Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
[EXTERNAL] Oakville shared ''o_akville_853473074_21.11.2024''.eml

Overview

General Information

Sample name:[EXTERNAL] Oakville shared ''o_akville_853473074_21.11.2024''.eml
Analysis ID:1560486
MD5:8f50586a80d369b87fe4639ad0de4d3f
SHA1:3b71be69b6f88c21506831b572862f5d882024a0
SHA256:e4d56a20a847be7f63548d3936a08ebeaf340e948bd8377ceb2d8c35ff9270e8
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected landing page (webpage, office document or email)
AI detected potential phishing Email
Creates a window with clipboard capturing capabilities
HTML body with high number of embedded images detected
Queries the volume information (name, serial number etc) of a device
Sigma detected: Office Autorun Keys Modification
Sigma detected: Outlook Security Settings Updated - Registry
Stores files to the Windows start menu directory
Stores large binary data to the registry

Classification

  • System is w10x64_ra
  • OUTLOOK.EXE (PID: 6180 cmdline: "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml "C:\Users\user\Desktop\[EXTERNAL] Oakville shared ''o_akville_853473074_21.11.2024''.eml" MD5: 91A5292942864110ED734005B7E005C0)
    • ai.exe (PID: 7068 cmdline: "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "A91345EF-5590-4D27-B36A-B3D54923591D" "E5CAC747-9BEB-4C2F-9CE9-2315DB8BDB92" "6180" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx" MD5: EC652BEDD90E089D9406AFED89A8A8BD)
    • chrome.exe (PID: 6604 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://www.google.co.tz/url?url=https://oviteweltxddfrszluspazr&ipmp=sxvjova&ygojnb=fcl&elerk=hfbmay&ayt=yrhphmb&pddud=ezxxsf&nuqs=zlhwdht&gaxffgl=pszq&duvvs=volgvy&gkxzodc=jel&qxfv=nnvdnwmd&rqqvtcmspp=rxqkebhlxe&q=amp/shxzygr.a%c2%adyqbtb%c2%adbx%c2%adj%c2%adp%c2%adx%c2%adjxlcs%c2%ads.com%e2%80%8b/b8b2rxwmh&ksla=tapqwwz&jnnbhkq=ttdmivnp&cfjt=efvfrgoe&oqiqdbkskf=kyuuqptwrp&tvge=dkzlwfl&xinkvob=ipnmjidq&ijie=uljbrnkt&otqzapkzkg=kmqusroise&pria=nlusrhl&ymcacxc=zcifoamd&qigt=tulcumns&hhzbkqbcaz=wwvxgvrfea&yjoo=dorlplq&setubwl=gxyhfmbx&shjzsftutp=fpvhstinfx&aabm=criocrm&hjizanz=pegjdgeo&fawgntlmwo=jqpmhlrvtn&roup=izmvjyq&gxeotbo=usfofocn&bjditvldqx=ouxvzuvslt&vvra=ilqxudw&urpmgcs=ymqwcpzq&yrvwdmllag=vdvavnqley&nzuk=ccmlbne&nkpwqws=sngrhfzo&gbgxvugiga=ryzhrucpyl&irec=txrssof&zsogcrm=iayomywb&trpv=tsllqaa&ikkahrz=owzvqchv&nvsg=jqklsur&mifuzci=ijrnkgyc&gxpk=lvdrwxp&ijyljat=mglwbmtx&atpa=zczuwuy&wqrobkl=kbbvlqru&smzd=ipgsgqz&tspepjo=zblbkdbs&cuqg=qokwyqc&pngakdv=hnokowhl&kmzi=utnaspz&isnjuod=nzzrblql&gwhl=insrinb&ysonvuu=wjleaqhv&ilqq=ittadax&ktcegkw=uqqodjle&wwle=anzcjil&cvtwsas=ttchqbwr&thbw=fstnzsh&thhglee=kzsgswit&iizz=hpvogha&hmbwuzq=filorduk&cunp=nhwvcbd&gdrvwdv=gqwwbzuq&ilty=eagyudc&itknbva=sbfavtnk&gjlu=nqaglxn&mrmfjee=xwpodlmj&qknk=uggtyao&mdaaclr=jwmwywrx&nxgd=ydqqawk&ibskbyz=eujqstmb&hpkr=mlxxgks&eivxpwq=otpwhioj&hvrx=zuchxtx&hdmpdgk=wnnxxklk&fazk=kyqhssx&geglyya=dlvpwlnm&avcm=dnnwuqs&dlofbgz=ngnlfhga&zqkj=hoqixkx&zrenpfy=ojcmmoyy&kobu=kpbpvty&rxmqemn=gsprqvuf&ahrr=hewpbki&qxmoqna=smtuczoj&covv=etxdord&vpvelhe=dapyasoe&cudt=pdgwaay&kleugke=oxqfwiqw&hljb=epcyxdm&ypctgvo=czuuwire&crax=cnxmiuw&spupbvv=ovqdpzqa&kjje=pjfavpg&kqvhacj=smqypqqz&jnoa=pobryjd&ynchqcn=rjxzoxwk&dkck=vkekqrr&acbvftn=krcgxouz&pjbb=xpkhnqv&ptoijep=rpxpmrhr&cpic=grnbkdg&rncpvec=wnlpnmju MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 6188 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2072 --field-trial-handle=1992,i,3721282133272914624,12938763162429345604,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 7740 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4348 --field-trial-handle=1992,i,3721282133272914624,12938763162429345604,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No yara matches
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE, ProcessId: 6180, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Addins\OneNote.OutlookAddin\1
Source: Registry Key setAuthor: frack113: Data: Details: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\UJTJBXOB\, EventID: 13, EventType: SetValue, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE, ProcessId: 6180, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Security\OutlookSecureTempFolder
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

Phishing

barindex
Source: EmailJoe Sandbox AI: Page contains button: 'Open' Source: 'Email'
Source: EmailJoe Sandbox AI: Email contains prominent button: 'open'
Source: EmailJoe Sandbox AI: Detected potential phishing email: Suspicious sender domain 'esl-fluency-lab.com' with random numbers and unusual subdomain structure. Contains randomly generated text/strings (e.g., 'EWmskPvW bztBBTVHXVkdUtJ') and repetitive content. Uses urgency tactics asking to confirm email with suspicious links and includes a suspicious 'beautifulacacia.com' domain
Source: https://www.google.com/search?q=https%3A%2F%2Foviteweltxddfrszluspazr%26ipmp%3Dsxvjova%26ygojnb%3Dfcl%26elerk%3Dhfbmay%26ayt%3Dyrhphmb%26pddud%3Dezxxsf%26nuqs%3Dzlhwdht%26gaxffgl%3Dpszq%26duvvs%3Dvolgvy%26gkxzodc%3Djel%26qxfv%3Dnnvdnwmd%26rqqvtcmspp%3Drxqkebhlxe%26q%3Damp%2Fshxzygr.a%25c2%25adyqbtb%25c2%25adbx%25c2%25adj%25c2%25adp%25c2%25adx%25c2%25adjxlcs%25c2%25ads.com%25e2%2580%258b%2Fb8b2rxwmh%26ksla%3Dtapqwwz%26jnnbhkq%3Dttdmivnp%26cfjt%3Defvfrgoe%26oqiqdbkskf%3Dkyuuqptwrp%26tvge%3Ddkzlwfl%26xinkvob%3Dipnmjidq%26ijie%3Duljbrnkt%26otqzapkzkg%3Dkmqusroise%26pria%3Dnlusrhl%26ymcacxc%3Dzcifoamd%26qigt%3Dtulcumns%26hhzbkqbcaz%3Dwwvxgvrfea%26yjoo%3Ddorlplq%26setubwl%3Dgxyhfmbx%26shjzsftutp%3Dfpvhstinfx%26aabm%3Dcriocrm%26hjizanz%3Dpegjdgeo%26fawgntlmwo%3Djqpmhlrvtn%26roup%3Dizmvjyq%26gxeotbo%3Dusfofocn%26bjditvldqx%3Douxvzuvslt%26vvra%3Dilqxudw%26urpmgcs%3Dymqwcpzq%26yrvwdmllag%3Dvdvavnqley%26nzuk%3Dccmlbne%26nkpwqws%3Dsngrhfzo%26gbgxvugiga%3Dryzhrucpyl%26irec%3Dtxrssof%26zsogcrm%3Diayomywb%26trpv%3Dtsllqaa%2...HTTP Parser: Total embedded image size: 12922
Source: https://www.google.com/HTTP Parser: No favicon
Source: https://www.google.com/HTTP Parser: No favicon
Source: https://www.google.com/HTTP Parser: No favicon
Source: https://www.google.com/HTTP Parser: No favicon
Source: https://www.google.com/HTTP Parser: No favicon
Source: https://www.google.com/search?q=https%3A%2F%2Foviteweltxddfrszluspazr%26ipmp%3Dsxvjova%26ygojnb%3Dfcl%26elerk%3Dhfbmay%26ayt%3Dyrhphmb%26pddud%3Dezxxsf%26nuqs%3Dzlhwdht%26gaxffgl%3Dpszq%26duvvs%3Dvolgvy%26gkxzodc%3Djel%26qxfv%3Dnnvdnwmd%26rqqvtcmspp%3Drxqkebhlxe%26q%3Damp%2Fshxzygr.a%25c2%25adyqbtb%25c2%25adbx%25c2%25adj%25c2%25adp%25c2%25adx%25c2%25adjxlcs%25c2%25ads.com%25e2%2580%258b%2Fb8b2rxwmh%26ksla%3Dtapqwwz%26jnnbhkq%3Dttdmivnp%26cfjt%3Defvfrgoe%26oqiqdbkskf%3Dkyuuqptwrp%26tvge%3Ddkzlwfl%26xinkvob%3Dipnmjidq%26ijie%3Duljbrnkt%26otqzapkzkg%3Dkmqusroise%26pria%3Dnlusrhl%26ymcacxc%3Dzcifoamd%26qigt%3Dtulcumns%26hhzbkqbcaz%3Dwwvxgvrfea%26yjoo%3Ddorlplq%26setubwl%3Dgxyhfmbx%26shjzsftutp%3Dfpvhstinfx%26aabm%3Dcriocrm%26hjizanz%3Dpegjdgeo%26fawgntlmwo%3Djqpmhlrvtn%26roup%3Dizmvjyq%26gxeotbo%3Dusfofocn%26bjditvldqx%3Douxvzuvslt%26vvra%3Dilqxudw%26urpmgcs%3Dymqwcpzq%26yrvwdmllag%3Dvdvavnqley%26nzuk%3Dccmlbne%26nkpwqws%3Dsngrhfzo%26gbgxvugiga%3Dryzhrucpyl%26irec%3Dtxrssof%26zsogcrm%3Diayomywb%26trpv%3Dtsllqaa%2...HTTP Parser: No favicon
Source: https://www.google.com/HTTP Parser: No favicon
Source: https://www.google.com/search?q=https%3A%2F%2Foviteweltxddfrszluspazr%26ipmp%3Dsxvjova%26ygojnb%3Dfcl%26elerk%3Dhfbmay%26ayt%3Dyrhphmb%26pddud%3Dezxxsf%26nuqs%3Dzlhwdht%26gaxffgl%3Dpszq%26duvvs%3Dvolgvy%26gkxzodc%3Djel%26qxfv%3Dnnvdnwmd%26rqqvtcmspp%3Drxqkebhlxe%26q%3Damp%2Fshxzygr.a%25c2%25adyqbtb%25c2%25adbx%25c2%25adj%25c2%25adp%25c2%25adx%25c2%25adjxlcs%25c2%25ads.com%25e2%2580%258b%2Fb8b2rxwmh%26ksla%3Dtapqwwz%26jnnbhkq%3Dttdmivnp%26cfjt%3Defvfrgoe%26oqiqdbkskf%3Dkyuuqptwrp%26tvge%3Ddkzlwfl%26xinkvob%3Dipnmjidq%26ijie%3Duljbrnkt%26otqzapkzkg%3Dkmqusroise%26pria%3Dnlusrhl%26ymcacxc%3Dzcifoamd%26qigt%3Dtulcumns%26hhzbkqbcaz%3Dwwvxgvrfea%26yjoo%3Ddorlplq%26setubwl%3Dgxyhfmbx%26shjzsftutp%3Dfpvhstinfx%26aabm%3Dcriocrm%26hjizanz%3Dpegjdgeo%26fawgntlmwo%3Djqpmhlrvtn%26roup%3Dizmvjyq%26gxeotbo%3Dusfofocn%26bjditvldqx%3Douxvzuvslt%26vvra%3Dilqxudw%26urpmgcs%3Dymqwcpzq%26yrvwdmllag%3Dvdvavnqley%26nzuk%3Dccmlbne%26nkpwqws%3Dsngrhfzo%26gbgxvugiga%3Dryzhrucpyl%26irec%3Dtxrssof%26zsogcrm%3Diayomywb%26trpv%3Dtsllqaa%2...HTTP Parser: No favicon
Source: unknownHTTPS traffic detected: 23.218.208.109:443 -> 192.168.2.16:49704 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.218.208.109:443 -> 192.168.2.16:49711 version: TLS 1.2
Source: unknownHTTPS traffic detected: 172.202.163.200:443 -> 192.168.2.16:49714 version: TLS 1.2
Source: unknownHTTPS traffic detected: 172.202.163.200:443 -> 192.168.2.16:49797 version: TLS 1.2
Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /b8b2rxwmh HTTP/1.1Host: shxzygr.ayqbtbbxjpxjxlcss.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /b8b2rxwmh HTTP/1.1Host: shxzygr.ayqbtbbxjpxjxlcss.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficDNS traffic detected: DNS query: www.google.co.tz
Source: global trafficDNS traffic detected: DNS query: shxzygr.ayqbtbbxjpxjxlcss.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: csp.withgoogle.com
Source: global trafficDNS traffic detected: DNS query: play.google.com
Source: global trafficDNS traffic detected: DNS query: apis.google.com
Source: global trafficDNS traffic detected: DNS query: dns-tunnel-check.googlezip.net
Source: global trafficDNS traffic detected: DNS query: tunnel.googlezip.net
Source: global trafficDNS traffic detected: DNS query: id.google.com
Source: global trafficDNS traffic detected: DNS query: i.ytimg.com
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49865
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
Source: unknownNetwork traffic detected: HTTP traffic on port 49817 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49864
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49863
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49862
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49861
Source: unknownNetwork traffic detected: HTTP traffic on port 49789 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49800 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49898 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49875 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49852 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49795 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
Source: unknownNetwork traffic detected: HTTP traffic on port 49881 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49857
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49855
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49854
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49853
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49852
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49850
Source: unknownNetwork traffic detected: HTTP traffic on port 49812 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49893 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49823 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49848
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49847
Source: unknownNetwork traffic detected: HTTP traffic on port 49886 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49846
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49845
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49844
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49843
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49842
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49834 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49892 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49828 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49805 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49839
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
Source: unknownNetwork traffic detected: HTTP traffic on port 49847 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49834
Source: unknownNetwork traffic detected: HTTP traffic on port 49887 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49832
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49830
Source: unknownNetwork traffic detected: HTTP traffic on port 49839 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49864 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49822 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49853 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49796 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49829
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
Source: unknownNetwork traffic detected: HTTP traffic on port 49811 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49828
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49827
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49826
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49824
Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49823
Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49822
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49787
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49786
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
Source: unknownNetwork traffic detected: HTTP traffic on port 49813 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49845 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49791 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49885 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49899
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49898
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49897
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49896
Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49895
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
Source: unknownNetwork traffic detected: HTTP traffic on port 49862 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49894
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49893
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49892
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49891
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49890
Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49897 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49879 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49830 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49889
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49888
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49887
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49886
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49885
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
Source: unknownNetwork traffic detected: HTTP traffic on port 49863 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49884
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49883
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49882
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49881
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49880
Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49857 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49896 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49797 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49824 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49879
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49878
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49877
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49876
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49875
Source: unknownNetwork traffic detected: HTTP traffic on port 49891 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49874
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49873
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49872
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49871
Source: unknownNetwork traffic detected: HTTP traffic on port 49786 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49874 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49829 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49880 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49846 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49792 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49867
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
Source: unknownNetwork traffic detected: HTTP traffic on port 49890 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49878 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49803 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49826 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49889 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49900 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49820 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49872 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49855 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49861 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49901 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49844 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49873 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49787 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49850 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49799
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49797
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49796
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49795
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49794
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49793
Source: unknownNetwork traffic detected: HTTP traffic on port 49814 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49792
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49791
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49895 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49808 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49884 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49867 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49789
Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49821
Source: unknownNetwork traffic detected: HTTP traffic on port 49865 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49820
Source: unknownNetwork traffic detected: HTTP traffic on port 49842 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49871 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49894 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49799 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49810 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49817
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49816
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49815
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49814
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49813
Source: unknownNetwork traffic detected: HTTP traffic on port 49902 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49812
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49811
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49810
Source: unknownNetwork traffic detected: HTTP traffic on port 49816 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49794 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49827 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49876 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49809
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49808
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49805
Source: unknownNetwork traffic detected: HTTP traffic on port 49848 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49882 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49804
Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49803
Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49800
Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49821 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49815 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49877 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49854 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49809 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49883 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49843 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49899 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49804 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49832 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49902
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49901
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49900
Source: unknownNetwork traffic detected: HTTP traffic on port 49888 -> 443
Source: unknownHTTPS traffic detected: 23.218.208.109:443 -> 192.168.2.16:49704 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.218.208.109:443 -> 192.168.2.16:49711 version: TLS 1.2
Source: unknownHTTPS traffic detected: 172.202.163.200:443 -> 192.168.2.16:49714 version: TLS 1.2
Source: unknownHTTPS traffic detected: 172.202.163.200:443 -> 192.168.2.16:49797 version: TLS 1.2
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEWindow created: window name: CLIPBRDWNDCLASS
Source: classification engineClassification label: mal48.winEML@21/91@39/241
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\Documents\Outlook Files\~Outlook Data File - NoEmail.pst.tmp
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_16827_20130-20241121T1537230444-6180.etl
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile read: C:\Users\desktop.ini
Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml "C:\Users\user\Desktop\[EXTERNAL] Oakville shared ''o_akville_853473074_21.11.2024''.eml"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "A91345EF-5590-4D27-B36A-B3D54923591D" "E5CAC747-9BEB-4C2F-9CE9-2315DB8BDB92" "6180" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://www.google.co.tz/url?url=https://oviteweltxddfrszluspazr&ipmp=sxvjova&ygojnb=fcl&elerk=hfbmay&ayt=yrhphmb&pddud=ezxxsf&nuqs=zlhwdht&gaxffgl=pszq&duvvs=volgvy&gkxzodc=jel&qxfv=nnvdnwmd&rqqvtcmspp=rxqkebhlxe&q=amp/shxzygr.a%c2%adyqbtb%c2%adbx%c2%adj%c2%adp%c2%adx%c2%adjxlcs%c2%ads.com%e2%80%8b/b8b2rxwmh&ksla=tapqwwz&jnnbhkq=ttdmivnp&cfjt=efvfrgoe&oqiqdbkskf=kyuuqptwrp&tvge=dkzlwfl&xinkvob=ipnmjidq&ijie=uljbrnkt&otqzapkzkg=kmqusroise&pria=nlusrhl&ymcacxc=zcifoamd&qigt=tulcumns&hhzbkqbcaz=wwvxgvrfea&yjoo=dorlplq&setubwl=gxyhfmbx&shjzsftutp=fpvhstinfx&aabm=criocrm&hjizanz=pegjdgeo&fawgntlmwo=jqpmhlrvtn&roup=izmvjyq&gxeotbo=usfofocn&bjditvldqx=ouxvzuvslt&vvra=ilqxudw&urpmgcs=ymqwcpzq&yrvwdmllag=vdvavnqley&nzuk=ccmlbne&nkpwqws=sngrhfzo&gbgxvugiga=ryzhrucpyl&irec=txrssof&zsogcrm=iayomywb&trpv=tsllqaa&ikkahrz=owzvqchv&nvsg=jqklsur&mifuzci=ijrnkgyc&gxpk=lvdrwxp&ijyljat=mglwbmtx&atpa=zczuwuy&wqrobkl=kbbvlqru&smzd=ipgsgqz&tspepjo=zblbkdbs&cuqg=qokwyqc&pngakdv=hnokowhl&kmzi=utnaspz&isnjuod=nzzrblql&gwhl=insrinb&ysonvuu=wjleaqhv&ilqq=ittadax&ktcegkw=uqqodjle&wwle=anzcjil&cvtwsas=ttchqbwr&thbw=fstnzsh&thhglee=kzsgswit&iizz=hpvogha&hmbwuzq=filorduk&cunp=nhwvcbd&gdrvwdv=gqwwbzuq&ilty=eagyudc&itknbva=sbfavtnk&gjlu=nqaglxn&mrmfjee=xwpodlmj&qknk=uggtyao&mdaaclr=jwmwywrx&nxgd=ydqqawk&ibskbyz=eujqstmb&hpkr=mlxxgks&eivxpwq=otpwhioj&hvrx=zuchxtx&hdmpdgk=wnnxxklk&fazk=kyqhssx&geglyya=dlvpwlnm&avcm=dnnwuqs&dlofbgz=ngnlfhga&zqkj=hoqixkx&zrenpfy=ojcmmoyy&kobu=kpbpvty&rxmqemn=gsprqvuf&ahrr=hewpbki&qxmoqna=smtuczoj&covv=etxdord&vpvelhe=dapyasoe&cudt=pdgwaay&kleugke=oxqfwiqw&hljb=epcyxdm&ypctgvo=czuuwire&crax=cnxmiuw&spupbvv=ovqdpzqa&kjje=pjfavpg&kqvhacj=smqypqqz&jnoa=pobryjd&ynchqcn=rjxzoxwk&dkck=vkekqrr&acbvftn=krcgxouz&pjbb=xpkhnqv&ptoijep=rpxpmrhr&cpic=grnbkdg&rncpvec=wnlpnmju
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2072 --field-trial-handle=1992,i,3721282133272914624,12938763162429345604,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "A91345EF-5590-4D27-B36A-B3D54923591D" "E5CAC747-9BEB-4C2F-9CE9-2315DB8BDB92" "6180" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://www.google.co.tz/url?url=https://oviteweltxddfrszluspazr&ipmp=sxvjova&ygojnb=fcl&elerk=hfbmay&ayt=yrhphmb&pddud=ezxxsf&nuqs=zlhwdht&gaxffgl=pszq&duvvs=volgvy&gkxzodc=jel&qxfv=nnvdnwmd&rqqvtcmspp=rxqkebhlxe&q=amp/shxzygr.a%c2%adyqbtb%c2%adbx%c2%adj%c2%adp%c2%adx%c2%adjxlcs%c2%ads.com%e2%80%8b/b8b2rxwmh&ksla=tapqwwz&jnnbhkq=ttdmivnp&cfjt=efvfrgoe&oqiqdbkskf=kyuuqptwrp&tvge=dkzlwfl&xinkvob=ipnmjidq&ijie=uljbrnkt&otqzapkzkg=kmqusroise&pria=nlusrhl&ymcacxc=zcifoamd&qigt=tulcumns&hhzbkqbcaz=wwvxgvrfea&yjoo=dorlplq&setubwl=gxyhfmbx&shjzsftutp=fpvhstinfx&aabm=criocrm&hjizanz=pegjdgeo&fawgntlmwo=jqpmhlrvtn&roup=izmvjyq&gxeotbo=usfofocn&bjditvldqx=ouxvzuvslt&vvra=ilqxudw&urpmgcs=ymqwcpzq&yrvwdmllag=vdvavnqley&nzuk=ccmlbne&nkpwqws=sngrhfzo&gbgxvugiga=ryzhrucpyl&irec=txrssof&zsogcrm=iayomywb&trpv=tsllqaa&ikkahrz=owzvqchv&nvsg=jqklsur&mifuzci=ijrnkgyc&gxpk=lvdrwxp&ijyljat=mglwbmtx&atpa=zczuwuy&wqrobkl=kbbvlqru&smzd=ipgsgqz&tspepjo=zblbkdbs&cuqg=qokwyqc&pngakdv=hnokowhl&kmzi=utnaspz&isnjuod=nzzrblql&gwhl=insrinb&ysonvuu=wjleaqhv&ilqq=ittadax&ktcegkw=uqqodjle&wwle=anzcjil&cvtwsas=ttchqbwr&thbw=fstnzsh&thhglee=kzsgswit&iizz=hpvogha&hmbwuzq=filorduk&cunp=nhwvcbd&gdrvwdv=gqwwbzuq&ilty=eagyudc&itknbva=sbfavtnk&gjlu=nqaglxn&mrmfjee=xwpodlmj&qknk=uggtyao&mdaaclr=jwmwywrx&nxgd=ydqqawk&ibskbyz=eujqstmb&hpkr=mlxxgks&eivxpwq=otpwhioj&hvrx=zuchxtx&hdmpdgk=wnnxxklk&fazk=kyqhssx&geglyya=dlvpwlnm&avcm=dnnwuqs&dlofbgz=ngnlfhga&zqkj=hoqixkx&zrenpfy=ojcmmoyy&kobu=kpbpvty&rxmqemn=gsprqvuf&ahrr=hewpbki&qxmoqna=smtuczoj&covv=etxdord&vpvelhe=dapyasoe&cudt=pdgwaay&kleugke=oxqfwiqw&hljb=epcyxdm&ypctgvo=czuuwire&crax=cnxmiuw&spupbvv=ovqdpzqa&kjje=pjfavpg&kqvhacj=smqypqqz&jnoa=pobryjd&ynchqcn=rjxzoxwk&dkck=vkekqrr&acbvftn=krcgxouz&pjbb=xpkhnqv&ptoijep=rpxpmrhr&cpic=grnbkdg&rncpvec=wnlpnmju
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2072 --field-trial-handle=1992,i,3721282133272914624,12938763162429345604,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4348 --field-trial-handle=1992,i,3721282133272914624,12938763162429345604,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4348 --field-trial-handle=1992,i,3721282133272914624,12938763162429345604,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: apphelp.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: c2r64.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: userenv.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: msasn1.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: kernel.appcore.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptsp.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: rsaenh.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: gpapi.dll
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\ClickToRun\REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{F959DBBB-3867-41F2-8E5F-3B8BEFAA81B3}\InprocServer32
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEWindow found: window name: SysTabControl32
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\Common
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\outlook\ConfigContextData 1
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile Volume queried: C:\Windows\SysWOW64 FullSizeInformation
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information queried: ProcessInformation
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeQueries volume information: C:\Program Files (x86)\Microsoft Office\root\Office16\AI\WordCombinedFloatieLreOnline.onnx VolumeInformation
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation2
Browser Extensions
1
Process Injection
1
Masquerading
OS Credential Dumping1
Process Discovery
Remote Services1
Clipboard Data
2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
Registry Run Keys / Startup Folder
1
Registry Run Keys / Startup Folder
1
Modify Registry
LSASS Memory1
File and Directory Discovery
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
DLL Side-Loading
1
DLL Side-Loading
1
Process Injection
Security Account Manager13
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://shxzygr.ayqbtbbxjpxjxlcss.com/b8b2rxwmh0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
bg.microsoft.map.fastly.net
199.232.210.172
truefalse
    high
    csp.withgoogle.com
    172.217.17.49
    truefalse
      high
      play.google.com
      172.217.19.206
      truefalse
        high
        plus.l.google.com
        142.250.181.110
        truefalse
          high
          dns-tunnel-check.googlezip.net
          216.239.34.159
          truefalse
            high
            tunnel.googlezip.net
            216.239.34.157
            truefalse
              high
              i.ytimg.com
              172.217.19.246
              truefalse
                high
                www.google.co.tz
                172.217.17.35
                truefalse
                  unknown
                  id.google.com
                  142.250.186.195
                  truefalse
                    high
                    www.google.com
                    142.250.181.100
                    truefalse
                      high
                      shxzygr.ayqbtbbxjpxjxlcss.com
                      87.121.86.72
                      truefalse
                        unknown
                        apis.google.com
                        unknown
                        unknownfalse
                          high
                          NameMaliciousAntivirus DetectionReputation
                          http://shxzygr.ayqbtbbxjpxjxlcss.com/b8b2rxwmhfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://www.google.com/false
                            high
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            172.217.17.49
                            csp.withgoogle.comUnited States
                            15169GOOGLEUSfalse
                            172.217.19.206
                            play.google.comUnited States
                            15169GOOGLEUSfalse
                            2.16.10.172
                            unknownEuropean Union
                            20940AKAMAI-ASN1EUfalse
                            142.250.186.195
                            id.google.comUnited States
                            15169GOOGLEUSfalse
                            52.109.89.18
                            unknownUnited States
                            8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                            172.217.17.46
                            unknownUnited States
                            15169GOOGLEUSfalse
                            142.250.181.131
                            unknownUnited States
                            15169GOOGLEUSfalse
                            216.58.208.227
                            unknownUnited States
                            15169GOOGLEUSfalse
                            172.217.19.246
                            i.ytimg.comUnited States
                            15169GOOGLEUSfalse
                            172.217.19.202
                            unknownUnited States
                            15169GOOGLEUSfalse
                            142.250.181.110
                            plus.l.google.comUnited States
                            15169GOOGLEUSfalse
                            52.109.68.129
                            unknownUnited States
                            8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                            172.217.19.170
                            unknownUnited States
                            15169GOOGLEUSfalse
                            172.217.21.35
                            unknownUnited States
                            15169GOOGLEUSfalse
                            172.217.17.42
                            unknownUnited States
                            15169GOOGLEUSfalse
                            87.121.86.72
                            shxzygr.ayqbtbbxjpxjxlcss.comBulgaria
                            34577SKATTV-ASBGfalse
                            199.232.210.172
                            bg.microsoft.map.fastly.netUnited States
                            54113FASTLYUSfalse
                            52.113.194.132
                            unknownUnited States
                            8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                            172.217.19.238
                            unknownUnited States
                            15169GOOGLEUSfalse
                            1.1.1.1
                            unknownAustralia
                            13335CLOUDFLARENETUSfalse
                            172.217.17.78
                            unknownUnited States
                            15169GOOGLEUSfalse
                            172.217.17.35
                            www.google.co.tzUnited States
                            15169GOOGLEUSfalse
                            172.217.19.234
                            unknownUnited States
                            15169GOOGLEUSfalse
                            142.250.181.100
                            www.google.comUnited States
                            15169GOOGLEUSfalse
                            142.250.181.106
                            unknownUnited States
                            15169GOOGLEUSfalse
                            64.233.165.84
                            unknownUnited States
                            15169GOOGLEUSfalse
                            239.255.255.250
                            unknownReserved
                            unknownunknownfalse
                            172.217.21.42
                            unknownUnited States
                            15169GOOGLEUSfalse
                            172.217.17.74
                            unknownUnited States
                            15169GOOGLEUSfalse
                            142.250.181.98
                            unknownUnited States
                            15169GOOGLEUSfalse
                            20.44.10.123
                            unknownUnited States
                            8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                            216.239.34.157
                            tunnel.googlezip.netUnited States
                            15169GOOGLEUSfalse
                            IP
                            192.168.2.16
                            Joe Sandbox version:41.0.0 Charoite
                            Analysis ID:1560486
                            Start date and time:2024-11-21 21:36:54 +01:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:defaultwindowsinteractivecookbook.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:22
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • EGA enabled
                            Analysis Mode:stream
                            Analysis stop reason:Timeout
                            Sample name:[EXTERNAL] Oakville shared ''o_akville_853473074_21.11.2024''.eml
                            Detection:MAL
                            Classification:mal48.winEML@21/91@39/241
                            Cookbook Comments:
                            • Found application associated with file extension: .eml
                            • Exclude process from analysis (whitelisted): dllhost.exe, RuntimeBroker.exe, backgroundTaskHost.exe, svchost.exe
                            • Excluded IPs from analysis (whitelisted): 52.109.89.18, 52.113.194.132, 52.109.68.129, 2.16.10.172, 2.16.10.163, 20.190.181.4, 40.126.53.9, 20.190.181.0, 20.231.128.66, 20.190.181.23, 20.190.181.3, 20.231.128.65, 40.126.53.18
                            • Excluded domains from analysis (whitelisted): ecs.office.com, omex.cdn.office.net, prdv4a.aadg.msidentity.com, prod.configsvc1.live.com.akadns.net, osiprod-frc-buff-azsc-000.francecentral.cloudapp.azure.com, www.tm.v4.a.prd.aadg.trafficmanager.net, ctldl.windowsupdate.com, weu-azsc-config.officeapps.live.com, prod.roaming1.live.com.akadns.net, s-0005-office.config.skype.com, eur.roaming1.live.com.akadns.net, login.msa.msidentity.com, ecs-office.s-0005.s-msedge.net, roaming.officeapps.live.com, s-0005.s-msedge.net, login.live.com, config.officeapps.live.com, frc-azsc-000.roaming.officeapps.live.com, officeclient.microsoft.com, ecs.office.trafficmanager.net, omex.cdn.office.net.akamaized.net, europe.configsvc1.live.com.akadns.net, a1864.dscd.akamai.net, www.tm.lg.prod.aadmsa.trafficmanager.net
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size getting too big, too many NtQueryAttributesFile calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • Report size getting too big, too many NtReadVirtualMemory calls found.
