50653
      Source: unknownNetwork traffic detected: HTTP traffic on port 50588 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50482 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50536 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50668 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50542 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50565 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50607 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50494 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50546
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50667
      Source: unknownNetwork traffic detected: HTTP traffic on port 50599 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50666
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50548
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50669
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50547
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50668
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50549
      Source: unknownNetwork traffic detected: HTTP traffic on port 50547 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50553 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50540
      Source: unknownNetwork traffic detected: HTTP traffic on port 50618 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50661
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50660
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50542
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50663
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50541
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50662
      Source: unknownNetwork traffic detected: HTTP traffic on port 50631 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50664
      Source: unknownNetwork traffic detected: HTTP traffic on port 50642 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50680 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50663 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50625 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50556
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50559
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50558
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50679
      Source: unknownNetwork traffic detected: HTTP traffic on port 50548 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50531 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50554 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50670
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50672
      Source: unknownNetwork traffic detected: HTTP traffic on port 50653 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50671
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50553
      Source: unknownNetwork traffic detected: HTTP traffic on port 50619 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50483 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50552
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50555
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50554
      Source: unknownNetwork traffic detected: HTTP traffic on port 50630 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50647 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50519 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50582 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50624 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50503 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50568
      Source: unknownNetwork traffic detected: HTTP traffic on port 50576 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50567
      Source: unknownNetwork traffic detected: HTTP traffic on port 50658 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50569
      Source: unknownNetwork traffic detected: HTTP traffic on port 50681 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50681
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50680
      Source: unknownNetwork traffic detected: HTTP traffic on port 50520 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50559 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50562
      Source: unknownNetwork traffic detected: HTTP traffic on port 50593 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50564
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50563
      Source: unknownNetwork traffic detected: HTTP traffic on port 50488 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50566
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50565
      Source: unknownNetwork traffic detected: HTTP traffic on port 50587 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50669 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50499 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50602 -> 443
      Source: unknownHTTPS traffic detected: 20.190.159.0:443 -> 192.168.2.17:49707 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 4.245.163.56:443 -> 192.168.2.17:49714 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.17:49722 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.17:49725 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 4.245.163.56:443 -> 192.168.2.17:49780 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 20.190.159.0:443 -> 192.168.2.17:50679 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 13.107.5.88:443 -> 192.168.2.17:50680 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 2.23.209.176:443 -> 192.168.2.17:50681 version: TLS 1.2
      Source: classification engineClassification label: mal68.phis.winDOCX@36/241@53/213
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Program Files\Google\Chrome\Application\Dictionaries
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEFile created: C:\Users\user\AppData\Roaming\Microsoft\Office
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\{67B1A4C6-3838-490B-B2B0-F9B477748D92} - OProcSessId.dat
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEFile read: C:\Users\desktop.ini
      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\user\Desktop\INV00663.docx" /o ""
      Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://main.d32s46dadgryfu.amplifyapp.com/
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 --field-trial-handle=2112,i,11013826420682303039,12709766816576758015,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 --field-trial-handle=2112,i,11013826420682303039,12709766816576758015,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{77F10CF0-3DB5-4966-B520-B7C54FD35ED6}\InProcServer32
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\Common
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\Chrome\Application\Dictionaries

      Persistence and Installation Behavior

      barindex
      Source: Office documentLLM: Office document contains QR code
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information queried: ProcessInformation
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire Infrastructure1
      Drive-by Compromise
      Windows Management Instrumentation1
      Browser Extensions
      1
      Process Injection
      3
      Masquerading
      OS Credential Dumping1
      Process Discovery
      Remote ServicesData from Local System2
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/Job1
      Registry Run Keys / Startup Folder
      1
      Registry Run Keys / Startup Folder
      1
      Rundll32
      LSASS Memory1
      File and Directory Discovery
      Remote Desktop ProtocolData from Removable Media1
      Non-Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
      Extra Window Memory Injection
      1
      Process Injection
      Security Account Manager3
      System Information Discovery
      SMB/Windows Admin SharesData from Network Shared Drive2
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      Extra Window Memory Injection
      NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      NameIPActiveMaliciousAntivirus DetectionReputation
      a.nel.cloudflare.com
      35.190.80.1
      truefalse
        unknown
        s-part-0044.t-0009.fb-t-msedge.net
        13.107.253.72
        truefalse
          unknown
          plus.l.google.com
          142.250.184.206
          truefalse
            unknown
            log1n-microso.ftlivedocsportal.com
            104.26.13.222
            truetrue
              unknown
              i.ytimg.com
              142.250.185.214
              truefalse
                unknown
                s-part-0017.t-0009.fb-t-msedge.net
                13.107.253.45
                truefalse
                  unknown
                  youtube-ui.l.google.com
                  142.250.181.238
                  truefalse
                    unknown
                    main.d32s46dadgryfu.amplifyapp.com
                    18.239.83.112
                    truetrue
                      unknown
                      play.google.com
                      142.250.74.206
                      truefalse
                        unknown
                        dns-tunnel-check.googlezip.net
                        216.239.34.159
                        truefalse
                          unknown
                          tunnel.googlezip.net
                          216.239.34.157
                          truefalse
                            unknown
                            challenges.cloudflare.com
                            104.18.95.41
                            truefalse
                              unknown
                              sni1gl.wpc.omegacdn.net
                              152.199.21.175
                              truefalse
                                unknown
                                www.google.com
                                142.250.181.228
                                truefalse
                                  unknown
                                  l0g1n-microso.ftlivedocsportal.com
                                  104.26.12.222
                                  truefalse
                                    unknown
                                    live.ftlivedocsportal.com
                                    172.67.71.247
                                    truefalse
                                      unknown
                                      r4.res.office365.com
                                      unknown
                                      unknownfalse
                                        unknown
                                        aadcdn.msftauth.net
                                        unknown
                                        unknownfalse
                                          unknown
                                          www.youtube.com
                                          unknown
                                          unknownfalse
                                            unknown
                                            apis.google.com
                                            unknown
                                            unknownfalse
                                              unknown
                                              NameMaliciousAntivirus DetectionReputation
                                              https://log1n-microso.ftlivedocsportal.com/common/oauth2/authorize?client_id=00000002-0000-0ff1-ce00-000000000000&redirect_uri=https%3a%2f%2foutlook.office365.com%2fowa%2f&resource=00000002-0000-0ff1-ce00-000000000000&response_mode=form_post&response_type=code+id_token&scope=openid&msafed=1&msaredir=1&client-request-id=6023e391-1453-e0c8-f8fc-fede41e255e8&protectedtoken=true&claims=%7b%22id_token%22%3a%7b%22xms_cc%22%3a%7b%22values%22%3a%5b%22CP1%22%5d%7d%7d%7d&nonce=638651200858971466.9aab0b09-e84d-49bb-aacf-5c4cac9882e0&state=DctBFoAgCABRrNdxSDRFOA6YbVt2_Vj82U0CgD1sIVEEBl_CvVQi6aKjNOZTzZycFJe0G5u6o9l8sM82bapIXZTiPfL7Wf4B#firstname.lastname@domain.comfalse
                                                unknown
                                                https://www.google.com/search?q=EMAIL+ADDRESS+EXAMPLE&oq=EMAIL+ADDRESS+EXAMPLE&gs_lcrp=EgZjaHJvbWUyBggAEEUYOTIKCAEQABixAxiABDIKCAIQABixAxiABDIKCAMQABixAxiABDIKCAQQABixAxiABDIKCAUQABixAxiABDIKCAYQABixAxiABDIKCAcQABixAxiABDIKCAgQABixAxiABDIKCAkQABixAxiABNIBCDI5MzhqMGo3qAIAsAIA&sourceid=chrome&ie=UTF-8false
                                                  unknown
                                                  https://l0g1n-microso.ftlivedocsportal.com/o365#firstname.lastname@domain.comfalse
                                                    unknown
                                                    https://log1n-microso.ftlivedocsportal.com/common/oauth2/authorize?client_id=00000002-0000-0ff1-ce00-000000000000&redirect_uri=https%3a%2f%2foutlook.office365.com%2fowa%2f&resource=00000002-0000-0ff1-ce00-000000000000&response_mode=form_post&response_type=code+id_token&scope=openid&msafed=1&msaredir=1&client-request-id=6023e391-1453-e0c8-f8fc-fede41e255e8&protectedtoken=true&claims=%7b%22id_token%22%3a%7b%22xms_cc%22%3a%7b%22values%22%3a%5b%22CP1%22%5d%7d%7d%7d&nonce=638651200858971466.9aab0b09-e84d-49bb-aacf-5c4cac9882e0&state=DctBFoAgCABRrNdxSDRFOA6YbVt2_Vj82U0CgD1sIVEEBl_CvVQi6aKjNOZTzZycFJe0G5u6o9l8sM82bapIXZTiPfL7Wf4B&sso_reload=true#firstname.lastname@domain.com=true
                                                      unknown
                                                      https://main.d32s46dadgryfu.amplifyapp.com/true
                                                        unknown
                                                        • No. of IPs < 25%
                                                        • 25% < No. of IPs < 50%
                                                        • 50% < No. of IPs < 75%
                                                        • 75% < No. of IPs
                                                        IPDomainCountryFlagASNASN NameMalicious
                                                        142.250.74.202
                                                        unknownUnited States
                                                        15169GOOGLEUSfalse
                                                        2.18.64.220
                                                        unknownEuropean Union
                                                        6057AdministracionNacionaldeTelecomunicacionesUYfalse
                                                        142.250.74.206
                                                        play.google.comUnited States
                                                        15169GOOGLEUSfalse
                                                        172.217.18.14
                                                        unknownUnited States
                                                        15169GOOGLEUSfalse
                                                        23.38.98.104
                                                        unknownUnited States
                                                        16625AKAMAI-ASUSfalse
                                                        216.58.206.78
                                                        unknownUnited States
                                                        15169GOOGLEUSfalse
                                                        216.58.206.34
                                                        unknownUnited States
                                                        15169GOOGLEUSfalse
                                                        142.250.185.227
                                                        unknownUnited States
                                                        15169GOOGLEUSfalse
                                                        142.250.181.234
                                                        unknownUnited States
                                                        15169GOOGLEUSfalse
                                                        216.58.206.35
                                                        unknownUnited States
                                                        15169GOOGLEUSfalse
                                                        104.26.13.222
                                                        log1n-microso.ftlivedocsportal.comUnited States
                                                        13335CLOUDFLARENETUStrue
                                                        142.250.181.238
                                                        youtube-ui.l.google.comUnited States
                                                        15169GOOGLEUSfalse
                                                        52.111.243.40
                                                        unknownUnited States
                                                        8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                        13.89.178.27
                                                        unknownUnited States
                                                        8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                        142.250.186.132
                                                        unknownUnited States
                                                        15169GOOGLEUSfalse
                                                        35.190.80.1
                                                        a.nel.cloudflare.comUnited States
                                                        15169GOOGLEUSfalse
                                                        142.250.184.206
                                                        plus.l.google.comUnited States
                                                        15169GOOGLEUSfalse
                                                        142.250.184.246
                                                        unknownUnited States
                                                        15169GOOGLEUSfalse
                                                        52.113.194.132
                                                        unknownUnited States
                                                        8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                        142.250.186.78
                                                        unknownUnited States
                                                        15169GOOGLEUSfalse
                                                        172.67.71.247
                                                        live.ftlivedocsportal.comUnited States
                                                        13335CLOUDFLARENETUSfalse
                                                        172.217.16.202
                                                        unknownUnited States
                                                        15169GOOGLEUSfalse
                                                        1.1.1.1
                                                        unknownAustralia
                                                        13335CLOUDFLARENETUSfalse
                                                        34.104.35.123
                                                        unknownUnited States
                                                        15169GOOGLEUSfalse
                                                        108.177.15.84
                                                        unknownUnited States
                                                        15169GOOGLEUSfalse
                                                        18.239.83.112
                                                        main.d32s46dadgryfu.amplifyapp.comUnited States
                                                        16509AMAZON-02UStrue
                                                        172.217.16.206
                                                        unknownUnited States
                                                        15169GOOGLEUSfalse
                                                        142.250.186.163
                                                        unknownUnited States
                                                        15169GOOGLEUSfalse
                                                        13.107.253.45
                                                        s-part-0017.t-0009.fb-t-msedge.netUnited States
                                                        8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                        142.250.185.234
                                                        unknownUnited States
                                                        15169GOOGLEUSfalse
                                                        104.18.95.41
                                                        challenges.cloudflare.comUnited States
                                                        13335CLOUDFLARENETUSfalse
                                                        142.250.185.214
                                                        i.ytimg.comUnited States
                                                        15169GOOGLEUSfalse
                                                        104.26.12.222
                                                        l0g1n-microso.ftlivedocsportal.comUnited States
                                                        13335CLOUDFLARENETUSfalse
                                                        13.107.253.72
                                                        s-part-0044.t-0009.fb-t-msedge.netUnited States
                                                        8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                        239.255.255.250
                                                        unknownReserved
                                                        unknownunknownfalse
                                                        142.250.181.228
                                                        www.google.comUnited States
                                                        15169GOOGLEUSfalse
                                                        95.101.111.168
                                                        unknownEuropean Union
                                                        12956TELEFONICATELXIUSESfalse
                                                        152.199.21.175
                                                        sni1gl.wpc.omegacdn.netUnited States
                                                        15133EDGECASTUSfalse
                                                        216.58.212.163
                                                        unknownUnited States
                                                        15169GOOGLEUSfalse
                                                        52.109.76.240
                                                        unknownUnited States
                                                        8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                        142.250.185.74
                                                        unknownUnited States
                                                        15169GOOGLEUSfalse
                                                        216.239.34.157
                                                        tunnel.googlezip.netUnited States
                                                        15169GOOGLEUSfalse
                                                        IP
                                                        192.168.2.17
                                                        127.0.0.1
                                                        Joe Sandbox version:41.0.0 Charoite
                                                        Analysis ID:1538699
                                                        Start date and time:2024-10-21 17:06:01 +02:00
                                                        Joe Sandbox product:CloudBasic
                                                        Overall analysis duration:
                                                        Hypervisor based Inspection enabled:false
                                                        Report type:full
                                                        Cookbook file name:defaultwindowsinteractivecookbook.jbs
                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                        Number of analysed new started processes analysed:22
                                                        Number of new started drivers analysed:0
                                                        Number of existing processes analysed:0
                                                        Number of existing drivers analysed:0
                                                        Number of injected processes analysed:0
                                                        Technologies:
                                                        • EGA enabled
                                                        Analysis Mode:stream
                                                        Analysis stop reason:Timeout
                                                        Sample name:INV00663.docx
                                                        Detection:MAL
                                                        Classification:mal68.phis.winDOCX@36/241@53/213
                                                        Cookbook Comments:
                                                        • Found application associated with file extension: .docx
                                                        • Exclude process from analysis (whitelisted): dllhost.exe, TextInputHost.exe
                                                        • Excluded IPs from analysis (whitelisted): 52.109.76.240, 52.113.194.132, 52.111.243.40, 52.111.243.43, 52.111.243.42, 52.111.243.41, 142.250.186.163, 142.250.186.78, 108.177.15.84
                                                        • Excluded domains from analysis (whitelisted): ecs.office.com, accounts.google.com, prod.configsvc1.live.com.akadns.net, clientservices.googleapis.com, s-0005-office.config.skype.com, ecs-office.s-0005.s-msedge.net, prod1.naturallanguageeditorservice.osi.office.net.akadns.net, neu-azsc-config.officeapps.live.com, nleditor.osi.office.net, clients2.google.com, prod-eu-resolver.naturallanguageeditorservice.osi.office.net.akadns.net, s-0005.s-msedge.net, config.officeapps.live.com, officeclient.microsoft.com, ecs.office.trafficmanager.net, clients.l.google.com, europe.configsvc1.live.com.akadns.net
                                                        • Not all processes where analyzed, report is missing behavior information
                                                        • Report size getting too big, too many NtQueryAttributesFile calls found.
                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                        • Report size getting too big, too many NtSetInformationFile calls found.
                                                        • VT rate limit hit for: INV00663.docx
                                                        InputOutput
                                                        URL: Office document Model: claude-3-haiku-20240307
                                                        ```json
                                                        {
                                                          "contains_trigger_text": true,
                                                          "trigger_text": "Kindly scan the qrcode below to view transaction details",
                                                          "prominent_button_name": "unknown",
                                                          "text_input_field_labels": "unknown",
                                                          "pdf_icon_visible": false,
                                                          "has_visible_captcha": false,
                                                          "has_urgent_text": true,
                                                          "has_visible_qrcode": true
                                                        }
                                                        URL: Office document Model: claude-3-haiku-20240307
                                                        ```json
                                                        {
                                                          "brands": [
                                                            "CAT"
                                                          ]
                                                        }
                                                        URL: https://main.d32s46dadgryfu.amplifyapp.com/ Model: claude-3-haiku-20240307
                                                        ```json
                                                        {
                                                          "contains_trigger_text": true,
                                                          "trigger_text": "We're committed to protecting your account with the latest security measures.",
                                                          "prominent_button_name": "Submit",
                                                          "text_input_field_labels": [
                                                            "Enter your email address"
                                                          ],
                                                          "pdf_icon_visible": false,
                                                          "has_visible_captcha": false,
                                                          "has_urgent_text": false,
                                                          "has_visible_qrcode": false
                                                        }
                                                        URL: https://main.d32s46dadgryfu.amplifyapp.com/ Model: claude-3-haiku-20240307
                                                        ```json
                                                        {
                                                          "brands": [
                                                            "Office"
                                                          ]
                                                        }
                                                        URL: https://main.d32s46dadgryfu.amplifyapp.com/ Model: gpt-4o
                                                        ```json{  "legit_domain": "office.com",  "classification": "wellknown",  "reasons": [    "The brand 'Office' is associated with Microsoft Office, which is a well-known brand.",    "The legitimate domain for Microsoft Office is 'office.com'.",    "The URL 'main.d32s46dadgryfu.amplifyapp.com' does not match the legitimate domain 'office.com'.",    "The URL uses a subdomain structure typical of cloud hosting services (e.g., AWS Amplify), which can be used for legitimate purposes but is also commonly exploited for phishing.",    "The URL contains a random string 'd32s46dadgryfu', which is suspicious and not typically associated with legitimate brand domains.",    "The presence of an input field asking for an email address is a common tactic used in phishing sites to collect personal information."  ],  "riskscore": 8}
                                                        Google indexed: False
                                                        URL: main.d32s46dadgryfu.amplifyapp.com
                                                                    Brands: Office
                                                                    Input Fields: Enter your email address
                                                        URL: https://www.google.com/search?q=EMAIL+ADDRESS+EXAMPLE&oq=EMAIL+ADDRESS+EXAMPLE&gs_lcrp=EgZjaHJvbWUyBggAEEUYOTIKCAEQABixAxiABDIKCAIQABixAxiABDIKCAMQABixAxiABDIKCAQQABixAxiABDIKCAUQABixAxiABDIKCAYQABixAxiABDIKCAcQABixAxiABDIKCAgQABixAxiABDIKCAkQABixAxiABNIB Model: claude-3-haiku-20240307
                                                        ```json
                                                        {
                                                          "contains_trigger_text": true,
                                                          "trigger_text": "To view secured document, click here",
                                                          "prominent_button_name": "Click here to view document",
                                                          "text_input_field_labels": [
                                                            "Email address",
                                                            "Password"
                                                          ],
                                                          "pdf_icon_visible": false,
                                                          "has_visible_captcha": false,
                                                          "has_urgent_text": false,
                                                          "has_visible_qrcode": false
                                                        }
                                                        URL: https://www.google.com/search?q=EMAIL+ADDRESS+EXAMPLE&oq=EMAIL+ADDRESS+EXAMPLE&gs_lcrp=EgZjaHJvbWUyBggAEEUYOTIKCAEQABixAxiABDIKCAIQABixAxiABDIKCAMQABixAxiABDIKCAQQABixAxiABDIKCAUQABixAxiABDIKCAYQABixAxiABDIKCAcQABixAxiABDIKCAgQABixAxiABDIKCAkQABixAxiABNIB Model: claude-3-haiku-20240307
                                                        ```json
                                                        {
                                                          "brands": [
                                                            "Google"
                                                          ]
                                                        }
                                                        URL: https://www.google.com/search?q=EMAIL+ADDRESS+EXAMPLE&oq=EMAIL+ADDRESS+EXAMPLE&gs_lcrp=EgZjaHJvbWUyBggAEEUYOTIKCAEQABixAxiABDIKCAIQABixAxiABDIKCAMQABixAxiABDIKCAQQABixAxiABDIKCAUQABixAxiABDIKCAYQABixAxiABDIKCAcQABixAxiABDIKCAgQABixAxiABDIKCAkQABixAxiABNIB Model: claude-3-haiku-20240307
                                                        ```json
                                                        {
                                                          "contains_trigger_text": true,
                                                          "trigger_text": "To view secured document, click here",
                                                          "prominent_button_name": "Click here to view document",
                                                          "text_input_field_labels": [
                                                            "Email address",
                                                            "Password"
                                                          ],
                                                          "pdf_icon_visible": false,
                                                          "has_visible_captcha": false,
                                                          "has_urgent_text": false,
                                                          "has_visible_qrcode": false
                                                        }
                                                        URL: https://www.google.com/search?q=EMAIL+ADDRESS+EXAMPLE&oq=EMAIL+ADDRESS+EXAMPLE&gs_lcrp=EgZjaHJvbWUyBggAEEUYOTIKCAEQABixAxiABDIKCAIQABixAxiABDIKCAMQABixAxiABDIKCAQQABixAxiABDIKCAUQABixAxiABDIKCAYQABixAxiABDIKCAcQABixAxiABDIKCAgQABixAxiABDIKCAkQABixAxiABNIB Model: gpt-4o
                                                        ```json{  "legit_domain": "google.com",  "classification": "wellknown",  "reasons": [    "The URL 'www.google.com' matches the legitimate domain name for the brand 'Google'.",    "Google is a well-known brand with a strong online presence.",    "The URL does not contain any suspicious elements such as misspellings, extra characters, or unusual domain extensions.",    "The input fields 'Email address' and 'Password' are typical for a login page, which is common for Google services."  ],  "riskscore": 1}
                                                        URL: www.google.com
                                                                    Brands: Google
                                                                    Input Fields: Email address, Password
                                                        URL: https://www.google.com/search?q=EMAIL+ADDRESS+EXAMPLE&oq=EMAIL+ADDRESS+EXAMPLE&gs_lcrp=EgZjaHJvbWUyBggAEEUYOTIKCAEQABixAxiABDIKCAIQABixAxiABDIKCAMQABixAxiABDIKCAQQABixAxiABDIKCAUQABixAxiABDIKCAYQABixAxiABDIKCAcQABixAxiABDIKCAgQABixAxiABDIKCAkQABixAxiABNIB Model: claude-3-haiku-20240307
                                                        ```json
                                                        {
                                                          "brands": [
                                                            "Google"
                                                          ]
                                                        }
                                                        URL: https://www.google.com/search?q=EMAIL+ADDRESS+EXAMPLE&oq=EMAIL+ADDRESS+EXAMPLE&gs_lcrp=EgZjaHJvbWUyBggAEEUYOTIKCAEQABixAxiABDIKCAIQABixAxiABDIKCAMQABixAxiABDIKCAQQABixAxiABDIKCAUQABixAxiABDIKCAYQABixAxiABDIKCAcQABixAxiABDIKCAgQABixAxiABDIKCAkQABixAxiABNIB Model: gpt-4o
                                                        ```json{  "legit_domain": "google.com",  "classification": "wellknown",  "reasons": [    "The URL 'www.google.com' matches the legitimate domain name for the brand 'Google'.",    "Google is a well-known brand with a strong online presence.",    "The URL does not contain any suspicious elements such as misspellings, extra characters, or unusual domain extensions.",    "The input fields 'Email address' and 'Password' are typical for a login page, which is common for Google services."  ],  "riskscore": 1}
                                                        URL: www.google.com
                                                                    Brands: Google
                                                                    Input Fields: Email address, Password
                                                        URL: https://l0g1n-microso.ftlivedocsportal.com/o365#firstname.lastname@domain.com Model: claude-3-haiku-20240307
                                                        ```json
                                                        {
                                                          "contains_trigger_text": true,
                                                          "trigger_text": "Verifying you are human. This may take a few seconds.",
                                                          "prominent_button_name": "unknown",
                                                          "text_input_field_labels": "unknown",
                                                          "pdf_icon_visible": false,
                                                          "has_visible_captcha": true,
                                                          "has_urgent_text": false,
                                                          "has_visible_qrcode": false
                                                        }
                                                        URL: https://l0g1n-microso.ftlivedocsportal.com/o365#firstname.lastname@domain.com Model: claude-3-haiku-20240307
                                                        ```json
                                                        {
                                                          "contains_trigger_text": true,
                                                          "trigger_text": "Verifying you are human. This may take a few seconds.",
                                                          "prominent_button_name": "unknown",
                                                          "text_input_field_labels": "unknown",
                                                          "pdf_icon_visible": false,
                                                          "has_visible_captcha": true,
                                                          "has_urgent_text": false,
                                                          "has_visible_qrcode": false
                                                        }
                                                        URL: https://l0g1n-microso.ftlivedocsportal.com/o365?__cf_chl_tk=qXuNFZQD0kxP9qw4DYvGakgFjOgEsIQUm5r5w325HD8-1729523271-1.0.1.1-YO8ziuJE_JijfWI9sE.yIO3fGnK3uzviRZcFJrTiSFQ#firstname.lastname@domain.com Model: claude-3-haiku-20240307
                                                        ```json
                                                        {
                                                          "contains_trigger_text": true,
                                                          "trigger_text": "Verification successful",
                                                          "prominent_button_name": "unknown",
                                                          "text_input_field_labels": "unknown",
                                                          "pdf_icon_visible": false,
                                                          "has_visible_captcha": false,
                                                          "has_urgent_text": false,
                                                          "has_visible_qrcode": false
                                                        }
                                                        URL: https://l0g1n-microso.ftlivedocsportal.com/o365#firstname.lastname@domain.com Model: claude-3-haiku-20240307
                                                        ```json
                                                        {
                                                          "brands": [
                                                            "Cloudflare"
                                                          ]
                                                        }
                                                        URL: https://l0g1n-microso.ftlivedocsportal.com/o365?__cf_chl_tk=qXuNFZQD0kxP9qw4DYvGakgFjOgEsIQUm5r5w325HD8-1729523271-1.0.1.1-YO8ziuJE_JijfWI9sE.yIO3fGnK3uzviRZcFJrTiSFQ#firstname.lastname@domain.com Model: claude-3-haiku-20240307
                                                        ```json
                                                        {
                                                          "brands": [
                                                            "Cloudflare"
                                                          ]
                                                        }
                                                        URL: https://l0g1n-microso.ftlivedocsportal.com/o365#firstname.lastname@domain.com Model: claude-3-haiku-20240307
                                                        ```json
                                                        {
                                                          "brands": [
                                                            "Cloudflare"
                                                          ]
                                                        }
                                                        URL: https://log1n-microso.ftlivedocsportal.com/common/oauth2/authorize?client_id=00000002-0000-0ff1-ce00-000000000000&redirect_uri=https%3a%2f%2foutlook.office365.com%2fowa%2f&resource=00000002-0000-0ff1-ce00-000000000000&response_mode=form_post&response_type Model: claude-3-haiku-20240307
                                                        ```json
                                                        {
                                                          "contains_trigger_text": true,
                                                          "trigger_text": "Sign in to continue to Outlook",
                                                          "prominent_button_name": "Next",
                                                          "text_input_field_labels": [
                                                            "firstname.lastname@domain.com"
                                                          ],
                                                          "pdf_icon_visible": false,
                                                          "has_visible_captcha": false,
                                                          "has_urgent_text": false,
                                                          "has_visible_qrcode": false
                                                        }
                                                        URL: https://log1n-microso.ftlivedocsportal.com/common/oauth2/authorize?client_id=00000002-0000-0ff1-ce00-000000000000&redirect_uri=https%3a%2f%2foutlook.office365.com%2fowa%2f&resource=00000002-0000-0ff1-ce00-000000000000&response_mode=form_post&response_type Model: claude-3-haiku-20240307
                                                        ```json
                                                        {
                                                          "contains_trigger_text": true,
                                                          "trigger_text": "This username may be incorrect. Make sure you typed it correctly. Otherwise, contact your admin.",
                                                          "prominent_button_name": "Next",
                                                          "text_input_field_labels": [
                                                            "firstname.lastname@domain.com"
                                                          ],
                                                          "pdf_icon_visible": false,
                                                          "has_visible_captcha": false,
                                                          "has_urgent_text": true,
                                                          "has_visible_qrcode": false
                                                        }
                                                        URL: https://log1n-microso.ftlivedocsportal.com/common/oauth2/authorize?client_id=00000002-0000-0ff1-ce00-000000000000&redirect_uri=https%3a%2f%2foutlook.office365.com%2fowa%2f&resource=00000002-0000-0ff1-ce00-000000000000&response_mode=form_post&response_type Model: claude-3-haiku-20240307
                                                        ```json
                                                        {
                                                          "brands": [
                                                            "Outlook"
                                                          ]
                                                        }
                                                        URL: https://log1n-microso.ftlivedocsportal.com/common/oauth2/authorize?client_id=00000002-0000-0ff1-ce00-000000000000&redirect_uri=https%3a%2f%2foutlook.office365.com%2fowa%2f&resource=00000002-0000-0ff1-ce00-000000000000&response_mode=form_post&response_type Model: claude-3-haiku-20240307
                                                        ```json
                                                        {
                                                          "brands": [
                                                            "Microsoft"
                                                          ]
                                                        }
                                                        URL: https://log1n-microso.ftlivedocsportal.com/common/oauth2/authorize?client_id=00000002-0000-0ff1-ce00-000000000000&redirect_uri=https%3a%2f%2foutlook.office365.com%2fowa%2f&resource=00000002-0000-0ff1-ce00-000000000000&response_mode=form_post&response_type Model: gpt-4o
                                                        ```json{  "legit_domain": "microsoft.com",  "classification": "wellknown",  "reasons": [    "The brand 'Microsoft' is well-known and typically associated with the domain 'microsoft.com'.",    "The URL 'log1n-microso.ftlivedocsportal.com' contains suspicious elements such as 'log1n' and 'microso', which are misspellings and alterations of 'login' and 'microsoft'.",    "The domain 'ftlivedocsportal.com' does not match the legitimate domain 'microsoft.com'.",    "The use of a hyphen and the misspelling of 'microsoft' in the subdomain are common phishing tactics.",    "The presence of a login-related subdomain ('log1n') is often used in phishing attempts to mimic legitimate login pages."  ],  "riskscore": 9}
                                                        Google indexed: False
                                                        URL: log1n-microso.ftlivedocsportal.com
                                                                    Brands: Microsoft
                                                                    Input Fields: firstname.lastname@domain.com
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):333258
                                                        Entropy (8bit):4.654450340871081
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:5632C4A81D2193986ACD29EADF1A2177
                                                        SHA1:E8FF4FDFEB0002786FCE1CF8F3D25F8E9631E346
                                                        SHA-256:06DE709513D7976690B3DD8F5FDF1E59CF456A2DFBA952B97EACC72FE47B238B
                                                        SHA-512:676CE1957A374E0F36634AA9CFFBCFB1E1BEFE1B31EE876483B10763EA9B2D703F2F3782B642A5D7D0945C5149B572751EBD9ABB47982864834EF61E3427C796
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:<?xml version="1.0" encoding="utf-8"?>....<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">.. <xsl:output method="html" encoding="us-ascii"/>.... <xsl:template match="*" mode="outputHtml2">.. <xsl:apply-templates mode="outputHtml"/>.. </xsl:template>.... <xsl:template name="StringFormatDot">.. <xsl:param name="format" />.. <xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.. <xsl:when test="$format = ''"></xsl:when>.. <xsl:when test="substring($format, 1, 2) = '%%'">.. <xsl:text>%</xsl:text>.. <xsl:call-template name="StringFormatDot">.. <xsl:with-param name="format" select="substring($format, 3)" />.. <xsl:with-param name=
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):328
                                                        Entropy (8bit):3.541819892045459
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:C3216C3FC73A4B3FFFE7ED67153AB7B5
                                                        SHA1:F20E4D33BABE978BE6A6925964C57D6E6EF1A92E
                                                        SHA-256:7CF1D6A4F0BE5E6184F59BFB1304509F38E480B59A3B091DBDC43B052D2137CB
                                                        SHA-512:D3B78BE6E7633FF943F5E34063B5EFA4AF239CD49F437227FC7575F6CC65C497B7D6F6A979EA065065BEAF257CB368560B5462542692286052B5C7E5C01755BC
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .A.P.A.S.i.x.t.h.E.d.i.t.i.o.n.O.f.f.i.c.e.O.n.l.i.n.e...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):290
                                                        Entropy (8bit):3.5081874837369886
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:8D9B02CC69FA40564E6C781A9CC9E626
                                                        SHA1:352469A1ABB8DA1DC550D7E27924E552B0D39204
                                                        SHA-256:1D4483830710EF4A2CC173C3514A9F4B0ACA6C44DB22729B7BE074D18C625BAE
                                                        SHA-512:8B7DB2AB339DD8085104855F847C48970C2DD32ADB0B8EEA134A64C5CC7DE772615F85D057F4357703B65166C8CF0C06F4F6FD3E60FFC80DA3DD34B16D5B1281
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .g.o.s.t.n.a.m.e...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):255948
                                                        Entropy (8bit):5.103631650117028
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:9888A214D362470A6189DEFF775BE139
                                                        SHA1:32B552EB3C73CD7D0D9D924C96B27A86753E0F97
                                                        SHA-256:C64ED5C2A323C00E84272AD3A701CAEBE1DCCEB67231978DE978042F09635FA7
                                                        SHA-512:8A75FC2713003FA40B9730D29C786C76A796F30E6ACE12064468DD2BB4BF97EF26AC43FFE1158AB1DB06FF715D2E6CDE8EF3E8B7C49AA1341603CE122F311073
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:<?xml version="1.0" encoding="utf-8"?>............<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..........<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select=
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):290
                                                        Entropy (8bit):3.5161159456784024
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:C15EB3F4306EBF75D1E7C3C9382DEECC
                                                        SHA1:A3F9684794FFD59151A80F97770D4A79F1D030A6
                                                        SHA-256:23C262DF3AEACB125E88C8FFB7DBF56FD23F66E0D476AFD842A68DDE69658C7F
                                                        SHA-512:ACDF7D69A815C42223FD6300179A991A379F7166EFAABEE41A3995FB2030CD41D8BCD46B566B56D1DFBAE8557AFA1D9FD55143900A506FA733DE9DA5D73389D6
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .t.u.r.a.b.i.a.n...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):344303
                                                        Entropy (8bit):5.023195898304535
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:F079EC5E2CCB9CD4529673BCDFB90486
                                                        SHA1:FBA6696E6FA918F52997193168867DD3AEBE1AD6
                                                        SHA-256:3B651258F4D0EE1BFFC7FB189250DED1B920475D1682370D6685769E3A9346DB
                                                        SHA-512:4FFFA59863F94B3778F321DA16C43B92A3053E024BDD8C5317077EA1ECC7B09F67ECE3C377DB693F3432BF1E2D947EC5BF8E88E19157ED08632537D8437C87D6
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:<?xml version="1.0" encoding="utf-8"?>......<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt" xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$pa
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):286
                                                        Entropy (8bit):3.538396048757031
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:149948E41627BE5DC454558E12AF2DA4
                                                        SHA1:DB72388C037F0B638FCD007FAB46C916249720A8
                                                        SHA-256:1B981DC422A042CDDEBE2543C57ED3D468288C20D280FF9A9E2BB4CC8F4776ED
                                                        SHA-512:070B55B305DB48F7A8CD549A5AECF37DE9D6DCD780A5EC546B4BB2165AF4600FA2AF350DDDB48BECCAA3ED954AEE90F5C06C3183310B081F555389060FF4CB01
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .s.i.s.t.0.2...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):250983
                                                        Entropy (8bit):5.057714239438731
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:F883B260A8D67082EA895C14BF56DD56
                                                        SHA1:7954565C1F243D46AD3B1E2F1BAF3281451FC14B
                                                        SHA-256:EF4835DB41A485B56C2EF0FF7094BC2350460573A686182BC45FD6613480E353
                                                        SHA-512:D95924A499F32D9B4D9A7D298502181F9E9048C21DBE0496FA3C3279B263D6F7D594B859111A99B1A53BD248EE69B867D7B1768C42E1E40934E0B990F0CE051E
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:<?xml version="1.0" encoding="utf-8"?>..<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):332
                                                        Entropy (8bit):3.4871192480632223
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:333BA58FCE326DEA1E4A9DE67475AA95
                                                        SHA1:F51FAD5385DC08F7D3E11E1165A18F2E8A028C14
                                                        SHA-256:66142D15C7325B98B199AB6EE6F35B7409DE64EBD5C0AB50412D18CBE6894097
                                                        SHA-512:BFEE521A05B72515A8D4F7D13D8810846DC60F1E85C363FFEBD6CACD23AE8D2E664C563FC74700A4ED4E358F378508D25C46CB5BE1CF587E2E278EBC22BB2625
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .m.l.a.s.e.v.e.n.t.h.e.d.i.t.i.o.n.o.f.f.i.c.e.o.n.l.i.n.e...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):254875
                                                        Entropy (8bit):5.003842588822783
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:377B3E355414466F3E3861BCE1844976
                                                        SHA1:0B639A3880ACA3FD90FA918197A669CC005E2BA4
                                                        SHA-256:4AC5B26C5E66E122DE80243EF621CA3E1142F643DD2AD61B75FF41CFEE3DFFAF
                                                        SHA-512:B050AD52A8161F96CBDC880DD1356186F381B57159F5010489B04528DB798DB955F0C530465AB3ECD5C653586508429D98336D6EB150436F1A53ABEE0697AEB9
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:<?xml version="1.0" encoding="utf-8"?>......<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt" xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>.....<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>...</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />......<xsl:variable name="prop_EndChars">.....<xsl:call-template name="templ_prop_EndChars"/>....</xsl:variable>......<xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$parameters" />......
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                        Category:dropped
                                                        Size (bytes):16806
                                                        Entropy (8bit):7.9519793977093505
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:950F3AB11CB67CC651082FEBE523AF63
                                                        SHA1:418DE03AD2EF93D0BD29C3D7045E94D3771DACB4
                                                        SHA-256:9C5E4D8966A0B30A22D92DB1DA2F0DBF06AC2EA75E7BB8501777095EA0196974
                                                        SHA-512:D74BF52A58B0C0327DB9DDCAD739794020F00B3FA2DE2B44DAAEC9C1459ECAF3639A5D761BBBC6BDF735848C4FD7E124D13B23964B0055BB5AA4F6AFE76DFE00
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK.........T.>................[Content_Types].xmlz.........=N.1...b.Eko(.B....(.Pp..=.u.?.....#q..ND.!$.J{.o....G..[Cv.....+.R.Nx..........0."u..S...$&.....Je..B..x......m......M^z....f....|...N..Q..z.!.- .2.9y.i.8j...........0.AE..p.s~@../jw.#8.I.#....4.~Cl.:#h..f.PU.s.~........(.)F..Y......^x..PK.........T.>...V....L......._rels/.rels...J.@.._e..]AD.....x....3.t..T.w.\ZpA<x......v..'....z.........Y..[...<..2.TT....Q$.!.=.....&C....b".F.q.7...X3...7.8.N.}.. ?..8...#..,.L.3.#e...wZpZ.]S..:....t.....{..6.7.|..,dH.e..K 7-}.~.v...5.......b..PK........Ul.<..<"I5...&......diagrams/layout1.xml.}.r.I..s........~Y.f.gzfv......E."w.K..J5m.e...4.0..Q... A.!...%...<...3.......O.......t~.u{...5.G......?,.........N......L......~.:....^,..r=./~7_..8............o.y......oo.3.f........f.......r.7../....qrr.v9.......,?..._O.....?9.O~]..zv.I'.W..........;..\..~....../........?~..n.....\}pt.........b,~...;>.=;>:..u.....?.......2]..]....i......9..<.p..4D..
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):254
                                                        Entropy (8bit):3.4720677950594836
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:D04EC08EFE18D1611BDB9A5EC0CC00B1
                                                        SHA1:668FF6DFE64D5306220341FC2C1353199D122932
                                                        SHA-256:FA60500F951AFAF8FFDB6D1828456D60004AE1558E8E1364ADC6ECB59F5450C9
                                                        SHA-512:97EBCCAF64FA33238B7CFC0A6D853EFB050D877E21EE87A78E17698F0BB38382FCE7F6C4D97D550276BD6B133D3099ECAB9CFCD739F31BFE545F4930D896EEC3
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .C.i.r.c.l.e.P.r.o.c.e.s.s...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):278
                                                        Entropy (8bit):3.5280239200222887
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:877A8A960B2140E3A0A2752550959DB9
                                                        SHA1:FBEC17B332CBC42F2F16A1A08767623C7955DF48
                                                        SHA-256:FE07084A41CF7DB58B06D2C0D11BCACB603D6574261D1E7EBADCFF85F39AFB47
                                                        SHA-512:B8B660374EC6504B3B5FCC7DAC63AF30A0C9D24306C36B33B33B23186EC96AEFE958A3851FF3BC57FBA72A1334F633A19C0B8D253BB79AA5E5AFE4A247105889
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .g.b...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):268317
                                                        Entropy (8bit):5.05419861997223
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:51D32EE5BC7AB811041F799652D26E04
                                                        SHA1:412193006AA3EF19E0A57E16ACF86B830993024A
                                                        SHA-256:6230814BF5B2D554397580613E20681752240AB87FD354ECECF188C1EABE0E97
                                                        SHA-512:5FC5D889B0C8E5EF464B76F0C4C9E61BDA59B2D1205AC9417CC74D6E9F989FB73D78B4EB3044A1A1E1F2C00CE1CA1BD6D4D07EEADC4108C7B124867711C31810
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:<?xml version="1.0" encoding="utf-8"?>..<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):254
                                                        Entropy (8bit):3.4721586910685547
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:4DD225E2A305B50AF39084CE568B8110
                                                        SHA1:C85173D49FC1522121AA2B0B2E98ADF4BB95B897
                                                        SHA-256:6F00DD73F169C73D425CB9895DAC12387E21C6E4C9C7DDCFB03AC32552E577F4
                                                        SHA-512:0493AB431004191381FF84AD7CC46BD09A1E0FEEC16B3183089AA8C20CC7E491FAE86FE0668A9AC677F435A203E494F5E6E9E4A0571962F6021D6156B288B28A
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .c.h.e.v.r.o.n.a.c.c.e.n.t...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft OOXML
                                                        Category:dropped
                                                        Size (bytes):4243
                                                        Entropy (8bit):7.824383764848892
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:7BC0A35807CD69C37A949BBD51880FF5
                                                        SHA1:B5870846F44CAD890C6EFF2F272A037DA016F0D8
                                                        SHA-256:BD3A013F50EBF162AAC4CED11928101554C511BD40C2488CF9F5842A375B50CA
                                                        SHA-512:B5B785D693216E38B5AB3F401F414CADACCDCB0DCA4318D88FE1763CD3BAB8B7670F010765296613E8D3363E47092B89357B4F1E3242F156750BE86F5F7E9B8D
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK........NnB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........TnB;..d.....h......._rels/.rels...J.0.._%.n..)"....<.w.&.4..!...y.|.........|.&3.o.....S..K.T5g.U....g..n.f....T*.hcf...D.V..Ft....d....c2".z.....N.s._2....7.0.V.]P.CO?...`...8....4&......_i..Y.T...Z...g....{-...]..pH..@.8....}tP.)..B>..A...S&......9..@...7........b_.PK........r};5.z..............diagrams/layout1.xml.X.n.8.}.........4.+.(...@......(..J..._.!)..b..v.}.H..zf8...dhM....E..I.H..V.Y.R..2zw5L~....^..]...J_..4.\.\......8..z..2T..".X.l.F#......5....,*....c....r.kR.I.E..,.2...&%..''.qF.R.2.....T;F...W.. ...3...AR.OR.O..J}.w6..<...,.x..x....`g?.t.I.{.I...|X..g.....<BR..^...Q.6..m.kp...ZuX.?.z.YO.g...$.......'.]..I.#...]$/~`${.
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):332
                                                        Entropy (8bit):3.547857457374301
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:4EC6724CBBA516CF202A6BD17226D02C
                                                        SHA1:E412C574D567F0BA68B4A31EDB46A6AB3546EA95
                                                        SHA-256:18E408155A2C2A24D91CD45E065927FFDA726356AAB115D290A3C1D0B7100402
                                                        SHA-512:DE45011A084AB94BF5B27F2EC274D310CF68DF9FB082E11726E08EB89D5D691EA086C9E0298E16AE7AE4B23753E5916F69F78AAD82F4627FC6F80A6A43D163DB
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .h.a.r.v.a.r.d.a.n.g.l.i.a.2.0.0.8.o.f.f.i.c.e.o.n.l.i.n.e...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):284415
                                                        Entropy (8bit):5.00549404077789
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:33A829B4893044E1851725F4DAF20271
                                                        SHA1:DAC368749004C255FB0777E79F6E4426E12E5EC8
                                                        SHA-256:C40451CADF8944A9625DD690624EA1BA19CECB825A67081E8144AD5526116924
                                                        SHA-512:41C1F65E818C2757E1A37F5255E98F6EDEAC4214F9D189AD09C6F7A51F036768C1A03D6CFD5845A42C455EE189D13BB795673ACE3B50F3E1D77DAFF400F4D708
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:<?xml version="1.0" encoding="utf-8"?>....<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt"......xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">.....<xsl:output method="html" encoding="us-ascii"/>.....<xsl:template match="/">....<xsl:call-template name="Start"/>...</xsl:template>.....<xsl:template name="Start">....<xsl:choose>.....<xsl:when test="b:Version">......<xsl:text>2010.2.02</xsl:text>.....</xsl:when>.......<xsl:when test="b:XslVersion">......<xsl:text>2008</xsl:text>.....</xsl:when>.... <xsl:when test="b:StyleNameLocalized">.. <xsl:choose>.. <xsl:when test="b:StyleNameLocalized/b:Lcid='1033'">.. <xsl:text>Harvard - Anglia</xsl:text>.. </xsl:when>.. <xsl:when test="b:StyleNameLocalized/b:Lcid='1025'">.. <xsl:text>Harvard - Anglia</xsl:text>.. </xsl:when>.. <x
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft OOXML
                                                        Category:dropped
                                                        Size (bytes):1649585
                                                        Entropy (8bit):7.875240099125746
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:35200E94CEB3BB7A8B34B4E93E039023
                                                        SHA1:5BB55EDAA4CDF9D805E36C36FB092E451BDDB74D
                                                        SHA-256:6CE04E8827ABAEA9B292048C5F84D824DE3CEFDB493101C2DB207BD4475AF1FD
                                                        SHA-512:ED80CEE7C22D10664076BA7558A79485AA39BE80582CEC9A222621764DAE5EFA70F648F8E8C5C83B6FE31C2A9A933C814929782A964A47157505F4AE79A3E2F9
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK..........1A..u._....P......[Content_Types].xml..Ms.@.....!...=.7....;a.h.&Y..l..H~..`;...d..g/..e..,M..C...5...#g/."L..;...#. ]..f...w../._.2Y8..X.[..7._.[...K3..#.4......D.]l.?...~.&J&....p..wr-v.r.?...i.d.:o....Z.a|._....|.d...A....A".0.J......nz....#.s.m.......(.]........~..XC..J......+.|...(b}...K!._.D....uN....u..U..b=.^..[...f...f.,...eo..z.8.mz....."..D..SU.}ENp.k.e}.O.N....:^....5.d.9Y.N..5.d.q.^s..}R...._E..D...o..o...o...f.6;s.Z]...Uk6d.j..MW....5[C].f#...l;u.M..Z.../iM|...b...S.....0.zN.... ...>..>..>..>..>..>..>........e...,..7...F(L.....>.ku...i...i...i...i...i...i...i........yi.....G...1.....j...r.Z]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o|^Z....Q}.;.o...9.Z..\.V...............................jZ......k.pT...0.zN.... ...>..>..>..>..>..>..>........e...,..7...f(L.....>.ku...i...i...i...i...i...i...i........yi.......n.....{.._f...0...PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):284
                                                        Entropy (8bit):3.5552837910707304
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:5728F26DF04D174DE9BDFF51D0668E2A
                                                        SHA1:C998DF970655E4AF9C270CC85901A563CFDBCC22
                                                        SHA-256:979DAFD61C23C185830AA3D771EDDC897BEE87587251B84F61776E720ACF9840
                                                        SHA-512:491B36AC6D4749F7448B9A3A6E6465E8D97FB30F33EF5019AF65660E98F4570711EFF5FC31CBB8414AD9355029610E6F93509BC4B2FB6EA79C7CB09069DE7362
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .W.o.o.d._.T.y.p.e...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):256
                                                        Entropy (8bit):3.4842773155694724
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:923D406B2170497AD4832F0AD3403168
                                                        SHA1:A77DA08C9CB909206CDE42FE1543B9FE96DF24FB
                                                        SHA-256:EBF9CF474B25DDFE0F6032BA910D5250CBA2F5EDF9CF7E4B3107EDB5C13B50BF
                                                        SHA-512:A4CD8C74A3F916CA6B15862FCA83F17F2B1324973CCBCC8B6D9A8AEE63B83A3CD880DC6821EEADFD882D74C7EF58FA586781DED44E00E8B2ABDD367B47CE45B7
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .C.o.n.v.e.r.g.i.n.g.T.e.x.t...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                        Category:dropped
                                                        Size (bytes):11380
                                                        Entropy (8bit):7.891971054886943
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:C9F9364C659E2F0C626AC0D0BB519062
                                                        SHA1:C4036C576074819309D03BB74C188BF902D1AE00
                                                        SHA-256:6FC428CA0DCFC27D351736EF16C94D1AB08DDA50CB047A054F37EC028DD08AA2
                                                        SHA-512:173A5E68E55163B081C5A8DA24AE46428E3FB326EBE17AE9588C7F7D7E5E5810BFCF08C23C3913D6BEC7369E06725F50387612F697AC6A444875C01A2C94D0FF
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK.........T.>................[Content_Types].xmlz.........=N.1...b.Eko(.B....(.Pp..=.u.?.....#q..ND.!$.J{.o....G..[Cv.....+.R.Nx..........0."u..S...$&.....Je..B..x......m......M^z....f....|...N..Q..z.!.- .2.9y.i.8j...........0.AE..p.s~@../jw.#8.I.#....4.~Cl.:#h..f.PU.s.~........(.)F..Y......^x..PK.........T.>...V....L......._rels/.rels...J.@.._e..]AD.....x....3.t..T.w.\ZpA<x......v..'....z.........Y..[...<..2.TT....Q$.!.=.....&C....b".F.q.7...X3...7.8.N.}.. ?..8...#..,.L.3.#e...wZpZ.]S..:....t.....{..6.7.|..,dH.e..K 7-}.~.v...5.......b..PK........q.~<.6..9 ...e......diagrams/layout1.xml..r.........{.]..u...xv7b.....HPd....t.q...b.i_a.'..P.f.3..F..1...U.u.*.2......?}..O..V.....yQ.Mf........w.....O....N.........t3;...e....j.^.o&.....w...../.w................e.................O..,./..6...8>^.^..........ru5...\.=>[M?......g..........w.N....i.........iy6.?........>.......>{yT...........x.........-...z5.L./.g......_.l.1.....#...|...pr.q
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):286
                                                        Entropy (8bit):3.4670546921349774
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:3D52060B74D7D448DC733FFE5B92CB52
                                                        SHA1:3FBA3FFC315DB5B70BF6F05C4FF84B52A50FCCBC
                                                        SHA-256:BB980559C6FC38B703D1E9C41720D5CE8D00D2FF86D4F25136DB02B1E54B1518
                                                        SHA-512:952EF139A72562A528C1052F1942DAE1C0509D67654BF5E7C0602C87F90147E8EE9E251D2632BCB5B511AB2FF8A3734293D0A4E3DBD3D187F5E3C042685F9A0C
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .T.h.e.m.e.P.i.c.t.u.r.e.A.l.t.e.r.n.a.t.i.n.g.A.c.c.e.n.t...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                        Category:dropped
                                                        Size (bytes):5630
                                                        Entropy (8bit):7.87271654296772
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:2F8998AA9CF348F1D6DE16EAB2D92070
                                                        SHA1:85B13499937B4A584BEA0BFE60475FD4C73391B6
                                                        SHA-256:8A216D16DEC44E02B9AB9BBADF8A11F97210D8B73277B22562A502550658E580
                                                        SHA-512:F10F7772985EDDA442B9558127F1959FF0A9909C7B7470E62D74948428BFFF7E278739209E8626AE5917FF728AFB8619AE137BEE2A6A4F40662122208A41ABB2
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK...........<..W8...j.......diagrams/layout1.xmlz........]......Hy..{...n .l.:.D.vvW..s....-a..fg&.}.\..+......4M..'=...(._.U]U......_.....U...k}.y.,......C..._^.......w/."7....v..Ea........Q..u..D{..{v.x.]....AtB15u..o...w..o.1...f.L...I<[zk7..7^..,.h.&l3...#..)..'H..d.r.#w=b...Ocw.y.&.v..t.>.s..m^M7..8I?o7................H...b....Qv.;'..%.f..#vR....V.H.),g..`...)(..m...[l...b...,.....U...Q.{.y.y.....G.I.tT.n..N.....A.tR..tr....i.<.......,.n:.#.A..a!X.......DK..;v..._M..lSc../n...v.....}.....I.|8.!b.C..v..|.....4l..n.;<9.i./..}!&2.c/.r...>.X02[..|.a.-.....$#-....>...{.M].>3.,\o.x....X%;.F.k.)*".I8<.0..#......?.h..-..O.2.B.s..v....{Abd...h0....H..I.. ...%...$1.Fyd..Y....U...S.Y.#.V.....TH(....%..nk.3Y.e.m.-.S..Q...j.Ai..E..v......4.t.|..&"...{..4.!.h.....C.P.....W...d[.....U<Yb;B.+W.!.@B....!.=......b"...Y.N;.#..Q...0G.lW...]7:...#9!z......|f..r..x.....t........`.uL1u.:.....U.D.n.<Q.[%...ngC./..|...!..q;;.w.".D..lt.".l.4".mt...E..mt
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):256
                                                        Entropy (8bit):3.464918006641019
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:93149E194021B37162FD86684ED22401
                                                        SHA1:1B31CAEBE1BBFA529092BE834D3B4AD315A6F8F1
                                                        SHA-256:50BE99A154A6F632D49B04FCEE6BCA4D6B3B4B7C1377A31CE9FB45C462D697B2
                                                        SHA-512:410A7295D470EC85015720B2B4AC592A472ED70A04103D200FA6874BEA6A423AF24766E98E5ACAA3A1DBC32C44E8790E25D4611CD6C0DBFFFE8219D53F33ACA7
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .E.q.u.a.t.i.o.n.s...d.o.t.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.W.D. .D.o.c.u.m.e.n.t. .P.a.r.t.s.}.........
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Word 2007+
                                                        Category:dropped
                                                        Size (bytes):51826
                                                        Entropy (8bit):5.541375256745271
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:2AB22AC99ACFA8A82742E774323C0DBD
                                                        SHA1:790F8B56DF79641E83A16E443A75A66E6AA2F244
                                                        SHA-256:BC9D45D0419A08840093B0BF4DCF96264C02DFE5BD295CD9B53722E1DA02929D
                                                        SHA-512:E5715C0ECF35CE250968BD6DE5744D28A9F57D20FD6866E2AF0B2D8C8F80FEDC741D48F554397D61C5E702DA896BD33EED92D778DBAC71E2E98DCFB0912DE07B
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK.........R.@c}LN4...........[Content_Types].xml ...(.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.....D....>.V...f-}..r9....=..Mn..U..5.(.....a...E..b....*..w.$...,O_fu."[P..WU=.;.....5..wdt..y1.......i.44-.r....;./.biG.Cd.n.j.{/......V....c..^^.E.H?H.........B.........<...Ae.l.]..{....mK......B....
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):274
                                                        Entropy (8bit):3.438490642908344
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:0F98498818DC28E82597356E2650773C
                                                        SHA1:1995660972A978D17BC483FCB5EE6D15E7058046
                                                        SHA-256:4587CA0B2A60728FF0A5B8E87D35BF6C6FDF396747E13436EC856612AC1C6288
                                                        SHA-512:768562F20CFE15001902CCE23D712C7439721ECA6E48DDDCF8BFF4E7F12A3BC60B99C274CBADD0128EEA1231DB19808BAA878E825497F3860C381914C21B46FF
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .E.l.e.m.e.n.t. .d.e.s.i.g.n. .s.e.t...d.o.t.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.W.D. .D.o.c.u.m.e.n.t. .P.a.r.t.s.}.........
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Word 2007+
                                                        Category:dropped
                                                        Size (bytes):34415
                                                        Entropy (8bit):7.352974342178997
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:7CDFFC23FB85AD5737452762FA36AAA0
                                                        SHA1:CFBC97247959B3142AFD7B6858AD37B18AFB3237
                                                        SHA-256:68A8FBFBEE4C903E17C9421082E839144C205C559AFE61338CBDB3AF79F0D270
                                                        SHA-512:A0685FD251208B772436E9745DA2AA52BC26E275537688E3AB44589372D876C9ACE14B21F16EC4053C50EB4C8E11787E9B9D922E37249D2795C5B7986497033E
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK.........Y5B#.W ............[Content_Types].xml ...(...................................................................................................................................................................................................................................................................................................................................................................................................................................................`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.....D....>.V...f-}..r9....=..Mn..U..5.(.....a...E..b....*..w.$...,O_fu."[P..WU=.;.....5..wdt..y1.......i.44-.r....;./.biG=.HK...........&o[B....z.7.o...&.......[.oL_7cuN..&e..ccAo...YW......8...Y>.&DVy...-&.*...Y.....4.u.., !po....9W....g..F...*+1....d,'...L.M[-~.Ey. ......[
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):288
                                                        Entropy (8bit):3.523917709458511
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:4A9A2E8DB82C90608C96008A5B6160EF
                                                        SHA1:A49110814D9546B142C132EBB5B9D8A1EC23E2E6
                                                        SHA-256:4FA948EEB075DFCB8DCA773A3F994560C69D275690953625731C4743CD5729F7
                                                        SHA-512:320B9CC860FFBDB0FD2DB7DA7B7B129EEFF3FFB2E4E4820C3FBBFEA64735EB8CFE1F4BB5980302770C0F77FF575825F2D9A8BB59FC80AD4C198789B3D581963B
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .c.h.i.c.a.g.o...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):296658
                                                        Entropy (8bit):5.000002997029767
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:9AC6DE7B629A4A802A41F93DB2C49747
                                                        SHA1:3D6E929AA1330C869D83F2BF8EBEBACD197FB367
                                                        SHA-256:52984BC716569120D57C8E6A360376E9934F00CF31447F5892514DDCCF546293
                                                        SHA-512:5736F14569E0341AFB5576C94B0A7F87E42499CEC5927AAC83BB5A1F77B279C00AEA86B5F341E4215076D800F085D831F34E4425AD9CFD52C7AE4282864B1E73
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:<?xml version="1.0" encoding="utf-8"?>....<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt" xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):252
                                                        Entropy (8bit):3.4680595384446202
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:D79B5DE6D93AC06005761D88783B3EE6
                                                        SHA1:E05BDCE2673B6AA8CBB17A138751EDFA2264DB91
                                                        SHA-256:96125D6804544B8D4E6AE8638EFD4BD1F96A1BFB9EEF57337FFF40BA9FF4CDD1
                                                        SHA-512:34057F7B2AB273964CB086D8A7DF09A4E05D244A1A27E7589BDC7E5679AB5F587FAB52A2261DB22070DA11EF016F7386635A2B8E54D83730E77A7B142C2E3929
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .a.r.c.h.i.t.e.c.t.u.r.e...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft OOXML
                                                        Category:dropped
                                                        Size (bytes):5783
                                                        Entropy (8bit):7.88616857639663
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:8109B3C170E6C2C114164B8947F88AA1
                                                        SHA1:FC63956575842219443F4B4C07A8127FBD804C84
                                                        SHA-256:F320B4BB4E57825AA4A40E5A61C1C0189D808B3EACE072B35C77F38745A4C416
                                                        SHA-512:F8A8D7A6469CD3E7C31F3335DDCC349AD7A686730E1866F130EE36AA9994C52A01545CE73D60B642FFE0EE49972435D183D8CD041F2BB006A6CAF31BAF4924AC
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK.........A;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........pnB;.M.:....g......._rels/.rels...J.0.._%.n....xp..,{.i2M.........G..........7...3o/.......d.kyU....^..[>Q....j.#P.H......Z>..+!...B*|@...G...E....E]..".3.......!..7....,:..,.......Ot..0r....Z..&1..U..p.U-.[Uq&.......................Gyy.}n.(.C(i.x........?.vM..}..%.7.b.>L..]..PK........EV:5K..4....H......diagrams/layout1.xml.Yo.6........S.`......$M...Q8A...R..T.k...K.4CQG..}.A..9.?R....!&...Q..ZW.......Q....<8..z..g....4{d.>..;.{.>.X.....Y.2.......cR....9e.. ...}L.....yv&.&...r..h...._..M. e...[..}.>.k..........3.`.ygN...7.w..3..W.S.....w9....r(....Zb..1....z...&WM.D<......D9...ge......6+.Y....$f......wJ$O..N..FC..Er........?..is...-Z
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):374
                                                        Entropy (8bit):3.5414485333689694
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:2F7A8FE4E5046175500AFFA228F99576
                                                        SHA1:8A3DE74981D7917E6CE1198A3C8E35C7E2100F43
                                                        SHA-256:1495B4EC56B371148EA195D790562E5621FDBF163CDD8A5F3C119F8CA3BD2363
                                                        SHA-512:4B8FBB692D91D88B584E46C2F01BDE0C05DCD5D2FF073D83331586FB3D201EACD777D48DB3751E534E22115AA1C3C30392D0D642B3122F21EF10E3EE6EA3BE82
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .T.e.x.t. .S.i.d.e.b.a.r. .(.A.n.n.u.a.l. .R.e.p.o.r.t. .R.e.d. .a.n.d. .B.l.a.c.k. .d.e.s.i.g.n.)...d.o.c.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Word 2007+
                                                        Category:dropped
                                                        Size (bytes):47296
                                                        Entropy (8bit):6.42327948041841
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:5A53F55DD7DA8F10A8C0E711F548B335
                                                        SHA1:035E685927DA2FECB88DE9CAF0BECEC88BC118A7
                                                        SHA-256:66501B659614227584DA04B64F44309544355E3582F59DBCA3C9463F67B7E303
                                                        SHA-512:095BD5D1ACA2A0CA3430DE2F005E1D576AC9387E096D32D556E4348F02F4D658D0E22F2FC4AA5BF6C07437E6A6230D2ABF73BBD1A0344D73B864BC4813D60861
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK........<dSA4...T...P.......[Content_Types].xml ...(........................................................................................................................................................................................................................................................................................................................................................................................................................................`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`..^\-o..D....n_d.jq...gwg.t........:?/..}..Vu5...rQ..7..X.Q."./g..o....f....YB......<..w?...ss..e.4Y}}...0.Y...........u3V.o..r...5....7bA..Us.z.`.r(.Y>.&DVy.........6.T...e.|..g.%<...9a.&...7...}3:B.......<...!...:..7w...y..
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):242
                                                        Entropy (8bit):3.4938093034530917
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:A6B2731ECC78E7CED9ED5408AB4F2931
                                                        SHA1:BA15D036D522978409846EA682A1D7778381266F
                                                        SHA-256:6A2F9E46087B1F0ED0E847AF05C4D4CC9F246989794993E8F3E15B633EFDD744
                                                        SHA-512:666926612E83A7B4F6259C3FFEC3185ED3F07BDC88D43796A24C3C9F980516EB231BDEA4DC4CC05C6D7714BA12AE2DCC764CD07605118698809DEF12A71F1FDD
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .T.a.b.L.i.s.t...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                        Category:dropped
                                                        Size (bytes):4888
                                                        Entropy (8bit):7.8636569313247335
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:0A4CA91036DC4F3CD8B6DBF18094CF25
                                                        SHA1:6C7EED2530CD0032E9EEAB589AFBC296D106FBB9
                                                        SHA-256:E5A56CCB3B3898F76ABF909209BFAB401B5DDCD88289AD43CE96B02989747E50
                                                        SHA-512:7C69426F2250E8C84368E8056613C22977630A4B3F5B817FB5EA69081CE2A3CA6E5F93DF769264253D5411419AF73467A27F0BB61291CCDE67D931BD0689CB66
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK.........e.>.......]>......diagrams/layout1.xmlz........Z..6....;..{......lw.E.o....i..T....&...G.+...$..(.6..>Y.pf8C.|3.?..m....xA8v.`.hW..@..Zn..(kb..(.......`.+....Y`...\..qh.0.!&w..)|...<..]Q.. _....m..Z.{3..~..5..R..d..A.O....gU.M..0..#...;.>$...T......T..z.Z.\a.+...?#.~.....1.>?...*..DD.1...'..,..(...5B...M..]..>.C..<[....,L.p..Q.v.v^q.Y...5.~^c..5........3.j.......BgJ.nv.. ............tt......Q..p..K....(M.(]@..E..~z.~...8...49.t.Q..Q.n..+.....*J.#J.... .P...P.1...!.#&...?A..&.."..|..D.I...:.....~/.....b..].........nI7.IC.a..%...9.....4...r....b..q....@o........O...y...d@+~.<.\....f.a`:...Qy/^..P....[....@i.I.._.?.X.x.8....)..s....I.0...|.....t...;...q=k.=..N.%!.(.1....B.Ps/."...#.%..&...j<..2x.=<.......s.....h..?..]?Y?...C.}E.O........{..6.d....I...A.....JN..w+....2..m>9.T7...t.6.}.i..f.Ga..t.].->...8U......G.D`......p..f.. ...qT.YX.t.F..X.u=.3r...4....4Q.D..l.6.+PR...+..T..h: H.&.1~....n.....)........2J.. O.W+vd..f....0.....6..9QhV..
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):254
                                                        Entropy (8bit):3.4845992218379616
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:E8B30D1070779CC14FBE93C8F5CF65BE
                                                        SHA1:9C87F7BC66CF55634AB3F070064AAF8CC977CD05
                                                        SHA-256:2E90434BE1F6DCEA9257D42C331CD9A8D06B848859FD4742A15612B2CA6EFACB
                                                        SHA-512:C0D5363B43D45751192EF06C4EC3C896A161BB11DBFF1FC2E598D28C644824413C78AE3A68027F7E622AF0D709BE0FA893A3A3B4909084DF1ED9A8C1B8267FCA
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .H.e.x.a.g.o.n.R.a.d.i.a.l...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft OOXML
                                                        Category:dropped
                                                        Size (bytes):6024
                                                        Entropy (8bit):7.886254023824049
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:20621E61A4C5B0FFEEC98FFB2B3BCD31
                                                        SHA1:4970C22A410DCB26D1BD83B60846EF6BEE1EF7C4
                                                        SHA-256:223EA2602C3E95840232CACC30F63AA5B050FA360543C904F04575253034E6D7
                                                        SHA-512:BDF3A8E3D6EE87D8ADE0767918603B8D238CAE8A2DD0C0F0BF007E89E057C7D1604EB3CCAF0E1BA54419C045FC6380ECBDD070F1BB235C44865F1863A8FA7EEA
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK.........T.>................[Content_Types].xmlz.........=N.1...b.Eko(.B....(.Pp..=.u.?.....#q..ND.!$.J{.o....G..[Cv.....+.R.Nx..........0."u..S...$&.....Je..B..x......m......M^z....f....|...N..Q..z.!.- .2.9y.i.8j...........0.AE..p.s~@../jw.#8.I.#....4.~Cl.:#h..f.PU.s.~........(.)F..Y......^x..PK.........T.>...V....L......._rels/.rels...J.@.._e..]AD.....x....3.t..T.w.\ZpA<x......v..'....z.........Y..[...<..2.TT....Q$.!.=.....&C....b".F.q.7...X3...7.8.N.}.. ?..8...#..,.L.3.#e...wZpZ.]S..:....t.....{..6.7.|..,dH.e..K 7-}.~.v...5.......b..PK........2..<..]#.....'......diagrams/layout1.xml.].r.8...V.;0.;..aO........{.....V..3].d{..............\. .#.t... ........x<...@7o.]..7.N..@.NF..../....S.../.xC..U...<..Q.=...|..v.....cQ..Y=.....i`.. ..?.;...Go....x.O.$....7s..0..qg....|..r..l.w.a..p.3.Em7v...N............3..7...N.\\..f...9...U$..7...k.C..M.@\.s....G/..?...I...t.Yos...p..z...6.lnqi.6..<..1qg+......#]....|C/N..K\}.....#..".
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):280
                                                        Entropy (8bit):3.484503080761839
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:1309D172F10DD53911779C89A06BBF65
                                                        SHA1:274351A1059868E9DEB53ADF01209E6BFBDFADFB
                                                        SHA-256:C190F9E7D00E053596C3477455D1639C337C0BE01012C0D4F12DFCB432F5EC56
                                                        SHA-512:31B38AD2D1FFF93E03BF707811F3A18AD08192F906E36178457306DDAB0C3D8D044C69DE575ECE6A4EE584800F827FB3C769F98EA650F1C208FEE84177070339
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .I.n.t.e.r.c.o.n.n.e.c.t.e.d.B.l.o.c.k.P.r.o.c.e.s.s...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                        Category:dropped
                                                        Size (bytes):9191
                                                        Entropy (8bit):7.93263830735235
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:08D3A25DD65E5E0D36ADC602AE68C77D
                                                        SHA1:F23B6DDB3DA0015B1D8877796F7001CABA25EA64
                                                        SHA-256:58B45B9DBA959F40294DA2A54270F145644E810290F71260B90F0A3A9FCDEBC1
                                                        SHA-512:77D24C272D67946A3413D0BEA700A7519B4981D3B4D8486A655305546CE6133456321EE94FD71008CBFD678433EA1C834CFC147179B31899A77D755008FCE489
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK.........]w>....<...5.......diagrams/layout1.xmlz........].r.F.}......1w`.J..'.......w..Dn. d....~........pw...O.......s...?...p7.t>e.r<.]u.e..d..|8..\uo.......K...._.Y..E6.|..y;........y.*/:o./...:[.o.+/.....?.....Z.?..s..d}...S.`...b.^o9.e.ty9_d...y>M.....7...e....."....<.v.u...e:].N.t....a....0..}..bQ.Y..>.~..~...U.|..Ev.....N...bw....{...O..Y.Y.&........A.8Ik...N.Z.P.[}t........|m...E..v..,..6........_?..."..K<.=x....$..%@.e..%....$=F..G..e........<F..G51..;......=...e.e.q..d......A...&9'.N.\%.=N.Z.9.s......y.4.Q.c......|8.......Eg.:.ky.z.h.......).O...mz...N.wy.m...yv....~8.?Lg..o.l.y:.....z.i..j.irxI.w...r.......|.=....s};.\u.{t;i~S.......U7..mw...<.vO...M.o...W.U.....}.`V<|..%....l..`>]..".].I.i.N..Z..~Lt.........}?..E~:..>$......x...%.........N....'C.m.=...w.=.Y...+'M.].2 >.]_~...'.?...:....z.O..Y......6..5...sj?.....).B..>.3...G...p.9.K!..[H..1$v../...E V..?`....+[...C......h..!.QI5....<.>...A.d.......
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):246
                                                        Entropy (8bit):3.5039994158393686
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:16711B951E1130126E240A6E4CC2E382
                                                        SHA1:8095AA79AEE029FD06428244CA2A6F28408448DB
                                                        SHA-256:855342FE16234F72DA0C2765455B69CF412948CFBE70DE5F6D75A20ACDE29AE9
                                                        SHA-512:454EAA0FD669489583C317699BE1CE5D706C31058B08CF2731A7621FDEFB6609C2F648E02A7A4B2B3A3DFA8406A696D1A6FA5063DDA684BDA4450A2E9FEFB0EF
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .T.a.b.b.e.d.A.r.c...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                        Category:dropped
                                                        Size (bytes):3683
                                                        Entropy (8bit):7.772039166640107
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:E8308DA3D46D0BC30857243E1B7D330D
                                                        SHA1:C7F8E54A63EB254C194A23137F269185E07F9D10
                                                        SHA-256:6534D4D7EF31B967DD0A20AFFF092F8B93D3C0EFCBF19D06833F223A65C6E7C4
                                                        SHA-512:88AB7263B7A8D7DDE1225AE588842E07DF3CE7A07CBD937B7E26DA7DA7CFED23F9C12730D9EF4BC1ACF26506A2A96E07875A1A40C2AD55AD1791371EE674A09B
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK.........a9;lq.ri...#.......diagrams/layout1.xmlz........WKn.0.];.`..J..AP...4E..!..hi$..I......z..D.d;...m.d...f.3o.._....9'.P.I1.F.C...d.D:.........Q..Z..5$..BO...e..(.9..2..+.Tsjp.. Vt.f.<...gA.h...8...>..p4..T...9.c...'.G.;.@.;xKE.A.uX.....1Q...>...B...!T.%.* ...0.....&......(.R.u..BW.yF.Grs...)..$..p^.s.c._..F4.*. .<%.BD..E....x... ..@...v.7f.Y......N.|.qW'..m..........im.?.64w..h...UI...J....;.0..[....G..\...?:.7.0.fGK.C.o^....j4............p...w:...V....cR..i...I...J=...%. &..#..[M....YG...u...I)F.l>.j.....f..6.....2.]..$7.....Fr..o.0...l&..6U...M..........%..47.a.[..s........[..r....Q./}.-.(.\..#. ..y`...a2..*....UA.$K.nQ:e!bB.H.-Q-a.$La.%.Z!...6L...@...j.5.....b..S.\c..u...R..dXWS.R.8"....o[..V...s0W..8:...U.#5..hK....ge.Q0$>...k.<...YA.g..o5...3.....~re.....>....:..$.~........pu ._Q..|Z...r...E.X......U....f)s^.?...%......459..XtL:M.).....x..n9..h...c...PK........Ho9<"..%...........diagrams/layoutHeader1.xmlMP.N.0.>oOa.
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft OOXML
                                                        Category:dropped
                                                        Size (bytes):4026
                                                        Entropy (8bit):7.809492693601857
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:5D9BAD7ADB88CEE98C5203883261ACA1
                                                        SHA1:FBF1647FCF19BCEA6C3CF4365C797338CA282CD2
                                                        SHA-256:8CE600404BB3DB92A51B471D4AB8B166B566C6977C9BB63370718736376E0E2F
                                                        SHA-512:7132923869A3DA2F2A75393959382599D7C4C05CA86B4B27271AB9EA95C7F2E80A16B45057F4FB729C9593F506208DC70AF2A635B90E4D8854AC06C787F6513D
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK........YnB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........bnB;?.......f......._rels/.rels...J.1.._%..f....m/.,x...&.lt.dV.y.|.."v....q..|......r..F..)..;.T5g.eP..O..Z.^-.8...<.Y....Q.."....*D.%.!9.R&#".'0(.u}).!..l....b..J..rr....P.L.w..0.-......A..w..x.7U...Fu<mT.....^s...F./ ..( .4L..`.....}...O..4.L...+H.z...m..j[].=........oY}.PK........J.L6...m....,.......diagrams/layout1.xml.X.n.8.}N.....PG.............wZ.,.R.%.K...J.H]....y.3..9...O..5."J.1.\.1....Q....z......e.5].)...$b.C)...Gx!...J3..N..H...s....9.~...#..$...W.8..I`|..0xH}......L.|..(V;..1...kF..O=...j...G.X.....T.,d>.w.Xs.......3L.r..er\o..D..^....O.F.{:.>.R'....Y-...B.P.;....X.'c...{x*.M7..><l.1.w..{].46.>.z.E.J.......G......Hd..$..7....E.
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):250
                                                        Entropy (8bit):3.4916022431157345
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:1A314B08BB9194A41E3794EF54017811
                                                        SHA1:D1E70DB69CA737101524C75E634BB72F969464FF
                                                        SHA-256:9025DD691FCAD181D5FD5952C7AA3728CD8A2CAF20DEA14930876419BED9B379
                                                        SHA-512:AB29C8674A85711EABAE5F9559E9048FE91A2F51EB12D5A46152A310DE59F759DF8C617DA248798A7C20F60E26FBB1B0FC8DB47C46B098BCD26CF8CE78989ACA
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .B.r.a.c.k.e.t.L.i.s.t...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):286
                                                        Entropy (8bit):3.5502940710609354
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:9B8D7EFE8A69E41CDC2439C38FE59FAF
                                                        SHA1:034D46BEC5E38E20E56DD905E2CA2F25AF947ED1
                                                        SHA-256:70042F1285C3CD91DDE8D4A424A5948AE8F1551495D8AF4612D59709BEF69DF2
                                                        SHA-512:E50BB0C68A33D35F04C75F05AD4598834FEC7279140B1BB0847FF39D749591B8F2A0C94DA4897AAF6C33C50C1D583A836B0376015851910A77604F8396C7EF3C
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .i.s.o.6.9.0...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):270198
                                                        Entropy (8bit):5.073814698282113
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:FF0E07EFF1333CDF9FC2523D323DD654
                                                        SHA1:77A1AE0DD8DBC3FEE65DD6266F31E2A564D088A4
                                                        SHA-256:3F925E0CC1542F09DE1F99060899EAFB0042BB9682507C907173C392115A44B5
                                                        SHA-512:B4615F995FAB87661C2DBE46625AA982215D7BDE27CAFAE221DCA76087FE76DA4B4A381943436FCAC1577CB3D260D0050B32B7B93E3EB07912494429F126BB3D
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:<?xml version="1.0" encoding="utf-8"?>..<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):258
                                                        Entropy (8bit):3.4692172273306268
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:C1B36A0547FB75445957A619201143AC
                                                        SHA1:CDB0A18152F57653F1A707D39F3D7FB504E244A7
                                                        SHA-256:4DFF7D1CEF6DD85CC73E1554D705FA6586A1FBD10E4A73EEE44EAABA2D2FFED9
                                                        SHA-512:0923FB41A6DB96C85B44186E861D34C26595E37F30A6F8E554BD3053B99F237D9AC893D47E8B1E9CF36556E86EFF5BE33C015CBBDD31269CDAA68D6947C47F3F
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .p.i.c.t.u.r.e.o.r.g.c.h.a.r.t...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft OOXML
                                                        Category:dropped
                                                        Size (bytes):7370
                                                        Entropy (8bit):7.9204386289679745
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:586CEBC1FAC6962F9E36388E5549FFE9
                                                        SHA1:D1EF3BF2443AE75A78E9FDE8DD02C5B3E46F5F2E
                                                        SHA-256:1595C0C027B12FE4C2B506B907C795D14813BBF64A2F3F6F5D71912D7E57BC40
                                                        SHA-512:68DEAE9C59EA98BD597AE67A17F3029BC7EA2F801AC775CF7DECA292069061EA49C9DF5776CB5160B2C24576249DAF817FA463196A04189873CF16EFC4BEDC62
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK........;nB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........HnB;..I)....j......._rels/.rels...J.@.._e..&6E.i/.,x..Lw'.j........G..\...................)...Y.3)..`...9r{v!......z...#>5.g.WJ%..T..>'m ..K.T.....j6[(:f.)S....C.mk5^.=:...X......C.... I......&5..e..H.1...).P.cw.kjT......C.......=.....}G!7E.y$.(...}b.........b=.<..^.....U..Y..PK.........^5a.2u............diagrams/layout1.xml..ko.8..+x.t.l..J.n.t.Mnw.x. ....B.t$.,.(&i.....(..d.mY......g.../[.<!.{ap>...L...p....G.9z?...._...e..`..%......8....G!..B8.....o...b.......Q.>|.......g..O\B...i.h...0B.}.....z...k...H..t~r.v........7o.E....$....Z.........ZDd..~......>......O.3.SI.Y.".O&I....#."._c.$.r..z.g0`...0...q:...^0.EF...%(.Ao$.#.o6..c'....$%.}
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):264
                                                        Entropy (8bit):3.4866056878458096
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:6C489D45F3B56845E68BE07EA804C698
                                                        SHA1:C4C9012C0159770CB882870D4C92C307126CEC3F
                                                        SHA-256:3FE447260CDCDEE287B8D01CF5F9F53738BFD6AAEC9FB9787F2826F8DEF1CA45
                                                        SHA-512:D1355C48A09E7317773E4F1613C4613B7EA42D21F5A6692031D288D69D47B19E8F4D5A29AFD8B751B353FC7DE865EAE7CFE3F0BEC05F33DDF79526D64A29EB18
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .T.h.e.m.e.P.i.c.t.u.r.e.A.c.c.e.n.t...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                        Category:dropped
                                                        Size (bytes):6448
                                                        Entropy (8bit):7.897260397307811
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:42A840DC06727E42D42C352703EC72AA
                                                        SHA1:21AAAF517AFB76BF1AF4E06134786B1716241D29
                                                        SHA-256:02CCE7D526F844F70093AC41731D1A1E9B040905DCBA63BA8BFFC0DBD4D3A7A7
                                                        SHA-512:8886BFD240D070237317352DEB3D46C6B07E392EBD57730B1DED016BD8740E75B9965F7A3FCD43796864F32AAE0BE911AB1A670E9CCC70E0774F64B1BDA93488
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK.........k.>........'......diagrams/layout1.xmlz........].r.8.}.V.?p.n....g*5..JUn.....(SU......T.l.......X.d."m."..S....F..P.........-..<Y^..=..e.L....m>.pG.....M~...+\....u}o...".Yn}Y.".-r......0...'/........{........F.~.M8.d....(.....q.D.....4\.;.D,.\.)n.S....Z.cl.|<..7._.dk..7..E.......kS...d.....i.....noX...o.W#9..}.^..I0....G.......+.K.[i.O.|G..8=.;.8.8.8.8.....{..-..^.y..[.....`...0..f...Q<^~..*.l....{...pA.z.$.$R.../...E.(..Q.(V.E_ ......X]Q..Y9.......>...8......l..--.ug.......I.;..].u.b.3Lv:.d.%H..l<...V...$.M..A>...^M./.[..I....o~,.U. .$d\..?........O.;..^M..O...A.$Yx..|f.n...H.=.|!cG)dd%..(... ..Xe......2B."i...n....P.R..E?... Y.I6...7n..Xs..J..K..'..JaU..d..|.(y.a.....d......D.Dr...._.._..m..Yu..6.o.\......&.m....wy...4k?..~........f....0.. \...}iS.i..R....q-#_..g........{Z.u.V.r(....j.I...,R..f.=.n.[.'..L'd.n C.0.I.....RpaV........c.k..NR....)B^k...d.i...d0.E. ^..G.']....x.c.>'..p...y.ny.P.x6..%.J\.....De.B\.
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):302
                                                        Entropy (8bit):3.537169234443227
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:9C00979164E78E3B890E56BE2DF00666
                                                        SHA1:1FA3C439D214C34168ADF0FBA5184477084A0E51
                                                        SHA-256:21CCB63A82F1E6ACD6BAB6875ABBB37001721675455C746B17529EE793382C7B
                                                        SHA-512:54AC8732C2744B60DA744E54D74A2664658E4257A136ABE886FF21585E8322E028D8243579D131EF4E9A0ABDDA70B4540A051C8B8B60D65C3EC0888FD691B9A7
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .i.s.o.6.9.0.n.m.e.r.i.c.a.l...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):217137
                                                        Entropy (8bit):5.068335381017074
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:3BF8591E1D808BCCAD8EE2B822CC156B
                                                        SHA1:9CC1E5EFD715BD0EAE5AF983FB349BAC7A6D7BA0
                                                        SHA-256:7194396E5C833E6C8710A2E5D114E8E24338C64EC9818D51A929D57A5E4A76C8
                                                        SHA-512:D434A4C15DA3711A5DAAF5F7D0A5E324B4D94A04B3787CA35456BFE423EAC9D11532BB742CDE6E23C16FA9FD203D3636BD198B41C7A51E7D3562D5306D74F757
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:<?xml version="1.0" encoding="utf-8"?>..<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..........<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>...... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$parame
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):262
                                                        Entropy (8bit):3.4901887319218092
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:52BD0762F3DC77334807DDFC60D5F304
                                                        SHA1:5962DA7C58F742046A116DDDA5DC8EA889C4CB0E
                                                        SHA-256:30C20CC835E912A6DD89FD1BF5F7D92B233B2EC24594F1C1FE0CADB03A8C3FAB
                                                        SHA-512:FB68B1CF9677A00D5651C51EC604B61DAC2D250D44A71D43CD69F41F16E4F0A7BAA7AD4A6F7BB870429297465A893013BBD7CC77A8F709AD6DB97F5A0927B1DD
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .R.a.d.i.a.l.P.i.c.t.u.r.e.L.i.s.t...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft OOXML
                                                        Category:dropped
                                                        Size (bytes):5596
                                                        Entropy (8bit):7.875182123405584
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:CDC1493350011DB9892100E94D5592FE
                                                        SHA1:684B444ADE2A8DBE760B54C08F2D28F2D71AD0FA
                                                        SHA-256:F637A67799B492FEFFB65632FED7815226396B4102A7ED790E0D9BB4936E1548
                                                        SHA-512:3699066A4E8A041079F12E88AB2E7F485E968619CB79175267842846A3AD64AA8E7778CBACDF1117854A7FDCFB46C8025A62F147C81074823778C6B4DC930F12
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK.........T.>................[Content_Types].xmlz.........=N.1...b.Eko(.B....(.Pp..=.u.?.....#q..ND.!$.J{.o....G..[Cv.....+.R.Nx..........0."u..S...$&.....Je..B..x......m......M^z....f....|...N..Q..z.!.- .2.9y.i.8j...........0.AE..p.s~@../jw.#8.I.#....4.~Cl.:#h..f.PU.s.~........(.)F..Y......^x..PK.........T.>...V....L......._rels/.rels...J.@.._e..]AD.....x....3.t..T.w.\ZpA<x......v..'....z.........Y..[...<..2.TT....Q$.!.=.....&C....b".F.q.7...X3...7.8.N.}.. ?..8...#..,.L.3.#e...wZpZ.]S..:....t.....{..6.7.|..,dH.e..K 7-}.~.v...5.......b..PK.........V.<.S.....Y.......diagrams/layout1.xml.\.r.8...U....m.$.."3.....;...../3.XAn..O.?....V.;...")Nr.O.H....O......_..E..S...L7....8H.y<=............~...Ic......v9.X.%.\.^.,?g.v.?%w...f.).9.........Ld;.1..?~.%QQ...h.8;.gy..c4..]..0Ii.K&.[.9.......E4B.a..?e.B..4....E.......Y.?_&!.....i~..{.W..b....L.?..L..@.F....c.H..^..i...(d.......w...9..9,........q..%[..]K}.u.k..V.%.Y.....W.y..;e4[V..u.!T...).%.
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):238
                                                        Entropy (8bit):3.472155835869843
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:2240CF2315F2EB448CEA6E9CE21B5AC5
                                                        SHA1:46332668E2169E86760CBD975FF6FA9DB5274F43
                                                        SHA-256:0F7D0BD5A8CED523CFF4F99D7854C0EE007F5793FA9E1BA1CD933B0894BFBD0D
                                                        SHA-512:10BA73FF861112590BF135F4B337346F9D4ACEB10798E15DC5976671E345BC29AC8527C6052FEC86AA7058E06D1E49052E49D7BCF24A01DB259B5902DB091182
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .r.i.n.g.s...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft OOXML
                                                        Category:dropped
                                                        Size (bytes):5151
                                                        Entropy (8bit):7.859615916913808
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:6C24ED9C7C868DB0D55492BB126EAFF8
                                                        SHA1:C6D96D4D298573B70CF5C714151CF87532535888
                                                        SHA-256:48AF17267AD75C142EFA7AB7525CA48FAB579592339FB93E92C4C4DA577D4C9F
                                                        SHA-512:A3E9DC48C04DC8571289F57AE790CA4E6934FBEA4FDDC20CB780F7EA469FE1FC1D480A1DBB04D15301EF061DA5700FF0A793EB67D2811C525FEF618B997BCABD
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK.........nB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........5nB;.ndX....`......._rels/.rels...J.1.._%..f.J.J..x..AJ.2M&......g..#............|.c..x{_._..^0e.|.gU..z.....#.._..[..JG.m.....(...e..r."....P)....3..M].E:..SO.;D..c..J..rt...c.,.....a.;.....$.../5..D.Ue.g...Q3......5.':...@...~t{.v..QA>.P.R.A~..^AR.S4G......].n...x41....PK.........^5..s.V....Z......diagrams/layout1.xml.[]o.F.}N~..S.......VU.U+m6R........&.d.}...{M....Q.S....p9.'./O..z."..t>q....."[..j>y..?...u....[.}..j-...?Y..Bdy.I./.....0.._.....-.s...rj...I..=..<..9.|>YK.....o.|.my.F.LlB..be/E.Y!.$6r.f/.p%.......U....e..W.R..fK....`+?.rwX.[.b..|..O>o.|.....>1.......trN`7g..Oi.@5..^...]4.r...-y...T.h...[.j1..v....G..........nS..m..E"L...s
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):260
                                                        Entropy (8bit):3.4895685222798054
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:63E8B0621B5DEFE1EF17F02EFBFC2436
                                                        SHA1:2D02AD4FD9BF89F453683B7D2B3557BC1EEEE953
                                                        SHA-256:9243D99795DCDAD26FA857CB2740E58E3ED581E3FAEF0CB3781CBCD25FB4EE06
                                                        SHA-512:A27CDA84DF5AD906C9A60152F166E7BD517266CAA447195E6435997280104CBF83037F7B05AE9D4617323895DCA471117D8C150E32A3855156CB156E15FA5864
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .V.a.r.y.i.n.g.W.i.d.t.h.L.i.s.t...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft OOXML
                                                        Category:dropped
                                                        Size (bytes):3075
                                                        Entropy (8bit):7.716021191059687
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:67766FF48AF205B771B53AA2FA82B4F4
                                                        SHA1:0964F8B9DC737E954E16984A585BDC37CE143D84
                                                        SHA-256:160D05B4CB42E1200B859A2DE00770A5C9EBC736B70034AFC832A475372A1667
                                                        SHA-512:AC28B0B4A9178E9B424E5893870913D80F4EE03D595F587AA1D3ACC68194153BAFC29436ADFD6EA8992F0B00D17A43CFB42C529829090AF32C3BE591BD41776D
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK.........nB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK.........nB;O.......k......._rels/.rels...J.@.._e..4...i/.,x..Lw'....v'.<....WpQ..,......7?....u.y..;bL../..3t.+.t.G....Y.v8.eG.MH,....(\..d..R....t>Z.<F-..G.(..\.x...l?..M..:#........2.#.[..H7..#g{...._j...(.....q......;.5'..Nt..."...A.h........>....\.'...L..D..DU<.....C.TKu.5Tu....bV..;PK.........C26.b..............diagrams/layout1.xml.T.n. .}N....).je./m.+u....`{..0P......p..U}c.9g..3....=h.(.."..D-.&....~.....y..I...(r.aJ.Y..e..;.YH...P.{b......hz.-..>k.i5..z>.l...f...c..Y...7.ND...=.%..1...Y.-.o.=)(1g.{.".E.>2.=...]Y..r0.Q...e.E.QKal,.....{f...r..9-.mH..C..\.w....c.4.JUbx.p Q...R......_...G.F...uPR...|um.+g..?..C..gT...7.0.8l$.*.=qx.......-8..8.
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):314
                                                        Entropy (8bit):3.5230842510951934
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:F25AC64EC63FA98D9E37782E2E49D6E6
                                                        SHA1:97DD9CFA4A22F5B87F2B53EFA37332A9EF218204
                                                        SHA-256:834046A829D1EA836131B470884905856DBF2C3C136C98ADEEFA0F206F38F8AB
                                                        SHA-512:A0387239CDE98BCDE1668B582B046619C3B3505F9440343DAD22B1B7B9E05F3B74F2AE29E591EC37B6570A0C0E5FE571442873594B0684DDCCB4F6A1B5E10B1F
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .i.e.e.e.2.0.0.6.o.f.f.i.c.e.o.n.l.i.n.e...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):294178
                                                        Entropy (8bit):4.977758311135714
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:0C9731C90DD24ED5CA6AE283741078D0
                                                        SHA1:BDD3D7E5B0DE9240805EA53EF2EB784A4A121064
                                                        SHA-256:ABCE25D1EB3E70742EC278F35E4157EDB1D457A7F9D002AC658AAA6EA4E4DCDF
                                                        SHA-512:A39E6201D6B34F37C686D9BD144DDD38AE212EDA26E3B81B06F1776891A90D84B65F2ABC5B8F546A7EFF3A62D35E432AF0254E2F5BFE4AA3E0CF9530D25949C0
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:<?xml version="1.0" encoding="utf-8"?>....<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt"......xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">.....<xsl:output method="html" encoding="us-ascii"/>.....<xsl:template match="/">....<xsl:call-template name="Start"/>...</xsl:template>.....<xsl:template name="Start">....<xsl:choose>.....<xsl:when test="b:Version">......<xsl:text>2010.2.02</xsl:text>.....</xsl:when>.......<xsl:when test="b:XslVersion">......<xsl:text>2006</xsl:text>.....</xsl:when>.. <xsl:when test="b:StyleNameLocalized">.. <xsl:choose>.. <xsl:when test="b:StyleNameLocalized/b:Lcid='1033'">.. <xsl:text>IEEE</xsl:text>.. </xsl:when>.. <xsl:when test="b:StyleNameLocalized/b:Lcid='1025'">.. <xsl:text>IEEE</xsl:text>.. </xsl:when>.. <xsl:when test="b:StyleNameL
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):252
                                                        Entropy (8bit):3.48087342759872
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:69757AF3677EA8D80A2FBE44DEE7B9E4
                                                        SHA1:26AF5881B48F0CB81F194D1D96E3658F8763467C
                                                        SHA-256:0F14CA656CDD95CAB385F9B722580DDE2F46F8622E17A63F4534072D86DF97C3
                                                        SHA-512:BDA862300BAFC407D662872F0BFB5A7F2F72FE1B7341C1439A22A70098FA50C81D450144E757087778396496777410ADCE4B11B655455BEDC3D128B80CFB472A
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .P.i.c.t.u.r.e.F.r.a.m.e...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft OOXML
                                                        Category:dropped
                                                        Size (bytes):4326
                                                        Entropy (8bit):7.821066198539098
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:D32E93F7782B21785424AE2BEA62B387
                                                        SHA1:1D5589155C319E28383BC01ED722D4C2A05EF593
                                                        SHA-256:2DC7E71759D84EF8BB23F11981E2C2044626FEA659383E4B9922FE5891F5F478
                                                        SHA-512:5B07D6764A6616A7EF25B81AB4BD4601ECEC1078727BFEAB4A780032AD31B1B26C7A2306E0DBB5B39FC6E03A3FC18AD67C170EA9790E82D8A6CEAB8E7F564447
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK.........n.A...#............docProps/thumbnail.jpgz.........{4.i....1.n.v)..#.\*....A+..Q(."..D.......#Q)...SQ....2c.ei.JC...N.{......}.s.s..y>....d.(:.;.....q........$.OBaPbI..(.V...o.....'..b..edE.J.+.....".tq..dqX.......8...CA.@..........0.G.O.$Ph...%i.Q.CQ.>.%!j..F..."?@.1J.Lm$..`..*oO...}..6......(%....^CO..p......-,.....w8..t.k.#....d..'...O...8....s1....z.r...rr...,(.)...*.]Q]S.{X.SC{GgWw..O....X./FF9._&..L.....[z..^..*....C...qI.f... .Hq....d*.d..9.N{{.N.6..6)..n<...iU]3.._.....%./.?......(H4<.....}..%..Z..s...C@.d>.v...e.'WGW.....J..:....`....n..6.....]W~/.JX.Qf..^...}...._Sg.-.p..a..C_:..F..E.....k.H..........-Bl$._5...B.w2e...2...c2/y3.U...7.8[.S}H..r/..^...g...|...l..\M..8p$]..poX-/.2}..}z\.|.d<T.....1....2...{P...+Y...T...!............p..c.....D..o..%.d.f.~.;.;=4.J..]1"("`......d.0.....L.f0.l..r8..M....m,.p..Y.f....\2.q. ...d9q....P...K..o!..#o...=.........{.p..l.n...........&..o...!J..|)..q4.Z.b..PP....U.K..|.i.$v
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft OOXML
                                                        Category:dropped
                                                        Size (bytes):486596
                                                        Entropy (8bit):7.668294441507828
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:0E37AECABDB3FDF8AAFEDB9C6D693D2F
                                                        SHA1:F29254D2476DF70979F723DE38A4BF41C341AC78
                                                        SHA-256:7AC7629142C2508B070F09788217114A70DE14ACDB9EA30CBAB0246F45082349
                                                        SHA-512:DE6AFE015C1D41737D50ADD857300996F6E929FED49CB71BC59BB091F9DAB76574C56DEA0488B0869FE61E563B07EBB7330C8745BC1DF6305594AC9BDEA4A6BF
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK.........V'BE,.{....#P......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`.../.|u1..Y.....nK.......u=..2.tu~^L.Y5]/...~+.v...o....j.`?.S...../.by.|..>."kZbs....H.9..m.z.]W.V.?~v........;...N.......w....;.z..N.......w.....R.~n..Ofu.-..K.e....{..A.~.8.#D..)o.7..........:2........=......f...u....[..}...u.6b...xz.[...G..|#...$....)J./.......7.............oQ..]^.M........wy}7a.....&l................w.......l._...l..?.A..........r..9.|.8.........{w...........n...]^.M........wy}7a.....&l.................`..z..`.....2.o...wx}.....>..c.M..Arr#.....nD..[.....w......n...]^.M........wy}7a.....&l........w........... ..Fp....w_Q....g..tL.i.?H.o...]^..........n...]^.M........wy}7a.....&l.................`..z..`
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):274
                                                        Entropy (8bit):3.535303979138867
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:35AFE8D8724F3E19EB08274906926A0B
                                                        SHA1:435B528AAF746428A01F375226C5A6A04099DF75
                                                        SHA-256:97B8B2E246E4DAB15E494D2FB5F8BE3E6361A76C8B406C77902CE4DFF7AC1A35
                                                        SHA-512:ACF4F124207974CFC46A6F4EA028A38D11B5AF40E55809E5B0F6F5DABA7F6FC994D286026FAC19A0B4E2311D5E9B16B8154F8566ED786E5EF7CDBA8128FD62AF
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .V.i.e.w...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft OOXML
                                                        Category:dropped
                                                        Size (bytes):777647
                                                        Entropy (8bit):7.689662652914981
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:B30D2EF0FC261AECE90B62E9C5597379
                                                        SHA1:4893C5B9BE04ECBB19EE45FFCE33CA56C7894FE3
                                                        SHA-256:BB170D6DE4EE8466F56C93DC26E47EE8A229B9C4842EA8DD0D9CCC71BC8E2976
                                                        SHA-512:2E728408C20C3C23C84A1C22DB28F0943AAA960B4436F8C77570448D5BEA9B8D53D95F7562883FA4F9B282DFE2FD07251EEEFDE5481E49F99B8FEDB66AAAAB68
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK.........V'B.._<....-.......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`.../.|u1..Y.....nK.......u=..2.tu~^L.Y5]/...~+.v...o....j.`?.S...../.by.|..>."kZbs....H.9..m.z.]W.V.?~v........;...N.......w....;.z..N.......w.....R.~n..Ofu.-..K.e....{..A.~.8.#D..)o.7..........:2........=......f...u....[..}...u.6b...xz.[...G..|#...$....)J./.......7.............oQ..]^.M........wy}7a.....&l................w.......l._...l..?.A..........r..9.|.8.........{w...........n...]^.M........wy}7a.....&l.................`..z..`.....2.o...wx}.....>..c.M..Arr#.....nD..[.....w......n...]^.M........wy}7a.....&l........w........... ..Fp....w_Q....g..tL.i.?H.o...]^..........n...]^.M........wy}7a.....&l.................`..z..`
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):290
                                                        Entropy (8bit):3.5091498509646044
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:23D59577F4AE6C6D1527A1B8CDB9AB19
                                                        SHA1:A345D683E54D04CC0105C4BFFCEF8C6617A0093D
                                                        SHA-256:9ADD2C3912E01C2AC7FAD6737901E4EECBCCE6EC60F8E4D78585469A440E1E2C
                                                        SHA-512:B85027276B888548ECB8A2FC1DB1574C26FF3FCA7AF1F29CD5074EC3642F9EC62650E7D47462837607E11DCAE879B1F83DF4762CA94667AE70CBF78F8D455346
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .M.e.t.r.o.p.o.l.i.t.a.n...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft OOXML
                                                        Category:dropped
                                                        Size (bytes):558035
                                                        Entropy (8bit):7.696653383430889
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:3B5E44DDC6AE612E0346C58C2A5390E3
                                                        SHA1:23BCF3FCB61F80C91D2CFFD8221394B1CB359C87
                                                        SHA-256:9ED9AD4EB45E664800A4876101CBEE65C232EF478B6DE502A330D7C89C9AE8E2
                                                        SHA-512:2E63419F272C6E411CA81945E85E08A6E3230A2F601C4D28D6312DB5C31321F94FAFA768B16BC377AE37B154C6869CA387005693A79C5AB1AC45ED73BCCC6479
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK..........1AE,.{E...#P......[Content_Types].xml..Mo.0.....Z..N7.=l......V0.-o..j?...H..sa......./UCb.'...r...w.i..e..<[....{2..U.m..N.{...r.....3.fj.o......2.*....;.L.6..&,D.Cld8...a.gZf.......r-v..><....~/......|Zk.......a.R&.d.(.$..6..}.:.....3......1..[.p.....?..+....R...y,.fod.....e...-.|..#..]j....n:...f...-J...i.^.:Y....T..........m^..~GNp../e}...N....a..5.d.8YcN..5.d.8Y...7..A..e...7Q."3...../.sL._...v...n..b..2].v....n.t....Z...Uk...j.&.Z....im|.r....B.....7DaBuN.... ...>..>..>..>..>..>..>.........V}-.....Q}#.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7FaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}..&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7EaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}3.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b.\}..)...A.......[..PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...........84P....
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):276
                                                        Entropy (8bit):3.5361139545278144
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:133D126F0DE2CC4B29ECE38194983265
                                                        SHA1:D8D701298D7949BE6235493925026ED405290D43
                                                        SHA-256:08485EBF168364D846C6FD55CD9089FE2090D1EE9D1A27C1812E1247B9005E68
                                                        SHA-512:75D7322BE8A5EF05CAA48B754036A7A6C56399F17B1401F3F501DA5F32B60C1519F2981043A773A31458C3D9E1EF230EC60C9A60CAC6D52FFE16147E2E0A9830
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .B.a.s.i.s...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft OOXML
                                                        Category:dropped
                                                        Size (bytes):570901
                                                        Entropy (8bit):7.674434888248144
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:D676DE8877ACEB43EF0ED570A2B30F0E
                                                        SHA1:6C8922697105CEC7894966C9C5553BEB64744717
                                                        SHA-256:DF012D101DE808F6CD872DFBB619B16732C23CF4ABC64149B6C3CE49E9EFDA01
                                                        SHA-512:F40BADA680EA5CA508947290BA73901D78DE79EAA10D01EAEF975B80612D60E75662BDA542E7F71C2BBA5CA9BA46ECAFE208FD6E40C1F929BB5E407B10E89FBD
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK..........1AE,.{E...#P......[Content_Types].xml..Mo.0.....Z..N7.=l......V0.-o..j?...H..sa......./UCb.'...r...w.i..e..<[....{2..U.m..N.{...r.....3.fj.o......2.*....;.L.6..&,D.Cld8...a.gZf.......r-v..><....~/......|Zk.......a.R&.d.(.$..6..}.:.....3......1..[.p.....?..+....R...y,.fod.....e...-.|..#..]j....n:...f...-J...i.^.:Y....T..........m^..~GNp../e}...N....a..5.d.8YcN..5.d.8Y...7..A..e...7Q."3...../.sL._...v...n..b..2].v....n.t....Z...Uk...j.&.Z....im|.r....B.....7DaBuN.... ...>..>..>..>..>..>..>.........V}-.....Q}#.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7FaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}..&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7EaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}3.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b.\}..)...A.......[..PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...........84P....
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):282
                                                        Entropy (8bit):3.5459495297497368
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:76340C3F8A0BFCEDAB48B08C57D9B559
                                                        SHA1:E1A6672681AA6F6D525B1D17A15BF4F912C4A69B
                                                        SHA-256:78FE546321EDB34EBFA1C06F2B6ADE375F3B7C12552AB2A04892A26E121B3ECC
                                                        SHA-512:49099F040C099A0AED88E7F19338140A65472A0F95ED99DEB5FA87587E792A2D11081D59FD6A83B7EE68C164329806511E4F1B8D673BEC9074B4FF1C09E3435D
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .D.i.v.i.d.e.n.d...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft OOXML
                                                        Category:dropped
                                                        Size (bytes):608122
                                                        Entropy (8bit):7.729143855239127
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:8BA551EEC497947FC39D1D48EC868B54
                                                        SHA1:02FA15FDAF0D7E2F5D44CAE5FFAE49E8F91328DF
                                                        SHA-256:DB2E99B969546E431548EBD58707FC001BBD1A4BDECAD387D194CC9C6D15AC89
                                                        SHA-512:CC97F9B2C83FF7CAC32AB9A9D46E0ACDE13EECABECD653C88F74E4FC19806BB9498D2F49C4B5581E58E7B0CB95584787EA455E69D99899381B592BEA177D4D4B
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK.........LGE,.{E...#P......[Content_Types].xml..Mo.0.....Z..N7.=l......V0.-o..j?...H..sa......./UCb.'...r...w.i..e..<[....{2..U.m..N.{...r.....3.fj.o......2.*....;.L.6..&,D.Cld8...a.gZf.......r-v..><....~/......|Zk.......a.R&.d.(.$..6..}.:.....3......1..[.p.....?..+....R...y,.fod.....e...-.|..#..]j....n:...f...-J...i.^.:Y....T..........m^..~GNp../e}...N....a..5.d.8YcN..5.d.8Y...7..A..e...7Q."3...../.sL._...v...n..b..2].v....n.t....Z...Uk...j.&.Z....im|.r....B.....7DaBuN.... ...>..>..>..>..>..>..>.........V}-.....Q}#.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7FaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}..&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7EaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}3.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b.\}..)...A.......[..PK.........LG.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...........84P....
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):278
                                                        Entropy (8bit):3.516359852766808
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:960E28B1E0AB3522A8A8558C02694ECF
                                                        SHA1:8387E9FD5179A8C811CCB5878BAC305E6A166F93
                                                        SHA-256:2707FCA8CEC54DF696F19F7BCAD5F0D824A2AC01B73815DE58F3FCF0AAB3F6A0
                                                        SHA-512:89EA06BA7D18B0B1EA624BBC052F73366522C231BD3B51745B92CF056B445F9D655F9715CBDCD3B2D02596DB4CD189D91E2FE581F2A2AA2F6D814CD3B004950A
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .P.a.r.c.e.l...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft OOXML
                                                        Category:dropped
                                                        Size (bytes):523048
                                                        Entropy (8bit):7.715248170753013
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:C276F590BB846309A5E30ADC35C502AD
                                                        SHA1:CA6D9D6902475F0BE500B12B7204DD1864E7DD02
                                                        SHA-256:782996D93DEBD2AF9B91E7F529767A8CE84ACCC36CD62F24EBB5117228B98F58
                                                        SHA-512:B85165C769DFE037502E125A04CFACDA7F7CC36184B8D0A54C1F9773666FFCC43A1B13373093F97B380871571788D532DEEA352E8D418E12FD7AAD6ADB75A150
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK..........1AE,.{E...#P......[Content_Types].xml..Mo.0.....Z..N7.=l......V0.-o..j?...H..sa......./UCb.'...r...w.i..e..<[....{2..U.m..N.{...r.....3.fj.o......2.*....;.L.6..&,D.Cld8...a.gZf.......r-v..><....~/......|Zk.......a.R&.d.(.$..6..}.:.....3......1..[.p.....?..+....R...y,.fod.....e...-.|..#..]j....n:...f...-J...i.^.:Y....T..........m^..~GNp../e}...N....a..5.d.8YcN..5.d.8Y...7..A..e...7Q."3...../.sL._...v...n..b..2].v....n.t....Z...Uk...j.&.Z....im|.r....B.....7DaBuN.... ...>..>..>..>..>..>..>.........V}-.....Q}#.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7FaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}..&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7EaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}3.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b.\}..)...A.......[..PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...........84P....
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):276
                                                        Entropy (8bit):3.5159096381406645
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:71CCB69AF8DD9821F463270FB8CBB285
                                                        SHA1:8FED3EB733A74B2A57D72961F0E4CF8BCA42C851
                                                        SHA-256:8E63D7ABA97DABF9C20D2FAC6EB1665A5D3FDEAB5FA29E4750566424AE6E40B4
                                                        SHA-512:E62FC5BEAEC98C5FDD010FABDAA8D69237D31CA9A1C73F168B1C3ED90B6A9B95E613DEAD50EB8A5B71A7422942F13D6B5A299EB2353542811F2EF9DA7C3A15DC
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .F.r.a.m.e...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):260
                                                        Entropy (8bit):3.494357416502254
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:6F8FE7B05855C203F6DEC5C31885DD08
                                                        SHA1:9CC27D17B654C6205284DECA3278DA0DD0153AFF
                                                        SHA-256:B7F58DF058C938CCF39054B31472DC76E18A3764B78B414088A261E440870175
                                                        SHA-512:C518A243E51CB4A1E3C227F6A8A8D9532EE111D5A1C86EBBB23BD4328D92CD6A0587DF65B3B40A0BE2576D8755686D2A3A55E10444D5BB09FC4E0194DB70AFE6
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .T.h.e.m.e.P.i.c.t.u.r.e.G.r.i.d...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                        Category:dropped
                                                        Size (bytes):6193
                                                        Entropy (8bit):7.855499268199703
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:031C246FFE0E2B623BBBD231E414E0D2
                                                        SHA1:A57CA6134779D54691A4EFD344BC6948E253E0BA
                                                        SHA-256:2D76C8D1D59EDB40D1FBBC6406A06577400582D1659A544269500479B6753CF7
                                                        SHA-512:6A784C28E12C3740300883A0E690F560072A3EA8199977CBD7F260A21E8346B82BA8A4F78394D3BB53FA2E98564B764C2D0232C40B25FB6085C36D20D70A39D1
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK........X..<..Zn|...........diagrams/layout1.xmlz........]..H.}......M,l#g.j:.G-eu.*S=.$......T_6..I...6...d.NJ....r.p.p.........|.z.K.M..L.T.(........<..ks.......o...t}...P..*.7...`.+.[...H..._..X.u.....N....n....n|..=.....K.:.G7.u....."g.n.h...O.,...c...f.b.P......>[l.....j.*.?..mxk..n..|A...,\o..j..wQ.....lw.~].Lh..{3Y..D..5.Y..n..Mh.r..J....6*.<.kO...Alv.._.qdKQ.5...-FMN......;.~..._..pv..&...%"Nz].n............vM.`..k..a.:.f]...a........y.....g0..`........|V...Yq.....#...8....n..i7w<2Rp...R.@.]..%.b%..~...a..<.j...&....?...Qp..Ow|&4>...d.O.|.|...Fk;t.P[A..i.6K.~...Y.N..9......~<Q..f...i.....6..U...l. ..E..4$Lw..p..Y%NR..;...B|B.U...\e......S...=...B{A.]..*....5Q.....FI..w....q.s{.K....(.]...HJ9........(.....[U|.....d71.Vv.....a.8...L.....k;1%.T.@+..uv.~v.]`.V....Z.....`.M.@..Z|.r........./C..Z.n0.....@.YQ.8..q.h.....c.%...p..<..zl.c..FS.D..fY..z..=O..%L..MU..c.:.~.....F]c......5.=.8.r...0....Y.\o.o....U.~n...`...Wk..2b......I~
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                        Category:dropped
                                                        Size (bytes):924687
                                                        Entropy (8bit):7.824849396154325
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:97EEC245165F2296139EF8D4D43BBB66
                                                        SHA1:0D91B68CCB6063EB342CFCED4F21A1CE4115C209
                                                        SHA-256:3C5CF7BDB27592791ADF4E7C5A09DDE4658E10ED8F47845064DB1153BE69487C
                                                        SHA-512:8594C49CAB6FF8385B1D6E174431DAFB0E947A8D7D3F200E622AE8260C793906E17AA3E6550D4775573858EA1243CCBF7132973CD1CF7A72C3587B9691535FF8
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK..........1AS'......ip......[Content_Types].xml..n.@.._......8ie'......}.......(y...H}......3Fi..%2.v?..3..._...d=..E.g.....7.i.-.t5.6......}}.m9r.......m...ML.g.M.eV$.r..*.M..l0...A...M..j;.w={o.f..F....i..v......5..d;..D.ySa...M&..qd*w>.O.{h...|w..5.]..'.CS<.:8C}.g.|E.../..>..].Tnml..I.......r.Gv.E....7.;.E......4/l.....6.K.C?1qz.O.v_..r......\c.c.>..lS........X.N.3N.sN..N.)'.%'..'..N.pL.E...T.!..CR....Ie..k.o..M..w.B.0}..3....v..+....,.q..pz.......v{.;....s3.|..V..ZZ......0.[.....x.....!.!~.8.e..n..&.}p....s.i.. ..[]...q.r....~..+.A\...q............e.-)h9..."Z.>...5-C..`..g.}........r.A.+..\...r.>.... .W.\...re?..%.-/hiA..ZR.r.W.D.\}.EK..kZ.>......5..9.&T......Wlu.b....}..+.A\...q......~.WK.Z^..........>.h..`......}.....^h....L...H...!...r.>... .W...\...rE?............-+hIA..\}..r...-}..i..`..G..j..).&T......Wlu.b....}..+.A\...q......~.WK.Z^..........>.h..`......}.....^j..K.L...H...!...r.>... .W...\...rE?............-+hIA..\}..r...-}..i.
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):282
                                                        Entropy (8bit):3.51145753448333
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:7956D2B60E2A254A07D46BCA07D0EFF0
                                                        SHA1:AF1AC8CA6FE2F521B2EE2B7ABAB612956A65B0B5
                                                        SHA-256:C92B7FD46B4553FF2A656FF5102616479F3B503341ED7A349ECCA2E12455969E
                                                        SHA-512:668F5D0EFA2F5168172E746A6C32820E3758793CFA5DB6791DE39CB706EF7123BE641A8134134E579D3E4C77A95A0F9983F90E44C0A1CF6CDE2C4E4C7AF1ECA0
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .P.a.r.a.l.l.a.x...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft OOXML
                                                        Category:dropped
                                                        Size (bytes):966946
                                                        Entropy (8bit):7.8785200658952
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:F03AB824395A8F1F1C4F92763E5C5CAD
                                                        SHA1:A6E021918C3CEFFB6490222D37ECEED1FC435D52
                                                        SHA-256:D96F7A63A912CA058FB140138C41DCB3AF16638BA40820016AF78DF5D07FAEDD
                                                        SHA-512:0241146B63C938F11045FB9DF5360F63EF05B9B3DD1272A3E3E329A1BFEC5A4A645D5472461DE9C06CFE4ADB991FE96C58F0357249806C341999C033CD88A7AF
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK..........1A.......F`......[Content_Types].xml..n.@.._.y.ac $..,........-..g@.u.G.+t.:........D1...itgt>...k..lz;].8Kg^....N.l..........0.~}....ykk.A`..N..\...2+.e.c..r..P+....I.e.......|.^/.vc{......s..z....f^...8...'.zcN&.<....}.K.'h..X..y.c.qnn.s%...V('~v.W.......I%nX`.....G.........r.Gz.E..M.."..M....6n.a..V.K6.G?Qqz..............\e.K.>..lkM...`...k.5...sb.rbM8..8..9..pb..R..{>$..C.>......X..iw.'..a.09CPk.n...v....5n..Uk\...SC...j.Y.....Vq..vk>mi......z..t....v.]...n...e(.....s.i......]...q.r....~.WV/.j.Y......K..-.. Z..@.\.P..W...A..X8.`$C.F(.P..H...W..r.>... .W.C..zAV+.....@.\..h....r)...R..-..........c..0F...@Z.....v.+.A\...q.......ZAV'p)...R.D....K..-...h....eP..........(.P..H...W..r.>... .W.C..zAV+.....@.\..h....r)...R..-.............0A...@Z.....v.+.A\...q.......ZAV'p)...R.D....K..-...h....eP.........w(.P..H...W..r.>... .W.C..zAV+.....@.\..h....r)...R..-..........T..GI..~.....~....PK..........1A.s@.....O......._rels/.rels...J.
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):282
                                                        Entropy (8bit):3.5323495192404475
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:BD6B5A98CA4E6C5DBA57C5AD167EDD00
                                                        SHA1:CCFF7F635B31D12707DC0AC6D1191AB5C4760107
                                                        SHA-256:F22248FE60A55B6C7C1EB31908FAB7726813090DE887316791605714E6E3CEF7
                                                        SHA-512:A178299461015970AF23BA3D10E43FCA5A6FB23262B0DD0C5DDE01D338B4959F222FD2DC2CC5E3815A69FDDCC3B6B4CB8EE6EC0883CE46093C6A59FF2B042BC1
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .Q.u.o.t.a.b.l.e...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):292
                                                        Entropy (8bit):3.5026803317779778
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:A0D51783BFEE86F3AC46A810404B6796
                                                        SHA1:93C5B21938DA69363DBF79CE594C302344AF9D9E
                                                        SHA-256:47B43E7DBDF8B25565D874E4E071547666B08D7DF4D736EA8521591D0DED640F
                                                        SHA-512:CA3DB5A574745107E1D6CAA60E491F11D8B140637D4ED31577CC0540C12FDF132D8BC5EBABEA3222F4D7BA1CA016FF3D45FE7688D355478C27A4877E6C4D0D75
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .g.o.s.t.t.i.t.l.e...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):251032
                                                        Entropy (8bit):5.102652100491927
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:F425D8C274A8571B625EE66A8CE60287
                                                        SHA1:29899E309C56F2517C7D9385ECDBB719B9E2A12B
                                                        SHA-256:DD7B7878427276AF5DBF8355ECE0D1FE5D693DF55AF3F79347F9D20AE50DB938
                                                        SHA-512:E567F283D903FA533977B30FD753AA1043B9DDE48A251A9AC6777A3B67667443FEAD0003765A630D0F840B6C275818D2F903B6CB56136BEDCC6D9BDD20776564
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:<?xml version="1.0" encoding="utf-8"?>......<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..........<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft OOXML
                                                        Category:dropped
                                                        Size (bytes):976001
                                                        Entropy (8bit):7.791956689344336
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:9E563D44C28B9632A7CF4BD046161994
                                                        SHA1:D3DB4E5F5B1CC6DD08BB3EBF488FF05411348A11
                                                        SHA-256:86A70CDBE4377C32729FD6C5A0B5332B7925A91C492292B7F9C636321E6FAD86
                                                        SHA-512:8EB14A1B10CB5C7607D3E07E63F668CFC5FC345B438D39138D62CADF335244952FBC016A311D5CB8A71D50660C49087B909528FC06C1D10AF313F904C06CBD5C
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK.........{MB.f}......p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.v...(=.v........F_..U..G...T.e.y)[..b.......3.m....6.X5.P........_...b../..}.-......~.-..z..d.......j.^.+c..E.V..~3}..U.7..~p.>.E..9^d....4%}.E.$....N..r....<....%...%.?....w.u...h........D...w.....h........Dkw...x..T....T....T....T....T....T....j...."[.J.....;..!4...M...............t.n-.{..skp...[;.......F...j.7...4fC...K1..K/..K-..K+..K)..K'..f9......Fl._.........d0...?7K7].........A.......Fl.............Ft....u.......Ft........\.......w....R.......R.......R........o...].`.....A....#.`..\.....S.._...4...o.........W<x#..............w#...r.nD..]....\.~....|......b...^...Z...V...R...N..W<x......l._...l..?.A......xp_Q..y<h..tL.i.?HNn...]..........r.nD..]~.........wy~7......Ft...........E/|c.
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):278
                                                        Entropy (8bit):3.5270134268591966
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:327DA4A5C757C0F1449976BE82653129
                                                        SHA1:CF74ECDF94B4A8FD4C227313C8606FD53B8EEA71
                                                        SHA-256:341BABD413AA5E8F0A921AC309A8C760A4E9BA9CFF3CAD3FB2DD9DF70FD257A6
                                                        SHA-512:9184C3FB989BB271B4B3CDBFEFC47EA8ABEB12B8904EE89797CC9823F33952BD620C061885A5C11BBC1BD3978C4B32EE806418F3F21DA74F1D2DB9817F6E167E
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .B.e.r.l.i.n...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft OOXML
                                                        Category:dropped
                                                        Size (bytes):1204049
                                                        Entropy (8bit):7.92476783994848
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:FD5BBC58056522847B3B75750603DF0C
                                                        SHA1:97313E85C0937739AF7C7FC084A10BF202AC9942
                                                        SHA-256:44976408BD6D2703BDBE177259061A502552193B1CD05E09B698C0DAC3653C5F
                                                        SHA-512:DBD72827044331215A7221CA9B0ECB8809C7C79825B9A2275F3450BAE016D7D320B4CA94095F7CEF4372AC63155C78CA4795E23F93166D4720032ECF9F932B8E
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK..........1A..d T....P......[Content_Types].xml..Ms.@.....!...=.7....kX 5o.,L..<..........d..g/..dw.]...C...9...#g/."L..;...#. ]..f...w../._.3Y8..X.[..7._.[...K3..3.4......D.]l.?...~.&J&...s...;...H9...e.3.q.....k-.0>Lp:.7..eT...Y...P...OVg.....G..).aV...\Z.x...W.>f...oq.8.....I?Ky...g..."...J?....A$zL.].7.M.^..\....C..d/;.J0.7k.X4.e..?N{....r.."LZx.H?. ......;r.+...A<.;U.....4...!'k...s.&..)'k...d..d......._E..D...o..o...o...f.7;s..]...Uk6d.j..MW....5[C].f#...l;u.M..Z.../iM|...b...s.....0..O.... ...>..>..>..>..>..>..>.........2V}......Q}#.&T...rU....\..\..\..\..\..\..\..\.W..W.^Z....Q}c;.o...>.Z..\.v...............................*Z....K.X.5X8.obG.MP.P.'P.U}.k..rU..rU..rU..rU..rU..rU..rU..rU_EK_}.zi.....G.M.).....j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..h.oZ/-c..`....7CaBu.@-W.A.]..U}H.U}H.U}H.U}H.U}H.U}H.U}H.U}.-}...e...,...|...].k.........PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):276
                                                        Entropy (8bit):3.5364757859412563
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:CD465E8DA15E26569897213CA9F6BC9C
                                                        SHA1:9EA9B5E6C9B7BF72A777A21EC17FD82BC4386D4C
                                                        SHA-256:D4109317C2DBA1D7A94FC1A4B23FA51F4D0FC8E1D9433697AAFA72E335192610
                                                        SHA-512:869A42679F96414FE01FE1D79AF7B33A0C9B598B393E57E0E4D94D68A4F2107EC58B63A532702DA96A1F2F20CE72E6E08125B38745CD960DF62FE539646EDD8D
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .S.a.v.o.n...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft OOXML
                                                        Category:dropped
                                                        Size (bytes):1750795
                                                        Entropy (8bit):7.892395931401988
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:529795E0B55926752462CBF32C14E738
                                                        SHA1:E72DFF8354DF2CB6A5698F14BBD1805D72FEEAFF
                                                        SHA-256:8D341D1C24176DC6B67104C2AF90FABD3BFF666CCC0E269381703D7659A6FA05
                                                        SHA-512:A51F440F1E19C084D905B721D0257F7EEE082B6377465CB94E677C29D4E844FD8021D0B6BA26C0907B72B84157C60A3EFEDFD96C16726F6ABEA8D896D78B08CE
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK.........{MB.f}......p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.v...(=.v........F_..U..G...T.e.y)[..b.......3.m....6.X5.P........_...b../..}.-......~.-..z..d.......j.^.+c..E.V..~3}..U.7..~p.>.E..9^d....4%}.E.$....N..r....<....%...%.?....w.u...h........D...w.....h........Dkw...x..T....T....T....T....T....T....j...."[.J.....;..!4...M...............t.n-.{..skp...[;.......F...j.7...4fC...K1..K/..K-..K+..K)..K'..f9......Fl._.........d0...?7K7].........A.......Fl.............Ft....u.......Ft........\.......w....R.......R.......R........o...].`.....A....#.`..\.....S.._...4...o.........W<x#..............w#...r.nD..]....\.~....|......b...^...Z...V...R...N..W<x......l._...l..?.A......xp_Q..y<h..tL.i.?HNn...]..........r.nD..]~.........wy~7......Ft...........E/|c.