                            • VT rate limit hit for: [EXTERNAL] Oakville shared ''o_akville_853473074_21.11.2024''.eml
                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                            File Type:data
                            Category:modified
                            Size (bytes):338
                            Entropy (8bit):3.465914199668795
                            Encrypted:false
                            SSDEEP:
                            MD5:CE8A63AEFFE80598214C898E54FB490F
                            SHA1:3435BFE3E944D15D7804A0CE34AD49EE8D516750
                            SHA-256:6CD5196648C3C5B63C66BF924F086324F521A82F9DFAC5322A1AF84200C19DF0
                            SHA-512:CCA4813AB1AACADF7D11BD3E260FD56698243C53F933C34CF37421446DD20B63CC0A466CA9A2D551DC9143CA7100CE7BDB13769EAEB06B39B5D9F7CB83962443
                            Malicious:false
                            Reputation:unknown
                            Preview:p...... .........../U<..(..................................................^SZ.. .........p.........$...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.d.i.s.a.l.l.o.w.e.d.c.e.r.t.s.t.l...c.a.b...".7.4.6.7.8.7.a.3.f.0.d.9.1.:.0."...
                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                            File Type:data
                            Category:dropped
                            Size (bytes):231348
                            Entropy (8bit):4.384239643031891
                            Encrypted:false
                            SSDEEP:
                            MD5:8EE43394C12DA558C9ADFEC0B40AE6C8
                            SHA1:3419B1E67D32005CAD42A8558ACD773CA855DD32
                            SHA-256:BE5C7714BF09B56A639029A9B822A6EC6C7F0467D69D927BF60548CD1F5A0BBA
                            SHA-512:AE1C8988078BE3543A0291EB515DA8B4A68DE4921167C67422C822F5B53D3076A16D220E0EEC9FEBDAD581C3182039B9A29BA48E26DA010809E41B0A419F2B78
                            Malicious:false
                            Reputation:unknown
                            Preview:TH02...... .@u."U<......SM01X...,...`.."U<..........IPM.Activity...........h...............h............H..h.........A."...h........`S..H..h\cal ...pDat...h.h..0...X......h.G.I...........h........_`Pk...hIF.I@...I.lw...h....H...8.Uk...0....T...............d.........2h...............k..............!h.............. hy.......p.....#h....8.........$h`S......8....."h........ .....'h..............1h.G.I<.........0h....4....Uk../h....h.....UkH..h.L..p.........-h .............+h.G.I...................... ..............F7..............FIPM.Activity....Form....Standard....Journal Entry...IPM.Microsoft.FolderDesign.FormsDescription................F.k..........1122110020000000.GwwMicrosoft...This form is used to create journal entries.........kf...... ..........&...........(.......(... ...@.....................................................................................................................fffffffff........wwwwwwww.p....pp..............p...............pw..............pw..DDDDO..
                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):180335
                            Entropy (8bit):5.289218537677819
                            Encrypted:false
                            SSDEEP:
                            MD5:4BD1A91D1981145A03D7A51D7AE90FBC
                            SHA1:C7250A80E04C5FAF68E97D2CBFDA36088B017869
                            SHA-256:BC3E19CB397D71DB66019BFE7C18DD97C3B5CB6A4FC192E79972BDAC3F2F7371
                            SHA-512:E3C828C1B61BBDD28325F2F407EE198556B3D21531C4B052271200F868BB3833BFFF86F2BB73AEEFBE3BADD2C61FCE67C81481BB525EB220AF8FB570A63C698D
                            Malicious:false
                            Reputation:unknown
                            Preview:<?xml version="1.0" encoding="utf-8"?>..<o:OfficeConfig xmlns:o="urn:schemas-microsoft-com:office:office">.. <o:services o:GenerationTime="2024-11-21T20:37:26">.. Build: 16.0.18307.40125-->.. <o:default>.. <o:ticket o:headerName="Authorization" o:headerValue="{}" />.. </o:default>.. <o:service o:name="Research">.. <o:url>https://word-edit.officeapps.live.com/we/rrdiscovery.ashx</o:url>.. </o:service>.. <o:service o:name="ORedir">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ORedirSSL">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ClViewClientHelpId" o:authentication="1">.. <o:url>https://[MAX.BaseHost]/client/results</o:url>.. <o:ticket o:policy="MBI_SSL_SHORT" o:idprovider="1" o:target="[MAX.AuthHost]" o:headerValue="Passport1.4 from-PP='{}&amp;p='" />.. <o:ticket o:idprovider="3" o:headerValue="Bearer {}" o:resourceId="[
                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                            File Type:SQLite Rollback Journal
                            Category:dropped
                            Size (bytes):4616
                            Entropy (8bit):0.1370048545379396
                            Encrypted:false
                            SSDEEP:
                            MD5:73F7767E96997ADF2A14F6EF3400C8C8
                            SHA1:0BA0228FC8432507AE47E8E8342213AD2A42D093
                            SHA-256:7C86D19B8666342C3CDB3C7CCE07181F948153FB99526FA58B89BAC354BEEFF3
                            SHA-512:EFD0D6FE71C350CB1C7C4EB5160B1C1ED274E4317D069E8AA3734B577BAA1DE07A9998E1AD599920CBA2FF1F3BB66229792A201E6A733048D533255A16727548
                            Malicious:false
                            Reputation:unknown
                            Preview:.... .c......E.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................SQLite format 3......@ .......................................................................... .................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                            File Type:data
                            Category:dropped
                            Size (bytes):2278
                            Entropy (8bit):3.8495387697664802
                            Encrypted:false
                            SSDEEP:
                            MD5:E0E4E8CDAED0B151807E5BEB6DD6F525
                            SHA1:9D3B9777E480D859BE54A3A7E2A77DB99D2F0915
                            SHA-256:9EA9DF8837EE6042A38BB403BC6AC2EBF5C4E5D41C9E127CDC5AB1924AB63FAE
                            SHA-512:AB797084927A4B8AC97CAF67C517C0D97EB2A6CFFD4A9A7197E515EBA1FB28C983552DDE2B53732EA1A3754729A542BD7A84B5E9C1297DA201BF0848E56ACF09
                            Malicious:false
                            Reputation:unknown
                            Preview:{.".T.B.D.a.t.a.S.t.o.r.e.O.b.j.e.c.t.".:.{.".H.e.a.d.e.r.".:.{.".O.b.j.e.c.t.T.y.p.e.".:.".T.o.k.e.n.R.e.s.p.o.n.s.e.".,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.a.j.o.r.".:.2.,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.i.n.o.r.".:.1.}.,.".O.b.j.e.c.t.D.a.t.a.".:.{.".S.y.s.t.e.m.D.e.f.i.n.e.d.P.r.o.p.e.r.t.i.e.s.".:.{.".R.e.q.u.e.s.t.I.n.d.e.x.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".C.J.1.m.u.g.S.o.z.s.S.9.x.S.Z./.Q.v.O.c.+.E.J.4.u.2.c.=.".}.,.".E.x.p.i.r.a.t.i.o.n.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".g.A.U.4.j.1.0.8.2.w.E.=.".}.,.".S.t.a.t.u.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".A.A.A.A.A.A.=.=.".}.,.".R.e.s.p.o.n.s.e.B.y.t.e.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.t.r.u.e.,.".V.a.l.u.e.".:.".A.Q.A.A.A.N.C.M.n.d.8.B.F.d.E.R.j.H.o.A.w.E./.C.l.+.s.B.A.A.A.A.t.g.0.Z.8.D.
                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                            File Type:data
                            Category:dropped
                            Size (bytes):2684
                            Entropy (8bit):3.9111570120104417
                            Encrypted:false
                            SSDEEP:
                            MD5:31C5A90B04F87205B549398B9F0264FE
                            SHA1:FDB0F05BF9EB66D0A523E307C9F1DF0DDBBE8354
                            SHA-256:340C9FFA478FCA062F94660FCA3963AC4320F17FDC712C1D10BE5A2602508710
                            SHA-512:DA107B2AD84222D3507F52ED79B418F5623241FC3985D58DF33B423A71084D57A8A06C3C6CF1C602A9A087FF25FA728EEB6D0C0CE4CEAA51645D8073FB8E03EF
                            Malicious:false
                            Reputation:unknown
                            Preview:{.".T.B.D.a.t.a.S.t.o.r.e.O.b.j.e.c.t.".:.{.".H.e.a.d.e.r.".:.{.".O.b.j.e.c.t.T.y.p.e.".:.".T.o.k.e.n.R.e.s.p.o.n.s.e.".,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.a.j.o.r.".:.2.,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.i.n.o.r.".:.1.}.,.".O.b.j.e.c.t.D.a.t.a.".:.{.".S.y.s.t.e.m.D.e.f.i.n.e.d.P.r.o.p.e.r.t.i.e.s.".:.{.".R.e.q.u.e.s.t.I.n.d.e.x.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".V.H.X.L.G.R.5.H.j.D.k.3.C.i.F.b.L.a.m.K.N.+.n.c.g.T.0.=.".}.,.".E.x.p.i.r.a.t.i.o.n.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".q.2.m.h.p.i.Z.b.3.A.E.=.".}.,.".S.t.a.t.u.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".A.A.A.A.A.A.=.=.".}.,.".R.e.s.p.o.n.s.e.B.y.t.e.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.t.r.u.e.,.".V.a.l.u.e.".:.".A.Q.A.A.A.N.C.M.n.d.8.B.F.d.E.R.j.H.o.A.w.E./.C.l.+.s.B.A.A.A.A.t.g.0.Z.8.D.
                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                            File Type:data
                            Category:dropped
                            Size (bytes):4542
                            Entropy (8bit):3.9963880428044507
                            Encrypted:false
                            SSDEEP:
                            MD5:9FDEE64E466C0C5B5A3BAA235F7E270B
                            SHA1:F2AC4B7F54CBCCD2777356D49D0827AE1D5C91AD
                            SHA-256:FA8A4419A62FC9EC4F6B499FAB673B126290B302A2322427833D39AC55819B0B
                            SHA-512:B81482B74B92251A0A3381ED72FF51A4B733204857B558AB7CE0156CDDEBDBB3401B61B08A6862C8C1A7F1315D6ADC319B596AF9235F57469E66AE2AC5BD6C42
                            Malicious:false
                            Reputation:unknown
                            Preview:{.".T.B.D.a.t.a.S.t.o.r.e.O.b.j.e.c.t.".:.{.".H.e.a.d.e.r.".:.{.".O.b.j.e.c.t.T.y.p.e.".:.".T.o.k.e.n.R.e.s.p.o.n.s.e.".,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.a.j.o.r.".:.2.,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.i.n.o.r.".:.1.}.,.".O.b.j.e.c.t.D.a.t.a.".:.{.".S.y.s.t.e.m.D.e.f.i.n.e.d.P.r.o.p.e.r.t.i.e.s.".:.{.".R.e.q.u.e.s.t.I.n.d.e.x.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".V.q.Y.a.6.3.X.Y.9.b.4.Y.b.C.Z.g.f.0.u.y.E.6.v.n.x.e.w.=.".}.,.".E.x.p.i.r.a.t.i.o.n.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".t.f.I.m.d.V.U.8.2.w.E.=.".}.,.".S.t.a.t.u.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".A.w.A.A.A.A.=.=.".}.,.".R.e.s.p.o.n.s.e.B.y.t.e.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.t.r.u.e.,.".V.a.l.u.e.".:.".A.Q.A.A.A.N.C.M.n.d.8.B.F.d.E.R.j.H.o.A.w.E./.C.l.+.s.B.A.A.A.A.t.g.0.Z.8.D.
                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                            File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, baseline, precision 8, 1200x138, components 3
                            Category:dropped
                            Size (bytes):9218
                            Entropy (8bit):7.1020114538871635
                            Encrypted:false
                            SSDEEP:
                            MD5:EF5AAC197F334A07B225EA203E55D41D
                            SHA1:A3C9F35A00ED6F595D182CBFEA0FA7231EB932AE
                            SHA-256:5B678641111F624D2003872032C41A3EE3F39B4D7A8D75B186219EF8C59C4DBB
                            SHA-512:4BDE8846204C9177956DB7085D804FFDFB3150E486AF6A1B0FBC8A5587858FE55C0C5AE3F3E1468CD059D27AA82997ABD970A47994C89C4B93BC45F7A26591D9
                            Malicious:false
                            Reputation:unknown
                            Preview:......JFIF.....d.d.....C....................................................................C............................................................................"............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(..
                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                            File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, baseline, precision 8, 1200x65, components 3
                            Category:dropped
                            Size (bytes):11212
                            Entropy (8bit):7.471573597461573
                            Encrypted:false
                            SSDEEP:
                            MD5:C905AAC990EEF2BAA7FFB9D0613A67CB
                            SHA1:565E81C78B79599DD1E4A8913ABA46C338EE84EB
                            SHA-256:A482D0D62FEE154FA4C922A69550F3EC77EFE0C6D4CBBAE1594729BB427AD8F0
                            SHA-512:C2CD10C5B81D8F2AC214145ADD3BD753658228B174CFF38528C9F9DCB218016EC4AAFED8550DE5A1A7283A03FF077027CDC0F918BE7C0F4CA186625183747C32
                            Malicious:false
                            Reputation:unknown
                            Preview:......JFIF.....d.d.....C....................................................................C.......................................................................A...."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(..
                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                            File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, baseline, precision 8, 1200x224, components 3
                            Category:dropped
                            Size (bytes):33913
                            Entropy (8bit):7.638199324207218
                            Encrypted:false
                            SSDEEP:
                            MD5:C93556C7875A76A9FB09DE9D2AD8865C
                            SHA1:F9D513FFADD0B09639AD98A9F6C37C9548B3743A
                            SHA-256:C551C6011E8BE3E848BB4F583A3BCF23BFE21514F5EAAF9AD468ABA09553D95C
                            SHA-512:0EF9D1570B85EF9CF6358041358B200C5D7A1614231993E35C08F999D42A0E3BBE05B1A87B4F63946CE73A21B445ECABD8DB9C5E819AE23A7D16DEEF7CB71EEF
                            Malicious:false
                            Reputation:unknown
                            Preview:......JFIF.....d.d.....C....................................................................C............................................................................"............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(..m#............|K.E...4#.....S....2...^...y.....|em......R.....;..YYk.m.>$...s<..%.,...`c...f}.U...f.No.....0...F.'F.#Z0........X.5iC..8.#.5...1...M.fY.kJ.q....]l.7...5..g..e*2..<N.T.XiU.V.Ve.Q^....Q@..Q@..Q@
                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                            File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, baseline, precision 8, 1200x248, components 3
                            Category:dropped
                            Size (bytes):24477
                            Entropy (8bit):7.430717390779423
                            Encrypted:false
                            SSDEEP:
                            MD5:0569BC0306A46AEFBC3A8C8C1A68DB01
                            SHA1:CB83FCDEE35A27A5B7550B3ABB1F5E73759B2256
                            SHA-256:59295D1441ACEEF997E70CE2DCB6767CBD15F375BC1D9F813A62D80043407DD3
                            SHA-512:D2C063F02F0DF30776A4FBECDA25EF313B26198F00D128BBA3562F28CDECD3F01BB3D644D6847E971A8BA4DFFD5051A48A9CEBBB95F35140C6447BC2F18EC7B4
                            Malicious:false
                            Reputation:unknown
                            Preview:......JFIF.....d.d.....C....................................................................C............................................................................"............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(..^.....O.|#.o....._...S...L.ix.....<..k...h.}..mWF....%......q'.gmom..a.....+....?f/.7/....h~...=G.2.....F..........g...(.?...X..........}................4?......@......c.b...r..........3...,~._.n_......>...z.=......e......?.......Q.....1..|....C.........+...
                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                            File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, baseline, precision 8, 1200x10, components 3
                            Category:dropped
                            Size (bytes):927
                            Entropy (8bit):5.454774547681505
                            Encrypted:false
                            SSDEEP:
                            MD5:6B986DDFFED3C561C5D095C958F60BC6
                            SHA1:4D566AB130E1A2F42F38C66703C2248E92E2CEBB
                            SHA-256:F1EEDF1E693B215EED7262851BC57C0B7156FE6FAF64A3916BDBDBCC5FE514FE
                            SHA-512:6D991233D18AEF3E5AE43C4487BB74371D71F73CEC0095596D68930276F1A1C6D674728248E1485121A3AA42AFC227F1E38A639C4A4546CD547F47EEC219AAE5
                            Malicious:false
                            Reputation:unknown
                            Preview:......JFIF.....d.d.....C....................................................................C............................................................................"............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(.....
                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                            File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, baseline, precision 8, 1200x10, components 3
                            Category:dropped
                            Size (bytes):927
                            Entropy (8bit):5.453960213806464
                            Encrypted:false
                            SSDEEP:
                            MD5:3711DFDB28C34EE46EEAE2A2EBF87832
                            SHA1:2DD0D9E934962266673903765B2B00D768F07E1D
                            SHA-256:165BCF8D3C907F283987DCB064265B77D059D87FF4C9FB8184BD420FA231B299
                            SHA-512:90098579A6DDB2A41D43DD20862B421477EF21D4F5A6AEC42341F3D1B7CEA919E8E8F2746625AC0CD550F4BB54FCF87C20DDA9C2B19977AD289940BD1BA69334
                            Malicious:false
                            Reputation:unknown
                            Preview:......JFIF.....d.d.....C....................................................................C............................................................................"............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(.....
                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):26
                            Entropy (8bit):3.95006375643621
                            Encrypted:false
                            SSDEEP:
                            MD5:FBCCF14D504B7B2DBCB5A5BDA75BD93B
                            SHA1:D59FC84CDD5217C6CF74785703655F78DA6B582B
                            SHA-256:EACD09517CE90D34BA562171D15AC40D302F0E691B439F91BE1B6406E25F5913
                            SHA-512:AA1D2B1EA3C9DE3CCADB319D4E3E3276A2F27DD1A5244FE72DE2B6F94083DDDC762480482C5C2E53F803CD9E3973DDEFC68966F974E124307B5043E654443B98
                            Malicious:false
                            Reputation:unknown
                            Preview:[ZoneTransfer]..ZoneId=3..
                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                            File Type:data
                            Category:dropped
                            Size (bytes):30
                            Entropy (8bit):1.2389205950315936
                            Encrypted:false
                            SSDEEP:
                            MD5:3C8209FB8320F928A91057F7F721A88E
                            SHA1:A04B6040AB8C20BF7C3415A056D47DD57E64B933
                            SHA-256:48D30025BDAEBCCE5AECC04B671A03AA47FE8CD396D67DCDC831BECCD4A49B0E
                            SHA-512:5185C1C09231230536400FD419D11049AF287C40B7CDCE4037009632958ECD276F486A47A5A4463BB81E3BAD92B39BCF438560398E4FC8F1E2CD63AF37AFA91C
                            Malicious:false
                            Reputation:unknown
                            Preview:..............................
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Nov 21 19:37:35 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                            Category:dropped
                            Size (bytes):2673
                            Entropy (8bit):3.988105518913963
                            Encrypted:false
                            SSDEEP:
                            MD5:EB38778FC2026763434635B88AFAAACE
                            SHA1:3B23F50E17B48E648D37E92581D37AAEE3FE156F
                            SHA-256:F7E4B575F832F55525DC1526BD17E6262901F54E4CF162B892B0422ECD2DC797
                            SHA-512:7AB2852F6CDB9AE78B6B182C682E18CF50234824F87C630A89C8E4E76726882045994393028751360977F986EB0E985946B3D036DA9B3C2B0134415044B5C0C8
                            Malicious:false
                            Reputation:unknown
                            Preview:L..................F.@.. ...$+.,......>2U<..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IuY......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VuY......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VuY......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VuY............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VuY.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Nov 21 19:37:34 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                            Category:dropped
                            Size (bytes):2675
                            Entropy (8bit):4.005034681237641
                            Encrypted:false
                            SSDEEP:
                            MD5:743F45CB595867E423AAEB2559000AB1
                            SHA1:AC530E97E9C5555C2408D180FD836EB648231306
                            SHA-256:35EE5EC1A98979DC8B798A37EE0CEBC23E0CC4C2D32B2309B946EB929FA1AAF7
                            SHA-512:5823489096C3AD6A3016BD0E8EAC6A6581CDCC6466756AD9084594301DE6BA70E933C1F5C0438558B1EFE47AC3D3A7E29B03793C36F9568A36F9AEAD8B4DE296
                            Malicious:false
                            Reputation:unknown
                            Preview:L..................F.@.. ...$+.,....../2U<..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IuY......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VuY......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VuY......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VuY............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VuY.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                            Category:dropped
                            Size (bytes):2689
                            Entropy (8bit):4.012307561900046
                            Encrypted:false
                            SSDEEP:
                            MD5:83EF737C4DCCC7F85AAEC461E3052A5A
                            SHA1:4B8EAD1951D4CB56AF936A903E11D7B8629F7BA6
                            SHA-256:840769FCA9C0E12088202CE077848F0E26D46FBE9E0326718B3B0B87F32261B0
                            SHA-512:F8A219FAEAD0671E3C8BFB2A9294CAD0FF110FC624A30C9352C450683F7BC5EAF7AEB1DA91BEA9A8732642F535EC536A1B64345F54869157D0FF2F4D973DC94E
                            Malicious:false
                            Reputation:unknown
                            Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IuY......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VuY......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VuY......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VuY............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Nov 21 19:37:34 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                            Category:dropped
                            Size (bytes):2677
                            Entropy (8bit):4.000633947026465
                            Encrypted:false
                            SSDEEP:
                            MD5:907373C45237EF3E2D5EE25B1A98A6E7
                            SHA1:04B74BA57289B18FB3C0E857662130F3F015C9BD
                            SHA-256:33D87CEB275410B74114587ECF0A7EA123720306AFB8820085C90838F6DA5B93
                            SHA-512:1E6F46C32DB51AFD8F05FB58F24C119D37A44B5E79A30B8C3EAF42954090CC618FB9435E875376B9009F3F4DEB1728DC02D064F01E0381CDFF9E03F181651CD5
                            Malicious:false
                            Reputation:unknown
                            Preview:L..................F.@.. ...$+.,......%2U<..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IuY......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VuY......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VuY......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VuY............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VuY.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Nov 21 19:37:34 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                            Category:dropped
                            Size (bytes):2677
                            Entropy (8bit):3.9898999668989172
                            Encrypted:false
                            SSDEEP:
                            MD5:FE04521EEC647B14A152B07D928FDCDE
                            SHA1:C3B23B5482C2B1DA200534CA1ED6926087855A39
                            SHA-256:B0A6AB12E1996CA7202C5F5ADB89827F0D70951F79B8D3869AB99DF87C39C279
                            SHA-512:766B5C1818EF5675B20B4C910212A2810DC8CC5F72414FC9430E7E8EF9EB1D78B39BAE0FF442D1902A93C923DA2BFFD43F1FAE64D93047C71C2E2D4BB175D3D2
                            Malicious:false
                            Reputation:unknown
                            Preview:L..................F.@.. ...$+.,......72U<..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IuY......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VuY......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VuY......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VuY............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VuY.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Nov 21 19:37:34 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                            Category:dropped
                            Size (bytes):2679
                            Entropy (8bit):3.9981745115053213
                            Encrypted:false
                            SSDEEP:
                            MD5:497919C5478A89630362698848BDAC27
                            SHA1:E5AE0F7CD3B8C31C29A25256B04990843F75C410
                            SHA-256:F1EB62B75B026EE69C2C9F09DD162800DE99D560E799C42CD374D2A74F735FDE
                            SHA-512:4394875847CD020F59DEA8A919C2E1ACD7B4AE7D71FDB2B679D35087F5FBE36BBFBD3F066FE88F2590BE5F5F8A64DFA7E728116F81876BC05535BDC8264F3C27
                            Malicious:false
                            Reputation:unknown
                            Preview:L..................F.@.. ...$+.,.......2U<..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IuY......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VuY......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VuY......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VuY............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VuY.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:gzip compressed data, max compression, truncated
                            Category:downloaded
                            Size (bytes):35
                            Entropy (8bit):4.199873730859799
                            Encrypted:false
                            SSDEEP:
                            MD5:D317C25EBCF619DCAD17963A91904BC1
                            SHA1:749A0A568BEF62730A278854033B5D83AC81519C
                            SHA-256:F5AF56B41CA2466246D1648A3BE8FE236C4F123E3FA8589C10A72F1C68ABBE8F
                            SHA-512:4055D9D3917796222A49B8BFB48D60E9A804D4CEBFE9958EAEEE9E7BABE153FEEB6C7C11577F1494E37BB91F89F5FAB6BC204B1A7AF11F32A6043D57B5A4A237
                            Malicious:false
                            Reputation:unknown
                            URL:https://www.google.com/compressiontest/gzip.html
                            Preview:...........QL.O..,HU.(....H.....
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (1243)
                            Category:dropped
                            Size (bytes):311496
                            Entropy (8bit):5.62865347230289
                            Encrypted:false
                            SSDEEP:
                            MD5:CF18F906F6D1E5C8E5D81D84E2710463
                            SHA1:39A48F9D2E9CFF8711237B879E1D9D4E1EA3E1F1
                            SHA-256:DC3E5AA5DDC81FFB21101314F56B9ADAC4CB46941201D10921FC628C46338655
                            SHA-512:90A02DD6AD2E7EEFA57666740BA3E8EE473EEEE0FAA2DC9366F34ED0542FE860F36C3F226117A453E87E4FFD7925BF971A0D7537409DDE04E99033759B04EDC8
                            Malicious:false
                            Reputation:unknown
                            Preview:this._s=this._s||{};(function(_){var window=this;.try{._.q("sb_wiz");.._.u();.}catch(e){_._DumpException(e)}.try{._.q("aa");.._.u();.}catch(e){_._DumpException(e)}.try{._.q("abd");.var Zsx=function(a){let b="",c=21;for(let d=0;d<a.length;d++)d%4!=3&&(b+=String.fromCharCode(a[d]^c),c++);return b},$sx=function(a){let b=0;for(const c in a)if(a[c].e)if(a[c].b)b++;else return!1;return b>0},etx=function(a={}){const b={};b[atx]={e:!!a[atx],b:!_.T4i(btx)};b[ctx]={e:!!a[ctx],b:!_.T4i(dtx)};return b},ftx=function(a){const b=[];for(const c in a)a[c].e&&b.push(`${c}:`+(a[c].b?"1":"0"));return b.join(",")},htx=function(a,b){a=String(a);b&&(a+=`,${b}`);google.log(gtx,a)},itx=function(a,b,.c=2){if(c<1)htx(7,b);else{var d=new Image;d.onerror=()=>{itx(a,b,c-1)};d.src=a}},btx=Zsx([97,119,115,111,107]),dtx=Zsx([97,119,115,111,107,123]),jtx=Zsx([118,115,121,107,108,124,104,119,68,127,114,105,114]),gtx=Zsx([101,126,118,102,118,125,118,109,126]),ktx=Zsx([116,116,115,108]),atx=Zsx([113,115,99,107]),ctx=Zsx([
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text
                            Category:downloaded
                            Size (bytes):102
                            Entropy (8bit):5.181373357760793
                            Encrypted:false
                            SSDEEP:
                            MD5:22DE556C3B88E597DE1C23F63B9AA619
                            SHA1:7F7FE57C36B4CD81FA59C57F9F514698D0D9B8C9
                            SHA-256:E5947B89D60C81139738D017D82E16DE4C1795413FBEFBAEE72BB72D67E9EF5E
                            SHA-512:39A25806D1F044DBE88683B12C21228EB856A3B73E4E667CB620D9B088656676DF5E619BB81F60E310E835FB5CD89AB6C66A7B634C0A605EB93606239F3608A7
                            Malicious:false
                            Reputation:unknown
                            URL:"https://www.google.com/async/hpba?yv=3&cs=0&ei=Fpo_Z6y4HJGSkdUPrtW_gA8&async=_basejs:/xjs/_/js/k%3Dxjs.hd.en_US.Krtc5zmDtmw.es5.O/am%3DAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEAAAAAAAAAAAAMAAAAQAAAAAAgAAAAAAAAAhABAEAAABAAAALAAAEAwAAACAEBAAACAAAAeZQoAAkQAAAAACAAgACAAABAAAAAIAAAAAAAAKAAAAAAAEAAAAAAAAAAAAgQAAAAAAAAAAAAIAABADwAAAAAAAAAQEAAAhoABCAAAAAAAAOgDgOABGFJYAAAAAAAAAAAAAAAACJAgmAsJCAhAAAAAAAAAAAAAAAAAAACRJi5s/dg%3D0/br%3D1/rs%3DACT90oEZORBC7FYrMjqmDQMo_6hv7JEAHA,_basecss:/xjs/_/ss/k%3Dxjs.hd.rVqMNzqlVlQ.L.B1.O/am%3DCKkCAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEAAAAAAAAAABOwEAAADAOwCBAgAAAAAwAAAAAABEAAAABBAAKACAAAAAAAgAABEABAAUAAAAAiMAgAAARlACUACACAABQEACAAIAASQQUMgKgBRAAAAAAAAAAACAAAAhgAQCADQARAABoBIAABEDwQAAAAAIAgAYCYAhoABCAAAAAAAACADAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAgAKA/br%3D1/rs%3DACT90oHOuxEPhlzZ3IGP944yO_Wxq-S9gw,_basecomb:/xjs/_/js/k%3Dxjs.hd.en_US.Krtc5zmDtmw.es5.O/ck%3Dxjs.hd.rVqMNzqlVlQ.L.B1.O/am%3DCKkCAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEAAAAAAAAAABO8EAAATAOwCBAgAAAAAwAAAhABBEAAABBBAALACAEAwAAAiAEBEABCAUAAeZQqMAkQAARlACUAiACAABREACAAIAASQQUMgKgBRAAAAEAAAAAACAAAAhgQQCADQARAABoBIAABEDwQAAAAAIAgQcCYAhoABCAAAAAAAAOgDgOABGFJYAAAAAAAAAAAAAAAACJAgmAsJKAhAAAAAAAAAAAAAAAAAAACRJi5s/d%3D1/ed%3D1/dg%3D0/br%3D1/ujg%3D1/rs%3DACT90oGKeVEqew9R43QKjD8zvGSVNhvlOA,_fmt:prog,_id:_Fpo_Z6y4HJGSkdUPrtW_gA8_8&sp_imghp=false&sp_hpep=2&sp_hpte=0&vet=10ahUKEwism8Xno-6JAxURSaQEHa7qD_AQj-0KCBY..i"
                            Preview:)]}'.22;["HJo_Z7reC7Wrxc8PgsXKsQ0","2120"]c;[2,null,"0"]1b;<div jsname="Nll0ne"></div>c;[9,null,"0"]0;
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:PNG image data, 1986 x 456, 8-bit colormap, non-interlaced
                            Category:downloaded
                            Size (bytes):150890
                            Entropy (8bit):7.991570701825802
                            Encrypted:true
                            SSDEEP:
                            MD5:2C2DE63D5F1A44CF09663038B9E587E3
                            SHA1:F495AF0A0DA1206DDD01D262E0BE5E0933785756
                            SHA-256:F4E6A70CB52819D2EE2B3116390760A88787E484D997D1EE7EA7DD30C87D0FBD
                            SHA-512:7580F3E40B24C3607EA1CAD0C28D471CCE89013387120706F3DD96B95308ADAD49DB58DDF3822643F0CD3A895FF49BC8046A50B8F730C10EDF53373AEEE28151
                            Malicious:false
                            Reputation:unknown
                            URL:https://www.google.com/logos/2024/moon/novr2/spinner-sprite.png
                            Preview:.PNG........IHDR................R....PLTEGpLPiw7Wj-L^e{..#)..".. . &. &....-2.!'.#).(-..!.,1. &.....%:^s..#)7< ,1.*0.,6.7@.1;.!+.AL.z........o..FR.(0.Q_.r..`o.KW.w..Uc.gw.|..<F.t..iy.l{....et.Xf.q..\j.M\....%,.cq.kz.^m5EJ.m}.:M....0B.CZ6...5H.?S3}.....s.!5<.......~..~},.....F..y..c..3m..=D0i.....hn....+=F.~.....9p.."#....3:.+/)(...V...$8>LE+.U..Jl^6a.n..d..['//.m..d..O3\u..u..p~.x/f...l..h..K..r:u...y....,.?.q3c.....Bdq.7.182[t..0^{1_|0]z0]x0^z./2_{+Xt)Up+[w/]yC......18/]y.>T.<R.=S.AX"Jc&Pj..S...?V$Mf2_{....."W[...M..!H`.CZ/]y;..0]y F].;Q1_{P..0\x(Rm.D\."2.'8Y...D[....=R......J..0^z&IO.4<Sp.o.......4Tf`..............2a............1`}....."Vv.Ssp..8j.5f.+^|#?C-b.Au.%SmG...SoV..F..Ax.X..;o.7j.;o.?z.6h.1j..............5=q..9RY......................c.H..(..c..=.................V....Hc...3....tRNS..*........3.pc.D...8..T...................................g...................................................F...................U.........................................e.....