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):280
                                                        Entropy (8bit):3.528155916440219
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:AA7B919B21FD42C457948DE1E2988CB3
                                                        SHA1:19DA49CF5540E5840E95F4E722B54D44F3154E04
                                                        SHA-256:5FFF5F1EC1686C138192317D5A67E22A6B02E5AAE89D73D4B19A492C2F5BE2F9
                                                        SHA-512:01D27377942F69A0F2FE240DD73A1F97BB915E19D3D716EE4296C6EF8D8933C80E4E0C02F6C9FA72E531246713364190A2F67F43EDBE12826A1529BC2A629B00
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .D.r.o.p.l.e.t...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                        Category:dropped
                                                        Size (bytes):1463634
                                                        Entropy (8bit):7.898382456989258
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:ACBA78931B156E4AF5C4EF9E4AB3003B
                                                        SHA1:2A1F506749A046ECFB049F23EC43B429530EC489
                                                        SHA-256:943E4044C40ABA93BD7EA31E8B5EBEBD7976085E8B1A89E905952FA8DAC7B878
                                                        SHA-512:2815D912088BA049F468CA9D65B92F8951A9BE82AB194DBFACCF0E91F0202820F5BC9535966654D28F69A8B92D048808E95FEA93042D8C5DEA1DCB0D58BE5175
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK.........{MB.f}......p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.v...(=.v........F_..U..G...T.e.y)[..b.......3.m....6.X5.P........_...b../..}.-......~.-..z..d.......j.^.+c..E.V..~3}..U.7..~p.>.E..9^d....4%}.E.$....N..r....<....%...%.?....w.u...h........D...w.....h........Dkw...x..T....T....T....T....T....T....j...."[.J.....;..!4...M...............t.n-.{..skp...[;.......F...j.7...4fC...K1..K/..K-..K+..K)..K'..f9......Fl._.........d0...?7K7].........A.......Fl.............Ft....u.......Ft........\.......w....R.......R.......R........o...].`.....A....#.`..\.....S.._...4...o.........W<x#..............w#...r.nD..]....\.~....|......b...^...Z...V...R...N..W<x......l._...l..?.A......xp_Q..y<h..tL.i.?HNn...]..........r.nD..]~.........wy~7......Ft...........E/|c.
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):280
                                                        Entropy (8bit):3.5286004619027067
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:40FF521ED2BA1B015F17F0B0E5D95068
                                                        SHA1:0F29C084311084B8FDFE67855884D8EB60BDE1A6
                                                        SHA-256:CC3575BA195F0F271FFEBA6F6634BC9A2CF5F3BE448F58DBC002907D7C81CBBB
                                                        SHA-512:9507E6145417AC730C284E58DC6B2063719400B395615C40D7885F78F57D55B251CB9C954D573CB8B6F073E4CEA82C0525AE90DEC68251C76A6F1B03FD9943C0
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .C.i.r.c.u.i.t...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft OOXML
                                                        Category:dropped
                                                        Size (bytes):1091485
                                                        Entropy (8bit):7.906659368807194
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:2192871A20313BEC581B277E405C6322
                                                        SHA1:1F9A6A5E10E1C3FFEB6B6725C5D2FA9ECDF51085
                                                        SHA-256:A06B302954A4C9A6A104A8691864A9577B0BFEA240B0915D9BEA006E98CDFFEC
                                                        SHA-512:6D8844D2807BB90AEA6FE0DDDB9C67542F587EC9B7FC762746164B2D4A1A99EF8368A70C97BAD7A986AAA80847F64408F50F4707BB039FCCC509133C231D53B9
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK...........G`.jaV....P......[Content_Types].xml...n.@...W......T@.mwM.E....)....y...H}.N..ll8.h5g6Q.=3_......?...x..e^Di.p.^.ud...(Y/..{w..r..9.../M...Q*{..E...(.4..>..y,.>..~&..b-.a.?..4Q2Q=.2.......m....>-....;]......N'..A...g.D.m.@(}..'.3Z....#....(+....-q<uq.+....?....1.....Y?Oy......O"..J?....Q$zT.].7.N..Q Wi.....<.........-..rY....hy.x[9.b.%-<.V?.(......;r.+...Q<.;U.....4...!'k...s.&..)'k...d.s..}R....o".D.I..7..7.KL.7..Z.....v..b.5.2].f....l.t....Z...Uk...j.&.U-....&>.ia1..9lhG..Q.P.'P.U}.k..rU..rU..rU..rU..rU..rU..rU..rU_EK_}.zi.....G.........j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..h.oT/-c..`....7FaBu.@-W.A.]..U}H.U}H.U}H.U}H.U}H.U}H.U}H.U}.-}...e...,..7...&(L.....>.kw...i...i...i...i...i...i...i.......I...U_.....vT.....}..\...v..W.!-W.!-W.!-W.!-W.!-W.!-W.!-W.U...7.....k.pT...0..O.... ...>..>..>..>..>..>..>......f..2V}....W>jO....5..].?.o..oPK...........G.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70.
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):280
                                                        Entropy (8bit):3.5301133500353727
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:1C5D58A5ED3B40486BC22B254D17D1DD
                                                        SHA1:69B8BB7B0112B37B9B5F9ADA83D11FBC99FEC80A
                                                        SHA-256:EBE031C340F04BB0235FE62C5A675CF65C5CC8CE908F4621A4F5D7EE85F83055
                                                        SHA-512:4736E4F26C6FAAB47718945BA54BD841FE8EF61F0DBA927E5C4488593757DBF09689ABC387A8A44F7C74AA69BA89BEE8EA55C87999898FEFEB232B1BA8CC7086
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .G.a.l.l.e.r.y...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft OOXML
                                                        Category:dropped
                                                        Size (bytes):3078052
                                                        Entropy (8bit):7.954129852655753
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:CDF98D6B111CF35576343B962EA5EEC6
                                                        SHA1:D481A70EC9835B82BD6E54316BF27FAD05F13A1C
                                                        SHA-256:E3F108DDB3B8581A7A2290DD1E220957E357A802ECA5B3087C95ED13AD93A734
                                                        SHA-512:95C352869D08C0FE903B15311622003CB4635DE8F3A624C402C869F1715316BE2D8D9C0AB58548A84BBB32757E5A1F244B1014120543581FDEA7D7D9D502EF9C
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK..........1AS'......ip......[Content_Types].xml..n.@.._......8ie'......}.......(y...H}......3Fi..%2.v?..3..._...d=..E.g.....7.i.-.t5.6......}}.m9r.......m...ML.g.M.eV$.r..*.M..l0...A...M..j;.w={o.f..F....i..v......5..d;..D.ySa...M&..qd*w>.O.{h...|w..5.]..'.CS<.:8C}.g.|E.../..>..].Tnml..I.......r.Gv.E....7.;.E......4/l.....6.K.C?1qz.O.v_..r......\c.c.>..lS........X.N.3N.sN..N.)'.%'..'..N.pL.E...T.!..CR....Ie..k.o..M..w.B.0}..3....v..+....,.q..pz.......v{.;....s3.|..V..ZZ......0.[.....x.....!.!~.8.e..n..&.}p....s.i.. ..[]...q.r....~..+.A\...q............e.-)h9..."Z.>...5-C..`..g.}........r.A.+..\...r.>.... .W.\...re?..%.-/hiA..ZR.r.W.D.\}.EK..kZ.>......5..9.&T......Wlu.b....}..+.A\...q......~.WK.Z^..........>.h..`......}.....^h....L...H...!...r.>... .W...\...rE?............-+hIA..\}..r...-}..i..`..G..j..).&T......Wlu.b....}..+.A\...q......~.WK.Z^..........>.h..`......}.....^j..K.L...H...!...r.>... .W...\...rE?............-+hIA..\}..r...-}..i.
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):274
                                                        Entropy (8bit):3.5303110391598502
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:8D1E1991838307E4C2197ECB5BA9FA79
                                                        SHA1:4AD8BB98DC9C5060B58899B3E9DCBA6890BC9E93
                                                        SHA-256:4ABA3D10F65D050A19A3C2F57A024DBA342D1E05706A8A3F66B6B8E16A980DB9
                                                        SHA-512:DCDC9DB834303CC3EC8F1C94D950A104C504C588CE7631CE47E24268AABC18B1C23B6BEC3E2675E8A2A11C4D80EBF020324E0C7F985EA3A7BBC77C1101C23D01
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .M.e.s.h...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft OOXML
                                                        Category:dropped
                                                        Size (bytes):3611324
                                                        Entropy (8bit):7.965784120725206
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:FB88BFB743EEA98506536FC44B053BD0
                                                        SHA1:B27A67A5EEC1B5F9E7A9C3B76223EDE4FCAF5537
                                                        SHA-256:05057213BA7E5437AC3B8E9071A5577A8F04B1A67EFE25A08D3884249A22FBBF
                                                        SHA-512:4270A19F4D73297EEC910B81FF17441F3FC7A6A2A84EBA2EA3F7388DD3AA0BA31E9E455CFF93D0A34F4EC7CA74672D407A1C4DC838A130E678CA92A2E085851C
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK.........{MB.f}......p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.v...(=.v........F_..U..G...T.e.y)[..b.......3.m....6.X5.P........_...b../..}.-......~.-..z..d.......j.^.+c..E.V..~3}..U.7..~p.>.E..9^d....4%}.E.$....N..r....<....%...%.?....w.u...h........D...w.....h........Dkw...x..T....T....T....T....T....T....j...."[.J.....;..!4...M...............t.n-.{..skp...[;.......F...j.7...4fC...K1..K/..K-..K+..K)..K'..f9......Fl._.........d0...?7K7].........A.......Fl.............Ft....u.......Ft........\.......w....R.......R.......R........o...].`.....A....#.`..\.....S.._...4...o.........W<x#..............w#...r.nD..]....\.~....|......b...^...Z...V...R...N..W<x......l._...l..?.A......xp_Q..y<h..tL.i.?HNn...]..........r.nD..]~.........wy~7......Ft...........E/|c.
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):288
                                                        Entropy (8bit):3.5359188337181853
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:0FEA64606C519B78B7A52639FEA11492
                                                        SHA1:FC9A6D5185088318032FD212F6BDCBD1CF2FFE76
                                                        SHA-256:60059C4DD87A74A2DC36748941CF5A421ED394368E0AA19ACA90D850FA6E4A13
                                                        SHA-512:E04102E435B8297BF33086C0AD291AD36B5B4A97A59767F9CAC181D17CFB21D3CAA3235C7CD59BB301C58169C51C05DDDF2D637214384B9CC0324DAB0BB1EF8D
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .V.a.p.o.r._.T.r.a.i.l...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft OOXML
                                                        Category:dropped
                                                        Size (bytes):2924237
                                                        Entropy (8bit):7.970803022812704
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:5AF1581E9E055B6E323129E4B07B1A45
                                                        SHA1:B849F85BCAF0E1C58FA841FFAE3476D20D33F2DD
                                                        SHA-256:BDC9FBF81FBE91F5BF286B2CEA00EE76E70752F7E51FE801146B79F9ADCB8E98
                                                        SHA-512:11BFEF500DAEC099503E8CDB3B4DE4EDE205201C0985DB4CA5EBBA03471502D79D6616D9E8F471809F6F388D7CBB8B0D0799262CBE89FEB13998033E601CEE09
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK.........{MB.$<.~....p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`..^.......H^..<}...lA-.D.....lI/...hD.Z....|VM..ze........L..tU...g....lQ....Y...>MI...5-....S......h=..u.h..?;h...@k...h...'Z...D...;.....h=..'Z...D...;.....)^./.../U.../..../U.../..../U..?...'.........Ngz..A.~.8.#D....xot.u.?...eyot.n..{..sk....[......Z..F....l...o)..o..o...oi..o)..o..,..b.s......2.C.z.~8.......f......x.9.|.8..............u................r.nD..]...........w.~7...-...-...-...-...-...-....x.&l........>.4.z.~8..........=E....As.1..q. 9....w.7...1........w.}7......Ft...................o)..o..o...oi..o)..o..w.7a...x0...........d0..............A.......Fl.............Ft................w#...r.nD..]..M...K1.0..7....
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):286
                                                        Entropy (8bit):3.5434534344080606
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:C9812793A4E94320C49C7CA054EE6AA4
                                                        SHA1:CC1F88C8F3868B3A9DE7E0E5F928DBD015234ABA
                                                        SHA-256:A535AE7DD5EDA6D31E1B5053E64D0D7600A7805C6C8F8AF1DB65451822848FFC
                                                        SHA-512:D28AADEDE0473C5889F3B770E8D34B20570282B154CD9301932BF90BF6205CBBB96B51027DEC6788961BAF2776439ADBF9B56542C82D89280C0BEB600DF4B633
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .M.a.i.n._.E.v.e.n.t...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 5864 bytes, 2 files, at 0x44 "architecture.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                        Category:dropped
                                                        Size (bytes):22008
                                                        Entropy (8bit):7.662386258803613
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:ABBF10CEE9480E41D81277E9538F98CB
                                                        SHA1:F4EA53D180C95E78CC1DA88CD63F4C099BF0512C
                                                        SHA-256:557E0714D5536070131E7E7CDD18F0EF23FE6FB12381040812D022EC0FEE7957
                                                        SHA-512:9430DAACF3CA67A18813ECD842BE80155FD2DE0D55B7CD16560F4AAEFDA781C3E4B714D850D367259CAAB28A3BF841A5CB42140B19CFE04AC3C23C358CA87FFB
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF............D................................?..................................architecture.glox.................Content.inf..q5.^...[.....0y......../..CL.C5.Q..U5g.z....UUUMPC...C..P....T.....=..s..4c...-3H..E...2..2*..T...../.i.;$..............%...................'h.........#0.......[........c.h.....O...%.61...[.J..:.,^....W.]$..u...N.R.....H.......:%I.g5Kd.n6...W2.#.UL..h.8NN../.P...H.;@.N.F...v."h..K.....~.....8...{.+...&.#A.Q'..A.....[NJ.X.....|.|.G5...vp.h.p..1.....-...gECV.,o{6W.#L....4v..x..z..)[.......T.....BQ.pf..D.}...H....V..[._.'.......3..1....?m..ad..c(K.......N.N.6F%.m......9...4..]?...l6..).\p;w.s....@...I%H.....;\...R......f...3~:C...A..x....X...>...:~.+..r@..."......I..m.y..)F.l..9...6....m...=..Q.F.z..u......J].{WX...V.Z.b.A0B..!....~.;Z.....K.`c..,X.MFz....].Q.2.9..L."...]...6...JOU..6...~../......4A.|.......i.LKrY...2.R.o..X.\....0.%......>H.....8.z..^....5d|...4|...C......R28.E......a....e...J.S..Ng.]<&..mm
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 15461 bytes, 2 files, at 0x4c "gostname.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 8 datablocks, 0x1203 compression
                                                        Category:dropped
                                                        Size (bytes):31605
                                                        Entropy (8bit):7.820497014278096
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:69EDB3BF81C99FE8A94BBA03408C5AE1
                                                        SHA1:1AC85B369A976F35244BEEFA9C06787055C869C1
                                                        SHA-256:CEBE759BC4509700E3D23C6A5DF8D889132A60EBC92260A74947EAA1089E2789
                                                        SHA-512:BEA70229A21FBA3FD6D47A3DC5BECBA3EAA0335C08D486FAB808344BFAA2F7B24DD9A14A0F070E13A42BE45DE3FF54D32CF38B43192996D20DF4176964E81A53
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF....e<......L...........................e<...?...................;......................gostname.xsl."...............Content.inf.[.......[...>..|..32.E..o`h....W.>.^...v..5...m.w.$.U..U......m.mu...'4....m`.9F.. ...I..PTS..O.D...GM#...#CUE.`.`%n..N...G,.~..+.6cv.L...G.m.Y..vy.....Yh9/.m,..wtw..;....Ka.a.{.\...'.....<X....%)...G..d......R./..4$..32..@....f.h....w..ov.}w..[.....{.v.......dr..&w#G..$3.zI&f..(C..L.z5J... .`...!.!4. ...!.` .$........w.J.X7.w_..@.w..f]=.C.....I-....s.s_.x...~..A... ...z...nM..;....Z....vt....6...~.w.....*x.g.h.T.J..-.3=....G.n..ti.A...s...j$.Bf..?......6.t.<j...>.."....&=BO?w.uN.o.t.-r..K....>C..^G..p...k...>.xZ.[fL..n.."].W#...|.i.0W.q.F: ..<#w......w....s....."...n.qu.../rI.....q....P~.B..|b?.N.}..MyO..q..:q.7..-~.xa.S...|.....X.....g.W.3.mo..yy.GG.s>....qy....r........#.F.P..A.......A....b.2..14.8.i6..w.S...v~{0z.<.Z...^!.;2mSV.i....{...U...+...r.;...h.++..T6.a...$....j5F+..1t....b......|.Q\d-.S..2... ......Y..A...s....
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 14813 bytes, 2 files, at 0x4c "iso690nmerical.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 7 datablocks, 0x1203 compression
                                                        Category:dropped
                                                        Size (bytes):30957
                                                        Entropy (8bit):7.808231503692675
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:D3C9036E4E1159E832B1B4D2E9D42BF0
                                                        SHA1:966E04B7A8016D7FDAFE2C611957F6E946FAB1B9
                                                        SHA-256:434576EB1A16C2D14D666A33EDDE76717C896D79F45DF56742AFD90ACB9F21CE
                                                        SHA-512:D28D7F467F072985BCFCC6449AD16D528D531EB81912D4C3D956CF8936F96D474B18E7992B16D6834E9D2782470D193A17598CAB55A7F9EB0824BC3F069216B6
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF.....9......L............................9...?...................8......1P..............iso690nmerical.xsl.................Content.inf...A@...[...5.....33.E...P.../..........5sv.]3srm8.T.=.......}.v.T.. ..4IH.r.%Z.(.q.\+K..[,....E....A......#CEF..}p..Y/s$...YKI.#M.?.t.1#C....I..v.vn...-...v7../S.m.Ma.....!.Y....4.......3.3....c&R9..%......(J..BDMI.>7J.....".....}.w.}w.wg.v...^.n.{....{f.mlI..%.#..I..S....D..QJ U......4........K.(@....DH.....}...8;..z...&0%e..G.OAM..x.3......\....zS9....}......89.B...e.W.p{;.....m.m3...}....../...q.~..;.,..".j.g..^N............iC.../|...g.=..9.Q].Gf.....QA....74..v.....9.n[......0.}..jo{y./.2..Ym......;u...b.(Jz^.....~..uM...{s../..#.)n2..S.S.c..6)U.V....!.'R.......P.S.D..S.p/......D.......{......?.u.",...Mp._....N..+..=Y#..&0w....r.......$.xwC......P.e7.>O....7....].y%q^S'....*.C.`.?..}Q..k../u.TK...y........S...{T.?......[.H.'L..AS.Y.|*..b...J.H-.^U>'9..uD[.".b[.l.......o..6.L).h.B0RJa.b..|m:.):......F
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 4091 bytes, 2 files, at 0x44 "BracketList.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                        Category:dropped
                                                        Size (bytes):20235
                                                        Entropy (8bit):7.61176626859621
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:E3C64173B2F4AA7AB72E1396A9514BD8
                                                        SHA1:774E52F7E74B90E6A520359840B0CA54B3085D88
                                                        SHA-256:16C08547239E5B969041AB201EB55A3E30EAD400433E926257331CB945DFF094
                                                        SHA-512:7ED618578C6517ED967FB3521FD4DBED9CDFB7F7982B2B8437804786833207D246E4FCD7B85A669C305BE3B823832D2628105F01E2CF30B494172A17FC48576D
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF............D................................?..................................BracketList.glox.................Content.inf....7r...[.... G.q..@...B.....?X!.A.......!........X..Vk.JK...Z..=......PD.....P....5...jp..+..T....b.)np5.7.....Zz........... ..!.....S......1....`....h......T?.Nq../......z....[..:..5f;....O...d.FxD...4...Z....[..a...w..W.[..P...5.]...6..."...+t].!...2\%%`Q.\..)...=>.)......a.$.2.,...2,.Lw.?..+..qf....h....T/B.....}T.E...'.%.....,.......X....b..gt.hPYc|.....a...j...=...{..a.`!8!..|...L.T..k..!,.R.z/W....{..,...+..w.m..sQ..7<x..B....?....\.)..l...d...}.....v..W.C..'=p1c.Z=.W.g.e....&wm..N,..K.T../.oV../=9.}.....".28...r.Q....dzj{....S...1m...x9_...2PXpa...Q.n.$z...c..SGq...k......}kPE..*...3.|.5A.>..6.......+)qCB....q....qNkGe...W]..o..Z...J.<.i......qq.8....q..BE.(...._h.U.\@3.F...KdO..=1j+....).*Q.|B..Z..%......LDYk....j.....{klDW..#CVy}...X..O!..}..s..&..DC.....tL.j..b.......[...n.'..1..Xc...9Q..gM.....n..3...v.....~.).
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 15327 bytes, 2 files, at 0x4c "sist02.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 8 datablocks, 0x1203 compression
                                                        Category:dropped
                                                        Size (bytes):31471
                                                        Entropy (8bit):7.818389271364328
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:91AADBEC4171CFA8292B618492F5EF34
                                                        SHA1:A47DEB62A21056376DD8F862E1300F1E7DC69D1D
                                                        SHA-256:7E1A90CDB2BA7F03ABCB4687F0931858BF57E13552E0E4E54EC69A27325011EA
                                                        SHA-512:1978280C699F7F739CD9F6A81F2B665643BD0BE42CE815D22528F0D57C5A646FC30AAE517D4A0A374EFB8BD3C53EB9B3D129660503A82BA065679BBBB39BD8D5
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF.....;......L............................;...?...................;......g...............sist02.xsl.................Content.inf....!....[...=.rF..3U.5...g.i?..w.oY..If'.......Y.;.B.....Wo.{T.TA.~......8......u.p....@Q..k.?.....G....j.|*.*J69H.2.ee..23s..;3..i..L.,...0se.%J........%.....!.....qB...SC...GAu5.P..u7....:.|.$Fo............{.......v.v.g..{o....e.....m.JeRG..,.%.1..Lh.@8.i.....l.#.HB`B....C......D@....?....P?..................|.9..q.......9.n.....F...s,....3..Q..N......y......_i..9|.<w...'q.Tq...U.E.B...q.?.4..O(_O.A.......*jC.~.21.7.....u.C...]uc.....-.g.{C~9q.q.1.1...4..=.0.Z.^....'../....-.6.K.....K...A#.GR..t.@.{.O.......Q5..=....X...^...F3.e.E.Z..b+R..?Z..0T1.....gQz.&....%y=zx.f.....6-*...u.Rm..x<...?...!g@.}..).J...:*...9.s&.v..}..'...\..Sd..F...........kQr.....h..3..1....B...B{M...%O.59.\.#....s/.pE.:}...k_.P.>.zj....5|.9+....$M..L........(...@#.....N.....N.*..........E..7..R$.:9!r>7.....v...>..S.w....9..]..n.w.;&.W..<r\S....
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 14864 bytes, 2 files, at 0x4c "mlaseventheditionofficeonline.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 8 datablocks, 0x1203 compression
                                                        Category:dropped
                                                        Size (bytes):31008
                                                        Entropy (8bit):7.806058951525675
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:E033CCBC7BA787A2F824CE0952E57D44
                                                        SHA1:EEEA573BEA217878CD9E47D7EA94E56BDAFFE22A
                                                        SHA-256:D250EB1F93B43EFB7654B831B4183C9CAEC2D12D4EFEE8607FEE70B9FAB20730
                                                        SHA-512:B807B024B32E7F975AED408B77563A6B47865EECE32E8BA993502D9874B56580ECC9D9A3FEFA057FDD36FB8D519B6E184DB0593A65CC0ACF5E4ACCBEDE0F9417
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF.....:......L............................:...?...................9......................mlaseventheditionofficeonline.xsl.L...............Content.inf.N.#.....[...>..9..3c.5...F.B.]Y.3..%d.8...v;....~Y.L.=..v..m.g...|K.B....$......s.......#CdE.p.p..@...j.Nl2'...L..N.G:-V:.d.....i..M........mK.w.....\W.<.`..b$.!..!3..rT.A..#.).;KZ...a.-..j&e`R.~7dIRS.I..f.ff....}.}....^[wo.uw..i.m7......v$.I..n....-.Z.M5...iH..Ea..., [..0.L...DH..." ..... .@...H.@..+...}.......*^..'.4*.tHa..f].gV..~.7V.....C..).(.U"..f.@l..j'..%\.u.UU.....9<13...5..=........./..Z..{..-.L].+Y.fL.<EJ.q..!.j....W..]E./.~Y>...GgQ..-....Q.C..5..T+...fO. .)..~.7..Y....+..U=.e..8w.m...._..S..v.d.* ......S3z.X)......u...t.......i.;.a...X.Ji....g.3.!.O.....T.f6..[U....O..Z.X.q.G....?.k]..?...8.u.;].8y.T.9D..!?R....:........3+.P.....7?m}..............1...y3.g.\c.ks^;?.f.U5...U.j....E.N.}.!.......).R1....~.....R.....3.J.f...l..E^:...&_..%..v...^..E...rC..O....M.#..<..H..bB.+.W..
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 16689 bytes, 2 files, at 0x4c "iso690.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 9 datablocks, 0x1203 compression
                                                        Category:dropped
                                                        Size (bytes):32833
                                                        Entropy (8bit):7.825460303519308
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:205AF51604EF96EF1E8E60212541F742
                                                        SHA1:D436FE689F8EF51FBA898454CF509DDB049C1545
                                                        SHA-256:DF3FFF163924D08517B41455F2D06788BA4E49C68337D15ECF329BE48CF7DA2D
                                                        SHA-512:BCBA80ED0E36F7ABC1AEF19E6FF6EB654B9E91268E79CA8F421CB8ADD6C2B0268AD6C45E6CC06652F59235084ECDA3BA2851A38E6BCD1A0387EB3420C6EC94AC
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF....1A......L...........................1A...?..................S@......v...............iso690.xsl.................Content.inf.B.9.....[...A.c...32.E...P..'.^}.f...ikMJ....m..s..U.w{m{{...}n.4........I. ..9..d..I.......P|....F...F.......&&J.:I.34......+*M3..4mr.........m.r..m)....dK.wiw...H,...r........y.$..Cu...L...dH.../..V......g.PG$R39...4O..............{w..^....c.m.m.o.....#..Fgs..6.....b....3.I..O....B..B..1h"....K|f .41......_..g.N.<.>........(....o3a.M)....J..}....-......8.......g.hm!r<...-..1.1....q.?....S.m...`L.g#.K.igv.].ghD....L...p5..?.......iP.[JS.J..?z~.T/.Q...E.K.......P+\LW.-.c..[9.n.7.....P...*[.A1....m...4h.9...N[....h5 n%k.~RR.*c..n..=...4....).eH.-./..>....*.r..S.*..dE.........pF..s.A..?...f..u.+.{..?>N.4].}Xb.M......y......'.2..'..........J4{r..r.3........5>..a0.>.u_.y@g....+y.yu--,ZdD.........5]3..'.s...|.....K.....T..G.G.e...)..\x..OM.g...`..j0......BfH...+.....:......l`.qU...;.@...",.."........>;P.B.^F...3!......Rx.9..
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 17466 bytes, 2 files, at 0x4c "chicago.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 10 datablocks, 0x1203 compression
                                                        Category:dropped
                                                        Size (bytes):33610
                                                        Entropy (8bit):7.8340762758330476
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:51804E255C573176039F4D5B55C12AB2
                                                        SHA1:A4822E5072B858A7CCA7DE948CAA7D2268F1BB4B
                                                        SHA-256:3C6F66790C543D4E9D8E0E6F476B1ACADF0A5FCDD561B8484D8DDDADFDF8134B
                                                        SHA-512:2AC8B1E433C9283377B725A03AE72374663FEC81ABBA4C049B80409819BB9613E135FCD640ED433701795BDF4D5822461D76A06859C4084E7BAE216D771BB091
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF....:D......L...........................:D...?..................XC.....................chicago.xsl. ...............Content.inf.!..B...[...H."m..3C.6...WP!i/Z..vn._...^omvw+...^..L.4o...g..y......^..x...BH.B.K....w.....F........p ./gg.h.0I',.$..a.`.*...^..vi..mw..........K....oQ............P...#...3.......U(.=...q.~?..H..?.'I4'.......X...}w.vw.....f.n..f{3.....-....%dK&q..D.H.Z..h-..H.[$ %.."..e....1...$.............'.....B..%..4...&`S!DQ...M.......N~............S..'....M..4E.^..dej..i..+.`...6F%sJ....Q..d.(*.s.Z...U-5Eh.s.CK...K..X$......j..T.?.`.|...=..R...-7...*...TU.....7a...&I.noOK|.W.R-+S.d..rR.....{h.Y...)..xJ..=.XM..o...P'.I4m..~I..C..m.....f.....;{Mzg+Wm.~...z...r-.....eK...lj:^.1g5...7.h(T"..t?5......u.....G.Z<..sL.\{...8=t...Z...'tps.:...|....6.....S..X...I...6l.M.....aq.;YS....{:.&.'.&.F.l...\.[L.%.so\.v.Lo...zO.^^...p..*9k...).CC..F0>L...VUE4.......2..c..p.rCi..#...b.C@o.l.. E_b..{d...hX.\_!a#.E.....yS.H...aZ...~D3.pj: ss?.]....~
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 18672 bytes, 2 files, at 0x4c "APASixthEditionOfficeOnline.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 11 datablocks, 0x1203 compression
                                                        Category:dropped
                                                        Size (bytes):34816
                                                        Entropy (8bit):7.840826397575377
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:62863124CDCDA135ECC0E722782CB888
                                                        SHA1:2543B8A9D3B2304BB73D2ADBEC60DB040B732055
                                                        SHA-256:23CCFB7206A8F77A13080998EC6EF95B59B3C3E12B72B2D2AD4E53B0B26BB8C3
                                                        SHA-512:2734D1119DC14B7DFB417F217867EF8CE8E73D69C332587278C0896B91247A40C289426A1A53F1796CCB42190001273D35525FCEA8BA2932A69A581972A1EF00
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF.....H......L............................H...?...................G......................APASixthEditionOfficeOnline.xsl.H...............Content.inf..h;.....[...Q..\..3S.5..oVP!i/Z.Ls...]q$...xY..+W.qm..B..y/.5.s..x$../K./.x.$.....}.......\........LNf..Hd.&."Ip.L.Mr-@.D..kW~i...^.....F.....T.U....../..0..2.{.q.T.`'{.00.{.B...>.R..2....1.~_.f..s...........~....~[..v..w..v....$[K.r$#[6...d;[...#.9.-...G..Z..eAR.0")%JI?&....$..$.H..$(........f.> k....hP...p...!j.T......l7..../3..(2^V...#..T9...3.@[0...le:...........E....YP.\.....au1...\.S|..-.duN.Z..g.O......X8....1.....|,.f/..w.|Wk]zJz.g'./7h..+.....}............x....s.2Z\..W.{...O....W.{j.U..Q....uO=.p.M k.E.S{SUd.@....S.Syo8>......r......8..............Z?>.mUAg....?o....f.7..W.n...P..........d.S?...\..W`...c.ua..........#.Y...45...F(d.o\09^..[.}...BsT.SD..[l.8..uw.7l..S.9T.KR..o......V..]...M .....t.r...:P...M....4.F.....@..t.1t..S...k.2.|5...i.%H..<.J..*.0n.....lZ.....?.*?.~..O .)..
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 19375 bytes, 2 files, at 0x4c "turabian.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 11 datablocks, 0x1203 compression
                                                        Category:dropped
                                                        Size (bytes):35519
                                                        Entropy (8bit):7.846686335981972
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:53EE9DA49D0B84357038ECF376838D2E
                                                        SHA1:AB03F46783B2227F312187DD84DC0C517510DE20
                                                        SHA-256:9E46B8BA0BAD6E534AF33015C86396C33C5088D3AE5389217A5E90BA68252374
                                                        SHA-512:751300C76ECE4901801B1F9F51EACA7A758D5D4E6507E227558AAAAF8E547C3D59FA56153FEA96B6B2D7EB08C7AF2E4D5568ACE7E798D1A86CEDE363EFBECF7C
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF.....K......L............................K...?...................J.......@..............turabian.xsl."...............Content.inf._.......[...T.....C4.5...E0B.]...+.-f....rc.[52.$...a..I....{z...`hx.r...!.. $...l..\....#3EF..r..c;<p...&n.\b..K..0Y..c+.2...i..B..wwY..77,...........}.q.C.......n..,.....prrx.QHy.B#..,.'....3....%1.``..hf...~...[.[n.v.s..y.vw....;..s.G293G&H....$E......m.&^..iy/.4.C...D...".(H&..&.I4._...!...... ........q.k1.d.....qc.3.c.....;.5.......y}...}&...+.WAN.,zVY.Q....V.Tz........g..H..c...E2jY...4g?.yf<....V.M.s.$..k.Id....+..?..._.\.s.k..9..I%;.yWQ..S..]..*.n<.7........=......"Q.*E.....MG..j.Yt..!U....Q.j...v.h-.~b..e&.......;...\.....:.....=..Xv1&q........6\...xw.%*.VdS..H...o...s.....+..%[../>.t..I....F.....".G|.....=....[..S..3..a.C.ZZ...tK.6N..b........)>........I..m..QE.M.nv.MVl.....vCG>,.suP.gqo.rr....J`m....J.b..},[F*....e.A.]..r....C4.?JJs6..l.].9...Q.B.~.......\d%.X ...8A....rH....&?#...^.....4.h.{>
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 30269 bytes, 2 files, at 0x4c "Text Sidebar (Annual Report Red and Black design).docx", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 2 datablocks, 0x1203 compression
                                                        Category:dropped
                                                        Size (bytes):46413
                                                        Entropy (8bit):7.9071408623961394
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:C455C4BC4BEC9E0DA67C4D1E53E46D5A
                                                        SHA1:7674600C387114B0F98EC925BE74E811FB25C325
                                                        SHA-256:40E9AF9284FF07FDB75C33A11A794F5333712BAA4A6CF82FA529FBAF5AD0FED0
                                                        SHA-512:08166F6CB3F140E4820F86918F59295CAD8B4A17240C206DCBA8B46088110BDF4E4ADBAB9F6380315AD4590CA7C8ECDC9AFAC6BD1935B17AFB411F325FE81720
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF....=v......L...........................=v...?..................5u......................Text Sidebar (Annual Report Red and Black design).docx.v...............Content.inf..C,.zd..[............... .w.....b...wwww]r..W\ww...... .hh...........o.nz.....Ku.7..-.oH...h;.N..#.._.D,}......!Q$..Un.tI11..$w.r3... ..p...=.1....""..n...*/....h.A...Y..c,.Q.,......",..b.1.w..$.....l../;..J.....~.. ....+.R#....7.-..1.x.feH.@.......u...(.DQ%.wL.N|.xh...R..#....C...'X.m.....I{W.....5.C.....\....z.Y.)w..i...%....M..n.p.....{..-G9..k.bT.6........7....).....6..ys.....R.e.....0.Xk`.3..X\xL..4J"#.f...:....r..2..Y.uW..052.n.+ ..o..o..f&u.v.&9y.P..6.K..in.DU.#.~....4i..6;.5.w..i...g.(....../..0*Vh...C..//....W..:w......7.6....]....4.*9...sL.0k...zHh..2N.H...*..]..(.x.:..........Y.+...-.....&.*^..Q.sW...v..w.....k.L.e.^.W4iFS..u.....l.g'...b~:Zm...S.2.|......5S..=.............l.../|....G|.9 ..#.q...W.Q...G=.."W..'.6....I....D._.{.g.47....V.1._..<?....m............)..T.
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 27509 bytes, 2 files, at 0x4c "Equations.dotx", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 2 datablocks, 0x1203 compression
                                                        Category:dropped
                                                        Size (bytes):43653
                                                        Entropy (8bit):7.899157106666598
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:DA3380458170E60CBEA72602FDD0D955
                                                        SHA1:1D059F8CFD69F193D363DA337C87136885018F0F
                                                        SHA-256:6F8FFB225F3B8C7ADE31A17A02F941FC534E4F7B5EE678B21CD9060282034701
                                                        SHA-512:17080110000C66DF2282FF4B8FD332467AF8CEFFA312C617E958FDFEBEE8EEA9E316201E8ABC8B30797BB6124A5CC7F649119A9C496316434B5AB23D2FBD5BB8
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF....uk......L...........................uk...?...................j......r...............Equations.dotx.................Content.inf.94v..R..[..... .............v........." Vw.w..r.....D.V5.p...W......b;....\x.....f.-...............l.....L.F..*..@..BnF.I.....%1..0....&.X.......X-.\.\.>..A....@..:...N .G./.Sp.A0.0.`.....q....b... ......S.{K...V....J............>\....\.E.#.,$.hxu.F.Fo....<...{..6../..#..l>d...w...&...S.....L.].....^..L......;~l.......qw.o. .....v.u.W`.4Z.A.....dC..Q)9.c..qgtfJ..G.(.J....q4V.).mK4;..zY..b.5&....V...0X.].Z..U.Lx..^..:8XQh.....7yy.._5............c.W...c...xY..%..G.$....kg^.1g.9.....z^.'...q."..K)a[.pW .LS.:Q8.....2..._q.os....y...d11.*.m....8.,.^.4_?i.e.u.,....._y.....zZZA.D.D<..+....{....Sfnv...t.....0...vV..y.r..3..%.<.t......;.h.wh.-.g.>..5...R...........y..]^..R..<...>$~.'...kk.n..H.EN.eQ.Q.O./='....)t.l0,/].....FNN......?...&..'.eS....K.K.v".^L..x=.^......1x|....=}@...B.kq;_a..C.q?..Y9.v......Q..u.G..V.
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 4313 bytes, 2 files, at 0x44 "chevronaccent.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                        Category:dropped
                                                        Size (bytes):20457
                                                        Entropy (8bit):7.612540359660869
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:4EFA48EC307EAF2F9B346A073C67FCFB
                                                        SHA1:76A7E1234FF29A2B18C968F89082A14C9C851A43
                                                        SHA-256:3EE9AE1F8DAB4C498BD561D8FCC66D83E58F11B7BB4B2776DF99F4CDA4B850C2
                                                        SHA-512:2705644D501D85A821E96732776F61641FE82820FD6A39FFAF54A45AD126C886DC36C1398CDBDBB5FE282D9B09D27F9BFE7F26A646F926DA55DFF28E61FBD696
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF............D................................?..................................chevronaccent.glox.................Content.inf..O.$N...[.........B.....?.....$Zy..Zkr...y<.....Di-.aVX/....h..-.~........#.../.Fz....T...p....A..eHMe[..p...=................f..../%o......F@..=..$.B!....}.0..g..^vlI......f.W.F...Nm..2`...)...,.HL4.nsl.F.ir.k..e.!^.j2.v.iT....t...*..!h..Y...2Q..-.x.,.Xj.U.cj,....9.....)..W..n3f.......(cH.D.4M.!.+..4..3r..y......|r..@.PD.R..#...F..nJAR..1{-.....u3..$..L.b+h....:lZ.>....q.?. ~l..^.%.m....a...cG.h.?.|.?7.'....b.G.4..'..A...o.Z...//..?...d..*.....C..Z.....]Yv.g.]..... .........]x.#=.../.7;R.j....G.....zq=O`[.'5g.D.u..)..../../.v.JmCW.da....3.f..C.z%...S=....;A.q.|....z.E.aRu........ k..J"+.f.S.@.........eD4....\0..t./U..%.H..........M:..U.......J...Z..H.DG..u^..D..P....`.^b.........`c......#.....c.?...#..C.V.&.'..f.'...f.[..F.O..a...&..{TiXg4; .X."..0...B.#..^..........N"..w.@f...gd.S..K.....E....ZR...;.twR>.z.
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 15418 bytes, 2 files, at 0x4c "harvardanglia2008officeonline.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 9 datablocks, 0x1203 compression
                                                        Category:dropped
                                                        Size (bytes):31562
                                                        Entropy (8bit):7.81640835713744
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:1D6F8E73A0662A48D332090A4C8C898F
                                                        SHA1:CF9AD4F157772F5EDC0FDDEEFD9B05958B67549C
                                                        SHA-256:8077C92C66D15D7E03FBFF3A48BD9576B80F698A36A44316EABA81EE8043B673
                                                        SHA-512:5C03A99ECD747FBC7A15F082DF08C0D26383DB781E1F70771D4970E354A962294CE11BE53BECAAD6746AB127C5B194A93B7E1B139C12E6E45423B3A509D771FC
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF....:<......L...........................:<...?..................D;.......V..............harvardanglia2008officeonline.xsl.L...............Content.inf.Vu......[...E..o..3D.5..nF.A..+.e.....6r..f........M3...-.s.m.... $r.b.!.q!.....G...0.\.......fd......%m...'1Y..f..O...*.#.P.,{..m...|..ww.{.m...f...n%...,..y...0y...8.Q...`.../.q....a...',.V......8.7..8t..................6.]..6..nw..ynm..-l.Y..,.I?..$....+b9$E!S@"..) .4........H...lA...@!a.F.l$..0#!.....n&.5j.t+..1f|.+....E.zDk.l8.+<q.^.........\5.l..iT.9...........Y..6.^,.o.bn.E*5w..s.../...W.gS..j9..'W.F......].4\Mzz..Td..Ho..~.Q...Z..D..O.JP..m..s.j.:..........y._.....#.*.rD....60.\!y........p.o3,..Ub,......[[L.{.5.....5.7UDB9.{;;g.z.z..jM.G.MY.oe.....(r..B6..CV.7Fl.Z/....-.O.vY.c...-..........b.T)3.u..f~x2.?.8.g.x.-.....Qt_...$e.l..jtP..b....h..*.sW0.`.....c...F_....t.........LC..*5I.X$^.;&....#.._\J..........;..wP..wX.qy.qs...}46..fK.XN.&0........k1....8...............'t.......}.......O_.
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 10800 bytes, 2 files, at 0x44 "ConvergingText.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                        Category:dropped
                                                        Size (bytes):26944
                                                        Entropy (8bit):7.7574645319832225
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:F913DD84915753042D856CEC4E5DABA5
                                                        SHA1:FB1E423C8D09388C3F0B6D44364D94D786E8CF53
                                                        SHA-256:AA03AFB681A76C86C1BD8902EE2BBA31A644841CE6BCB913C8B5032713265578
                                                        SHA-512:C48850522C809B18208403B3E721ABEB1187F954045CE2F8C48522368171CC8FAF5F30FA44F6762AFDE130EC72284BB2E74097A35FE61F056656A27F9413C6B6
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF....0*......D...........................0*...?..................t,..............ConvergingText.glox.....t,..........Content.inf..C..)t-[.....@.........=...xxA. ...E^....x.x.^.......x..^^...DF.......s..d.P.....5.;..]...2.t.w.....O9.G..;.'.T....@I.,.q.u.3..P...9... ....`J.......g.(....).,.h0.....$.3..;.._.....~.de.jj.....U..K.0....`.@.H.1.x.Z.@..q....?....x.wW.....+am8A".....I..)..]...s..-z.2S+|.Cb.t6f],.n.LV......OVg....O.at|..-..x.....:....]s...u..g}.P..v.3....^.".%..%...#.2.....l00...n.......r8.p.....^.....n.)..,..t.^$b...b.q.W...F..R...n.-.+..'........Aw=._OwH....8.:s..{.#..{N.hW..`.._........Wy....>U.?....-.8tg...=..y..@.,.v|......l...t..l#{...H....9..|......~...De..#@y.&K....U...q.c.zK..D.<pV.....Ql..&Y...=#...w....r.`#2....Ug.J(..T...KmW.@...!....j:......M......!..E.7#s.t..F.aU..N....-.i......|w.lr..G.n.,.......=Kl.-m.?F.....v]?.......{q.U.t...<.|..u.....3R.`.t.T.>;v.....KQ...S...7..1...N.kN.y.)v.....3H:..D.{.+.(......u..^W&.
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 6005 bytes, 2 files, at 0x44 "HexagonRadial.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                        Category:dropped
                                                        Size (bytes):22149
                                                        Entropy (8bit):7.659898883631361
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:66C5199CF4FB18BD4F9F3F2CCB074007
                                                        SHA1:BA9D8765FFC938549CC19B69B3BF5E6522FB062E
                                                        SHA-256:4A7DC4ED098E580C8D623C51B57C0BC1D601C45F40B60F39BBA5F063377C3C1F
                                                        SHA-512:94C434A131CDE47CB64BCD2FB8AF442482F8ECFA63D958C832ECA935DEB10D360034EF497E2EBB720C72B4C1D7A1130A64811D362054E1D52A441B91C46034B0
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF....u.......D...........................u....?..................................HexagonRadial.glox.................Content.inf.........[.....`........./.mT.T6...CP..z5...0.PcUmCUSUCU.Q.P.0..f............^...H..2e.[..8...ld......*F.%.j.w!R..NA.L............ .r..z....$&.........P.=.r...O...e..dfv_.i%.C....^......?..x...+d..].B.3..EU...|Cc..z.`lQp..fr.....8!;.8.p.ZwH\.........~..T.t..]..H.]..S.2..Vt.....r.H../..-8........!:.Y&..|A..J.U...-.%..k..U...4m.. .q../..b.8.vc~......_q1.?..Bh.v.....L..I.$I..s.".u.. Y....I^5.v...3.......].^)b.t.j...=...Ze~.O...|.}T.._9c........L....BV.^......X..?.....{.>.j..5.m...d.7........g[..f.nST...i..t..|.T.jjS..4p.Pxu..*..W...|.A)..|9;....H.e.^.8D..S...M..Lj.|...M.m+..H.....8.&-....=.L.....n.v..M.9...l....=r......K.F.j.(.(xD.3..r'9.K..-...5..Z..x....._....a[...J...`.b_a\\j.ed..\.3.5....S.T...ms.....E...Xl.y.LH=...}..0.T...04.4..B[..H.....B{B9.h..=.8Mn.*.TL.c..y.s.?.c9$l...).h).6..;.X../_>Pl...O...U.R..v.dy$A
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 15691 bytes, 2 files, at 0x4c "gb.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 9 datablocks, 0x1203 compression
                                                        Category:dropped
                                                        Size (bytes):31835
                                                        Entropy (8bit):7.81952379746457
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:92A819D434A8AAEA2C65F0CC2F33BB3A
                                                        SHA1:85C3F1801EFFEA1EA10A8429B0875FC30893F2C8
                                                        SHA-256:5D13F9907AC381D19F0A7552FD6D9FC07C9BD42C0F9CE017FFF75587E1890375
                                                        SHA-512:01339E04130E08573DF7DBDFE25D82ED1D248B8D127BB90D536ECF4A26F5554E793E51E1A1800F61790738CC386121E443E942544246C60E47E25756F0C810A3
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF....K=......L...........................K=...?..................q<......................gb.xsl.................Content.inf.EF/.....[...A....3D.4..oVP!i/......t.6..l&9r0.8......c..q.^........$/..(./H ...^_Z0\4.42WU......P.F..9.._....'.D..<H@..E.b,K..9o..wo..v|..[.{7m.......|}aI..|g....IF2au?.1,..3.H.......ed....-.........m....$..8&0..w........2....s....z..d.Z.e.....@$r[..r..4...."E.Q@...Hh.B"b>...$.L.$.P.._..~.?./T..@..F..?.~G...MS..O%Z3*k..:..._...!GF..U...!..W..$..7...j......xy0..../.j..~4......8...YV....Fe.LU..J.B.k%BT5.X.q.w.a4....5..r...W.6.u...]i...t.....e.\.K............#t.c5.6....j...?#..{.m3.L9...E/....B[R.k(.'....S.'.}!j.tL..v....L....{<.m4......d_kD..D.....4`aC....rg..S..F.b..^........g;.`?,......\..T.\.H.8W.!V...1.T1.....|.Uh....T..yD'..R.......,.`h..~.....=......4..6E..x#XcVlc_S54 ..Q.4!V..P...{w..z.*..u.v....DC...W.(>4..a..h.t.F.Z...C.....&..%v...kt....n..2....+.@...EW.GE..%.:R`,}v.%.nx.P.#.f.......:.5(...]...n3{...v........Q..
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 12767 bytes, 2 files, at 0x4c "ieee2006officeonline.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 9 datablocks, 0x1203 compression
                                                        Category:dropped
                                                        Size (bytes):28911
                                                        Entropy (8bit):7.7784119983764715
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:6D787B1E223DB6B91B69238062CCA872
                                                        SHA1:A02F3D847D1F8973E854B89D4558413EA2E349F7
                                                        SHA-256:DA2F261C3C82E229A097A9302C8580F014BB6442825DB47C008DA097CFCE0EE4
                                                        SHA-512:9856D88D5C63CD6EBCF26E5D7521F194FA6B6E7BF55DD2E0238457A1B760EB8FB0D573A6E85E819BF8E5BE596537E99BC8C2DCE7EC6E2809A43490CACCD44169
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF.....1......L............................1...?...................0......"}..............ieee2006officeonline.xsl.:...............Content.inf.........[...G."...3$pE...G B....m3o[...I2&.f.,\..........}.n..{..e.8!^.3.A@...x..... .D.52gU..]..."..N8....s..CS..J3..HV...m...y..o....F.z......V.j._....=~k.....'.dY........1........#...d13.g.&C...C.xw.`f.hf..........]M....m.m....ud...,+.H~..cL...e#;(RI...eA....I.b...E...2..(...$.j...L...$..A....'[...H9..&..G.Q....".M.yl....]..?j%+....O~.*....|.se...K\.B"W..F.5.......=s...l.Y...K..yN.TBH[...sTWR.N.d...WEa....T.d.K.^sauI......m..s=.,qso5.b.V.s.]..9..,k4.\..L.;D...........;r.C...7.w.j..:N8.V6..a.3..j:A.mA..To..$.5....:./..p.x.3.=..__...8.EB.K.*..].-."..5-XU..J.....=o..K.Wavg.o].z.9.gk.._.........MZ.<.5............OY.n.o...r.9v.c.......[n.[..D...d..}.j.....LB,]_.9..St.@..C....\...^....-&.njq..!P....G^.....w.7.p~.......M..g.J............t1......q.w.rx...qp.....E.........-...2..G.........z.]B........d....C.@...@.
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 14939 bytes, 2 files, at 0x44 "CircleProcess.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                        Category:dropped
                                                        Size (bytes):31083
                                                        Entropy (8bit):7.814202819173796
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:89A9818E6658D73A73B642522FF8701F
                                                        SHA1:E66C95E957B74E90B444FF16D9B270ADAB12E0F4
                                                        SHA-256:F747DD8B79FC69217FA3E36FAE0AB417C1A0759C28C2C4F8B7450C70171228E6
                                                        SHA-512:321782B0B633380DA69BD7E98AA05BE7FA5D19A131294CC7C0A598A6A1A1AEF97AB1068427E4223AA30976E3C8246FF5C3C1265D4768FE9909B37F38CBC9E60D
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF....[:......D...........................[:...?...................A..............CircleProcess.glox......A..........Content.inf......9.B[.....@*........!...(A.D..K.W.wwpwJj\.K\w...]...K.!.....@0..?,...}won`... ....&I..(;.....X.u..^.R..^......_:....W>f\....T...B..i`|q.....................i.5....(........0q7@.@..F...?A.`.....,L.......5.+../56..a`....1C5..9.*I.N.......@|<+./......... .ya....>l.,t.......y.y5...FF.,F..jCA...SA..H....8u.L..eM?.w8.......~^.Mr.[...(.._......u..+.......j..TJ.:<.3.X`...U.bz...[...r-...[...+..B.......}...\'.i...C.8.B_...c.8</..s.....VQ.Y..m.,.j~;y ...2.5.VQ...K..jP..2..r-...HA...."..9).7.....5.E._.wq.......!.+n+.f...s].4M'.1&...5....4..k..NV.M1.7`a..<.P4.|.mrd.i.R...u...............v.}..n\.C$.....[..2c.^..W..g..._.0.C.o....%.z.!.;.@y.`\..UO#i.)...Q...........L. .\:_..H.{.W...@...T.4..A.a...Wo?o$4.....#.V.s8M.Gh..p?A...Y.....)...........r|...!..o9...8..%#.[....;...3<Z...g....~.Z....,.(...qA.'x#..xC..@...HOuW.[.[....c.........
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 9170 bytes, 2 files, at 0x44 "InterconnectedBlockProcess.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                        Category:dropped
                                                        Size (bytes):25314
                                                        Entropy (8bit):7.729848360340861
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:C47E3430AF813DF8B02E1CB4829DD94B
                                                        SHA1:35F1F1A18AA4FD2336A4EA9C6005DBE70013C7FC
                                                        SHA-256:F2DB1E60533F0D108D5FB1004904C1F2E8557D4493F3B251A1B3055F8F1507A3
                                                        SHA-512:6F8904E658EB7D04C6880F7CC3EC63FCFE31EF2C3A768F4ECF40B115314F23774DAEE66DCE9C55FAF0AD31075A3AC27C8967FD341C23C953CA28BDC120997287
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF.....#......D............................#...?...................#..............InterconnectedBlockProcess.glox......#..........Content.inf...<.:#.$[......O..........5f.P.5CU..6..jT..U..U..UM.T.........h................-... .......6...`.....G...........'.,DN:........... "..4..1u.....%.u..{{,....@lp..}..`.......Z...K.....Z..... Z4.<?..C.BF.....k.!Hl...]...Tvf..g....)...vny6.'..f....Z.R.`.......+....!..!.....:..4fj....."q..f..E..^!k.....M.c....R...B......g...~.........o.'.7,.e.,..7.R.e,(.+..+:....Q....f...P.H.I..U.....Jl...l...z.]7...C...<...L.,..@...i.{..e]K...2..KRW..7.-'.G.l!.n7..J.v.C...%/.....q...@..l..e..$..N..sg8]oo.(q(_.?.X.s...Ua..r0...Rz.o.eT.j...b*..}",n.qou..M.[.;%../c.x.4.z.2*.U.]..D...h...-R.$.=\3..P......N.mP......J...}BPn...g]d.5k..C.ee.ml...\.g...[.......<..6$.%.I#S9..I...6.i........_..P.n....c$.3..zw.hF......_{.+...o...[.&........&...M..m.....;....0....D7...4nQ.=/.._`._.nh.D.m..h.+....8..p..q.4.w.\...iy...*...lN6F..c.
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 4410 bytes, 2 files, at 0x44 "PictureFrame.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                        Category:dropped
                                                        Size (bytes):20554
                                                        Entropy (8bit):7.612044504501488
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:486CBCB223B873132FFAF4B8AD0AD044
                                                        SHA1:B0EC82CD986C2AB5A51C577644DE32CFE9B12F92
                                                        SHA-256:B217393FD2F95A11E2C594E736067870212E3C5242A212D6F9539450E8684616
                                                        SHA-512:69A48BF2B1DB64348C63FC0A50B4807FB9F0175215E306E60252FFFD792B1300128E8E847A81A0E24757B5F999875DA9E662C0F0D178071DB4F9E78239109060
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF....:.......D...........................:....?..................................PictureFrame.glox.................Content.inf........[.... '.q..@.........<./..+./. ...."o.o./..{^a.7^.D.HA....^J... ...........T%q..b...+pz.n.=....jT.+M..=H..A...py.3.........H...N...[..%..~....>.%....3.r...wx.....0.....7..94..2..45..7f.......D.. ...[...f.:H..../N..4.....8.....:x.I....u|.`."...\..N..%.M#..^v$.*....T.m.....?.-.wki.X..8..F.G..Y.^8...-....+.&.+&.No...e!.#.8.....YF.......<w.....=.Q.S..7....MW....M..9A.3..c..L....|.E-Y....]n".|....b9..l@.d.T...a.f...~.&k.[..yS..q..]L}..)w.....$.@..v...[9..X....V...a.NK....m9.5.....Kq.;9`.U.e...8.<..)Y.H........z.G...3n.yWa.g.>.w!e.B8:......f..h..z....o.1<.RT..WK...?g .N..+..p.B.|...1pR_......@...a....aA......ye..8...+M.l..(.d..f.;....g........8R.\.w.:ba....%...|p....`lrA.|....a.U.m=ld......7....#..?Dq..D.....(.5.K.a..c.G..7..]hF..%:}......}J.j$.....4...l];..v>.&j........Y.vk..$1.@X$...k...9..?...z..![..../...).a.=....aZ^.3?....
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 6450 bytes, 2 files, at 0x44 "ThemePictureAccent.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                        Category:dropped
                                                        Size (bytes):22594
                                                        Entropy (8bit):7.674816892242868
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:EE0129C7CC1AC92BBC3D6CB0F653FCAE
                                                        SHA1:4ABAA858176B349BDAB826A7C5F9F00AC5499580
                                                        SHA-256:345AA5CA2496F975B7E33C182D5E57377F8B740F23E9A55F4B2B446723947B72
                                                        SHA-512:CDDABE701C8CBA5BD5D131ABB85F9241212967CE6924E34B9D78D6F43D76A8DE017E28302FF13CE800456AD6D1B5B8FFD8891A66E5BE0C1E74CF19DF9A7AD959
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF....2.......D...........................2....?..................0...............ThemePictureAccent.glox.....0...........Content.inf.o.@D..8.[.........B.....?. $...K.....~....aZ.WA"...k.......Z......."......"..X.fpB 2@d..87.[.A......p..e.'......F..P^%.%.RK...........T%0..........9..+8 ...&.q.....+.......^.fad^^n...d.....s1..... .3j.c-c7..y<.....6........C5n.KG...Rs[lt..ZkwI.!..Uj.ez_!A^: /.;.Rl4....^..<6..N...'.YY.n*.E{.`..s.7..z.......L.y.Y.....q.kx.....[5.+<to......1...L.r.m..kC.q.k.1..o.w8s.....xh.@.b.`l\...}z1.6..Y.</DY...Z5..D...0..4.;..XAA..0qD..E.....h...C..hH......S..Z.\.VBu......Rxs.+:RKzD......{......a..=......).<.....d.SM.......c!t.4.h..A=J~.>q?Hw.^.....?.....[..`....v.nl..A.u...S!...............c......b.J.I.....D...._?}..or.g.JZ#*."_``.>.....{...w......s...R.iXR..'z....S.z.\..f.....>7m..0q.c-8\..nZw.q..J.l....+..V....ZTs{.[yh..~..c........9;..D...V.s...#...JX~t8%......cP^...!.t......?..'.(.kT.T.y.I ...:..Y3..[Up.m...%.~
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 4967 bytes, 2 files, at 0x44 "TabList.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                        Category:dropped
                                                        Size (bytes):21111
                                                        Entropy (8bit):7.6297992466897675
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:D30AD26DBB6DECA4FDD294F48EDAD55D
                                                        SHA1:CA767A1B6AF72CF170C9E10438F61797E0F2E8CE
                                                        SHA-256:6B1633DD765A11E7ED26F8F9A4DD45023B3E4ADB903C934DF3917D07A3856BFF
                                                        SHA-512:7B519F5D82BA0DA3B2EFFAD3029C7CAB63905D534F3CF1F7EA3446C42FA2130665CA7569A105C18289D65FA955C5624009C1D571E8960D2B7C52E0D8B42BE457
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF....g.......D...........................g....?..........}.......................TabList.glox.................Content.inf....t....[......@..C...../.U5...........6...`.....T..>3.................=..09`..t......a..Y..BI.Z....=.'0...%...T..........H...>.:A.r......n..p...Pf.h...I.8... ....M.]&.#.vv'.....[c......g....>"......<c..f....i...sb!Z..iu<.%|......q.....G28.h-...7.....W.v...RtdK..F~.0.3.'.e..b7.c......a.3.....a\..]...gp8.+.u/}.w.qF........8.=.=|....\~..S.-q}]0...q.B.H.^J...!...a'.2Tn!..."..%........=.e_-.....{o..%o...a`.w..L.5..r.....e.8...pO..RE.Wgr..b.%.E...O.......8s...E....Um].C..M.....[...H.FZ..4...eZI.$..v.3<]..r....B..............8i......e<.D...Q4.q.^S.....H.b.......r.q..0o.......2..PP,."...JI...xU`.6f..K..Q9.Q..h..t....AI.S6...7............X..`dv..r..S....),7ES....#.....(...\.nh...X.ps%l..F...."<_....q....v........_.e.....P.........|&..fi..4..@..^0..v.]7.......^. ."..}(...w.g.X...=<....p.......L...P..XV....@:....N...Y....
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 7453 bytes, 2 files, at 0x44 "pictureorgchart.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                        Category:dropped
                                                        Size (bytes):23597
                                                        Entropy (8bit):7.692965575678876
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:7C645EC505982FE529D0E5035B378FFC
                                                        SHA1:1488ED81B350938D68A47C7F0BCE8D91FB1673E2
                                                        SHA-256:298FD9DADF0ACEBB2AA058A09EEBFAE15E5D1C5A8982DEE6669C63FB6119A13D
                                                        SHA-512:9F410DA5DB24B0B72E7774B4CF4398EDF0D361B9A79FBE2736A1DDD770AFE280877F5B430E0D26147CCA0524A54EA8B41F88B771F3598C2744A7803237B314B2
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF............D................................?..................................pictureorgchart.glox.................Content.inf.W..y....[.............../.jC....U.CUUUTU.5...jjPU..MP....T..0*....o0.......Y.=....P.({.3.p..."pA!>r../3.q..7...........!...TO....(..%......6...3E?....~......CZmndse.Qy....p....h....=.:5...F..%.E.&.v.`I~. ..%._..b]..Y..Q..R.........nN.q8c..a..L..X/.M...PP.q..SpZ.K]>D"Pf..B.c....0..|I.Q.,.g/..Kev.../..=......w..}3.....(....+#T.....K`N.u..Z.....rriK.(...(...6.<R.%.]..NX..b..].C.u....++......Ia.x. .7....J.#............w>....7..R...H>....@%....~.yA.......~.UB..*. .P..$...-...v.....=M."....hw..b....{.....2pR....].C..u@=G."Y..;..gc/N.N.YB.Z.q.#....$....j.D.*.P..!.)S.{..c....&'E.lJ%.|O.a...FG.|.....A..h.=c7.)d.5...D...L...IQ..TTE.*NL-.*M..>..p0.`......m..,.w#rZ..wR\@.Wn..@Q...}..&...E...0K.NY....M.71..`.M./:.>..._L..m...,U.l....._fi...nj9..,..w.s.kJ.m.s.M.vmw.!.....B.s.%.-').h.....)c.l....F..`3r...-.....0..7..&N.....n.#H...<7
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 5647 bytes, 2 files, at 0x44 "RadialPictureList.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                        Category:dropped
                                                        Size (bytes):21791
                                                        Entropy (8bit):7.65837691872985
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:7BF88B3CA20EB71ED453A3361908E010
                                                        SHA1:F75F86557051160507397F653D7768836E3B5655
                                                        SHA-256:E555A610A61DB4F45A29A7FB196A9726C25772594252AD534453E69F05345283
                                                        SHA-512:2C3DFB0F8913D1D8FF95A55E1A1FD58CE1F9D034268CD7BC0D2BF2DCEFEA8EF05DD62B9AFDE1F983CACADD0529538381632ADFE7195EAC19CE4143414C44DBE3
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF............D................................?..................................RadialPictureList.glox.................Content.inf....8....[.... $nq......C...../U..........a......S.Q...Q....j............(..z,.g.........^...Y..D... #i.TH5.<.=N..$..7.p".7.............`.3..1~,=,(.d8.Z.1....4'G.....!W^gClf._j.-N..&k.....Y3` =.(S..B^...i.zB.U....0O..h...I.(.......L...5.X.8.Sc<=>w.=.?&.....mR.......x.......mpW.T..^.FU...SN.C)......vsa.,x......,....E..i>..[g...#t...M..GR.9..$/4.:..q.bc9..x{bC.0..K.)..t.Y.&.v.d.16.B..c..or..W.,.B.........O.0..k.v........*F+..U.w...d...o8......A).}...#......L.!?.U.r.^.$...e.(..PG)8..+.9.5.l}.)..b.7+. 4....-.lC...|..j..Q.,.....7.W...|;j...%...:...|H..........<..%...K.....Fy.q$.k..}..8.9.M.u.?$].......r.....e.|..._..iT.;Dq5[....f.s..P.......e.T....!Y{.....t.wm..A..w-..7...3..T.:8.4.a[.Oo.. V.l.@.}..........E.&..J.....+..+.9)9<.._R.Hb.....V..Qu....:v.t.Li.0..J..V..b...!..N....-mD..c..(.[&o>.M.b..H.q..lk../..........W.8..z..B...
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 3749 bytes, 2 files, at 0x44 "TabbedArc.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                        Category:dropped
                                                        Size (bytes):19893
                                                        Entropy (8bit):7.592090622603185
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:EF9CB8BDFBC08F03BEF519AD66BA642F
                                                        SHA1:D98C275E9402462BF52A4D28FAF57DF0D232AF6B
                                                        SHA-256:93A2F873ACF5BEAD4BC0D1CC17B5E89A928D63619F70A1918B29E5230ABEAD8E
                                                        SHA-512:4DFBDF389730370FA142DCFB6F7E1AC1C0540B5320FA55F94164C0693DB06C21E6D4A1316F0ABE51E51BCBDAB3FD33AE882D9E3CFDB4385AB4C3AF4C2536B0B3
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF............D................................?..................c...............TabbedArc.glox.....c...........Content.inf.;....Y.[.........B.....?.T..ZD...........^C...U.R<Z....z+.I.....Z..-.V...f.....lB..\P.....=.-p....w ...\.kD..x'v..T..A..............".8...d.........FD.ZL.h..T...bp.)9B.v..i..VX...&..\..7.s..qy...l........Rty.Y...rU..>.9...8....L..\.^x.kDU.|TJ..{kN.G..E..$.kvy?.. mv......P..4.....q.1.6<u....e..dD...4.1E..Xi.5.=....1.P.c.K~S...YMO:.?..cL.g.tq\.(b1....E..0A.i..C...BT.m.S......:...}.&U..#QL..O.O../..K......=..........0a..O............BYP......>f.......iu...7.K..;QO~.t....%N.s.]>~#../7YN.....C..9.=cY.......y..U5.....,.....u.....#_..SG.`NR*.....?*..d.R.k.rX$...&.... ..h.4T.D^k-xA...............Hz..ep)e..4..P."fo Ne...o.....0n.Exr.........H..v...A.."..%)2......5...".}j.o8...E.HRQ;}.. .._L.+.jz....{.U..}...=B.o.^..vZ.:5.Z.M....y{\(...N..9...EB*MG...!N.vy..^...nE..2..@.;.4..C..t.4....h..O.8.=.m./...|Lu.|mCU..b.^.n39.h[M...%D{..w.1
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 291188 bytes, 2 files, at 0x44 +A "Banded.thmx" +A "content.inf", flags 0x4, ID 56338, number 1, extra bytes 20 in head, 18 datablocks, 0x1503 compression
                                                        Category:dropped
                                                        Size (bytes):307348
                                                        Entropy (8bit):6.408525613995651
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:0803677AE6246E8D155EF8168987644D
                                                        SHA1:AAC5F790DC5E1946C4D8D95EAC08DEC84B56D52D
                                                        SHA-256:83DBDB775137F47267DCC0030B8E03F5CA39503BABCC36A191053B2FE7C0AD3B
                                                        SHA-512:AD83DABC0E847C3E7696808CAC2A64A6E3DC9F82B7450683F382BFF53B2163D6BEC000ACCE6E8EA1894DCB8C2B9FD4FD12FB10BAABA4896F727C91A992E5C670
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF....tq......D...........................tq.. ?..........|..................Mn. .Banded.thmx............Mn. .content.inf..;.u.i..[...............?....^.j.{j.B...$M/!...W....{!..^0x/.6...&............w......$.B..J.?a.$=...P..L...d..........+./.\..E:h.....-.$..u-.I..L\.M.r..Y..:rtX:....8...........+8.}{......&.-..f.f..s3-P.''.r...Z-"/E../...^%^N(,.$..$.H..O........q>...|.|......y..m.)u....`.....z.n..-.[.5....xL....M...O..3uCX..=4.....7.yh...dg.;..c.x.4..6..e..p.e"..,.!.St{..E..^I.9j....;..`.Y..#.0..f...G.....9~./....QCz.93..u%hz.........t9.""........)..7K.c~E!..x.E.p...[......o..O.j.c.......6.t{...".....t9V;xv....n<.F.S2.gI.#6...u..O..F.9.[.L.....K....#..zL..I...o....k...qog.......V..BKM..#.bET.)..&4..m.w...*....E.a[.Q.y.B...w...r.nd...)...<..#..r[4.y...#.z.....m?.2K.^...R{..m..f......r?]..>@...ra$...C+..l].9...."..rM9=......]".'...b&2e...y..a..4....ML..f...f"..l..&.Rv=2LL..4...3t_x...G....w..I.K....s.t.....).......{ur.y2...O3.K*f.*P(..F..-.y.Z...
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 704319 bytes, 2 files, at 0x44 +A "content.inf" +A "Wood_Type.thmx", flags 0x4, ID 5778, number 1, extra bytes 20 in head, 51 datablocks, 0x1503 compression
                                                        Category:dropped
                                                        Size (bytes):723359
                                                        Entropy (8bit):7.997550445816903
                                                        Encrypted:true
                                                        SSDEEP:
                                                        MD5:748A53C6BDD5CE97BD54A76C7A334286
                                                        SHA1:7DD9EEDB13AC187E375AD70F0622518662C61D9F
                                                        SHA-256:9AF92B1671772E8E781B58217DAB481F0AFBCF646DE36BC1BFFC7D411D14E351
                                                        SHA-512:EC8601D1A0DBD5D79C67AF2E90FAD44BBC0B890412842BF69065A2C7CB16C12B1C5FF594135C7B67B830779645801DA20C9BE8D629B6AD8A3BA656E0598F0540
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF....?.......D...........................?...`J..............3..............M.. .content.inf..+.........M.. .Wood_Type.thmx......r..[.........................!.wwwwqwwwwwwwwwww..."....+......nR..x..\..w..r.5R.....(|.>.$e3.!..g....f..`9NL......o./.O.bxI...7.....|........6.n."J.....4^g.........?...................o.......s3.....8. .T.j...._.Z.Q.t.k,(o.c.t.......?Z....`o........?.a....6.)....6b..../.t...........Mz....q}......C.......+{.......o...K.tQjt............7.._....O.....\....` ..............@..`....%..t....V.]........m..m....u..1.yr;..t..F.'..+{....zqvd.g._..$H..Vl...m..../....g..rG.....:*......8....h...[...a06...U.W....5.Z.W..1I..#.2.....B3...x....$PRh...\{J.c.v.y..5+Y.W.N..hG......<..F..W.d8_....c...g....p|7.]..^.o.H.[$Zj..{4......m.KZ..n.T%...4.Z..Y."q7?kuB......U....).~.......W%..!.e.U.mp.o...h...?.w...T.s.YG#......Y.}....Z.O.i.r,...n..4.\....P..m..=....f........v....g....j...*.wP..4.VK.y.z...C..oum.b.1......?.Z.>.7.!?......A..Q>..Z....-
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 5731 bytes, 2 files, at 0x44 "ThemePictureAlternatingAccent.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                        Category:dropped
                                                        Size (bytes):21875
                                                        Entropy (8bit):7.6559132103953305
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:E532038762503FFA1371DF03FA2E222D
                                                        SHA1:F343B559AE21DAEF06CBCD8B2B3695DE1B1A46F0
                                                        SHA-256:5C70DD1551EB8B9B13EFAFEEAF70F08B307E110CAEE75AD9908A6A42BBCCB07E
                                                        SHA-512:E0712B481F1991256A01C3D02ED56645F61AA46EB5DE47E5D64D5ECD20052CDA0EE7D38208B5EE982971CCA59F2717B7CAE4DFCF235B779215E7613AA5DCD976
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF....c.......D...........................c....?..................................ThemePictureAlternatingAccent.glox.................Content.inf...3.....[.... .qq...........\<.^......o."......f.o...x.{..q..^.MH^...........{0.K....4pX.i...@6A4X.P.01d....'p.......zA.......... .......7.......a. `.=!@- ......>G.s.k~@.a.lfha:m....1...@.,G`....{....W..N..qs.......j.+TrsT.l.9..L...1+...d..-u..-.......).#u&...3......k.&C...DdZ.'.......8..<PF..r.eq.X6...u..v...s5.m.Q.l.G%.<.]....RV<...S..Dv..s.r.......dh.N.3-.Hf'.....3.GZ..E.kt.5......h...|...?!.L....~.)..v....:2.../F.,....o.qi.i7..E.|.mh.R_.@A.FO@i.....Feo...x.l...{E.\W9|V...=#..3..(......tP.:i....Ox.U.N...%6...p.6&.....<zh.z.|.<Z.?.k....y7m...F.Z$-.:.l.h...{T..7....?..T...d,r...z?../...`/Z......a.v@)....u......V..v.:.._.|.'..[..O.s.OAt-."b.In"..I...J*.~H.:-...?..uV....dZ;z:.l.{.E.,.Q..i]:.0r.I.y..f...../j.wN...^R.....u....>..}....f.f...]A..C~;/....%..^#..N.a..........99.....`.....%..iS....S......$....)
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 26644 bytes, 2 files, at 0x4c "Element design set.dotx", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 2 datablocks, 0x1203 compression
                                                        Category:dropped
                                                        Size (bytes):42788
                                                        Entropy (8bit):7.89307894056
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:21A4B7B71631C2CCDA5FBBA63751F0D2
                                                        SHA1:DE65DC641D188062EF9385CC573B070AAA8BDD28
                                                        SHA-256:AE0C5A2C8377DBA613C576B1FF73F01AE8EF4A3A4A10B078B5752FB712B3776C
                                                        SHA-512:075A9E95C6EC7E358EA8942CF55EFB72AC797DEE1F1FFCD27AD60472ED38A76048D356638EF6EAC22106F94AFEE9D543B502D5E80B964471FA7419D288867D5D
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF.....h......L............................h...?..................@g......o...............Element design set.dotx.................Content.inf.Y/..Re..[......f........,..]....D.],....]..X.......XC4pE.....p........2..u;L.N.....]G..d.^d.$).e.=..;..Kb.../.../....H.."...w$._I..5.....a..4.Gd5p......v.8..1..%H..\..e...3.e..A..).d*.. . (.8.".......(>..<...@...~*v&.f..LWhqk]+Uep.d..%...o.....k.......e...nNN.&_.>.d.?H`"...r?..Z.p..q..<M.N.t....{*.y]#...._XW"qI...x.......}.. .N...;.}:..m8...[.r.F....^?...o...u..*...J3.V....~...~tn#.Kf6.s.|*..,s...M.$.f..?Yu.pE.1_wU...%....._..'..Z......y:.{.J5..7..Q.w}/.~.-3~Ctw=..IT.....mI.u@...y.M....2.%...y...Y..j.k<-.Q.r...7m..b...+.6..|.....U..}[...,....^....5..D..qW...[3).p.Y<.Hh..t...%cw=Z..W.~W.F....zr.4.g...O...P.g_^..3.-............3s...S..y...u...N...EsJz....tT../..c[w{cG....../6.....:.W<d5}.q..s..K"$........Ne..5..#.v'..n4.rj....Fc=....5..VN.....6..9`....|..........WX..-?..........W.)^`1.......].R2..s6...H.......
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 3144 bytes, 2 files, at 0x44 "VaryingWidthList.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                        Category:dropped
                                                        Size (bytes):19288
                                                        Entropy (8bit):7.570850633867256
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:B9A6FF715719EE9DE16421AB983CA745
                                                        SHA1:6B3F68B224020CD4BF142D7EDAAEC6B471870358
                                                        SHA-256:E3BE3F1E341C0FA5E9CB79E2739CF0565C6EA6C189EA3E53ACF04320459A7070
                                                        SHA-512:062A765AC4602DB64D0504B79BE7380C14C143091A09F98A5E03E18747B2166BD862CE7EF55403D27B54CEB397D95BFAE3195C15D5516786FEBDAC6CD5FBF9CD
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF....H.......D...........................H....?..................................VaryingWidthList.glox.................Content.inf...O.....[.... v.q......R.....>.%i.I.HhD.V...qt.....'....N...!..aw$(J.%(..A..h......l|.D.p9`..Y09.:.u....p. :,.*.YD=0.p. ......w.........*..<..;.....u.."......7[....8.....?^........-..;q.|.....B....PJ....r.K#.#.0'...}.........+gpR...T....5.iu.^I...A\..gK....}..z.B.nT.../.m.......N....E'1.E.\..o.....W..R.#.#...8.7...R.SbW-...%......$.obj.F..W_@....sY!........s.O..."k. ..b....j....v...P.\....7d...|"J.T...2p..m.&..r..,2.).....X.`...xt].U...b.h..V.....|L..N.Z.O#....o...1R.w30.g..?;..C.T.:$..MGY.C"i\.f..#..<.k...m..s.w. ..Ga].....wt.h|.Ta<.......(SO.]9.%a..Z... r._JH.=O...P.9a.v.....Kj.".T...m...4.?...F...$...y.....hbW.UA..u.&)....py.C{.=t.....n...}|H3A9.=..W..JJ..y./Y.E.M9..Z..w. .HB.YoIi..i.e..9;n...SpHw,....f....d>..g.m..z...... ...f...KP.M..U.....~vFD.fQ.P?......2!.n.....`@C!G...XI.].s,.X.'...u.E.o..f
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 5213 bytes, 2 files, at 0x44 "rings.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                        Category:dropped
                                                        Size (bytes):21357
                                                        Entropy (8bit):7.641082043198371
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:97F5B7B7E9E1281999468A5C42CB12E7
                                                        SHA1:99481B2FA609D1D80A9016ADAA3D37E7707A2ED1
                                                        SHA-256:1CF5C2D0F6188FFFF117932C424CC55D1459E0852564C09D7779263ABD116118
                                                        SHA-512:ACE9718D724B51FE04B900CE1D2075C0C05C80243EA68D4731A63138F3A1287776E80BD67ECB14C323C69AA1796E9D8774A3611FE835BA3CA891270DE1E7FD1F
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF....].......D...........................]....?..........{.......................rings.glox.................Content.inf..|^.....[......P........<.$.."..0R..xa.Ax#B..d... ....K,.....^.H.....H.........&.j.\f.. ..,....,..!k..R..e..!...E...........................><.RB.....~h...........Q................g..M|,...x.....qV7.u..\...F-N.{-..X..&Zig.~..{.A.p.Z...X..{,-n............`$.%.ND.....>].6cvZ.%d..*a.$..-.K.Hf....L..;.#...H....U,........P.@.*-$C.,.g...%YJE..$.jP........b...Y<..[U...MF]F.K...1... x.}3w.o.#,.}T.....w5+...=.=...c.F^....OM.=.......G_{n.*...WC.w!......{/.~.}..s..6_......)..Xy...4.....<..XZJ........#~._i....%..fM.V.?.q...q.....7...B..sVt...(.:..c....~.e...kGZ...C..(J..o...`...?.)-.T.l....&...gR.$.....g.:...2.e%F.....x....z0...K..a8B...........D..]....7....~.".DR...r)...}b)e.>.\h~f...(}.c........Q...o5H.........C.KC.(.L.l................R..a.pg{..\.......-b........}.C......qTS..%..r.lG..Q.1..Z.>a.D...tC..LV...Rs.C.M18x.:......%O.
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 252241 bytes, 2 files, at 0x44 +A "content.inf" +A "Frame.thmx", flags 0x4, ID 34169, number 1, extra bytes 20 in head, 16 datablocks, 0x1503 compression
                                                        Category:dropped
                                                        Size (bytes):271273
                                                        Entropy (8bit):7.995547668305345
                                                        Encrypted:true
                                                        SSDEEP:
                                                        MD5:21437897C9B88AC2CB2BB2FEF922D191
                                                        SHA1:0CAD3D026AF2270013F67E43CB44F0568013162D
                                                        SHA-256:372572DCBAD590F64F5D18727757CBDF9366DDE90955C79A0FCC9F536DAB0384
                                                        SHA-512:A74DA3775C19A7AF4A689FA4D920E416AB9F40A8BDA82CCF651DDB3EACBC5E932A120ABF55F855474CEBED0B0082F45D091E211AAEA6460424BFD23C2A445CC7
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF....Q.......D...............y...........Q...XJ..........{..................M.. .content.inf.(..........M.. .Frame.thmx.1....b..[.........B.....6....ZZ}....BH..-D..}..V.V-........Z..O.....H.f..........;..@d.`......!..=;.,bp..K.q....s.y....D.qZ)p......D...r.S....s=B.4.).8B....4.a6 ...~........."....#.....}....n.Q.1cH.%c/.U....E..E...!..Da*.p....X..G..:.....1.@.....W.'...._........W.c...<.v.k.....&.8......?.h.>d._:-.X.......9..tL}........3.;.N3.D~......>.^?..|:...}......oT.z.......w..[..}:...._fu........Kk.......L..9..p..e..^......K.%...Mapqhvv..E&.^.....[...9|"l...9...U......!..w..Nya...~C.yx...w.K..q.z.j.W?t.......DY.x.S2.....]..na.Qj...X.K..^...S.hK.W...Z....s.0...NF...8C.......j.'Zc...k.%...l....S.....OW..o.Qf.x...X.;<.rO].....W.m.e....T.1.6........".....Q.3........l..v.."..I...&......w..4vE...c.s[.3.m..8.q$.....a...)...&:6..,..#..?....;.!.....~.UP.r=.}h.&U......X...]..X.e\u.G<....E....lG.@.*Z...10.D@.]....z+-.S....p..Y.PK.:.S..p.....1E`..-
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 206792 bytes, 2 files, at 0x44 +A "content.inf" +A "View.thmx", flags 0x4, ID 33885, number 1, extra bytes 20 in head, 15 datablocks, 0x1503 compression
                                                        Category:dropped
                                                        Size (bytes):222992
                                                        Entropy (8bit):7.994458910952451
                                                        Encrypted:true
                                                        SSDEEP:
                                                        MD5:26BEAB9CCEAFE4FBF0B7C0362681A9D2
                                                        SHA1:F63DD970040CA9F6CFCF5793FF7D4F1F4A69C601
                                                        SHA-256:217EC1B6E00A24583B166026DEC480D447FB564CF3BCA81984684648C272F767
                                                        SHA-512:2BBEA62360E21E179014045EE95C7B330A086014F582439903F960375CA7E9C0CF5C0D5BB24E94279362965CA9D6A37E6AAA6A7C5969FC1970F6C50876582BE1
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF.....'......D...............]............'..H?..........z..................M{. .content.inf..l.........M{. .View.thmx......R..[...........@...G...I..(J.....B....Q!....}Ju..(BR..._|.5.%.....6m...........?.w{.rm,....#....;Ba#.:v...Dv.."u.v{!...f}......!......:.S.......".z.f.......==.n.0Km0eh.Kbm.C.r.6.........d..h.....{..w..}....2sb...rvm..x...0(..B... ...BH.r#.@..d".*..F+...Q.sx.....?...d.d.eZ2W2.2d...q.I....4.e4....#.....K...3...1.p.y......>.~V....cm....n^..b.{..._D?..AG...'...k.L&..h}=p.....Wl....(.......>.~.].....'.4.W{......../......7.....'.s...w...6..hn..e.2.).l]u.v4...GF.X..X..X....G.i.\..y.g&.<&ti......Sp,j.....>I..S..%.y..........S..-).+...>...D..............[...d...jt.~<x.a(.MDW..a..ZI.;+..!,.$...~>#...).R4...K.$.Zm......b...........{..._..A{.}..r...X...T.ZI.T.).J...$.".U,.9...r.z.)......}...()<....m....QS.p...;?..5.W~2r.EZu..P.1.%'l.........+/6.Mm.|2....Ty..f.o.S.....3J.._...X,..m....:..1.<GqFy.QA9W4.=....n...ZP...O.\.[...:8.%.^..H.....
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 279287 bytes, 2 files, at 0x44 +A "Basis.thmx" +A "content.inf", flags 0x4, ID 55632, number 1, extra bytes 20 in head, 18 datablocks, 0x1503 compression
                                                        Category:dropped
                                                        Size (bytes):295527
                                                        Entropy (8bit):7.996203550147553
                                                        Encrypted:true
                                                        SSDEEP:
                                                        MD5:9A07035EF802BF89F6ED254D0DB02AB0
                                                        SHA1:9A48C1962B5CF1EE37FEEC861A5B51CE11091E78
                                                        SHA-256:6CB03CEBAB2C28BF5318B13EEEE49FBED8DCEDAF771DE78126D1BFE9BD81C674
                                                        SHA-512:BE13D6D88C68FA16390B04130838D69CDB6169DC16AF0E198C905B22C25B345C541F8FCCD4690D88BE89383C19943B34EDC67793F5EB90A97CD6F6ECCB757F87
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF.....B......D...............P............B..p?..........{.................M.. .Basis.thmx...........M.. .content.inf.`g..td..[...............5..$..WM.....R.......H\.+\./^...x.^..h..MU..\........v........+......g...$.......g.....~....U].7..T..1k.H...1...c.P.rp.6K..&......,.............U4.WoG.w.....;.....v..922.;]..5_-]..%E]b..5]... (..H..II..ttA4Q..BI!|...H.7J.2D....R.......CXhi`n....6..G.~&.[..N...v..Z"t.a..K..3..).w...._@.}.}.v.......4......h....R;.8.c&.F...B^....Q.....!Bm2...F.`.......M;...#.{....c...?...e...6t..C.-.E.V.v%I..H.....m.n...$D.....vU'.....=6}~...Gw...Y..?.@......G.....k......z...5d.h......1.}..O*;e..t......Y.0...3.v).X.-.2.....~....14.[.w=I....hN....eD..7G.u.z..7.do..!....d..o.wQ.:....@/.^..<e.-..=\.....6.C.'.rW$..Cp.M3.u6z......Q.F.9.5....juc..I...m4]7L....+n......).t......2[.3.p.:.....O5y..wA........^..!..H....{..S.3w.!&.'.;...(..|m.x.S..Z.j..3...n..WU...../w.......xe=.+.D...x..qy.S.....E..... ...uu.`.,..<.6[p
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 243642 bytes, 2 files, at 0x44 +A "content.inf" +A "Metropolitan.thmx", flags 0x4, ID 19054, number 1, extra bytes 20 in head, 24 datablocks, 0x1503 compression
                                                        Category:dropped
                                                        Size (bytes):261258
                                                        Entropy (8bit):7.99541965268665
                                                        Encrypted:true
                                                        SSDEEP:
                                                        MD5:65828DC7BE8BA1CE61AD7142252ACC54
                                                        SHA1:538B186EAF960A076474A64F508B6C47B7699DD3
                                                        SHA-256:849E2E915AA61E2F831E54F337A745A5946467D539CCBD0214B4742F4E7E94FF
                                                        SHA-512:8C129F26F77B4E73BF02DE8F9A9F432BB7E632EE4ABAD560A331C2A12DA9EF5840D737BFC1CE24FDCBB7EF39F30F98A00DD17F42C51216F37D0D237145B8DE15
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF............D...............nJ...............D.................."..........M. .content.inf....."......M. .Metropolitan.thmx...cVtP..[.....`Q..B.....=.T.....h.."...Z..|..}hZK.V....Z..Z................?..v...[S$."...H......^u.%.@...>....... f.........1.5......*&lm.tZ.msz:...Noc....1....D .........b..... ..3#pVp....}oo]{m......H*[%i.GNHB1D<......(*# ....H"....DP..b(B.<.....v......_..`.7..;.}............/.p}.:vp....~l0..].........S....G?.....}..U.;......dNi..?........-c..J.z....Z...._.O.....C..o.,......z....F....sOs$..w9......2G..:@...'....=.....M..am.....S......(`.._....'......[..K"....BD...D...^1k.....xi...Gt....{k@.W.....AZ+(,...+..o......I.+.....D..b. T.:..{..v.....g..........L.H.`...uU~C.d...{...4.N.N..m8..v.7..3.`.....,...W...s.;.fo.8.Y...2.i...T&.-...v8..v.U.Y=...8..F.hk..E.PlI.t.8......A.R....+.]lOei..2...... gS*.......%8H.....<.U.D..s.....>.....D_...../....l.......5O1S~.........B.g.++cV.z.f .R.Z.......@6....(..t^5"...#G...
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 214772 bytes, 2 files, at 0x44 +A "content.inf" +A "Parcel.thmx", flags 0x4, ID 26500, number 1, extra bytes 20 in head, 19 datablocks, 0x1503 compression
                                                        Category:dropped
                                                        Size (bytes):230916
                                                        Entropy (8bit):7.994759087207758
                                                        Encrypted:true
                                                        SSDEEP:
                                                        MD5:93FA9F779520AB2D22AC4EA864B7BB34
                                                        SHA1:D1E9F53A0E012A89978A3C9DED73FB1D380A9D8A
                                                        SHA-256:6A3801C1D4CF0C19A990282D93AC16007F6CACB645F0E0684EF2EDAC02647833
                                                        SHA-512:AA91B4565C88E5DA0CF294DC4A2C91EAEB6D81DCA96069DB032412E1946212A13C3580F5C0143DD28B33F4849D2C2DF2214CE1E20598D634E78663D20F03C4E6
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF.....F......D................g...........F...?..........|..................L.. .content.inf.zG.........L.. .Parcel.thmx.>2...R..[...0...........7....B+...BH....{...^.../.....B{...1....+".....<.....$........{.......sD"..j...}... P..w..U..f...6.x8. ...C..F.q.7....T.6p......B.P..L..g......A..43.W`.....{{...u.4...:.bb.4"X..m..)$..@(H. H.tBPTF..,.&.B.'...6..2...n..c%...Z@.(.@.......(.<i.i....P......?......o.......F.M.L......i.....C..7..../.....MQ.0..l.U.s.Fu.......1...p.;.(.}..ogd..<.._.Z......._.......O.J......97...~<...4.c....i..........'k.5.......Q.$..C..E... ..5.7....N.a.[ns6hi..kM....?....X......*9q...!O\....0....n.^s.9.6..............;. ..r...rf..C6z..v #.H...O...v/.sl....J.m%.L.Dp.e....*uO..g.y....f...].5.*........W.....h^[..w.|.=.ru.|.M..+.-.B...D.Ma....o.<X SnI....l...{..G..,..y5\W.@..y.;.y ...M..l.....e..A...d.e!.E..3.......k1.......6gY).../....pQ..?..s.W.)+R.S5..../.0..vz.^.......k.....v..9..A.NG...N~#..$.B...*s,(.o.@.ar.!.J.....
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 259074 bytes, 2 files, at 0x44 +A "content.inf" +A "Dividend.thmx", flags 0x4, ID 58359, number 1, extra bytes 20 in head, 18 datablocks, 0x1503 compression
                                                        Category:dropped
                                                        Size (bytes):276650
                                                        Entropy (8bit):7.995561338730199
                                                        Encrypted:true
                                                        SSDEEP:
                                                        MD5:84D8F3848E7424CBE3801F9570E05018
                                                        SHA1:71D7F2621DA8B295CE6885F8C7C81016D583C6B1
                                                        SHA-256:B4BC3CD34BD328AAF68289CC0ED4D5CF8167F1EE1D7BE20232ED4747FF96A80A
                                                        SHA-512:E27873BFD95E464CB58B3855F2DA404858B935530CF74C7F86FF8B3FC3086C2FAEA09FA479F0CA7B04D87595ED8C4D07D104426FF92DFB31BED405FA7A017DA8
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF............D................................D..........~..................M. .content.inf............M. .Dividend.thmx..).}.b..[.....`.........?.R...T../..............4..yy....{...f.h..\U......sy.gV0Q.@..A..@..3a.A}........7.q.......8......R....sJ)E..ENr.S*B.1..).s.r.J.D.b."..........(.....E$.V........y.5.L....;gY..QK/nni..x..3.<..Q.Q..K.I.....T.z.,F.....{.p.....;8._.&../...........X...}.;[Gk..._.i`m.u.?...s.w...4.....m......l....5..n.?..c..m...,.....{.k.?......sC.............e..1....oL.8./......1._.K:.]..&......O............qo.....Dd/c...6.q.*......V.v........h....L..h..C+..V..;O.(7Z]{I%....S3.{h....\...b.......5.ES......Z.4...o.c`..YA....9i....M.s....Z3.oq`....>.i..@.@n.a...x.3.zp.<....vU/.|^CvE...aD.P&mhvM>.p..B~....."._.......v-.m..w..?._..=...:...k....i.}x.6....Y.i..n....h...j......LZ.....fk..f0.y.T..Vl.;...s.......B6.f.'z.c.\W?...4U)..aJ.;O....L.d7.J.V#Q.....\J.F.?].d}!..y].6..%..~....|......5...'N.#.....t6.,.E.O."..0fyz....
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 533290 bytes, 2 files, at 0x44 +A "content.inf" +A "Parallax.thmx", flags 0x4, ID 64081, number 1, extra bytes 20 in head, 29 datablocks, 0x1503 compression
                                                        Category:dropped
                                                        Size (bytes):550906
                                                        Entropy (8bit):7.998289614787931
                                                        Encrypted:true
                                                        SSDEEP:
                                                        MD5:1C12315C862A745A647DAD546EB4267E
                                                        SHA1:B3FA11A511A634EEC92B051D04F8C1F0E84B3FD6
                                                        SHA-256:4E2E93EBAC4AD3F8690B020040D1AE3F8E7905AB7286FC25671E07AA0282CAC0
                                                        SHA-512:CA8916694D42BAC0AD38B453849958E524E9EED2343EBAA10DF7A8ACD13DF5977F91A4F2773F1E57900EF044CFA7AF8A94B3E2DCE734D7A467DBB192408BC240
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF....*#......D...............Q...........*#...D..........~..................M{. .content.inf............M{. .Parallax.thmx.9... y..[......(..b.P...E.Q*.R.".RTH.%.T..F......u.{.*+.P.....FK*0].F...a{...D4`D..V.../.P,....2.Mx...u......0...E...{A-"J...)jl_.A..T......u.Y....ZG:....V.A.#~.. ..6..............o..X..<.... .......C.ce.f!nA.).p...p........n..................'6w6H6s.j....l...{?.h..........]..l.....v....%..l}A..................3...W_73.j......6...F.../..qG.?........H..).........7.&km....`m2..m.W.q.<../~<..6*.78..X~.e+..CC*w...T...6....AB..l..._.f......s.e....2....H..r.R.Z....a.,..\Q.q..._SJJ....7.S.R....=f..>....9=....NnC.....].-...\..Z..q..j...q.....Nj..^'..k...Zl.~PRvpz.J..+.C...k.z.w=l.#.............n...C..s.kM.@B{..vL.e....E..(/......f...g..=..V...}...).=s.....y!.,...X.[..[.....\31}..D%...%..+G66.j.v./.e9...P;.o.y..U+...g.g.S.../..B._L..h...Oi.._...:..5ls>>........n6.F.Q..v>..P.r:.a..Z....a...x..D....N...i..=L.u......<;Nv.X/*.
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 6196 bytes, 2 files, at 0x44 "ThemePictureGrid.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                        Category:dropped
                                                        Size (bytes):22340
                                                        Entropy (8bit):7.668619892503165
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:8B29FAB506FD65C21C9CD6FE6BBBC146
                                                        SHA1:CE1B8A57BB3C682F6A0AFC32955DAFD360720FDF
                                                        SHA-256:773AC516C9B9B28058128EC9BE099F817F3F90211AC70DC68077599929683D6F
                                                        SHA-512:AFA82CCBC0AEF9FAE4E728E4212E9C6EB2396D7330CCBE57F8979377D336B4DACF4F3BF835D04ABCEBCDB824B9A9147B4A7B5F12B8ADDADF42AB2C34A7450ADE
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF....4.......D...........................4....?..................1...............ThemePictureGrid.glox.....1...........Content.inf....K..5.[.... V.q......B.....?.h.i.J.D...Z...>.....i~...A...Z....H.hy.D..X.....>...L.I..`. z w0}.K`.C{h....W\../.U..p\%...B...;............9..8.^M.....].lP.p...|..?..M....E..S.`..-n........Q'.'.o..C}=..?`.bQ...J"0f.. ....k3n..F.Pu..#...w].`<...."D.].-.#+):..fe..=<.M...4..s.q.f._.=.*T.M..U.[R.kbw.,......t6_I...~.X..$_.q....}2..BR...).[...<.l.3........h%....2.$`>..hG...0.6.S......._3.d~1.c.2g....7tTO..F.D.f.Y..WCG.B..T....Gg&.U'....u.S/......&6w..[bc.4....R.e..f.,....l."........I....J.=~...$x.&2...+,-.;.v.'.AQ.fc...v._..rZ..TYR...g?..Z..!.3mP dj...../...+...q.....>..../...]P.z?DW&.p..GZ....R5n......,..]{].0m.9...o.{...e."...8VH....w"%;.g\.K..p.}....#r.u..l.vS...Y.7U.N*-E@.....~....E...x.....C.......{NP....5Ymk.*._.K...Z...f..;.......b.....,._@B..\.S..d.'\rs..].}.5"XJU.J..'.zk}.+P.)C.X.?9sx.D....(K....P^N_D...Z.........
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 624532 bytes, 2 files, at 0x44 +A "content.inf" +A "Quotable.thmx", flags 0x4, ID 13510, number 1, extra bytes 20 in head, 30 datablocks, 0x1503 compression
                                                        Category:dropped
                                                        Size (bytes):640684
                                                        Entropy (8bit):7.99860205353102
                                                        Encrypted:true
                                                        SSDEEP:
                                                        MD5:F93364EEC6C4FFA5768DE545A2C34F07
                                                        SHA1:166398552F6B7F4509732E148F93E207DD60420B
                                                        SHA-256:296B915148B29751E68687AE37D3FAFD9FFDDF458C48EB059A964D8F2291E899
                                                        SHA-512:4F0965B4C5F543B857D9A44C7A125DDD3E8B74837A0FDD80C1FDC841BF22FC4CE4ADB83ACA8AA65A64F8AE6D764FA7B45B58556F44CFCE92BFAC43762A3BC5F4
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF............D................4...............?..........~..................M. .content.inf."..........M. .Quotable.thmx..^.u.n..[...............&...U..F.......UU.M.T5.UUQS..j..#>43fD.....`....Vr......19'...P..j.-...6n.0c....4$.c....$.4.k3aQ$.lCN.#.[.."qc....,Z...,Qt@!.@...... ...H.......9.9.y.{....[.`..s3.5.....B....W.g.d...[uv.UW..............P.8.(.?......3.....'/F...0...8.P. .O..B....K...g..L.......#s...%..|4.i....?.3b.".....g...?.........2.O23..'..O~.+..{...C.n.L......3......Y.L...?K...o......g....@.]...T..sU.....<.._.<G.......Tu.U2..v.&..<..^..e.].cY;..9.%..}...I.y.;...WM...3>.:.=.|.-.AtT2OJ.I.#...#.y....A....\]$r...lM.%5.."...+7M..J.....c...".&$.... Y.r.B;..81B. +H...b....@7K.*.F.Z...v..=..ES.f.~.."...f..ho.X.E.a`~*...C>.&..@\.[....(.....h..]...9&...sd.H .1.x.2..t.rj..o..A..^qF.S9.5.....E.{...C|.w.c/V...0Q.M...........O.7;A4u...R..Z.B.7a.C`....p.z.....f!|.u.3t....2e.wWH..'7p....E_...e.._;..k....*&E.^.f=V..{*..al.y:.4a...+.g...-..>e
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 682092 bytes, 2 files, at 0x44 +A "Berlin.thmx" +A "content.inf", flags 0x4, ID 46672, number 1, extra bytes 20 in head, 30 datablocks, 0x1503 compression
                                                        Category:dropped
                                                        Size (bytes):698244
                                                        Entropy (8bit):7.997838239368002
                                                        Encrypted:true
                                                        SSDEEP:
                                                        MD5:E29CE2663A56A1444EAA3732FFB82940
                                                        SHA1:767A14B51BE74D443B5A3FEFF4D870C61CB76501
                                                        SHA-256:3732EB6166945DB2BF792DA04199B5C4A0FB3C96621ECBFDEAF2EA1699BA88EE
                                                        SHA-512:6BC420F3A69E03D01A955570DC0656C83C9E842C99CF7B429122E612E1E54875C61063843D8A24DB7EC2035626F02DDABF6D84FC3902184C1EFF3583DBB4D3D8
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF....lh......D...............P...........lh...?..........|..................M. .Berlin.thmx............M. .content.inf..lH.lj..[...............7.I..)........P..5x.B/^y5.xk^^......D.F........s....y...?D.....*.....&....".o..pl..Q.jm?_...6......=%.p.{.)S..y...$......,4..>#.........)..."-....K....4.E...L=.......4..p.c..nQ.0..ZO.#.....e.N..`U......oS....V..X[t.E)|.h..R....$..}.{.F.7....^.....w.,...5rBR.....{.......mi...h.b......w+..;.hV......q..(.7&.Z.l...C."j........[-E4h.....v&..~.p$|\X...8.....Fj'%,.)6w...u|C..,y..E..`*Up../(....2.(....Z.....,.'...d..s..Z....5.g.?Nq..04...f...D.x....q+.b.."v`{.NL....C..... ..n......1N+.I.{W9....2r.0...BaC.....O..=...k..."..8.D\jK.B...Aj....6,B..2...I.. B..^.4..1.K+.....DP...Mr....9..x[...>........?.Zd..'._2.._..>..'.F..#.w...2..~.|........q_Wy.W.....~..Qex.km/..f......t.q..p..gm.|.x.... ,.#\Z....p....a.}...%..v.J.Es......I.b.P?...0......F.x....E..j..6.%..E..-O.k...b .^.h.Cv...Z....D.n.d:.d.F..x...[1...B..
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 15338 bytes, 2 files, at 0x4c "gosttitle.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 8 datablocks, 0x1203 compression
                                                        Category:dropped
                                                        Size (bytes):31482
                                                        Entropy (8bit):7.808057272318224
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:F10DF902980F1D5BEEA96B2C668408A7
                                                        SHA1:92D341581B9E24284B7C29E5623F8028DBBAAFE9
                                                        SHA-256:E0100320A4F63E07C77138A89EA24A1CBD69784A89FE3BF83E35576114B4CE02
                                                        SHA-512:00A8FBCD17D791289AC8F12DC3C404B0AFD240278492DF74D2C5F37609B11D91A26D737BE95D3FE01CDBC25EEDC6DA0C2D63A2CCC4AB208D6E054014083365FB
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF.....;......L............................;...?...................;......................gosttitle.xsl.$...............Content.inf....v....[...=..Ic.32.E...`o.............m....4uk[.,.......{...}k{.R@(Hq..68nv...@.D.....$...j....8Q..........8.8........3...*.bi?Wt...:(..J.;&eii..io.w..z...`.'..i.MLR@.>....N..3`P.>$X@(r.#.D..(....P"_..I.$o.. L!y...I...H.........{.{....{.3....7..w..{w.2sn.dYn.lW...l...c$.UH....L6. .D$$...!F.!... .D............_..'.`.Q.v>..Z..f.n.l....0o.......bK...?s..eO....'.>t......S'..........~....h...v&7:q.x9|qs...%....:..D...ag.....e..'...".A.Y..?w"....p1t.9J.~.4.........~vj.n.8.;.O......../.}..io{p...e...\m.d`.gAm.......1"...N*...8..g"......~..[.e+.....\6i4.....%...Rq.U-p?..4P..4.f.?N.vI?.M\i.;.s..E.L.hu.*...\..5....N......]......\`...rS.\g.....2..!a).?.l.!i.^.t.u...x...g/.A..v.E...\.@.>kM...&.g.....%.......{.....2..E.g...'..[w...N.w..& 4M.a.cu.%:...\.D..Q..C.'fm..i....@._......QI.. ....h..|fB.il.(`..h.d;.l...`.s:
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 1049713 bytes, 2 files, at 0x44 +A "content.inf" +A "Savon.thmx", flags 0x4, ID 60609, number 1, extra bytes 20 in head, 37 datablocks, 0x1503 compression
                                                        Category:dropped
                                                        Size (bytes):1065873
                                                        Entropy (8bit):7.998277814657051
                                                        Encrypted:true
                                                        SSDEEP:
                                                        MD5:E1101CCA6E3FEDB28B57AF4C41B50D37
                                                        SHA1:990421B1D858B756E6695B004B26CDCCAE478C23
                                                        SHA-256:69B2675E47917A9469F771D0C634BD62B2DFA0F5D4AF3FD7AFE9196BF889C19E
                                                        SHA-512:B1EDEA65B6D0705A298BFF85FC894A11C1F86B43FAC3C2149D0BD4A13EDCD744AF337957CBC21A33AB7A948C11EA9F389F3A896B6B1423A504E7028C71300C44
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF....q.......D...........................q... ?..........{...%..............M. .content.inf.Q_.........M. .Savon.thmx...O>.o..[..............&.5....UUcC.C....A...`TU...F....".54.E.....g.-.7-D....1g...p.6......@..w(....h'?.....(..........p..J.2n$4.........A......?...........@.C.W.R.5X..:..*..I..?....r.y..~!.....!.A.a...!........O.........5.x<C...?.?....C.C.......'....F../....../.$................4.7...................P...(.w.}6.........7.....01.1r........._..?.............'.._..JOx.CFA<.........*0..2.?...>F.../...;..6-8..4...8&yb....".1%..v'..N...x......}.gYb..~L.....f[..!......Y.G.....p..r...?.p...F.Vy.....o.Whll...+...M.V...:.]...B.%.H....n..@.].zaVxf...y{.@....V.t.W....$Kp-.....7W.J..h..0A3mK.=.ub..R...W......*'T2..G#G,.^..T..XZu...U. ...76.d..#.I.JB.v...d...%.....6..O.K.[.:.L.\.....1.D..2a.>f......X...b5...ZgN.u.f...a!..."...sx....>..?.a.3.8.^._q..JS1.E..9..Lg.n.+....lE.f:j.9)Q..H1=..<.R.......{c>:.p[..S.9h.a.gL.U....8.z..z.!.....2I.~.b..2..c...
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 937309 bytes, 2 files, at 0x44 +A "content.inf" +A "Gallery.thmx", flags 0x4, ID 44349, number 1, extra bytes 20 in head, 34 datablocks, 0x1503 compression
                                                        Category:dropped
                                                        Size (bytes):953453
                                                        Entropy (8bit):7.99899040756787
                                                        Encrypted:true
                                                        SSDEEP:
                                                        MD5:D4EAC009E9E7B64B8B001AE82B8102FA
                                                        SHA1:D8D166494D5813DB20EA1231DA4B1F8A9B312119
                                                        SHA-256:8B0631DA4DC79E036251379A0A68C3BA977F14BCC797BA0EB9692F8BB90DDB4D
                                                        SHA-512:561653F9920661027D006E7DEF7FB27DE23B934E4860E0DF78C97D183B7CEBD9DCE0D395E2018EEF1C02FC6818A179A661E18A2C26C4180AFEE5EF4F9C9C6035
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF....]M......D...............=...........]M...?..........}..."..............Li. .content.inf............Li. .Gallery.thmx.].(.Vq..[.....0Y..........v.....w.wwwww.wwwwww.w.....".83....y8..mg...o*..U..N(..@uD.:O<........{.G....~~.....c.c.5..6./|G .@#1O.B.............PT@...b.d.~..U....B.{.........0.H.....`.H.`..'S.......Ic..W..x...z....... .........g......._....o......S......p...$....._........._...K......x..?.6.U~...'./.r.................../.......5.8..2........2b.@j ....0.........``....H... ,5...........X........|..Y.QoiW..*|.......x.sO8...Yb....7...m..b.f.hv..b......=...:Ar.-...[..A\.D..g..u....].9..M...'.R-`.....<..+.....]...1.^..I.z..W{.._....L.. ...4;..6O.....9,.-.Vt+b/$7..}.O05.Y...-..S.....$*.....1."Z.r;.!..E.mMN..s .U...P%.[.P...cU...j...h.d.../.s..N/..:..X*...p5.7\}h.Q ..._.F.X.C..z$.nV..+.k..|.@.L...&.........^#.G.a..x..w!wx.8e+..E. i..$?9..8...:......|..[."..y..&y..?...W....s..._...3Z0c.....i.q.........1c.jI....W..^%xH.._...n.......&J..
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 1291243 bytes, 2 files, at 0x44 +A "content.inf" +A "Droplet.thmx", flags 0x4, ID 47417, number 1, extra bytes 20 in head, 54 datablocks, 0x1503 compression
                                                        Category:dropped
                                                        Size (bytes):1310275
                                                        Entropy (8bit):7.9985829899274385
                                                        Encrypted:true
                                                        SSDEEP:
                                                        MD5:9C9F49A47222C18025CC25575337A965
                                                        SHA1:E42EDB33471D7C1752DCC42C06DD3F9FDA8B25F0
                                                        SHA-256:ADA7EFF0676D9CCE1935D5485F3DDE35C594D343658FB1DA42CB5A48FC3FC16A
                                                        SHA-512:9FDCBAB988CBE97BFD931B727D31BA6B8ECF795D0679A714B9AFBC2C26E7DCF529E7A51289C7A1AE7EF04F4A923C2D7966D5AF7C0BC766DCD0FCA90251576794
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF...........D...............9..............XJ..........}...6..............M.. .content.inf............M.. .Droplet.thmx..m7.>J..[...............2.QQPIj.*.."o^R.H5*^...^(e.W...R..x..^`..m...."..+.....{o.......Q.-....$V.N>...T]..L.... ..N.h..dOY.......S......N.%.d..d....Y.....e..$...<.m...`............@....=.z..n..[...,G..1Fn.qPDH{C<...3.Q...2..r..*...E.E.E.ErM"&a..'..W....:...?I..<.I..6o.`.d.?!..!..._.4\.._.E..).._O.S....; ..#..p.H.....c....o\.K..?$U.e.........!...J.v.....gNe._..[....#A.O.n_.....gm:P._.........{@..-g..j.69b.NH.I.$Hk?.6.n...@......'.C.._.U..:*,j.-G.....e.#.Sr.t.L......d[.[...s.....rx.3.F[.5o..:....K*.x..)M.fb...3IP.&h.Q.VX^%U.......x..l......@6.k.P..zSW.?....F..[L...4..b.l.w."&.....`.j...i.5}".~.-.....{\.:...o.'H\*+)....3.Y......\...f:.;....e........4't7..f...w..j...3....N..9`.J...P..?.....=3_.y]...f.<.......JM5.}Q/ .F.a..Z.._yh......V..>m .......a....f....!.hz..\.....F_..'z...,....h.=.......=.o..T....3.e..........$..g.2.
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 1081343 bytes, 2 files, at 0x44 +A "Circuit.thmx" +A "content.inf", flags 0x4, ID 11309, number 1, extra bytes 20 in head, 45 datablocks, 0x1503 compression
                                                        Category:dropped
                                                        Size (bytes):1097591
                                                        Entropy (8bit):7.99825462915052
                                                        Encrypted:true
                                                        SSDEEP:
                                                        MD5:BF95E967E7D1CEC8EFE426BC0127D3DE
                                                        SHA1:BA44C5500A36D748A9A60A23DB47116D37FD61BC
                                                        SHA-256:4C3B008E0EB10A722D8FEDB325BFB97EDAA609B1E901295F224DD4CB4DF5FC26
                                                        SHA-512:0697E394ABAC429B00C3A4F8DB9F509E5D45FF91F3C2AF2C2A330D465825F058778C06B129865B6107A0731762AD73777389BB0E319B53E6B28C363232FA2CE8
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF............D...............-,..............x?..........}...-...RU.........M. .Circuit.thmx.....RU.....M. .content.inf.g...&|..[......=..R.....=.*,.!QA?h..Q.!....Uk!.HJ.......VKuk.....q.w.w.U.....;...K.@.URA..0..B..|rv.ND(.`{..@.1.}...s?.....-...O.(V.w..1..a.....aW...a.Z..aX....5.I...!..........(. ./.d...me.( ..f.........w.......Xp.s....c..vB.98.....C.J......V ..ML.M...B.n.>...|....u!.5@t..q4....(K...u qL.S....>/%v%.2..TF.].e..'..-..L.N..c].a..(WU\o.%^..;...|o.6..L..[..;&....^p.Lu.sr,-.R=.:.8.>VOB...:.?$.*h.o....Zh.h....`.B.c.../K......b^...;2..bY.[.V.Q8....@..V7....I0c.cQN7..I.p..}..!..M....1K....+....9.2......a..W.V..........;.J .i......]%O.-......CeQ.0.c....MbP3.0.w..8w..Y...|...H;#.J.+M......>.`y..aWk|.i.BF.pJv;.....S..6....F.....RLG~..........J.=......"..........H.....h..o...u........M.6F?.F.p.B.>./*l....J.R..#P.....K......<iu..gm^..n...#c..zO"7M.O......4'>A..(.E.Cy.N.)....6.tx.r[.....7.......m.t..E?.....5.5.6.\..{.V.T.D.j..=~a^.I
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 1750009 bytes, 2 files, at 0x44 +A "content.inf" +A "Slate.thmx", flags 0x4, ID 28969, number 1, extra bytes 20 in head, 72 datablocks, 0x1503 compression
                                                        Category:dropped
                                                        Size (bytes):1766185
                                                        Entropy (8bit):7.960223219588389
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:16F158E6C7774202122FDF653B2CB110
                                                        SHA1:8ABFDB2C86428A19B0DDAAF5CD50E16C14D4B526
                                                        SHA-256:905C2F773B8E22FAA0BA4FE6AAFD68FC5E2E9694FAE139BCF1F7B71651D3171E
                                                        SHA-512:1F11344D3ACC56B62ADBEEF4882E38268816EC08135A17D31276D0FD2BD4818607805FAAC45BE7D9F60DAA2F77C32027100A0CA95F0F3ABF8566CF22DDD612D6
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF............D...............)q..............0?..........{...H..............M.. .content.inf.;.#........M.. .Slate.thmx.p.+..P..[......U..............p..K.!.......*...K..w..v........=....D$r...B....6 ...X.F0..d..m.s...$$r........m.)6.m3....vXn.l..o...a...V......Ru.:=2M.........T.....4S`EP......\..r,..v...G.P......'._H0]..%_............X.P.,.............H.?.-.H..".......M..&..o....R........<......`...D.H.._.G.Qv..(.*.U,.9..D...."..T..i.e../.e.."....,S...o.X.....c./..V....Z..o.O..2....{...+... ....0.@J.R.Q.m.....{.....h?u.q.O{...l.d)..Yk`.....#...u.-.m..#CXwrz4..7.>......v.E:.#.oGSKS.TX.Chm.4aQ......avH..{..j+@6[k].....`c..W8..j.v.Zh.]....4......K..#Hzyd..K}.....H|<H..\(l...+..%Z......~.S:^..d>..1..H%..7N-v.....Wu.*..b^.B.....k0gc.2.{.!...E7.}3.d...{.Ye...&#f6...:2......v..&!..k0d.p.b...,..$.....Y..60...h.N}.r...<[./........{...Es..&.nf.....2.@Fh3.9.G....l.[.C..SD/6.H.K....}..m....M..........gl.P.]..I......5....e.c...V....P...[.=.......O.eq+
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 2573508 bytes, 2 files, at 0x44 +A "content.inf" +A "Mesh.thmx", flags 0x4, ID 62129, number 1, extra bytes 20 in head, 94 datablocks, 0x1503 compression
                                                        Category:dropped
                                                        Size (bytes):2591108
                                                        Entropy (8bit):7.999030891647433
                                                        Encrypted:true
                                                        SSDEEP:
                                                        MD5:BEB12A0464D096CA33BAEA4352CE800F
                                                        SHA1:F678D650B4A41676BA05C836D462F34BDC5BF648
                                                        SHA-256:A44166F5C9F2553555A43586BA5DB1C1DE54D72D308A48268F27C6A00076B1CA
                                                        SHA-512:B6E7CCD1ECBB9A49FC72E40771725825DAF41DDB2FF8EA4ECCE18B8FA1A59D3B2C474ADD055F30DA58C7E833A6E6555EBB77CCC324B61CA337187B4B41F7008B
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF.....D'.....D............................D'..D..........z...^..............M7. .content.inf............M7. .Mesh.thmx....&~j..[.....0.................]............ww,v.\....D......3m..m!f..0..E{..?..`..A...k.:....I..........|bmG.FS...f.;.J.vzb.......R.......-....|.......ESD.....".4M..M..t.N....y..,..#.4.5.2.......'.8.Q..3.D..T....!.......&rJg...s........(..9........Dw..'....9.-..G.c............E.. .O.....a..O.._..s..)7Wz~....bJ..D...o....0..R/.#...?.......~6.Q?....?y...g.?............TP..r-...>....-..!.6...B.....\../...2....4...p$...Oge.G.?.....S.#x(..$.A~.U.%f....dJ..S.f{.g.._..3{.fm2.....Z.\o&.[k.m....ko.8..r.-.Go.OQ..'!6..f.L...Ud.$.q*.L.....R.. J.T&4g...7.2K...#k.[.].:....lk.....;c..DRx.`..&L..cpv*.>.Ngz~.{..v5.\...'C.<R:.C8.|.fE{......K...).....T...gz}..rF..Q.dof7.....D.f=cm...U|.O.]F...5zg(.. ....S..._?D....^..+.i...Z.....+X..U!4qy..._..`I..>./.W.7......=.O....BG..=..%9|...3.?...}.$"..H..u...0.......a..:t?.....8...Z..#g.=<.e.`\......KQ..U....
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 3239239 bytes, 2 files, at 0x44 +A "content.inf" +A "Vapor_Trail.thmx", flags 0x4, ID 19811, number 1, extra bytes 20 in head, 111 datablocks, 0x1503 compression
                                                        Category:dropped
                                                        Size (bytes):3256855
                                                        Entropy (8bit):7.996842935632312
                                                        Encrypted:true
                                                        SSDEEP:
                                                        MD5:8867BDF5FC754DA9DA6F5BA341334595
                                                        SHA1:5067CCE84C6C682B75C1EF3DEA067A8D58D80FA9
                                                        SHA-256:42323DD1D3E88C3207E16E0C95CA1048F2E4CD66183AD23B90171DA381D37B58
                                                        SHA-512:93421D7FE305D27E7E2FD8521A8B328063CD22FE4DE67CCCF5D3B8F0258EF28027195C53062D179CD2EBA3A7E6F6A34A7A29297D4AF57650AA6DD19D1EF8413D
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF....Gm1.....D...............cM..........Gm1..D..............o... ..........MP. .content.inf...7. ......MP. .Vapor_Trail.thmx..n...N..[......L........7...+I..x...P7/...BH..Rm.\yqi.x..B....{.m.............=.....p.%.@......BpV.[......C.4..X./..Y.'SB..........0.Gr.FG.).....R\...2..Jt..1..._.4_B..................cn7H.-.....Q...1..G{G.~.. '.$......@.(....=@=..`....@.@.A. ....'.4`. .@....D...'....S.s..9.7" /....?.aY.c.........LG....k...?_.....P.....?.1.....FB..m..t...['......:...?...W..../~..z.Tr...X.@...._....3..N..p.....b...t.....^..t...~..t.8A...t_....D..3R.Z.=..{.A.8).3-5..v.isz....0A~%.s.D.4....k.K......8......)R.}f.E..n.g&:W...'E....4%T..>......b.y..[..zI....e...j.s....F.....|7826U.C.,..BY.U.F.f......"..#.m..,..._...#.\.....gPP.2.}Kas......g..3.d0.Z.Z.]..n......MY]6.....].m..D.6...?.n.20.,.#...S...JK..#.W.%.Z4.....i..CBf...../..z......n.N...U.....8t...ny...=.!..#..SF..e...1.P..@.Qx*.f.;..t..S.>..... F..)...@.Y..5j....x....vI.mM....Z.W..77...
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 3400898 bytes, 2 files, at 0x4c "Insight design set.dotx", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 106 datablocks, 0x1203 compression
                                                        Category:dropped
                                                        Size (bytes):3417042
                                                        Entropy (8bit):7.955921716664098
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:D9316356A48F3819DDC7BB36EF2AA15E
                                                        SHA1:B82B78D6706D722F655DABC5A0BD478F00D88979
                                                        SHA-256:FE45F4FE3D293E9027E48CE1354DBCF18D89F74A455023CAD20FFAAB4D117E5F
                                                        SHA-512:20C2E05BF0B615B317296E99BBB8031183CE24C5A097A93E113451F5569248903022233C4CA135091AAA5E844511E11E35D9E6C63F88EF594FE0D743008FCA75
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF......3.....L.............................3..?..............j.....3.....t.4.............Insight design set.dotx.................Content.inf...QJ.N..[.........R.....L....N).J|E.B.$.B).3,...n.....JW....k.U1..M...3#.5....$^.....;vR...Z.nj...#......^*......a.{..(..o.v...!L`...T.-&jZ`.\.*0.....G.."b.m..F.X......$>%..?.D..H.l.j....$.......MrQ......q-....hx...6.D.3...j....n..U#R..3....sm?..xJr..............$G8..t.g...?.g.}......$P._...7.#..w..9DR....*lu....?..'.Ai..v.vl..`......B..N_....W./.;...c=oYW.lL'bv.......+...9.P..B=...*Y.SX=EL.5o....?H.e|.Fn.M[...d.v.....i......9..U..H....uq.Nrn..@..e...3....8.....s8}z..$........B....26...d..?.l....=.aeM.[..|n....H.;..7A.`....=.F...V.Y.l..8.........%e.x0S.....~..2..%.....U..#.r_.0V.v.6w.l.......Y.........v..o+....*sn.$^'.Il...akUU....w....~.....&8.Vwj.....Q.uQ..&..G.($.2.s.?m.B.~j.*..+G.W..qi..g..5.)){O........o.ow.(;.{...y;n...J...&.F2.@.;......[{'w..........`....czW.........?W...}..w....x..........
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 1865728 bytes, 2 files, at 0x44 +A "content.inf" +A "Damask.thmx", flags 0x4, ID 63852, number 1, extra bytes 20 in head, 68 datablocks, 0x1503 compression
                                                        Category:dropped
                                                        Size (bytes):1881952
                                                        Entropy (8bit):7.969487365633608
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:CF1E54DDE6D58E3AC5297AE9326CF1D7
                                                        SHA1:4918D5538563BFDF1F0EEC078347C2852AE41AEF
                                                        SHA-256:4754355DA4EC8FC6E2BCC7E201A8102EF3F217B432E8A8FC73EAD6791F0C8594
                                                        SHA-512:6095378A9589F7A97B2E99E8DE1AA20B47D761FFAFA25D692A63F6504538339D2951EB596284B5D3AC9EB31F465917FD8ABD43595B035EFF7146FFA482A7253D
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF.....x......D...............l............x..`?..........|...D..............M[. .content.inf...!........M[. .Damask.thmx...o.PI..[.............../.TU.jj0..3jCUPU.jF...m.UU.P}.....PU..*........w..#....E..].................A.. w.$..@..'g.......6%:..r9..d.M;M+.r.8[d{.s..dh..(P..........!.. ..ne..f.Nc..#..Y..q....KB}..b].@..F.&.t....E.........@&.m......$w......q...:.H....p.p.....?.9x.. .....?...ao....I....................o......g.u..;."....O;....{..(k..._.w/.Z......Jb..P.O?...........?....F....ty..72......! #....v..J......?.....!,.5.7..Em.....is.h.. \.H*)i1v..zwp.....P.....x].X{O//..\....Z>z....6...+..a.c...;.K..+...?014..p.w%o^.....]...MguF...`....r.S.......eF..):.dnk#.p{..<..{..Ym...>...H......x.}.hI..M....e......*G.&.?..~.~G6.....+...D..p...._...T....F6.[Cx./Q..Xe.>.;.}>.^..:..SB.X..2.......(A..&j9....\\.......Haf+]Y...$t^Y=........><.w....tL../E...%6.Vr~MI...l.....<.0.I....7.Q8y.f.uu...I.p..O..eYYS.O......9..Qo.......:..........o.............{
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Cabinet archive data, many, 2511552 bytes, 2 files, at 0x44 +A "content.inf" +A "Main_Event.thmx", flags 0x4, ID 59889, number 1, extra bytes 20 in head, 90 datablocks, 0x1503 compression
                                                        Category:dropped
                                                        Size (bytes):2527736
                                                        Entropy (8bit):7.992272975565323
                                                        Encrypted:true
                                                        SSDEEP:
                                                        MD5:F256ACA509B4C6C0144D278C7036B0A8
                                                        SHA1:93F6106D0759AFD0061F73B876AA9CAB05AA8EF6
                                                        SHA-256:AD26761D59F1FA9783C2F49184A2E8FE55FCD46CD3C49FFC099C02310649DC67
                                                        SHA-512:08C57661F8CC9B547BBE42B4A5F8072B979E93346679ADE23CA685C0085F7BC14C26707B3D3C02F124359EBB640816E13763C7546FF095C96D2BB090320F3A95
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:MSCF.....R&.....D............................R&.8?..............Z..............M). .content.inf..,........M). .Main_Event.thmx......R..[...............=.1.^xa..^...../..^x....QA^"....^/.I.{/F..F..........6Vn. ..._Hmc......<....#.{.@.....Xl../Y....Ye..'V.f.S.Vf.T..0t+..y...5O...{.....-.dT...........!...[ .ns..k.....QAA.. ....B..u.`.....{.\u8.0.....@t........K....@..w.......>...-1F...........1.E....O............_M.m..CP.O......X......g......].../..:C...Q...i.._"...M..1o...S../...9....k;...}S........y..;1o....1h......t.CL.3...].@...T...4.6.}.....M...f...[.s.."f....nZ.W......0.c.{.`.^..Oo.[.JT.2].^.f..a....kO......Q..G..s.5...V.Wj.....e...I,]...SHa..U.N.N.....v.C.....x..J{.Z.t...]WN...77BO-J......g......3:i..2..EFeL.,n..t:..,~4gt.w...M.5.'h.L..#..A&.O.ys%K.Z....F.PW..=jH...jGB.i..j.J.^.#.\n...J@.....-5.f.1jZ68.o...H2.......$O...>..ld&,#$.&_....yl.fkP$.........l....s....i.tx.~<.z...>..2.Gx..B..z.E.3.N<....`$.....b..?.w.[.X..1.=q!.s......v.......r.w
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:GIF image data, version 89a, 15 x 15
                                                        Category:dropped
                                                        Size (bytes):663
                                                        Entropy (8bit):5.949125862393289
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:ED3C1C40B68BA4F40DB15529D5443DEC
                                                        SHA1:831AF99BB64A04617E0A42EA898756F9E0E0BCCA
                                                        SHA-256:039FE79B74E6D3D561E32D4AF570E6CA70DB6BB3718395BE2BF278B9E601279A
                                                        SHA-512:C7B765B9AFBB9810B6674DBC5C5064ED96A2682E78D5DFFAB384D81EDBC77D01E0004F230D4207F2B7D89CEE9008D79D5FBADC5CB486DA4BC43293B7AA878041
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:GIF89a....w..!..MSOFFICE9.0.....sRGB......!..MSOFFICE9.0.....msOPMSOFFICE9.0Dn&P3.!..MSOFFICE9.0.....cmPPJCmp0712.........!.......,....................'..;..b...RQ.xx..................,+................................yy..;..b.........................qp.bb..........uv.ZZ.LL.......xw.jj.NN.A@....zz.mm.^_.........yw........yx.xw.RR.,*.++............................................................................................................................................................................................................8....>.......................4567...=..../0123.....<9:.()*+,-.B.@...."#$%&'....... !............C.?....A;<...HT(..;
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):30
                                                        Entropy (8bit):1.2389205950315936
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:6CB472F626D6E797DC56170630C5FEAA
                                                        SHA1:BC5F2524CC24141FF6769C5BC06EF278C93A1DDD
                                                        SHA-256:06F27AA5EE9DBDC76D488D9434CCDE32913415304251562DE3814990DBDD384E
                                                        SHA-512:A2CE40FD789A331515974C2B01A91E8D81126DE17ABCE70C6893FC6AFB460457861888F5BA513B2998249204FE9937865DE6C97646F4160152AF4DFF04F60C19
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:....f.........................