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (2383)
                            Category:downloaded
                            Size (bytes):521795
                            Entropy (8bit):5.812196307411622
                            Encrypted:false
                            SSDEEP:
                            MD5:167DBB3D22A4D24DB79D4E61A4F325E9
                            SHA1:C284C5C47485778562FA89F94900B6F7E0AF9371
                            SHA-256:8640F5ABCBF8BF9408C5BE849499E25F8A7A5D915EEDFEEAE53DE369906C8347
                            SHA-512:169F64EB13EA33800F99B0FF1E10682709D7156A0A91B529D93727DF1451C56A4059A36E37256802333F6B5003B518356FC425C3160A1B77CB1182A4CF73AF53
                            Malicious:false
                            Reputation:unknown
                            URL:https://www.google.com/logos/2024/moon/novr2/moon.js
                            Preview:(function(){'use strict';var k,aa=typeof Object.defineProperties=="function"?Object.defineProperty:function(a,b,c){if(a==Array.prototype||a==Object.prototype)return a;a[b]=c.value;return a};function ba(a){a=["object"==typeof globalThis&&globalThis,a,"object"==typeof window&&window,"object"==typeof self&&self,"object"==typeof global&&global];for(var b=0;b<a.length;++b){var c=a[b];if(c&&c.Math==Math)return c}throw Error("a");}var ca=ba(this);.function da(a,b){if(b)a:{var c=ca;a=a.split(".");for(var d=0;d<a.length-1;d++){var e=a[d];if(!(e in c))break a;c=c[e]}a=a[a.length-1];d=c[a];b=b(d);b!=d&&b!=null&&aa(c,a,{configurable:!0,writable:!0,value:b})}}var ea=typeof Object.create=="function"?Object.create:function(a){function b(){}b.prototype=a;return new b},fa;.if(typeof Object.setPrototypeOf=="function")fa=Object.setPrototypeOf;else{var ha;a:{var ia={a:!0},ka={};try{ka.__proto__=ia;ha=ka.a;break a}catch(a){}ha=!1}fa=ha?function(a,b){a.__proto__=b;if(a.__proto__!==b)throw new TypeError("b`"
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text
                            Category:downloaded
                            Size (bytes):102
                            Entropy (8bit):5.192601269797328
                            Encrypted:false
                            SSDEEP:
                            MD5:EAE5064F7BB5A88C21C49AA22F25A5BE
                            SHA1:4DE309171586A0DE5B626EBC8EDD39311BFAC357
                            SHA-256:EED1BE6023767B531E59B3761FDE80A70B6AF9E9F588242BA1D004A98EF424ED
                            SHA-512:0C9A1902F69B9B1697781E4C9E4C6B1BE1383E5CD2427D21B29AC2AAA7BA154FCD316839A8B1EE377784297D216CB108CC8F699408599192C1B9C42FCDEC8FA0
                            Malicious:false
                            Reputation:unknown
                            URL:"https://www.google.com/async/hpba?yv=3&cs=0&ei=UJo_Z77WKPqHkdUP96vUkAs&async=_basejs:/xjs/_/js/k%3Dxjs.hd.en_US.Krtc5zmDtmw.es5.O/am%3DAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEAAAAAAAAAAAAMAAAAQAAAAAAgAAAAAAAAAhABAEAAABAAAALAAAEAwAAACAEBAAACAAAAeZQoAAkQAAAAACAAgACAAABAAAAAIAAAAAAAAKAAAAAAAEAAAAAAAAAAAAgQAAAAAAAAAAAAIAABADwAAAAAAAAAQEAAAhoABCAAAAAAAAOgDgOABGFJYAAAAAAAAAAAAAAAACJAgmAsJCAhAAAAAAAAAAAAAAAAAAACRJi5s/dg%3D0/br%3D1/rs%3DACT90oEZORBC7FYrMjqmDQMo_6hv7JEAHA,_basecss:/xjs/_/ss/k%3Dxjs.hd.rVqMNzqlVlQ.L.B1.O/am%3DCKkCAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEAAAAAAAAAABOwEAAADAOwCBAgAAAAAwAAAAAABEAAAABBAAKACAAAAAAAgAABEABAAUAAAAAiMAgAAARlACUACACAABQEACAAIAASQQUMgKgBRAAAAAAAAAAACAAAAhgAQCADQARAABoBIAABEDwQAAAAAIAgAYCYAhoABCAAAAAAAACADAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAgAKA/br%3D1/rs%3DACT90oHOuxEPhlzZ3IGP944yO_Wxq-S9gw,_basecomb:/xjs/_/js/k%3Dxjs.hd.en_US.Krtc5zmDtmw.es5.O/ck%3Dxjs.hd.rVqMNzqlVlQ.L.B1.O/am%3DCKkCAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEAAAAAAAAAABO8EAAATAOwCBAgAAAAAwAAAhABBEAAABBBAALACAEAwAAAiAEBEABCAUAAeZQqMAkQAARlACUAiACAABREACAAIAASQQUMgKgBRAAAAEAAAAAACAAAAhgQQCADQARAABoBIAABEDwQAAAAAIAgQcCYAhoABCAAAAAAAAOgDgOABGFJYAAAAAAAAAAAAAAAACJAgmAsJKAhAAAAAAAAAAAAAAAAAAACRJi5s/d%3D1/ed%3D1/dg%3D0/br%3D1/ujg%3D1/rs%3DACT90oGKeVEqew9R43QKjD8zvGSVNhvlOA,_fmt:prog,_id:_UJo_Z77WKPqHkdUP96vUkAs_8&sp_imghp=false&sp_hpep=2&sp_hpte=0&vet=10ahUKEwi-vqWDpO6JAxX6Q6QEHfcVFbIQj-0KCBY..i"
                            Preview:)]}'.22;["U5o_Z-qFFOCqxc8PwqifuQo","2120"]c;[2,null,"0"]1b;<div jsname="Nll0ne"></div>c;[9,null,"0"]0;
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:JSON data
                            Category:dropped
                            Size (bytes):9484
                            Entropy (8bit):1.337685277168612
                            Encrypted:false
                            SSDEEP:
                            MD5:8B41AA589294D45D201ACE3E73EF695C
                            SHA1:AD92750E4BFC270607BCD88B8E8FF69531352F1E
                            SHA-256:66319C4D0965F9A877F2766281BDED2D9AE324C457598B1CDB5C21D33D3C2C00
                            SHA-512:E4F955C746511A22477D9D6B5A80A0EBFD020DF5EE684CA9CAA915986730FEAC1A581555E17D9480784A93ABF6110EE8549FF6287B2287A944D3B90B8F8BE730
                            Malicious:false
                            Reputation:unknown
                            Preview:{"chunkTypes":"1000011111110011110001000010110100000011111111101110111111111111111111111111111111111101011111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111110111011111111131011011111111111101111111111111101111111111111111000110111111111111111111010100222221222122121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121222121212121212121222122222222122121212121212122212221212121212122121212121212121212121212121212122212121212121212121212121212121212121212121212222122122122212212212212212212212212212212212212212212212212212212212212212212212212221221221221221221212121212221222222222212122121121221212121212121212132212121221211212121212121212222222212111211222211212121212212121212121212332222222121221221221221211212122121212121212
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (566)
                            Category:downloaded
                            Size (bytes):571
                            Entropy (8bit):4.920695169144423
                            Encrypted:false
                            SSDEEP:
                            MD5:6715421396A4ECC49A86BCB8CA75218C
                            SHA1:F7ED50BCDBBB7EE235E6449B90EA4AEBEC87D8C8
                            SHA-256:F7867ADA93527BDF00B5987DB1925DD4BEB5A127E6F0DC49F5B39961B7750E39
                            SHA-512:2CF03B5CBD10D247D825AC5F2361578C7C0D23A3B1FD99DB1A8B56B1D41D49C22019D5486F24BB43F0559D11F5D6D4FA0DBAC9CF90A55CE186CF78F22965ADFC
                            Malicious:false
                            Reputation:unknown
                            URL:https://www.google.com/complete/search?q=https%3A%2F%2Foviteweltxddfrszluspazr%26ipmp%3Dsxvjova%26ygojnb%3Dfcl%26elerk%3Dhfbmay%26ayt%3Dyrhphmb%26pddud%3Dezxxsf%26nuqs%3Dzlhwdht%26gaxffgl%3Dpszq%26duvvs%3Dvolgvy%26gkxzodc%3Djel%26qxfv%3Dnnvdnwmd%26rqqvtcmspp%3Drxqkebhlxe%26q%3Damp%2Fshxzygr.a%25c2%25adyqbtb%25c2%25adbx%25c2%25adj%25c2%25adp%25c2%25adx%25c2%25adjxlcs%25c2%25ads.com%25e2%2580%258b%2Fb8b2rxwmh%26ksla%3Dtapqwwz%26jnnbhkq%3Dttdmivnp%26cfjt%3Defvfrgoe%26oqiqdbkskf%3Dkyuuqptwrp%26tvge%3Ddkzlwfl%26xinkvob%3Dipnmjidq%26ijie%3Duljbrnkt%26otqzapkzkg%3Dkmqusroise%26pria%3Dnlusrhl%26ymcacxc%3Dzcifoamd%26qigt%3Dtulcumns%26hhzbkqbcaz%3Dwwvxgvrfea%26yjoo%3Ddorlplq%26setubwl%3Dgxyhfmbx%26shjzsftutp%3Dfpvhstinfx%26aabm%3Dcriocrm%26hjizanz%3Dpegjdgeo%26fawgntlmwo%3Djqpmhlrvtn%26roup%3Dizmvjyq%26gxeotbo%3Dusfofocn%26bjditvldqx%3Douxvzuvslt%26vvra%3Dilqxudw%26urpmgcs%3Dymqwcpzq%26yrvwdmllag%3Dvdvavnqley%26nzuk%3Dccmlbne%26nkpwqws%3Dsngrhfzo%26gbgxvugiga%3Dryzhrucpyl%26irec%3Dtxrssof%26zsogcrm%3Diayomywb%26trpv%3Dtsllqaa%26ikkahrz%3Dowzvqchv%26nvsg%3Djqklsur%26mifuzci%3Dijrnkgyc%26gxpk%3Dlvdrwxp%26ijyljat%3Dmglwbmtx%26atpa%3Dzczuwuy%26wqrobkl%3Dkbbvlqru%26smzd%3Dipgsgqz%26tspepjo%3Dzblbkdbs%26cuqg%3Dqokwyqc%26pngakdv%3Dhnokowhl%26kmzi%3Dutnaspz%26isnjuod%3Dnzzrblql%26gwhl%3Dinsrinb%26ysonvuu%3Dwjleaqhv%26ilqq%3Dittadax%26ktcegkw%3Duqqodjle%26wwle%3Danzcjil%26cvtwsas%3Dttchqbwr%26thbw%3Dfstnzsh%26thhglee%3Dkzsgswit%26iizz%3Dhpvogha%26hmbwuzq%3Dfilorduk%26cunp%3Dnhwvcbd%26gdrvwdv%3Dgqwwbzuq%26ilty%3Deagyudc%26itknbva%3Dsbfavtnk%26gjlu%3Dnqaglxn%26mrmfjee%3Dxwpodlmj%26qknk%3Duggtyao%26mdaaclr%3Djwmwywrx%26nxgd%3Dydqqawk%26ibskbyz%3Deujqstmb%26hpkr%3Dmlxxgks%26eivxpwq%3Dotpwhioj%26hvrx%3Dzuchxtx%26hdmpdgk%3Dwnnxxklk%26fazk%3Dkyqhssx%26geglyya%3Ddlvpwlnm%26avcm%3Ddnnwuqs%26dlofbgz%3Dngnlfhga%26zqkj%3Dhoqixkx%26zrenpfy%3Dojcmmoyy%26kobu%3Dkpbpvty%26rxmqemn%3Dgsprqvuf%26ahrr%3Dhewpbki%26qxmoqna%3Dsmtuczoj%26covv%3Detxdord%26vpvelhe%3Ddapyasoe%26cudt%3Dpdgwaay%26kleugke%3Doxqfwiqw%26hljb%3Depcyxdm%26ypctgvo%3Dczuuwire%26crax%3Dcnxmiuw%26spupbvv%3Dovqdpzqa%26kjje%3Dpjfavpg%26kqvhacj%3Dsmqypqqz%26jnoa%3Dpobryjd%26ynchqcn%3Drjxzoxwk%26dkck%3Dvkekqrr%26acbvftn%3Dkrcgxouz%26pjbb%3Dxpkhnqv%26ptoijep%3Drpxpmrhr%26cpic%3Dgrnbkdg%26rncpvec%3Dwnlpnmju&cp=0&client=desktop-gws-wiz-on-focus-serp&xssi=t&gs_pcrt=3&hl=en&authuser=0&pq=https%3A%2F%2Foviteweltxddfrszluspazr%26ipmp%3Dsxvjova%26ygojnb%3Dfcl%26elerk%3Dhfbmay%26ayt%3Dyrhphmb%26pddud%3Dezxxsf%26nuqs%3Dzlhwdht%26gaxffgl%3Dpszq%26duvvs%3Dvolgvy%26gkxzodc%3Djel%26qxfv%3Dnnvdnwmd%26rqqvtcmspp%3Drxqkebhlxe%26q%3Damp%2Fshxzygr.a%25c2%25adyqbtb%25c2%25adbx%25c2%25adj%25c2%25adp%25c2%25adx%25c2%25adjxlcs%25c2%25ads.com%25e2%2580%258b%2Fb8b2rxwmh%26ksla%3Dtapqwwz%26jnnbhkq%3Dttdmivnp%26cfjt%3Defvfrgoe%26oqiqdbkskf%3Dkyuuqptwrp%26tvge%3Ddkzlwfl%26xinkvob%3Dipnmjidq%26ijie%3Duljbrnkt%26otqzapkzkg%3Dkmqusroise%26pria%3Dnlusrhl%26ymcacxc%3Dzcifoamd%26qigt%3Dtulcumns%26hhzbkqbcaz%3Dwwvxgvrfea%26yjoo%3Ddorlplq%26setubwl%3Dgxyhfmbx%26shjzsftutp%3Dfpvhstinfx%26aabm%3Dcriocrm%26hjizanz%3Dpegjdgeo%26fawgntlmwo%3Djqpmhlrvtn%26roup%3Dizmvjyq%26gxeotbo%3Dusfofocn%26bjditvldqx%3Douxvzuvslt%26vvra%3Dilqxudw%26urpmgcs%3Dymqwcpzq%26yrvwdmllag%3Dvdvavnqley%26nzuk%3Dccmlbne%26nkpwqws%3Dsngrhfzo%26gbgxvugiga%3Dryzhrucpyl%26irec%3Dtxrssof%26zsogcrm%3Diayomywb%26trpv%3Dtsllqaa%26ikkahrz%3Dowzvqchv%26nvsg%3Djqklsur%26mifuzci%3Dijrnkgyc%26gxpk%3Dlvdrwxp%26ijyljat%3Dmglwbmtx%26atpa%3Dzczuwuy%26wqrobkl%3Dkbbvlqru%26smzd%3Dipgsgqz%26tspepjo%3Dzblbkdbs%26cuqg%3Dqokwyqc%26pngakdv%3Dhnokowhl%26kmzi%3Dutnaspz%26isnjuod%3Dnzzrblql%26gwhl%3Dinsrinb%26ysonvuu%3Dwjleaqhv%26ilqq%3Dittadax%26ktcegkw%3Duqqodjle%26wwle%3Danzcjil%26cvtwsas%3Dttchqbwr%26thbw%3Dfstnzsh%26thhglee%3Dkzsgswit%26iizz%3Dhpvogha%26hmbwuzq%3Dfilorduk%26cunp%3Dnhwvcbd%26gdrvwdv%3Dgqwwbzuq%26ilty%3Deagyudc%26itknbva%3Dsbfavtnk%26gjlu%3Dnqaglxn%26mrmfjee%3Dxwpodlmj%26qknk%3Duggtyao%26mdaaclr%3Djwmwywrx%26nxgd%3Dydqqawk%26ibskbyz%3Deujqstmb%26hpkr%3Dmlxxgks%26eivxpwq%3Dotpwhioj%26hvrx%3Dzuchxtx%26hdmpdgk%3Dwnnxxklk%26fazk%3Dkyqhssx%26geglyya%3Ddlvpwlnm%26avcm%3Ddnnwuqs%26dlofbgz%3Dngnlfhga%26zqkj%3Dhoqixkx%26zrenpfy%3Dojcmmoyy%26kobu%3Dkpbpvty%26rxmqemn%3Dgsprqvuf%26ahrr%3Dhewpbki%26qxmoqna%3Dsmtuczoj%26covv%3Detxdord%26vpvelhe%3Ddapyasoe%26cudt%3Dpdgwaay%26kleugke%3Doxqfwiqw%26hljb%3Depcyxdm%26ypctgvo%3Dczuuwire%26crax%3Dcnxmiuw%26spupbvv%3Dovqdpzqa%26kjje%3Dpjfavpg%26kqvhacj%3Dsmqypqqz%26jnoa%3Dpobryjd%26ynchqcn%3Drjxzoxwk%26dkck%3Dvkekqrr%26acbvftn%3Dkrcgxouz%26pjbb%3Dxpkhnqv%26ptoijep%3Drpxpmrhr%26cpic%3Dgrnbkdg%26rncpvec%3Dwnlpnmju&psi=apo_Z5nVAcu8xc8P4OuNiQc.1732221552773&dpr=1&ofp=EAEY2OaT-9Sbtux-GLLzqImnlvarvAEY5OWF16aZtPQ1GOXiv73HotiYWxivgYSl1pCSnLQBMrEBCgsKCWFkcCBsb2dpbgoXChVpcGF5LmFkcC5jb20gcmVnaXN0ZXIKFwoVaXBheS5hZHAgbW9iaWxlIGxvZ2luChUKE2FkcCBpcGF5IHN0YXRlbWVudHMKCQoHYWRwIGFwcAodChthZHAgd29ya2ZvcmNlIG5vdyBsb2dpbiBhcHAKDgoMYWRwIGNsb2NrIGluCh0KG2FkcCBjdXN0b21lciBzZXJ2aWNlIG51bWJlchBHMnoKIgogV2h5IGlzIEFEUCBub3QgbGV0dGluZyBtZSBsb2dpbj8KIQofV2hhdCBpcyB0aGUgQURQIHBheXJvbGwgc3lzdGVtPwouCixJcyB0aGVyZSBzb21ldGhpbmcgd3Jvbmcgd2l0aCBBRFAgcmlnaHQgbm93PxDkAg
                            Preview:)]}'.[[["\u003cb\u003eadp login\u003c\/b\u003e",0,[432,598,71]],["\u003cb\u003eipay.adp.com register\u003c\/b\u003e",0,[432,598,71]],["\u003cb\u003eipay.adp mobile login\u003c\/b\u003e",0,[432,598,71]],["\u003cb\u003eadp ipay statements\u003c\/b\u003e",0,[432,598,71]],["\u003cb\u003eadp app\u003c\/b\u003e",0,[432,598,71]],["\u003cb\u003eadp workforce now login app\u003c\/b\u003e",0,[432,598,71]],["\u003cb\u003eadp clock in\u003c\/b\u003e",0,[432,598,71]],["\u003cb\u003eadp customer service number\u003c\/b\u003e",0,[432,598,71]]],{"q":"1cz58SO-IFg6g5Y2BkgEdN-L7Vs"}]
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:Unicode text, UTF-8 text, with very long lines (14154)
                            Category:dropped
                            Size (bytes):14161
                            Entropy (8bit):4.844604688688735
                            Encrypted:false
                            SSDEEP:
                            MD5:39B1CB9DBAF49506E74DF85B198CA0E2
                            SHA1:4A1CC940DA980DA244321322E0EAC4B83C442706
                            SHA-256:84653D79A894E319BA2EDAE75BE11CC8A747AF43A0F2BE73D89AD5A67C00C283
                            SHA-512:53984FE949A4A37EB87E059A2F8F550D8455AC1A2C9DEF6E17354A25DAB84C2356178D1DA29782BA7F59A9B79B4964A9F5639855732800287F9A5AE039D7374F
                            Malicious:false
                            Reputation:unknown
                            Preview:)]}'.{"april":"April","august":"August","back":"Back","bonus_instruction":"1 point for each player's claimed cards at end of game.","bonus_title":"Bonus Points","cancel":"Cancel","card_selected_label":"selected","choose_carddestroy":"Choose a card to destroy.","choose_connectionline":"Choose a connection line between slots to destroy.","choose_flip":"Choose a card on the board to flip horizontally.","choose_twocardsdestroy":"Choose 2 cards to destroy.","choose_verticalline":"Choose a vertical line of cards to take control of.","continue":"Continue","december":"December","deckbuilding_clickselect":"Click card to select/deselect","deckbuilding_cofirm":"Ready","deckbuilding_count":"{NUMBER} / 4 cards chosen","deckbuilding_tapselect":"Tap card to select/deselect","deckbuilding_title":"Build your Deck","deckbulding-subtitle":"Choose up to 4 Wildcards to add to your deck for this game.","difficulty_increase":"The darkness has grown stronger...","effect_all_claimed_cards_destroyed":"All the H
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (1302)
                            Category:dropped
                            Size (bytes):116987
                            Entropy (8bit):5.487092744347448
                            Encrypted:false
                            SSDEEP:
                            MD5:DF907C9E6BC048EA1505930FAB9010A9
                            SHA1:51FF7084F44C713E30335C5D30CFC1AAC8F34774
                            SHA-256:B3B7340EE6C9240EE8FCFEDA03C6EF4CE7DB0DD0DC213B19C8D4C87ADDC15105
                            SHA-512:27D9A9B0372D97847418488D9F1DF50C0CA475156EF78E0103D45084580806232C0EBD3087729A9860E059B0DC620D367E0617B8BDE43FFBC8B42253C528B58B
                            Malicious:false
                            Reputation:unknown
                            Preview:gapi.loaded_0(function(_){var window=this;._._F_toggles_initialize=function(a){(typeof globalThis!=="undefined"?globalThis:typeof self!=="undefined"?self:this)._F_toggles=a||[]};(0,_._F_toggles_initialize)([0x200000, ]);.var aa,ba,fa,ma,na,ra,sa,ua;aa=function(a){var b=0;return function(){return b<a.length?{done:!1,value:a[b++]}:{done:!0}}};ba=typeof Object.defineProperties=="function"?Object.defineProperty:function(a,b,c){if(a==Array.prototype||a==Object.prototype)return a;a[b]=c.value;return a};.fa=function(a){a=["object"==typeof globalThis&&globalThis,a,"object"==typeof window&&window,"object"==typeof self&&self,"object"==typeof global&&global];for(var b=0;b<a.length;++b){var c=a[b];if(c&&c.Math==Math)return c}throw Error("a");};_.ka=fa(this);ma=function(a,b){if(b)a:{var c=_.ka;a=a.split(".");for(var d=0;d<a.length-1;d++){var e=a[d];if(!(e in c))break a;c=c[e]}a=a[a.length-1];d=c[a];b=b(d);b!=d&&b!=null&&ba(c,a,{configurable:!0,writable:!0,value:b})}};.ma("Symbol",function(a){if(a)r
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:Web Open Font Format (Version 2), TrueType, length 15996, version 1.0
                            Category:downloaded
                            Size (bytes):15996
                            Entropy (8bit):7.989012096227512
                            Encrypted:false
                            SSDEEP:
                            MD5:CC536892EABDE0EAEB81493BDA8E189A
                            SHA1:15C0180AD7BDF9D0F963747447BC9446FC42D2DC
                            SHA-256:97399A2914C593DA2895D9729AA0170A1956E91EE54CF7550696691949558A37
                            SHA-512:94F605C4C4FE76EBDB2D5428C6BA69F83B75C65B6932251C0C3E90F92CC1F421FD9F15E81D5985693DC564B8644D90A26DA3E9C63976CF5862ED54D5ED0C4320
                            Malicious:false
                            Reputation:unknown
                            URL:https://fonts.gstatic.com/s/googlesanstext/v22/5aUu9-KzpRiLCAt4Unrc-xIKmCU5qEp2iw.woff2
                            Preview:wOF2......>|..........>...........................<..:..:.`..:.....p..~.....6.$..(. ..>..N.....5xn.u..b.....c..<..Rw.H..q.(.....9A...^.=h.%J...4.\.\.[....[....h.j..AP.....a..]N.o....6.a..uO..R.|o...wO..t....s....^F...Oy....IN^..X...9sg...(;..L.....5.s~...?....%.0.f....b.. ..;.. "k+.v`.....1kq.\mqLp.]|..Z\..O......=.......h..,u.................y.h.o.Z..%.....g#..B......V...3.r....J..>g.-rU?+.3A.....C...... .21..f...Z.......P..o..g\.b... v...6..0...b.....?..-WL...Z2...1..Q./....... ..C..G.^r....O......io;.o..4.<....7.Pm..!.Nu.=..Oc............e.w.g.....,...c...0V.P...R.){..u...>*.fi..S.w.G...-..... $.8......w..hp...T@..Go....).......;.....B.)..p.\.?.-KC.S.5..pX9...'.!.-....R.Sg.>x.o.yP......S....a...m<.+".t%..3x.?3M;....k.....I&I.3g.26...p...}~....X.x..G.<)..k..U....AZ..A@....Cu..Tv{...|v.04H.$Xc..E.)<...!........^..~.7P.u...xH..rX..8O....y.k(...0.p 0.%.U...*Z...%...|LlUJ.]L_...9..AX.$E.$.sa.(v8L!...rc.-....I..W..........^U...@.....3P............M..