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Feb 7 13:52:11 2024, mtime=Mon Oct 21 14:06:42 2024, atime=Mon Oct 21 14:06:40 2024, length=51754, window=hide
                                                        Category:dropped
                                                        Size (bytes):511
                                                        Entropy (8bit):4.75006495701446
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:5B0AD22F187101ACCAB2540822E42C28
                                                        SHA1:7A132C1999834FFCE44E315CA9B2C03A49F003B2
                                                        SHA-256:D6CC6273ACA465C388574E07685AEFBA559DD5342B17638514E16097AD8F70DF
                                                        SHA-512:D1267475894FB5AB1C7C6EC6C1AD15A2FFB45E91A5AE7C292069DCC483D3613F6C229A4F043FC1A115207B674EB3682EC1091A84A8BF0781C1C940E9BD51E343
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:L..................F.... ....H.:.Y..b=<..#..D....#..*.......................j.h.2.*...UY.x .INV006~1.DOC..L......GX.vUY.x............................(.I.N.V.0.0.6.6.3...d.o.c.x.......T...............-.......S............F.......C:\Users\user\Desktop\INV00663.docx..$.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.I.N.V.0.0.6.6.3...d.o.c.x.`.......X.......830021...........hT..CrF.f4... .s..F...../....%..hT..CrF.f4... .s..F...../....%.E.......9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?................
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Generic INItialization configuration [folders]
                                                        Category:dropped
                                                        Size (bytes):51
                                                        Entropy (8bit):4.348704263455282
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:F8A4AC66E9703756EF487A389F512F67
                                                        SHA1:2BBCB3D7F069834DCEA136E75F601FC403D3CCA9
                                                        SHA-256:2466636BB6078C83788F501682AB7A8283B5F17BCE79490CE5D7D08C6578D0F3
                                                        SHA-512:2FE12B49CC1773AAFAB062EAF7CC527B34B15A1B96978AE8739657AE9F3AD1FAA7856B973E3F772843254FE4352EE0836C6F80D822AA9019207E8EF4FF447F9C
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:[misc]..INV00663.LNK=0..[folders]..INV00663.LNK=0..
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft OOXML
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:35200E94CEB3BB7A8B34B4E93E039023
                                                        SHA1:5BB55EDAA4CDF9D805E36C36FB092E451BDDB74D
                                                        SHA-256:6CE04E8827ABAEA9B292048C5F84D824DE3CEFDB493101C2DB207BD4475AF1FD
                                                        SHA-512:ED80CEE7C22D10664076BA7558A79485AA39BE80582CEC9A222621764DAE5EFA70F648F8E8C5C83B6FE31C2A9A933C814929782A964A47157505F4AE79A3E2F9
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK..........1A..u._....P......[Content_Types].xml..Ms.@.....!...=.7....;a.h.&Y..l..H~..`;...d..g/..e..,M..C...5...#g/."L..;...#. ]..f...w../._.2Y8..X.[..7._.[...K3..#.4......D.]l.?...~.&J&....p..wr-v.r.?...i.d.:o....Z.a|._....|.d...A....A".0.J......nz....#.s.m.......(.]........~..XC..J......+.|...(b}...K!._.D....uN....u..U..b=.^..[...f...f.,...eo..z.8.mz....."..D..SU.}ENp.k.e}.O.N....:^....5.d.9Y.N..5.d.q.^s..}R...._E..D...o..o...o...f.6;s.Z]...Uk6d.j..MW....5[C].f#...l;u.M..Z.../iM|...b...S.....0.zN.... ...>..>..>..>..>..>..>........e...,..7...F(L.....>.ku...i...i...i...i...i...i...i........yi.....G...1.....j...r.Z]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o|^Z....Q}.;.o...9.Z..\.V...............................jZ......k.pT...0.zN.... ...>..>..>..>..>..>..>........e...,..7...f(L.....>.ku...i...i...i...i...i...i...i........yi.......n.....{.._f...0...PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft OOXML
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:3B5E44DDC6AE612E0346C58C2A5390E3
                                                        SHA1:23BCF3FCB61F80C91D2CFFD8221394B1CB359C87
                                                        SHA-256:9ED9AD4EB45E664800A4876101CBEE65C232EF478B6DE502A330D7C89C9AE8E2
                                                        SHA-512:2E63419F272C6E411CA81945E85E08A6E3230A2F601C4D28D6312DB5C31321F94FAFA768B16BC377AE37B154C6869CA387005693A79C5AB1AC45ED73BCCC6479
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK..........1AE,.{E...#P......[Content_Types].xml..Mo.0.....Z..N7.=l......V0.-o..j?...H..sa......./UCb.'...r...w.i..e..<[....{2..U.m..N.{...r.....3.fj.o......2.*....;.L.6..&,D.Cld8...a.gZf.......r-v..><....~/......|Zk.......a.R&.d.(.$..6..}.:.....3......1..[.p.....?..+....R...y,.fod.....e...-.|..#..]j....n:...f...-J...i.^.:Y....T..........m^..~GNp../e}...N....a..5.d.8YcN..5.d.8Y...7..A..e...7Q."3...../.sL._...v...n..b..2].v....n.t....Z...Uk...j.&.Z....im|.r....B.....7DaBuN.... ...>..>..>..>..>..>..>.........V}-.....Q}#.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7FaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}..&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7EaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}3.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b.\}..)...A.......[..PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...........84P....
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft OOXML
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:D676DE8877ACEB43EF0ED570A2B30F0E
                                                        SHA1:6C8922697105CEC7894966C9C5553BEB64744717
                                                        SHA-256:DF012D101DE808F6CD872DFBB619B16732C23CF4ABC64149B6C3CE49E9EFDA01
                                                        SHA-512:F40BADA680EA5CA508947290BA73901D78DE79EAA10D01EAEF975B80612D60E75662BDA542E7F71C2BBA5CA9BA46ECAFE208FD6E40C1F929BB5E407B10E89FBD
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK..........1AE,.{E...#P......[Content_Types].xml..Mo.0.....Z..N7.=l......V0.-o..j?...H..sa......./UCb.'...r...w.i..e..<[....{2..U.m..N.{...r.....3.fj.o......2.*....;.L.6..&,D.Cld8...a.gZf.......r-v..><....~/......|Zk.......a.R&.d.(.$..6..}.:.....3......1..[.p.....?..+....R...y,.fod.....e...-.|..#..]j....n:...f...-J...i.^.:Y....T..........m^..~GNp../e}...N....a..5.d.8YcN..5.d.8Y...7..A..e...7Q."3...../.sL._...v...n..b..2].v....n.t....Z...Uk...j.&.Z....im|.r....B.....7DaBuN.... ...>..>..>..>..>..>..>.........V}-.....Q}#.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7FaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}..&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7EaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}3.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b.\}..)...A.......[..PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...........84P....
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft OOXML
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:C276F590BB846309A5E30ADC35C502AD
                                                        SHA1:CA6D9D6902475F0BE500B12B7204DD1864E7DD02
                                                        SHA-256:782996D93DEBD2AF9B91E7F529767A8CE84ACCC36CD62F24EBB5117228B98F58
                                                        SHA-512:B85165C769DFE037502E125A04CFACDA7F7CC36184B8D0A54C1F9773666FFCC43A1B13373093F97B380871571788D532DEEA352E8D418E12FD7AAD6ADB75A150
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK..........1AE,.{E...#P......[Content_Types].xml..Mo.0.....Z..N7.=l......V0.-o..j?...H..sa......./UCb.'...r...w.i..e..<[....{2..U.m..N.{...r.....3.fj.o......2.*....;.L.6..&,D.Cld8...a.gZf.......r-v..><....~/......|Zk.......a.R&.d.(.$..6..}.:.....3......1..[.p.....?..+....R...y,.fod.....e...-.|..#..]j....n:...f...-J...i.^.:Y....T..........m^..~GNp../e}...N....a..5.d.8YcN..5.d.8Y...7..A..e...7Q."3...../.sL._...v...n..b..2].v....n.t....Z...Uk...j.&.Z....im|.r....B.....7DaBuN.... ...>..>..>..>..>..>..>.........V}-.....Q}#.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7FaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}..&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7EaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}3.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b.\}..)...A.......[..PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...........84P....
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft OOXML
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:CDF98D6B111CF35576343B962EA5EEC6
                                                        SHA1:D481A70EC9835B82BD6E54316BF27FAD05F13A1C
                                                        SHA-256:E3F108DDB3B8581A7A2290DD1E220957E357A802ECA5B3087C95ED13AD93A734
                                                        SHA-512:95C352869D08C0FE903B15311622003CB4635DE8F3A624C402C869F1715316BE2D8D9C0AB58548A84BBB32757E5A1F244B1014120543581FDEA7D7D9D502EF9C
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK..........1AS'......ip......[Content_Types].xml..n.@.._......8ie'......}.......(y...H}......3Fi..%2.v?..3..._...d=..E.g.....7.i.-.t5.6......}}.m9r.......m...ML.g.M.eV$.r..*.M..l0...A...M..j;.w={o.f..F....i..v......5..d;..D.ySa...M&..qd*w>.O.{h...|w..5.]..'.CS<.:8C}.g.|E.../..>..].Tnml..I.......r.Gv.E....7.;.E......4/l.....6.K.C?1qz.O.v_..r......\c.c.>..lS........X.N.3N.sN..N.)'.%'..'..N.pL.E...T.!..CR....Ie..k.o..M..w.B.0}..3....v..+....,.q..pz.......v{.;....s3.|..V..ZZ......0.[.....x.....!.!~.8.e..n..&.}p....s.i.. ..[]...q.r....~..+.A\...q............e.-)h9..."Z.>...5-C..`..g.}........r.A.+..\...r.>.... .W.\...re?..%.-/hiA..ZR.r.W.D.\}.EK..kZ.>......5..9.&T......Wlu.b....}..+.A\...q......~.WK.Z^..........>.h..`......}.....^h....L...H...!...r.>... .W...\...rE?............-+hIA..\}..r...-}..i..`..G..j..).&T......Wlu.b....}..+.A\...q......~.WK.Z^..........>.h..`......}.....^j..K.L...H...!...r.>... .W...\...rE?............-+hIA..\}..r...-}..i.
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft OOXML
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:B30D2EF0FC261AECE90B62E9C5597379
                                                        SHA1:4893C5B9BE04ECBB19EE45FFCE33CA56C7894FE3
                                                        SHA-256:BB170D6DE4EE8466F56C93DC26E47EE8A229B9C4842EA8DD0D9CCC71BC8E2976
                                                        SHA-512:2E728408C20C3C23C84A1C22DB28F0943AAA960B4436F8C77570448D5BEA9B8D53D95F7562883FA4F9B282DFE2FD07251EEEFDE5481E49F99B8FEDB66AAAAB68
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK.........V'B.._<....-.......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`.../.|u1..Y.....nK.......u=..2.tu~^L.Y5]/...~+.v...o....j.`?.S...../.by.|..>."kZbs....H.9..m.z.]W.V.?~v........;...N.......w....;.z..N.......w.....R.~n..Ofu.-..K.e....{..A.~.8.#D..)o.7..........:2........=......f...u....[..}...u.6b...xz.[...G..|#...$....)J./.......7.............oQ..]^.M........wy}7a.....&l................w.......l._...l..?.A..........r..9.|.8.........{w...........n...]^.M........wy}7a.....&l.................`..z..`.....2.o...wx}.....>..c.M..Arr#.....nD..[.....w......n...]^.M........wy}7a.....&l........w........... ..Fp....w_Q....g..tL.i.?H.o...]^..........n...]^.M........wy}7a.....&l.................`..z..`
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:97EEC245165F2296139EF8D4D43BBB66
                                                        SHA1:0D91B68CCB6063EB342CFCED4F21A1CE4115C209
                                                        SHA-256:3C5CF7BDB27592791ADF4E7C5A09DDE4658E10ED8F47845064DB1153BE69487C
                                                        SHA-512:8594C49CAB6FF8385B1D6E174431DAFB0E947A8D7D3F200E622AE8260C793906E17AA3E6550D4775573858EA1243CCBF7132973CD1CF7A72C3587B9691535FF8
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK..........1AS'......ip......[Content_Types].xml..n.@.._......8ie'......}.......(y...H}......3Fi..%2.v?..3..._...d=..E.g.....7.i.-.t5.6......}}.m9r.......m...ML.g.M.eV$.r..*.M..l0...A...M..j;.w={o.f..F....i..v......5..d;..D.ySa...M&..qd*w>.O.{h...|w..5.]..'.CS<.:8C}.g.|E.../..>..].Tnml..I.......r.Gv.E....7.;.E......4/l.....6.K.C?1qz.O.v_..r......\c.c.>..lS........X.N.3N.sN..N.)'.%'..'..N.pL.E...T.!..CR....Ie..k.o..M..w.B.0}..3....v..+....,.q..pz.......v{.;....s3.|..V..ZZ......0.[.....x.....!.!~.8.e..n..&.}p....s.i.. ..[]...q.r....~..+.A\...q............e.-)h9..."Z.>...5-C..`..g.}........r.A.+..\...r.>.... .W.\...re?..%.-/hiA..ZR.r.W.D.\}.EK..kZ.>......5..9.&T......Wlu.b....}..+.A\...q......~.WK.Z^..........>.h..`......}.....^h....L...H...!...r.>... .W...\...rE?............-+hIA..\}..r...-}..i..`..G..j..).&T......Wlu.b....}..+.A\...q......~.WK.Z^..........>.h..`......}.....^j..K.L...H...!...r.>... .W...\...rE?............-+hIA..\}..r...-}..i.
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft OOXML
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:F03AB824395A8F1F1C4F92763E5C5CAD
                                                        SHA1:A6E021918C3CEFFB6490222D37ECEED1FC435D52
                                                        SHA-256:D96F7A63A912CA058FB140138C41DCB3AF16638BA40820016AF78DF5D07FAEDD
                                                        SHA-512:0241146B63C938F11045FB9DF5360F63EF05B9B3DD1272A3E3E329A1BFEC5A4A645D5472461DE9C06CFE4ADB991FE96C58F0357249806C341999C033CD88A7AF
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK..........1A.......F`......[Content_Types].xml..n.@.._.y.ac $..,........-..g@.u.G.+t.:........D1...itgt>...k..lz;].8Kg^....N.l..........0.~}....ykk.A`..N..\...2+.e.c..r..P+....I.e.......|.^/.vc{......s..z....f^...8...'.zcN&.<....}.K.'h..X..y.c.qnn.s%...V('~v.W.......I%nX`.....G.........r.Gz.E..M.."..M....6n.a..V.K6.G?Qqz..............\e.K.>..lkM...`...k.5...sb.rbM8..8..9..pb..R..{>$..C.>......X..iw.'..a.09CPk.n...v....5n..Uk\...SC...j.Y.....Vq..vk>mi......z..t....v.]...n...e(.....s.i......]...q.r....~.WV/.j.Y......K..-.. Z..@.\.P..W...A..X8.`$C.F(.P..H...W..r.>... .W.C..zAV+.....@.\..h....r)...R..-..........c..0F...@Z.....v.+.A\...q.......ZAV'p)...R.D....K..-...h....eP..........(.P..H...W..r.>... .W.C..zAV+.....@.\..h....r)...R..-.............0A...@Z.....v.+.A\...q.......ZAV'p)...R.D....K..-...h....eP.........w(.P..H...W..r.>... .W.C..zAV+.....@.\..h....r)...R..-..........T..GI..~.....~....PK..........1A.s@.....O......._rels/.rels...J.
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft OOXML
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:FD5BBC58056522847B3B75750603DF0C
                                                        SHA1:97313E85C0937739AF7C7FC084A10BF202AC9942
                                                        SHA-256:44976408BD6D2703BDBE177259061A502552193B1CD05E09B698C0DAC3653C5F
                                                        SHA-512:DBD72827044331215A7221CA9B0ECB8809C7C79825B9A2275F3450BAE016D7D320B4CA94095F7CEF4372AC63155C78CA4795E23F93166D4720032ECF9F932B8E
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK..........1A..d T....P......[Content_Types].xml..Ms.@.....!...=.7....kX 5o.,L..<..........d..g/..dw.]...C...9...#g/."L..;...#. ]..f...w../._.3Y8..X.[..7._.[...K3..3.4......D.]l.?...~.&J&...s...;...H9...e.3.q.....k-.0>Lp:.7..eT...Y...P...OVg.....G..).aV...\Z.x...W.>f...oq.8.....I?Ky...g..."...J?....A$zL.].7.M.^..\....C..d/;.J0.7k.X4.e..?N{....r.."LZx.H?. ......;r.+...A<.;U.....4...!'k...s.&..)'k...d..d......._E..D...o..o...o...f.7;s..]...Uk6d.j..MW....5[C].f#...l;u.M..Z.../iM|...b...s.....0..O.... ...>..>..>..>..>..>..>.........2V}......Q}#.&T...rU....\..\..\..\..\..\..\..\.W..W.^Z....Q}c;.o...>.Z..\.v...............................*Z....K.X.5X8.obG.MP.P.'P.U}.k..rU..rU..rU..rU..rU..rU..rU..rU_EK_}.zi.....G.M.).....j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..h.oZ/-c..`....7CaBu.@-W.A.]..U}H.U}H.U}H.U}H.U}H.U}H.U}H.U}.-}...e...,...|...].k.........PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft OOXML
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:0E37AECABDB3FDF8AAFEDB9C6D693D2F
                                                        SHA1:F29254D2476DF70979F723DE38A4BF41C341AC78
                                                        SHA-256:7AC7629142C2508B070F09788217114A70DE14ACDB9EA30CBAB0246F45082349
                                                        SHA-512:DE6AFE015C1D41737D50ADD857300996F6E929FED49CB71BC59BB091F9DAB76574C56DEA0488B0869FE61E563B07EBB7330C8745BC1DF6305594AC9BDEA4A6BF
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK.........V'BE,.{....#P......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`.../.|u1..Y.....nK.......u=..2.tu~^L.Y5]/...~+.v...o....j.`?.S...../.by.|..>."kZbs....H.9..m.z.]W.V.?~v........;...N.......w....;.z..N.......w.....R.~n..Ofu.-..K.e....{..A.~.8.#D..)o.7..........:2........=......f...u....[..}...u.6b...xz.[...G..|#...$....)J./.......7.............oQ..]^.M........wy}7a.....&l................w.......l._...l..?.A..........r..9.|.8.........{w...........n...]^.M........wy}7a.....&l.................`..z..`.....2.o...wx}.....>..c.M..Arr#.....nD..[.....w......n...]^.M........wy}7a.....&l........w........... ..Fp....w_Q....g..tL.i.?H.o...]^..........n...]^.M........wy}7a.....&l.................`..z..`
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft OOXML
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:9E563D44C28B9632A7CF4BD046161994
                                                        SHA1:D3DB4E5F5B1CC6DD08BB3EBF488FF05411348A11
                                                        SHA-256:86A70CDBE4377C32729FD6C5A0B5332B7925A91C492292B7F9C636321E6FAD86
                                                        SHA-512:8EB14A1B10CB5C7607D3E07E63F668CFC5FC345B438D39138D62CADF335244952FBC016A311D5CB8A71D50660C49087B909528FC06C1D10AF313F904C06CBD5C
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK.........{MB.f}......p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.v...(=.v........F_..U..G...T.e.y)[..b.......3.m....6.X5.P........_...b../..}.-......~.-..z..d.......j.^.+c..E.V..~3}..U.7..~p.>.E..9^d....4%}.E.$....N..r....<....%...%.?....w.u...h........D...w.....h........Dkw...x..T....T....T....T....T....T....j...."[.J.....;..!4...M...............t.n-.{..skp...[;.......F...j.7...4fC...K1..K/..K-..K+..K)..K'..f9......Fl._.........d0...?7K7].........A.......Fl.............Ft....u.......Ft........\.......w....R.......R.......R........o...].`.....A....#.`..\.....S.._...4...o.........W<x#..............w#...r.nD..]....\.~....|......b...^...Z...V...R...N..W<x......l._...l..?.A......xp_Q..y<h..tL.i.?HNn...]..........r.nD..]~.........wy~7......Ft...........E/|c.
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:ACBA78931B156E4AF5C4EF9E4AB3003B
                                                        SHA1:2A1F506749A046ECFB049F23EC43B429530EC489
                                                        SHA-256:943E4044C40ABA93BD7EA31E8B5EBEBD7976085E8B1A89E905952FA8DAC7B878
                                                        SHA-512:2815D912088BA049F468CA9D65B92F8951A9BE82AB194DBFACCF0E91F0202820F5BC9535966654D28F69A8B92D048808E95FEA93042D8C5DEA1DCB0D58BE5175
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK.........{MB.f}......p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.v...(=.v........F_..U..G...T.e.y)[..b.......3.m....6.X5.P........_...b../..}.-......~.-..z..d.......j.^.+c..E.V..~3}..U.7..~p.>.E..9^d....4%}.E.$....N..r....<....%...%.?....w.u...h........D...w.....h........Dkw...x..T....T....T....T....T....T....j...."[.J.....;..!4...M...............t.n-.{..skp...[;.......F...j.7...4fC...K1..K/..K-..K+..K)..K'..f9......Fl._.........d0...?7K7].........A.......Fl.............Ft....u.......Ft........\.......w....R.......R.......R........o...].`.....A....#.`..\.....S.._...4...o.........W<x#..............w#...r.nD..]....\.~....|......b...^...Z...V...R...N..W<x......l._...l..?.A......xp_Q..y<h..tL.i.?HNn...]..........r.nD..]~.........wy~7......Ft...........E/|c.
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft OOXML
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:529795E0B55926752462CBF32C14E738
                                                        SHA1:E72DFF8354DF2CB6A5698F14BBD1805D72FEEAFF
                                                        SHA-256:8D341D1C24176DC6B67104C2AF90FABD3BFF666CCC0E269381703D7659A6FA05
                                                        SHA-512:A51F440F1E19C084D905B721D0257F7EEE082B6377465CB94E677C29D4E844FD8021D0B6BA26C0907B72B84157C60A3EFEDFD96C16726F6ABEA8D896D78B08CE
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK.........{MB.f}......p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.v...(=.v........F_..U..G...T.e.y)[..b.......3.m....6.X5.P........_...b../..}.-......~.-..z..d.......j.^.+c..E.V..~3}..U.7..~p.>.E..9^d....4%}.E.$....N..r....<....%...%.?....w.u...h........D...w.....h........Dkw...x..T....T....T....T....T....T....j...."[.J.....;..!4...M...............t.n-.{..skp...[;.......F...j.7...4fC...K1..K/..K-..K+..K)..K'..f9......Fl._.........d0...?7K7].........A.......Fl.............Ft....u.......Ft........\.......w....R.......R.......R........o...].`.....A....#.`..\.....S.._...4...o.........W<x#..............w#...r.nD..]....\.~....|......b...^...Z...V...R...N..W<x......l._...l..?.A......xp_Q..y<h..tL.i.?HNn...]..........r.nD..]~.........wy~7......Ft...........E/|c.
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft OOXML
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:5AF1581E9E055B6E323129E4B07B1A45
                                                        SHA1:B849F85BCAF0E1C58FA841FFAE3476D20D33F2DD
                                                        SHA-256:BDC9FBF81FBE91F5BF286B2CEA00EE76E70752F7E51FE801146B79F9ADCB8E98
                                                        SHA-512:11BFEF500DAEC099503E8CDB3B4DE4EDE205201C0985DB4CA5EBBA03471502D79D6616D9E8F471809F6F388D7CBB8B0D0799262CBE89FEB13998033E601CEE09
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK.........{MB.$<.~....p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`..^.......H^..<}...lA-.D.....lI/...hD.Z....|VM..ze........L..tU...g....lQ....Y...>MI...5-....S......h=..u.h..?;h...@k...h...'Z...D...;.....h=..'Z...D...;.....)^./.../U.../..../U.../..../U..?...'.........Ngz..A.~.8.#D....xot.u.?...eyot.n..{..sk....[......Z..F....l...o)..o..o...oi..o)..o..,..b.s......2.C.z.~8.......f......x.9.|.8..............u................r.nD..]...........w.~7...-...-...-...-...-...-....x.&l........>.4.z.~8..........=E....As.1..q. 9....w.7...1........w.}7......Ft...................o)..o..o...oi..o)..o..w.7a...x0...........d0..............A.......Fl.............Ft................w#...r.nD..]..M...K1.0..7....
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft OOXML
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:FB88BFB743EEA98506536FC44B053BD0
                                                        SHA1:B27A67A5EEC1B5F9E7A9C3B76223EDE4FCAF5537
                                                        SHA-256:05057213BA7E5437AC3B8E9071A5577A8F04B1A67EFE25A08D3884249A22FBBF
                                                        SHA-512:4270A19F4D73297EEC910B81FF17441F3FC7A6A2A84EBA2EA3F7388DD3AA0BA31E9E455CFF93D0A34F4EC7CA74672D407A1C4DC838A130E678CA92A2E085851C
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK.........{MB.f}......p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.v...(=.v........F_..U..G...T.e.y)[..b.......3.m....6.X5.P........_...b../..}.-......~.-..z..d.......j.^.+c..E.V..~3}..U.7..~p.>.E..9^d....4%}.E.$....N..r....<....%...%.?....w.u...h........D...w.....h........Dkw...x..T....T....T....T....T....T....j...."[.J.....;..!4...M...............t.n-.{..skp...[;.......F...j.7...4fC...K1..K/..K-..K+..K)..K'..f9......Fl._.........d0...?7K7].........A.......Fl.............Ft....u.......Ft........\.......w....R.......R.......R........o...].`.....A....#.`..\.....S.._...4...o.........W<x#..............w#...r.nD..]....\.~....|......b...^...Z...V...R...N..W<x......l._...l..?.A......xp_Q..y<h..tL.i.?HNn...]..........r.nD..]~.........wy~7......Ft...........E/|c.
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft OOXML
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:2192871A20313BEC581B277E405C6322
                                                        SHA1:1F9A6A5E10E1C3FFEB6B6725C5D2FA9ECDF51085
                                                        SHA-256:A06B302954A4C9A6A104A8691864A9577B0BFEA240B0915D9BEA006E98CDFFEC
                                                        SHA-512:6D8844D2807BB90AEA6FE0DDDB9C67542F587EC9B7FC762746164B2D4A1A99EF8368A70C97BAD7A986AAA80847F64408F50F4707BB039FCCC509133C231D53B9
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK...........G`.jaV....P......[Content_Types].xml...n.@...W......T@.mwM.E....)....y...H}.N..ll8.h5g6Q.=3_......?...x..e^Di.p.^.ud...(Y/..{w..r..9.../M...Q*{..E...(.4..>..y,.>..~&..b-.a.?..4Q2Q=.2.......m....>-....;]......N'..A...g.D.m.@(}..'.3Z....#....(+....-q<uq.+....?....1.....Y?Oy......O"..J?....Q$zT.].7.N..Q Wi.....<.........-..rY....hy.x[9.b.%-<.V?.(......;r.+...Q<.;U.....4...!'k...s.&..)'k...d.s..}R....o".D.I..7..7.KL.7..Z.....v..b.5.2].f....l.t....Z...Uk...j.&.U-....&>.ia1..9lhG..Q.P.'P.U}.k..rU..rU..rU..rU..rU..rU..rU..rU_EK_}.zi.....G.........j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..h.oT/-c..`....7FaBu.@-W.A.]..U}H.U}H.U}H.U}H.U}H.U}H.U}H.U}.-}...e...,..7...&(L.....>.kw...i...i...i...i...i...i...i.......I...U_.....vT.....}..\...v..W.!-W.!-W.!-W.!-W.!-W.!-W.!-W.U...7.....k.pT...0..O.... ...>..>..>..>..>..>..>......f..2V}....W>jO....5..].?.o..oPK...........G.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70.
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft OOXML
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:8BA551EEC497947FC39D1D48EC868B54
                                                        SHA1:02FA15FDAF0D7E2F5D44CAE5FFAE49E8F91328DF
                                                        SHA-256:DB2E99B969546E431548EBD58707FC001BBD1A4BDECAD387D194CC9C6D15AC89
                                                        SHA-512:CC97F9B2C83FF7CAC32AB9A9D46E0ACDE13EECABECD653C88F74E4FC19806BB9498D2F49C4B5581E58E7B0CB95584787EA455E69D99899381B592BEA177D4D4B
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK.........LGE,.{E...#P......[Content_Types].xml..Mo.0.....Z..N7.=l......V0.-o..j?...H..sa......./UCb.'...r...w.i..e..<[....{2..U.m..N.{...r.....3.fj.o......2.*....;.L.6..&,D.Cld8...a.gZf.......r-v..><....~/......|Zk.......a.R&.d.(.$..6..}.:.....3......1..[.p.....?..+....R...y,.fod.....e...-.|..#..]j....n:...f...-J...i.^.:Y....T..........m^..~GNp../e}...N....a..5.d.8YcN..5.d.8Y...7..A..e...7Q."3...../.sL._...v...n..b..2].v....n.t....Z...Uk...j.&.Z....im|.r....B.....7DaBuN.... ...>..>..>..>..>..>..>.........V}-.....Q}#.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7FaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}..&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7EaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}3.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b.\}..)...A.......[..PK.........LG.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...........84P....
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft OOXML
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:8109B3C170E6C2C114164B8947F88AA1
                                                        SHA1:FC63956575842219443F4B4C07A8127FBD804C84
                                                        SHA-256:F320B4BB4E57825AA4A40E5A61C1C0189D808B3EACE072B35C77F38745A4C416
                                                        SHA-512:F8A8D7A6469CD3E7C31F3335DDCC349AD7A686730E1866F130EE36AA9994C52A01545CE73D60B642FFE0EE49972435D183D8CD041F2BB006A6CAF31BAF4924AC
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK.........A;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........pnB;.M.:....g......._rels/.rels...J.0.._%.n....xp..,{.i2M.........G..........7...3o/.......d.kyU....^..[>Q....j.#P.H......Z>..+!...B*|@...G...E....E]..".3.......!..7....,:..,.......Ot..0r....Z..&1..U..p.U-.[Uq&.......................Gyy.}n.(.C(i.x........?.vM..}..%.7.b.>L..]..PK........EV:5K..4....H......diagrams/layout1.xml.Yo.6........S.`......$M...Q8A...R..T.k...K.4CQG..}.A..9.?R....!&...Q..ZW.......Q....<8..z..g....4{d.>..;.{.>.X.....Y.2.......cR....9e.. ...}L.....yv&.&...r..h...._..M. e...[..}.>.k..........3.`.ygN...7.w..3..W.S.....w9....r(....Zb..1....z...&WM.D<......D9...ge......6+.Y....$f......wJ$O..N..FC..Er........?..is...-Z
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft OOXML
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:5D9BAD7ADB88CEE98C5203883261ACA1
                                                        SHA1:FBF1647FCF19BCEA6C3CF4365C797338CA282CD2
                                                        SHA-256:8CE600404BB3DB92A51B471D4AB8B166B566C6977C9BB63370718736376E0E2F
                                                        SHA-512:7132923869A3DA2F2A75393959382599D7C4C05CA86B4B27271AB9EA95C7F2E80A16B45057F4FB729C9593F506208DC70AF2A635B90E4D8854AC06C787F6513D
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK........YnB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........bnB;?.......f......._rels/.rels...J.1.._%..f....m/.,x...&.lt.dV.y.|.."v....q..|......r..F..)..;.T5g.eP..O..Z.^-.8...<.Y....Q.."....*D.%.!9.R&#".'0(.u}).!..l....b..J..rr....P.L.w..0.-......A..w..x.7U...Fu<mT.....^s...F./ ..( .4L..`.....}...O..4.L...+H.z...m..j[].=........oY}.PK........J.L6...m....,.......diagrams/layout1.xml.X.n.8.}N.....PG.............wZ.,.R.%.K...J.H]....y.3..9...O..5."J.1.\.1....Q....z......e.5].)...$b.C)...Gx!...J3..N..H...s....9.~...#..$...W.8..I`|..0xH}......L.|..(V;..1...kF..O=...j...G.X.....T.,d>.w.Xs.......3L.r..er\o..D..^....O.F.{:.>.R'....Y-...B.P.;....X.'c...{x*.M7..><l.1.w..{].46.>.z.E.J.......G......Hd..$..7....E.
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft OOXML
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:7BC0A35807CD69C37A949BBD51880FF5
                                                        SHA1:B5870846F44CAD890C6EFF2F272A037DA016F0D8
                                                        SHA-256:BD3A013F50EBF162AAC4CED11928101554C511BD40C2488CF9F5842A375B50CA
                                                        SHA-512:B5B785D693216E38B5AB3F401F414CADACCDCB0DCA4318D88FE1763CD3BAB8B7670F010765296613E8D3363E47092B89357B4F1E3242F156750BE86F5F7E9B8D
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK........NnB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........TnB;..d.....h......._rels/.rels...J.0.._%.n..)"....<.w.&.4..!...y.|.........|.&3.o.....S..K.T5g.U....g..n.f....T*.hcf...D.V..Ft....d....c2".z.....N.s._2....7.0.V.]P.CO?...`...8....4&......_i..Y.T...Z...g....{-...]..pH..@.8....}tP.)..B>..A...S&......9..@...7........b_.PK........r};5.z..............diagrams/layout1.xml.X.n.8.}.........4.+.(...@......(..J..._.!)..b..v.}.H..zf8...dhM....E..I.H..V.Y.R..2zw5L~....^..]...J_..4.\.\......8..z..2T..".X.l.F#......5....,*....c....r.kR.I.E..,.2...&%..''.qF.R.2.....T;F...W.. ...3...AR.OR.O..J}.w6..<...,.x..x....`g?.t.I.{.I...|X..g.....<BR..^...Q.6..m.kp...ZuX.?.z.YO.g...$.......'.]..I.#...]$/~`${.
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:950F3AB11CB67CC651082FEBE523AF63
                                                        SHA1:418DE03AD2EF93D0BD29C3D7045E94D3771DACB4
                                                        SHA-256:9C5E4D8966A0B30A22D92DB1DA2F0DBF06AC2EA75E7BB8501777095EA0196974
                                                        SHA-512:D74BF52A58B0C0327DB9DDCAD739794020F00B3FA2DE2B44DAAEC9C1459ECAF3639A5D761BBBC6BDF735848C4FD7E124D13B23964B0055BB5AA4F6AFE76DFE00
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK.........T.>................[Content_Types].xmlz.........=N.1...b.Eko(.B....(.Pp..=.u.?.....#q..ND.!$.J{.o....G..[Cv.....+.R.Nx..........0."u..S...$&.....Je..B..x......m......M^z....f....|...N..Q..z.!.- .2.9y.i.8j...........0.AE..p.s~@../jw.#8.I.#....4.~Cl.:#h..f.PU.s.~........(.)F..Y......^x..PK.........T.>...V....L......._rels/.rels...J.@.._e..]AD.....x....3.t..T.w.\ZpA<x......v..'....z.........Y..[...<..2.TT....Q$.!.=.....&C....b".F.q.7...X3...7.8.N.}.. ?..8...#..,.L.3.#e...wZpZ.]S..:....t.....{..6.7.|..,dH.e..K 7-}.~.v...5.......b..PK........Ul.<..<"I5...&......diagrams/layout1.xml.}.r.I..s........~Y.f.gzfv......E."w.K..J5m.e...4.0..Q... A.!...%...<...3.......O.......t~.u{...5.G......?,.........N......L......~.:....^,..r=./~7_..8............o.y......oo.3.f........f.......r.7../....qrr.v9.......,?..._O.....?9.O~]..zv.I'.W..........;..\..~....../........?~..n.....\}pt.........b,~...;>.=;>:..u.....?.......2]..]....i......9..<.p..4D..
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:C9F9364C659E2F0C626AC0D0BB519062
                                                        SHA1:C4036C576074819309D03BB74C188BF902D1AE00
                                                        SHA-256:6FC428CA0DCFC27D351736EF16C94D1AB08DDA50CB047A054F37EC028DD08AA2
                                                        SHA-512:173A5E68E55163B081C5A8DA24AE46428E3FB326EBE17AE9588C7F7D7E5E5810BFCF08C23C3913D6BEC7369E06725F50387612F697AC6A444875C01A2C94D0FF
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK.........T.>................[Content_Types].xmlz.........=N.1...b.Eko(.B....(.Pp..=.u.?.....#q..ND.!$.J{.o....G..[Cv.....+.R.Nx..........0."u..S...$&.....Je..B..x......m......M^z....f....|...N..Q..z.!.- .2.9y.i.8j...........0.AE..p.s~@../jw.#8.I.#....4.~Cl.:#h..f.PU.s.~........(.)F..Y......^x..PK.........T.>...V....L......._rels/.rels...J.@.._e..]AD.....x....3.t..T.w.\ZpA<x......v..'....z.........Y..[...<..2.TT....Q$.!.=.....&C....b".F.q.7...X3...7.8.N.}.. ?..8...#..,.L.3.#e...wZpZ.]S..:....t.....{..6.7.|..,dH.e..K 7-}.~.v...5.......b..PK........q.~<.6..9 ...e......diagrams/layout1.xml..r.........{.]..u...xv7b.....HPd....t.q...b.i_a.'..P.f.3..F..1...U.u.*.2......?}..O..V.....yQ.Mf........w.....O....N.........t3;...e....j.^.o&.....w...../.w................e.................O..,./..6...8>^.^..........ru5...\.=>[M?......g..........w.N....i.........iy6.?........>.......>{yT...........x.........-...z5.L./.g......_.l.1.....#...|...pr.q
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft OOXML
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:20621E61A4C5B0FFEEC98FFB2B3BCD31
                                                        SHA1:4970C22A410DCB26D1BD83B60846EF6BEE1EF7C4
                                                        SHA-256:223EA2602C3E95840232CACC30F63AA5B050FA360543C904F04575253034E6D7
                                                        SHA-512:BDF3A8E3D6EE87D8ADE0767918603B8D238CAE8A2DD0C0F0BF007E89E057C7D1604EB3CCAF0E1BA54419C045FC6380ECBDD070F1BB235C44865F1863A8FA7EEA
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK.........T.>................[Content_Types].xmlz.........=N.1...b.Eko(.B....(.Pp..=.u.?.....#q..ND.!$.J{.o....G..[Cv.....+.R.Nx..........0."u..S...$&.....Je..B..x......m......M^z....f....|...N..Q..z.!.- .2.9y.i.8j...........0.AE..p.s~@../jw.#8.I.#....4.~Cl.:#h..f.PU.s.~........(.)F..Y......^x..PK.........T.>...V....L......._rels/.rels...J.@.._e..]AD.....x....3.t..T.w.\ZpA<x......v..'....z.........Y..[...<..2.TT....Q$.!.=.....&C....b".F.q.7...X3...7.8.N.}.. ?..8...#..,.L.3.#e...wZpZ.]S..:....t.....{..6.7.|..,dH.e..K 7-}.~.v...5.......b..PK........2..<..]#.....'......diagrams/layout1.xml.].r.8...V.;0.;..aO........{.....V..3].d{..............\. .#.t... ........x<...@7o.]..7.N..@.NF..../....S.../.xC..U...<..Q.=...|..v.....cQ..Y=.....i`.. ..?.;...Go....x.O.$....7s..0..qg....|..r..l.w.a..p.3.Em7v...N............3..7...N.\\..f...9...U$..7...k.C..M.@\.s....G/..?...I...t.Yos...p..z...6.lnqi.6..<..1qg+......#]....|C/N..K\}.....#..".
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:08D3A25DD65E5E0D36ADC602AE68C77D
                                                        SHA1:F23B6DDB3DA0015B1D8877796F7001CABA25EA64
                                                        SHA-256:58B45B9DBA959F40294DA2A54270F145644E810290F71260B90F0A3A9FCDEBC1
                                                        SHA-512:77D24C272D67946A3413D0BEA700A7519B4981D3B4D8486A655305546CE6133456321EE94FD71008CBFD678433EA1C834CFC147179B31899A77D755008FCE489
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK.........]w>....<...5.......diagrams/layout1.xmlz........].r.F.}......1w`.J..'.......w..Dn. d....~........pw...O.......s...?...p7.t>e.r<.]u.e..d..|8..\uo.......K...._.Y..E6.|..y;........y.*/:o./...:[.o.+/.....?.....Z.?..s..d}...S.`...b.^o9.e.ty9_d...y>M.....7...e....."....<.v.u...e:].N.t....a....0..}..bQ.Y..>.~..~...U.|..Ev.....N...bw....{...O..Y.Y.&........A.8Ik...N.Z.P.[}t........|m...E..v..,..6........_?..."..K<.=x....$..%@.e..%....$=F..G..e........<F..G51..;......=...e.e.q..d......A...&9'.N.\%.=N.Z.9.s......y.4.Q.c......|8.......Eg.:.ky.z.h.......).O...mz...N.wy.m...yv....~8.?Lg..o.l.y:.....z.i..j.irxI.w...r.......|.=....s};.\u.{t;i~S.......U7..mw...<.vO...M.o...W.U.....}.`V<|..%....l..`>]..".].I.i.N..Z..~Lt.........}?..E~:..>$......x...%.........N....'C.m.=...w.=.Y...+'M.].2 >.]_~...'.?...:....z.O..Y......6..5...sj?.....).B..>.3...G...p.9.K!..[H..1$v../...E V..?`....+[...C......h..!.QI5....<.>...A.d.......
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft OOXML
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:D32E93F7782B21785424AE2BEA62B387
                                                        SHA1:1D5589155C319E28383BC01ED722D4C2A05EF593
                                                        SHA-256:2DC7E71759D84EF8BB23F11981E2C2044626FEA659383E4B9922FE5891F5F478
                                                        SHA-512:5B07D6764A6616A7EF25B81AB4BD4601ECEC1078727BFEAB4A780032AD31B1B26C7A2306E0DBB5B39FC6E03A3FC18AD67C170EA9790E82D8A6CEAB8E7F564447
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK.........n.A...#............docProps/thumbnail.jpgz.........{4.i....1.n.v)..#.\*....A+..Q(."..D.......#Q)...SQ....2c.ei.JC...N.{......}.s.s..y>....d.(:.;.....q........$.OBaPbI..(.V...o.....'..b..edE.J.+.....".tq..dqX.......8...CA.@..........0.G.O.$Ph...%i.Q.CQ.>.%!j..F..."?@.1J.Lm$..`..*oO...}..6......(%....^CO..p......-,.....w8..t.k.#....d..'...O...8....s1....z.r...rr...,(.)...*.]Q]S.{X.SC{GgWw..O....X./FF9._&..L.....[z..^..*....C...qI.f... .Hq....d*.d..9.N{{.N.6..6)..n<...iU]3.._.....%./.?......(H4<.....}..%..Z..s...C@.d>.v...e.'WGW.....J..:....`....n..6.....]W~/.JX.Qf..^...}...._Sg.-.p..a..C_:..F..E.....k.H..........-Bl$._5...B.w2e...2...c2/y3.U...7.8[.S}H..r/..^...g...|...l..\M..8p$]..poX-/.2}..}z\.|.d<T.....1....2...{P...+Y...T...!............p..c.....D..o..%.d.f.~.;.;=4.J..]1"("`......d.0.....L.f0.l..r8..M....m,.p..Y.f....\2.q. ...d9q....P...K..o!..#o...=.........{.p..l.n...........&..o...!J..|)..q4.Z.b..PP....U.K..|.i.$v
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft OOXML
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:586CEBC1FAC6962F9E36388E5549FFE9
                                                        SHA1:D1EF3BF2443AE75A78E9FDE8DD02C5B3E46F5F2E
                                                        SHA-256:1595C0C027B12FE4C2B506B907C795D14813BBF64A2F3F6F5D71912D7E57BC40
                                                        SHA-512:68DEAE9C59EA98BD597AE67A17F3029BC7EA2F801AC775CF7DECA292069061EA49C9DF5776CB5160B2C24576249DAF817FA463196A04189873CF16EFC4BEDC62
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK........;nB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........HnB;..I)....j......._rels/.rels...J.@.._e..&6E.i/.,x..Lw'.j........G..\...................)...Y.3)..`...9r{v!......z...#>5.g.WJ%..T..>'m ..K.T.....j6[(:f.)S....C.mk5^.=:...X......C.... I......&5..e..H.1...).P.cw.kjT......C.......=.....}G!7E.y$.(...}b.........b=.<..^.....U..Y..PK.........^5a.2u............diagrams/layout1.xml..ko.8..+x.t.l..J.n.t.Mnw.x. ....B.t$.,.(&i.....(..d.mY......g.../[.<!.{ap>...L...p....G.9z?...._...e..`..%......8....G!..B8.....o...b.......Q.>|.......g..O\B...i.h...0B.}.....z...k...H..t~r.v........7o.E....$....Z.........ZDd..~......>......O.3.SI.Y.".O&I....#."._c.$.r..z.g0`...0...q:...^0.EF...%(.Ao$.#.o6..c'....$%.}
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft OOXML
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:CDC1493350011DB9892100E94D5592FE
                                                        SHA1:684B444ADE2A8DBE760B54C08F2D28F2D71AD0FA
                                                        SHA-256:F637A67799B492FEFFB65632FED7815226396B4102A7ED790E0D9BB4936E1548
                                                        SHA-512:3699066A4E8A041079F12E88AB2E7F485E968619CB79175267842846A3AD64AA8E7778CBACDF1117854A7FDCFB46C8025A62F147C81074823778C6B4DC930F12
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK.........T.>................[Content_Types].xmlz.........=N.1...b.Eko(.B....(.Pp..=.u.?.....#q..ND.!$.J{.o....G..[Cv.....+.R.Nx..........0."u..S...$&.....Je..B..x......m......M^z....f....|...N..Q..z.!.- .2.9y.i.8j...........0.AE..p.s~@../jw.#8.I.#....4.~Cl.:#h..f.PU.s.~........(.)F..Y......^x..PK.........T.>...V....L......._rels/.rels...J.@.._e..]AD.....x....3.t..T.w.\ZpA<x......v..'....z.........Y..[...<..2.TT....Q$.!.=.....&C....b".F.q.7...X3...7.8.N.}.. ?..8...#..,.L.3.#e...wZpZ.]S..:....t.....{..6.7.|..,dH.e..K 7-}.~.v...5.......b..PK.........V.<.S.....Y.......diagrams/layout1.xml.\.r.8...U....m.$.."3.....;...../3.XAn..O.?....V.;...")Nr.O.H....O......_..E..S...L7....8H.y<=............~...Ic......v9.X.%.\.^.,?g.v.?%w...f.).9.........Ld;.1..?~.%QQ...h.8;.gy..c4..]..0Ii.K&.[.9.......E4B.a..?e.B..4....E.......Y.?_&!.....i~..{.W..b....L.?..L..@.F....c.H..^..i...(d.......w...9..9,........q..%[..]K}.u.k..V.%.Y.....W.y..;e4[V..u.!T...).%.
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:E8308DA3D46D0BC30857243E1B7D330D
                                                        SHA1:C7F8E54A63EB254C194A23137F269185E07F9D10
                                                        SHA-256:6534D4D7EF31B967DD0A20AFFF092F8B93D3C0EFCBF19D06833F223A65C6E7C4
                                                        SHA-512:88AB7263B7A8D7DDE1225AE588842E07DF3CE7A07CBD937B7E26DA7DA7CFED23F9C12730D9EF4BC1ACF26506A2A96E07875A1A40C2AD55AD1791371EE674A09B
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK.........a9;lq.ri...#.......diagrams/layout1.xmlz........WKn.0.];.`..J..AP...4E..!..hi$..I......z..D.d;...m.d...f.3o.._....9'.P.I1.F.C...d.D:.........Q..Z..5$..BO...e..(.9..2..+.Tsjp.. Vt.f.<...gA.h...8...>..p4..T...9.c...'.G.;.@.;xKE.A.uX.....1Q...>...B...!T.%.* ...0.....&......(.R.u..BW.yF.Grs...)..$..p^.s.c._..F4.*. .<%.BD..E....x... ..@...v.7f.Y......N.|.qW'..m..........im.?.64w..h...UI...J....;.0..[....G..\...?:.7.0.fGK.C.o^....j4............p...w:...V....cR..i...I...J=...%. &..#..[M....YG...u...I)F.l>.j.....f..6.....2.]..$7.....Fr..o.0...l&..6U...M..........%..47.a.[..s........[..r....Q./}.-.(.\..#. ..y`...a2..*....UA.$K.nQ:e!bB.H.-Q-a.$La.%.Z!...6L...@...j.5.....b..S.\c..u...R..dXWS.R.8"....o[..V...s0W..8:...U.#5..hK....ge.Q0$>...k.<...YA.g..o5...3.....~re.....>....:..$.~........pu ._Q..|Z...r...E.X......U....f)s^.?...%......459..XtL:M.).....x..n9..h...c...PK........Ho9<"..%...........diagrams/layoutHeader1.xmlMP.N.0.>oOa.
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:0A4CA91036DC4F3CD8B6DBF18094CF25
                                                        SHA1:6C7EED2530CD0032E9EEAB589AFBC296D106FBB9
                                                        SHA-256:E5A56CCB3B3898F76ABF909209BFAB401B5DDCD88289AD43CE96B02989747E50
                                                        SHA-512:7C69426F2250E8C84368E8056613C22977630A4B3F5B817FB5EA69081CE2A3CA6E5F93DF769264253D5411419AF73467A27F0BB61291CCDE67D931BD0689CB66
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK.........e.>.......]>......diagrams/layout1.xmlz........Z..6....;..{......lw.E.o....i..T....&...G.+...$..(.6..>Y.pf8C.|3.?..m....xA8v.`.hW..@..Zn..(kb..(.......`.+....Y`...\..qh.0.!&w..)|...<..]Q.. _....m..Z.{3..~..5..R..d..A.O....gU.M..0..#...;.>$...T......T..z.Z.\a.+...?#.~.....1.>?...*..DD.1...'..,..(...5B...M..]..>.C..<[....,L.p..Q.v.v^q.Y...5.~^c..5........3.j.......BgJ.nv.. ............tt......Q..p..K....(M.(]@..E..~z.~...8...49.t.Q..Q.n..+.....*J.#J.... .P...P.1...!.#&...?A..&.."..|..D.I...:.....~/.....b..].........nI7.IC.a..%...9.....4...r....b..q....@o........O...y...d@+~.<.\....f.a`:...Qy/^..P....[....@i.I.._.?.X.x.8....)..s....I.0...|.....t...;...q=k.=..N.%!.(.1....B.Ps/."...#.%..&...j<..2x.=<.......s.....h..?..]?Y?...C.}E.O........{..6.d....I...A.....JN..w+....2..m>9.T7...t.6.}.i..f.Ga..t.].->...8U......G.D`......p..f.. ...qT.YX.t.F..X.u=.3r...4....4Q.D..l.6.+PR...+..T..h: H.&.1~....n.....)........2J.. O.W+vd..f....0.....6..9QhV..
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:42A840DC06727E42D42C352703EC72AA
                                                        SHA1:21AAAF517AFB76BF1AF4E06134786B1716241D29
                                                        SHA-256:02CCE7D526F844F70093AC41731D1A1E9B040905DCBA63BA8BFFC0DBD4D3A7A7
                                                        SHA-512:8886BFD240D070237317352DEB3D46C6B07E392EBD57730B1DED016BD8740E75B9965F7A3FCD43796864F32AAE0BE911AB1A670E9CCC70E0774F64B1BDA93488
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK.........k.>........'......diagrams/layout1.xmlz........].r.8.}.V.?p.n....g*5..JUn.....(SU......T.l.......X.d."m."..S....F..P.........-..<Y^..=..e.L....m>.pG.....M~...+\....u}o...".Yn}Y.".-r......0...'/........{........F.~.M8.d....(.....q.D.....4\.;.D,.\.)n.S....Z.cl.|<..7._.dk..7..E.......kS...d.....i.....noX...o.W#9..}.^..I0....G.......+.K.[i.O.|G..8=.;.8.8.8.8.....{..-..^.y..[.....`...0..f...Q<^~..*.l....{...pA.z.$.$R.../...E.(..Q.(V.E_ ......X]Q..Y9.......>...8......l..--.ug.......I.;..].u.b.3Lv:.d.%H..l<...V...$.M..A>...^M./.[..I....o~,.U. .$d\..?........O.;..^M..O...A.$Yx..|f.n...H.=.|!cG)dd%..(... ..Xe......2B."i...n....P.R..E?... Y.I6...7n..Xs..J..K..'..JaU..d..|.(y.a.....d......D.Dr...._.._..m..Yu..6.o.\......&.m....wy...4k?..~........f....0.. \...}iS.i..R....q-#_..g........{Z.u.V.r(....j.I...,R..f.=.n.[.'..L'd.n C.0.I.....RpaV........c.k..NR....)B^k...d.i...d0.E. ^..G.']....x.c.>'..p...y.ny.P.x6..%.J\.....De.B\.
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:2F8998AA9CF348F1D6DE16EAB2D92070
                                                        SHA1:85B13499937B4A584BEA0BFE60475FD4C73391B6
                                                        SHA-256:8A216D16DEC44E02B9AB9BBADF8A11F97210D8B73277B22562A502550658E580
                                                        SHA-512:F10F7772985EDDA442B9558127F1959FF0A9909C7B7470E62D74948428BFFF7E278739209E8626AE5917FF728AFB8619AE137BEE2A6A4F40662122208A41ABB2
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK...........<..W8...j.......diagrams/layout1.xmlz........]......Hy..{...n .l.:.D.vvW..s....-a..fg&.}.\..+......4M..'=...(._.U]U......_.....U...k}.y.,......C..._^.......w/."7....v..Ea........Q..u..D{..{v.x.]....AtB15u..o...w..o.1...f.L...I<[zk7..7^..,.h.&l3...#..)..'H..d.r.#w=b...Ocw.y.&.v..t.>.s..m^M7..8I?o7................H...b....Qv.;'..%.f..#vR....V.H.),g..`...)(..m...[l...b...,.....U...Q.{.y.y.....G.I.tT.n..N.....A.tR..tr....i.<.......,.n:.#.A..a!X.......DK..;v..._M..lSc../n...v.....}.....I.|8.!b.C..v..|.....4l..n.;<9.i./..}!&2.c/.r...>.X02[..|.a.-.....$#-....>...{.M].>3.,\o.x....X%;.F.k.)*".I8<.0..#......?.h..-..O.2.B.s..v....{Abd...h0....H..I.. ...%...$1.Fyd..Y....U...S.Y.#.V.....TH(....%..nk.3Y.e.m.-.S..Q...j.Ai..E..v......4.t.|..&"...{..4.!.h.....C.P.....W...d[.....U<Yb;B.+W.!.@B....!.=......b"...Y.N;.#..Q...0G.lW...]7:...#9!z......|f..r..x.....t........`.uL1u.:.....U.D.n.<Q.[%...ngC./..|...!..q;;.w.".D..lt.".l.4".mt...E..mt
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:031C246FFE0E2B623BBBD231E414E0D2
                                                        SHA1:A57CA6134779D54691A4EFD344BC6948E253E0BA
                                                        SHA-256:2D76C8D1D59EDB40D1FBBC6406A06577400582D1659A544269500479B6753CF7
                                                        SHA-512:6A784C28E12C3740300883A0E690F560072A3EA8199977CBD7F260A21E8346B82BA8A4F78394D3BB53FA2E98564B764C2D0232C40B25FB6085C36D20D70A39D1
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK........X..<..Zn|...........diagrams/layout1.xmlz........]..H.}......M,l#g.j:.G-eu.*S=.$......T_6..I...6...d.NJ....r.p.p.........|.z.K.M..L.T.(........<..ks.......o...t}...P..*.7...`.+.[...H..._..X.u.....N....n....n|..=.....K.:.G7.u....."g.n.h...O.,...c...f.b.P......>[l.....j.*.?..mxk..n..|A...,\o..j..wQ.....lw.~].Lh..{3Y..D..5.Y..n..Mh.r..J....6*.<.kO...Alv.._.qdKQ.5...-FMN......;.~..._..pv..&...%"Nz].n............vM.`..k..a.:.f]...a........y.....g0..`........|V...Yq.....#...8....n..i7w<2Rp...R.@.]..%.b%..~...a..<.j...&....?...Qp..Ow|&4>...d.O.|.|...Fk;t.P[A..i.6K.~...Y.N..9......~<Q..f...i.....6..U...l. ..E..4$Lw..p..Y%NR..;...B|B.U...\e......S...=...B{A.]..*....5Q.....FI..w....q.s{.K....(.]...HJ9........(.....[U|.....d71.Vv.....a.8...L.....k;1%.T.@+..uv.~v.]`.V....Z.....`.M.@..Z|.r........./C..Z.n0.....@.YQ.8..q.h.....c.%...p..<..zl.c..FS.D..fY..z..=O..%L..MU..c.:.~.....F]c......5.=.8.r...0....Y.\o.o....U.~n...`...Wk..2b......I~
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft OOXML
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:67766FF48AF205B771B53AA2FA82B4F4
                                                        SHA1:0964F8B9DC737E954E16984A585BDC37CE143D84
                                                        SHA-256:160D05B4CB42E1200B859A2DE00770A5C9EBC736B70034AFC832A475372A1667
                                                        SHA-512:AC28B0B4A9178E9B424E5893870913D80F4EE03D595F587AA1D3ACC68194153BAFC29436ADFD6EA8992F0B00D17A43CFB42C529829090AF32C3BE591BD41776D
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK.........nB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK.........nB;O.......k......._rels/.rels...J.@.._e..4...i/.,x..Lw'....v'.<....WpQ..,......7?....u.y..;bL../..3t.+.t.G....Y.v8.eG.MH,....(\..d..R....t>Z.<F-..G.(..\.x...l?..M..:#........2.#.[..H7..#g{...._j...(.....q......;.5'..Nt..."...A.h........>....\.'...L..D..DU<.....C.TKu.5Tu....bV..;PK.........C26.b..............diagrams/layout1.xml.T.n. .}N....).je./m.+u....`{..0P......p..U}c.9g..3....=h.(.."..D-.&....~.....y..I...(r.aJ.Y..e..;.YH...P.{b......hz.-..>k.i5..z>.l...f...c..Y...7.ND...=.%..1...Y.-.o.=)(1g.{.".E.>2.=...]Y..r0.Q...e.E.QKal,.....{f...r..9-.mH..C..\.w....c.4.JUbx.p Q...R......_...G.F...uPR...|um.+g..?..C..gT...7.0.8l$.*.=qx.......-8..8.