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:HTML document, ASCII text, with very long lines (39648)
                            Category:downloaded
                            Size (bytes):604290
                            Entropy (8bit):5.913298517753323
                            Encrypted:false
                            SSDEEP:
                            MD5:C990E49CDE64D65F33CB760B87C2A149
                            SHA1:B88321EA8BBCCEA7FD228199D9D34928732A9AA4
                            SHA-256:93F0E7D5F85ABCAD51F3FEDB87A0C7B157593D0DE7821F03FD3865C2FB5E90C7
                            SHA-512:7D5C89C3021D08114FE7780FFAE634AE270C85DC72FDAD5B6660E4C734DB22A696A117D18DC6B52ABC836E8457FBEEC435553A28602C7D8E22B9E87DB2CEBE1E
                            Malicious:false
                            Reputation:unknown
                            URL:https://www.google.com/search?q=https%3A%2F%2Foviteweltxddfrszluspazr%26ipmp%3Dsxvjova%26ygojnb%3Dfcl%26elerk%3Dhfbmay%26ayt%3Dyrhphmb%26pddud%3Dezxxsf%26nuqs%3Dzlhwdht%26gaxffgl%3Dpszq%26duvvs%3Dvolgvy%26gkxzodc%3Djel%26qxfv%3Dnnvdnwmd%26rqqvtcmspp%3Drxqkebhlxe%26q%3Damp%2Fshxzygr.a%25c2%25adyqbtb%25c2%25adbx%25c2%25adj%25c2%25adp%25c2%25adx%25c2%25adjxlcs%25c2%25ads.com%25e2%2580%258b%2Fb8b2rxwmh%26ksla%3Dtapqwwz%26jnnbhkq%3Dttdmivnp%26cfjt%3Defvfrgoe%26oqiqdbkskf%3Dkyuuqptwrp%26tvge%3Ddkzlwfl%26xinkvob%3Dipnmjidq%26ijie%3Duljbrnkt%26otqzapkzkg%3Dkmqusroise%26pria%3Dnlusrhl%26ymcacxc%3Dzcifoamd%26qigt%3Dtulcumns%26hhzbkqbcaz%3Dwwvxgvrfea%26yjoo%3Ddorlplq%26setubwl%3Dgxyhfmbx%26shjzsftutp%3Dfpvhstinfx%26aabm%3Dcriocrm%26hjizanz%3Dpegjdgeo%26fawgntlmwo%3Djqpmhlrvtn%26roup%3Dizmvjyq%26gxeotbo%3Dusfofocn%26bjditvldqx%3Douxvzuvslt%26vvra%3Dilqxudw%26urpmgcs%3Dymqwcpzq%26yrvwdmllag%3Dvdvavnqley%26nzuk%3Dccmlbne%26nkpwqws%3Dsngrhfzo%26gbgxvugiga%3Dryzhrucpyl%26irec%3Dtxrssof%26zsogcrm%3Diayomywb%26trpv%3Dtsllqaa%26ikkahrz%3Dowzvqchv%26nvsg%3Djqklsur%26mifuzci%3Dijrnkgyc%26gxpk%3Dlvdrwxp%26ijyljat%3Dmglwbmtx%26atpa%3Dzczuwuy%26wqrobkl%3Dkbbvlqru%26smzd%3Dipgsgqz%26tspepjo%3Dzblbkdbs%26cuqg%3Dqokwyqc%26pngakdv%3Dhnokowhl%26kmzi%3Dutnaspz%26isnjuod%3Dnzzrblql%26gwhl%3Dinsrinb%26ysonvuu%3Dwjleaqhv%26ilqq%3Dittadax%26ktcegkw%3Duqqodjle%26wwle%3Danzcjil%26cvtwsas%3Dttchqbwr%26thbw%3Dfstnzsh%26thhglee%3Dkzsgswit%26iizz%3Dhpvogha%26hmbwuzq%3Dfilorduk%26cunp%3Dnhwvcbd%26gdrvwdv%3Dgqwwbzuq%26ilty%3Deagyudc%26itknbva%3Dsbfavtnk%26gjlu%3Dnqaglxn%26mrmfjee%3Dxwpodlmj%26qknk%3Duggtyao%26mdaaclr%3Djwmwywrx%26nxgd%3Dydqqawk%26ibskbyz%3Deujqstmb%26hpkr%3Dmlxxgks%26eivxpwq%3Dotpwhioj%26hvrx%3Dzuchxtx%26hdmpdgk%3Dwnnxxklk%26fazk%3Dkyqhssx%26geglyya%3Ddlvpwlnm%26avcm%3Ddnnwuqs%26dlofbgz%3Dngnlfhga%26zqkj%3Dhoqixkx%26zrenpfy%3Dojcmmoyy%26kobu%3Dkpbpvty%26rxmqemn%3Dgsprqvuf%26ahrr%3Dhewpbki%26qxmoqna%3Dsmtuczoj%26covv%3Detxdord%26vpvelhe%3Ddapyasoe%26cudt%3Dpdgwaay%26kleugke%3Doxqfwiqw%26hljb%3Depcyxdm%26ypctgvo%3Dczuuwire%26crax%3Dcnxmiuw%26spupbvv%3Dovqdpzqa%26kjje%3Dpjfavpg%26kqvhacj%3Dsmqypqqz%26jnoa%3Dpobryjd%26ynchqcn%3Drjxzoxwk%26dkck%3Dvkekqrr%26acbvftn%3Dkrcgxouz%26pjbb%3Dxpkhnqv%26ptoijep%3Drpxpmrhr%26cpic%3Dgrnbkdg%26rncpvec%3Dwnlpnmju&oq=https%3A%2F%2Foviteweltxddfrszluspazr%26ipmp%3Dsxvjova%26ygojnb%3Dfcl%26elerk%3Dhfbmay%26ayt%3Dyrhphmb%26pddud%3Dezxxsf%26nuqs%3Dzlhwdht%26gaxffgl%3Dpszq%26duvvs%3Dvolgvy%26gkxzodc%3Djel%26qxfv%3Dnnvdnwmd%26rqqvtcmspp%3Drxqkebhlxe%26q%3Damp%2Fshxzygr.a%25c2%25adyqbtb%25c2%25adbx%25c2%25adj%25c2%25adp%25c2%25adx%25c2%25adjxlcs%25c2%25ads.com%25e2%2580%258b%2Fb8b2rxwmh%26ksla%3Dtapqwwz%26jnnbhkq%3Dttdmivnp%26cfjt%3Defvfrgoe%26oqiqdbkskf%3Dkyuuqptwrp%26tvge%3Ddkzlwfl%26xinkvob%3Dipnmjidq%26ijie%3Duljbrnkt%26otqzapkzkg%3Dkmqusroise%26pria%3Dnlusrhl%26ymcacxc%3Dzcifoamd%26qigt%3Dtulcumns%26hhzbkqbcaz%3Dwwvxgvrfea%26yjoo%3Ddorlplq%26setubwl%3Dgxyhfmbx%26shjzsftutp%3Dfpvhstinfx%26aabm%3Dcriocrm%26hjizanz%3Dpegjdgeo%26fawgntlmwo%3Djqpmhlrvtn%26roup%3Dizmvjyq%26gxeotbo%3Dusfofocn%26bjditvldqx%3Douxvzuvslt%26vvra%3Dilqxudw%26urpmgcs%3Dymqwcpzq%26yrvwdmllag%3Dvdvavnqley%26nzuk%3Dccmlbne%26nkpwqws%3Dsngrhfzo%26gbgxvugiga%3Dryzhrucpyl%26irec%3Dtxrssof%26zsogcrm%3Diayomywb%26trpv%3Dtsllqaa%26ikkahrz%3Dowzvqchv%26nvsg%3Djqklsur%26mifuzci%3Dijrnkgyc%26gxpk%3Dlvdrwxp%26ijyljat%3Dmglwbmtx%26atpa%3Dzczuwuy%26wqrobkl%3Dkbbvlqru%26smzd%3Dipgsgqz%26tspepjo%3Dzblbkdbs%26cuqg%3Dqokwyqc%26pngakdv%3Dhnokowhl%26kmzi%3Dutnaspz%26isnjuod%3Dnzzrblql%26gwhl%3Dinsrinb%26ysonvuu%3Dwjleaqhv%26ilqq%3Dittadax%26ktcegkw%3Duqqodjle%26wwle%3Danzcjil%26cvtwsas%3Dttchqbwr%26thbw%3Dfstnzsh%26thhglee%3Dkzsgswit%26iizz%3Dhpvogha%26hmbwuzq%3Dfilorduk%26cunp%3Dnhwvcbd%26gdrvwdv%3Dgqwwbzuq%26ilty%3Deagyudc%26itknbva%3Dsbfavtnk%26gjlu%3Dnqaglxn%26mrmfjee%3Dxwpodlmj%26qknk%3Duggtyao%26mdaaclr%3Djwmwywrx%26nxgd%3Dydqqawk%26ibskbyz%3Deujqstmb%26hpkr%3Dmlxxgks%26eivxpwq%3Dotpwhioj%26hvrx%3Dzuchxtx%26hdmpdgk%3Dwnnxxklk%26fazk%3Dkyqhssx%26geglyya%3Ddlvpwlnm%26avcm%3Ddnnwuqs%26dlofbgz%3Dngnlfhga%26zqkj%3Dhoqixkx%26zrenpfy%3Dojcmmoyy%26kobu%3Dkpbpvty%26rxmqemn%3Dgsprqvuf%26ahrr%3Dhewpbki%26qxmoqna%3Dsmtuczoj%26covv%3Detxdord%26vpvelhe%3Ddapyasoe%26cudt%3Dpdgwaay%26kleugke%3Doxqfwiqw%26hljb%3Depcyxdm%26ypctgvo%3Dczuuwire%26crax%3Dcnxmiuw%26spupbvv%3Dovqdpzqa%26kjje%3Dpjfavpg%26kqvhacj%3Dsmqypqqz%26jnoa%3Dpobryjd%26ynchqcn%3Drjxzoxwk%26dkck%3Dvkekqrr%26acbvftn%3Dkrcgxouz%26pjbb%3Dxpkhnqv%26ptoijep%3Drpxpmrhr%26cpic%3Dgrnbkdg%26rncpvec%3Dwnlpnmju&gs_lcrp=EgZjaHJvbWUyBggAEEUYOTIGCAEQRRg60gEJMTkzMzRqMGo0qAIAsAIA&sourceid=chrome&ie=UTF-8
                            Preview:<!doctype html><html itemscope="" itemtype="http://schema.org/SearchResultsPage" lang="en"><head><meta charset="UTF-8"><meta content="origin" name="referrer"><meta content="/images/branding/googleg/1x/googleg_standard_color_128dp.png" itemprop="image"><title>https://oviteweltxddfrszluspazr&amp;ipmp=sxvjova&amp;ygojnb=fcl&amp;elerk=hfbmay&amp;ayt=yrhphmb&amp;pddud=ezxxsf&amp;nuqs=zlhwdht&amp;gaxffgl=pszq&amp;duvvs=volgvy&amp;gkxzodc=jel&amp;qxfv=nnvdnwmd&amp;rqqvtcmspp=rxqkebhlxe&amp;q=amp/shxzygr.a%c2%adyqbtb%c2%adbx%c2%adj%c2%adp%c2%adx%c2%adjxlcs%c2%ads.com%e2%80%8b/b8b2rxwmh&amp;ksla=tapqwwz&amp;jnnbhkq=ttdmivnp&amp;cfjt=efvfrgoe&amp;oqiqdbkskf=kyuuqptwrp&amp;tvge=dkzlwfl&amp;xinkvob=ipnmjidq&amp;ijie=uljbrnkt&amp;otqzapkzkg=kmqusroise&amp;pria=nlusrhl&amp;ymcacxc=zcifoamd&amp;qigt=tulcumns&amp;hhzbkqbcaz=wwvxgvrfea&amp;yjoo=dorlplq&amp;setubwl=gxyhfmbx&amp;shjzsftutp=fpvhstinfx&amp;aabm=criocrm&amp;hjizanz=pegjdgeo&amp;fawgntlmwo=jqpmhlrvtn&amp;roup=izmvjyq&amp;gxeotbo=usfofocn&amp
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text
                            Category:dropped
                            Size (bytes):102
                            Entropy (8bit):5.132798667149194
                            Encrypted:false
                            SSDEEP:
                            MD5:A5EE6154DDBCA1E44ACED8BA35EEDFE2
                            SHA1:58BC2CB9B399ED363C4082073C4154775366A21A
                            SHA-256:D9D230407BEF887ECFFA918F9231A8A5E7DB1E63ECB10D06C299B5BC2E2ADFE4
                            SHA-512:E97F4D364A140C135E2B0CC8ECDC8A3008700687BBA93D91F9C58FD9B419236DCA8A82D3F1FCB316580D84DB4D58192A59B387D44A86B7B119BABE2567D558F4
                            Malicious:false
                            Reputation:unknown
                            Preview:)]}'.22;["VZo_Z9npOYCG7NYP1ubGsAg","2120"]c;[2,null,"0"]1b;<div jsname="Nll0ne"></div>c;[9,null,"0"]0;
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text
                            Category:downloaded
                            Size (bytes):101
                            Entropy (8bit):5.107938934383824
                            Encrypted:false
                            SSDEEP:
                            MD5:4D41043A9D7D782AB405C9D7873C8E0B
                            SHA1:A44882A0D8BDC5CD685C328C6D0F01924294508F
                            SHA-256:C0A53176F57234F68509CE7848782F648AC9CC963C3C91B8399DBFDEDF77D444
                            SHA-512:AC27CE8B7389FFBA27E98DA352612E8B91754CF13316593AB29F615B479FC7C66C3643B87ED0D446070149D6641F39E4D0B343426F1921AD38BCA380ECF1A350
                            Malicious:false
                            Reputation:unknown
                            URL:"https://www.google.com/async/hpba?vet=10ahUKEwism8Xno-6JAxURSaQEHa7qD_AQj-0KCBc..i&ei=Fpo_Z6y4HJGSkdUPrtW_gA8&opi=89978449&yv=3&sp_imghp=false&sp_hpte=1&sp_hpep=1&stick=&cs=0&async=_basejs:%2Fxjs%2F_%2Fjs%2Fk%3Dxjs.hd.en_US.Krtc5zmDtmw.es5.O%2Fam%3DAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEAAAAAAAAAAAAMAAAAQAAAAAAgAAAAAAAAAhABAEAAABAAAALAAAEAwAAACAEBAAACAAAAeZQoAAkQAAAAACAAgACAAABAAAAAIAAAAAAAAKAAAAAAAEAAAAAAAAAAAAgQAAAAAAAAAAAAIAABADwAAAAAAAAAQEAAAhoABCAAAAAAAAOgDgOABGFJYAAAAAAAAAAAAAAAACJAgmAsJCAhAAAAAAAAAAAAAAAAAAACRJi5s%2Fdg%3D0%2Fbr%3D1%2Frs%3DACT90oEZORBC7FYrMjqmDQMo_6hv7JEAHA,_basecss:%2Fxjs%2F_%2Fss%2Fk%3Dxjs.hd.rVqMNzqlVlQ.L.B1.O%2Fam%3DCKkCAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEAAAAAAAAAABOwEAAADAOwCBAgAAAAAwAAAAAABEAAAABBAAKACAAAAAAAgAABEABAAUAAAAAiMAgAAARlACUACACAABQEACAAIAASQQUMgKgBRAAAAAAAAAAACAAAAhgAQCADQARAABoBIAABEDwQAAAAAIAgAYCYAhoABCAAAAAAAACADAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAgAKA%2Fbr%3D1%2Frs%3DACT90oHOuxEPhlzZ3IGP944yO_Wxq-S9gw,_basecomb:%2Fxjs%2F_%2Fjs%2Fk%3Dxjs.hd.en_US.Krtc5zmDtmw.es5.O%2Fck%3Dxjs.hd.rVqMNzqlVlQ.L.B1.O%2Fam%3DCKkCAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEAAAAAAAAAABO8EAAATAOwCBAgAAAAAwAAAhABBEAAABBBAALACAEAwAAAiAEBEABCAUAAeZQqMAkQAARlACUAiACAABREACAAIAASQQUMgKgBRAAAAEAAAAAACAAAAhgQQCADQARAABoBIAABEDwQAAAAAIAgQcCYAhoABCAAAAAAAAOgDgOABGFJYAAAAAAAAAAAAAAAACJAgmAsJKAhAAAAAAAAAAAAAAAAAAACRJi5s%2Fd%3D1%2Fed%3D1%2Fdg%3D0%2Fbr%3D1%2Fujg%3D1%2Frs%3DACT90oGKeVEqew9R43QKjD8zvGSVNhvlOA,_fmt:prog,_id:_Fpo_Z6y4HJGSkdUPrtW_gA8_9"
                            Preview:)]}'.21;["JZo_Z74snIXs1g_09t-QCg","2120"]c;[2,null,"0"]1b;<div jsname="Nll0ne"></div>c;[9,null,"0"]0;
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:PNG image data, 120 x 44, 8-bit colormap, non-interlaced
                            Category:downloaded
                            Size (bytes):2899
                            Entropy (8bit):7.827107538095502
                            Encrypted:false
                            SSDEEP:
                            MD5:5E37BAD4170436733F4D60FF7BB46247
                            SHA1:A2E90D970AA20174C7EB1EF8EBB0A91F22BA09BA
                            SHA-256:17350EA3FB30943E3929CEE6594732DA556F06E1C8873135B52C1F22809CDF7A
                            SHA-512:F1A65D9CB8B15B56635ECC28A035A5DE85460E42EA2BC0D38676BCB843F20C9CF1A7888217E79343D312E743719AF45DD2281B618936A033451F597732CFE4FE
                            Malicious:false
                            Reputation:unknown
                            URL:https://www.google.com/logos/doodles/2024/rise-of-the-half-moon-november-6753651837110598.2-s.png
                            Preview:.PNG........IHDR...x...,.............PLTEGpL8{p7zp4tr:|o8{p@]l5xs...5yr7sv7{p7zq7zp;sv..7zq8zo7zp7{p7zq7zp8zp7{p7{q7zp7zp7zp7zp7zp7{q7zp7zq7zp8zq7zp...7zp7zp...1^{8zp7zq7zp......7yq7{q...6{q7zpU..7zq6zoU..7{p6zr..8zp1_{7zp...1`}2`|1_|0^z1_|.........3g{......7zp8{pU..U..U.....0^{2b|U.....2a~...2`~.]{0]{1`|N..7zp8qxU..U..U.....V..8{pU....W.....1`}1_}0`}0a|......2_|1_{............7yp...7|n0^y...8{p7{q8{q7zrU..U..0_{V..7zq........U../]x2[y2_~V..U..7wrU..............7{q.=S.@V.AW8{q.<R.?U.D[.=R E\ F].CY.>T.BX.;P3a~.>S...0^{.<Q(Qj.[v%Me1_|2`}$Kc!G^&Ng#Ja.BY3b.0]y(Rl"I`.Rs+WrV..0`}....]{/\x-Xs)[y-Yu.:P.<R.7M............!H_......*Up"H`...'Oh6tt.Xw......"Uu...@h.*Tnu.........................5nw......Zj}Em.Rdx*F[%BW...h..@UjFYm.........ft........2cw3iy9{q4d./K`...2c|....Op...J^s...{.....Ry....|.....n{.........tRNS...'n......C...t/..;.`.K......W..e......Q..[..)~e.H.!..w.+..D).~.b.l..._.....h.._$f.....!n.E..>...</t.L....1=3%/.5..{-......V........;.."...rIDATx^.gt.W...`#l...J..c
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:Web Open Font Format (Version 2), TrueType, length 15436, version 1.0
                            Category:downloaded
                            Size (bytes):15436
                            Entropy (8bit):7.986311903040136
                            Encrypted:false
                            SSDEEP:
                            MD5:037D830416495DEF72B7881024C14B7B
                            SHA1:619389190B3CAFAFB5DB94113990350ACC8A0278
                            SHA-256:1D5B7C64458F4AF91DCFEE0354BE47ADDE1F739B5ADED03A7AB6068A1BB6CA97
                            SHA-512:C8D2808945A9BF2E6AD36C7749313467FF390F195448C326C4D4D7A4A635A11E2DDF4D0779BE2DB274F1D1D9D022B1F837294F1E12C9F87E3EAC8A95CFD8872F
                            Malicious:false
                            Reputation:unknown
                            URL:https://fonts.gstatic.com/s/roboto/v18/KFOlCnqEu92Fr1MmWUlfBBc4.woff2
                            Preview:wOF2......<L.......|..;..........................d..z..J.`..L.H..<........e..^...x.6.$..6. ..~. ..).7{...K.. .k~....".v(...[...RE.$..K..C,.'..{BK.C&.....'L!...DZ........+6.r...K..._...<..0..].V..........e.r(RN.43k;g`...?<?.......b..c.`.. .6..p...5.$zd.R%.........h....";.^WU.....H........S.j..M:..=K..\B.6"f......z.........$...%w.?$-....9.:u....u.I..Tt..s........lY...J.6oN..y...1,I.Yx..lu..}.e...Og..d...Xv.. ...iF.]..x.N..#%,y.&..,*$.^.n...\.K.P.J.x...H$..-.....p.....t.v...gD^....?..6o......e....,f.)..h...P...<.:.E...X..p....U.?.[m....l.Y.S..p..%..K.,U..3U.qFZo.*...U...3..3.]\.C.#..9T.8P`8......P...R;..r..J.*...u.j..^vnf.v.... .pw...Z.(.6%$U.[.|....!mU\}./..i,..7D........:t'.a;.W(.."G....q.-.Z......;J..0.&/.5. .T......w..;...t...H.t.<y ..@xx .JA.U.t..;g....@..... .t......<.5(^.|s..Ko.O.x.....!...........lHF............So{.%..V...7..aA$....C;,"(.J..EE..@.....vOB.,V..../....B#.r+./-t.(.N.S...R.Z$4...4i.c.}t...#3`.......s..;.O,.|..W.A.f.w.
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:PNG image data, 1980 x 1936, 8-bit colormap, non-interlaced
                            Category:downloaded
                            Size (bytes):94072
                            Entropy (8bit):7.928119223192744
                            Encrypted:false
                            SSDEEP:
                            MD5:86CF71ABF9C2C977E54B8C542CFC3F23
                            SHA1:EF09A21D3EB3B85C66875815A38A8EEEB4BB5027
                            SHA-256:B4801E3BDC8CE0DBDACAB6B7161AEA899B6A74E9CF208C1350C53E5B3FB2805C
                            SHA-512:42253542F64B03233A61AD017D28231402F609875CDE717A1CA7BDFB51203343C9A776542E8426C0D238A4610038A4547966D15D8877B976479AA66A708911C8
                            Malicious:false
                            Reputation:unknown
                            URL:https://www.google.com/logos/2024/moon/novr2/background-sprite.png
                            Preview:.PNG........IHDR.............ie......PLTEGpL.................................................................................................................................................jov[coWbto...............................................................................................{.._t.Xl.Se.IYpDTjAPe>L`:GZ@CH37=03;16>7>I...................................................s..m..f|.N`x6BT2=N.9H+5C(0=$,8!(2. $.....................................#-. (..#....................................................................................u.....................................................~.............................x.....................................................................................................................................................=.F....tRNS.........................!#$&(*-/02468;^|..........uH-L`s.......G>................................{[........B?..................-........yq.......V.....jc]YR......lB..................
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (7408)
                            Category:downloaded
                            Size (bytes):130442
                            Entropy (8bit):5.714539161294275
                            Encrypted:false
                            SSDEEP:
                            MD5:4349A379F0B7843BC308F0451D5A153B
                            SHA1:A29D5EA488E9F67AF99C7D2CD0B0E52164EA4E5C
                            SHA-256:AB7E7014F5F3F214F0CD27E4A532F0047E9FFE5AC2DA3DDAFB6769B5057B52B7
                            SHA-512:FABB9BEBC469409EE0775E6E15BFB91794184053648E7F012CE92E118D431A3F7B8670F92E2B3A8763D2A827C0249CF8E6F8485500A2957973C20944129EB428
                            Malicious:false
                            Reputation:unknown
                            URL:"https://www.google.com/xjs/_/js/k=xjs.hd.en_US.Krtc5zmDtmw.es5.O/ck=xjs.hd.rVqMNzqlVlQ.L.B1.O/am=CKkCAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEAAAAAAAAAABO8EAAATAOwCBAgAAAAAwAAAhABBEAAABBBAALACAEAwAAAiAEBEABCAUAAeZQqMAkQAARlACUAiACAABREACAAIAASQQUMgKgBRAAAAEAAAAAACAAAAhgQQCADQARAABoBIAABEDwQAAAAAIAgQcCYAhoABCAAAAAAAAOgDgOABGFJYAAAAAAAAAAAAAAAACJAgmAsJKAhAAAAAAAAAAAAAAAAAAACRJi5s/d=0/dg=0/br=1/ujg=1/rs=ACT90oGKeVEqew9R43QKjD8zvGSVNhvlOA/m=loL8vb,sys4,sys3,sys2,ms4mZb,sypo,B2qlPe,syul,NzU6V,syzg,syv2,zGLm3b,sywf,sywg,syw6,DhPYme,syym,syyh,syyk,syyj,sywz,syx0,syyi,syyf,syyg,KHourd,MpJwZc,UUJqVe,sy7s,sOXFj,sy7r,s39S4,oGtAuc,NTMZac,nAFL3,sy85,sy84,q0xTif,y05UD,sy132,sy19o,sy19i,syxm,sy19a,sy14j,syxl,syxk,syxj,sy19h,sy14c,sy197,sy14g,syv6,sy19g,sy12y,sy19b,sy14h,sy14i,sy19j,sy12p,sy19f,sy19e,sy19c,syn6,sy19d,sy19l,sy191,sy198,sy190,sy196,sy192,sy18w,sy15f,sy14l,sy14m,syxr,syxs,epYOx?xjs=s3"
                            Preview:_F_installCss("c-wiz{contain:style}c-wiz>c-data{display:none}c-wiz.rETSD{contain:none}c-wiz.Ubi8Z{contain:layout style}.jbBItf{display:block;position:relative}.DU0NJ{bottom:0;left:0;position:absolute;right:0;top:0}.lP3Jof{display:inline-block;position:relative}.nNMuOd{animation:qli-container-rotate 1568.2352941176ms linear infinite}@keyframes qli-container-rotate{from{transform:rotate(0)}to{transform:rotate(1turn)}}.RoKmhb{height:100%;opacity:0;position:absolute;width:100%}.nNMuOd .VQdeab{animation:qli-fill-unfill-rotate 5332ms cubic-bezier(0.4,0,0.2,1) infinite both,qli-blue-fade-in-out 5332ms cubic-bezier(0.4,0,0.2,1) infinite both}.nNMuOd .IEqiAf{animation:qli-fill-unfill-rotate 5332ms cubic-bezier(0.4,0,0.2,1) infinite both,qli-red-fade-in-out 5332ms cubic-bezier(0.4,0,0.2,1) infinite both}.nNMuOd .smocse{animation:qli-fill-unfill-rotate 5332ms cubic-bezier(0.4,0,0.2,1) infinite both,qli-yellow-fade-in-out 5332ms cubic-bezier(0.4,0,0.2,1) infinite both}.nNMuOd .FlKbCe{animation:qli
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:HTML document, ASCII text, with very long lines (13312)
                            Category:downloaded
                            Size (bytes):216105
                            Entropy (8bit):5.87872023049674
                            Encrypted:false
                            SSDEEP:
                            MD5:39581AF91DB9B5568404F3DD0A778329
                            SHA1:1ACDDB5D348EF36C8101D7847A14DA3063C5EAF3
                            SHA-256:3FCDB10742FD845B5816BFAF28C51041D6C1D0945E35DA21E61A466D2168BAB7
                            SHA-512:0B10D9C5B9FBF6B3AE4C21B44E87F572D4FA53B95A2CB7C9393196E6BEB3432425BFABA07FB31E8664CB281C8C5AB1AB25256940F16E4DE886169D425945C70E
                            Malicious:false
                            Reputation:unknown
                            URL:https://www.google.com/
                            Preview:<!doctype html><html itemscope="" itemtype="http://schema.org/WebPage" lang="en"><head><meta charset="UTF-8"><meta content="origin" name="referrer"><meta content="/images/branding/googleg/1x/googleg_standard_color_128dp.png" itemprop="image"><title>Google</title><script nonce="MstX7Zk6SSD1qcuGc1LO6g">window._hst=Date.now();performance&&performance.mark&&performance.mark("SearchHeadStart");</script><script nonce="MstX7Zk6SSD1qcuGc1LO6g">(function(){var _g={kEI:'UJo_Z77WKPqHkdUP96vUkAs',kEXPI:'31',kBL:'-W2N',kOPI:89978449};(function(){var a;((a=window.google)==null?0:a.stvsc)?google.kEI=_g.kEI:window.google=_g;}).call(this);})();(function(){google.sn='webhp';google.kHL='en';})();(function(){.var g=this||self;function k(){return window.google&&window.google.kOPI||null};var l,m=[];function n(a){for(var b;a&&(!a.getAttribute||!(b=a.getAttribute("eid")));)a=a.parentNode;return b||l}function p(a){for(var b=null;a&&(!a.getAttribute||!(b=a.getAttribute("leid")));)a=a.parentNode;return b}functio
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 148x83, components 3
                            Category:downloaded
                            Size (bytes):3693
                            Entropy (8bit):7.882133069057775
                            Encrypted:false
                            SSDEEP:
                            MD5:C9F873579F45EE96396471487C164938
                            SHA1:A0D0ECFF07F6AB55684FB6F835B0C0C826333ADD
                            SHA-256:8D2E03CF303C038E5BE06EEA83C0CF50B5102C780FB608CD56070A6E42F1CEBE
                            SHA-512:92BD1FC1516680F1E2AB074DA362C8965C495994BBA097C50375CC284235B33D092B942059CD62989F6BA70352746CF3AA8775B29F0F456AEDD01BC912159A40
                            Malicious:false
                            Reputation:unknown
                            URL:https://i.ytimg.com/vi/BX1JIdTbkpE/mqdefault.jpg?sqp=-oaymwEFCJQBEFM&rs=AMzJL3mY8ryr8SQ8BaS5NwLk691Y-XMEng
                            Preview:......JFIF......................................... ."" ...$(4,$&1'..-=-157:::#+?D?8C49:7...........7%.%77777777777777777777777777777777777777777777777777......S...."........................................>.........................!.1.AQ"aq....2....b#$3BCRr.4......................................%......................!..12qA."3Qa.............?..V..H9../.lH.5sg*.0s^u.Em.a...DzgI._G..A..=.3........+8.aTU...1.L...##~......>.&R<\..#wQMxH;(.X.!.......aqu.......j...]S.o.......5.5...m.....\v....:e&.=J.....}O?...X..........-^.{......,.y....}...6..7.0.tH...zb..TO.F3.D1.(..lL.+.......1K..W.K).0k..C.6...V.Oy%..m...........|..n.uKHn....Y#.J.0.`{.[.)^._..4...9.6.R"..D...0....*7.}h3.....z.....x.%?.0;X|..E..jz%j....~..O.............S..g..x.{...yV.u..Wi....B.@..RJ`.J..zr.X.....-.T..v.^b.>.Y].]3.v.B..Y.P..x@....w.......%2.U...Q.X0[........Sv.G.^......A.&...E.IY.6..^..Z".Q\....AU .. Qt..X$...P.|n......u+.^..[.......G;...r{>.M..s.5+5:f..HD..r89..:....5...e.W.-v....+2...-.
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
                            Category:dropped
                            Size (bytes):5430
                            Entropy (8bit):3.6534652184263736
                            Encrypted:false
                            SSDEEP:
                            MD5:F3418A443E7D841097C714D69EC4BCB8
                            SHA1:49263695F6B0CDD72F45CF1B775E660FDC36C606
                            SHA-256:6DA5620880159634213E197FAFCA1DDE0272153BE3E4590818533FAB8D040770
                            SHA-512:82D017C4B7EC8E0C46E8B75DA0CA6A52FD8BCE7FCF4E556CBDF16B49FC81BE9953FE7E25A05F63ECD41C7272E8BB0A9FD9AEDF0AC06CB6032330B096B3702563
                            Malicious:false
                            Reputation:unknown
                            Preview:............ .h...&... .... .........(....... ..... ............................................0...................................................................................................................................v.].X.:.X.:.r.Y........................................q.X.S.4.S.4.S.4.S.4.S.4.S.4...X....................0........q.W.S.4.X.:.................J...A...g.........................K.H.V.8..........................F..B.....................,.......................................B..............................................B..B..B..B..B...u..........................................B..B..B..B..B...{.................5.......k...........................................................7R..8F.................................................2........Vb..5C..;I..................R^.....................0................Xc..5C..5C..5C..5C..5C..5C..lv..........................................]i..<J..:G..Zf....................................................