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft OOXML
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:6C24ED9C7C868DB0D55492BB126EAFF8
                                                        SHA1:C6D96D4D298573B70CF5C714151CF87532535888
                                                        SHA-256:48AF17267AD75C142EFA7AB7525CA48FAB579592339FB93E92C4C4DA577D4C9F
                                                        SHA-512:A3E9DC48C04DC8571289F57AE790CA4E6934FBEA4FDDC20CB780F7EA469FE1FC1D480A1DBB04D15301EF061DA5700FF0A793EB67D2811C525FEF618B997BCABD
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK.........nB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........5nB;.ndX....`......._rels/.rels...J.1.._%..f.J.J..x..AJ.2M&......g..#............|.c..x{_._..^0e.|.gU..z.....#.._..[..JG.m.....(...e..r."....P)....3..M].E:..SO.;D..c..J..rt...c.,.....a.;.....$.../5..D.Ue.g...Q3......5.':...@...~t{.v..QA>.P.R.A~..^AR.S4G......].n...x41....PK.........^5..s.V....Z......diagrams/layout1.xml.[]o.F.}N~..S.......VU.U+m6R........&.d.}...{M....Q.S....p9.'./O..z."..t>q....."[..j>y..?...u....[.}..j-...?Y..Bdy.I./.....0.._.....-.s...rj...I..=..<..9.|>YK.....o.|.my.F.LlB..be/E.Y!.$6r.f/.p%.......U....e..W.R..fK....`+?.rwX.[.b..|..O>o.|.....>1.......trN`7g..Oi.@5..^...]4.r...-y...T.h...[.j1..v....G..........nS..m..E"L...s
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:5632C4A81D2193986ACD29EADF1A2177
                                                        SHA1:E8FF4FDFEB0002786FCE1CF8F3D25F8E9631E346
                                                        SHA-256:06DE709513D7976690B3DD8F5FDF1E59CF456A2DFBA952B97EACC72FE47B238B
                                                        SHA-512:676CE1957A374E0F36634AA9CFFBCFB1E1BEFE1B31EE876483B10763EA9B2D703F2F3782B642A5D7D0945C5149B572751EBD9ABB47982864834EF61E3427C796
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:<?xml version="1.0" encoding="utf-8"?>....<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">.. <xsl:output method="html" encoding="us-ascii"/>.... <xsl:template match="*" mode="outputHtml2">.. <xsl:apply-templates mode="outputHtml"/>.. </xsl:template>.... <xsl:template name="StringFormatDot">.. <xsl:param name="format" />.. <xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.. <xsl:when test="$format = ''"></xsl:when>.. <xsl:when test="substring($format, 1, 2) = '%%'">.. <xsl:text>%</xsl:text>.. <xsl:call-template name="StringFormatDot">.. <xsl:with-param name="format" select="substring($format, 3)" />.. <xsl:with-param name=
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:9AC6DE7B629A4A802A41F93DB2C49747
                                                        SHA1:3D6E929AA1330C869D83F2BF8EBEBACD197FB367
                                                        SHA-256:52984BC716569120D57C8E6A360376E9934F00CF31447F5892514DDCCF546293
                                                        SHA-512:5736F14569E0341AFB5576C94B0A7F87E42499CEC5927AAC83BB5A1F77B279C00AEA86B5F341E4215076D800F085D831F34E4425AD9CFD52C7AE4282864B1E73
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:<?xml version="1.0" encoding="utf-8"?>....<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt" xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:51D32EE5BC7AB811041F799652D26E04
                                                        SHA1:412193006AA3EF19E0A57E16ACF86B830993024A
                                                        SHA-256:6230814BF5B2D554397580613E20681752240AB87FD354ECECF188C1EABE0E97
                                                        SHA-512:5FC5D889B0C8E5EF464B76F0C4C9E61BDA59B2D1205AC9417CC74D6E9F989FB73D78B4EB3044A1A1E1F2C00CE1CA1BD6D4D07EEADC4108C7B124867711C31810
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:<?xml version="1.0" encoding="utf-8"?>..<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:9888A214D362470A6189DEFF775BE139
                                                        SHA1:32B552EB3C73CD7D0D9D924C96B27A86753E0F97
                                                        SHA-256:C64ED5C2A323C00E84272AD3A701CAEBE1DCCEB67231978DE978042F09635FA7
                                                        SHA-512:8A75FC2713003FA40B9730D29C786C76A796F30E6ACE12064468DD2BB4BF97EF26AC43FFE1158AB1DB06FF715D2E6CDE8EF3E8B7C49AA1341603CE122F311073
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:<?xml version="1.0" encoding="utf-8"?>............<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..........<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select=
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:F425D8C274A8571B625EE66A8CE60287
                                                        SHA1:29899E309C56F2517C7D9385ECDBB719B9E2A12B
                                                        SHA-256:DD7B7878427276AF5DBF8355ECE0D1FE5D693DF55AF3F79347F9D20AE50DB938
                                                        SHA-512:E567F283D903FA533977B30FD753AA1043B9DDE48A251A9AC6777A3B67667443FEAD0003765A630D0F840B6C275818D2F903B6CB56136BEDCC6D9BDD20776564
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:<?xml version="1.0" encoding="utf-8"?>......<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..........<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:33A829B4893044E1851725F4DAF20271
                                                        SHA1:DAC368749004C255FB0777E79F6E4426E12E5EC8
                                                        SHA-256:C40451CADF8944A9625DD690624EA1BA19CECB825A67081E8144AD5526116924
                                                        SHA-512:41C1F65E818C2757E1A37F5255E98F6EDEAC4214F9D189AD09C6F7A51F036768C1A03D6CFD5845A42C455EE189D13BB795673ACE3B50F3E1D77DAFF400F4D708
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:<?xml version="1.0" encoding="utf-8"?>....<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt"......xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">.....<xsl:output method="html" encoding="us-ascii"/>.....<xsl:template match="/">....<xsl:call-template name="Start"/>...</xsl:template>.....<xsl:template name="Start">....<xsl:choose>.....<xsl:when test="b:Version">......<xsl:text>2010.2.02</xsl:text>.....</xsl:when>.......<xsl:when test="b:XslVersion">......<xsl:text>2008</xsl:text>.....</xsl:when>.... <xsl:when test="b:StyleNameLocalized">.. <xsl:choose>.. <xsl:when test="b:StyleNameLocalized/b:Lcid='1033'">.. <xsl:text>Harvard - Anglia</xsl:text>.. </xsl:when>.. <xsl:when test="b:StyleNameLocalized/b:Lcid='1025'">.. <xsl:text>Harvard - Anglia</xsl:text>.. </xsl:when>.. <x
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:0C9731C90DD24ED5CA6AE283741078D0
                                                        SHA1:BDD3D7E5B0DE9240805EA53EF2EB784A4A121064
                                                        SHA-256:ABCE25D1EB3E70742EC278F35E4157EDB1D457A7F9D002AC658AAA6EA4E4DCDF
                                                        SHA-512:A39E6201D6B34F37C686D9BD144DDD38AE212EDA26E3B81B06F1776891A90D84B65F2ABC5B8F546A7EFF3A62D35E432AF0254E2F5BFE4AA3E0CF9530D25949C0
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:<?xml version="1.0" encoding="utf-8"?>....<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt"......xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">.....<xsl:output method="html" encoding="us-ascii"/>.....<xsl:template match="/">....<xsl:call-template name="Start"/>...</xsl:template>.....<xsl:template name="Start">....<xsl:choose>.....<xsl:when test="b:Version">......<xsl:text>2010.2.02</xsl:text>.....</xsl:when>.......<xsl:when test="b:XslVersion">......<xsl:text>2006</xsl:text>.....</xsl:when>.. <xsl:when test="b:StyleNameLocalized">.. <xsl:choose>.. <xsl:when test="b:StyleNameLocalized/b:Lcid='1033'">.. <xsl:text>IEEE</xsl:text>.. </xsl:when>.. <xsl:when test="b:StyleNameLocalized/b:Lcid='1025'">.. <xsl:text>IEEE</xsl:text>.. </xsl:when>.. <xsl:when test="b:StyleNameL
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:FF0E07EFF1333CDF9FC2523D323DD654
                                                        SHA1:77A1AE0DD8DBC3FEE65DD6266F31E2A564D088A4
                                                        SHA-256:3F925E0CC1542F09DE1F99060899EAFB0042BB9682507C907173C392115A44B5
                                                        SHA-512:B4615F995FAB87661C2DBE46625AA982215D7BDE27CAFAE221DCA76087FE76DA4B4A381943436FCAC1577CB3D260D0050B32B7B93E3EB07912494429F126BB3D
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:<?xml version="1.0" encoding="utf-8"?>..<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:3BF8591E1D808BCCAD8EE2B822CC156B
                                                        SHA1:9CC1E5EFD715BD0EAE5AF983FB349BAC7A6D7BA0
                                                        SHA-256:7194396E5C833E6C8710A2E5D114E8E24338C64EC9818D51A929D57A5E4A76C8
                                                        SHA-512:D434A4C15DA3711A5DAAF5F7D0A5E324B4D94A04B3787CA35456BFE423EAC9D11532BB742CDE6E23C16FA9FD203D3636BD198B41C7A51E7D3562D5306D74F757
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:<?xml version="1.0" encoding="utf-8"?>..<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..........<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>...... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$parame
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:377B3E355414466F3E3861BCE1844976
                                                        SHA1:0B639A3880ACA3FD90FA918197A669CC005E2BA4
                                                        SHA-256:4AC5B26C5E66E122DE80243EF621CA3E1142F643DD2AD61B75FF41CFEE3DFFAF
                                                        SHA-512:B050AD52A8161F96CBDC880DD1356186F381B57159F5010489B04528DB798DB955F0C530465AB3ECD5C653586508429D98336D6EB150436F1A53ABEE0697AEB9
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:<?xml version="1.0" encoding="utf-8"?>......<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt" xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>.....<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>...</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />......<xsl:variable name="prop_EndChars">.....<xsl:call-template name="templ_prop_EndChars"/>....</xsl:variable>......<xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$parameters" />......
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:F079EC5E2CCB9CD4529673BCDFB90486
                                                        SHA1:FBA6696E6FA918F52997193168867DD3AEBE1AD6
                                                        SHA-256:3B651258F4D0EE1BFFC7FB189250DED1B920475D1682370D6685769E3A9346DB
                                                        SHA-512:4FFFA59863F94B3778F321DA16C43B92A3053E024BDD8C5317077EA1ECC7B09F67ECE3C377DB693F3432BF1E2D947EC5BF8E88E19157ED08632537D8437C87D6
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:<?xml version="1.0" encoding="utf-8"?>......<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt" xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$pa
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:F883B260A8D67082EA895C14BF56DD56
                                                        SHA1:7954565C1F243D46AD3B1E2F1BAF3281451FC14B
                                                        SHA-256:EF4835DB41A485B56C2EF0FF7094BC2350460573A686182BC45FD6613480E353
                                                        SHA-512:D95924A499F32D9B4D9A7D298502181F9E9048C21DBE0496FA3C3279B263D6F7D594B859111A99B1A53BD248EE69B867D7B1768C42E1E40934E0B990F0CE051E
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:<?xml version="1.0" encoding="utf-8"?>..<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Word 2007+
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:2AB22AC99ACFA8A82742E774323C0DBD
                                                        SHA1:790F8B56DF79641E83A16E443A75A66E6AA2F244
                                                        SHA-256:BC9D45D0419A08840093B0BF4DCF96264C02DFE5BD295CD9B53722E1DA02929D
                                                        SHA-512:E5715C0ECF35CE250968BD6DE5744D28A9F57D20FD6866E2AF0B2D8C8F80FEDC741D48F554397D61C5E702DA896BD33EED92D778DBAC71E2E98DCFB0912DE07B
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK.........R.@c}LN4...........[Content_Types].xml ...(.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.....D....>.V...f-}..r9....=..Mn..U..5.(.....a...E..b....*..w.$...,O_fu."[P..WU=.;.....5..wdt..y1.......i.44-.r....;./.biG.Cd.n.j.{/......V....c..^^.E.H?H.........B.........<...Ae.l.]..{....mK......B....
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Word 2007+
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:5A53F55DD7DA8F10A8C0E711F548B335
                                                        SHA1:035E685927DA2FECB88DE9CAF0BECEC88BC118A7
                                                        SHA-256:66501B659614227584DA04B64F44309544355E3582F59DBCA3C9463F67B7E303
                                                        SHA-512:095BD5D1ACA2A0CA3430DE2F005E1D576AC9387E096D32D556E4348F02F4D658D0E22F2FC4AA5BF6C07437E6A6230D2ABF73BBD1A0344D73B864BC4813D60861
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK........<dSA4...T...P.......[Content_Types].xml ...(........................................................................................................................................................................................................................................................................................................................................................................................................................................`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`..^\-o..D....n_d.jq...gwg.t........:?/..}..Vu5...rQ..7..X.Q."./g..o....f....YB......<..w?...ss..e.4Y}}...0.Y...........u3V.o..r...5....7bA..Us.z.`.r(.Y>.&DVy.........6.T...e.|..g.%<...9a.&...7...}3:B.......<...!...:..7w...y..
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Microsoft Word 2007+
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:7CDFFC23FB85AD5737452762FA36AAA0
                                                        SHA1:CFBC97247959B3142AFD7B6858AD37B18AFB3237
                                                        SHA-256:68A8FBFBEE4C903E17C9421082E839144C205C559AFE61338CBDB3AF79F0D270
                                                        SHA-512:A0685FD251208B772436E9745DA2AA52BC26E275537688E3AB44589372D876C9ACE14B21F16EC4053C50EB4C8E11787E9B9D922E37249D2795C5B7986497033E
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:PK.........Y5B#.W ............[Content_Types].xml ...(...................................................................................................................................................................................................................................................................................................................................................................................................................................................`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.....D....>.V...f-}..r9....=..Mn..U..5.(.....a...E..b....*..w.$...,O_fu."[P..WU=.;.....5..wdt..y1.......i.44-.r....;./.biG=.HK...........&o[B....z.7.o...&.......[.oL_7cuN..&e..ccAo...YW......8...Y>.&DVy...-&.*...Y.....4.u.., !po....9W....g..F...*+1....d,'...L.M[-~.Ey. ......[
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):18
                                                        Entropy (8bit):2.725480556997868
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:A5E51FDFAF429614FB5218AB559D299A
                                                        SHA1:262EC76760BB9A83BCFF955C985E70820DF567AE
                                                        SHA-256:3E82E9F60CE38815C28B0E5323268BDA212A84C3A9C7ACCC731360F998DF0240
                                                        SHA-512:9B68F1C04BDE0024CECFC05A37932368CE2F09BD96C72AB0442E16C8CF5456ED9BB995901095AC1BBDF645255014A5E43AADEE475564F01CA6BE3889C96C29C9
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:..t.o.r.r.e.s.....
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):12
                                                        Entropy (8bit):0.41381685030363374
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:E4A1661C2C886EBB688DEC494532431C
                                                        SHA1:A2AE2A7DB83B33DC95396607258F553114C9183C
                                                        SHA-256:B76875C50EF704DBBF7F02C982445971D1BBD61AEBE2E4B28DDC58A1D66317D5
                                                        SHA-512:EFDCB76FB40482BC94E37EAE3701E844BF22C7D74D53AEF93AC7B6AE1C1094BA2F853875D2C66A49A7075EA8C69F5A348B786D6EE0FA711669279D04ADAAC22C
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:............
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:E4A1661C2C886EBB688DEC494532431C
                                                        SHA1:A2AE2A7DB83B33DC95396607258F553114C9183C
                                                        SHA-256:B76875C50EF704DBBF7F02C982445971D1BBD61AEBE2E4B28DDC58A1D66317D5
                                                        SHA-512:EFDCB76FB40482BC94E37EAE3701E844BF22C7D74D53AEF93AC7B6AE1C1094BA2F853875D2C66A49A7075EA8C69F5A348B786D6EE0FA711669279D04ADAAC22C
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:............
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):0
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:E4A1661C2C886EBB688DEC494532431C
                                                        SHA1:A2AE2A7DB83B33DC95396607258F553114C9183C
                                                        SHA-256:B76875C50EF704DBBF7F02C982445971D1BBD61AEBE2E4B28DDC58A1D66317D5
                                                        SHA-512:EFDCB76FB40482BC94E37EAE3701E844BF22C7D74D53AEF93AC7B6AE1C1094BA2F853875D2C66A49A7075EA8C69F5A348B786D6EE0FA711669279D04ADAAC22C
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:............
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 21 14:06:48 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                                                        Category:dropped
                                                        Size (bytes):2677
                                                        Entropy (8bit):3.988713593608169
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:77AE615E1FBFC4308915FA63819502CA
                                                        SHA1:5B0EA8963171CB2B15A405E90CA7D09131DE06B3
                                                        SHA-256:4BEBA24587B193009B5D3DE10546F332485E316A4591A13128DB40FA16D28920
                                                        SHA-512:C09B0C41AB1C799FB9F8423EDF3832EC11DF7FE4B09006DB22EB410A199DCCCD8F1F97FA4FCF1D08BFAD409B756D12E689C6D8224C797FEC608E75747A9066E7
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:L..................F.@.. ...$+.,....p.D..#......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.IUY.x....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VUY.x....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.VUY.x....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.VUY.x...........................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VUY.x...........................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........\.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 21 14:06:48 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                                                        Category:dropped
                                                        Size (bytes):2679
                                                        Entropy (8bit):4.004064009629778
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:6215D4B286B6395B6CE926F1DD4878EC
                                                        SHA1:788561B4EB79C6A4993EEC901B186C4B938E59A8
                                                        SHA-256:C250F6393E747AA6F93B09FAFB87044336FC13D45E6EC1C5795C6EECA46D313D
                                                        SHA-512:B9B073C85C444E36545CC2884AF78691965E71879C504AE2D7512F499BFFF60533BDB13BCEAFB716C42155640FC8AB900494ABD66D0BF9C1A6634DB81DA9D665
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:L..................F.@.. ...$+.,....p.8..#......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.IUY.x....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VUY.x....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.VUY.x....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.VUY.x...........................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VUY.x...........................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........\.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:54:41 2023, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                                                        Category:dropped
                                                        Size (bytes):2693
                                                        Entropy (8bit):4.014133508367576
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:A1FD34943ED750E12D8D784C063AE299
                                                        SHA1:FE1BA1163427B3F175B0DAC1C0ED77D29AE58522
                                                        SHA-256:55EA39B8E548884C11663A9E02AF07FCB1CB25154757DD31F168007D084865EB
                                                        SHA-512:AB097282823C56E37E76E3661B340A8948476CD41F8AACE61DBEC4E7B8A1A70D164077777286F6CE6FB31CB28832181C04993D1E852A9D7EE49712830E75350C
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:L..................F.@.. ...$+.,.....v. ;.......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.IUY.x....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VUY.x....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.VUY.x....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.VUY.x...........................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VFW.N...........................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........\.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 21 14:06:48 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                                                        Category:dropped
                                                        Size (bytes):2681
                                                        Entropy (8bit):4.00443649967088
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:BC2122BE0849D4C86A7DCF99FA039052
                                                        SHA1:4D7CA53FC8E539D93488FD0EC10CDD064DA94F3D
                                                        SHA-256:3AE13AE974C4B2D902A38FF1A366FBCEF964EB11E990592A2668FED4C94D23D6
                                                        SHA-512:22A1049113DE8676E525E6469B322FA70843E872E78388FD6481AE20D2C90502AB5A49D7F1C6469F381F2BF37105683D813A7A8BA32F9C82CEE04EA65CB47CAA
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:L..................F.@.. ...$+.,...../2..#......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.IUY.x....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VUY.x....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.VUY.x....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.VUY.x...........................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VUY.x...........................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........\.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 21 14:06:48 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                                                        Category:dropped
                                                        Size (bytes):2681
                                                        Entropy (8bit):3.993872236431892
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:65336CE18C5C9282AB4A073BA0692FC9
                                                        SHA1:CB173399D9C3CCC2E6367CD3E4D8D445FE76C988
                                                        SHA-256:B4656C18081B69B010F09920D144081DFF00EA54E5E2AFD984B8BCEDB6B3B129
                                                        SHA-512:96B2BEF007DB3397B2F16B545B8A8F475279B06725BFFF8873554B0D2D7BC011174B7499AF95DE93E83D7C4BF3C946EECD8B45250F857B64425B83BDF44F35C2
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:L..................F.@.. ...$+.,....$.>..#......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.IUY.x....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VUY.x....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.VUY.x....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.VUY.x...........................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VUY.x...........................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........\.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 21 14:06:48 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                                                        Category:dropped
                                                        Size (bytes):2683
                                                        Entropy (8bit):4.002843282323641
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:7BD39303D331106FBD1A1A491A908C1D
                                                        SHA1:B3C72823A6FE8E71B11F2BCAA1E04E41BA6155A1
                                                        SHA-256:9EE0F774FC92636BE14A01DD586F5783084730D62136257058FF39DB206F08BF
                                                        SHA-512:988A4D16C45D0F72DCB646A356721E7714036778D65E65748E367D4730A31F6A4593CF653DE69AE064003B31042D571C2852D3303A5B2B807DB87CA574D9A7C1
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:L..................F.@.. ...$+.,....c.'..#......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.IUY.x....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VUY.x....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.VUY.x....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.VUY.x...........................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VUY.x...........................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........\.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):162
                                                        Entropy (8bit):4.67735912212747
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:A2C171A52466261C64D956CA8B21E1E2
                                                        SHA1:FBF30850F2BD35D2A656DD0C86D75862B919AD59
                                                        SHA-256:141312312CAFF30A25EB1D5DB0D421F383359EEDF7D45EC91913768BAFC176E1
                                                        SHA-512:F3FE75E72B24D5959A5FC4DCA26E6675E8F5E16B7DB8926FE2E0DBC550EED3D4612A0DE1FDE8CD26E862A544E69C02A23EF30D1375D73CA2E075DCF24790EECA
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:..........................................................tb1..Y..2..M.........>.b..k'.....m..H.-J..,J.....D,.+,."...m_L..#.......I..,...}.j....8V...=Tj
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (585)
                                                        Category:downloaded
                                                        Size (bytes):590
                                                        Entropy (8bit):4.857119492033688
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:1E2B7A9B7966F66531531A197ACAD5C0
                                                        SHA1:7F6CB9BA6D5065C06BDBE4A194C9A76188B69913
                                                        SHA-256:5274F948E85D0AAC23EAF42D06EE1B293C0A17040086187DDF3DB6C71596AD75
                                                        SHA-512:89835878A1775584F105C69C232471979600B0940040FA993CEEC3BEDA60069A99E4472B1BE69F851D0AFB20CFEF7BF45132C77C0585BA1272BBD3576443CBBE
                                                        Malicious:false
                                                        Reputation:unknown
                                                        URL:https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=EMAIL&oit=1&cp=5&pgcl=7&gs_rn=42&psi=q1SX4doCXrbfxwC5&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
                                                        Preview:)]}'.["EMAIL",["email","email signature","email login","email gmail","email checker","email generator","email sign offs","email finder","email format","email signature generator"],["","","","","","","","","",""],[],{"google:clientdata":{"bpc":false,"tlw":false},"google:suggestrelevance":[1301,601,600,556,555,554,553,552,551,550],"google:suggestsubtypes":[[512,433],[512,433],[512,433],[512,433],[512,433],[512,433],[512,433],[512,433],[512,433],[512]],"google:suggesttype":["QUERY","QUERY","QUERY","QUERY","QUERY","QUERY","QUERY","QUERY","QUERY","QUERY"],"google:verbatimrelevance":1300}]
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 406986
                                                        Category:dropped
                                                        Size (bytes):116365
                                                        Entropy (8bit):7.997737813291819
                                                        Encrypted:true
                                                        SSDEEP:
                                                        MD5:2D3FBED6DDD719FCC1BFB500B612FCEC
                                                        SHA1:CD91B795DDE806AC8A38E51CCB6E8BAD8E57DA1B
                                                        SHA-256:B2566B646F02DF4CE30B05D8223B78130A719D4EC9E4794A0106C371ADE33CC7
                                                        SHA-512:A870E514B325D6FDC4D154438A8DD333C7AB46E545C1B27AC4869D9F1D8594CA1CDC530F5E96C835220DDAD4E1CEF841673696978031B5237E783972AEE701D1
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:...........k[.H.(.}..[..-..c.0DFxHBz.I......O.a...#yt......k...J..&...........^.~...._..j...W;.8<.....]....m...~.}<.8~s.~=.(....qm.Oy.~....jaP......h.F^......|oZ.G.M-...,...a..~..GW|...L....N.(y...Z-..Cm......p.......?.5/.QmS..b^K...jw..8.}..Q.....!.o..8...&X.x-.Im.F.D..U;.....-.T.:...1........8Ka..M.L.ZZ'....>........x....v.S;.<...0J.I.0.G.....B.F..c.k.~....C.:...r..,.w.q~....q......#42V.q..f|.kK...1o.mP.}.......N..n.w6.%^M.d.;...~2I.Z..fs...S/......F..=?...5....s..N.+.A.mx...j.T......?..W._p6.|.}|.{O.....2..`..._......g....j..xb^^...a.y.....s......4....q.Y..^T....X,.....m..~v,.....WP.U...:O".YoRX...7..S...zI.v.......mq.....E.,z.%....L|.>.M.'i..ki3.u+.~...x.=...?6.%?.[.G.`Z=.$.w..4.."...R.1.k.|..N.`......3...7.].'.E..).az......<a....4q..6.(..=~..........frk..?M#^Q.z..A..M.f.......S....s..d.e91._,zO.[X.......4.G..!.9Vg.......j.-?~.z.w..f.M............,...Z....w5..#.^..M.P.'.X.n/..mW.|......0...w../...>\...l.......h...q>.w...FC[....7.
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:downloaded
                                                        Size (bytes):16
                                                        Entropy (8bit):3.625
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:2824F3BA5F591CD0F71B7F459AD29AE5
                                                        SHA1:65369608C6BD54AC4C703B6904D17D7D759878BE
                                                        SHA-256:0C0A807545A0344B360C0F692D284799A2447310C7A9AACF3CB92C22D13E906A
                                                        SHA-512:C1C3FFD34A4E9131B0F68CF6A2A35B62994D55332D18BA06E3464C213D4245B6C89DD55E797317078A3705E265D65AC232E042C8BB9531F65871659EE4DA50DD
                                                        Malicious:false
                                                        Reputation:unknown
                                                        URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xNDkSEAksbwKY-SkFAxIFDXCu2Qk=?alt=proto
                                                        Preview:CgkKBw1wrtkJGgA=
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (20568)
                                                        Category:downloaded
                                                        Size (bytes):91566
                                                        Entropy (8bit):5.4929827909252475
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:10B6B239A87D55B768A967151080E396
                                                        SHA1:A74261E2FECA59CED8C9CDDD031BDCCC2185A822
                                                        SHA-256:B6B0D67BEC64FCE5CC85368E10CC700126EF5F0689DC83F11660A83C167587E5
                                                        SHA-512:733F4443E896F8F74FA3DA9CD34E5714D0151F4744B29CE90978E45878C5136CF718D8CD78DD7AD406D840E460837A5C4A54E831398AE345E61B61D19FB75DB5
                                                        Malicious:false
                                                        Reputation:unknown
                                                        URL:"https://www.gstatic.com/_/mss/boq-search/_/js/k=boq-search.ViewPackageService.en.0CqTADnFjP8.es5.O/ck=boq-search.ViewPackageService.rUAfpQru6I8.L.B1.O/am=BHEIIQAAIAAQAQ1AAAAAAAAAAAAAAAAAAAAAACABAAAAAAAAAAAQAAAUK1GTAACATOhPYAcACAB-AD_0BPT__wkBACAAcAg8vAAARAUAAAQBMDoSJJwpEACMgQOgERkAAAABAIgAAAAAAAA4hIMAABiBNAgiBBEtAYgBAiQAoAFoXGVCiBAABAIAAEqIHJKGAUjuVgFsUQkEEBQA8VECCAAQGiBBQoBAAAAIgQAwAAAUiAAAAEQHGJ4AAGAO5NBAArBGAMHATACAAwAAAICT4QEGCAAAAAAAAAAAAAAAECryIqAiAAAAAAAAAAAAAAAAAARAkw/d=1/exm=A7fCU,NwH0H,RMhBfe,VwDzFe,_gbm,w9hDv,xUdipf/ed=1/dg=0/rs=AH7-fg5tX31fHmUqQATzQHygD6kiPzKX4Q/cb=loaded_1_1/ee=ADJUGe:nSzGM;ALeJib:B8gLwd;AfeaP:TkrAjf;Afksuc:fBZcuf;BMxAGc:E5bFse;BgS6mb:fidj5d;BjwMce:cXX2Wb;CRubWc:GGHMXc;CxXAWb:YyRLvc;DULqB:RKfG5c;Dkk6ge:JZmW9e;DpcR3d:zL72xf;EABSZ:MXZt9d;EVNhjf:pw70Gc;EmZ2Bf:zr1jrb;EnlcNd:WeHg4;F9mqte:UoRcbe;Fmv9Nc:O1Tzwc;G0KhTb:LIaoZ;G6wU6e:hezEbd;GleZL:J1A7Od;GzNeK:lwR3kb;HMDDWe:HPcd9d;HoYVKb:PkDN7e;HqeXPd:cmbnH;IZrNqe:P8ha2c;IcRVsb:iZsl5b;JXS8fb:Qj0suc;JbMT3:M25sS;JsbNhc:Xd8iUd;KQzWid:ZMKkN;LBgRLc:SdcwHb,XVMNvd;LXA8b:PiQ7Fb;LsNahb:ucGLNb;MWIbN:Oezo8e;Me32dd:MEeYgc;NPKaK:SdcwHb;NSEoX:lazG7b;NoD55:pyzU6b,tHLYle;Np8Qkd:Dpx6qc;Nyt6ic:jn2sGd;OGn9Jd:vP7cyb;OgagBe:cNTe0;OohIYe:mpEAQb;Pjplud:EEDORb,PoEs9b;Q6C5kf:pfdZCe;QGR0gd:Mlhmy;QHcAG:Osl0G;Qoo2ob:SWzGQe;R4IIIb:QWfeKf;R9Ulx:CR7Ufe;RDNBlf:zPRCJb;Rlgi2d:s4kmTe;SFqMfe:d7N0Ze;SLtqO:Kh1xYe;SNUn3:ZwDk9d,x8cHvb;ScI3Yc:e7Hzgb;SnFeMb:gIO09b;SzQQ3e:dNhofb;TxfV6d:YORN0b;UDrY1c:eps46d;UVmjEd:EesRsb;UVzb9c:IvPZ6d;UyG7Kb:wQd0G;V2HTTe:RolTY;VGRfx:VFqbr;VN6jIc:ddQyuf;VOcgDe:YquhTb;VxQ32b:k0XsBb;W1Xvfd:KwNFR;WDGyFe:jcVOxd;Wfmdue:g3MJlb;XUezZ:sa7lqb;XcupOe:nPGmVc;YIZmRd:A1yn5d;YV5bee:IvPZ6d,W0fpg;ZMvdv:PHFPjb;ZSH6tc:QAvyLe;ZlOOMb:P0I0Ec;a56pNe:JEfCwb;aAJE9c:WHW6Ef;aCJ9tf:qKftvc;aZ61od:arTwJ;af0EJf:ghinId;aoM3kc:RmZU0e;bDXwRe:UsyOtc;bcPXSc:gSZLJb;cEt90b:ws9Tlc;cFTWae:gT8qnd;cZGwze:Uq2Ztb;csKcjd:ciLywf;dIoSBb:SpsfSb;dLlj2:Qqt3Gf;daB6be:lMxGPd;dowIGb:ebZ3mb;dtl0hd:lLQWFe;eBAeSb:zbML3c;eBZ5Nd:audvde;eHDfl:ofjVkb;eO3lse:TC8ZNd;euOXY:OZjbQ;fcYTHe:rDv7Wc;flqRgb:ox2Q7c;fufDm:kGNN9b;g8nkx:U4MzKc;gPGwWe:ds8otb;gaub4:TN6bMe;gtVSi:ekUOYd;h3MYod:wV5Pjc;hAnnod:ca128b;hK67qb:QWEO5b;heHB1:sFczq;hjRo6e:F62sG;hsLsYc:Vl118;iFQyKf:QIhFr,vfuNJf;imqimf:jKGL2e;jGHevf:wsoZ3c;jWrxGe:FHj41b;jlykkc:Ixcocc;kCQyJ:ueyPK;kMFpHd:OTA3Ae;kbAm9d:MkHyGd;kbIuKc:rDv7Wc;kyjn6b:CfXVTe;lkq0A:IbjKve;lx12yf:dzcQzd;nAFL3:NTMZac,s39S4;oGtAuc:sOXFj;okUaUd:Kg1rBc,wItadb;pKJiXd:VCenhc;pNsl2d:j9Yuyc;pXdRYb:MdUzUe;pj82le:ww04Df;qZx2Fc:j0xrE;qaS3gd:yiLg6e;qavrXe:zQzcXe;qddgKe:R9YHJc,d7YSfd,x4FYXe;qsajS:qGotLb;rQSrae:C6D5Fc;rebY5d:S5i2J;sTsDMc:kHVSUb;sZmdvc:rdGEfc;slvZxc:FU6yf;tGdRVe:b5f3kc;tH4IIe:NoECLb,Ymry6;tosKvd:ZCqP3;trZL0b:qY8PFe;ttWQK:um1fmf;uuQkY:u2V3ud;vAvu5d:O6oXm;vEYCNb:FaqsVd;vGrMZ:Y1W8Ad;vXy3B:yzQjhd;vfVwPd:lcrkwe;w3bZCb:ZPGaIb;w4rSdf:XKiZ9;w9w86d:aIe7ef;wQlYve:aLUfP;wR5FRb:O1Gjze,siKnQd;wV5Pjc:L8KGxe,nQze3d;xBbsrc:NEW1Qc;xMUn6e:e0kzxe;xqZiqf:BBI74;ysNiMc:CpIBjd;yxTchf:KUM7Z;z97YGf:oug9te;zaIgPb:Qtpxbd,l09DXe,q8mB0c;zxnPse:GkRiKb/m=n73qwf,mI3LFb,MpJwZc,IZT63,LEikZe,A1yn5d,RDV3Nb,lts3Re,P9vDhc,szFNKc,coOdHc,L919Z,lazG7b,PrPYRd,gychg,KCQMBc,Kg1rBc,nQze3d,fkGYQb,Wq6lxf,Mlhmy,mdR7q,Rr5NOe,fz5ukf,SRsBqc,MI6k7c,kjKdXe,hKSk3e,X8lTKe,Gi5Toe,gpa7Te,luWJre"
                                                        Preview:"use strict";_F_installCss(".VuvQze.VuvQze{min-height:unset}.VuvQze .RfPPs{background-color:#fff;box-shadow:0 1px 6px 0 rgba(32,33,36,.28);box-sizing:border-box;border-radius:12px;position:fixed;z-index:125;overflow:hidden}.sUDUrf{left:calc(832px + max(var(--rhs-margin), 60px));right:unset}.WdLoq{left:unset;right:4px}.r3C4Ab.RfPPs{z-index:128;border-radius:0}c-wiz{contain:style}c-wiz>c-data{display:none}c-wiz.rETSD{contain:none}c-wiz.Ubi8Z{contain:layout style}.hg3Lgc{display:inline-block;position:relative;width:28px;height:28px}.eBrXtc{position:absolute;width:0;height:0;overflow:hidden}.JdM54e{width:100%;height:100%}.hg3Lgc.qs41qe .JdM54e{animation:spinner-container-rotate 1568ms linear infinite}.aopPX{position:absolute;width:100%;height:100%;opacity:0}.ZqnFk{border-color:#4285f4}.fxjES{border-color:#db4437}.ZHXbZe{border-color:#f4b400}.fDBOYb{border-color:#0f9d58}.hg3Lgc.qs41qe .aopPX.ZqnFk{animation:spinner-fill-unfill-rotate 5332ms cubic-bezier(0.4,0,0.2,1) infinite both,spinner-bl
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:gzip compressed data, max compression, truncated
                                                        Category:downloaded
                                                        Size (bytes):35
                                                        Entropy (8bit):4.199873730859799
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:D317C25EBCF619DCAD17963A91904BC1
                                                        SHA1:749A0A568BEF62730A278854033B5D83AC81519C
                                                        SHA-256:F5AF56B41CA2466246D1648A3BE8FE236C4F123E3FA8589C10A72F1C68ABBE8F
                                                        SHA-512:4055D9D3917796222A49B8BFB48D60E9A804D4CEBFE9958EAEEE9E7BABE153FEEB6C7C11577F1494E37BB91F89F5FAB6BC204B1A7AF11F32A6043D57B5A4A237
                                                        Malicious:false
                                                        Reputation:unknown
                                                        URL:https://www.google.com/compressiontest/gzip.html
                                                        Preview:...........QL.O..,HU.(....H.....
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:PNG image data, 600 x 1, 8-bit/color RGBA, non-interlaced
                                                        Category:downloaded
                                                        Size (bytes):132
                                                        Entropy (8bit):4.945787382366693
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:3EDA15637AFEAC6078F56C9DCC9BBDB8
                                                        SHA1:97B900884183CB8CF99BA069EEDC280C599C1B74
                                                        SHA-256:68C66D144855BA2BC8B8BEE88BB266047367708C1E281A21B9D729B1FBD23429
                                                        SHA-512:06B21827589FCAF63B085DB2D662737B24A39A697FF9138BDF188408647C3E90784B355F2B8390160CA487992C033CE735599271EE35873E1941812AB6C34B52
                                                        Malicious:false
                                                        Reputation:unknown
                                                        URL:https://r4.res.office365.com/owa/prem/15.20.8069.29/resources/images/0/sprite1.mouse.png
                                                        Preview:.PNG........IHDR...X..........x......sRGB.........gAMA......a.....pHYs..........o.d....IDATHK..1......Om.O ...j.a...\BW....IEND.B`.
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:JPEG image data, baseline, precision 8, 1920x1080, components 3
                                                        Category:downloaded
                                                        Size (bytes):17453
                                                        Entropy (8bit):3.890509953257612
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:7916A894EBDE7D29C2CC29B267F1299F
                                                        SHA1:78345CA08F9E2C3C2CC9B318950791B349211296
                                                        SHA-256:D8F5AB3E00202FD3B45BE1ACD95D677B137064001E171BC79B06826D98F1E1D3
                                                        SHA-512:2180ABE47FBF76E2E0608AB3A4659C1B7AB027004298D81960DC575CC2E912ECCA8C131C6413EBBF46D2AAA90E392EB00E37AED7A79CDC0AC71BA78D828A84C7
                                                        Malicious:false
                                                        Reputation:unknown
                                                        URL:https://aadcdn.msauth.net/shared/1.0/content/images/appbackgrounds/49_6ffe0a92d779c878835b40171ffc2e13.jpg
                                                        Preview:.....Phttp://ns.adobe.com/xap/1.0/.<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c142 79.160924, 2017/07/13-01:06:39 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about=""/> </rdf:RDF> </x:xmpmeta>
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (6603)
                                                        Category:downloaded
                                                        Size (bytes):6608
                                                        Entropy (8bit):5.8016325905317325
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:0AEDE91B0223C63CC5EE8A95E46BA9DA
                                                        SHA1:7449DF378782585419CD8BAF99212D91E93EFEBA
                                                        SHA-256:EA13BA546CEA43FBED74B888DFE0B375F3C31D6B9A7C137D0A97D93ABFDD7C19
                                                        SHA-512:551ECB33E524F2A4728A217D7DFDF953E9EB7C896DE64D0CDB5650765CB4AC6A3A5C6B4FA178769EDD54A0D0C56EA6D3D0E21A81E2C6237DB85549FFE655F213
                                                        Malicious:false
                                                        Reputation:unknown
                                                        URL:https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
                                                        Preview:)]}'.["",["nintendo switch 2 release date","the penguin episode 5 recap","golden state warriors","powerball jackpot lottery numbers","orionid meteor shower","boeing strike union","apple macbook pro m4","marvel daredevil born again"],["","","","","","","",""],[],{"google:clientdata":{"bpc":false,"tlw":false},"google:groupsinfo":"ChgIkk4SEwoRVHJlbmRpbmcgc2VhcmNoZXM\u003d","google:suggestdetail":[{"zl":10002},{"zl":10002},{"google:entityinfo":"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
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (561)
                                                        Category:dropped
                                                        Size (bytes):31666
                                                        Entropy (8bit):5.397564672661937
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:B0A74586B183DB7082EA48B6EA43EDE3
                                                        SHA1:5CEC77CD9C2A7EC472327533B0E32D2D5DA8634D
                                                        SHA-256:36CB859BE5A639C678F317D76C5C589DA1B5E08820FCCE41D67C38B517EFA959
                                                        SHA-512:88A1BA500A6CA668014C54D442DCA1487C1FFBE0E57BAA53A4F4E9C0038F12B981F3A1FC38B598EA4822EB0E086FAF0A4C5DC8601C9BB91C2B6B6BFC3E0945A2
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:(function(){'use strict';var q;function aa(a){var b=0;return function(){return b<a.length?{done:!1,value:a[b++]}:{done:!0}}}.var r=typeof Object.defineProperties=="function"?Object.defineProperty:function(a,b,c){if(a==Array.prototype||a==Object.prototype)return a;a[b]=c.value;return a};.function ba(a){a=["object"==typeof globalThis&&globalThis,a,"object"==typeof window&&window,"object"==typeof self&&self,"object"==typeof global&&global];for(var b=0;b<a.length;++b){var c=a[b];if(c&&c.Math==Math)return c}throw Error("Cannot find global object");}.var t=ba(this);function u(a,b){if(b)a:{var c=t;a=a.split(".");for(var d=0;d<a.length-1;d++){var g=a[d];if(!(g in c))break a;c=c[g]}a=a[a.length-1];d=c[a];b=b(d);b!=d&&b!=null&&r(c,a,{configurable:!0,writable:!0,value:b})}}.u("Symbol",function(a){function b(k){if(this instanceof b)throw new TypeError("Symbol is not a constructor");return new c(d+(k||"")+"_"+g++,k)}.function c(k,e){this.g=k;r(this,"description",{configurable:!0,writable:!0,value:e
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (47531)
                                                        Category:dropped
                                                        Size (bytes):47532
                                                        Entropy (8bit):5.399631966931825
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:808A57CAE0B6FEE71F46EFDDED44B348
                                                        SHA1:DD570A24C8BDA1B391AA1DDEA6004125818E579A
                                                        SHA-256:5B75AC6F98994352699841DFFA6E562725EBBD0005C539946AD3625EC550EB0F
                                                        SHA-512:3F06DFBFDEDE9BB4270EB1BBBE29FFBDB6E19DC0AA8234E1A2B92D84F0737555031231965151EFC386510193343985BCEC63062484BBD8EC0540A94A0109B765
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:"use strict";(function(){function Wt(e,r,n,o,c,l,h){try{var p=e[l](h),f=p.value}catch(s){n(s);return}p.done?r(f):Promise.resolve(f).then(o,c)}function Ht(e){return function(){var r=this,n=arguments;return new Promise(function(o,c){var l=e.apply(r,n);function h(f){Wt(l,o,c,h,p,"next",f)}function p(f){Wt(l,o,c,h,p,"throw",f)}h(void 0)})}}function V(e,r){return r!=null&&typeof Symbol!="undefined"&&r[Symbol.hasInstance]?!!r[Symbol.hasInstance](e):V(e,r)}function Me(e,r,n){return r in e?Object.defineProperty(e,r,{value:n,enumerable:!0,configurable:!0,writable:!0}):e[r]=n,e}function Fe(e){for(var r=1;r<arguments.length;r++){var n=arguments[r]!=null?arguments[r]:{},o=Object.keys(n);typeof Object.getOwnPropertySymbols=="function"&&(o=o.concat(Object.getOwnPropertySymbols(n).filter(function(c){return Object.getOwnPropertyDescriptor(n,c).enumerable}))),o.forEach(function(c){Me(e,c,n[c])})}return e}function Ar(e,r){var n=Object.keys(e);if(Object.getOwnPropertySymbols){var o=Object.getOwnPropertyS
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 113378
                                                        Category:downloaded
                                                        Size (bytes):20400
                                                        Entropy (8bit):7.980289584022803
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:F0DE9A98DBDFA8C02742CE6D92FB2524
                                                        SHA1:CDEC682AEB9E39EDCCC2374DAB26F04DB754A8B5
                                                        SHA-256:FAF4294F27A542B0F9EA2A7CB2711529AB027CD84A5F5BADFAE752100855E6BE
                                                        SHA-512:856FC9AB199997E69A9487372BC0083564F7115B3E0678CF1D542B9864E9A88D5FFB85697FD93538DC9439071E3BCD4B8BCCBFC610E1A45DE104D6362D8ADCD9
                                                        Malicious:false
                                                        Reputation:unknown
                                                        URL:https://aadcdn.msauth.net/ests/2.1/content/cdnbundles/converged.v2.login.min_nin8k2ycrbzww8zl5vxkaq2.css
                                                        Preview:...........}k..6..w...R..J.H=GSI..x.9...}T*.....)Q..f<...~.F.h..x..{+.-.....h..n....</v.ev......W.,.bU..rW.I...0x...C..2...6]..W_......../x.........~.z.}.|.#x......Ag*O.|XgU...4 .^'U...mP.A.].Z.U.!..Y.......:.ve.?.!..d.N...xJ...mR......0.@p...lKr/...E.-. .....|l.4.o.i.......L.iF..T{.n....2....VEY.y=..=..T+V./.b....\....7.sH.w{.h.....!.."F.k.!.......d...mS.rh.&G.../..h&..RE"!.A/.......A....L...8.q.M...t[...R...>.6;R..^.Vu..9.[F........>A.:HT}w]......2........p......'T.^]}.^..yJ>.<..pq..h.|..j....j.x..-...c...f...=".)..U.X'.M..l.]ZVtl\.I..}.0.~B0Y'.N...E.4.Xd..e...a.........."..9+d.&..l.$E..R.u.g.Q..w&...~I. .y..D.4;..'.."-.....b...)k.n.M...,3J.z_..&2f.h;.&.R.y..P..X.....\P....*.r...B.$........<....H5.M.."'#.6mQl..mQ5.=.\...O.....^..jM..u*.F..Oh.lNI..j..T..u...I..._........{.\...{..._|..={O..z..>......x..5Q.D7?{...^...^.......o.=.z......v......z.C...Gtw...0!..M@....^...^.x..G....W...{...)..y.<c3...^>{......7._..'d__...;R.
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 148x83, components 3
                                                        Category:dropped
                                                        Size (bytes):4681
                                                        Entropy (8bit):7.906949732481778
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:E3A0B27662D433591FA837EA3DE4F965
                                                        SHA1:CDF65C1E55C903AED9C122DB2A6EE1FC70A02243
                                                        SHA-256:7158126D0CDFCE2C84B7EA88715753039AD382FE2483704E18A53111705CD45B
                                                        SHA-512:FFBDCAC8E1AB7E9D0128FF38CD662EB3A99E2D36D4540ACD6443DDD05F007D432D577A52D2CB73D846F3232744EA9F65CF8D9AEE294A00BF80DC989124EFEEE3
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:......JFIF......................................... ."" ...$(4,$&1'..-=-157:::#+?D?8C49:7...........7%.%77777777777777777777777777777777777777777777777777......S...."........................................?.........................!..1A"Qaq...#2..3BR....$Cbr........................................2........................!.1.AQ.2q...a..."3BRb...............?......+H..!J..b..;.lp...cC.u..RTSW.j.`...kB...Ww.\c..I.j...+.....u(.h.r6..~B...i....nX..4..P.'f^...,.I.iQ.r=uF........=>..[]tm..Q-.jk@...o..E..ED..ghy..H..01....u4.Ap\.......!&6..?.s.n.Oa.=............Q..$g..j..'k.=;..F.Z../l.rs..?..m...#....|......~P..z}..M....\Q......3.#. ..M..d.RUW;...2.$.iP.`.wg:*...v.....;S.UO../..p.I..9$c<s...7....C-,....N......... .4t6....m.~?...M...m..1.....4.N.&6..C.........H...n=9o.....SK8.$."...6W>W.y..g.g..H.Z....f=.5<.b...npx?....W_..T...:.I.B~.......|{G[..p......`6....<....1..=. r4......1....n..... ......d..7..|.>.........d.d..V...9.....~...<*.K.z.j.-y.=........+f...
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 57443
                                                        Category:dropped
                                                        Size (bytes):16326
                                                        Entropy (8bit):7.987374325584103
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:C217AE35B8592DC9F1E680487DAD094F
                                                        SHA1:2E642562C2BFD8968629317FF212684C7EB59193
                                                        SHA-256:D41992E79D7BCFCC1F32597208DD99033D99C04882EAFCC8508F2FA0EE728C6B
                                                        SHA-512:EAF3BF49BCF58A7F7C39CBF35FD75862FEE98F611536080DFC794D288274CB9D67E95D0299679F7981E110B2577A47579D3623C7F11A6AC2A0CFA56AAEA2CAB0
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:...........}Ms#.......\.@..'F.........C)$....`.......Q.x7...}..'.}..?e#...QU]....Vo.................?........w!......=.G...P.../......8z....q._5....g..}g..31......l*...],.b..;..`...Y....3..5.uGAi..NP.6<.w.(..`...y..d.N.x..^u.....^...?..N........Fq.....z..wgN./..Ep/f..c/.D4~X.W~).s/.E8...T...8,:..Q.>............4....F,&c.)n.[.pcQp...4...6...i.............CkL=....'.\..L......2.A..o.u..."*p.. Xx.......'l.[w..'c/^.FP.....q.h4.R+X.x...d..M.}.Z,..RP..E.T......8 .v....Iw.X..?.r......nk....?Wj..a.|..........JAs.j.7.....?.)..t.z.-..m.]..3y...3@.3YO.KSz]...4.b........V..+.%.[.&........l.H>G.^<..{.$"..-.i.........`qcw...`.[....as[.+.X...n..X..%,:......am."a....^o@@.`].....( (b...k..B.0.....AX.D.?...,..-<@k.;..(*..C.]...:.nn..8..s...."4.. ...J...P.n....F.3G..u..;9&.{.2.80.XB.....@.qw.:../.`.P?.+t..w6.a~..7...8k..U._......k,..o.....yQ..r.....}.E...B.r......?{...\fB....-.).Fb.;.p.N?(..P.?..p....F........)p..,`l...o@.;.x.....:..f.E....<0..#K\...K(?K/OX
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text
                                                        Category:downloaded
                                                        Size (bytes):29
                                                        Entropy (8bit):3.9353986674667634
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:6FED308183D5DFC421602548615204AF
                                                        SHA1:0A3F484AAA41A60970BA92A9AC13523A1D79B4D5
                                                        SHA-256:4B8288C468BCFFF9B23B2A5FF38B58087CD8A6263315899DD3E249A3F7D4AB2D
                                                        SHA-512:A2F7627379F24FEC8DC2C472A9200F6736147172D36A77D71C7C1916C0F8BDD843E36E70D43B5DC5FAABAE8FDD01DD088D389D8AE56ED1F591101F09135D02F5
                                                        Malicious:false
                                                        Reputation:unknown
                                                        URL:https://www.google.com/async/newtab_promos
                                                        Preview:)]}'.{"update":{"promos":{}}}
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (17795)
                                                        Category:dropped
                                                        Size (bytes):18814
                                                        Entropy (8bit):5.703145608706498
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:8361872ED9A1760D2DC15A00227A9C82
                                                        SHA1:21D6F499413A66C89A438BCDBC2FC58350424705
                                                        SHA-256:4F87A189B3DAF495197FDBE684FF5D24A56FC71F4ABB3B8343C4195FF313B61B
                                                        SHA-512:3FE46CCCFC74EEEE49083F2345FA0DACC1E381B9CDB203C954339D0FE7AFEF14430722A35C737A67691EA1DA551B2BE9DD9766FB1037FF1193B6B00FABA789E7
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview://# sourceMappingURL=data:application/json;charset=utf-8;base64,eyJ2ZXJzaW9uIjogMywic291cmNlcyI6WyIiXSwic291cmNlc0NvbnRlbnQiOlsiICJdLCJuYW1lcyI6WyJjbG9zdXJlRHluYW1pY0J1dHRvbiJdLCJtYXBwaW5ncyI6IkFBQUE7QUFBQTtBQUFBO0FBQUE7QUFBQTtBQUFBO0FBQUEifQ==.(function(){var G=function(M,K){if(M=null,K=J.trustedTypes,!K||!K.createPolicy)return M;try{M=K.createPolicy("bg",{createHTML:m,createScript:m,createScriptURL:m})}catch(P){J.console&&J.console.error(P.message)}return M},m=function(M){return M},J=this||self;(0,eval)(function(M,K){return(K=G())&&M.eval(K.createScript("1"))===1?function(P){return K.createScript(P)}:function(P){return""+P}}(J)(Array(Math.random()*7824|0).join("\n")+['//# sourceMappingURL=data:application/json;charset=utf-8;base64,eyJ2ZXJzaW9uIjogMywic291cmNlcyI6WyIiXSwic291cmNlc0NvbnRlbnQiOlsiICJdLCJuYW1lcyI6WyJjbG9zdXJlRHluYW1pY0J1dHRvbiJdLCJtYXBwaW5ncyI6IkFBQUE7QUFBQTtBQUFBO0FBQUE7QUFBQTtBQUFBO0FBQUEifQ==',.'(function(){/*',.'',.' Copyright Google LLC',.' SPDX-License-Identifier:
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (65531)
                                                        Category:dropped
                                                        Size (bytes):112186
                                                        Entropy (8bit):5.527416895847508
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:A66A5B0608B17F59A8D2961B85F6B119
                                                        SHA1:4C1345EE4E8999153793D8AE862690036F4782C0
                                                        SHA-256:0F98E2F1F16FAA11B3286CDC991CF9705B9D70BA19F5E6143362021592C65F06
                                                        SHA-512:0A546F1BDBFDCF3F102981B06BD4A4E69E43D21C4159B9D716AA6CF2E54C8483C87897AB20E489C198936F77104F2DF6E49B0C9D0A347A1976CCEEE498844578
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:)]}'.22;["Pm4WZ6jdPIDji-gPoe-H0AE","2100"]c;[2,null,"0"]1b5ec;<div jsname="TYpc3" jscontroller="M6QgBb" data-gmc="CuUWIuIWaHR0cHM6Ly93d3cuZ3N0YXRpYy5jb20vXy9tc3MvYm9xLXNlYXJjaC9fL2pzL2s9Ym9xLXNlYXJjaC5WaWV3UGFja2FnZVNlcnZpY2UuZW4uMENxVEFEbkZqUDguZXM1Lk8vYW09QkhFSUlRQUFJQUFRQVExQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUNBQkFBQUFBQUFBQUFBUUFBQVVLMUdUQUFDQVRPaFBZQWNBQ0FCLUFEXzBCUFRfX3drQkFDQUFjQWc4dkFBQVJBVUFBQVFCTURvU0pKd3BFQUNNZ1FPZ0VSa0FBQUFCQUlnQUFBQUFBQUE0aElNQUFCaUJOQWdpQkJFdEFZZ0JBaVFBb0FGb1hHVkNpQkFBQkFJQUFFcUlISktHQVVqdVZnRnNVUWtFRUJRQThWRUNDQUFRR2lCQlFvQkFBQUFJZ1FBd0FBQVVpQUFBQUVRSEdKNEFBR0FPNU5CQUFyQkdBTUhBVEFDQUF3QUFBSUNUNFFFR0NBQUFBQUFBQUFBQUFBQUFFQ3J5SXFBaUFBQUFBQUFBQUFBQUFBQUFBQVJBa3cvZD0xL2RnPTAvcnM9QUg3LWZnN2VFSDBBRGNpenExZUo0cG5pVTNBWmxsWndDUS9lZT1BREpVR2U6blN6R007QUxlSmliOkI4Z0x3ZDtBZmVhUDpUa3JBamY7QWZrc3VjOmZCWmN1ZjtCTXhBR2M6RTViRnNlO0JnUzZtYjpmaWRqNWQ7Qmp3TWNlOmNYWDJXYjtDUnViV2M6R0dITVhjO0N4WEFXYjpZeVJMdmM7RFVMcUI6UktmRzVjO0RrazZnZTpKWm1XOWU7RHBjUjNkOnpMNzJ4ZjtFQUJTWjpNWFp0OWQ7RV
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 449028
                                                        Category:dropped
                                                        Size (bytes):122065
                                                        Entropy (8bit):7.997626422878093
                                                        Encrypted:true
                                                        SSDEEP:
                                                        MD5:AA8BC8C5EE9148CD994872B1438C5ED6
                                                        SHA1:955C9B9B66442B43A6B6290CF54E20BBCF144E18
                                                        SHA-256:66C62A7D3E076AAA538C7F589BB2661726F18EF9343DF6F06A714C37A04B7A61
                                                        SHA-512:288E76CC63F72885B47515716389CD03F840237C269CB03463348A576A565D12497AD2AD52430F1888FE0F2468C755DD43D08498CF11A6CB864301B7739B8569
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:...........{W.H.8....F3...a,..E.Yc..i......,...Y.J2.1......R.LU....s.AY..................Oix..).NK7...KW...........`....G/..=.....3....0*y..F.0......7.l.4..i)yd.Y...$..^.@....R......%o...J..gP.7..(.7.....0..V...j..#.Yi..,*.<z.c..s.0..I)b...x...&....R..8..G.ji......-......\.pL...0@/....0h,...[U.DZ..7.R.....}6./...o.....:.;w.jn.1....._..<*..b.{.... ..J.....9.8{.16eA...........:B#.K,N...8.T.....$.R..8...?.R.^3...n...$......K...N..p>.....<...........9.Y.......pj{.l.J..Y..W.........A.......:py.m...+..B........l..uO...v.G..q..VMw........`.<..;;.....{}0.US..O..m..v<x..%3..Tu`...U...;.~{....c.?....?...v ..-E..2......{+.?.....va8...i...8)W.....X..7... EC.h..e....D,.GA..W.Na!..T..$k..[..2..ry .1,D}LdY=..a.>|k...-OE/.A...}./'V/..7%#..o(a.S....e!P8..UI.#.n.{).@.I....u.va.....$z#...[*.BX......l.|.U.Q.....&s\.nT..........Z...LK.~.|."...D;U{6......T$.C..^|%...e..!.5..T.......R........hY...~T...Z.....s...xZ|.vcO..)+k..Up.)#O..!Qr.#ty..
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:Web Open Font Format (Version 2), TrueType, length 15436, version 1.0
                                                        Category:downloaded
                                                        Size (bytes):15436
                                                        Entropy (8bit):7.986311903040136
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:037D830416495DEF72B7881024C14B7B
                                                        SHA1:619389190B3CAFAFB5DB94113990350ACC8A0278
                                                        SHA-256:1D5B7C64458F4AF91DCFEE0354BE47ADDE1F739B5ADED03A7AB6068A1BB6CA97
                                                        SHA-512:C8D2808945A9BF2E6AD36C7749313467FF390F195448C326C4D4D7A4A635A11E2DDF4D0779BE2DB274F1D1D9D022B1F837294F1E12C9F87E3EAC8A95CFD8872F
                                                        Malicious:false
                                                        Reputation:unknown
                                                        URL:https://fonts.gstatic.com/s/roboto/v18/KFOlCnqEu92Fr1MmWUlfBBc4.woff2
                                                        Preview:wOF2......<L.......|..;..........................d..z..J.`..L.H..<........e..^...x.6.$..6. ..~. ..).7{...K.. .k~....".v(...[...RE.$..K..C,.'..{BK.C&.....'L!...DZ........+6.r...K..._...<..0..].V..........e.r(RN.43k;g`...?<?.......b..c.`.. .6..p...5.$zd.R%.........h....";.^WU.....H........S.j..M:..=K..\B.6"f......z.........$...%w.?$-....9.:u....u.I..Tt..s........lY...J.6oN..y...1,I.Yx..lu..}.e...Og..d...Xv.. ...iF.]..x.N..#%,y.&..,*$.^.n...\.K.P.J.x...H$..-.....p.....t.v...gD^....?..6o......e....,f.)..h...P...<.:.E...X..p....U.?.[m....l.Y.S..p..%..K.,U..3U.qFZo.*...U...3..3.]\.C.#..9T.8P`8......P...R;..r..J.*...u.j..^vnf.v.... .pw...Z.(.6%$U.[.|....!mU\}./..i,..7D........:t'.a;.W(.."G....q.-.Z......;J..0.&/.5. .T......w..;...t...H.t.<y ..@xx .JA.U.t..;g....@..... .t......<.5(^.|s..Ko.O.x.....!...........lHF............So{.%..V...7..aA$....C;,"(.J..EE..@.....vOB.,V..../....B#.r+./-t.(.N.S...R.Z$4...4i.c.}t...#3`.......s..;.O,.|..W.A.f.w.
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (866)
                                                        Category:dropped
                                                        Size (bytes):126879
                                                        Entropy (8bit):5.4899022846656775
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:C0034D4C71380C9E273955FA5C4DD506
                                                        SHA1:4296E3BA234D3F67B71DAAFDAC8D76FE6EB3234D
                                                        SHA-256:1C7D6E30BCD6D01A1D754E3CEE9B66E32A4490FA6E88DA497E4E2A45D573EB79
                                                        SHA-512:DE112221DF2B9CB1036EABF9C4593E01FDCD1C1F9157112BBC8D35842E8BEC331B9E835FB5C4FCCFCA05B1B9025FA6C27BA32C89F7A3952FD72627E77216DF74
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:this._s=this._s||{};(function(_){var window=this;.try{._.FIu=_.w("DpX64d",[_.Go]);.}catch(e){_._DumpException(e)}.try{._.nvi=function(a,b){return _.cj(a,1,_.Nrb,b)};_.ovi=function(a,b){return a.Od.Ec(_.gsb.getInstance(b)).then(c=>{if(_.qi(c,1)!==1)throw Error("bp`"+_.qi(c,1));return c})};_.OQ=function(a,b,c,d,e){const f=new _.esb,g=new _.du,h=new _.bu;_.asb(_.au(h,b),e==null?void 0:e.zqf);h.setValue(c);_.cu(g,h).wp(d);_.csb(f,g);(e==null?void 0:e.R8b)!==void 0&&_.dsb(f,e==null?void 0:e.R8b);return _.ovi(a,f)};._.pvi=function(a,b,c){const d=new _.esb,e=new _.du,f=new _.bu;_.asb(_.au(f,b));_.Tb(_.cu(e,f).wp(c),_.Zrb,4,void 0);_.csb(d,e);return _.ovi(a,d)};_.PQ=class{constructor(a=null){this.Od=a}};.}catch(e){_._DumpException(e)}.try{._.u("DpX64d");._.bLv=class extends _.co{static Ra(){return{service:{Me:_.wr}}}constructor(a){super(a.La);this.Od=a.service.Me}AEa(){const [a,b]=this.Tta(!0);return _.OQ(new _.PQ(this.Od),a,b,89,{R8b:!0})}Tta(a){const b=_.fu(new _.$t,121);a=_.nvi(new _.Zt,a);
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:GIF image data, version 89a, 24 x 24
                                                        Category:dropped
                                                        Size (bytes):4465
                                                        Entropy (8bit):7.666715222755507
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:6BCD2C5891A5E617898FF487DF0D2082
                                                        SHA1:A2242A3F396F1FEAF7AEABD40B48122D070F125A
                                                        SHA-256:018716003EA7214D7F973B17997ACEB69CAFEE5C09C96C23851AF2D291522ED7
                                                        SHA-512:A5E78F13A46F88779D91BF6683DB4963D77AA3E0D73CB700468FC0291D60EE8DFD30E8CC2A81EF38A8E6373BB3A7144CF1B4B5BAA5269555957B79D69929CDE0
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:GIF89a.......rX.c.....R.T.E....S?..IHt....5..N>...k:&..=..}...2.5.KN.6.n;....x..F.f@.L@o...;.[x.ps...I....},._tg...O'....o.P..K..Er5.YS..e....Q.NC..b..TH....Uz6v.;U.d.z.R..!.a...]....d'.R.RW.Se*.......;..H{.Si.QH...g$Um.%n.%.x...*_.9~.q.......6....L.65.\...A%...<2..J..]...s.....T.a...|...K?.....I....F>2...}.8..-.p..s..c.L5.w9...OW...:..@......xA.^...h$u..z..qBYY.9w..i...[92..g........#.yK..C..)..pu..M>.AR.I>9~...M4x..D9%j..`..1)...$.g.....n7}......9......._A..{..[..!.cE........or.y..PGG...OD%.hs...........`\...........K@5.x..U.C3=.Pfk...JO.P.>L..M0....\..N...@u...7w...K...x.Mo.St.....O.w=.T`..A.P.S={..k....I.n;..V?..@3.tR.Ii.Uz.Rj.Sq ....>..M......c.8....A._.0....p..RD....fH..a...._9...ZC,.........fA..Q.2:...K?8~.;...J>..M..`...!..NETSCAPE2.0.....!..XMP DataXMP<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.3-c011 66.145661, 2012/02/06-14:56:27 "> <rdf:RDF xmlns:rdf="ht
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:GIF image data, version 89a, 352 x 3
                                                        Category:downloaded
                                                        Size (bytes):2672
                                                        Entropy (8bit):6.640973516071413
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:166DE53471265253AB3A456DEFE6DA23
                                                        SHA1:17C6DF4D7CCF1FA2C9EFD716FBAE0FC2C71C8D6D
                                                        SHA-256:A46201581A7C7C667FD42787CD1E9ADF2F6BF809EFB7596E61A03E8DBA9ADA13
                                                        SHA-512:80978C1D262BC225A8BA1758DF546E27B5BE8D84CBCF7E6044910E5E05E04AFFEFEC3C0DA0818145EB8A917E1A8D90F4BAC833B64A1F6DE97AD3D5FC80A02308
                                                        Malicious:false
                                                        Reputation:unknown
                                                        URL:https://aadcdn.msauth.net/shared/1.0/content/images/marching_ants_white_8257b0707cbe1d0bd2661b80068676fe.gif
                                                        Preview:GIF89a`............!..NETSCAPE2.0.....!.......,....`.....6......P.l.......H....I..:qJ......k....`BY..L*..&...!.......,....0.............<....[.\K8j.tr.g..!.......,....3............^;.*..\UK.]\.%.V.c...!.......,....7........`....lo...[.a..*Rw~i...!.......,....;........h.....l.G-.[K.,_XA]..'g..!.......,....?........i.....g....Z.}..)..u...F..!.......,....C...............P.,nt^.i....Xq...i..!.......,....F...........{^b....n.y..i...\C.-...!.......,....H..............R...o....h.xV!.z#...!.......,"...L.............r.jY..w~aP(.......[i...!.......,(...N.............r....w.aP.j.'.)Y..S..!.......,....H.........`......hew..9`.%z.xVeS..!.......,5...A.........`...\m.Vmtzw.}.d.%...Q..!.......,9...=.........h......3S..s.-W8m...Q..!.......,A...5.........h.....N...:..!..U..!.......,H.............h....M.x...f.i.4..!.......,O...'.........i...tp......(..!.......,X.............j...@.x....!.......,].............j..L..3em..!.......,e.............`......!.......,n..............{i..!..