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:PNG image data, 500 x 200, 8-bit colormap, non-interlaced
                            Category:downloaded
                            Size (bytes):25791
                            Entropy (8bit):7.961769489944864
                            Encrypted:false
                            SSDEEP:
                            MD5:67053D8718292819A2BF6F7E7F9C1912
                            SHA1:12C5913EA4E592FBC89C976F6BB2EDF1C59E5B31
                            SHA-256:12A45A0D855D0C1722FA8E71199E44EC0A93E32D4DF0345070E350F3474FC6F5
                            SHA-512:A3D276936466A253DA7620634D24CCE7BD36F323384A0600CD3B35E12C8B9EDB5DBCC8A2842C1888E1A799F84E29228F354592FE4F2337BE9AD99617F9EE8E27
                            Malicious:false
                            Reputation:unknown
                            URL:https://www.google.com/logos/2024/moon/novr2/cta.png
                            Preview:.PNG........IHDR.............).......PLTEGpL..t..y..{..v..z..r..y..k..y..y..y..{..x..e..|..f..p..p..k..n..o..k..b..a..o..a..j..i..h..`..`.~`..g..`..a.}_..d.~_.}^.|^.|^.}^..b.~_.|^2]v4Xm......-Vm'Nd4`z3b~6d~7g.=h.8i.@m.>o.@r.}............................................................t..m..h..b..]..b..P..K}.Fv.Ik.;cy8]r-Qf+Ma*HX&BR#=M.9I.5D.2@./<.+8.'4.$0.!*..&..$..................'K`i}.Xo}$G\*Zu)Yt+[w*Zv+[v%Piq...E[(Wq+\x,]y.^y/_z0`|4e.:l.............................................z..W....).."................................. BU.3C"DX.-=.;M./?.4E.6G.2B.1@.F]#Ld.......9K%Nf...!I`.........."...(7P_.=O H^,\w-]x.&6)Xr....-A.?R.7H.>R/YqSx.Y.."Kb.CY*Sjl..v..f..(Tm-[u+Ys'Uo&Rk.DZ.AW.6L#I_......'Ph... Ur......Ldr...t......Fc.=WC[h...-\v.Ol..........{..|..|..|..|..|..|..|..|..|..|..|..|.......tRNS..`...r#.3...L.A,..`...A.....tR#3...a.....s........................................................................................................................................
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (6104)
                            Category:dropped
                            Size (bytes):6109
                            Entropy (8bit):6.121858349531154
                            Encrypted:false
                            SSDEEP:
                            MD5:5141A1E4EF014237284C9106D46D9D81
                            SHA1:464197C15AA837CAED2695473D460DE4EE62A308
                            SHA-256:B72AD0783ADBD811674632D62480785FA0B8F05FA42456D79D49C1D7AE4F7511
                            SHA-512:87462ABC2B5CF09AB449E7D52A3B22C454FF97A39C54F6E68D29510FE3265C8B95AF551C1B050A44775BC375BF82CCD33237F6F64B34E28B1DBCB20D536EB0E8
                            Malicious:false
                            Reputation:unknown
                            Preview:)]}'.[[["mortgage rates today",0,[3,362,143],{"zf":33,"zl":8,"zp":{"gs_ss":"1"}}],["social security benefits",0,[3,362,143],{"zf":33,"zl":8,"zp":{"gs_ss":"1"}}],["chicago blackhawks",46,[3,362,143],{"lm":[],"zf":33,"zh":"Chicago Blackhawks","zi":"Ice hockey team","zl":8,"zp":{"gs_ssp":"eJzj4tDP1TfIysvJNWD0EkrOyExOTM9XSMpJTM7OSCzPLgYAlJgKVQ"},"zs":"data:image/jpeg;base64,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
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:PNG image data, 140 x 140, 8-bit colormap, non-interlaced
                            Category:dropped
                            Size (bytes):16917
                            Entropy (8bit):7.958217245759984
                            Encrypted:false
                            SSDEEP:
                            MD5:4FE7B1920BA4C61EC07EC2A42343A733
                            SHA1:D370BAE06B54A30F834A6851BFCA06210BD7B540
                            SHA-256:27CAD07BEB957F0FB88AF00F05A7E89303A2B7F4B62B1248443872DD5D2DDB0C
                            SHA-512:B23DE06B7B1959DED6AA9F07FA972A9210CFF53B0CE3570A02433F36197D57649AC0ACDC0AAA998C496968524960B86F42918B0601C0DDB208B354E312AB16B0
                            Malicious:false
                            Reputation:unknown
                            Preview:.PNG........IHDR.....................PLTEGpLdf.Zp.Rj.LQ.K>.-'.A+.W/.i8.y5..7.{F..I.u.Rd.He.:S.3B.FZ.CP.AI.<D.9=.47.'&.21.;9.=..>5.4..55.0&.+$.3(.+../..) .>&.#.w9".G'.P..W(.h$.3!._/.m9.M..w#..,..,.-...h..f'.|..q%.|5..C..a..7K.,/. ..++...yNC.]a.\N.....~.ot.m^..^.zm......l.;R.#9.04.em.w.............................................-<..............&6.OQ...q..\...M].U_.. y..t$)...bn|....#+.|..]l.du..&.."~....3./B.Sf....*>.6M.(6.'3.-8...R..~...29.)..54.-0./6.-/....@U. -....+5.7J...r.)..'.23..-..".2E...."2./1......&,....r....{.(.......{..(B............o.(..%.................;.....$...................................[.4.......,B.......m.....y... ....U.......x......u......................y#0....%5...g{..}..d..p..\..L..=~.c..j....m..z..n..s..H..k.+..+u..=KU.0:|..T=H.../....(e.5.+?..._..M.C....tRNS.`............0.......................................................................................................................................................................
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:Web Open Font Format (Version 2), TrueType, length 12432, version 1.0
                            Category:downloaded
                            Size (bytes):12432
                            Entropy (8bit):7.98109486933615
                            Encrypted:false
                            SSDEEP:
                            MD5:4C8B1466F2CF09339316E024710516D1
                            SHA1:98EFCD433361434E1E6F4D873EA844A0B220D62E
                            SHA-256:F45AC58611FEF3DB513D7ED2BE6B0456CA117DE6A5F06CF2612CE0E31EDBDDFB
                            SHA-512:4C4A4038B871558A544A68CB5CBB44964026226ADA242487CEF9A6E5AE100FE19E3D016E2FBE5F948F03F9046D2B4CE0B8A3A4BB214C6193266CD3F74A700317
                            Malicious:false
                            Reputation:unknown
                            URL:https://fonts.gstatic.com/s/josefinsans/v32/Qw3PZQNVED7rKGKxtqIqX5E-AVSJrOCfjY46_LjQbMZhLw.woff2
                            Preview:wOF2......0.......l...0-..........................j.......`?STATD.......l.f..n..6.$..X. ..:..|....\..:l..oxy.Q.....<DQ>9[e...:DFQS.}W@.8..v.[......h..<=...v....cg.3.Y;.. ..w.~D..q..?$..@...GoQ.9Bc..Z@s6{.\. .EC..../}........HU......R.....`...A...>...#t...0Q.L.m.Z]..E........\....?.}.{.......Z}..:.i.8.<......}.xp..[Y......J.......(....!.......Wi}J... ...;.A`.5pM;.v...u#...n.P......P.y.9.S3.P."kP....c..^...Y.......!...f"...A1._L'...|..+!HF......n.L.3...:_W=].FvH..V.)..0u...K..[.../............,;.. n..g....y%.;.[......n.j..N.U.p%Y.*.7.w..}[..MX....J..AU.Uh`."U.V.ZYS..1v..[(.B...t...h....H~.#...kT..T..........E...T...`A.!.....@X.....&H...V../q...+.;$..H.#F.1c........!..dH.p$.LH.X.D.Bb. q.d.HO}.\....)V...@.T#...A.!..GZ. .]D.i.z......b&|$e@..KW...........GS..0..?.....e3.~...w.....8m.mURC.t..E%A..&Z*R.l$....D.Gr.<C.n6..'....i..}!r.(..^J.5/j.....)../...k.....F..,tE..N.C...].O.H...-..L'<..Oj..`*...Q.t.......:...}...B.a~..>....a|1.............5
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:SVG Scalable Vector Graphics image
                            Category:downloaded
                            Size (bytes):611
                            Entropy (8bit):4.918393991458898
                            Encrypted:false
                            SSDEEP:
                            MD5:FDCCEBFA37374F47C7DB9D31714AD6BB
                            SHA1:0020EF09D5BB52460B5D0239BEF9C2F2CF9EC9FA
                            SHA-256:526AAAFB82827920E07B5CE784660FAB5F01FB62F3B63968EC34317AECAA5CCA
                            SHA-512:D265EE577D64E9682698F021A5E2158CF5EA0A6C887E69A90F72C45E29B9F8A3ED436F2D4DA6B4F3436EF59FF306348EC57FFD7FEFDEC969909E089E03B59528
                            Malicious:false
                            Reputation:unknown
                            URL:https://fonts.gstatic.com/s/i/productlogos/youtube/v9/192px.svg
                            Preview:<svg xmlns="http://www.w3.org/2000/svg" enable-background="new 0 0 192 192" height="192" viewBox="0 0 192 192" width="192"><rect fill="none" height="192" width="192"/><g><g><path d="M177.44,55.09c-1.96-7.31-7.72-13.08-15.03-15.03C149.17,36.5,96,36.5,96,36.5s-53.17,0-66.41,3.56 c-7.31,1.96-13.08,7.72-15.03,15.03C11,68.33,11,96,11,96s0,27.67,3.56,40.91c1.96,7.31,7.72,13.08,15.03,15.03 C42.83,155.5,96,155.5,96,155.5s53.17,0,66.41-3.56c7.31-1.96,13.08-7.72,15.03-15.03C181,123.67,181,96,181,96 S181,68.33,177.44,55.09z" fill="#FF0000"/><polygon fill="#FFFFFF" points="79,121.5 123.17,96 79,70.5"/></g></g></svg>
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (885)
                            Category:downloaded
                            Size (bytes):890
                            Entropy (8bit):4.870656628417562
                            Encrypted:false
                            SSDEEP:
                            MD5:97C2F795B6AF4112949099386C0D5CC4
                            SHA1:97B3A281DC54202F0E2C89DB836260078C55E1E0
                            SHA-256:75FD01F0CEA178B6B3D46CA72BAB142EA5BF55E02F1885E1BB2A89A671C6F52B
                            SHA-512:72524EB3FB5C4E50C299DC5564887A8ED92FB21089DD455D50BABC612C21DF4FE6D83442511EF7687D0F172812B4EB84231CF754D24A12E1447E24E051C30D75
                            Malicious:false
                            Reputation:unknown
                            URL:https://www.google.com/complete/search?q&cp=0&client=gws-wiz&xssi=t&gs_pcrt=2&hl=en&authuser=0&psi=Fpo_Z6y4HJGSkdUPrtW_gA8.1732221467896&dpr=1&nolsbt=1
                            Preview:)]}'.[[["dole act va",0,[3,362,143],{"zf":33,"zl":8,"zp":{"gs_ss":"1"}}],["southern userfornia doomsday fish",0,[3,362,143],{"zf":33,"zl":8,"zp":{"gs_ss":"1"}}],["ut system free tuition",0,[3,362,143],{"zf":33,"zl":8,"zp":{"gs_ss":"1"}}],["starz outlander season 7 part 2",0,[3,362,143],{"zf":33,"zl":8,"zp":{"gs_ss":"1"}}],["samsung galaxy s25 ultra",0,[3,362,143],{"zf":33,"zl":8,"zp":{"gs_ss":"1"}}],["zodiac signs daily horoscope today",0,[3,362,143],{"zf":33,"zl":8,"zp":{"gs_ss":"1"}}],["nyt crossword clues",0,[3,362,143],{"zf":33,"zl":8,"zp":{"gs_ss":"1"}}],["mlb cy young award winners",0,[3,362,143],{"zf":33,"zl":8,"zp":{"gs_ss":"1"}}],["vintage broncos ford lawsuit",0,[3,362,143],{"zf":33,"zl":8,"zp":{"gs_ss":"1"}}],["general hospital spoilers sam",0,[3,362,143],{"zf":33,"zl":8,"zp":{"gs_ss":"1"}}]],{"ag":{"a":{"8":["Trending searches"]}},"q":"1cz58SO-IFg6g5Y2BkgEdN-L7Vs"}]
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:PNG image data, 1150 x 116, 8-bit colormap, non-interlaced
                            Category:downloaded
                            Size (bytes):13812
                            Entropy (8bit):7.9665376890615605
                            Encrypted:false
                            SSDEEP:
                            MD5:DF328157BC4CEDCCD878F26301F103C3
                            SHA1:B8417DC4DDF4718EFF42A1CD46DAD1140F0985B5
                            SHA-256:4768D0346F8D0E487FD1E2F08F1179563FA148D06DB9C5DF01EC20130EA1F3D9
                            SHA-512:1040F14FC0D51A82949A0DD8FFF3F7D8E682FEA03CFB8C37C7141DC1AD3A1F964011DF3CF87E86334FE6B7FD6F2FC297B0CA8AFDF66B0D514F288953B5C402E2
                            Malicious:false
                            Reputation:unknown
                            URL:https://www.google.com/logos/doodles/2024/rise-of-the-half-moon-november-6753651837110598-shs.png
                            Preview:.PNG........IHDR...~...t.......^....sRGB.........PLTEGpLg..c.._..`.._..`..a..`.._.._.._.._.._.._.._.._..a.._.._.._.._.._..........................................................................................................................................................................................z............l.......k..o.......j...........h..}......z..x..x..g..w..x..u..r..e..o..q..o..m..l..l..b..j..j..i..g..f..g..g.._..d..f..b..b..b..a..b..a..c..a..`..`.._.._.._.._..`..^..^..]..\..R..\..[..[..W..[..^..S..J..W..O..I..Q..V..P..C..;..P..<..J..7..L..G..2.....F..D..5..,..G..+..+..*..*..?..(..*..B..$..'..<..&..?.. ..:|.$.....#..<{.7x."..6x...."..!..".. ..5u.7y.5u. ~.4t..}..|..{.6t..z..z..y..y..y..x..w.3p.0n..u.-k..s..p..j}+g..j.)b.+du.c.'^n#Yw#Yu#Xf"Ua.Qi.Q\.L].KT.GT.DM.@G.=C.9@.7<.5:.48.36........tRNS....!0>JWhv............."...2.IDATx...yxe.].....sW]-U.*Uu.N/..`.CL...e.&.q.!C.!..0.'.I0.6..n...d........a.7..c..6..v.U.....r%]]..l.2FRU.v.).*?...S.....t.}..=.W.
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (526)
                            Category:dropped
                            Size (bytes):25272
                            Entropy (8bit):5.41749447238405
                            Encrypted:false
                            SSDEEP:
                            MD5:441E360C1F79B7EE923E58383E7AD7F7
                            SHA1:3A19C3DB57E7093A631716CE5884F18F29DD62C7
                            SHA-256:DD961C865569EB4C898AD387299D7C83AAF512CA2214EE25FA5C44174B0B8F21
                            SHA-512:86D43AA60330BF22C6125DD948BFE8F51925FE3B5AE78E92024495313D76349BD7359FF991B05CA9043A4F59FF960544550B1CFF7C4C4E4C6BF8C7C0EE389E58
                            Malicious:false
                            Reputation:unknown
                            Preview:this._hd=this._hd||{};(function(_){var window=this;.try{._.p4c=_.ie("P10Owf",[_.Uq]);.}catch(e){_._DumpException(e)}.try{._.y("P10Owf");.var sD=function(a){_.A.call(this,a.Oa);this.ka=this.getData("cmep").Hb();this.Pb=a.service.Pb;this.data=a.Cg.zGa};_.D(sD,_.A);sD.Ia=function(){return{service:{Pb:_.lu},Cg:{zGa:_.VC}}};sD.prototype.Aa=function(){this.Pb.ka().oa(this.getRoot().el(),1).log(!0)};sD.prototype.wa=function(a){var b;a.data?b=_.wc(_.VC,a.data):b=new _.VC;q4c(this,b)};sD.prototype.oa=function(a){q4c(this,a.data)};.var q4c=function(a,b){var c;(b==null?0:b.gK())&&((c=a.data)==null?0:c.gK())&&(b==null?void 0:b.gK())!==a.data.gK()||a.Pb.ka().oa(a.getRoot().el(),2).log(!0)};sD.prototype.Ha=function(a){this.Pb.ka().ka(a.wb.el()).log(!0);_.qf(document,_.Bwc)};sD.prototype.Ba=function(a){this.Pb.ka().ka(a.wb.el()).log(!0);if(this.ka){var b;_.qf(document,_.Awc,(b=this.data)==null?void 0:b.Ac())}else _.qf(document,_.zwc,this.data)};_.M(sD.prototype,"kEOk4d",function(){return this.Ba});_.
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (3154)
                            Category:dropped
                            Size (bytes):3159
                            Entropy (8bit):6.0603127713814855
                            Encrypted:false
                            SSDEEP:
                            MD5:3A25796C6B4C8CD9A62991DA25AEEAC8
                            SHA1:A236510BB5FE65A5F16175D8D1BB0EBF0C8A8DED
                            SHA-256:248CC36E9BE610F326735A582032126B09DDF3BF4EF9422D4BE2293EF67B2225
                            SHA-512:273639CC5C02B15FF1A7F9095B51478D5ADFBE6D1B4461C3A25EEDF4E6D47D84E00F0B73CFFA844165EE412928E6A8C1D372E56FB407669F92DA3A1213283A29
                            Malicious:false
                            Reputation:unknown
                            Preview:)]}'.[[["ut system free tuition",0,[3,362,143],{"zf":33,"zl":8,"zp":{"gs_ss":"1"}}],["kendra mcdaniel obituary",0,[3,362,143],{"zf":33,"zl":8,"zp":{"gs_ss":"1"}}],["davis cup tennis",0,[3,362,143],{"zf":33,"zl":8,"zp":{"gs_ss":"1"}}],["gautam adani group",46,[3,362,143],{"lm":[],"zf":33,"zh":"Gautam Adani","zi":"Chairperson of Adani Group","zl":8,"zp":{"gs_ssp":"eJzj4tLP1TcwTq4qLjIzYPQSSk8sLUnMVUhMSczLVEgvyi8tAACkZQqx"},"zs":"data:image/jpeg;base64,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
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (2134)
                            Category:dropped
                            Size (bytes):13188
                            Entropy (8bit):5.4223896155104025
                            Encrypted:false
                            SSDEEP:
                            MD5:7C96A5F11D9741541D5E3C42FF6380D7
                            SHA1:D3FA2564C021CF730E58FFDDB138CF6B57ED126E
                            SHA-256:81016AC6BE850B72DF5D4FAA0C3CEC8E2C1B0BA0045712144A6766ADFAD40BEE
                            SHA-512:23C162A2E268951729B580E5035AD6CA9969CFCC5CE58A220817B912E76B38BE6C29C3CA7680CB4E8198863D95A72EA65BD06FF7189B5C8475E4C1CE501AEAB1
                            Malicious:false
                            Reputation:unknown
                            Preview:/*. * Copyright 2016 Small Batch, Inc.. *. * Licensed under the Apache License, Version 2.0 (the "License"); you may not. * use this file except in compliance with the License. You may obtain a copy of. * the License at. *. * http://www.apache.org/licenses/LICENSE-2.0. *. * Unless required by applicable law or agreed to in writing, software. * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT. * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the. * License for the specific language governing permissions and limitations under. * the License.. */./* Web Font Loader v1.6.26 - (c) Adobe Systems, Google. License: Apache 2.0 */(function(){function aa(a,b,c){return a.call.apply(a.bind,arguments)}function ba(a,b,c){if(!a)throw Error();if(2<arguments.length){var d=Array.prototype.slice.call(arguments,2);return function(){var c=Array.prototype.slice.call(arguments);Array.prototype.unshift.apply(c,d);return a.apply(b,c)}}return function(){return a.app
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
                            Category:downloaded
                            Size (bytes):350
                            Entropy (8bit):6.922576431804136
                            Encrypted:false
                            SSDEEP:
                            MD5:F8F20B1A0E5303C04EBAAFD7F09A625C
                            SHA1:ED0ED603206887E2D5AE2F0F770ADC2B869DE6DA
                            SHA-256:895172C5269BC2F7F1B26A807944106D88FEF304586399A0D9A10E21C6A8DD46
                            SHA-512:C8D8FEB29312771F14B72A6DC992303508A66B0CBDC85AF2EF9659AA36A3F7806ABBA595FB83F36DBF164962DB4493B00E5ECDAC8DA41EAB56DD146D8D9F7C0C
                            Malicious:false
                            Reputation:unknown
                            URL:https://www.gstatic.com/images/branding/product/1x/youtube_32dp.png
                            Preview:.PNG........IHDR... ... .....szz....%IDATx....d.@......P.A0.0.C1`.......a......C...Eq........0...C..^{........... DBS...I.:+I..H..H.......?.N.....WB..e.._B .[@M.dk..`..o...|.VU.|.u...0.......L..0.r....k M]#...o^....(........H...^.....s._........nr.S.`u...M..E4.{_D..M.D..6.@...wB.-=.......-.%l3.$.H..8.z.?R..%}.0...w..=y>2;......IEND.B`.
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (1792)
                            Category:downloaded
                            Size (bytes):1797
                            Entropy (8bit):4.986355446734514
                            Encrypted:false
                            SSDEEP:
                            MD5:26E8D4F7E75863DBE1252F6C54CBD63C
                            SHA1:350623EA88CD0E1A1ACD01EB4B468F8289A76D0E
                            SHA-256:8817E3856A04E9D7C7BFC2EDB5AF6F07F46B93C7C509CCBC2D63D3C9EB1623B7
                            SHA-512:D7E43B9F4BC70A50EBE0FFE5EDA580D09441A676626898EDCFF35A25E1A55145975A69ECB9962D04E7C85BEBE911052DF8785353ECFB478C5B65091E3D4BF3F6
                            Malicious:false
                            Reputation:unknown
                            URL:https://www.google.com/complete/search?q&cp=0&client=gws-wiz-serp&xssi=t&gs_pcrt=2&hl=en&authuser=0&pq=https%3A%2F%2Foviteweltxddfrszluspazr%26ipmp%3Dsxvjova%26ygojnb%3Dfcl%26elerk%3Dhfbmay%26ayt%3Dyrhphmb%26pddud%3Dezxxsf%26nuqs%3Dzlhwdht%26gaxffgl%3Dpszq%26duvvs%3Dvolgvy%26gkxzodc%3Djel%26qxfv%3Dnnvdnwmd%26rqqvtcmspp%3Drxqkebhlxe%26q%3Damp%2Fshxzygr.a%25c2%25adyqbtb%25c2%25adbx%25c2%25adj%25c2%25adp%25c2%25adx%25c2%25adjxlcs%25c2%25ads.com%25e2%2580%258b%2Fb8b2rxwmh%26ksla%3Dtapqwwz%26jnnbhkq%3Dttdmivnp%26cfjt%3Defvfrgoe%26oqiqdbkskf%3Dkyuuqptwrp%26tvge%3Ddkzlwfl%26xinkvob%3Dipnmjidq%26ijie%3Duljbrnkt%26otqzapkzkg%3Dkmqusroise%26pria%3Dnlusrhl%26ymcacxc%3Dzcifoamd%26qigt%3Dtulcumns%26hhzbkqbcaz%3Dwwvxgvrfea%26yjoo%3Ddorlplq%26setubwl%3Dgxyhfmbx%26shjzsftutp%3Dfpvhstinfx%26aabm%3Dcriocrm%26hjizanz%3Dpegjdgeo%26fawgntlmwo%3Djqpmhlrvtn%26roup%3Dizmvjyq%26gxeotbo%3Dusfofocn%26bjditvldqx%3Douxvzuvslt%26vvra%3Dilqxudw%26urpmgcs%3Dymqwcpzq%26yrvwdmllag%3Dvdvavnqley%26nzuk%3Dccmlbne%26nkpwqws%3Dsngrhfzo%26gbgxvugiga%3Dryzhrucpyl%26irec%3Dtxrssof%26zsogcrm%3Diayomywb%26trpv%3Dtsllqaa%26ikkahrz%3Dowzvqchv%26nvsg%3Djqklsur%26mifuzci%3Dijrnkgyc%26gxpk%3Dlvdrwxp%26ijyljat%3Dmglwbmtx%26atpa%3Dzczuwuy%26wqrobkl%3Dkbbvlqru%26smzd%3Dipgsgqz%26tspepjo%3Dzblbkdbs%26cuqg%3Dqokwyqc%26pngakdv%3Dhnokowhl%26kmzi%3Dutnaspz%26isnjuod%3Dnzzrblql%26gwhl%3Dinsrinb%26ysonvuu%3Dwjleaqhv%26ilqq%3Dittadax%26ktcegkw%3Duqqodjle%26wwle%3Danzcjil%26cvtwsas%3Dttchqbwr%26thbw%3Dfstnzsh%26thhglee%3Dkzsgswit%26iizz%3Dhpvogha%26hmbwuzq%3Dfilorduk%26cunp%3Dnhwvcbd%26gdrvwdv%3Dgqwwbzuq%26ilty%3Deagyudc%26itknbva%3Dsbfavtnk%26gjlu%3Dnqaglxn%26mrmfjee%3Dxwpodlmj%26qknk%3Duggtyao%26mdaaclr%3Djwmwywrx%26nxgd%3Dydqqawk%26ibskbyz%3Deujqstmb%26hpkr%3Dmlxxgks%26eivxpwq%3Dotpwhioj%26hvrx%3Dzuchxtx%26hdmpdgk%3Dwnnxxklk%26fazk%3Dkyqhssx%26geglyya%3Ddlvpwlnm%26avcm%3Ddnnwuqs%26dlofbgz%3Dngnlfhga%26zqkj%3Dhoqixkx%26zrenpfy%3Dojcmmoyy%26kobu%3Dkpbpvty%26rxmqemn%3Dgsprqvuf%26ahrr%3Dhewpbki%26qxmoqna%3Dsmtuczoj%26covv%3Detxdord%26vpvelhe%3Ddapyasoe%26cudt%3Dpdgwaay%26kleugke%3Doxqfwiqw%26hljb%3Depcyxdm%26ypctgvo%3Dczuuwire%26crax%3Dcnxmiuw%26spupbvv%3Dovqdpzqa%26kjje%3Dpjfavpg%26kqvhacj%3Dsmqypqqz%26jnoa%3Dpobryjd%26ynchqcn%3Drjxzoxwk%26dkck%3Dvkekqrr%26acbvftn%3Dkrcgxouz%26pjbb%3Dxpkhnqv%26ptoijep%3Drpxpmrhr%26cpic%3Dgrnbkdg%26rncpvec%3Dwnlpnmju&psi=apo_Z5nVAcu8xc8P4OuNiQc.1732221552773&dpr=1&ofp=GNjmk_vUm7bsfhiy86iJp5b2q7wBGOTlhdemmbT0NRjl4r-9x6LYmFsYr4GEpdaQkpy0AQ&nolsbt=1
                            Preview:)]}'.[[["https www google com gws_rd ssl youtube",0,[512,273,308,650,362],{"zl":90000}],["how late is the closest grocery store open",0,[512,273,308,650,362],{"zl":90000}],["takeout restaurants open now near me",0,[512,273,308,650,362],{"zl":90000}],["where\u0026#39;s the closest pharmacy",0,[512,273,308,650,362],{"zl":90000}],["any gas stations nearby",0,[512,273,308,650,362],{"zl":90000}],["takeout coffee nearby",0,[512,273,308,650,362],{"zl":90000}],["adp employee login",0,[512,308,468,357,439,650,362,394],{"zl":90000}],["ipay adp com register sign in",0,[512,308,468,357,439,650,362,394],{"zl":90000}],["adp workforce login",0,[512,308,468,357,439,650,362,394],{"zl":90000}],["my adp",0,[512,308,468,357,439,650,362,394],{"zl":90000}],["hyundai ioniq 9 electric suv",0,[3,308,362,143],{"zf":33,"zl":90001,"zp":{"gs_ss":"1"}}],["big lots closing stores",0,[3,308,362,143],{"zf":33,"zl":90001,"zp":{"gs_ss":"1"}}],["the millennium tour 2025 tickets",0,[3,308,362,143],{"zf":33,"zl":90001,"zp"
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (4238), with no line terminators
                            Category:downloaded
                            Size (bytes):4238
                            Entropy (8bit):5.5311629827397715
                            Encrypted:false
                            SSDEEP:
                            MD5:F4C8C06B68FFF954F98AD5909CE87015
                            SHA1:E23BC22AD74A915E4908DF3719DAE88A0BEA108B
                            SHA-256:3D63867F1EEBBD1D1307A0BE85D82ECA53D4DFD5B00AB5B4910CFBADB3B28EBF