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
                                                        Category:dropped
                                                        Size (bytes):5430
                                                        Entropy (8bit):3.6534652184263736
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:F3418A443E7D841097C714D69EC4BCB8
                                                        SHA1:49263695F6B0CDD72F45CF1B775E660FDC36C606
                                                        SHA-256:6DA5620880159634213E197FAFCA1DDE0272153BE3E4590818533FAB8D040770
                                                        SHA-512:82D017C4B7EC8E0C46E8B75DA0CA6A52FD8BCE7FCF4E556CBDF16B49FC81BE9953FE7E25A05F63ECD41C7272E8BB0A9FD9AEDF0AC06CB6032330B096B3702563
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:............ .h...&... .... .........(....... ..... ............................................0...................................................................................................................................v.].X.:.X.:.r.Y........................................q.X.S.4.S.4.S.4.S.4.S.4.S.4...X....................0........q.W.S.4.X.:.................J...A...g.........................K.H.V.8..........................F..B.....................,.......................................B..............................................B..B..B..B..B...u..........................................B..B..B..B..B...{.................5.......k...........................................................7R..8F.................................................2........Vb..5C..;I..................R^.....................0................Xc..5C..5C..5C..5C..5C..5C..lv..........................................]i..<J..:G..Zf....................................................
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (2966)
                                                        Category:downloaded
                                                        Size (bytes):2971
                                                        Entropy (8bit):5.832076583077795
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:CD07B220B2E93B4B69EF8D4126387DAC
                                                        SHA1:AD7559FED3579A0E00A525115BA7783716A4194D
                                                        SHA-256:A08CB5CBF42380F56736AC29B238EA4A86C79762AE1E60CC555446BEB7450FA5
                                                        SHA-512:FC562C91ABA9ACA7AD3CF6AF2DFE21F9A5609116A097B4ED4670AC96FD86749E713C3F5F5568E7F28C458256D3C96C5E079EF4D31CCC0C4003A16A691DFACB4C
                                                        Malicious:false
                                                        Reputation:unknown
                                                        URL:https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
                                                        Preview:)]}'.["",["xrp price","gen g vs flyquest","night sky comet tonight","fc barcelona vs sevilla player ratings","the lincoln lawyer season 3","nvidia stock price","hurricane tropical storm oscar","lonnie walker celtics"],["","","","","","","",""],[],{"google:clientdata":{"bpc":false,"tlw":false},"google:groupsinfo":"ChgIkk4SEwoRVHJlbmRpbmcgc2VhcmNoZXM\u003d","google:suggestdetail":[{"zl":10002},{"zl":10002},{"zl":10002},{"zl":10002},{"zl":10002},{"zl":10002},{"zl":10002},{"google:entityinfo":"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
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:SVG Scalable Vector Graphics image
                                                        Category:downloaded
                                                        Size (bytes):611
                                                        Entropy (8bit):4.918393991458898
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:FDCCEBFA37374F47C7DB9D31714AD6BB
                                                        SHA1:0020EF09D5BB52460B5D0239BEF9C2F2CF9EC9FA
                                                        SHA-256:526AAAFB82827920E07B5CE784660FAB5F01FB62F3B63968EC34317AECAA5CCA
                                                        SHA-512:D265EE577D64E9682698F021A5E2158CF5EA0A6C887E69A90F72C45E29B9F8A3ED436F2D4DA6B4F3436EF59FF306348EC57FFD7FEFDEC969909E089E03B59528
                                                        Malicious:false
                                                        Reputation:unknown
                                                        URL:https://fonts.gstatic.com/s/i/productlogos/youtube/v9/192px.svg
                                                        Preview:<svg xmlns="http://www.w3.org/2000/svg" enable-background="new 0 0 192 192" height="192" viewBox="0 0 192 192" width="192"><rect fill="none" height="192" width="192"/><g><g><path d="M177.44,55.09c-1.96-7.31-7.72-13.08-15.03-15.03C149.17,36.5,96,36.5,96,36.5s-53.17,0-66.41,3.56 c-7.31,1.96-13.08,7.72-15.03,15.03C11,68.33,11,96,11,96s0,27.67,3.56,40.91c1.96,7.31,7.72,13.08,15.03,15.03 C42.83,155.5,96,155.5,96,155.5s53.17,0,66.41-3.56c7.31-1.96,13.08-7.72,15.03-15.03C181,123.67,181,96,181,96 S181,68.33,177.44,55.09z" fill="#FF0000"/><polygon fill="#FFFFFF" points="79,121.5 123.17,96 79,70.5"/></g></g></svg>
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (5718), with no line terminators
                                                        Category:downloaded
                                                        Size (bytes):5718
                                                        Entropy (8bit):5.262905360239653
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:383BC2BEA4266A833F7EDBBA4A90C368
                                                        SHA1:CB8591B26DA23EB83ECD8629372A1480E6D04EFB
                                                        SHA-256:7CE935D097B4959A10EF7B1FE8E25B2A68E14C0D7F1BDAD27F89661BAA3325CB
                                                        SHA-512:9E25CF0EDB455235EAC92E6BAAFABF4F78C3F21B98A024E9A62E5415776B5AB996743C71B495F2A183BA4F5F6296CFF1C904679F14D9E91A71575E47D3938402
                                                        Malicious:false
                                                        Reputation:unknown
                                                        URL:"https://www.gstatic.com/og/_/ss/k=og.asy.C3Z1AMB4Z7A.L.W.O/m=ll_tdm,adcgm3,ll_fw/excm=/d=1/ed=1/ct=zgms/rs=AA2YrTv1pQRYs1hEoqDCY_LNxgozyOu3og"
                                                        Preview:.gb_zc{background:rgba(60,64,67,.9);-webkit-border-radius:4px;border-radius:4px;color:#fff;font:500 12px "Roboto",arial,sans-serif;letter-spacing:.8px;line-height:16px;margin-top:4px;min-height:14px;padding:4px 8px;position:absolute;-webkit-user-select:text;-webkit-user-select:text;z-index:1000;-webkit-font-smoothing:antialiased}.gb_Ac{text-align:left}.gb_Ac>*{color:#bdc1c6;line-height:16px}.gb_Ac div:first-child{color:white}.gb_A{-webkit-border-radius:50%;border-radius:50%}.gb_A::before{background:#444746;background:var(--gm3-sys-color-on-surface-variant,#444746);-webkit-border-radius:100px;border-radius:100px;content:"";height:100%;left:0;opacity:0;position:absolute;top:0;-webkit-transition:opacity .3s ease-out;-webkit-transition:opacity .3s ease-out;transition:opacity .3s ease-out;width:100%}.gb_F .gb_A::before{background:#c4c7c5;background:var(--gm3-sys-color-on-surface-variant,#c4c7c5)}.gb_A:hover{background-color:rgba(60,64,67,.08)}.gb_A:focus::before,.gb_A:focus:hover::before{op
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 3651
                                                        Category:downloaded
                                                        Size (bytes):1435
                                                        Entropy (8bit):7.8613342322590265
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:9F368BC4580FED907775F31C6B26D6CF
                                                        SHA1:E393A40B3E337F43057EEE3DE189F197AB056451
                                                        SHA-256:7ECBBA946C099539C3D9C03F4B6804958900E5B90D48336EEA7E5A2ED050FA36
                                                        SHA-512:0023B04D1EEC26719363AED57C95C1A91244C5AFF0BB53091938798FB16E230680E1F972D166B633C1D2B314B34FE0B9D7C18442410DB7DD6024E279AAFD61B0
                                                        Malicious:false
                                                        Reputation:unknown
                                                        URL:https://aadcdn.msauth.net/shared/1.0/content/images/microsoft_logo_564db913a7fa0ca42727161c6d031bef.svg
                                                        Preview:...........WMo.7..+..uV.HJ...{..........&..v...(Q.F.....aW.Q.|..~.|{~...b{8...zv.....8|...b.gxb.y{.x<\lS...p...p..l7...o.}.v.....t.........r..r.|9?.......HP...r.4.aGA.j....7.!....K.n.B.Z.C.]....kj..A..p...xI...b..I!K..><.B..O....#...$.]h.bU.;.Y...).r.u....g*.-w.2..vPh....q....4_..N\..@y).t{.2pj.f..4h.....NC.....x.R..P..9.....".4.`%N..&...a.@.......fS)A4.F..8e9KHE....8d.CR.K..g..Q.......a....f.....dg*N.N.k..#w..........,.".%..I.q.Y.R]..7.!.:.Ux...T.qI..{..,b..2..B...Bh...[o..[4....dZ.z.!.l....E.9$..Y.'...M.,p..$..8Ns3.B.....{.....H..Se3....%.Ly...VP{.Bh.D.+....p..(..`....t....U.e....2......j...%..0.f<...q...B.k..N....03...8....l.....bS...vh..8..Q..LWXW..C.......3..Pr.V.l...^=VX\,d9f.Y;1!w.d,.qvs....f*;.....Zhrr.,.U....6.Y....+Zd.*R...but....".....4.L...z........L.Q......)....,.].Y.&....*ZsIVG.^...#...e..r....Z..F..c..... .QDCmV..1.~...J9..b_Oov\..X.R..._.TqH.q.5G.0{ZphQ..k...s..\.../.Dp..d`#......8.#Y...Mb.j.Q......=n4.c....p.[.SI.....0.N.
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (4047), with no line terminators
                                                        Category:downloaded
                                                        Size (bytes):4047
                                                        Entropy (8bit):5.534384437106259
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:AF48F04773891DDF399D6B831213BB6D
                                                        SHA1:6ACC8F319D52DF9C33E0849604C94B7A43C5EFF0
                                                        SHA-256:2CB7A79E4960F2FE53DF6FDBC1E4A6C59D851C083939090ECAD77445C1F1CEFD
                                                        SHA-512:7BCB01B20191F1473331520444599F59927E27771385D4A0346BF1B9DAC645A1312C6ECD45FEEFE7FC7AA808C2AB11E7AC23C043C7AB4A6BE4E540F0510C3166
                                                        Malicious:false
                                                        Reputation:unknown
                                                        URL:"https://www.google.com/xjs/_/ss/k=xjs.s.W7P_Qx_hvwA.L.B1.O/am=QOoQIAQAAAQAMdAAAgAAAAAAAAAAAAAAAAAAAAAkAAAABAAARAAAIAAAIgAAZRIAAJAXAABgAwACAAAfAMABAYABAAAAAAAACQAAAAAAgAAAFQIAAAAAACAgAAAQQQAAQCEAAAAAIAAAAAYAAACAECAAAAEMgBAACCABASgIQD8KAQAAgAEAAISAMIBhAIIKAAZwCgAAAAAAAAAAACAACAEAAAABAQBAgAAAPQIBYAAAaUQAgCAAIEARAAgAAIAAAAAIIBAAADETAAdkAAIAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgAAAAAAAAAAAAAAAAAAAAAAAg/d=1/ed=1/br=1/rs=ACT90oHJTmB2SbgyZ9XwfCjUx8ltFla6LQ/m=X3N0Bf,attn,cdos,gwc,hsm,jsa,mb4ZUb,cEt90b,SNUn3,qddgKe,sTsDMc,dtl0hd,eHDfl,d,csi"
                                                        Preview::root{--COEmY:#1f1f1f;--xhUGwc:#fff}:root{--vZe0jb:#a8c7fa;--nwXobb:#638ed4;--VuZXBd:#001d35;--uLz37c:#545d7e;--jINu6c:#001d35;--TyVYld:#0b57d0;--ZEpPmd:#c3d9fb;--QWaaaf:#638ed4;--DEeStf:#f5f8ff;--TSWZIb:#e5edff;--BRLwE:#d3e3fd;--gS5jXb:#dadce0;--Aqn7xd:#d2d2d2;--EpFNW:#fff;--IXoxUe:#5e5e5e;--bbQxAb:#474747;--YLNNHc:#1f1f1f;--TMYS9:#0b57d0;--JKqx2:#1a0dab;--rrJJUc:#0b57d0;--mXZkqc:#d2d2d2;--Nsm0ce:#0b57d0;--XKMDxc:#f3f5f6;--aYn2S:#f3f5f6;--Lm570b:#dee1e3}.zJUuqf{margin-bottom:4px}.AB4Wff{margin-left:16px}.OhScic{margin:0px}.v0rrvd{padding-bottom:16px}.zsYMMe{padding:0px}.QyJI3d{background-color:var(--xhUGwc);color:#666;box-shadow:0 4px 16px rgba(0,0,0,0.2)}.oQcPt{background-color:var(--xhUGwc)}.QyJI3d{border:1px solid rgba(0,0,0,.2);position:absolute;z-index:9120}.nFdFHf{animation:g-bubble-show .2s forwards}.bE3Kif{animation:g-bubble-hide .2s forwards}@keyframes g-bubble-show{from{opacity:0}to{opacity:1}}@keyframes g-bubble-hide{from{opacity:1}to{opacity:0}}.QyJI3d.QJnoze{border-radius
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (65536), with no line terminators
                                                        Category:downloaded
                                                        Size (bytes):232394
                                                        Entropy (8bit):5.54543362321178
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:AF8D946B64D139A380CF3A1C27BDBEB0
                                                        SHA1:C76845B6FFEAF14450795C550260EB618ABD60AB
                                                        SHA-256:37619B16288166CC76403F0B7DF6586349B2D5628DE00D5850C815D019B17904
                                                        SHA-512:C5CFB514F993310676E834C8A5477576BD57C82A8665387F9909BA0D4C3C2DE693E738ACAA74E7B4CA20894EA2FEEA5CF9A2428767D03FE1DE9C84538FDC3EE9
                                                        Malicious:false
                                                        Reputation:unknown
                                                        URL:https://r4.res.office365.com/owa/prem/15.20.8069.29/resources/styles/0/boot.worldwide.mouse.css
                                                        Preview:.feedbackList{-webkit-animation-duration:.17s;-moz-animation-duration:.17s;animation-duration:.17s;-webkit-animation-name:feedbackListFrames;-moz-animation-name:feedbackListFrames;animation-name:feedbackListFrames;-webkit-animation-fill-mode:both;-moz-animation-fill-mode:both;animation-fill-mode:both}@-webkit-keyframes feedbackListFrames{from{-webkit-transform:scale(1,1);transform:scale(1,1);-webkit-animation-timing-function:cubic-bezier(.33,0,.67,1);animation-timing-function:cubic-bezier(.33,0,.67,1)}to{-webkit-transform:scale(1.03,1.03);transform:scale(1.03,1.03)}}@-moz-keyframes feedbackListFrames{from{-moz-transform:scale(1,1);transform:scale(1,1);-moz-animation-timing-function:cubic-bezier(.33,0,.67,1);animation-timing-function:cubic-bezier(.33,0,.67,1)}to{-moz-transform:scale(1.03,1.03);transform:scale(1.03,1.03)}}@keyframes feedbackListFrames{from{-webkit-transform:scale(1,1);-moz-transform:scale(1,1);transform:scale(1,1);-webkit-animation-timing-function:cubic-bezier(.33,0,.67,
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (65339), with CRLF line terminators
                                                        Category:downloaded
                                                        Size (bytes):660449
                                                        Entropy (8bit):5.4121922690110535
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:D9E3D2CE0228D2A5079478AAE5759698
                                                        SHA1:412F45951C6AEDA5F3DF2C52533171FC7BDD5961
                                                        SHA-256:7041D585609800051E4F451792AEC2B8BD06A4F2D29ED6F5AD8841AAE5107502
                                                        SHA-512:06700C65BEF4002EBFBFF9D856C12E8D71F408BACA2D2103DDE1C28319B6BD3859FA9D289D8AEB6DD484E802040F6EE537F31F97B4B60A6B120A6882C992207A
                                                        Malicious:false
                                                        Reputation:unknown
                                                        URL:https://r4.res.office365.com/owa/prem/15.20.8069.29/scripts/boot.worldwide.3.mouse.js
                                                        Preview:.window.scriptsLoaded = window.scriptsLoaded || {}; window.scriptProcessStart = window.scriptProcessStart || {}; window.scriptProcessStart['boot.worldwide.3.mouse.js'] = (new Date()).getTime();..;_n.a.jR=function(n){return n.dS()};_n.a.jZ=function(n){return n.eh()};_n.a.jP=function(n){return n.cC()};_n.a.jQ=function(n){return n.ca()};_n.a.hZ=function(n){return n.dO};_n.a.jU=function(n){return n.ed()};_n.a.jT=function(n){return n.ea()};_n.a.kb=function(n){return n.ej()};_n.a.hM=function(n){return 300};_n.a.fh=function(n){return n.V};_n.a.jV=function(n){return n.bI()};_n.a.ie=function(n){return n.mh()};_n.a.km=function(n){return n.bl()};_n.a.ka=function(n){return n.ei()};_n.a.ko=function(n){return n.cV()};_n.a.eX=function(n){return _y.E.isInstanceOfType(n)?n.y:null};_n.a.jN=function(n){return n.c()};_n.a.gm=function(n){return n.b()};_n.a.jM=function(n){return n.b()};_n.a.ib=function(n){return n.jM()};_n.a.iq=function(n){return n.bG};_n.a.iX=function(n){return _n.V.isInstanceOfType(n)?n
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (2667)
                                                        Category:downloaded
                                                        Size (bytes):204055
                                                        Entropy (8bit):5.522557394187573
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:B90BB5EDE79013B8277FA7CE09787426
                                                        SHA1:517B8804482D24225712DF069C7B056D0DB92350
                                                        SHA-256:34785DB66153C0CC5998DD69B2166783807309456A8DA45BA450B09BECB932FB
                                                        SHA-512:43900DBB199813C0779201CAB5C7C26557B43448F82C8773449CCD2896DEEC8278DC1C7D4B608A65B7C5E8143E20CAB26D50287315B948B55EA905F6A5BB81B1
                                                        Malicious:false
                                                        Reputation:unknown
                                                        URL:"https://www.gstatic.com/og/_/js/k=og.asy.en_US.Yg15GxQFKh8.2019.O/rt=j/m=_ac,_awd,ada,lldp,qads/exm=/d=1/ed=1/rs=AA2YrTtmZck_SoylR5Fu6522xTzQZuDhVw"
                                                        Preview:this.gbar_=this.gbar_||{};(function(_){var window=this;.try{._._F_toggles_initialize=function(a){(typeof globalThis!=="undefined"?globalThis:typeof self!=="undefined"?self:this)._F_toggles=a||[]};(0,_._F_toggles_initialize)([]);.var aa,ba,da,ea;aa=typeof Object.defineProperties=="function"?Object.defineProperty:function(a,b,c){if(a==Array.prototype||a==Object.prototype)return a;a[b]=c.value;return a};ba=function(a){a=["object"==typeof globalThis&&globalThis,a,"object"==typeof window&&window,"object"==typeof self&&self,"object"==typeof global&&global];for(var b=0;b<a.length;++b){var c=a[b];if(c&&c.Math==Math)return c}throw Error("a");};da=ba(this);.ea=function(a,b){if(b)a:{var c=da;a=a.split(".");for(var d=0;d<a.length-1;d++){var e=a[d];if(!(e in c))break a;c=c[e]}a=a[a.length-1];d=c[a];b=b(d);b!=d&&b!=null&&aa(c,a,{configurable:!0,writable:!0,value:b})}};ea("Symbol.dispose",function(a){return a?a:Symbol("b")});ea("globalThis",function(a){return a||da});.ea("Promise.prototype.finally",f
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:RIFF (little-endian) data, Web/P image
                                                        Category:downloaded
                                                        Size (bytes):5494
                                                        Entropy (8bit):7.943800412453245
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:1E4ADFCE09B0D0C2E9DB0D9144ABAFE9
                                                        SHA1:2058B270F22F40FB4B1EFD90CBF84BCF156564A4
                                                        SHA-256:460997174B5C47F2245ACB674BD5B1D0092272C4698AE83E504FC8CF06E1260B
                                                        SHA-512:B537A3FAAEA9B02D8AD75DA0F22CF9E2A16F308E7A24440DE20F25FC300486739D0F5410DDB396B253F208DF76E1889BB1E3A6BA2DB2D8D78AC0E23090B35204
                                                        Malicious:false
                                                        Reputation:unknown
                                                        URL:https://www.google.com/images/nav_logo321.webp
                                                        Preview:RIFFn...WEBPVP8La.../.@f..`..#.......1..[3.jl.....=.c;...j.h7/r..i.3.t.%.r..+G......Kz...c..N...$.?..4..W....U..y.....}8... .... ..@...!....... ........9..` ,...N....P&..B.!......(<.r..9.2....e.."o..A..B.f...o..:..q...Wx.EP.. ..m{.m..oV..m...l....$....Tu..'.._...6V.........pZ.I.w.}...y.$cM...R.S..D.A../....D.n.....'"u.5.....]2BR.].p..*...lRrR".....3Bbb.HC*..!c...W.C.4..UP.{...;..-84a.L6.M`G..X.'..;...b..*'..H.#.#...2.....mG.................$ER.1>.......][.F...J.......XkKb.....>d.....K...S... ......PF!ICFA.VrN>.Q..+.P..=..............t...@5.Mf...m....0....-,...v.F.....`..G.@..#A.d[Vs.....$BX|.)Y.....`.[.m..m.m.v..m.m..$I...kcw..n.m..D=y?z.gveS.H*|....3s..]....T..pu.....:.m.D.........D...A.]..ZsE..E.R.r\...-.C...r.*..*.=m.>.(.l....u.*D-.n.lF.l..B#I.$l..}...=o...H..I..^Zdx.........@.g.m.m.m.m.m..F.D.FgG3..?..HS....R...T5)J.'.'...._np...6....'...k.k...o.7o.?.V.K.k.Y..p./.......VQ...?t....P...0M.#...6H.z..pH..Ga.E...0.b.{..0d.W7d.T=.<.'
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (65531)
                                                        Category:downloaded
                                                        Size (bytes):133802
                                                        Entropy (8bit):5.434594540787029
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:813190DF71C85BCB203C0F854F827E0D
                                                        SHA1:F6C2BD753838DF3F6E091D4D9D29D5942FC7AB53
                                                        SHA-256:9E178B16F152B456E83BAA421A663A7E4317C3744106BC9649CDD58653F416AE
                                                        SHA-512:5BF81BBD046B1805B4AB5FD9304D6FB03864DAB02C731975651C31ABDB0352C4478B204BBF5CF1D2D3D04CF2C16944B1274FD8894CE9037786977D26DBC873BC
                                                        Malicious:false
                                                        Reputation:unknown
                                                        URL:https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
                                                        Preview:)]}'.{"update":{"language_code":"en-US","ogb":{"html":{"private_do_not_access_or_else_safe_html_wrapped_value":"\u003cheader class\u003d\"gb_Ea gb_1d gb_Pe gb_pd\" id\u003d\"gb\" role\u003d\"banner\" style\u003d\"background-color:transparent\"\u003e\u003cdiv class\u003d\"gb_Od\"\u003e\u003c\/div\u003e\u003cdiv class\u003d\"gb_jd gb_nd gb_Ed gb_kd\"\u003e\u003cdiv class\u003d\"gb_vd gb_qd\"\u003e\u003cdiv class\u003d\"gb_Jc gb_Q\" aria-expanded\u003d\"false\" aria-label\u003d\"Main menu\" role\u003d\"button\" tabindex\u003d\"0\"\u003e\u003csvg focusable\u003d\"false\" viewbox\u003d\"0 0 24 24\"\u003e\u003cpath d\u003d\"M3 18h18v-2H3v2zm0-5h18v-2H3v2zm0-7v2h18V6H3z\"\u003e\u003c\/path\u003e\u003c\/svg\u003e\u003c\/div\u003e\u003cdiv class\u003d\"gb_Jc gb_Mc gb_Q\" aria-label\u003d\"Go back\" title\u003d\"Go back\" role\u003d\"button\" tabindex\u003d\"0\"\u003e\u003csvg focusable\u003d\"false\" viewbox\u003d\"0 0 24 24\"\u003e\u003cpath d\u003d\"M20 11H7.83l5.59-5.59L12 4l-8 8 8 8 1.41-1.
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (8333)
                                                        Category:downloaded
                                                        Size (bytes):8338
                                                        Entropy (8bit):6.0164399195988025
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:893938FA5DA95E3F800098059614BB0F
                                                        SHA1:FDD3307DDE2C6E5EEC93600E73189FEBA3E83CCB
                                                        SHA-256:BE517D713CC22F6A9BB27CF1A3935B725A4D2AEEADA210162B1E4560E47EE080
                                                        SHA-512:D815020C0771E54FFF0C096F1B80662FF80E80678275125B22452F805D71DA42A1FAF55A3519134C7B72141598B05B14B65694A0D703FDAB47FAF0915C13638C
                                                        Malicious:false
                                                        Reputation:unknown
                                                        URL:https://www.google.com/async/bgasy?ei=Nm4WZ4CzKZuGxc8PxZWlgQc&opi=89978449&yv=3&cs=0&async=_fmt:jspb
                                                        Preview:)]}'.{"bgasy":["https://www.google.com/js/bg/T4ehibPa9JUZf9vmhP9dJKVvxx9KuzuDQ8QZX_MTths.js","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
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:Web Open Font Format (Version 2), TrueType, length 24652, version 1.0
                                                        Category:downloaded
                                                        Size (bytes):24652
                                                        Entropy (8bit):7.991535968589447
                                                        Encrypted:true
                                                        SSDEEP:
                                                        MD5:87C2B09A983584B04A63F3FF44064D64
                                                        SHA1:8796D5EF1AD1196309EF582CECEF3AB95DB27043
                                                        SHA-256:D4A4A801C412A8324A19F21511A7880815B373628E66016BC1785A5A85E0AFB0
                                                        SHA-512:DF1F0D6F5F53306887B0B16364651BDA9CDC28B8EA74B2D46B2530C6772A724422B33BBDCD7C33D724D2FD4A973E1E9DBC4B654C9C53981386C341620C337067
                                                        Malicious:false
                                                        Reputation:unknown
                                                        URL:https://fonts.gstatic.com/s/googlesans/v29/4UaRrENHsxJlGDuGo1OIlJfC6mGS6vhAK1YobMu2vgCI.woff2
                                                        Preview:wOF2......`L.........._...............................b...?HVAR.X.`?STAT~'..../<.....D..i..$.0..".6.$..@. ..T. ........v .u'.(.n[...68...^...VQZQ...OHPc..m...jM....5.FZ1.e..H.D.....~.* ...>].N....6..4.....rG...$Sw....u........yD5LY;E...w5...[....1...i.$.<.E.\|.~....G....[.G..gZ...i_\.\......O.#..1...t.....%.rI.t1..!.t..J(-.j..B+........t,....A;..kG..p?.....I#6......#m.;.S..^u.4.Q....mI<....}........F&.p.r.H2...Y........o.xc.......>...!...T...e.7..|Z.i.R[Y.zC.Al..wb.?..9.. =..P(..v....9`.pxI..O9.}2.,..H...........^.q..c.....f..tVU.$.x....s....%hy.......fAKj..C....WP.....o...!.:).r......Al...>..G....G.....W...a.i}...0O..v...=^.D.x...\ST..U.4...#Pvv...GJ...0.W9.n.J..=.v......5A8&}.......y\-.t.......K?...)]........`&@.7.O3g_.4z.9H...C.&...24K......}.Z....h(T.._...&}.l.'....!.B<.?...D...e. i7 R......D:....@Jer"5Q.D{..Mv...&&.)sC..l........5}.."...S..v.A1.....$..9.....e|z.....\..J....%#O...-......m.P2R2T...T.#.....0.y.,9...M1..!..N..g.>...SW.....1"b
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (1302)
                                                        Category:downloaded
                                                        Size (bytes):117949
                                                        Entropy (8bit):5.4843553913091005
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:A5D33473ED0997C008D1C053E0773EBE
                                                        SHA1:FEB4CB89145601A0141CC5869BEDF9AE7CD5CB80
                                                        SHA-256:14C27BB0224FCF89A43B444B427DABE3D0AF184CAA7B6B4990CE228C51AE01C1
                                                        SHA-512:3C0A48F9FA05469F950D9A268F1B3E9285A783A555EE597A2E203B688EB0FBCAEA3F4DE9BC8F5381C661007D0C6C4AFA70C19B7826D69A0E2A914A55973D14BD
                                                        Malicious:false
                                                        Reputation:unknown
                                                        URL:"https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.SGzW6IeCawI.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/am=AACA/rs=AHpOoo-5biO9jua-6zCEovdoDJ8SLzd6sw/cb=gapi.loaded_0"
                                                        Preview:gapi.loaded_0(function(_){var window=this;._._F_toggles_initialize=function(a){(typeof globalThis!=="undefined"?globalThis:typeof self!=="undefined"?self:this)._F_toggles=a||[]};(0,_._F_toggles_initialize)([0x800000, ]);.var da,ea,ha,na,oa,sa,ta,wa;da=function(a){var b=0;return function(){return b<a.length?{done:!1,value:a[b++]}:{done:!0}}};ea=typeof Object.defineProperties=="function"?Object.defineProperty:function(a,b,c){if(a==Array.prototype||a==Object.prototype)return a;a[b]=c.value;return a};.ha=function(a){a=["object"==typeof globalThis&&globalThis,a,"object"==typeof window&&window,"object"==typeof self&&self,"object"==typeof global&&global];for(var b=0;b<a.length;++b){var c=a[b];if(c&&c.Math==Math)return c}throw Error("a");};_.la=ha(this);na=function(a,b){if(b)a:{var c=_.la;a=a.split(".");for(var d=0;d<a.length-1;d++){var e=a[d];if(!(e in c))break a;c=c[e]}a=a[a.length-1];d=c[a];b=b(d);b!=d&&b!=null&&ea(c,a,{configurable:!0,writable:!0,value:b})}};.na("Symbol",function(a){if(a)r
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:HTML document, ASCII text, with very long lines (3477), with CRLF line terminators
                                                        Category:downloaded
                                                        Size (bytes):3479
                                                        Entropy (8bit):5.124552535308038
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:377EEA3FF78B601B80366410D0F017B2
                                                        SHA1:1E0E60BEE689502BB662CBE5C07B75D1856E43B0
                                                        SHA-256:B917967BD47F2B7FB9452CEA4DDCDEE0FF380104DC51A97D35CF2ED07E9996A3
                                                        SHA-512:0B9910932249AC30C80493B817FA111CCA6ABBD270B439F2838062680497B87969ACCFCE9F0BA57FA41C834B173858504A0F9512724C83D9993B1EEDFB5D8EFB
                                                        Malicious:false
                                                        Reputation:unknown
                                                        URL:https://live.ftlivedocsportal.com/Me.htm?v=3
                                                        Preview:<script type="text/javascript">!function(t,e){for(var s in e)t[s]=e[s]}(this,function(t){function e(n){if(s[n])return s[n].exports;var i=s[n]={exports:{},id:n,loaded:!1};return t[n].call(i.exports,i,i.exports,e),i.loaded=!0,i.exports}var s={};return e.m=t,e.c=s,e.p="",e(0)}([function(t,e){function s(t){for(var e=f[S],s=0,n=e.length;s<n;++s)if(e[s]===t)return!0;return!1}function n(t){if(!t)return null;for(var e=t+"=",s=document.cookie.split(";"),n=0,i=s.length;n<i;n++){var a=s[n].replace(/^\s*(\w+)\s*=\s*/,"$1=").replace(/(\s+$)/,"");if(0===a.indexOf(e))return a.substring(e.length)}return null}function i(t,e,s){if(t)for(var n=t.split(":"),i=null,a=0,r=n.length;a<r;++a){var c=null,S=n[a].split("$");if(0===a&&(i=parseInt(S.shift()),!i))return;var l=S.length;if(l>=1){var p=o(i,S[0]);if(!p||s[p])continue;c={signInName:p,idp:"msa",isSignedIn:!0}}if(l>=3&&(c.firstName=o(i,S[1]),c.lastName=o(i,S[2])),l>=4){var f=S[3],d=f.split("|");c.otherHashedAliases=d}if(l>=5){var h=parseInt(S[4],16);h&&(c.
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (3962)
                                                        Category:dropped
                                                        Size (bytes):521539
                                                        Entropy (8bit):5.670138396612456
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:D7CC2638C45AB1CDD98641D6BDBEAF16
                                                        SHA1:ED0B2EB2F564BC39809BDA6FBEACD337D862A03E
                                                        SHA-256:0A5B021BFDDAB400A10534F0F069D7B26CEE3B17E8F8075BF213C86F3F56D04D
                                                        SHA-512:23882E35D68D370B82481F6689EFC316F29A40AAAB574889C3A1CEE829374F49FA3DD8D80D988BCD19D095F64FDC3E9EE52C751D4C7A933BB0A6EE5451C6EB40
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:_F_installCss("@media (min-width:480px){.Jm7ege.fC2KG{min-width:380px}}.vSyRff.kqLqDd{bottom:0;left:0;right:0}@media (min-width:480px){.c3k6Zc.fC2KG{left:auto;right:20px}}@media (min-width:480px){.JXXsr.fC2KG{left:20px;right:auto}}.dgVGnc .qk7LXc,.qk7LXc.dgVGnc{width:90%}.BhUHze .qk7LXc,.qk7LXc.BhUHze{width:75%}.rfx2Y .qk7LXc,.qk7LXc.rfx2Y{width:100%}.cJFqsd .qk7LXc,.qk7LXc.cJFqsd{height:100%}.yMNJR .qk7LXc,.qk7LXc.yMNJR{max-width:100%}.vSyRff.Y5Ip8c{background-color:var(--xhUGwc);border-radius:20px;bottom:40px;right:40px;box-shadow:0 4px 8px rgba(0,0,0,0.1),0 1px 3px rgba(0,0,0,0.06)}.jnyxRd.Y5Ip8c{border-radius:20px}.vSyRff.fC2KG{background-color:var(--xhUGwc);box-shadow:0 2px 2px 2px rgba(0,0,0,0.1),0 2px 6px 6px rgba(0,0,0,0.06)}@media (min-width:320px){.vSyRff.fC2KG{bottom:0;left:0;right:0}}@media (min-width:480px){.vSyRff.fC2KG{display:inline-block;bottom:20px}}.lgo9kc.vKW4md{opacity:.2;visibility:inherit}.vSyRff.vKW4md{transform:translateY(0);opacity:1;visibility:inherit}.lgo9kc
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 148x83, components 3
                                                        Category:downloaded
                                                        Size (bytes):4660
                                                        Entropy (8bit):7.9064187726451625
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:7CE3B71EB0CE1108DCE907E13B4DE8B7
                                                        SHA1:85D349BAF24544AD0928195C7330329B5F90C811
                                                        SHA-256:30960AC20A74E6EA6983425590B8FDB96FFF35C4F938ED7D2E32A20000FEE0A8
                                                        SHA-512:D8CBDBCBB6CE5458947975B8EB746D89A6F808DFA972269F4B15B2737640F88CEF54CF9CD54EDE442377DC2CD71000125FAA86C595B291F90976AAF7A0D99615
                                                        Malicious:false
                                                        Reputation:unknown
                                                        URL:https://i.ytimg.com/vi/PupPFsi9wU8/mqdefault.jpg?sqp=-oaymwEFCJQBEFM&rs=AMzJL3lrR2lcAKrkNtXWrFC4FILChpdObg
                                                        Preview:......JFIF......................................... ."" ...$(4,$&1'..-=-157:::#+?D?8C49:7...........7%.%77777777777777777777777777777777777777777777777777......S...."........................................J.........................!..1.AQ."Uaq....2s....#6r.5BRbt....&3STd.....$4...............................+.......................Q...!12Rq3A..".a..............?......P..n..x....%9$.......#..i.....i8.~.v..I...g"+XF......M.uJ.w.........t..m....).F.,d.. ...J............Y.);n+l.b.*4..#i.Q+..8.......p.g.;. .&..6...N.i.>.q..+;.4t....m...l0.y.a].F1...NE......#..,.m....pG...8..^...'>dW..t.......h..^gm.....Vn..s.pC".nSP..&.i. +m.3.x...Mp......(...|...a3..-.R[T....u....2=.......ON.p...... 8.sa%.r........a.9.....0w.?.9./.."..*.(.8>.V..Kkk.6......T...")a..(.....r7....a6.p..u<.;*.o..Bw.v'v....7..M.^...r1f.M.CH.9..M..."...O0..;.....js^C..m.jD.....FS.....%...#.g.`%'..nj s},o....Kq.\.....\....W.......K.....w...K..n...P......`{...P..W..H....Gs.p..[.=X...y.K.n.).WhO-#
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:PNG image data, 2 x 2, 8-bit/color RGB, non-interlaced
                                                        Category:downloaded
                                                        Size (bytes):61
                                                        Entropy (8bit):3.990210155325004
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:9246CCA8FC3C00F50035F28E9F6B7F7D
                                                        SHA1:3AA538440F70873B574F40CD793060F53EC17A5D
                                                        SHA-256:C07D7D29E3C20FA6CA4C5D20663688D52BAD13E129AD82CE06B80EB187D9DC84
                                                        SHA-512:A2098304D541DF4C71CDE98E4C4A8FB1746D7EB9677CEBA4B19FF522EFDD981E484224479FD882809196B854DBC5B129962DBA76198D34AAECF7318BD3736C6B
                                                        Malicious:false
                                                        Reputation:unknown
                                                        URL:https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/cmg/1
                                                        Preview:.PNG........IHDR...............s....IDAT.....$.....IEND.B`.
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (842)
                                                        Category:dropped
                                                        Size (bytes):15043
                                                        Entropy (8bit):5.271510307100276
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:2D3A74EE6100D732BBB76A47F752D619
                                                        SHA1:01A12BAA04202CB2A6BC535C14E8E826FA10D1B9
                                                        SHA-256:E89F061CB593B8C32EF37EF4F4678BA959EA32A9C3A0650CAB084AE84549B1F2
                                                        SHA-512:61825268824ECFCFA3B1DD801CD1067CC8EB106BC9B3A6420A34818C334FF1A558BEA32EE09FAA6775C26F11239553662266E330606E5164CE9F3FD4A5EE14A3
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:this._s=this._s||{};(function(_){var window=this;.try{._.u("xUdipf");.var D8a,E8a,F8a,G8a,H8a,I8a,L8a;_.z8a=function(a){return a instanceof _.Sb?{uaa:a}:a};_.A8a=function(a){const b=_.v8a(a.oa());return _.x8a(a.Ps(),b)};_.C8a=function(a){a=_.B8a(_.z8a(a));return _.A8a(a)};D8a=function(){this.Ca=new _.jo;this.Ga=new _.jo;this.oa=new _.jo;this.Da=new _.jo;this.Ba=new _.jo;this.Ea=[];this.Aa=new _.fe;this.Dk=null};E8a={};F8a={};G8a=function(a,b){if(a=a[b])return Object.values(a)[0]};.H8a=function(a){const b=a?_.wya:_.yya;a=a?E8a:F8a;for(const c in b){const d=G8a(b,parseInt(c,10)),e=d.Cb.prototype.qb;e&&(a[e]=d.wI)}};I8a=function(a,b){const c=b?E8a:F8a;let d=c[a.toString()];d||(H8a(b),d=c[a.toString()]);return d};_.J8a=function(a){const b=I8a(a.qb,!0);return{uaa:G8a(_.xya,b),Ixa:G8a(_.wya,b),request:a}};_.K8a=function(a){const b=I8a(a.qb,!1);return{uaa:G8a(_.zya,b),u7a:G8a(_.yya,b),Asc:a}};.L8a=function(a){{var b=a.qb;let c=E8a[b.toString()];c||(H8a(!0),c=E8a[b.toString()]);c?b=!0:(c=F8a[b
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (59783), with CRLF line terminators
                                                        Category:downloaded
                                                        Size (bytes):663451
                                                        Entropy (8bit):5.3635307555313165
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:761CE9E68C8D14F49B8BF1A0257B69D6
                                                        SHA1:8CF5D714D35EFFA54F3686065CB62CCE028E2C77
                                                        SHA-256:BEAA65AD34340E61E9E701458E2CCFF8F9073FDEBBC3593A2C7EC8AFEACB69C1
                                                        SHA-512:CEC948666FBA0F56D3DA27A931033C3A581C9C00FEC4D3DDCF41324525B5B5321AE3AB89581ECC7F497DE85EF684AB277C8A2DB393D526416CEB76C91A1B9263
                                                        Malicious:false
                                                        Reputation:unknown
                                                        URL:https://r4.res.office365.com/owa/prem/15.20.8069.29/scripts/boot.worldwide.0.mouse.js
                                                        Preview:.window.scriptsLoaded = window.scriptsLoaded || {}; window.scriptProcessStart = window.scriptProcessStart || {}; window.scriptProcessStart['boot.worldwide.0.mouse.js'] = (new Date()).getTime();../* Empty file */;Function.__typeName="Function";Function.__class=!0;Function.createCallback=function(n,t){return function(){var r=arguments.length;if(r>0){for(var u=[],i=0;i<r;i++)u[i]=arguments[i];u[r]=t;return n.apply(this,u)}return n.call(this,t)}};Function.prototype.bind=Function.prototype.bind||function(n){if(typeof this!="function")throw new TypeError("bind(): we can only bind to functions");var u=Array.prototype.slice.call(arguments,1),r=this,t=function(){},i=function(){return r.apply(this instanceof t?this:n,u.concat(Array.prototype.slice.call(arguments)))};this.prototype&&(t.prototype=this.prototype);i.prototype=new t;return i};Function.createDelegate=function(n,t){return function(){return t.apply(n,arguments)}};Function.emptyFunction=Function.emptyMethod=function(){};Error.__typeNam
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (622)
                                                        Category:dropped
                                                        Size (bytes):1267910
                                                        Entropy (8bit):5.773080678373432
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:D02CB6893BA26008D23BAF9C1C960AA3
                                                        SHA1:EBB91494691D5AF9FB81B68FD6D88D92718E8233
                                                        SHA-256:7992D098FF3B48C767B0B76855A3F35DB508CF794DB50EF1BDFDFDC6344F6666
                                                        SHA-512:3259FE770B567E1A591824D6205AEF2F7497E757C8AA321D048A94C01AEC8F7E610519E5F301750E7DAA6A565601E7F663CD6C4EA809C7588875769D1B3E8E1A
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:this._s=this._s||{};(function(_){var window=this;.try{./*.. Copyright The Closure Library Authors.. SPDX-License-Identifier: Apache-2.0.*/./*.. Copyright Google LLC. SPDX-License-Identifier: Apache-2.0.*/./*.. Copyright 2024 Google, Inc. SPDX-License-Identifier: MIT.*/./*. SPDX-License-Identifier: Apache-2.0.*/./*. Copyright The Closure Library Authors.. SPDX-License-Identifier: Apache-2.0.*/.var baa,caa,naa,oaa,paa,qaa,raa,saa,taa,uaa,vaa,zaa,xaa,waa,Aaa,yaa,Baa,Daa,Caa,Eaa,Faa,Gaa,Iaa,Jaa,Oaa,Zaa,cba,kba,mba,oba,sba,tba,yba,Dba,Hba,Jba,Kba,Lba,Pba,Oba,Gba,db,Uba,Vba,Wba,$ba,dca,eca,gca,ica,jca,lca,mca,pca,uca,wca,yca,zca,Gca,Hca,Ica,Cca,Jca,Dca,Kca,Bca,Lca,Aca,Mca,Oca,Uca,Wca,Xca,cda,dda,hda,kda,eda,jda,ida,gda,fda,lda,mda,qda,sda,rda,vda,wda,xda,zda,Bda,Ada,Cda,Dda,Eda,Gda,Hda,Ida,Jda,Kda,Nda,Oda,Pda,Tda,Sda,Wda,Xda,bea,dea,cea,eea,gea,fea,iea,hea,lea,kea,nea,oea,pea,rea,sea,uea,vea,.zea,Aea,Fea,Lea,Tea,Vea,Uea,Wea,Xea,yea,Cea,Ab,Zea,cfa,ifa,Cb,mfa,pfa,ufa,sfa,wfa,ofa,xfa,zfa,Afa,Df
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:SVG Scalable Vector Graphics image
                                                        Category:downloaded
                                                        Size (bytes):742
                                                        Entropy (8bit):4.715663467051154
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:EDD0E34F60D7CA4A2F4ECE79CFF21AE3
                                                        SHA1:2CC789A02534557380D92124E2F8B9483D198FB3
                                                        SHA-256:ED9087D76CDC6D1C53698F6068F79872E77E87C8D012C0CFDAD13B05B6CCB37C
                                                        SHA-512:CE9D50913CAD41D11C7B3963C90788301B63EE1FFFFF73108E9F8709CA0A9FCC6170853A65A820FBF020628B403813C9E3CD262389FEB7D17A6C73C2F724394F
                                                        Malicious:false
                                                        Reputation:unknown
                                                        URL:https://fonts.gstatic.com/s/i/productlogos/googleg/v6/24px.svg
                                                        Preview:<svg xmlns="http://www.w3.org/2000/svg" height="24" viewBox="0 0 24 24" width="24"><path d="M22.56 12.25c0-.78-.07-1.53-.2-2.25H12v4.26h5.92c-.26 1.37-1.04 2.53-2.21 3.31v2.77h3.57c2.08-1.92 3.28-4.74 3.28-8.09z" fill="#4285F4"/><path d="M12 23c2.97 0 5.46-.98 7.28-2.66l-3.57-2.77c-.98.66-2.23 1.06-3.71 1.06-2.86 0-5.29-1.93-6.16-4.53H2.18v2.84C3.99 20.53 7.7 23 12 23z" fill="#34A853"/><path d="M5.84 14.09c-.22-.66-.35-1.36-.35-2.09s.13-1.43.35-2.09V7.07H2.18C1.43 8.55 1 10.22 1 12s.43 3.45 1.18 4.93l2.85-2.22.81-.62z" fill="#FBBC05"/><path d="M12 5.38c1.62 0 3.06.56 4.21 1.64l3.15-3.15C17.45 2.09 14.97 1 12 1 7.7 1 3.99 3.47 2.18 7.07l3.66 2.84c.87-2.6 3.3-4.53 6.16-4.53z" fill="#EA4335"/><path d="M1 1h22v22H1z" fill="none"/></svg>
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1592
                                                        Category:dropped
                                                        Size (bytes):621
                                                        Entropy (8bit):7.673946009263606
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:4761405717E938D7E7400BB15715DB1E
                                                        SHA1:76FED7C229D353A27DB3257F5927C1EAF0AB8DE9
                                                        SHA-256:F7ED91A1DAB5BB2802A7A3B3890DF4777588CCBE04903260FBA83E6E64C90DDF
                                                        SHA-512:E8DAC6F81EB4EBA2722E9F34DAF9B99548E5C40CCA93791FBEDA3DEBD8D6E401975FC1A75986C0E7262AFA1B9D1475E1008A89B92C8A7BEC84D8A917F221B4A2
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:..........}UMo"1..+.....G; .8l...M..$.U.AW......UaX..`'.=......|..z3...Ms>..Y...QB..W..y..6.......?..........L.W=m....=..w.)...nw...a.z......#.y.j...m...P...#...6....6.u.u...OF.V..07b..\...s.f..U..N..B...>.d.-z..x.2..Lr.Rr)....JF.z.;Lh.....q.2.A....[.&".S..:......]........#k.U#57V..k5.tdM.j.9.FMQ2..H:.~op..H.......hQ.#...r[.T.$.@........j.xc.x0..I.B:#{iP1.e'..S4.:...mN.4)<W.A.).g.+..PZ&.$.#.6v.+.!...x*...}.._...d...#.Cb..(..^k..h!..7.dx.WHB......(.6g.7.Wwt.I<.......o.;.....Oi$}f.6.....:P..!<5.(.p.e.%et.)w8LA.l9r..n.....?.F.DrK...H....0F...{.,.......{E.."....*...x.@..?u......../....8...
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (65531)
                                                        Category:downloaded
                                                        Size (bytes):112186
                                                        Entropy (8bit):5.52730647834376
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:E271A0F6051D1BDEDD87FFDEBE6C7032
                                                        SHA1:009D33DFF810B3E294E9B94B9FD01AEC36B2C2FF
                                                        SHA-256:C699C9DE93CB6922B85BC33C4AB0C4B74F63530E38138361EF2262B35D4C0486
                                                        SHA-512:436628B0F2ED38BB7D4CF9EF3F65A349F5A49332216FA3848BF419E1566DB7B402BC63F86F2BF57AED4B8C290567DAF882C31750EB7BF65A2D2E8B4658F15DFA
                                                        Malicious:false
                                                        Reputation:unknown
                                                        URL:"https://www.google.com/async/vpkg?vet=10ahUKEwiApueZ4J-JAxUbQ_EDHcVKKXAQj5gNCCA..i&ei=Nm4WZ4CzKZuGxc8PxZWlgQc&opi=89978449&yv=3&cs=0&async=_basejs:%2Fxjs%2F_%2Fjs%2Fk%3Dxjs.s.en_US.DPZFgNYNzi4.2018.O%2Fam%3DAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAIoIBAAAAAAABQAAAAAAAAAAAAAAAAAAAAAAACAQAICQEACAAAAACABQCACBAQAAAIAAABAQAAASKA_v8JAAAAAAAAAAAAEQBMAAAAAACACwAAASgIAAAAEAAAgAEAAIAAAAAAAAAKAAAAAAAAAAAAAAAAAAAAAAAAAAIBoB8AAAAAAAAAAAAAIAAAAAAAMEABAAH8AAAAAAACAAAAggAAAAdkAAIAAAAAAABwHwA8DxgOKSwAAAAAAAAAAAAAAAAEIEEwB6S_IAAEAAAAAAAAAAAAAAAAAAApQROXGwBI%2Fdg%3D0%2Fbr%3D1%2Frs%3DACT90oE11Bn6_JOBZGghZYd7995r37gXCA,_basecss:%2Fxjs%2F_%2Fss%2Fk%3Dxjs.s.W7P_Qx_hvwA.L.B1.O%2Fam%3DQOoQIAQAAAQAMdAAAgAAAAAAAAAAAAAAAAAAAAAkAAAABAAARAAAIAAAIgAAZRIAAJAXAABgAwACAAAfAMABAYABAAAAAAAACQAAAAAAgAAAFQIAAAAAACAgAAAQQQAAQCEAAAAAIAAAAAYAAACAECAAAAEMgBAACCABASgIQD8KAQAAgAEAAISAMIBhAIIKAAZwCgAAAAAAAAAAACAACAEAAAABAQBAgAAAPQIBYAAAaUQAgCAAIEARAAgAAIAAAAAIIBAAADETAAdkAAIAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgAAAAAAAAAAAAAAAAAAAAAAAg%2Fbr%3D1%2Frs%3DACT90oHJTmB2SbgyZ9XwfCjUx8ltFla6LQ,_basecomb:%2Fxjs%2F_%2Fjs%2Fk%3Dxjs.s.en_US.DPZFgNYNzi4.2018.O%2Fck%3Dxjs.s.W7P_Qx_hvwA.L.B1.O%2Fam%3DQOoQIAQAAAQAMdAAAgAAAAAAAAAAAAAAAAAAAAAkAAAABAAARAAAIAAIooBAZRIAAJBXAABgAwACAAAfAMABAYABAAACAQAICQEACAAAgACAFQKACBAQACAoAAARQQAAQSOA_v8JIAAAAAYAAACAESBMAAEMgBCACyABASgIQD8KEQAAgAEAAISAMIBhAIIKAAZwCgAAAAAAAAAAACAACAEAAAIBoR9AgAAAPQIBYAAAaUQAgCAAMEARAAn8AIAAAAAKIBAAgjETAAdkAAIAAAAAAABwHwA8DxgOKSwAAAAAAAAAAAAAAAAEIEEwB6S_IAAEAAAAAAAAAAAAAAAAAAApQROXGwBI%2Fd%3D1%2Fed%3D1%2Fdg%3D0%2Fbr%3D1%2Fujg%3D1%2Frs%3DACT90oF6YwhrG12L-8NgkO67c41xELIuMQ,_fmt:prog,_id:QPwIld"
                                                        Preview:)]}'.22;["PW4WZ86oJ5zyi-gP5--a6QY","2100"]c;[2,null,"0"]1b5ec;<div jsname="TYpc3" jscontroller="M6QgBb" data-gmc="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
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (12617)
                                                        Category:downloaded
                                                        Size (bytes):12622
                                                        Entropy (8bit):6.070260213138935
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:B6A12E6064216D4BCC85BC41B89E09D2
                                                        SHA1:485FA37A7DA3533FCE2AD4959033782A493449A5
                                                        SHA-256:117A0C4CABED58C0780944BF868DBFAA3B0401B1EB0E3433996E530E349BAFF0
                                                        SHA-512:C3145959E704AA4FB063764869AA4DA2C6A825EF41382E66EB0D160DC000C0483CC72033A5D6AF771E84E4AC7D0519177146137DEE495940310257AA5A9D64B4
                                                        Malicious:false
                                                        Reputation:unknown
                                                        URL:https://www.google.com/complete/search?q&cp=0&client=gws-wiz-serp&xssi=t&gs_pcrt=2&hl=en&authuser=0&psi=Nm4WZ4CzKZuGxc8PxZWlgQc.1729523256583&dpr=1&nolsbt=1
                                                        Preview:)]}'.[[["ohio state football",46,[3,308,357,362,396,143],{"lm":[],"zf":33,"zh":"Ohio State Buckeyes football","zi":"Football team","zl":90000,"zp":{"gs_ssp":"eJzj4tTP1TdIy6oqrjRg9BLOz8jMVyguSSxJVUjLzy9JSszJAQCvCQs2"},"zs":"https://encrypted-tbn0.gstatic.com/images?q\u003dtbn:ANd9GcQcfgOX8GpX152k1-LWW3SE7PQj11JKC7qPVRDpRlhpffsYB33IBPQOsDkZsg\u0026s\u003d10"}],["michigan basketball oakland",0,[3,308,357,362,396,143],{"zf":33,"zl":90000,"zp":{"gs_ss":"1"}}],["the lincoln lawyer season 3",0,[3,308,357,362,396,143],{"zf":33,"zl":90000,"zp":{"gs_ss":"1"}}],["marvel spider man",46,[3,308,357,362,396,143],{"lm":[],"zf":33,"zh":"Marvel\u0026#39;s Spider-Man","zi":"Video game","zl":90000,"zp":{"gs_ssp":"eJzj4tVP1zc0TKqqMClJLzE1YPQSzE0sKkvNUSguyExJLVLITcwDAL1yC2E"},"zs":"data:image/jpeg;base64,/9j/4AAQSkZJRgABAQAAAQABAAD/2wCEAAkGBwgHBgkIBwgKCgkLDRYPDQwMDRsUFRAWIB0iIiAdHx8kKDQsJCYxJx8fLT0tMTU3Ojo6Iys/RD84QzQ5OjcBCgoKDQwNGg8PGjclHyU3Nzc3Nzc3Nzc3Nzc3Nzc3Nzc3Nzc3Nzc3Nzc3Nzc3Nzc3Nzc3Nzc3Nzc3Nzc3Nzc3N/
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:GIF image data, version 89a, 352 x 3
                                                        Category:dropped
                                                        Size (bytes):3620
                                                        Entropy (8bit):6.867828878374734
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:B540A8E518037192E32C4FE58BF2DBAB
                                                        SHA1:3047C1DB97B86F6981E0AD2F96AF40CDF43511AF
                                                        SHA-256:8737D721808655F37B333F08A90185699E7E8B9BDAAA15CDB63C8448B426F95D
                                                        SHA-512:E3612D9E6809EC192F6E2D035290B730871C269A267115E4A5515CADB7E6E14E3DD4290A35ABAA8D14CF1FA3924DC76E11926AC341E0F6F372E9FC5434B546E5
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:GIF89a`.........iii!.......!.&Edited with ezgif.com online GIF maker.!..NETSCAPE2.0.....,....`.....6......P.l.......H....I..:qJ......k....`BY..L*..&...!.......,....`.....9..i....Q4......H..j.=.k9-5_..........j7..({.........!.......,....`.....9.......trV.......H....`.[.q6......>.. .CZ.&!.....M...!.......,....`.....8..........:......H..jJ..U..6_....../.el...q.)...*..!.......,....`.....9.....i..l.go.....H..*".U...f......._......5......n..!.......,....`.....:..i......./.....H...5%.kE/5.........In.a..@&3.....J...!.......,....`.....9.......kr.j.....H..*.-.{Im5c..............@&.........!.......,....`.....9.........j..q....H...].&..\.5.........8..S..........!.......,....`.....9.......3q.g..5....H...:u..............Al..x.q.........!.......,....`.....9......\.F....z....H...zX...ov.........h3N.x4......j..!.......,....`.....9........Q.:......H....y..^...1.........n.!.F......E...!.......,....`.....8.........i,......H....*_.21.I.........%...
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (2287)
                                                        Category:downloaded
                                                        Size (bytes):173568
                                                        Entropy (8bit):5.555304583219312
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:7E92F8D0E36C5BBF6FD1136C27E81451
                                                        SHA1:A7458B272EAAC5175131C82F2A25EEF465CA7B4E
                                                        SHA-256:ACAD81DDF02811B37DF5745041B17C24533AA9F4647AFC8FCB8E8D3BC6675E6A
                                                        SHA-512:5E78DEF6334E06C73A4BA2B1E650A000D17B3D30BC2F76C41528E1CAD3774B2514EB804779E960C99002774AEE2D49FC5CB9B63B6218BB6A07EEB181D4DCE4AC
                                                        Malicious:false
                                                        Reputation:unknown
                                                        URL:"https://www.gstatic.com/og/_/js/k=og.qtm.en_US.K3aapsibxMI.2019.O/rt=j/m=q_dnp,qmd,qcwid,qapid,qald,qads,q_dg/exm=qaaw,qabr,qadd,qaid,qalo,qebr,qein,qhaw,qhawgm3,qhba,qhbr,qhbrgm3,qhch,qhchgm3,qhga,qhid,qhidgm3,qhin,qhlo,qhlogm3,qhmn,qhpc,qhsf,qhsfgm3,qhtt/d=1/ed=1/rs=AA2YrTtDjKIU2tfKp1ZjJdBFkkGhNc_-HQ"
                                                        Preview:this.gbar_=this.gbar_||{};(function(_){var window=this;.try{._.hj=class extends _.Q{constructor(){super()}};.}catch(e){_._DumpException(e)}.try{.var ij,jj,lj,oj,rj,qj,kj,pj;ij=function(a){try{return a.toString().indexOf("[native code]")!==-1?a:null}catch(b){return null}};jj=function(){_.Ka()};lj=function(){kj===void 0&&(kj=typeof WeakMap==="function"?ij(WeakMap):null);return kj};oj=function(a,b){(_.mj||(_.mj=new kj)).set(a,b);(_.nj||(_.nj=new kj)).set(b,a)};.rj=function(a){if(pj===void 0){const b=new qj([],{});pj=Array.prototype.concat.call([],b).length===1}pj&&typeof Symbol==="function"&&Symbol.isConcatSpreadable&&(a[Symbol.isConcatSpreadable]=!0)};_.sj=function(a,b,c,d){a=_.zb(a,b,c,d);return Array.isArray(a)?a:_.Nc};_.tj=function(a,b){a=(2&b?a|2:a&-3)|32;return a&=-2049};_.uj=function(a,b){a===0&&(a=_.tj(a,b));return a|1};_.vj=function(a){return!!(2&a)&&!!(4&a)||!!(2048&a)};_.wj=function(a,b,c){32&b&&c||(a&=-33);return a};._.Aj=function(a,b,c,d,e,f,g){const h=a.ha;var k=!!(2&b);e=k?