                            SHA-512:FED0ADD8260163BCD64E210C8324B5E36FBFE26785CBCC42C041853FC644A2124DF497556E11A5029576D41C8C666800912F95B4C353F1BF6A8DB126C24FDC64
                            Malicious:false
                            Reputation:unknown
                            URL:"https://www.google.com/xjs/_/ss/k=xjs.hd.rVqMNzqlVlQ.L.B1.O/am=CKkCAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEAAAAAAAAAABOwEAAADAOwCBAgAAAAAwAAAAAABEAAAABBAAKACAAAAAAAgAABEABAAUAAAAAiMAgAAARlACUACACAABQEACAAIAASQQUMgKgBRAAAAAAAAAAACAAAAhgAQCADQARAABoBIAABEDwQAAAAAIAgAYCYAhoABCAAAAAAAACADAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAgAKA/d=1/ed=1/br=1/rs=ACT90oHOuxEPhlzZ3IGP944yO_Wxq-S9gw/m=cdos,hsm,jsa,mb4ZUb,cEt90b,SNUn3,qddgKe,sTsDMc,dtl0hd,eHDfl,d,csi"
                            Preview::root{--COEmY:#1f1f1f;--xhUGwc:#fff}:root{--vZe0jb:#a8c7fa;--nwXobb:#638ed4;--VuZXBd:#001d35;--uLz37c:#545d7e;--jINu6c:#001d35;--TyVYld:#0b57d0;--ZEpPmd:#c3d9fb;--QWaaaf:#638ed4;--DEeStf:#f5f8ff;--TSWZIb:#e5edff;--BRLwE:#d3e3fd;--gS5jXb:#dadce0;--Aqn7xd:#d2d2d2;--EpFNW:#fff;--IXoxUe:#5e5e5e;--bbQxAb:#474747;--YLNNHc:#1f1f1f;--TMYS9:#0b57d0;--JKqx2:#1a0dab;--rrJJUc:var(--Nsm0ce);--mXZkqc:#d2d2d2;--Nsm0ce:#0b57d0;--XKMDxc:#f3f5f6;--aYn2S:#f3f5f6;--Lm570b:#dee1e3}.zJUuqf{margin-bottom:4px}.AB4Wff{margin-left:16px}.OhScic{margin:0px}.v0rrvd{padding-bottom:16px}.zsYMMe{padding:0px}.wHYlTd{font-family:Roboto,Arial,sans-serif;font-size:14px;line-height:22px}.yUTMj{font-family:Roboto,Arial,sans-serif;font-weight:400}.VDgVie{text-align:center}.TUOsUe{text-align:left}@keyframes g-snackbar-show{from{pointer-events:none;transform:translateY(0)}to{transform:translateY(-100%)}}@keyframes g-snackbar-hide{from{transform:translateY(-100%)}to{transform:translateY(0)}}@keyframes g-snackbar-show-content{f
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:Web Open Font Format (Version 2), TrueType, length 24652, version 1.0
                            Category:downloaded
                            Size (bytes):24652
                            Entropy (8bit):7.991535968589447
                            Encrypted:true
                            SSDEEP:
                            MD5:87C2B09A983584B04A63F3FF44064D64
                            SHA1:8796D5EF1AD1196309EF582CECEF3AB95DB27043
                            SHA-256:D4A4A801C412A8324A19F21511A7880815B373628E66016BC1785A5A85E0AFB0
                            SHA-512:DF1F0D6F5F53306887B0B16364651BDA9CDC28B8EA74B2D46B2530C6772A724422B33BBDCD7C33D724D2FD4A973E1E9DBC4B654C9C53981386C341620C337067
                            Malicious:false
                            Reputation:unknown
                            URL:https://fonts.gstatic.com/s/googlesans/v29/4UaRrENHsxJlGDuGo1OIlJfC6mGS6vhAK1YobMu2vgCI.woff2
                            Preview:wOF2......`L.........._...............................b...?HVAR.X.`?STAT~'..../<.....D..i..$.0..".6.$..@. ..T. ........v .u'.(.n[...68...^...VQZQ...OHPc..m...jM....5.FZ1.e..H.D.....~.* ...>].N....6..4.....rG...$Sw....u........yD5LY;E...w5...[....1...i.$.<.E.\|.~....G....[.G..gZ...i_\.\......O.#..1...t.....%.rI.t1..!.t..J(-.j..B+........t,....A;..kG..p?.....I#6......#m.;.S..^u.4.Q....mI<....}........F&.p.r.H2...Y........o.xc.......>...!...T...e.7..|Z.i.R[Y.zC.Al..wb.?..9.. =..P(..v....9`.pxI..O9.}2.,..H...........^.q..c.....f..tVU.$.x....s....%hy.......fAKj..C....WP.....o...!.:).r......Al...>..G....G.....W...a.i}...0O..v...=^.D.x...\ST..U.4...#Pvv...GJ...0.W9.n.J..=.v......5A8&}.......y\-.t.......K?...)]........`&@.7.O3g_.4z.9H...C.&...24K......}.Z....h(T.._...&}.l.'....!.B<.?...D...e. i7 R......D:....@Jer"5Q.D{..Mv...&&.)sC..l........5}.."...S..v.A1.....$..9.....e|z.....\..J....%#O...-......m.P2R2T...T.#.....0.y.,9...M1..!..N..g.>...SW.....1"b
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (4053), with no line terminators
                            Category:downloaded
                            Size (bytes):4053
                            Entropy (8bit):5.534497487862095
                            Encrypted:false
                            SSDEEP:
                            MD5:ACFDF189ADCA38F2490275370BDFECE2
                            SHA1:E0CBB3A56108460D91662B3B4DD21AE0B9380BEA
                            SHA-256:FD063E33ED39B059BD3C432C7E0EE6752B9BDAE92A5C85ADF69AE045A41929EA
                            SHA-512:65AD1AB9A2BD0B85B8EE3B3D55928D8D97360D4A69C2E344BC4DB8AACB9CE3A0739A7EF74C445294B17E51DDF516A0F62BBE6BD618C009CCF421A8EC7B220B70
                            Malicious:false
                            Reputation:unknown
                            URL:"https://www.google.com/xjs/_/ss/k=xjs.s.f3zyDgSooOM.L.B1.O/am=AFKHACEAAAAEAACEABUABAAAAAAAAAAAAAAAAAAAAAAAAAAkAAAAQAAAAAAAABAAAAARAADKBAAAELwAAMAuAEAAAIAPAABHBYABAAAAAAGQAAAAAAABIACACgEAAAgAAAAAAgIAAAIAEAEAJACAQgAAAIiBAQAADAAAQACAIIAAAAQwAAoQAAkIACAB9IMKAgAQADAAAIAgIBxgGICgAgADDgIAAAAAAAAAAAAABAAIAQDAAAoAgAACAPQAEAAGACDNQAQACAIMBFAEAAEAAEAAAAAAAARAIAAAEDMBcAQMQAAAAAAAAABAAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAAQAAAAAAAAAAAAAAAAAAAAAAAQ/d=1/ed=1/br=1/rs=ACT90oHraPXyoLDqsroiG6GYLMP8Z1xdyw/m=X3N0Bf,attn,cdos,gwc,hsm,jsa,mb4ZUb,cEt90b,SNUn3,qddgKe,sTsDMc,dtl0hd,eHDfl,d,csi"
                            Preview::root{--COEmY:#1f1f1f;--xhUGwc:#fff}:root{--vZe0jb:#a8c7fa;--nwXobb:#638ed4;--VuZXBd:#001d35;--uLz37c:#545d7e;--jINu6c:#001d35;--TyVYld:#0b57d0;--ZEpPmd:#c3d9fb;--QWaaaf:#638ed4;--DEeStf:#f5f8ff;--TSWZIb:#e5edff;--BRLwE:#d3e3fd;--gS5jXb:#dadce0;--Aqn7xd:#d2d2d2;--EpFNW:#fff;--IXoxUe:#5e5e5e;--bbQxAb:#474747;--YLNNHc:#1f1f1f;--TMYS9:#0b57d0;--JKqx2:#1a0dab;--rrJJUc:var(--Nsm0ce);--mXZkqc:#d2d2d2;--Nsm0ce:#0b57d0;--XKMDxc:#f3f5f6;--aYn2S:#f3f5f6;--Lm570b:#dee1e3}.zJUuqf{margin-bottom:4px}.AB4Wff{margin-left:16px}.OhScic{margin:0px}.v0rrvd{padding-bottom:16px}.zsYMMe{padding:0px}.QyJI3d{background-color:var(--xhUGwc);color:#666;box-shadow:0 4px 16px rgba(0,0,0,0.2)}.oQcPt{background-color:var(--xhUGwc)}.QyJI3d{border:1px solid rgba(0,0,0,.2);position:absolute;z-index:9120}.nFdFHf{animation:g-bubble-show .2s forwards}.bE3Kif{animation:g-bubble-hide .2s forwards}@keyframes g-bubble-show{from{opacity:0}to{opacity:1}}@keyframes g-bubble-hide{from{opacity:1}to{opacity:0}}.QyJI3d.QJnoze{border-
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text
                            Category:dropped
                            Size (bytes):102
                            Entropy (8bit):5.1471901477801785
                            Encrypted:false
                            SSDEEP:
                            MD5:7D585C5CE26244FAE7B41E0FEE0C2F98
                            SHA1:D6231D84D59000F2C891F79616E13FDA411FFDE0
                            SHA-256:96E30ECB65E345DA682EA0B6A65B1525A008D19AD6151ACF295EB11F8275B4C7
                            SHA-512:BE9447FA49D8BEF09620A73440B8890FC321407EE23AC9EF1EA205222984CC27D61EEC1BA6974AE23EA217970581188312D80147081047BFF045AF6294C959A4
                            Malicious:false
                            Reputation:unknown
                            Preview:)]}'.22;["Hpo_Z47dL_mP7NYPl4uXwAg","2120"]c;[2,null,"0"]1b;<div jsname="Nll0ne"></div>c;[9,null,"0"]0;
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text
                            Category:dropped
                            Size (bytes):102
                            Entropy (8bit):5.1421576714862836
                            Encrypted:false
                            SSDEEP:
                            MD5:59489F4880DC2CF17FF2673CE9718C91
                            SHA1:13283673D8910EE4AF056F17DE65ADB34090D429
                            SHA-256:863B385D36E8D57F1862F7BE59D39FAB306589E66849B3899345665A88BDC0FD
                            SHA-512:3E2049737C7EA9753A6F16A0B4C731FFE85B63E82A0CD93EEE487ACC66A165448996E863CCAB4928AF5F70670B02D37DB6A323B922855D3286A3DA72A3555456
                            Malicious:false
                            Reputation:unknown
                            Preview:)]}'.22;["J5o_Z777JeLjxc8P04OL-Q8","2120"]c;[2,null,"0"]1b;<div jsname="Nll0ne"></div>c;[9,null,"0"]0;
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (1683)
                            Category:downloaded
                            Size (bytes):55059
                            Entropy (8bit):5.769770967999488
                            Encrypted:false
                            SSDEEP:
                            MD5:3A89E61DD03C1398A35E1E095B1F5E31
                            SHA1:1F0E13A342812872B1F50F09FAC3DA9625A1F16A
                            SHA-256:721655D97FEF41724ABF47B8A5A2920D8936BDDC2BEC142C9C8C9D75615FE3AC
                            SHA-512:30AFB62E92C034E86229CA3AF7268677281199433EFF918319EA058C2FD80A2B446D36679311517F9CB935191CB99946BA1DE2C83345ACC7B80607BBCA362BBD
                            Malicious:false
                            Reputation:unknown
                            URL:"https://www.google.com/xjs/_/js/k=xjs.s.en_US.1w24Nb9LTjY.2018.O/am=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQAAAAAAAAAAAAARQQIAAAAAAAIACAAAAAAAAAAAAAAAAAAAAABAgAIGQEAAAAQAAAADAAgAACAwgQAAAIAAAAACAAAEAAAACRAD7_8cBAAAAAAAAAAAAIQAQAQAAAAAXAAAIACUBAIAAIAAAADAAAAAgAAAAAACAAgAAAQAAAAAAAgAAAAAAAAAAAABAAEA_AAAAAAAAAAAAAABAAAAAAAAABlAAIIAfAAAAAAAAAAAAAAAICAAAcAQMQAAAAAAAAADcBwCPB4RDCgsAAAAAAAAAAAAAAAAIQIJgDkh_QQAIAAAAAAAAAAAAAAAAAABIETRxuQEAAQ/d=0/dg=0/br=1/rs=ACT90oEaX3uDZltZQYEJFpC9tTS1iYU7HA/m=sy3el,KHourd,sy6nf,vrkJ0e,sy41m,T5VV,sy2wz,aDVF7,sy6jb,rhYw1b,sy2nl,sy2o9,Tia57b,KpRAue,sy2no,sy19u,sy2nu,sy2ny,sy2oa,NyeqM,sy3ef,sy3ee,sy3e8,O9SqHb,M6QgBb,sy1aj,sy1ag,EO13pd,sy2ra,I9y8sd,MpJwZc,UUJqVe,sy82,sOXFj,sy81,s39S4,oGtAuc,NTMZac,nAFL3,sy8g,sy8f,q0xTif,y05UD,sy5ho,sy1dl,sy1dk,sy1dm,sy1au,sy281,sy1fr,sy2gu,sy1u2,sy2gf,sy2fi,sy1qq,sy2dn,sy1r5,sy1qr,sy2dm,sy1qi,sy1r2,sy19o,sy1r3,sy1bl,sy1qw,sy1r1,sy1qs,sy2do,sy1sj,sy1av,syr3,sy2ff,sy28h,sy2fj,sy1qh,sy2dz,sy1ql,sy2dk,sy1qk,sy1qo,sy2e2,sy1wc,sy1wd,epYOx?xjs=s4"
                            Preview:this._s=this._s||{};(function(_){var window=this;.try{.var y6g=function(a,b){var c=_.Ii(a,72);if(_.B(a,44,!1)||!c)c=void 0;else{var d=new _.j1a(1655);c=new u6g(d,c)}c=new _.x4g(b.L2b,c);d=_.si(a,62,0);var e=(new v6g).create();if(e){var f=_.S2g(d);e=new _.A4g(e,c);var g=f?new _.R4g(f):new _.S4g;d=f&&d!==2?new _.P4g(f,c):void 0;d=new _.K4g(g,e,c,d)}else d=null;if(!d)return null;f=(new w6g).from(a,b.ei,d);if(!f)return null;e=(new x6g).from(a);if(!e)return null;b=_.d6g(a,b.ei);return _.$5g(a,c,f,d,e,b)},z6g=function(a,b){return _.A(function*(){let c;return((c=.y6g(a,b))==null?void 0:c.start())||new _.g6g(null)})},A6g=function(a){_.Ae(document,"visibilitychange",()=>{document.visibilityState==="visible"&&a()})},B6g={PROMPT:0,k_e:1,n_e:2,m_e:3,j_e:5,o_e:6,l_e:7,p_e:8,i_e:9,U2e:100,h_e:101,0:"PROMPT",1:"NO_PROMPT_BACKOFF",2:"NO_PROMPT_NO_STORAGE",3:"NO_PROMPT_NOT_GRANTED",5:"NO_PROMPT_ALREADY_OPEN",6:"NO_PROMPT_SAME_EVENT",7:"NO_PROMPT_NOT_DIRECT_NAVIGATION",8:"NO_PROMPT_THROTTLED",9:"NO_PRE_
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (1689), with no line terminators
                            Category:downloaded
                            Size (bytes):1689
                            Entropy (8bit):5.640520027557763
                            Encrypted:false
                            SSDEEP:
                            MD5:45DD7BD58C9F085DA52FA16A2A150066
                            SHA1:9B5CF4B288EDE14AE8834F3EF2A58145B8EC8CBC
                            SHA-256:0D5C53FCC37C7A2CE26367BBE6197FCD9272DD7EBC81823D088A4DFFF5AE599B
                            SHA-512:520B8DF68524C2CEF393B837D7EAD0168028C94697E1DA0AC4BDDAFAB849D1B26D7E7933082146AE6A220A449F066CBBBA2EBFC6CC30D3F756FBD98EE061C8DF
                            Malicious:false
                            Reputation:unknown
                            URL:"https://www.google.com/xjs/_/ss/k=xjs.hd.rVqMNzqlVlQ.L.B1.O/am=CKkCAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEAAAAAAAAAABOwEAAADAOwCBAgAAAAAwAAAAAABEAAAABBAAKACAAAAAAAgAABEABAAUAAAAAiMAgAAARlACUACACAABQEACAAIAASQQUMgKgBRAAAAAAAAAAACAAAAhgAQCADQARAABoBIAABEDwQAAAAAIAgAYCYAhoABCAAAAAAAACADAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAgAKA/d=0/br=1/rs=ACT90oHOuxEPhlzZ3IGP944yO_Wxq-S9gw/m=syjb,synj?xjs=s4"
                            Preview:.MTIaKb,.LwDUdc,.FAoEle,.RlTCPd,.wPNfjb,.caNvfd,.Vnob4b,.bbxTBb,.DpgmK,.YKUhfb,.uNnvb,.aVsZpf,.RoOVmf,.dIfvQd,.V3Ezn,.Enb9pe,.mYuoaf,.kJSB8,.tUr4Kc,.iQMtqe{--Yi4Nb:var(--mXZkqc);--pEa0Bc:var(--bbQxAb);--kloG3:var(--mXZkqc);--YaIeMb:var(--XKMDxc);--Pa8Wlb:var(--Nsm0ce);--izGsqb:var(--Nsm0ce);--todMNcl:var(--EpFNW);--p9J9c:var(--Nsm0ce)}:root{--KIZPne:#a3c9ff;--xPpiM:#001d35;--Ehh4mf:var(--Nsm0ce)}:root{--Yi4Nb:#d2d2d2;--pEa0Bc:#474747;--kloG3:#d2d2d2;--YaIeMb:#f7f8f9;--Pa8Wlb:#0b57d0;--izGsqb:#0b57d0;--todMNcl:#fff;--p9J9c:#0b57d0}.EpPYLd{display:block;position:relative}.YpcDnf{padding:0 16px;vertical-align:middle}.YpcDnf.HG1dvd{padding:0}.HG1dvd>*{padding:0 16px}.WtV5nd .YpcDnf{padding-left:28px}.Zt0a5e .YpcDnf{line-height:48px}.GZnQqe .YpcDnf{line-height:23px}.EpPYLd:hover{cursor:pointer}.EpPYLd,.CB8nDe:hover{cursor:default}.LGiluc,.EpPYLd[disabled]{pointer-events:none;cursor:default}@media (forced-colors:active){.EpPYLd[disabled]{color:GrayText}}.LGiluc{border-top:1px solid;height:0;
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (2586)
                            Category:downloaded
                            Size (bytes):223647
                            Entropy (8bit):5.521909826185605
                            Encrypted:false
                            SSDEEP:
                            MD5:75F682DE6D92A3D71F58C18863A51703
                            SHA1:58F25B91F0CFCD4FDEC58A4C88AAA99A59036D15
                            SHA-256:9FFC1D9B4195ED70CF06700E0185877F970BC4A5C1EE513E0670313A8F873BC7
                            SHA-512:767BD13AC87589D3B1702779991D915398F84D57EA68DAE9032BA5FAAED8D5E22E1990DF662EC7EBFC011F7F42C879DA6761F07DDFF5BEB99889EED7EE73F842
                            Malicious:false
                            Reputation:unknown
                            URL:"https://www.gstatic.com/og/_/js/k=og.qtm.en_US._3uvDuX1Bhg.2019.O/rt=j/m=qabr,q_d,qcwid,qapid,qald,qads,q_dg/exm=qaaw,qadd,qaid,qein,qhaw,qhba,qhbr,qhch,qhga,qhid,qhin/d=1/ed=1/rs=AA2YrTus2ZfPv70D5bJuGT4XDgi-VtNqjg"
                            Preview:this.gbar_=this.gbar_||{};(function(_){var window=this;.try{._.Cd=typeof AsyncContext!=="undefined"&&typeof AsyncContext.Snapshot==="function"?a=>a&&AsyncContext.Snapshot.wrap(a):a=>a;.}catch(e){_._DumpException(e)}.try{._.ve=function(a){return _.Kb(a)&&a.nodeType==1};_.we=function(a,b){if("textContent"in a)a.textContent=b;else if(a.nodeType==3)a.data=String(b);else if(a.firstChild&&a.firstChild.nodeType==3){for(;a.lastChild!=a.firstChild;)a.removeChild(a.lastChild);a.firstChild.data=String(b)}else _.se(a),a.appendChild(_.ie(a).createTextNode(String(b)))};var xe;_.ye=function(a,b,c){Array.isArray(c)&&(c=c.join(" "));const d="aria-"+b;c===""||c==void 0?(xe||(xe={atomic:!1,autocomplete:"none",dropeffect:"none",haspopup:!1,live:"off",multiline:!1,multiselectable:!1,orientation:"vertical",readonly:!1,relevant:"additions text",required:!1,sort:"none",busy:!1,disabled:!1,hidden:!1,invalid:"false"}),c=xe,b in c?a.setAttribute(d,c[b]):a.removeAttribute(d)):a.setAttribute(d,c)};var Ce;_.Be=func
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (621)
                            Category:downloaded
                            Size (bytes):1023771
                            Entropy (8bit):5.686404266042012
                            Encrypted:false
                            SSDEEP:
                            MD5:8E1F299DE8ED951381F7377F52022749
                            SHA1:44878706A51DABD978A9C23B6ED439724572132D
                            SHA-256:5F1A755582D77BF09C64F0EAECE124C7A0CE891A3AFB437C049A16A6D5DA7EF0
                            SHA-512:21D106CBF94B17DCE91915623D716C1B94ACD27BB69A72D6EBACE2744D3071DBEAF880CEC6121E85FC78622D737F4665B4A7A71E5E4DF053A6A98A05AF089F63
                            Malicious:false
                            Reputation:unknown
                            URL:"https://www.google.com/xjs/_/js/k=xjs.hd.en_US.Krtc5zmDtmw.es5.O/am=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEAAAAAAAAAAAAMAAAAQAAAAAAgAAAAAAAAAhABBEAAABAAAALAAAEAwAAACAEBAAACAAAAeZQoAAkQAAAAACAAgACAAABAAAAAIAAAAAAAAKAAAAAAAEAAAAAAAAAAAAgQAAAAAAAAAAAAIAABADwAAAAAAAAAQEAAAhoABCAAAAAAAAOgDgOABGFJYAAAAAAAAAAAAAAAACJAgmAsJKAhAAAAAAAAAAAAAAAAAAACRJi5s/d=1/ed=1/dg=3/br=1/rs=ACT90oGW91yj_1QpwouExXf3F7bWM9lonA/ee=ALeJib:B8gLwd;AfeaP:TkrAjf;BMxAGc:E5bFse;BgS6mb:fidj5d;BjwMce:cXX2Wb;CxXAWb:YyRLvc;DULqB:RKfG5c;Dkk6ge:JZmW9e;DpcR3d:zL72xf;EABSZ:MXZt9d;ESrPQc:mNTJvc;EVNhjf:pw70Gc;EmZ2Bf:zr1jrb;EnlcNd:WeHg4;F9mqte:UoRcbe;Fmv9Nc:O1Tzwc;G0KhTb:LIaoZ;G6wU6e:hezEbd;GleZL:J1A7Od;HMDDWe:G8QUdb;HoYVKb:PkDN7e;HqeXPd:cmbnH;IBADCc:RYquRb;IoGlCf:b5lhvb;IsdWVc:qzxzOb;JXJSm:ii1RGf;JXS8fb:Qj0suc;JbMT3:M25sS;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;KOxcK:OZqGte;KQzWid:ZMKkN;KcokUb:KiuZBf;KpRAue:Tia57b;LBgRLc:SdcwHb,XVMNvd;LEikZe:byfTOb,lsjVmc;LXA8b:q7OdKd;LsNahb:ucGLNb;Me32dd:MEeYgc;NPKaK:SdcwHb;NSEoX:lazG7b;Np8Qkd:Dpx6qc;Nyt6ic:jn2sGd;OgagBe:cNTe0;OohIYe:mpEAQb;Pjplud:EEDORb,PoEs9b;Q1Ow7b:x5CSu;Q6C5kf:pfdZCe;QGR0gd:Mlhmy;R2kc8b:ALJqWb;R4IIIb:QWfeKf;R9Ulx:CR7Ufe;RDNBlf:zPRCJb;SLtqO:Kh1xYe;SMDL4c:fTfGO,fTfGO;SNUn3:ZwDk9d,x8cHvb;ScI3Yc:e7Hzgb,e7Hzgb;ShpF6e:N0pvGc;SzQQ3e:dNhofb;TxfV6d:YORN0b;U96pRd:FsR04;UBKJZ:LGDJGb;UDrY1c:eps46d;UVmjEd:EesRsb;UVzb9c:IvPZ6d;UyG7Kb:wQd0G;V2HTTe:RolTY;VGRfx:VFqbr;VN6jIc:ddQyuf;VOcgDe:YquhTb;VsAqSb:PGf2Re;VxQ32b:k0XsBb;WCEKNd:I46Hvd;WDGyFe:jcVOxd;Wfmdue:g3MJlb;XUezZ:sa7lqb;YIZmRd:A1yn5d;YV5bee:IvPZ6d;YkQtAf:rx8ur;ZSH6tc:QAvyLe;ZWEUA:afR4Cf;ZlOOMb:P0I0Ec;a56pNe:JEfCwb;aAJE9c:WHW6Ef;aCJ9tf:qKftvc;aZ61od:arTwJ;af0EJf:ghinId;bDXwRe:UsyOtc;bcPXSc:gSZLJb;cEt90b:ws9Tlc;cFTWae:gT8qnd;coJ8e:KvoW8;dIoSBb:ZgGg9b;dLlj2:Qqt3Gf;dowIGb:ebZ3mb,ebZ3mb;dtl0hd:lLQWFe;eBAeSb:Ck63tb;eBZ5Nd:audvde;eHDfl:ofjVkb;eO3lse:nFClrf;euOXY:OZjbQ;g8nkx:U4MzKc;gaub4:TN6bMe;gtVSi:ekUOYd;h3MYod:cEt90b;hK67qb:QWEO5b;heHB1:sFczq;hjRo6e:F62sG;hsLsYc:Vl118;iFQyKf:QIhFr,vfuNJf;imqimf:jKGL2e;jY0zg:Q6tNgc;k2Qxcb:XY51pe;kCQyJ:ueyPK;kMFpHd:OTA3Ae;kbAm9d:MkHyGd;lOO0Vd:OTA3Ae;lbfkyf:MqGdUd;nAFL3:NTMZac,s39S4;nJw4Gd:dPFZH;oGtAuc:sOXFj;oSUNyd:fTfGO,fTfGO;oUlnpc:RagDlc;oVHXxc:HODIOb;okUaUd:wItadb;pKJiXd:VCenhc;pNsl2d:j9Yuyc;pXdRYb:JKoKVe;pj82le:ww04Df;qZx2Fc:j0xrE;qaS3gd:yiLg6e;qafBPd:sgY6Zb;qavrXe:zQzcXe;qddgKe:d7YSfd,x4FYXe;rQSrae:C6D5Fc;ropkZ:UT1DG;sTsDMc:kHVSUb;sZmdvc:rdGEfc;tH4IIe:Ymry6;tosKvd:ZCqP3;trZL0b:qY8PFe;uuQkY:u2V3ud;vEYCNb:FaqsVd;vGrMZ:lPJJ0c;vfVwPd:lcrkwe;w3bZCb:ZPGaIb;w4rSdf:XKiZ9;w9w86d:dt4g2b;wQlYve:aLUfP;wR5FRb:O1Gjze,TtcOte;wV5Pjc:L8KGxe;xBbsrc:NEW1Qc;ysNiMc:CpIBjd;yxTchf:KUM7Z;z97YGf:oug9te;zOsCQe:Ko78Df;zaIgPb:Qtpxbd/m=cdos,hsm,jsa,mb4ZUb,cEt90b,SNUn3,qddgKe,sTsDMc,dtl0hd,eHDfl,d,csi"
                            Preview:this._hd=this._hd||{};(function(_){var window=this;.try{./*.. Copyright The Closure Library Authors.. SPDX-License-Identifier: Apache-2.0.*/./*.. Copyright Google LLC. SPDX-License-Identifier: Apache-2.0.*/./*.. Copyright 2024 Google, Inc. SPDX-License-Identifier: MIT.*/./*. SPDX-License-Identifier: Apache-2.0.*/./*. Copyright The Closure Library Authors.. SPDX-License-Identifier: Apache-2.0.*/.var baa,caa,iaa,uaa,waa,Baa,Iaa,Naa,Waa,Yaa,$aa,cba,dba,iba,mba,nba,qba,tba,uba,sba,vba,xba,oba,gb,yba,zba,Cba,Dba,Eba,Gba,Iba,Lba,Mba,Oba,Pba,Qba,Sba,Tba,Vba,Zba,sb,jca,kca,lca,mca,nca,gca,oca,dca,pca,cca,eca,fca,qca,rca,sca,Cca,Dca,Fca,Hca,Ica,Mca,Pca,Jca,Oca,Nca,Lca,Kca,Qca,Rca,Sca,Vca,Uca,Zca,$ca,hda,ida,jda,kda,lda,mda,ada,nda,qda,sda,rda,uda,wda,vda,yda,xda,Bda,Ada,Cda,Gda,Hda,Kda,Mda,Pda,Jb,Qda,Sda,Lb,Yda,aea,iea,qea,sea,Kb,Uda,uea,yea,Eea,Wb,Iea,Lea,Kea,Sea,Uea,Vea,Yea,afa,bfa,dfa,gfa,jfa,.kfa,lfa,tfa,Afa,Ffa,Hfa,Jfa,Kfa,Lfa,Mfa,Qfa,Xfa,Yfa,$fa,dga,ega,gga,tga,uga,yga,xga,Nc,Pga,Rga,Uga,
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (957)
                            Category:dropped
                            Size (bytes):22604
                            Entropy (8bit):5.4069289106970615
                            Encrypted:false
                            SSDEEP:
                            MD5:C5DAF64E4F57B375E39D8EFB79452424
                            SHA1:EBC1FF594C156FB6E25AAD7E074C065AD2BC7E34
                            SHA-256:30F68004B757364A15012EF8A60532CAAEBCF4DC7629B3B3070592C8FB330C06
                            SHA-512:ECCA8836D32C43B7DDFE03F1384E3D849F880D26914326C1ACDEE1E3C4DD4E53E25BBFC7FE70319F7AFD46F06F8B51F8A675CD33C7E91938FEF36802DB8B9B90
                            Malicious:false
                            Reputation:unknown
                            Preview:this._s=this._s||{};(function(_){var window=this;.try{._.Asf=_.w("fVaWL",[]);.}catch(e){_._DumpException(e)}.try{._.q("fVaWL");._.Bsf=function(a){return a.oa!=null&&a.Aa!=null&&_.Gm(a.Aa)};_.Csf=function(a){a.oa!=null&&a.Aa!=null&&(a.oa&&_.Fm(a.oa,!_.Gm(a.oa)),a.Aa&&_.Fm(a.Aa,!_.Gm(a.Aa)))};_.Dsf=function(a){a.oa!=null&&a.Aa!=null&&(_.Csf(a),_.Gm(a.oa)?(_.gv(a.Aa),a.Ba!=null&&a.Ba.click()):_.Gm(a.Aa)&&(_.gv(a.oa),a.Ca!=null&&a.Ca.click()),a.Da&&a.Da.Aa())};_.Esf=class{constructor(a,b,c,d,e=null){this.oa=a;this.Aa=b;this.Ca=c;this.Ba=d;this.Da=e}};._.Fsf=function(a){var b;if(b=a.oa){b=a.oa;var c=a.Aa;b=c?b.oa===c.oa:!1}return b?null:a.Aa};_.Gsf=class extends _.yo{static Ra(){return{}}constructor(){super();this.Ga=0;this.Ea="";this.Ba=new Map;this.Da=!1;this.Aa=this.oa=null;this.Ca=!1}};_.Ao(_.Asf,_.Gsf);._.u();.}catch(e){_._DumpException(e)}.try{._.N9b=_.G("Rao93");.}catch(e){_._DumpException(e)}.try{._.A9b=_.G("aVMkAb");_.B9b=_.G("uUCWgf");_.C9b=_.G("I4dl7e");_.D9b=_.G("kEttsc");_.E9b=
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (589)
                            Category:dropped
                            Size (bytes):1667
                            Entropy (8bit):5.297974843067207
                            Encrypted:false
                            SSDEEP:
                            MD5:9DBA87882CA278C13457B174F983AF6E
                            SHA1:FAEEB305978C09CB07678E0160E978CD811F1551
                            SHA-256:2CB0E1CBA69E218D0749954A770422A475C416C8006910829B05479710763416
                            SHA-512:161CC6ABE862AD550561D6F6246253BAE6F7F23AF41D8AFE08D12F5FBFFE8E61148632B81B5D2A03496D3115B48DF6A3530D5FD3816135BE6B41522597F3BF2E
                            Malicious:false
                            Reputation:unknown
                            Preview:this._hd=this._hd||{};(function(_){var window=this;.try{._.y("lOO0Vd");._.Nab=new _.te(_.oKa);._.z();.}catch(e){_._DumpException(e)}.try{.var Zab;_.$ab=function(a,b,c,d,e){this.rua=a;this.rPc=b;this.r6a=c;this.ETc=d;this.s2c=e;this.BZa=0;this.q6a=Zab(this)};Zab=function(a){return Math.random()*Math.min(a.rPc*Math.pow(a.r6a,a.BZa),a.ETc)};_.$ab.prototype.pIb=function(){return this.BZa};_.$ab.prototype.Xba=function(a){return this.BZa>=this.rua?!1:a!=null?!!this.s2c[a]:!0};_.abb=function(a){if(!a.Xba())throw Error("Fe`"+a.rua);++a.BZa;a.q6a=Zab(a)};.}catch(e){_._DumpException(e)}.try{._.y("P6sQOc");.var bbb=function(a){var b={};_.Qa(a.xbb(),function(e){b[e]=!0});var c=a.Fab(),d=a.Pab();return new _.$ab(a.Oab(),c.ka()*1E3,a.S$a(),d.ka()*1E3,b)},cbb=!!(_.fh[27]>>14&1);var dbb=function(a){_.Yn.call(this,a.Oa);this.oc=null;this.ka=a.service.Ukb;this.wa=a.service.metadata;a=a.service.yHc;this.fetch=a.fetch.bind(a)};_.D(dbb,_.Yn);dbb.Ia=function(){return{service:{Ukb:_.Uab,metadata:_.Nab,yHc:_.