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1136)
                                                        Category:dropped
                                                        Size (bytes):1555
                                                        Entropy (8bit):5.249530958699059
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:FBE36EB2EECF1B90451A3A72701E49D2
                                                        SHA1:AE56EA57C52D1153CEC33CEF91CF935D2D3AF14D
                                                        SHA-256:E8F2DED5D74C0EE5F427A20B6715E65BC79ED5C4FC67FB00D89005515C8EFE63
                                                        SHA-512:7B1FD6CF34C26AF2436AF61A1DE16C9DBFB4C43579A9499F4852A7848F873BAC15BEEEA6124CF17F46A9F5DD632162364E0EC120ACA5F65E7C5615FF178A248F
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:<!DOCTYPE html>.<html lang=en>. <meta charset=utf-8>. <meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width">. <title>Error 400 (Bad Request)!!1</title>. <style>. *{margin:0;padding:0}html,code{font:15px/22px arial,sans-serif}html{background:#fff;color:#222;padding:15px}body{margin:7% auto 0;max-width:390px;min-height:180px;padding:30px 0 15px}* > body{background:url(//www.google.com/images/errors/robot.png) 100% 5px no-repeat;padding-right:205px}p{margin:11px 0 22px;overflow:hidden}ins{color:#777;text-decoration:none}a img{border:0}@media screen and (max-width:772px){body{background:none;margin-top:0;max-width:none;padding-right:0}}#logo{background:url(//www.google.com/images/branding/googlelogo/1x/googlelogo_color_150x54dp.png) no-repeat;margin-left:-5px}@media only screen and (min-resolution:192dpi){#logo{background:url(//www.google.com/images/branding/googlelogo/2x/googlelogo_color_150x54dp.png) no-repeat 0% 0%/100% 100%;-moz-border-image:url(//ww
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:JSON data
                                                        Category:dropped
                                                        Size (bytes):17821
                                                        Entropy (8bit):1.1784791277779558
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:9C18B50A3296C05FF172348C6743A0DB
                                                        SHA1:4F5689C70691AC48F44903D99EDB8F63D9CF477E
                                                        SHA-256:BB4FF00B962057CA0912B6FFF5C856C9D35A24BCC41CC659727ED7CCAE1BF1C1
                                                        SHA-512:C90918C30FACAFA708D34AD472AE35AA5B862A9558EF100DEF0637FBDFA1EE6E852784CEE8C9EAF2E1BE0B85417CE6359A8CC37C5ACCED20CE18560F747AB986
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:{"chunkTypes":"1000011111110011110001000010110100000011111111111111111111111111111110110111111111110101111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111011110111111111310110111111111111011111111111111011111111111111110001110111111111111111111111111110101002222121212121212121212121212121222222212121212121212121212121212121212121212121212222222212212212221221221221221221221221221221221221221221221221221221221221221221221221222122122122122122122121212122121212121212121212121212121212112121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212222212121222222222122212121212211221212121212112121121212121212121212121212121212121212212212212211212121122222211212121212
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:PNG image data, 342 x 72, 8-bit/color RGBA, non-interlaced
                                                        Category:downloaded
                                                        Size (bytes):5139
                                                        Entropy (8bit):7.865234009830226
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:8B36337037CFF88C3DF203BB73D58E41
                                                        SHA1:1ADA36FA207B8B96B2A5F55078BFE2A97ACEAD0E
                                                        SHA-256:E4E1E65871749D18AEA150643C07E0AAB2057DA057C6C57EC1C3C43580E1C898
                                                        SHA-512:97D8CC97C4577631D8D58C0D9276EE55E4B80128080220F77E01E45385C20FE55D208122A8DFA5DADCB87543B1BC291B98DBBA44E8A2BA90D17C638C15D48793
                                                        Malicious:false
                                                        Reputation:unknown
                                                        URL:https://aadcdn.msauth.net/shared/1.0/content/images/applogos/53_7a3c80bf9694448bac31a9589d2e9e92.png
                                                        Preview:.PNG........IHDR...V...H.............tEXtSoftware.Adobe ImageReadyq.e<...%iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c148 79.164036, 2019/08/13-01:06:57 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop 21.0 (Macintosh)" xmpMM:InstanceID="xmp.iid:DB120779422011EA9888910153D3A5E6" xmpMM:DocumentID="xmp.did:DB12077A422011EA9888910153D3A5E6"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:DB120777422011EA9888910153D3A5E6" stRef:documentID="xmp.did:DB120778422011EA9888910153D3A5E6"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>P.WI....IDATx..]]l.......(.5.K0P..0...E.qT..J X)F.(5X....J.}(m.R5.Q...RUEUPU~.....qp@.b......L...k.m"0......"c.3
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (1203)
                                                        Category:dropped
                                                        Size (bytes):399150
                                                        Entropy (8bit):5.623285743019421
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:A014210D91E0D730B95FFE25DD885B71
                                                        SHA1:61346FB684D4F10CDFF6840A63F1D2A54694BC83
                                                        SHA-256:A48CB3252F920CB4B1333AF000FB8F6072EE4C19E1838954B91A23BCB8AEC764
                                                        SHA-512:7449089B0751FF6F7B0CD21A8D1939CBC31FD4A61F67AF76EA10763466D5866A59226FEA15905BA8D3F49AD03F1F2B2672561C5603D26E42B0D6D7E0661ED243
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:this._s=this._s||{};(function(_){var window=this;.try{._.u("sb_wiz");.._.v();.}catch(e){_._DumpException(e)}.try{._.u("aa");.._.v();.}catch(e){_._DumpException(e)}.try{._.u("abd");.var Uuw=function(a){let b="",c=21;for(let d=0;d<a.length;d++)d%4!=3&&(b+=String.fromCharCode(a[d]^c),c++);return b},Vuw=function(a){let b=0;for(const c in a)if(a[c].e)if(a[c].b)b++;else return!1;return b>0},$uw=function(a={}){const b={};b[Wuw]={e:!!a[Wuw],b:!_.t0i(Xuw)};b[Yuw]={e:!!a[Yuw],b:!_.t0i(Zuw)};return b},avw=function(a){const b=[];for(const c in a)a[c].e&&b.push(`${c}:`+(a[c].b?"1":"0"));return b.join(",")},cvw=function(a,b){a=String(a);b&&(a+=`,${b}`);google.log(bvw,a)},dvw=function(a,b,.c=2){if(c<1)cvw(7,b);else{var d=new Image;d.onerror=()=>{dvw(a,b,c-1)};d.src=a}},Xuw=Uuw([97,119,115,111,107]),Zuw=Uuw([97,119,115,111,107,123]),evw=Uuw([118,115,121,107,108,124,104,119,68,127,114,105,114]),bvw=Uuw([101,126,118,102,118,125,118,109,126]),fvw=Uuw([116,116,115,108]),Wuw=Uuw([113,115,99,107]),Yuw=Uuw([
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (65339), with CRLF line terminators
                                                        Category:downloaded
                                                        Size (bytes):662286
                                                        Entropy (8bit):5.315860951951661
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:12204899D75FC019689A92ED57559B94
                                                        SHA1:CCF6271C6565495B18C1CED2F7273D5875DBFB1F
                                                        SHA-256:39DAFD5ACA286717D9515F24CF9BE0C594DFD1DDF746E6973B1CE5DE8B2DD21B
                                                        SHA-512:AA397E6ABD4C54538E42CCEDA8E3AA64ACE76E50B231499C20E88CF09270AECD704565BC9BD3B27D90429965A0233F99F27697F66829734FF02511BD096CF030
                                                        Malicious:false
                                                        Reputation:unknown
                                                        URL:https://r4.res.office365.com/owa/prem/15.20.8069.29/scripts/boot.worldwide.2.mouse.js
                                                        Preview:.window.scriptsLoaded = window.scriptsLoaded || {}; window.scriptProcessStart = window.scriptProcessStart || {}; window.scriptProcessStart['boot.worldwide.2.mouse.js'] = (new Date()).getTime();.._y.lC=function(){};_y.lC.registerInterface("_y.lC");_y.jw=function(){};_y.jw.registerInterface("_y.jw");_y.lA=function(){};_y.lA.registerInterface("_y.lA");var IDelayedSendEvent=function(){};IDelayedSendEvent.registerInterface("IDelayedSendEvent");var IIsShowingComposeInReadingPaneEvent=function(){};IIsShowingComposeInReadingPaneEvent.registerInterface("IIsShowingComposeInReadingPaneEvent");var ISendFailedO365Event=function(){};ISendFailedO365Event.registerInterface("ISendFailedO365Event");var ISendFailureRemoveO365Event=function(){};ISendFailureRemoveO365Event.registerInterface("ISendFailureRemoveO365Event");_y.gw=function(){};_y.gw.registerInterface("_y.gw");_y.iB=function(){};_y.iB.registerInterface("_y.iB");_y.ih=function(){};_y.ih.registerInterface("_y.ih");_y.jy=function(){};_y.jy.regis
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (501)
                                                        Category:dropped
                                                        Size (bytes):993
                                                        Entropy (8bit):5.299761723335727
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:1A088E0812209675CAE6D007FDCF90D0
                                                        SHA1:CCCBBC4D88940C4A561ADC10F8E0DBF5334A6223
                                                        SHA-256:1FCCE91080E0C58B41DDC4BB6E9DAD66C72E78802DC59622D8B0A42E5458D3AF
                                                        SHA-512:0AF0A0EFCBF603769652A75679D09BF05E366C2D5214F1EB4198A1DFE19B3956791056616D37443B6A1B44870789B0FCB2A5FBB91227AB5FE42847599A9AFDFA
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:var scriptUrl = 'https:\/\/www.youtube.com\/s\/player\/e627e516\/www-widgetapi.vflset\/www-widgetapi.js';try{var ttPolicy=window.trustedTypes.createPolicy("youtube-widget-api",{createScriptURL:function(x){return x}});scriptUrl=ttPolicy.createScriptURL(scriptUrl)}catch(e){}var YT;if(!window["YT"])YT={loading:0,loaded:0};var YTConfig;if(!window["YTConfig"])YTConfig={"host":"https://www.youtube.com"};.if(!YT.loading){YT.loading=1;(function(){var l=[];YT.ready=function(f){if(YT.loaded)f();else l.push(f)};window.onYTReady=function(){YT.loaded=1;var i=0;for(;i<l.length;i++)try{l[i]()}catch(e){}};YT.setConfig=function(c){var k;for(k in c)if(c.hasOwnProperty(k))YTConfig[k]=c[k]};var a=document.createElement("script");a.type="text/javascript";a.id="www-widgetapi-script";a.src=scriptUrl;a.async=true;var c=document.currentScript;if(c){var n=c.nonce||c.getAttribute("nonce");if(n)a.setAttribute("nonce",.n)}var b=document.getElementsByTagName("script")[0];b.parentNode.insertBefore(a,b)})()};.
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:PNG image data, 84 x 91, 8-bit/color RGB, non-interlaced
                                                        Category:dropped
                                                        Size (bytes):61
                                                        Entropy (8bit):4.035372245524405
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:F2BCF0954520AA98162CE7B3B8E65EA4
                                                        SHA1:FE88DDD169DE7024C31B54D3A3F040622EAA62F4
                                                        SHA-256:F76A92755BB0FA435AA2727089C87C39DBB4EC96C6FAE82203D3A39778DA471D
                                                        SHA-512:67DA2129EC2E686BDFEB2152DA6B00C8BF0CE1361C5B258DCD0269758C0422F9F5BE2487FC982F8A65C9ECACFDCE23B039D0F73C2E5A36158D930ECACACF886B
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:.PNG........IHDR...T...[.....b_5C....IDAT.....$.....IEND.B`.
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (1689), with no line terminators
                                                        Category:dropped
                                                        Size (bytes):1689
                                                        Entropy (8bit):5.640520027557763
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:45DD7BD58C9F085DA52FA16A2A150066
                                                        SHA1:9B5CF4B288EDE14AE8834F3EF2A58145B8EC8CBC
                                                        SHA-256:0D5C53FCC37C7A2CE26367BBE6197FCD9272DD7EBC81823D088A4DFFF5AE599B
                                                        SHA-512:520B8DF68524C2CEF393B837D7EAD0168028C94697E1DA0AC4BDDAFAB849D1B26D7E7933082146AE6A220A449F066CBBBA2EBFC6CC30D3F756FBD98EE061C8DF
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:.MTIaKb,.LwDUdc,.FAoEle,.RlTCPd,.wPNfjb,.caNvfd,.Vnob4b,.bbxTBb,.DpgmK,.YKUhfb,.uNnvb,.aVsZpf,.RoOVmf,.dIfvQd,.V3Ezn,.Enb9pe,.mYuoaf,.kJSB8,.tUr4Kc,.iQMtqe{--Yi4Nb:var(--mXZkqc);--pEa0Bc:var(--bbQxAb);--kloG3:var(--mXZkqc);--YaIeMb:var(--XKMDxc);--Pa8Wlb:var(--Nsm0ce);--izGsqb:var(--Nsm0ce);--todMNcl:var(--EpFNW);--p9J9c:var(--Nsm0ce)}:root{--KIZPne:#a3c9ff;--xPpiM:#001d35;--Ehh4mf:var(--Nsm0ce)}:root{--Yi4Nb:#d2d2d2;--pEa0Bc:#474747;--kloG3:#d2d2d2;--YaIeMb:#f7f8f9;--Pa8Wlb:#0b57d0;--izGsqb:#0b57d0;--todMNcl:#fff;--p9J9c:#0b57d0}.EpPYLd{display:block;position:relative}.YpcDnf{padding:0 16px;vertical-align:middle}.YpcDnf.HG1dvd{padding:0}.HG1dvd>*{padding:0 16px}.WtV5nd .YpcDnf{padding-left:28px}.Zt0a5e .YpcDnf{line-height:48px}.GZnQqe .YpcDnf{line-height:23px}.EpPYLd:hover{cursor:pointer}.EpPYLd,.CB8nDe:hover{cursor:default}.LGiluc,.EpPYLd[disabled]{pointer-events:none;cursor:default}@media (forced-colors:active){.EpPYLd[disabled]{color:GrayText}}.LGiluc{border-top:1px solid;height:0;
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (7547), with no line terminators
                                                        Category:dropped
                                                        Size (bytes):7547
                                                        Entropy (8bit):5.4121739035581
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:7AA3D8CF7303364A5EACADBA361C6D5C
                                                        SHA1:7F551B2DDD376E46E87E6826780B76B780D8AF4B
                                                        SHA-256:D8E6A68953BEDFDAE82FADD5FE1396DA23FBB8CD33A9789362B592E20D213638
                                                        SHA-512:D40775C7C245D7E761814DF2DD91C19193B55B98A550A30544F3EC7092011F6716989571D761FC66970BA9FC0B8062775089D2A93461D8DE8630C8E1440C70F6
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:.jbBItf{display:block;position:relative}.DU0NJ{bottom:0;left:0;position:absolute;right:0;top:0}.lP3Jof{display:inline-block;position:relative}.nNMuOd{animation:qli-container-rotate 1568.2352941176ms linear infinite}@keyframes qli-container-rotate{from{transform:rotate(0)}to{transform:rotate(1turn)}}.RoKmhb{height:100%;opacity:0;position:absolute;width:100%}.nNMuOd .VQdeab{animation:qli-fill-unfill-rotate 5332ms cubic-bezier(0.4,0,0.2,1) infinite both,qli-blue-fade-in-out 5332ms cubic-bezier(0.4,0,0.2,1) infinite both}.nNMuOd .IEqiAf{animation:qli-fill-unfill-rotate 5332ms cubic-bezier(0.4,0,0.2,1) infinite both,qli-red-fade-in-out 5332ms cubic-bezier(0.4,0,0.2,1) infinite both}.nNMuOd .smocse{animation:qli-fill-unfill-rotate 5332ms cubic-bezier(0.4,0,0.2,1) infinite both,qli-yellow-fade-in-out 5332ms cubic-bezier(0.4,0,0.2,1) infinite both}.nNMuOd .FlKbCe{animation:qli-fill-unfill-rotate 5332ms cubic-bezier(0.4,0,0.2,1) infinite both,qli-green-fade-in-out 5332ms cubic-bezier(0.4,0,0.2,
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:SVG Scalable Vector Graphics image
                                                        Category:downloaded
                                                        Size (bytes):1660
                                                        Entropy (8bit):4.301517070642596
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:554640F465EB3ED903B543DAE0A1BCAC
                                                        SHA1:E0E6E2C8939008217EB76A3B3282CA75F3DC401A
                                                        SHA-256:99BF4AA403643A6D41C028E5DB29C79C17CBC815B3E10CD5C6B8F90567A03E52
                                                        SHA-512:462198E2B69F72F1DC9743D0EA5EED7974A035F24600AA1C2DE0211D978FF0795370560CBF274CCC82C8AC97DC3706C753168D4B90B0B81AE84CC922C055CFF0
                                                        Malicious:false
                                                        Reputation:unknown
                                                        URL:https://www.gstatic.com/images/branding/googlelogo/svg/googlelogo_clr_74x24px.svg
                                                        Preview:<svg xmlns="http://www.w3.org/2000/svg" width="74" height="24" viewBox="0 0 74 24"><path fill="#4285F4" d="M9.24 8.19v2.46h5.88c-.18 1.38-.64 2.39-1.34 3.1-.86.86-2.2 1.8-4.54 1.8-3.62 0-6.45-2.92-6.45-6.54s2.83-6.54 6.45-6.54c1.95 0 3.38.77 4.43 1.76L15.4 2.5C13.94 1.08 11.98 0 9.24 0 4.28 0 .11 4.04.11 9s4.17 9 9.13 9c2.68 0 4.7-.88 6.28-2.52 1.62-1.62 2.13-3.91 2.13-5.75 0-.57-.04-1.1-.13-1.54H9.24z"/><path fill="#EA4335" d="M25 6.19c-3.21 0-5.83 2.44-5.83 5.81 0 3.34 2.62 5.81 5.83 5.81s5.83-2.46 5.83-5.81c0-3.37-2.62-5.81-5.83-5.81zm0 9.33c-1.76 0-3.28-1.45-3.28-3.52 0-2.09 1.52-3.52 3.28-3.52s3.28 1.43 3.28 3.52c0 2.07-1.52 3.52-3.28 3.52z"/><path fill="#4285F4" d="M53.58 7.49h-.09c-.57-.68-1.67-1.3-3.06-1.3C47.53 6.19 45 8.72 45 12c0 3.26 2.53 5.81 5.43 5.81 1.39 0 2.49-.62 3.06-1.32h.09v.81c0 2.22-1.19 3.41-3.1 3.41-1.56 0-2.53-1.12-2.93-2.07l-2.22.92c.64 1.54 2.33 3.43 5.15 3.43 2.99 0 5.52-1.76 5.52-6.05V6.49h-2.42v1zm-2.93 8.03c-1.76 0-3.1-1.5-3.1-3.52 0-2.05 1.34-3.52 3.1-3
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (5162), with no line terminators
                                                        Category:downloaded
                                                        Size (bytes):5162
                                                        Entropy (8bit):5.3503139230837595
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:7977D5A9F0D7D67DE08DECF635B4B519
                                                        SHA1:4A66E5FC1143241897F407CEB5C08C36767726C1
                                                        SHA-256:FE8B69B644EDDE569DD7D7BC194434C57BCDF60280078E9F96EEAA5489C01F9D
                                                        SHA-512:8547AE6ACA1A9D74A70BF27E048AD4B26B2DC74525F8B70D631DA3940232227B596D56AB9807E2DCE96B0F5984E7993F480A35449F66EEFCF791A7428C5D0567
                                                        Malicious:false
                                                        Reputation:unknown
                                                        URL:"https://www.gstatic.com/og/_/ss/k=og.qtm.w7uZcIyFZsQ.L.W.O/m=qmd,qcwid/excm=qaaw,qabr,qadd,qaid,qalo,qebr,qein,qhaw,qhawgm3,qhba,qhbr,qhbrgm3,qhch,qhchgm3,qhga,qhid,qhidgm3,qhin,qhlo,qhlogm3,qhmn,qhpc,qhsf,qhsfgm3,qhtt/d=1/ed=1/ct=zgms/rs=AA2YrTtQO3fUcONTNQ0-jEHtQyhEn9DXYw"
                                                        Preview:.gb_P{-webkit-border-radius:50%;border-radius:50%;bottom:2px;height:18px;position:absolute;right:0;width:18px}.gb_Ja{-webkit-border-radius:50%;border-radius:50%;-webkit-box-shadow:0px 1px 2px 0px rgba(60,64,67,.30),0px 1px 3px 1px rgba(60,64,67,.15);box-shadow:0px 1px 2px 0px rgba(60,64,67,.30),0px 1px 3px 1px rgba(60,64,67,.15);margin:2px}.gb_Ka{fill:#f9ab00}.gb_F .gb_Ka{fill:#fdd663}.gb_La>.gb_Ka{fill:#d93025}.gb_F .gb_La>.gb_Ka{fill:#f28b82}.gb_La>.gb_Ma{fill:white}.gb_Ma,.gb_F .gb_La>.gb_Ma{fill:#202124}.gb_Na{-webkit-clip-path:path("M16 0C24.8366 0 32 7.16344 32 16C32 16.4964 31.9774 16.9875 31.9332 17.4723C30.5166 16.5411 28.8215 16 27 16C22.0294 16 18 20.0294 18 25C18 27.4671 18.9927 29.7024 20.6004 31.3282C19.1443 31.7653 17.5996 32 16 32C7.16344 32 0 24.8366 0 16C0 7.16344 7.16344 0 16 0Z");clip-path:path("M16 0C24.8366 0 32 7.16344 32 16C32 16.4964 31.9774 16.9875 31.9332 17.4723C30.5166 16.5411 28.8215 16 27 16C22.0294 16 18 20.0294 18 25C18 27.4671 18.9927 29.7024 20.6004 3
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:RIFF (little-endian) data, Web/P image
                                                        Category:dropped
                                                        Size (bytes):660
                                                        Entropy (8bit):7.7436458678149815
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:C3DFF0D9F30EC0BCF4DEC9524505916B
                                                        SHA1:4B378403ACBEBC3747E08C69B5FD7770A850C9EB
                                                        SHA-256:73D788F86BE22112BB53762545989C0F1BBDB7343161130952C9BA3834FF81E3
                                                        SHA-512:677EA304D00D176ACF61FF68BF23BD5F77AD2928D7DE9F4B842292BC9D3FB7029FE9F578B62F142DCE689230F392E828098EED3484FE2DBEE6E1A7AA5378E2C6
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:RIFF....WEBPVP8L..../'....Hv.=n.......Q...a..(Rv.o..U.....l..m........0l.6l..f.......A?B.C.A...2h..Ag0....G8.n#)R.j.x..P.F..I;.Ox......7-...bX./..]...3..T....5...x...G.C....%.u.....u/._.=....<!q.\...9.....\....p:..P.4.aS.N).>.>.."..9..Vh ....no....l.1..#6p\c..2..>..=8...........FP.^....+/.~......hs..D.Jm..9...r....t*.H..~T^|.....l..l......he..}f....d.."....K...&1..................pl.Pf.%6...2X..I...eXQ(.K..1%c..w.s._..._K`K.1}..D.E=...<..ytM..>.q'.e.L.~$...b..;k.M.....t\O..m.I._..F....'........z.]..u?~..P.zJM.. k...p~9..D....".Zl$?f..+...\.Pg..%...;.[R>N.#.W.e..@q...(....]&......K.......?.|.z..(...:&m.V.C.'...D^.R....
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:HTML document, ASCII text, with very long lines (31339)
                                                        Category:downloaded
                                                        Size (bytes):717349
                                                        Entropy (8bit):5.987554135613382
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:C96F4584B0DD54361E299AD7338D5147
                                                        SHA1:5062F61D8FFB7B11AD34E5846B8413CE1A00AB15
                                                        SHA-256:037E413FFA83EEA04334305E0BB8F23AC314D2460245FE9995350C5645D98FE3
                                                        SHA-512:91D93A27B969267E0A4DD9FBACD8F239CF67E2E897A5D92A24FCF9D2660229F6BD861C24980662DAF379DF741A478AB6C064F35B9956FCBB0E9ACBACECD12786
                                                        Malicious:false
                                                        Reputation:unknown
                                                        URL:https://www.google.com/search?q=EMAIL+ADDRESS+EXAMPLE&oq=EMAIL+ADDRESS+EXAMPLE&gs_lcrp=EgZjaHJvbWUyBggAEEUYOTIKCAEQABixAxiABDIKCAIQABixAxiABDIKCAMQABixAxiABDIKCAQQABixAxiABDIKCAUQABixAxiABDIKCAYQABixAxiABDIKCAcQABixAxiABDIKCAgQABixAxiABDIKCAkQABixAxiABNIBCDI5MzhqMGo3qAIAsAIA&sourceid=chrome&ie=UTF-8
                                                        Preview:<!doctype html><html itemscope="" itemtype="http://schema.org/SearchResultsPage" lang="en"><head><meta charset="UTF-8"><meta content="origin" name="referrer"><meta content="/images/branding/googleg/1x/googleg_standard_color_128dp.png" itemprop="image"><title>EMAIL ADDRESS EXAMPLE - Google Search</title><script nonce="tz1R8eA7zs-8LFSmggFSuA">window._hst=Date.now();performance&&performance.mark&&performance.mark("SearchHeadStart");</script><script nonce="tz1R8eA7zs-8LFSmggFSuA">(function(){var b=window.addEventListener;window.addEventListener=function(a,c,d){a!=="unload"&&b(a,c,d)};}).call(this);(function(){var _g={kEI:'Nm4WZ4CzKZuGxc8PxZWlgQc',kEXPI:'31',kBL:'54xd',kOPI:89978449};(function(){var a;((a=window.google)==null?0:a.stvsc)?google.kEI=_g.kEI:window.google=_g;}).call(this);})();(function(){google.sn='web';google.kHL='en';})();(function(){.var h=this||self;function l(){return window.google!==void 0&&window.google.kOPI!==void 0&&window.google.kOPI!==0?window.google.kOPI:null};var
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:HTML document, ASCII text
                                                        Category:downloaded
                                                        Size (bytes):5539
                                                        Entropy (8bit):4.665823311211335
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:029675B27EC1CB087F2A29459A59447A
                                                        SHA1:9174D62A49FBC42020B5F7B5A9ABE9B6F8EC161B
                                                        SHA-256:BB29E179AF7CA8F1DAD01282351E1DF6044B2F1448843D1C080454850C8867CE
                                                        SHA-512:B6ECCA42C95BF077980448D139DB2895EC73330986E32EF194EEABEEB1B270F433DCB75F3AE73358C65A573F2BE70E20A7A12DCE4D1F835DB6C669EEF29A43DC
                                                        Malicious:false
                                                        Reputation:unknown
                                                        URL:https://main.d32s46dadgryfu.amplifyapp.com/favicon.ico
                                                        Preview:<!DOCTYPE html>.<html lang="en">.<head>. <meta charset="UTF-8">. <meta http-equiv="X-Content-Type-Options" content="nosniff">. <meta http-equiv="X-Frame-Options" content="DENY">. <meta http-equiv="Strict-Transport-Security" content="max-age=31536000; includeSubDomains; preload">. <meta http-equiv="Referrer-Policy" content="no-referrer">. <meta http-equiv="Permissions-Policy" content="geolocation=(), microphone=(), camera=()">. . <meta name="viewport" content="width=device-width, initial-scale=1.0">. <meta http-equiv="Content-Security-Policy" content="default-src 'self'; script-src 'self' 'unsafe-inline'; style-src 'self' 'unsafe-inline'; img-src 'self' data:; connect-src 'self'; font-src 'self'; frame-ancestors 'none';">.. <meta property="og:title" content="SOCIAL" />. <meta property="og:description" content="TEST" />. <meta property="og:url" content="https://www.microsoft.com/account" />. <meta property="og:image" content="https://www.twitter.com
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:Web Open Font Format (Version 2), TrueType, length 15344, version 1.0
                                                        Category:downloaded
                                                        Size (bytes):15344
                                                        Entropy (8bit):7.984625225844861
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:5D4AEB4E5F5EF754E307D7FFAEF688BD
                                                        SHA1:06DB651CDF354C64A7383EA9C77024EF4FB4CEF8
                                                        SHA-256:3E253B66056519AA065B00A453BAC37AC5ED8F3E6FE7B542E93A9DCDCC11D0BC
                                                        SHA-512:7EB7C301DF79D35A6A521FAE9D3DCCC0A695D3480B4D34C7D262DD0C67ABEC8437ED40E2920625E98AAEAFBA1D908DEC69C3B07494EC7C29307DE49E91C2EF48
                                                        Malicious:false
                                                        Reputation:unknown
                                                        URL:https://fonts.gstatic.com/s/roboto/v18/KFOmCnqEu92Fr1Mu4mxK.woff2
                                                        Preview:wOF2......;........H..;..........................d..@..J.`..L.T..<.....x.....^...x.6.$..6. ..t. ..I.h|.l....A....b6........(......@e.]...*:..-.0..r.)..hS..h...N.).D.........b.].......^..t?.m{...."84...9......c...?..r3o....}...S]....zbO.../z..{.....~cc....I...#.G.D....#*e.A..b...b`a5P.4........M....v4..fI#X.z,.,...=avy..F.a.\9.P|.[....r.Q@M.I.._.9..V..Q..]......[ {u..L@...]..K......]C....l$.Z.Z...Zs.4........ x.........F.?.7N..].|.wb\....Z{1L#..t....0.dM...$JV...{..oX...i....6.v.~......)|.TtAP&).KQ.]y........'...:.d..+..d..."C.h..p.2.M..e,.*UP..@.q..7..D.@...,......B.n. r&.......F!.....\...;R.?-.i...,7..cb../I...Eg...!X.)5.Aj7...Ok..l7.j.A@B`".}.w.m..R.9..T.X.X.d....S..`XI..1... .$C.H.,.\. ..A(.AZ.................`Wr.0]y..-..K.1.............1.tBs..n.0...9.F[b.3x...*$....T..PM.Z-.N.rS?I.<8eR'.3..27..?;..OLf*.Rj.@.o.W...........j~ATA....vX.N:.3dM.r.)Q.B...4i.f..K.l..s....e.U.2...k..a.GO.}..../.'..%$..ed.*.'..qP....M..j....../.z&.=...q<....-..?.A.%..K..
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 72x72, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=4, xresolution=62, yresolution=70, resolutionunit=2, software=paint.net 4.2.9], baseline, precision 8, 50x28, components 3
                                                        Category:dropped
                                                        Size (bytes):987
                                                        Entropy (8bit):6.922003634904799
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:E58AAFC980614A9CD7796BEA7B5EA8F0
                                                        SHA1:D4CAC92DCDE0CAF7C571E6D791101DA94FDBD2CA
                                                        SHA-256:8B34A475187302935336BF43A2BF2A4E0ADB9A1E87953EA51F6FCF0EF52A4A1D
                                                        SHA-512:2DAC06596A11263DF1CFAB03EDA26D0A67B9A4C3BAA6FB6129CDBF0A157C648F5B0F5859B5CA689EFDF80F946BF4D854BA2B2C66877C5CE3897D72148741FCC9
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:......JFIF.....H.H.....fExif..MM.*.................>...........F.(...........1.........N.......H.......H....paint.net 4.2.9....C....................................................................C.........................................................................2..!............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?......[.4..lz.....K.S..p.>.9.r9j..'.\.qrW..mo...X9ZV<./x...EX...m.Prj..A.EtG...K..mr....Lc.T.*8...nlY.V.{6...*R...]..(.y...)^.5V.IVO.W.B.19.R\...f.U.....'..S:..k.6..*).f.n._3*....}.y.8.EusH..y.`.mA...W.}...bL..:..b.<f..(lH#R....v._...........9N~S..
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 113769
                                                        Category:downloaded
                                                        Size (bytes):35168
                                                        Entropy (8bit):7.99275807202193
                                                        Encrypted:true
                                                        SSDEEP:
                                                        MD5:D3B6AE9986DF244AB03412CC700335D0
                                                        SHA1:BAAA1F9899178938F3881F09B18265E47DA806E3
                                                        SHA-256:CA50059111D30C2E212C90805792EB543548AEF0D4941E886A778E3DCE0B9066
                                                        SHA-512:755C57FBC9BECE435A477F76C5E8198CA8942C23BE667ACAB83A00E5CD4F54075B10AA07C7FDC10C38FC3D5C0C406C9132FEB5B67BA5BCCC57EF796054A84E7C
                                                        Malicious:false
                                                        Reputation:unknown
                                                        URL:https://aadcdn.msauth.net/shared/1.0/content/js/asyncchunk/convergedlogin_pstringcustomizationhelper_4285088f1dbaf52a876d.js
                                                        Preview:...........kC.H.0......e....0.pX..Iv3..\f..0YY.m..e$.K..o...j..g.3.lpW.......[..Y.?k.Y.......8~.a..../_.;]{.............v...0..q.Dk.w...h-....Z<..l.fA..k3.7..dm....b..-...(,.$...4...f...e...AV..z.mA....O.9........k..h-.......<Z[.GQ.v3....Oq..y:..(..k.$_...._..h-...q..S.ck.=.T......Sq@.:.A.c.(....SDq..Ac.t..m.$Lc....Z...K...O<....f9..p...0Z..3.<...$YK.x.F......v....nm..s$...&..dQ4.......n-.-.......E.XD..-5~...f.....t...-_.....fsg...8kZ..|.{{....p+Lg.t9I..P./ap......o9Wx.._{....k..,...............................7.|..t...Ax.7..b..v..v.m-...~v...:....r..._........,...A........:..z.>.y..u.....N...^..S.......z~@..;...n...K........x..A]....F.8X&Em..P.s.....a.g.|.d......._..C`.xQ...\..'...QP....?.R.{?....|.>........E4.GRz...z.k.z.}....h..>.{[E.:.....Pu. ..e6_.o.p*.w...>...:...o.k~...~..&E._..}}.}%[. ..#......z.5M.b.....z..k.H.4...l..D.o...z..M.+../..`....?y.J4.=....u.....Z.....E.d.....{0H^...8.....9..h......d..6j......../..z..V<.`.F.xm.y..yt.J....
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:downloaded
                                                        Size (bytes):28
                                                        Entropy (8bit):4.307354922057605
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:9F9FA94F28FE0DE82BC8FD039A7BDB24
                                                        SHA1:6FE91F82974BD5B101782941064BCB2AFDEB17D8
                                                        SHA-256:9A37FDC0DBA8B23EB7D3AA9473D59A45B3547CF060D68B4D52253EE0DA1AF92E
                                                        SHA-512:34946EF12CE635F3445ED7B945CF2C272EF7DD9482DA6B1A49C9D09A6C9E111B19B130A3EEBE5AC0CCD394C523B54DD7EB9BF052168979A9E37E7DB174433F64
                                                        Malicious:false
                                                        Reputation:unknown
                                                        URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xNDkSFwlEu3bZKjj5VhIFDdFbUVISBQ1Xevf9?alt=proto
                                                        Preview:ChIKBw3RW1FSGgAKBw1Xevf9GgA=
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (8364)
                                                        Category:dropped
                                                        Size (bytes):8369
                                                        Entropy (8bit):6.01379902195004
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:8F01B02866685000C3D4F299C279CF8B
                                                        SHA1:7F9F30780C5E58DCDF4E665F41D7FBF7B2BD2864
                                                        SHA-256:BD262ACE954A74B43DC69107F9FFB031DD3B5136AC7CD90191E62F9661C94319
                                                        SHA-512:F8A2DA661BCEE2FDAD5E84DA6C07CFACC1933A272A653358D66F2E63C5715D20019A224FA70E3522F32018F9F94C4519F3126B0B3188091BEFADFB235ECF16D2
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:)]}'.{"bgasy":["https://www.google.com/js/bg/T4ehibPa9JUZf9vmhP9dJKVvxx9KuzuDQ8QZX_MTths.js","KlIq2L6jMtKG6pXO1FyUipfD5Hksn6gjG2OC+JD3XG13omQk+fwXTEbfl5UmR8SJx4BHPA2zoOPJLNXQTuk8YldXZFPRyDgP1f73LRWeBsZsbVF9pwQ5XjspU6JY2jNhSbdxXkx65GK+GJnIsHsd4t2k4GJyecmyKE5dYebfGaprG3mDLmKjCIYqy/kW3G3pTCubyy/LsFX9pUtqycBj0I8YjD1AMP6cn62TUsM3d6Xv6Qr0v4zknx0EViCkh85ISAbsIvsLa3dLcliO8gbu+NngJcB7cKaizxaSKGhWxeNrl9CcXeJy0X39YJarnyly3cfq+tMyql+IQG1TZpYnnmGhiLn8nS3EUWmxrnxMJxikAyOEsMbXgQj+Eysr9wcnEZneUzTIUJINQGdON3dKDoIiNoR0ZyHc3iRFPSOtA4h3eW+xZ5TtxLAEyFSM+NkKQwe09/V96kU9MeCPHMps6AyoKQQTgRkSfHQpjipaIpdA3W9AGNxuua44/Ya1Rxw6hip9rdRfXselzTRUWBZG0Ch0f1AF+SIfOHC00yG8inWp8HwdYOX9DkXPae3SPScgG+Jt+MGVDJR5NeyAMT4zGpqhzOQIxtTaMMxoDsWgm9FNpU/ZeGgjmYhO4jqDc6WtFxf53Xb4YyNnF24a+MtsmIuxkUh5xzXwX08zv92/zS7MgNi+nHmTGOpwgGc0CcOxYH9r73bar04tEmO3ZMXB0IxGgBg/XypILy7Z1Ws7S2rLe/dAzIQz2c/n9/4Vw8bH2qnIEjExYFhkM3o2Lpziap2bsy20wqLVLjAr6+VQvJsKQAqfksmecoP/nSC7S2bxzZZrlYACdPi73WDx0BAN4j/YjcwKsr1GxqiIM/9FERagT6rnWJOGeuOq08D92Itwc0y+0T/kTf
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (784)
                                                        Category:downloaded
                                                        Size (bytes):779109
                                                        Entropy (8bit):5.647891030695861
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:517B05B9C639FEF896E37BA18B720E84
                                                        SHA1:DF76B07058A6A4561CB523C9FBD0A935BB65D457
                                                        SHA-256:E6F4E191E7C1FD04FE076E0565FE6A97D597CBC5CD59972EB1CA8A0CBC2701A4
                                                        SHA-512:784B4E58CC8D304567390E2383450BEDE8B1401B8C87CBB36DCC635E62B1DB766165C1114FD892176D986F6A13E902B43B6A5D596FA5399A1D2D3BF679A60A35
                                                        Malicious:false
                                                        Reputation:unknown
                                                        URL:"https://www.gstatic.com/_/mss/boq-search/_/js/k=boq-search.ViewPackageService.en.0CqTADnFjP8.es5.O/am=BHEIIQAAIAAQAQ1AAAAAAAAAAAAAAAAAAAAAACABAAAAAAAAAAAQAAAUK1GTAACATOhPYAcACAB-AD_0BPT__wkBACAAcAg8vAAARAUAAAQBMDoSJJwpEACMgQOgERkAAAABAIgAAAAAAAA4hIMAABiBNAgiBBEtAYgBAiQAoAFoXGVCiBAABAIAAEqIHJKGAUjuVgFsUQkEEBQA8VECCAAQGiBBQoBAAAAIgQAwAAAUiAAAAEQHGJ4AAGAO5NBAArBGAMHATACAAwAAAICT4QEGCAAAAAAAAAAAAAAAECryIqAiAAAAAAAAAAAAAAAAAARAkw/d=1/dg=0/rs=AH7-fg7eEH0ADcizq1eJ4pniU3AZllZwCQ/cb=loaded_0/ee=ADJUGe:nSzGM;ALeJib:B8gLwd;AfeaP:TkrAjf;Afksuc:fBZcuf;BMxAGc:E5bFse;BgS6mb:fidj5d;BjwMce:cXX2Wb;CRubWc:GGHMXc;CxXAWb:YyRLvc;DULqB:RKfG5c;Dkk6ge:JZmW9e;DpcR3d:zL72xf;EABSZ:MXZt9d;EVNhjf:pw70Gc;EmZ2Bf:zr1jrb;EnlcNd:WeHg4;F9mqte:UoRcbe;Fmv9Nc:O1Tzwc;G0KhTb:LIaoZ;G6wU6e:hezEbd;GleZL:J1A7Od;GzNeK:lwR3kb;HMDDWe:HPcd9d;HoYVKb:PkDN7e;HqeXPd:cmbnH;IZrNqe:P8ha2c;IcRVsb:iZsl5b;JXS8fb:Qj0suc;JbMT3:M25sS;JsbNhc:Xd8iUd;KQzWid:ZMKkN;LBgRLc:SdcwHb,XVMNvd;LXA8b:PiQ7Fb;LsNahb:ucGLNb;MWIbN:Oezo8e;Me32dd:MEeYgc;NPKaK:SdcwHb;NSEoX:lazG7b;NoD55:pyzU6b,tHLYle;Np8Qkd:Dpx6qc;Nyt6ic:jn2sGd;OGn9Jd:vP7cyb;OgagBe:cNTe0;OohIYe:mpEAQb;Pjplud:EEDORb,PoEs9b;Q6C5kf:pfdZCe;QGR0gd:Mlhmy;QHcAG:Osl0G;Qoo2ob:SWzGQe;R4IIIb:QWfeKf;R9Ulx:CR7Ufe;RDNBlf:zPRCJb;Rlgi2d:s4kmTe;SFqMfe:d7N0Ze;SLtqO:Kh1xYe;SNUn3:ZwDk9d,x8cHvb;ScI3Yc:e7Hzgb;SnFeMb:gIO09b;SzQQ3e:dNhofb;TxfV6d:YORN0b;UDrY1c:eps46d;UVmjEd:EesRsb;UVzb9c:IvPZ6d;UyG7Kb:wQd0G;V2HTTe:RolTY;VGRfx:VFqbr;VN6jIc:ddQyuf;VOcgDe:YquhTb;VxQ32b:k0XsBb;W1Xvfd:KwNFR;WDGyFe:jcVOxd;Wfmdue:g3MJlb;XUezZ:sa7lqb;XcupOe:nPGmVc;YIZmRd:A1yn5d;YV5bee:IvPZ6d,W0fpg;ZMvdv:PHFPjb;ZSH6tc:QAvyLe;ZlOOMb:P0I0Ec;a56pNe:JEfCwb;aAJE9c:WHW6Ef;aCJ9tf:qKftvc;aZ61od:arTwJ;af0EJf:ghinId;aoM3kc:RmZU0e;bDXwRe:UsyOtc;bcPXSc:gSZLJb;cEt90b:ws9Tlc;cFTWae:gT8qnd;cZGwze:Uq2Ztb;csKcjd:ciLywf;dIoSBb:SpsfSb;dLlj2:Qqt3Gf;daB6be:lMxGPd;dowIGb:ebZ3mb;dtl0hd:lLQWFe;eBAeSb:zbML3c;eBZ5Nd:audvde;eHDfl:ofjVkb;eO3lse:TC8ZNd;euOXY:OZjbQ;fcYTHe:rDv7Wc;flqRgb:ox2Q7c;fufDm:kGNN9b;g8nkx:U4MzKc;gPGwWe:ds8otb;gaub4:TN6bMe;gtVSi:ekUOYd;h3MYod:wV5Pjc;hAnnod:ca128b;hK67qb:QWEO5b;heHB1:sFczq;hjRo6e:F62sG;hsLsYc:Vl118;iFQyKf:QIhFr,vfuNJf;imqimf:jKGL2e;jGHevf:wsoZ3c;jWrxGe:FHj41b;jlykkc:Ixcocc;kCQyJ:ueyPK;kMFpHd:OTA3Ae;kbAm9d:MkHyGd;kbIuKc:rDv7Wc;kyjn6b:CfXVTe;lkq0A:IbjKve;lx12yf:dzcQzd;nAFL3:NTMZac,s39S4;oGtAuc:sOXFj;okUaUd:Kg1rBc,wItadb;pKJiXd:VCenhc;pNsl2d:j9Yuyc;pXdRYb:MdUzUe;pj82le:ww04Df;qZx2Fc:j0xrE;qaS3gd:yiLg6e;qavrXe:zQzcXe;qddgKe:R9YHJc,d7YSfd,x4FYXe;qsajS:qGotLb;rQSrae:C6D5Fc;rebY5d:S5i2J;sTsDMc:kHVSUb;sZmdvc:rdGEfc;slvZxc:FU6yf;tGdRVe:b5f3kc;tH4IIe:NoECLb,Ymry6;tosKvd:ZCqP3;trZL0b:qY8PFe;ttWQK:um1fmf;uuQkY:u2V3ud;vAvu5d:O6oXm;vEYCNb:FaqsVd;vGrMZ:Y1W8Ad;vXy3B:yzQjhd;vfVwPd:lcrkwe;w3bZCb:ZPGaIb;w4rSdf:XKiZ9;w9w86d:aIe7ef;wQlYve:aLUfP;wR5FRb:O1Gjze,siKnQd;wV5Pjc:L8KGxe,nQze3d;xBbsrc:NEW1Qc;xMUn6e:e0kzxe;xqZiqf:BBI74;ysNiMc:CpIBjd;yxTchf:KUM7Z;z97YGf:oug9te;zaIgPb:Qtpxbd,l09DXe,q8mB0c;zxnPse:GkRiKb/m=_gbm,xUdipf,NwH0H,RMhBfe,w9hDv,VwDzFe,A7fCU"
                                                        Preview:"use strict";loaded_0(function(_){var window=this;._._F_toggles_initialize=function(a){(typeof globalThis!=="undefined"?globalThis:typeof self!=="undefined"?self:this)._F_toggles=a||[]};(0,_._F_toggles_initialize)([0x21087104, 0x800000, 0xd01100, 0x10, 0x0, 0x0, 0x0, 0x480000, 0x0, 0x0, 0x100, 0x24d44ac5, 0xc800000, 0x1d813fa1, 0x20008000, 0x3d0fc01f, 0x3ffff404, 0x427, 0x870002, 0x2f0f, 0x544, 0x28c00410, 0x19c24123, 0x2300040a, 0x11a00381, 0x64, 0x8800010, 0x0, 0x4380000, 0x2000020e, 0x20834811, 0xb444108, 0x2018801, 0x6800090, 0x2655c680, 0x42210, 0x204, 0x8722128, 0x24801869, 0x1b0055bb, 0x10040951, 0x7c40050, 0x8025, 0x10480684, 0x408042, 0x2042000, 0x300, 0x2205, 0x18074400, 0x278, 0xd0e40e6, 0x11ac0090, 0xcc0c100, 0xe0001, 0x38000000, 0x1807864, 0x8, 0x0, 0x0, 0x3c8a8400, 0x22a022, 0x0, 0x0, 0x0, 0x13400400, 0x2, ]);./*.. Copyright The Closure Library Authors.. SPDX-License-Identifier: Apache-2.0.*/./*.. Copyright Google LLC. SPDX-License-Identifier: Apache-2.0.*/./*. SPDX-Licen
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (522)
                                                        Category:dropped
                                                        Size (bytes):1546
                                                        Entropy (8bit):5.349962833237794
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:BF1E3A34A7F90D78493BF62183765583
                                                        SHA1:69F704577AE1B6F7DBB4260C1BD1D0ACA427939E
                                                        SHA-256:5A652908A4156CAF19320894EA4C7C8F7D95BE4E38C8916722BAB621384EB836
                                                        SHA-512:E267A0C5EAB36E830E0B556A1BC7F5ECBCB2DC1FB0E847C64F71344BA87F8F8B294948976D809F576F5F9EAA6451CF6BF961C6181FD3013BD402D26A57C568C9
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:this._s=this._s||{};(function(_){var window=this;.try{._.u("lOO0Vd");._.nbb=new _.le(_.QLa);._.v();.}catch(e){_._DumpException(e)}.try{.var wbb;wbb=function(a){return Math.random()*Math.min(a.pSd*Math.pow(a.J9b,a.e1b),a.j_d)};_.xbb=function(a){if(!a.FUa())throw Error("qe`"+a.Blb);++a.e1b;a.I9b=wbb(a)};_.ybb=class{constructor(a,b,c,d,e){this.Blb=a;this.pSd=b;this.J9b=c;this.j_d=d;this.f9d=e;this.e1b=0;this.I9b=wbb(this)}pWc(){return this.e1b}FUa(a){return this.e1b>=this.Blb?!1:a!=null?!!this.f9d[a]:!0}};.}catch(e){_._DumpException(e)}.try{._.u("P6sQOc");.var zbb=function(a){const b={};_.Wa(a.Ga(),e=>{b[e]=!0});const c=a.Ba(),d=a.Da();return new _.ybb(a.Ca(),c.Aa()*1E3,a.Aa(),d.Aa()*1E3,b)},Abb=!!(_.jh[36]&2048);var Bbb=function(a,b,c,d){return c.then(e=>e,e=>{if(Abb)if(e instanceof _.Ig){if(!e.status||!d.FUa(e.status.Vu()))throw e;}else{if("function"==typeof _.e7a&&e instanceof _.e7a&&e.oa!==103&&e.oa!==7)throw e;}else if(!e.status||!d.FUa(e.status.Vu()))throw e;return _.Eg(d.I9b).then(
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 148x83, components 3
                                                        Category:dropped
                                                        Size (bytes):2864
                                                        Entropy (8bit):7.828570307167662
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:A32354AE418EA2B6C9F2661F0079D11C
                                                        SHA1:AFF6C1A14C75FB7902F36A98592655D1F115A570
                                                        SHA-256:4A621C0DD8FC0EDECC148FE786CC3BD94E6075390A4138BBFAFDC831CFA95250
                                                        SHA-512:CC80B2BE3834357AFF16AF709B1F04EE819DF745FAAF6EC0D11DD7F8D78539B39417332B055FA703391036B24774093627D7C0178508720E1DD8ABAADB73A75D
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:......JFIF......................................... ."" ...$(4,$&1'..-=-157:::#+?D?8C49:7...........7%.%77777777777777777777777777777777777777777777777777......S....".......................................6.........................!1.."AQ.2aq..#BR.....s..$3C...............................).......................!."1AQ.2a.S.BR..............?...M+R.F...?J.i&.....YcP....1$`....>u.''..Vko.M...DSJ....$.i.wP....W.........*....+...V.E..i.$4..4.1Zi....).h.k.h..b.V...y{ok...E..Jq..1Z.GJ..!...5Y....=..ys.;[...!.:.b.mso..i.1t.....?.i....X.C*.;"..iH<m.4R.....w7...XF.(.R. \t>....i4k.;."..@.y.$.W1......n~....N..)..Y.0....=...q$...9dpT.r:..7...t.ES.S^.gVI.3igs,..v...v..N...}........f*.R2A...+Oy.kSGgu%..Eu.F.nx. Fs..'..A.{S...v....2d9...I<.1.....E.'....w...[......G.4.....H..tX...l.[>....Z.....#.F"-$..%..bI..g>..v.X...Z#.....=..X....0x.y2._b.2.........a.=q.Ae .A.u.....VMP.Mg.v.5....a2...$....1T.c}wpe.3.......s..._QVC$../..aZiZ..i.. .s..l9#.V..E.Z.....$..R<.u.%..bI<.kC.`J
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
                                                        Category:dropped
                                                        Size (bytes):17174
                                                        Entropy (8bit):2.9129715116732746
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:12E3DAC858061D088023B2BD48E2FA96
                                                        SHA1:E08CE1A144ECEAE0C3C2EA7A9D6FBC5658F24CE5
                                                        SHA-256:90CDAF487716184E4034000935C605D1633926D348116D198F355A98B8C6CD21
                                                        SHA-512:C5030C55A855E7A9E20E22F4C70BF1E0F3C558A9B7D501CFAB6992AC2656AE5E41B050CCAC541EFA55F9603E0D349B247EB4912EE169D44044271789C719CD01
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:..............h(..f...HH...........(..00......h....6.. ...........=...............@..........(....A..(....................(....................................."P.........................................."""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333""""""""""""""""""""""""""
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (65339), with CRLF line terminators
                                                        Category:downloaded
                                                        Size (bytes):659798
                                                        Entropy (8bit):5.352921769071548
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:9786D38346567E5E93C7D03B06E3EA2D
                                                        SHA1:23EF8C59C5C9AA5290865933B29C9C56AB62E3B0
                                                        SHA-256:263307E3FE285C85CB77CF5BA69092531CE07B7641BF316EF496DCB5733AF76C
                                                        SHA-512:4962CDF483281AB39D339A7DA105A88ADDB9C210C9E36EA5E36611D7135D19FEC8B3C9DBA3E97ABB36D580F194F1860813071FD6CBEDE85D3E88952D099D6805
                                                        Malicious:false
                                                        Reputation:unknown
                                                        URL:https://r4.res.office365.com/owa/prem/15.20.8069.29/scripts/boot.worldwide.1.mouse.js
                                                        Preview:.window.scriptsLoaded = window.scriptsLoaded || {}; window.scriptProcessStart = window.scriptProcessStart || {}; window.scriptProcessStart['boot.worldwide.1.mouse.js'] = (new Date()).getTime();..;_a.d.G=function(n,t){this.b=n;this.a=t};_a.d.G.prototype={b:0,a:0};_a.fo=function(n){this.s=n};_a.fo.prototype={s:null,t:null,i:function(){return this.s.currentTarget},e:function(){return this.t?this.t.x:this.s.pageX},f:function(){return this.t?this.t.y:this.s.pageY},o:function(){return this.s.relatedTarget},b:function(){return this.s.target},n:function(){return this.s.timeStamp||+new Date},a:function(){var n=this.s.which;!n&&_a.o.a().K&&this.s.type==="keypress"&&(n=this.u());return n},u:function(){return this.s.keyCode},m:function(){return this.s.originalEvent},j:function(){return this.s.type},k:function(){return this.s.originalEvent.touches},q:function(){return this.s.isDefaultPrevented()},g:function(){return this.s.shiftKey},h:function(){return _j.G.a().P?this.s.metaKey:this.s.ctrlKey},l:
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (46090)
                                                        Category:downloaded
                                                        Size (bytes):141866
                                                        Entropy (8bit):5.429983887489752
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:2509D4C564AFC2C77D16BA6CA509B39F
                                                        SHA1:201F1D80F8EEA9F5E8A7A7224CFF18674344F886
                                                        SHA-256:D468D9F009E53FE1C47B9D6FDEFA3FF1A8C239973F11A6F892848E341EA17CCD
                                                        SHA-512:C928C36D58BB0B2740E9BE3F3CA3F49624253F8DAD93BA7524E55F24CCCAF630E35FCA8C596CBCE50A0C1214C4986034FD3E26D98F759949C179C54009D5D93E
                                                        Malicious:false
                                                        Reputation:unknown
                                                        URL:https://aadcdn.msftauth.net/shared/1.0/content/js/BssoInterrupt_Core_JQnUxWSvwsd9FrpspQmznw2.js
                                                        Preview:/*!. * ------------------------------------------- START OF THIRD PARTY NOTICE -----------------------------------------. * . * This file is based on or incorporates material from the projects listed below (Third Party IP). The original copyright notice and the license under which Microsoft received such Third Party IP, are set forth below. Such licenses and notices are provided for informational purposes only. Microsoft licenses the Third Party IP to you under the licensing terms for the Microsoft product. Microsoft reserves all other rights not expressly granted under this agreement, whether by implication, estoppel or otherwise.. * . * json2.js (2016-05-01). * https://github.com/douglascrockford/JSON-js. * License: Public Domain. * . * Provided for Informational Purposes Only. * . * ----------------------------------------------- END OF THIRD PARTY NOTICE ------------------------------------------. */!function(e){function t(t){for(var n,r,i=t[0],a=t[1],s=0,u=[];s<i.length;s++)
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text
                                                        Category:downloaded
                                                        Size (bytes):19
                                                        Entropy (8bit):3.6818808028034042
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:9FAE2B6737B98261777262B14B586F28
                                                        SHA1:79C894898B2CED39335EB0003C18B27AA8C6DDCD
                                                        SHA-256:F55F6B26E77DF6647E544AE5B45892DCEA380B7A6D2BFAA1E023EA112CE81E73
                                                        SHA-512:29CB8E5462B15488B0C6D5FC1673E273FB47841E9C76A4AA5415CA93CEA31B87052BBA511680F2BC9E6543A29F1BBFBA9D06FCC08F5C65BEB115EE7A9E5EFF36
                                                        Malicious:false
                                                        Reputation:unknown
                                                        URL:https://www.google.com/async/ddljson?async=ntp:2
                                                        Preview:)]}'.{"ddljson":{}}
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (994), with no line terminators
                                                        Category:downloaded
                                                        Size (bytes):994
                                                        Entropy (8bit):4.934955158256183
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:E2110B813F02736A4726197271108119
                                                        SHA1:D7AC10CC425A7B67BF16DDA0AAEF1FEB00A79857
                                                        SHA-256:6D1BE7ED96DD494447F348986317FAF64728CCF788BE551F2A621B31DDC929AC
                                                        SHA-512:E79CF6DB777D62690DB9C975B5494085C82E771936DB614AF9C75DB7CE4B6CA0A224B7DFB858437EF1E33C6026D772BE9DBBB064828DB382A4703CB34ECEF1CF
                                                        Malicious:false
                                                        Reputation:unknown
                                                        URL:https://r4.res.office365.com/owa/prem/15.20.8069.29/resources/images/0/sprite1.mouse.css
                                                        Preview:.image-loading_blackbg-gif{background:url('loading_blackbg.gif');width:16px;height:16px}.image-loading_whitebg-gif{background:url('loading_whitebg.gif');width:16px;height:16px}.image-thinking16_blue-gif{background:url('thinking16_blue.gif');width:16px;height:16px}.image-thinking16_grey-gif{background:url('thinking16_grey.gif');width:16px;height:16px}.image-thinking16_white-gif{background:url('thinking16_white.gif');width:16px;height:16px}.image-thinking24-gif{background:url('thinking24.gif');width:24px;height:24px}.image-thinking32_blue-gif{background:url('thinking32_blue.gif');width:32px;height:32px}.image-thinking32_grey-gif{background:url('thinking32_grey.gif');width:32px;height:32px}.image-thinking32_white-gif{background:url('thinking32_white.gif');width:32px;height:32px}.image-clear1x1-gif{width:1px;height:1px;background:url('sprite1.mouse.png') -0 -0}.csimg{padding:0;border:none;background-repeat:no-repeat;-webkit-touch-callout:none}span.csimg{-ms-high-contrast-adjust:none}
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
                                                        Category:dropped
                                                        Size (bytes):350
                                                        Entropy (8bit):6.922576431804136
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:F8F20B1A0E5303C04EBAAFD7F09A625C
                                                        SHA1:ED0ED603206887E2D5AE2F0F770ADC2B869DE6DA
                                                        SHA-256:895172C5269BC2F7F1B26A807944106D88FEF304586399A0D9A10E21C6A8DD46
                                                        SHA-512:C8D8FEB29312771F14B72A6DC992303508A66B0CBDC85AF2EF9659AA36A3F7806ABBA595FB83F36DBF164962DB4493B00E5ECDAC8DA41EAB56DD146D8D9F7C0C
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:.PNG........IHDR... ... .....szz....%IDATx....d.@......P.A0.0.C1`.......a......C...Eq........0...C..^{........... DBS...I.:+I..H..H.......?.N.....WB..e.._B .[@M.dk..`..o...|.VU.|.u...0.......L..0.r....k M]#...o^....(........H...^.....s._........nr.S.`u...M..E4.{_D..M.D..6.@...wB.-=.......-.%l3.$.H..8.z.?R..%}.0...w..=y>2;......IEND.B`.
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (790)
                                                        Category:dropped
                                                        Size (bytes):795
                                                        Entropy (8bit):4.9484364806748005
                                                        Encrypted:false
                                                        SSDEEP:
                                                        MD5:79CE5E84E0A2EBFEC54A0864DF785C8B
                                                        SHA1:ED25F53FD88905F9D7206CE75E66EF3FA47C9C80
                                                        SHA-256:3B3782FC9F3CCC8EC009D7F0059CE32FC377D93561FC0300494D6658EA3A55D1
                                                        SHA-512:43F1976CA5A89722031AC7ABCC8FD1EA64FC0837E9918EC2B847B0B5F017989586794DDBE8063875A2552BEAEBCF52A012D555F1C46AF958E38AD5EEB80E19E6
                                                        Malicious:false
                                                        Reputation:unknown
                                                        Preview:)]}'.[[["\u003cb\u003eemail address example list\u003c\/b\u003e",0,[432,598,71]],["\u003cb\u003e5 examples of email address\u003c\/b\u003e",0,[432,598,71]],["\u003cb\u003eprofessional email address examples\u003c\/b\u003e",0,[432,598,71]],["\u003cb\u003eemail address example gmail\u003c\/b\u003e",0,[432,598,71]],["\u003cb\u003eemail address example for students\u003c\/b\u003e",0,[432,598,71]],["\u003cb\u003eemail address example for job application\u003c\/b\u003e",0,[432,598,71]],["\u003cb\u003ehow to create email address example\u003c\/b\u003e",0,[432,598,71]],["\u003cb\u003eexample of email address and password\u003c\/b\u003e",0,[432,598,71]],["email address",0,[512,432,67,650]],["\u003cb\u003emy \u003c\/b\u003eemail address",0,[512,432,67,650]]],{"q":"wtaV_TGRAsczkCog0BPUE-tJH88"}]
                                                        File type:Microsoft OOXML
                                                        Entropy (8bit):7.974583915979059
                                                        TrID:
                                                        • Word Microsoft Office Open XML Format document (49504/1) 58.23%
                                                        • Word Microsoft Office Open XML Format document (27504/1) 32.35%
                                                        • ZIP compressed archive (8000/1) 9.41%
                                                        File name:INV00663.docx
                                                        File size:51'754 bytes
                                                        MD5:28005f53e787bd2a5c277d7c452e6a42
                                                        SHA1:8bfc4a9d4f99fdb7907948ef31e4c46a89e75c9e
                                                        SHA256:b85c6430623ed7f1491b29bc1d06cc03d923db5909adeb586adcb0251d3641ae
                                                        SHA512:566b6774f8a165ed9b8adbe9206ae972cfd53439a3b3d471c6e2aa4ec959132ca018e386cc58fe604717b71239046af0c7f1b67033846d6226fd25ce3cfad76e
                                                        SSDEEP:1536:Um7rZHI6r/CGD5uLmdUPizVvpPJUOmatq:Um7rZHfCTmSKxvpPJUO8
                                                        TLSH:A033F134861B1471E5A7AA36AD1A4EE1F524DE90C08D3BCD385FC63970B3ACE5B37109
                                                        File Content Preview:PK.........sUY................[Content_Types].xml..OO.0...|.(..P....VM9,p\.(b..3i..'....g.h...)[.D.g.{...gz.dM....wuqTM.....v...._.'E.$]#.wP....tv0.o.`.b.u.".?.@..+....WZ..$~.K....K.?&.c..#pTR..g.3h..Pv....H~.`.g.^.SV.k.......7,I......Id.F+I\...y7K.:G....
                                                        Icon Hash:35e5c48caa8a8599