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (3993)
                            Category:dropped
                            Size (bytes):324182
                            Entropy (8bit):5.616691895178804
                            Encrypted:false
                            SSDEEP:
                            MD5:036842D5C7D2E9AF9C37ABD55DE8EE2B
                            SHA1:D9C8695CA5BFB7131EC7A207AE1D32213131D007
                            SHA-256:6671EB4AEF6251639FDEA1C6ABD187D14A08884FBEEFCEBEA867C46A5D5ADE16
                            SHA-512:5104C4ACA1501EA9F3AA7741DE4D5DE1BA46CDD93F3AAF96724B232A526403CE2A24FF654DB8248AC94408E358F640D9B32256A477245BDE9F6F09ED4571E1E7
                            Malicious:false
                            Reputation:unknown
                            Preview:_F_installCss("@media (min-width:480px){.Jm7ege.fC2KG{min-width:380px}}.vSyRff.kqLqDd{bottom:0;left:0;right:0}@media (min-width:480px){.c3k6Zc.fC2KG{left:auto;right:20px}}@media (min-width:480px){.JXXsr.fC2KG{left:20px;right:auto}}.dgVGnc .qk7LXc,.qk7LXc.dgVGnc{width:90%}.BhUHze .qk7LXc,.qk7LXc.BhUHze{width:75%}.rfx2Y .qk7LXc,.qk7LXc.rfx2Y{width:100%}.cJFqsd .qk7LXc,.qk7LXc.cJFqsd{height:100%}.yMNJR .qk7LXc,.qk7LXc.yMNJR{max-width:100%}.vSyRff.Y5Ip8c{background-color:var(--xhUGwc);border-radius:20px;bottom:40px;right:40px;box-shadow:0 4px 8px rgba(0,0,0,0.1),0 1px 3px rgba(0,0,0,0.06)}.jnyxRd.Y5Ip8c{border-radius:20px}.vSyRff.fC2KG{background-color:var(--xhUGwc);box-shadow:0 2px 2px 2px rgba(0,0,0,0.1),0 2px 6px 6px rgba(0,0,0,0.06)}@media (min-width:320px){.vSyRff.fC2KG{bottom:0;left:0;right:0}}@media (min-width:480px){.vSyRff.fC2KG{display:inline-block;bottom:20px}}.lgo9kc.vKW4md{opacity:.6;visibility:inherit}.vSyRff.vKW4md{transform:translateY(0);opacity:1;visibility:inherit}.lgo9kc
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with no line terminators
                            Category:downloaded
                            Size (bytes):16
                            Entropy (8bit):3.875
                            Encrypted:false
                            SSDEEP:
                            MD5:BEEDCB4EB0A559E6CE2D1E20D38CB330
                            SHA1:A04EE9801770C0E81B170D7992EC3735E878AA58
                            SHA-256:6E9D99B87595B07B10676B68EBE9AA8B63DF7D9A74F59CC91EED60EA1FBDC6EF
                            SHA-512:BD101CDF7FDF1210127D83CE76E3F6F6F1378259F0A55C112E39C49A9131B8636FB020E07E985B8427A35B62A544F2F7C5F75B11AD69EF2C4AE67A41BD5898B2
                            Malicious:false
                            Reputation:unknown
                            URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISEAn11VQ7sgCk8RIFDWlIR0c=?alt=proto
                            Preview:CgkKBw1pSEdHGgA=
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (940)
                            Category:dropped
                            Size (bytes):412819
                            Entropy (8bit):5.594650400050279
                            Encrypted:false
                            SSDEEP:
                            MD5:EC939A5FE9427EB69C12B7DDE81FE2C0
                            SHA1:C714CF85E845FF5804A6758930797C9E2001EF22
                            SHA-256:1B5BF8A8B867054E7FEAF0381F90099E5EAAC36509BAD8827BECA7DAD4E997E5
                            SHA-512:2F36C129FB6DD20B8F053B6CFF60FB335F2245CC441566E2BDE623FD96F3CE501040B5EEF812BE93B5B4CCE126093271634C00BE7211364F550B5C7D9DF4420B
                            Malicious:false
                            Reputation:unknown
                            Preview:this._hd=this._hd||{};(function(_){var window=this;.try{._.y("sb_wiz");.._.z();.}catch(e){_._DumpException(e)}.try{._.y("aa");.._.z();.}catch(e){_._DumpException(e)}.try{._.y("abd");.var U5h=function(a){for(var b="",c=21,d=0;d<a.length;d++)d%4!=3&&(b+=String.fromCharCode(a[d]^c),c++);return b},V5h=function(a){var b=0,c;for(c in a)if(a[c].e)if(a[c].b)b++;else return!1;return b>0},$5h=function(a){a=a===void 0?{}:a;var b={};b[W5h]={e:!!a[W5h],b:!_.y0b(X5h)};b[Y5h]={e:!!a[Y5h],b:!_.y0b(Z5h)};return b},a6h=function(a){var b=[],c;for(c in a)a[c].e&&b.push(c+":"+(a[c].b?"1":"0"));return b.join(",")},c6h=function(a,b){a=String(a);b&&(a+=","+b);google.log(b6h,a)},d6h=function(a,b,c){c=.c===void 0?2:c;if(c<1)c6h(7,b);else{var d=new Image;d.onerror=function(){d6h(a,b,c-1)};d.src=a}},X5h=U5h([97,119,115,111,107]),Z5h=U5h([97,119,115,111,107,123]),e6h=U5h([118,115,121,107,108,124,104,119,68,127,114,105,114]),b6h=U5h([101,126,118,102,118,125,118,109,126]),f6h=U5h([116,116,115,108]),W5h=U5h([113,115,
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (1748)
                            Category:dropped
                            Size (bytes):1753
                            Entropy (8bit):4.978662369166222
                            Encrypted:false
                            SSDEEP:
                            MD5:89A4C630EE70268210A4A4AA632466A8
                            SHA1:E9879055701B7DD7776350E55D70346C2A7FA3B1
                            SHA-256:626A95F39C2769BCC2533AF317DC24E0AEB957D929F189C5C391DB89A79E5E8B
                            SHA-512:2FC1AAB51459194E0F8A3F2FA2C0EE1779D74CA7968659CE9BC415D4E531FBE89BF5872F2B898707289AEF0D525F9486045EF0E2A1BF5E489B6AA65AD506519B
                            Malicious:false
                            Reputation:unknown
                            Preview:)]}'.[[["https www google com gws_rd ssl youtube",0,[512,273,308,650,362],{"zl":90000}],["how late is the closest grocery store open",0,[512,273,308,650,362],{"zl":90000}],["takeout restaurants open now near me",0,[512,273,308,650,362],{"zl":90000}],["where\u0026#39;s the closest pharmacy",0,[512,273,308,650,362],{"zl":90000}],["any gas stations nearby",0,[512,273,308,650,362],{"zl":90000}],["takeout coffee nearby",0,[512,273,308,650,362],{"zl":90000}],["adp employee login",0,[512,308,468,357,439,650,362,394],{"zl":90000}],["ipay adp com register sign in",0,[512,308,468,357,439,650,362,394],{"zl":90000}],["adp workforce login",0,[512,308,468,357,439,650,362,394],{"zl":90000}],["my adp",0,[512,308,468,357,439,650,362,394],{"zl":90000}],["student loans",0,[3,308,362,143],{"zf":33,"zl":90001,"zp":{"gs_ss":"1"}}],["mcdonald mcrib sauce",0,[3,308,362,143],{"zf":33,"zl":90001,"zp":{"gs_ss":"1"}}],["jersey mike blackstone",0,[3,308,362,143],{"zf":33,"zl":90001,"zp":{"gs_ss":"1"}}],["nvidia st
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (5718), with no line terminators
                            Category:downloaded
                            Size (bytes):5718
                            Entropy (8bit):5.262905360239653
                            Encrypted:false
                            SSDEEP:
                            MD5:383BC2BEA4266A833F7EDBBA4A90C368
                            SHA1:CB8591B26DA23EB83ECD8629372A1480E6D04EFB
                            SHA-256:7CE935D097B4959A10EF7B1FE8E25B2A68E14C0D7F1BDAD27F89661BAA3325CB
                            SHA-512:9E25CF0EDB455235EAC92E6BAAFABF4F78C3F21B98A024E9A62E5415776B5AB996743C71B495F2A183BA4F5F6296CFF1C904679F14D9E91A71575E47D3938402
                            Malicious:false
                            Reputation:unknown
                            URL:"https://www.gstatic.com/og/_/ss/k=og.asy.bU0lx3j6Cpw.L.W.O/m=ll_tdm,adcgm3,ll_fw/excm=/d=1/ed=1/ct=zgms/rs=AA2YrTtPi1_F_xVeVw_Lpywb54ycIzK5gQ"
                            Preview:.gb_zc{background:rgba(60,64,67,.9);-webkit-border-radius:4px;border-radius:4px;color:#fff;font:500 12px "Roboto",arial,sans-serif;letter-spacing:.8px;line-height:16px;margin-top:4px;min-height:14px;padding:4px 8px;position:absolute;-webkit-user-select:text;-webkit-user-select:text;z-index:1000;-webkit-font-smoothing:antialiased}.gb_Ac{text-align:left}.gb_Ac>*{color:#bdc1c6;line-height:16px}.gb_Ac div:first-child{color:white}.gb_A{-webkit-border-radius:50%;border-radius:50%}.gb_A::before{background:#444746;background:var(--gm3-sys-color-on-surface-variant,#444746);-webkit-border-radius:100px;border-radius:100px;content:"";height:100%;left:0;opacity:0;position:absolute;top:0;-webkit-transition:opacity .3s ease-out;-webkit-transition:opacity .3s ease-out;transition:opacity .3s ease-out;width:100%}.gb_F .gb_A::before{background:#c4c7c5;background:var(--gm3-sys-color-on-surface-variant,#c4c7c5)}.gb_A:hover{background-color:rgba(60,64,67,.08)}.gb_A:focus::before,.gb_A:focus:hover::before{op
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (10109), with no line terminators
                            Category:downloaded
                            Size (bytes):10109
                            Entropy (8bit):5.303548249312523
                            Encrypted:false
                            SSDEEP:
                            MD5:C81327CE05F2739305F61E83A6C05446
                            SHA1:AB2C67BAF219EE7730269E652B894D9D337B1D5D
                            SHA-256:7637C8A763E6F90772BB18F15A4EF50B1978313BECE75FB07B900CAD56D49979
                            SHA-512:99F034CF708B8E130D5F4819B78CCECFC7D2E646E26B37A3377FC62C7BBA29BEA45C1ABE7D9520E11FB98B36D2E44BB9A32EF53332B00875CA6F143E163A2308
                            Malicious:false
                            Reputation:unknown
                            URL:"https://www.gstatic.com/og/_/ss/k=og.qtm.zyyRgCCaN80.L.W.O/m=qcwid,d_b_gm3,d_wi_gm3,d_lo_gm3/excm=qaaw,qadd,qaid,qein,qhaw,qhba,qhbr,qhch,qhga,qhid,qhin/d=1/ed=1/ct=zgms/rs=AA2YrTs4SLbgh5FvGZPW_Ny7TyTdXfy6xA"
                            Preview:.gb_P{-webkit-border-radius:50%;border-radius:50%;bottom:2px;height:18px;position:absolute;right:0;width:18px}.gb_Ja{-webkit-border-radius:50%;border-radius:50%;-webkit-box-shadow:0px 1px 2px 0px rgba(60,64,67,.30),0px 1px 3px 1px rgba(60,64,67,.15);box-shadow:0px 1px 2px 0px rgba(60,64,67,.30),0px 1px 3px 1px rgba(60,64,67,.15);margin:2px}.gb_Ka{fill:#f9ab00}.gb_F .gb_Ka{fill:#fdd663}.gb_La>.gb_Ka{fill:#d93025}.gb_F .gb_La>.gb_Ka{fill:#f28b82}.gb_La>.gb_Ma{fill:white}.gb_Ma,.gb_F .gb_La>.gb_Ma{fill:#202124}.gb_Na{-webkit-clip-path:path("M16 0C24.8366 0 32 7.16344 32 16C32 16.4964 31.9774 16.9875 31.9332 17.4723C30.5166 16.5411 28.8215 16 27 16C22.0294 16 18 20.0294 18 25C18 27.4671 18.9927 29.7024 20.6004 31.3282C19.1443 31.7653 17.5996 32 16 32C7.16344 32 0 24.8366 0 16C0 7.16344 7.16344 0 16 0Z");clip-path:path("M16 0C24.8366 0 32 7.16344 32 16C32 16.4964 31.9774 16.9875 31.9332 17.4723C30.5166 16.5411 28.8215 16 27 16C22.0294 16 18 20.0294 18 25C18 27.4671 18.9927 29.7024 20.6004 3
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1136)
                            Category:dropped
                            Size (bytes):1555
                            Entropy (8bit):5.249530958699059
                            Encrypted:false
                            SSDEEP:
                            MD5:FBE36EB2EECF1B90451A3A72701E49D2
                            SHA1:AE56EA57C52D1153CEC33CEF91CF935D2D3AF14D
                            SHA-256:E8F2DED5D74C0EE5F427A20B6715E65BC79ED5C4FC67FB00D89005515C8EFE63
                            SHA-512:7B1FD6CF34C26AF2436AF61A1DE16C9DBFB4C43579A9499F4852A7848F873BAC15BEEEA6124CF17F46A9F5DD632162364E0EC120ACA5F65E7C5615FF178A248F
                            Malicious:false
                            Reputation:unknown
                            Preview:<!DOCTYPE html>.<html lang=en>. <meta charset=utf-8>. <meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width">. <title>Error 400 (Bad Request)!!1</title>. <style>. *{margin:0;padding:0}html,code{font:15px/22px arial,sans-serif}html{background:#fff;color:#222;padding:15px}body{margin:7% auto 0;max-width:390px;min-height:180px;padding:30px 0 15px}* > body{background:url(//www.google.com/images/errors/robot.png) 100% 5px no-repeat;padding-right:205px}p{margin:11px 0 22px;overflow:hidden}ins{color:#777;text-decoration:none}a img{border:0}@media screen and (max-width:772px){body{background:none;margin-top:0;max-width:none;padding-right:0}}#logo{background:url(//www.google.com/images/branding/googlelogo/1x/googlelogo_color_150x54dp.png) no-repeat;margin-left:-5px}@media only screen and (min-resolution:192dpi){#logo{background:url(//www.google.com/images/branding/googlelogo/2x/googlelogo_color_150x54dp.png) no-repeat 0% 0%/100% 100%;-moz-border-image:url(//ww
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (3549)
                            Category:dropped
                            Size (bytes):164622
                            Entropy (8bit):5.635763267606883
                            Encrypted:false
                            SSDEEP:
                            MD5:E45B8E0E89293EF67A54EF2BF6A0C016
                            SHA1:1BD618621B2A001A72BFDB735DE1D9AFDBC74C06
                            SHA-256:B2775912B6CA5B9DD200DFE632CA60D8EF223FF414F2736F02FCE689408A7DB9
                            SHA-512:3F0C6BD72DACD8C9A5F9DB642D24762B6FE3DB97BF1BA4D854ED814E285F7A6DFB11A1977BAC9970E74658A70896232E20E0ED1CBCBD7D4DA9033D2E213D2F92
                            Malicious:false
                            Reputation:unknown
                            Preview:this._s=this._s||{};(function(_){var window=this;.try{._.bnc=[0,[1,2,4],[6,8],_.Uj,-1,_.Ak,_.sk,_.ls,_.Ds,_.sk,_.ls,_.D,_.Ek,_.D,1,_.Qj];.}catch(e){_._DumpException(e)}.try{._.cnc=[1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21];var dnc=[0,_.D,-1];var enc=[0,_.Ij,-1,_.Ak,_.D];_.fnc=[0,_.cnc,_.sk,[0,_.Qj,_.Rj,_.D,_.F],_.sk,enc,_.sk,[0,_.Qj],_.sk,dnc,_.sk,[0,_.Qj,enc],_.sk,[0,_.Ck,_.D],_.sk,[0,_.Sj,-1,_.D],_.sk,[0,_.Bk],_.sk,[0,_.D,-3],_.sk,dnc,_.sk,[0,_.Rj],_.sk,[0,_.Qj],_.sk,dnc,_.sk,[0,_.Ck],_.sk,dnc,_.sk,[0,_.Qj],_.sk,dnc,_.sk,[0,_.jk],_.sk,[0,_.bnc],_.sk,[0,_.F],_.sk,[0,_.D]];.}catch(e){_._DumpException(e)}.try{._.$mc=[0,1,_.Yj,-1,4,_.Yj,-3,_.ek,_.Bk,_.rk,[0,_.Ak,_.Wj],-1];.}catch(e){_._DumpException(e)}.try{._.gnc=class extends _.m{constructor(a){super(a)}getType(){return _.si(this,3,0)}setType(a){return _.ej(this,3,a)}Ne(){return _.yj(this,3)}Le(){return _.Li(this,3)}yh(){return _.si(this,12,0)}Ki(a){return _.ej(this,12,a)}};var hnc=[0,_.Qj,-1,_.Sj,_.Qj];_.inc=[0,_.D,_.rk,_
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (2933)
                            Category:downloaded
                            Size (bytes):204745
                            Entropy (8bit):5.518487070066315
                            Encrypted:false
                            SSDEEP:
                            MD5:9AAE9D2594357010AC96C5A09D200389
                            SHA1:00BD1E28FDDCC4F1B7CF136947D2169850A845E0
                            SHA-256:D7EC175103974526224D77B97D62985A2F544F54A3E6310C6BF06BD7C86BA8FC
                            SHA-512:3DE537A6DDCBBCA7E0D7D97ABC5A23B3B8A01C168B1AEB1ADB5166ED820564445FB1B2137FA3F709ED4A0A75070BC7B29824CC4A4E6E9F125D04929B2C76BA5B
                            Malicious:false
                            Reputation:unknown
                            URL:"https://www.gstatic.com/og/_/js/k=og.asy.en_US.3eeyn54JYqI.2019.O/rt=j/m=_ac,_awd,ada,lldp,qads/exm=/d=1/ed=1/rs=AA2YrTsMCSvLWaI1FOp59bOj-7YXDjJMCA"
                            Preview:this.gbar_=this.gbar_||{};(function(_){var window=this;.try{._._F_toggles_initialize=function(a){(typeof globalThis!=="undefined"?globalThis:typeof self!=="undefined"?self:this)._F_toggles=a||[]};(0,_._F_toggles_initialize)([]);./*.. Copyright The Closure Library Authors.. SPDX-License-Identifier: Apache-2.0.*/./*.. Copyright Google LLC. SPDX-License-Identifier: Apache-2.0.*/.var ba,ca,fa,ha,ma,oa,pa,qa,ra,wa,za,Ba,Ea,Fa,Ha,Ia,Ja,Ma,Oa,Ra,Va,Ua,Sa,nb,rb,sb,wb,xb,Ab,Cb,Fb,Eb,Hb,Jb,Ib,Kb,Lb,Pb,Qb,Sb,$b,cc,dc,hc,kc,ec,jc,ic,gc,fc,lc,oc,rc,tc,xc,Fc,Oc,Vc,Wc,Xc,Yc,Zc;_.aa=function(a,b){if(Error.captureStackTrace)Error.captureStackTrace(this,_.aa);else{const c=Error().stack;c&&(this.stack=c)}a&&(this.message=String(a));b!==void 0&&(this.cause=b)};ba=function(a){_.u.setTimeout(()=>{throw a;},0)};ca=function(){var a=_.u.navigator;return a&&(a=a.userAgent)?a:""};.fa=function(a){return da?ea?ea.brands.some(({brand:b})=>b&&b.indexOf(a)!=-1):!1:!1};_.v=function(a){return ca().indexOf(a)!=-1};ha=fu
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:PNG image data, 1080 x 318, 8-bit colormap, non-interlaced
                            Category:dropped
                            Size (bytes):11965
                            Entropy (8bit):7.955631624779174
                            Encrypted:false
                            SSDEEP:
                            MD5:F10D2545255CC61B132554BDB4293694
                            SHA1:7308B3B7F1BC98F097FEB8206396189814977FED
                            SHA-256:8BDA67B42743C99F605E700AFE2CEA533B4BACEDCBA9275B79F89C2B0B8C6BBA
                            SHA-512:DA32AE1C4AAE82BC8262503524DBAC25F90A4AC7FB3DD38739AF624A8B2E5496FBF0C5625BE0C4749FEE278969C8603D45EC6AAD3563B5BCF8A126A8F29CE64B
                            Malicious:false
                            Reputation:unknown
                            Preview:.PNG........IHDR...8...>....._.P.....PLTEGpL.pD.wK.qE.qF.pE.oD.oD.oD.qE.wK.wK.uI.sH..m..[.vJ.vJ.qE.pE.sG.rF.rF.qF.sG.wK.wK.qE.pD.zN.uI.rF.vJ.wK.rF.xL.qF.xL.uJ.yM.sG.xL.uI.tH.uI..}.vJ.vJ.tI.uJ.vJ.yM.vJ.vJ.yM.uI.yM.wK.wK.uJ.zN.xL.vJ.vJ.xL.zN.wK.zN.{O.{N.{N.zN.yL.xL.yL.xL.wL.xL.yM.yM.yM.xM.{O.yM.zN.{O.zN.{O.{O.{O.{O.{O.{O.{O.{O.{O.|O.|P.}R..U..V..X..[..^..b..e..g..j..m..o..p..q..r..t..v..x..z..|..|..|..}..|..}..}..}..|.....|..~..~..~..|..}..}..|..|..|..}..|.....|..~..}..}..}.....}..~..}..}..}.....~..}.....|..}.....}..|.....~.....}..~..}..}..}.....~..~..}..~..~.....}.....}..~..~..~..~...........~.....~..~.....................................................................................................................................................................................................2.A.....tRNS.@.y......j..t..D"U.e]..4....0.3..7.=.-...........YT...)........`..f..v............T......................................~8G-..Z......(.$AOV..=.r.v...z... ...2..hm.S...a.......
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (534)
                            Category:downloaded
                            Size (bytes):12316
                            Entropy (8bit):5.40741253693556
                            Encrypted:false
                            SSDEEP:
                            MD5:7B3E1A02A8020FD62ED0E11679B1A98A
                            SHA1:AE7212476630D1D9A2FD3AD7A79CDD2A13432352
                            SHA-256:B187C9B07BBE36C0FCCB2387A7EAA75A4DB3D1CE0BF2642A553C3144FBBD1E9E
                            SHA-512:1F313F0E4E3846D827BB94227305C8FA466A5ECB0530EDD57407DADC34135108DEAF5CD6D44DA8B50086467C2AD9B3D05A6234E26EDD2A755EA7723508498F7B
                            Malicious:false
                            Reputation:unknown
                            URL:"https://www.google.com/xjs/_/js/k=xjs.s.en_US.1w24Nb9LTjY.2018.O/am=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQAAAAAAAAAAAAARQQIAAAAAAAIACAAAAAAAAAAAAAAAAAAAAABAgAIGQEAAAAQAAAADAAgAACAwgQAAAIAAAAACAAAEAAAACRAD7_8cBAAAAAAAAAAAAIQAQAQAAAAAXAAAIACUBAIAAIAAAADAAAAAgAAAAAACAAgAAAQAAAAAAAgAAAAAAAAAAAABAAEA_AAAAAAAAAAAAAABAAAAAAAAABlAAIIAfAAAAAAAAAAAAAAAICAAAcAQMQAAAAAAAAADcBwCPB4RDCgsAAAAAAAAAAAAAAAAIQIJgDkh_QQAIAAAAAAAAAAAAAAAAAABIETRxuQEAAQ/d=0/dg=0/br=1/rs=ACT90oEaX3uDZltZQYEJFpC9tTS1iYU7HA/m=dLlj2,sy8lx,sy7nm,O6Iu7d,sy145,syy0,C8ffD,sy146,sy148,ZUBru,sy14a,sy149,sy147,rTuANe?xjs=s4"
                            Preview:this._s=this._s||{};(function(_){var window=this;.try{._.q("dLlj2");._.z3w=new _.ge(_.gWa);._.u();.}catch(e){_._DumpException(e)}.try{._.rfF=_.G("JLw8x");.}catch(e){_._DumpException(e)}.try{._.rpw=_.w("O6Iu7d",[_.gWa]);.}catch(e){_._DumpException(e)}.try{._.q("O6Iu7d");.var sfF=function(a){return a.t8.Llc().then(b=>{a.t8=b})},tfF=class extends _.Wf{static Ra(){return{service:{t8:_.z3w}}}constructor(a){super(a.Oa);this.Wa("uFwVBb").size()>0&&_.gf(this.getRoot().el(),_.rfF,{Sn:this.Fa("uFwVBb").el(),pz:this.Wa("AbEqqc").size()>0?this.Fa("AbEqqc").el():null});this.oa=this.getData("esw").Gb();this.Aa=this.getData("sli").Gb();this.t8=a.service.t8;this.oa&&_.xo(this,sfF(this))}sIa(){if(this.oa){var a;let b;(b=(a=this.t8).ihd)==null||b.call(a,this.Aa);a=this.getRoot().el();.let c,d;(d=(c=this.t8).KPc)==null||d.call(c,a)}}Ba(a){let b;a=(b=a.data)==null?void 0:b.getElementsByClassName("nuJ8Ib")[0];a==null||a.classList.remove("X165kc");a&&_.fv([new _.io(a,"show")])}};_.H(tfF.prototype,"kTV1ed",f
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (3619)
                            Category:downloaded
                            Size (bytes):3624
                            Entropy (8bit):6.076938405787664
                            Encrypted:false
                            SSDEEP:
                            MD5:8356C6DEDFAE891C097C4F58FDCB1C86
                            SHA1:87C6A6FD15DF9C561FDCE41635680A85D4E510D7
                            SHA-256:9F135D90534F9E04992BFFE6D1ED301AF675D0BB3377CF6ECC5FCFB7238B6B41
                            SHA-512:19DAAFA5245448297DC5BC2BDFEB8A7E341D84B63E2FC7F4727F881A88E753D791A813D3B33A1FDD0A6F76CF069C50205205FF80C860EE198F9BB1E2B1C2ACD2
                            Malicious:false
                            Reputation:unknown
                            URL:https://www.google.com/complete/search?q&cp=0&client=gws-wiz&xssi=t&gs_pcrt=2&hl=en&authuser=0&psi=UJo_Z77WKPqHkdUP96vUkAs.1732221521530&dpr=1&nolsbt=1
                            Preview:)]}'.[[["to train your dragon live action trailer",0,[3,362,143],{"zf":33,"zl":8,"zp":{"gs_ss":"1"}}],["winter storm snow forecast",0,[3,362,143],{"zf":33,"zl":8,"zp":{"gs_ss":"1"}}],["wegmans e coli carrots recall",0,[3,362,143],{"zf":33,"zl":8,"zp":{"gs_ss":"1"}}],["delta air lines new fare subcategories",0,[3,362,143],{"zf":33,"zl":8,"zp":{"gs_ss":"1"}}],["xrp price prediction",0,[3,362,143],{"zf":33,"zl":8,"zp":{"gs_ss":"1"}}],["college girls season 3",0,[3,362,143],{"zf":33,"zl":8,"zp":{"gs_ss":"1"}}],["playstation black friday deals ps5",0,[3,362,143],{"zf":33,"zl":8,"zp":{"gs_ss":"1"}}],["matt gaetz congressman",46,[3,362,143],{"lm":[],"zf":33,"zh":"matt gaetz congressman","zi":"Matt Gaetz \u2014 U.S. Representative-elect (from The AP)","zl":8,"zp":{"gs_ssp":"eJzj4tLP1Tcotig3ii82YPQSy00sKVFIT0wtqVJIzs9LL0otLs5NzAMA0_cMeA"},"zs":"data:image/jpeg;base64,/9j/4AAQSkZJRgABAQAAAQABAAD/2wCEAAkGBwgHBgkIBwgKCgkLDRYPDQwMDRsUFRAWIB0iIiAdHx8kKDQsJCYxJx8fLT0tMTU3Ojo6Iys/RD84QzQ5OjcBCgoKDQwNG
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (1572)
                            Category:downloaded
                            Size (bytes):13841
                            Entropy (8bit):5.619860092185413
                            Encrypted:false
                            SSDEEP:
                            MD5:1C5AA7E6B4B621E3B605E9F678CCD4C7
                            SHA1:4CDD5541DC21BC5F5EF0DB3B73BB20BE3A09C76E
                            SHA-256:EEE3EA68A4A2F5BA823CCE292EFADEA71FC35037F361947CDF2CE4C710311972
                            SHA-512:0B25E637E82267FF4B2BC6D25027AEBCE8AF539AD14F59DCF185DBE3D02D77EE76478B77E047E1B7CDD7212C153E085DEFD824F66DD70D60E3FB5C2620FF3412
                            Malicious:false
                            Reputation:unknown
                            URL:https://fonts.googleapis.com/css?family=Josefin+Sans:200%7CGoogle+Sans%7CGoogle+Sans+Text
                            Preview:/*. * See: https://fonts.google.com/license/googlerestricted. */./* armenian */.@font-face {. font-family: 'Google Sans';. font-style: normal;. font-weight: 400;. src: url(https://fonts.gstatic.com/s/googlesans/v62/4Ua_rENHsxJlGDuGo1OIlJfC6l_24rlCK1Yo_Iqcsih3SAyH6cAwhX9RFD48TE63OOYKtrwEIJl1pynSEg.woff2) format('woff2');. unicode-range: U+0308, U+0530-058F, U+2010, U+2024, U+25CC, U+FB13-FB17;.}./* bengali */.@font-face {. font-family: 'Google Sans';. font-style: normal;. font-weight: 400;. src: url(https://fonts.gstatic.com/s/googlesans/v62/4Ua_rENHsxJlGDuGo1OIlJfC6l_24rlCK1Yo_Iqcsih3SAyH6cAwhX9RFD48TE63OOYKtrwEIJl3pynSEg.woff2) format('woff2');. unicode-range: U+0951-0952, U+0964-0965, U+0980-09FE, U+1CD0, U+1CD2, U+1CD5-1CD6, U+1CD8, U+1CE1, U+1CEA, U+1CED, U+1CF2, U+1CF5-1CF7, U+200C-200D, U+20B9, U+25CC, U+A8F1;.}./* canadian-aboriginal */.@font-face {. font-family: 'Google Sans';. font-style: normal;. font-weight: 400;. src: url(https://fonts.gstatic.com/s/googlesans
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:RIFF (little-endian) data, Web/P image
                            Category:dropped
                            Size (bytes):660
                            Entropy (8bit):7.7436458678149815
                            Encrypted:false
                            SSDEEP:
                            MD5:C3DFF0D9F30EC0BCF4DEC9524505916B
                            SHA1:4B378403ACBEBC3747E08C69B5FD7770A850C9EB
                            SHA-256:73D788F86BE22112BB53762545989C0F1BBDB7343161130952C9BA3834FF81E3
                            SHA-512:677EA304D00D176ACF61FF68BF23BD5F77AD2928D7DE9F4B842292BC9D3FB7029FE9F578B62F142DCE689230F392E828098EED3484FE2DBEE6E1A7AA5378E2C6
                            Malicious:false
                            Reputation:unknown
                            Preview:RIFF....WEBPVP8L..../'....Hv.=n.......Q...a..(Rv.o..U.....l..m........0l.6l..f.......A?B.C.A...2h..Ag0....G8.n#)R.j.x..P.F..I;.Ox......7-...bX./..]...3..T....5...x...G.C....%.u.....u/._.=....<!q.\...9.....\....p:..P.4.aS.N).>.>.."..9..Vh ....no....l.1..#6p\c..2..>..=8...........FP.^....+/.~......hs..D.Jm..9...r....t*.H..~T^|.....l..l......he..}f....d.."....K...&1..................pl.Pf.%6...2X..I...eXQ(.K..1%c..w.s._..._K`K.1}..D.E=...<..ytM..>.q'.e.L.~$...b..;k.M.....t\O..m.I._..F....'........z.]..u?~..P.zJM.. k...p~9..D....".Zl$?f..+...\.Pg..%...;.[R>N.#.W.e..@q...(....]&......K.......?.|.z..(...:&m.V.C.'...D^.R....
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text
                            Category:dropped
                            Size (bytes):102
                            Entropy (8bit):5.175588157115862
                            Encrypted:false
                            SSDEEP:
                            MD5:BDD7240B7E3164CB5D457030CC578441
                            SHA1:EC9D89382B8372D91D07C27A8CA01870F482C46C
                            SHA-256:51659871751772F2D42CC2858B002C4D1E87676B91959CE18133B9E8EB33D968
                            SHA-512:C8ED9B3FA88B92C5F957E27313DEAC2B8654F698DF51CE58CDE64BAC23D29DDF4367C1F8DD5A31932A71B3C9B2679090F14512EEB39434ED14D3C4B1C79951C8
                            Malicious:false
                            Reputation:unknown
                            Preview:)]}'.22;["WJo_Z_aUHuK8xc8PxODouQI","2120"]c;[2,null,"0"]1b;<div jsname="Nll0ne"></div>c;[9,null,"0"]0;
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:Web Open Font Format (Version 2), TrueType, length 15344, version 1.0
                            Category:downloaded
                            Size (bytes):15344
                            Entropy (8bit):7.984625225844861
                            Encrypted:false
                            SSDEEP:
                            MD5:5D4AEB4E5F5EF754E307D7FFAEF688BD
                            SHA1:06DB651CDF354C64A7383EA9C77024EF4FB4CEF8
                            SHA-256:3E253B66056519AA065B00A453BAC37AC5ED8F3E6FE7B542E93A9DCDCC11D0BC
                            SHA-512:7EB7C301DF79D35A6A521FAE9D3DCCC0A695D3480B4D34C7D262DD0C67ABEC8437ED40E2920625E98AAEAFBA1D908DEC69C3B07494EC7C29307DE49E91C2EF48
                            Malicious:false
                            Reputation:unknown
                            URL:https://fonts.gstatic.com/s/roboto/v18/KFOmCnqEu92Fr1Mu4mxK.woff2
                            Preview:wOF2......;........H..;..........................d..@..J.`..L.T..<.....x.....^...x.6.$..6. ..t. ..I.h|.l....A....b6........(......@e.]...*:..-.0..r.)..hS..h...N.).D.........b.].......^..t?.m{...."84...9......c...?..r3o....}...S]....zbO.../z..{.....~cc....I...#.G.D....#*e.A..b...b`a5P.4........M....v4..fI#X.z,.,...=avy..F.a.\9.P|.[....r.Q@M.I.._.9..V..Q..]......[ {u..L@...]..K......]C....l$.Z.Z...Zs.4........ x.........F.?.7N..].|.wb\....Z{1L#..t....0.dM...$JV...{..oX...i....6.v.~......)|.TtAP&).KQ.]y........'...:.d..+..d..."C.h..p.2.M..e,.*UP..@.q..7..D.@...,......B.n. r&.......F!.....\...;R.?-.i...,7..cb../I...Eg...!X.)5.Aj7...Ok..l7.j.A@B`".}.w.m..R.9..T.X.X.d....S..`XI..1... .$C.H.,.\. ..A(.AZ.................`Wr.0]y..-..K.1.............1.tBs..n.0...9.F[b.3x...*$....T..PM.Z-.N.rS?I.<8eR'.3..27..?;..OLf*.Rj.@.o.W...........j~ATA....vX.N:.3dM.r.)Q.B...4i.f..K.l..s....e.U.2...k..a.GO.}..../.'..%$..ed.*.'..qP....M..j....../.z&.=...q<....-..?.A.%..K..
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (2586)
                            Category:downloaded
                            Size (bytes):219302
                            Entropy (8bit):5.523669241766255
                            Encrypted:false
                            SSDEEP:
                            MD5:68C49B192CB02CF02143EAE4816F4089
                            SHA1:EB6C8F84CFF31FDE171862C522D6DAC2E30D2142
                            SHA-256:BE6D33BC6663EEFBAA71BFB971747B9A999BA953DF95F4E1AA5E02D0194E264A
                            SHA-512:DAF6BF703C8AFBB0899958815DB2D1BB3D218E2C87011EDBA4AE588F33C408A3F14C78BE9E5A126F00343270EA9B8598166469CC4C06336ED7CEA66B4A42BDA4
                            Malicious:false
                            Reputation:unknown
                            URL:"https://www.gstatic.com/og/_/js/k=og.qtm.en_US._3uvDuX1Bhg.2019.O/rt=j/m=qabr,q_dnp,qcwid,qapid,qald,qads,q_dg/exm=qaaw,qadd,qaid,qein,qhaw,qhba,qhbr,qhch,qhga,qhid,qhin/d=1/ed=1/rs=AA2YrTus2ZfPv70D5bJuGT4XDgi-VtNqjg"
                            Preview:this.gbar_=this.gbar_||{};(function(_){var window=this;.try{._.Cd=typeof AsyncContext!=="undefined"&&typeof AsyncContext.Snapshot==="function"?a=>a&&AsyncContext.Snapshot.wrap(a):a=>a;.}catch(e){_._DumpException(e)}.try{._.ve=function(a){return _.Kb(a)&&a.nodeType==1};_.we=function(a,b){if("textContent"in a)a.textContent=b;else if(a.nodeType==3)a.data=String(b);else if(a.firstChild&&a.firstChild.nodeType==3){for(;a.lastChild!=a.firstChild;)a.removeChild(a.lastChild);a.firstChild.data=String(b)}else _.se(a),a.appendChild(_.ie(a).createTextNode(String(b)))};var xe;_.ye=function(a,b,c){Array.isArray(c)&&(c=c.join(" "));const d="aria-"+b;c===""||c==void 0?(xe||(xe={atomic:!1,autocomplete:"none",dropeffect:"none",haspopup:!1,live:"off",multiline:!1,multiselectable:!1,orientation:"vertical",readonly:!1,relevant:"additions text",required:!1,sort:"none",busy:!1,disabled:!1,hidden:!1,invalid:"false"}),c=xe,b in c?a.setAttribute(d,c[b]):a.removeAttribute(d)):a.setAttribute(d,c)};var Ce;_.Be=func
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:PNG image data, 2469 x 306, 8-bit colormap, non-interlaced
                            Category:downloaded
                            Size (bytes):209821
                            Entropy (8bit):7.967017709981921
                            Encrypted:false
                            SSDEEP:
                            MD5:BD6D00BDBCE0693B2649CA9B167D6AB1
                            SHA1:7D314AF67530E810B585E24BC3B734F6D46AD6CE
                            SHA-256:51500D059375413010FAD5787998AB04DAC94B7395425FAA68ABD72E694F2EC7
                            SHA-512:2C4B730E47E373EE9B24D72F4D989C9809ADFA6AC2CBCF076CF93B7D7EA289B00BCBB2A973D73DBE9CB90271C4C0BF5F5B3BA4419E44FD7D615F9B96D79CC02B
                            Malicious:false
                            Reputation:unknown
                            URL:https://www.google.com/logos/2024/moon/novr2/play-sprite.png
                            Preview:.PNG........IHDR.......2......."....PLTEGpL9..*......z....,|....8.........u..|..............v..e..r..p..u..o..d..m.....a..`c.U.!..&..-..8..I..Q...a~/..?...f. ...\...._....U..8..%..+..R..E..8..c..{..4...S........L{.z....}........b..=...f.l......s..~.O..S..=..q..%..>......t..Fq.Mt.Z.0..h...k..Di.q..h.#...C`.Sv"t.A.u.|..d.}.v..H8vk.Pc.b..E'ps.[zt.n_.p................p....jz.E..d.....Y]{X....Zs.NkO|e}.Cj.ZS.p...{...................`......eh*icp.d..g}K......j............2.....<.....G..7gPFt\.bvQ..R...^l;`Dx.........Wn.Mb7mZSuQ_..DlL..2}.,...EW...?..!eU-fO.BM`sL.Vgo.{@...Ze7dH.[XSnG.\`.^[.bX../^K.V^.QX.XR.<A..1.]Q.WT.SOov-..+v..%_M...-_G.WI.LNMg?H..*WA]jB4[?Xb7.IDA_>3R6v...I;i.r<V5"Q@R..)L5.B;U.}La7<O-J[2Mivf..GV/Uz.HI.QX.GY2i..IR)5I+Ea<I`9...G]7He?YygJ]T[..K]4@K%<B.HK!f.hE=.HD.KJ.KH.........tRNS..'Mc8.z...................n..............V..............................................................................................................&.....8......................
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:SVG Scalable Vector Graphics image
                            Category:dropped
                            Size (bytes):742
                            Entropy (8bit):4.715663467051154
                            Encrypted:false
                            SSDEEP:
                            MD5:EDD0E34F60D7CA4A2F4ECE79CFF21AE3
                            SHA1:2CC789A02534557380D92124E2F8B9483D198FB3
                            SHA-256:ED9087D76CDC6D1C53698F6068F79872E77E87C8D012C0CFDAD13B05B6CCB37C
                            SHA-512:CE9D50913CAD41D11C7B3963C90788301B63EE1FFFFF73108E9F8709CA0A9FCC6170853A65A820FBF020628B403813C9E3CD262389FEB7D17A6C73C2F724394F
                            Malicious:false
                            Reputation:unknown
                            Preview:<svg xmlns="http://www.w3.org/2000/svg" height="24" viewBox="0 0 24 24" width="24"><path d="M22.56 12.25c0-.78-.07-1.53-.2-2.25H12v4.26h5.92c-.26 1.37-1.04 2.53-2.21 3.31v2.77h3.57c2.08-1.92 3.28-4.74 3.28-8.09z" fill="#4285F4"/><path d="M12 23c2.97 0 5.46-.98 7.28-2.66l-3.57-2.77c-.98.66-2.23 1.06-3.71 1.06-2.86 0-5.29-1.93-6.16-4.53H2.18v2.84C3.99 20.53 7.7 23 12 23z" fill="#34A853"/><path d="M5.84 14.09c-.22-.66-.35-1.36-.35-2.09s.13-1.43.35-2.09V7.07H2.18C1.43 8.55 1 10.22 1 12s.43 3.45 1.18 4.93l2.85-2.22.81-.62z" fill="#FBBC05"/><path d="M12 5.38c1.62 0 3.06.56 4.21 1.64l3.15-3.15C17.45 2.09 14.97 1 12 1 7.7 1 3.99 3.47 2.18 7.07l3.66 2.84c.87-2.6 3.3-4.53 6.16-4.53z" fill="#EA4335"/><path d="M1 1h22v22H1z" fill="none"/></svg>
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (1274)
                            Category:dropped
                            Size (bytes):17513
                            Entropy (8bit):5.421814090675897
                            Encrypted:false
                            SSDEEP:
                            MD5:01CD3AF1EAF185BAA95B18A7F5C6F987
                            SHA1:F29A967A89E122EC6650F23F79D13FDAB7073D01
                            SHA-256:A83F1186756C7B1D0306539F6E5AE8BC6C4BBC37B564C189877049B137E46718
                            SHA-512:2FAA83D1687D05F42FF7635FCDB39E091DD2750ABFCCB6F55B3E84EA67C07A299E658E7891DE19E3D8EEAA5E75F0573D54A7BFB04EF6AD093BE5FF5DCD54A142
                            Malicious:false
                            Reputation:unknown
                            Preview:this._s=this._s||{};(function(_){var window=this;.try{._.w2b=_.w("bwixAb",[]);.}catch(e){_._DumpException(e)}.try{._.q("bwixAb");.var x2b=function(a,b,c){a*=2;if(a<1)return c/2*a*a+b;a--;return-c/2*(a*(a-2)-1)+b},y2b=function(a,b,c,d){_.nm(a,"transform",`translateX(${x2b(d,b,c-b)}px)`)};var C2b,A2b,z2b,B2b;.C2b=function(a,b){const c=z2b(a),d=(a.isRtl?1:-1)*A2b(a,b)*a.Ca,e=a.oa().map((h,k)=>{var l=Number(_.pm(h,"width").replace(/[^\d.-]/g,"")),n=Number(_.pm(h,"opacity").replace(/[^\d.-]/g,""));const r=Number(_.pm(h,"height").replace(/[^\d.-]/g,"")),t=_.XCa(h);return{Zpc:h,startState:{flex:l,opacity:n,scale:Number(((t?t.height:6)/r).toFixed(2))},endState:B2b(a,k,b)}}).filter(h=>{var k=h.startState;h=h.endState;return!(k.opacity===h.opacity&&k.scale===h.scale&&k.flex===h.flex)}),f=performance.now(),g=h=>.{const k=Math.min((h-f)/500,1);e.forEach(l=>{var n=l.Zpc,r=l.startState;l=l.endState;var t=r.opacity;_.nm(n,"opacity",x2b(k,t,l.opacity-t));t=r.scale;_.nm(n,"transform",`scale(${x2b(k,t,l
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (7376), with no line terminators
                            Category:downloaded
                            Size (bytes):7376
                            Entropy (8bit):5.410845111939424
                            Encrypted:false
                            SSDEEP:
                            MD5:0F2376E7B5351EDF538C1BBA0CD5D331
                            SHA1:B5B94E6EA914BB901E83591D95E36774FB1DBF53
                            SHA-256:FB5707022C2A6121E307CD7D7F271C1E99CA85CC6D1BB39D3A41F1C5F3B70C62
                            SHA-512:69AC6DA1F5F830B17661B27BEC96B05A5C7D318604D1B86785A6FC4ED04E1036AFFED960A9129200BEFA574874EC74B84657D163C3578473CF6760E49B32AD1F
                            Malicious:false
                            Reputation:unknown
                            URL:"https://www.google.com/xjs/_/ss/k=xjs.s.f3zyDgSooOM.L.B1.O/am=AFKHACEAAAAEAACEABUABAAAAAAAAAAAAAAAAAAAAAAAAAAkAAAAQAAAAAAAABAAAAARAADKBAAAELwAAMAuAEAAAIAPAABHBYABAAAAAAGQAAAAAAABIACACgEAAAgAAAAAAgIAAAIAEAEAJACAQgAAAIiBAQAADAAAQACAIIAAAAQwAAoQAAkIACAB9IMKAgAQADAAAIAgIBxgGICgAgADDgIAAAAAAAAAAAAABAAIAQDAAAoAgAACAPQAEAAGACDNQAQACAIMBFAEAAEAAEAAAAAAAARAIAAAEDMBcAQMQAAAAAAAAABAAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAAQAAAAAAAAAAAAAAAAAAAAAAAQ/d=0/br=1/rs=ACT90oHraPXyoLDqsroiG6GYLMP8Z1xdyw/m=L1AAkb,y05UD,sy5ho,sy1dm,sy1fr,sy1u2,sy1qq,sy1qr,sy1qs,sy1sj,sy1av,syr3,sy2ff,sy1qh,sy1ql,sy1qo,epYOx?xjs=s4"
                            Preview:.jbBItf{display:block;position:relative}.DU0NJ{bottom:0;left:0;position:absolute;right:0;top:0}.lP3Jof{display:inline-block;position:relative}.nNMuOd{animation:qli-container-rotate 1568.2352941176ms linear infinite}@keyframes qli-container-rotate{from{transform:rotate(0)}to{transform:rotate(1turn)}}.RoKmhb{height:100%;opacity:0;position:absolute;width:100%}.nNMuOd .VQdeab{animation:qli-fill-unfill-rotate 5332ms cubic-bezier(0.4,0,0.2,1) infinite both,qli-blue-fade-in-out 5332ms cubic-bezier(0.4,0,0.2,1) infinite both}.nNMuOd .IEqiAf{animation:qli-fill-unfill-rotate 5332ms cubic-bezier(0.4,0,0.2,1) infinite both,qli-red-fade-in-out 5332ms cubic-bezier(0.4,0,0.2,1) infinite both}.nNMuOd .smocse{animation:qli-fill-unfill-rotate 5332ms cubic-bezier(0.4,0,0.2,1) infinite both,qli-yellow-fade-in-out 5332ms cubic-bezier(0.4,0,0.2,1) infinite both}.nNMuOd .FlKbCe{animation:qli-fill-unfill-rotate 5332ms cubic-bezier(0.4,0,0.2,1) infinite both,qli-green-fade-in-out 5332ms cubic-bezier(0.4,0,0.2,
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (625)
                            Category:dropped
                            Size (bytes):1288731
                            Entropy (8bit):5.767657728273567
                            Encrypted:false
                            SSDEEP:
                            MD5:947EFD072DCAE3D9946A0D10360C2559
                            SHA1:D7A112506D0024009634F46C4DEE519408101B5A
                            SHA-256:B04B30AC6779E20AE8241539CA6E4EFBD1EEEB23E0558F9D2DBF354E33903AF7
                            SHA-512:6552D0560B5747F23DB5A446462B8F3ED9A5DD42FAB92DE55488F03F49B4AB358850DBEE7411A858C34D85B6A860C8AADAB292237EF4B2FF52E92C6E1734E09A
                            Malicious:false
                            Reputation:unknown
                            Preview:this._s=this._s||{};(function(_){var window=this;.try{./*.. Copyright The Closure Library Authors.. SPDX-License-Identifier: Apache-2.0.*/./*.. Copyright Google LLC. SPDX-License-Identifier: Apache-2.0.*/./*.. Copyright 2024 Google, Inc. SPDX-License-Identifier: MIT.*/./*. SPDX-License-Identifier: Apache-2.0.*/./*. Copyright The Closure Library Authors.. SPDX-License-Identifier: Apache-2.0.*/.var baa,caa,naa,oaa,paa,qaa,raa,saa,taa,uaa,vaa,zaa,xaa,waa,Aaa,yaa,Baa,Daa,Caa,Eaa,Faa,Gaa,Iaa,Jaa,Oaa,$aa,fba,nba,pba,qba,rba,vba,wba,Bba,Gba,Kba,Mba,Sba,Uba,Tba,Xba,Jba,bb,$ba,cca,dca,eca,gca,ica,mca,nca,oca,qca,rca,tca,uca,Eca,Qca,Rca,Sca,Tca,Uca,Nca,Vca,Kca,Wca,Jca,Lca,Mca,Xca,Yca,Zca,kda,lda,nda,rda,sda,wda,zda,tda,yda,xda,vda,uda,Ada,Bda,Cda,Fda,Eda,Jda,Kda,Qda,Rda,Tda,Uda,Vda,Wda,Xda,Yda,Lda,Zda,bea,dea,cea,eea,gea,fea,iea,hea,lea,kea,mea,qea,rea,uea,wea,xea,yea,rb,zea,Cea,Dea,Jea,Lea,Uea,.Wea,Vea,Xea,Yea,Bea,Fea,$ea,dfa,jfa,zb,nfa,qfa,tfa,pfa,yfa,Afa,Bfa,Efa,Hfa,Ifa,Kfa,Nfa,Qfa,Rfa,Tfa,Uf
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:JSON data
                            Category:dropped
                            Size (bytes):18370
                            Entropy (8bit):1.1671191174712578
                            Encrypted:false
                            SSDEEP:
                            MD5:41DEA7F47520F76D76A4C0FA11BAD94D
                            SHA1:4F2F7768F7D37367EE4DFD0D10D436ED684A9F6B
                            SHA-256:AFF07B66F6A923C355A3AC004384E3FA28BE0D1DF5ACD41013200C8EE70CB853
                            SHA-512:1622E4B554417733676610F880BED73BF94AE3D1C09905287E3B7C38CF09707AE82B892AAEA850493CDA0AC84B732B40E3E6801D623C87C8602AB210377D3440
                            Malicious:false
                            Reputation:unknown
                            Preview:{"chunkTypes":"1000011111110011110001000010110100000011111111011011011111111111111111111111111111111110101111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111110111101111111113101101111111111110111111111111110111111111111111100011101111111111111111111111111010100222212121212121212121212121212122222212121212121212121212121212121212121212121212222222221221221222122122122122122122122122122122122122122122122122122122122122122122122122221221221221221221221212121221212121212121212121212121211212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121222221212122222222221222121212122112212121212121121211212121212121212121212121212121212122122122122112121
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text
                            Category:downloaded
                            Size (bytes):102
                            Entropy (8bit):5.195196000253118
                            Encrypted:false
                            SSDEEP:
                            MD5:FABDF9FF670F2F81FB9DD17BDCC7A732
                            SHA1:8E78B53BC5E321180A70BD27160CF4F5065127DA
                            SHA-256:0E1555478CA58F6C94509207141C00695A21F6069C030BBDD5EB9D68C2D3C236
                            SHA-512:8F2AF5DDF798E4EC4D09E85EA613A6D0E7A027E81FF380B1B5A828801FDC3681F018F36E9B4981F25C1E21AC4F72B1F111330A2EBEFA4049FB5EEE003D4C1F8C
                            Malicious:false
                            Reputation:unknown
                            URL:"https://www.google.com/async/hpba?vet=10ahUKEwi-vqWDpO6JAxX6Q6QEHfcVFbIQj-0KCBc..i&ei=UJo_Z77WKPqHkdUP96vUkAs&opi=89978449&yv=3&sp_imghp=false&sp_hpte=1&sp_hpep=1&stick=&cs=0&async=_basejs:%2Fxjs%2F_%2Fjs%2Fk%3Dxjs.hd.en_US.Krtc5zmDtmw.es5.O%2Fam%3DAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEAAAAAAAAAAAAMAAAAQAAAAAAgAAAAAAAAAhABAEAAABAAAALAAAEAwAAACAEBAAACAAAAeZQoAAkQAAAAACAAgACAAABAAAAAIAAAAAAAAKAAAAAAAEAAAAAAAAAAAAgQAAAAAAAAAAAAIAABADwAAAAAAAAAQEAAAhoABCAAAAAAAAOgDgOABGFJYAAAAAAAAAAAAAAAACJAgmAsJCAhAAAAAAAAAAAAAAAAAAACRJi5s%2Fdg%3D0%2Fbr%3D1%2Frs%3DACT90oEZORBC7FYrMjqmDQMo_6hv7JEAHA,_basecss:%2Fxjs%2F_%2Fss%2Fk%3Dxjs.hd.rVqMNzqlVlQ.L.B1.O%2Fam%3DCKkCAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEAAAAAAAAAABOwEAAADAOwCBAgAAAAAwAAAAAABEAAAABBAAKACAAAAAAAgAABEABAAUAAAAAiMAgAAARlACUACACAABQEACAAIAASQQUMgKgBRAAAAAAAAAAACAAAAhgAQCADQARAABoBIAABEDwQAAAAAIAgAYCYAhoABCAAAAAAAACADAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAgAKA%2Fbr%3D1%2Frs%3DACT90oHOuxEPhlzZ3IGP944yO_Wxq-S9gw,_basecomb:%2Fxjs%2F_%2Fjs%2Fk%3Dxjs.hd.en_US.Krtc5zmDtmw.es5.O%2Fck%3Dxjs.hd.rVqMNzqlVlQ.L.B1.O%2Fam%3DCKkCAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEAAAAAAAAAABO8EAAATAOwCBAgAAAAAwAAAhABBEAAABBBAALACAEAwAAAiAEBEABCAUAAeZQqMAkQAARlACUAiACAABREACAAIAASQQUMgKgBRAAAAEAAAAAACAAAAhgQQCADQARAABoBIAABEDwQAAAAAIAgQcCYAhoABCAAAAAAAAOgDgOABGFJYAAAAAAAAAAAAAAAACJAgmAsJKAhAAAAAAAAAAAAAAAAAAACRJi5s%2Fd%3D1%2Fed%3D1%2Fdg%3D0%2Fbr%3D1%2Fujg%3D1%2Frs%3DACT90oGKeVEqew9R43QKjD8zvGSVNhvlOA,_fmt:prog,_id:_UJo_Z77WKPqHkdUP96vUkAs_9"
                            Preview:)]}'.22;["VZo_Z7CoO6-I7NYP94Km6Ac","2120"]c;[2,null,"0"]1b;<div jsname="Nll0ne"></div>c;[9,null,"0"]0;
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (577)
                            Category:downloaded
                            Size (bytes):1499
                            Entropy (8bit):5.048539135667
                            Encrypted:false
                            SSDEEP:
                            MD5:1A797EB3978D4E29022110EF5C211238
                            SHA1:92FD66B2362D55D8AC84AB3165C73670AF326E26
                            SHA-256:9CB06629EFFA7B52C7248C964D89BAD423D9FF40338F54610DA414165FA94E34
                            SHA-512:C805988A708C97F54B9FAA09EF3E82C61C79968DF9CFC2E9AE8AC5127DB303429DADFA52B4A99FF1B5F2DCC64530F1F4EE500DDF27E3C4F736B2BBF18885A944
                            Malicious:false
                            Reputation:unknown
                            URL:https://www.google.com/xjs/_/js/k=xjs.hd.en_US.Krtc5zmDtmw.es5.O/am=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEAAAAAAAAAAAAMAAAAQAAAAAAgAAAAAAAAAhABAEAAABAAAALAAAEAwAAACAEBAAACAAAAeZQoAAkQAAAAACAAgACAAABAAAAAIAAAAAAAAKAAAAAAAEAAAAAAAAAAAAgQAAAAAAAAAAAAIAABADwAAAAAAAAAQEAAAhoABCAAAAAAAAOgDgOABGFJYAAAAAAAAAAAAAAAACJAgmAsJCAhAAAAAAAAAAAAAAAAAAACRJi5s/d=0/dg=0/br=1/rs=ACT90oEZORBC7FYrMjqmDQMo_6hv7JEAHA/m=aLUfP?xjs=s4
                            Preview:this._hd=this._hd||{};(function(_){var window=this;.try{._.y("aLUfP");.var Mtb=function(a){this.Yr=a};var Ntb=function(a){_.Yn.call(this,a.Oa);var b=this;this.window=a.service.window.get();this.wa=this.Yr();this.oa=window.orientation;this.ka=function(){var c=b.Yr(),d="orientation"in window&&Math.abs(window.orientation)===90&&b.oa===-1*window.orientation;b.oa=window.orientation;if(c!==b.wa||d){b.wa=c;d=_.eb(b.wd);for(var e=d.next();!e.done;e=d.next()){e=e.value;var f=new Mtb(c);try{e(f)}catch(g){_.ca(g)}}}};this.wd=new Set;this.window.addEventListener("resize",this.ka);"orientation"in window&&this.window.addEventListener("orientationchange",.this.ka)};_.D(Ntb,_.Yn);Ntb.Ia=function(){return{service:{window:_.Zn}}};_.m=Ntb.prototype;_.m.addListener=function(a){this.wd.add(a)};_.m.removeListener=function(a){this.wd.delete(a)};._.m.Yr=function(){if(_.sa()&&_.na()&&!navigator.userAgent.includes("GSA")){var a=_.cl(this.window);a=new _.Vk(a.width,Math.round(a.width*this.window.innerHeight/this
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:Web Open Font Format (Version 2), TrueType, length 22180, version 1.0
                            Category:downloaded
                            Size (bytes):22180
                            Entropy (8bit):7.99033920580306
                            Encrypted:true
                            SSDEEP:
                            MD5:E905A9BE581B8C837C48020AF6C606A0
                            SHA1:E00C1833F1C65B812094C149B314800350F54685
                            SHA-256:58180E3CBA5A736E1875C690B3A756DABC7EE19960F4C66A692D42E5679C13D0
                            SHA-512:BCAF31FAB00B69FC58AEF04EFC77C1E3786CD46E294B67AE862EB6E9D29FA4515E884BA6E105907D1E50593AD8220DDCDA428125CAE5118383A9BB6CEAE2549B
                            Malicious:false
                            Reputation:unknown
                            URL:https://fonts.gstatic.com/s/googlesans/v62/4Ua_rENHsxJlGDuGo1OIlJfC6l_24rlCK1Yo_Iqcsih3SAyH6cAwhX9RFD48TE63OOYKtrwEIJllpyk.woff2
                            Preview:wOF2......V...........VA..........................j...H....`?STATx..B.....H..!.....6.$..V. ..6..:...=....N.U.(..v..m...f..._~d.Qa...-....?#A...g.3.Y..@.....fv.....;..G[.N..9%1..Y.. ..{.EL..2`.>..>hS%..P.....W..../b.~.yy.Y.(*l..3..jg...y....+..'=#n..(...h.r.....w.u"nfUs.....O._.;....?.....1.!.G@..!..CD...Zb...ql........M-m..*....@)...c.....|...}.w..D...$.(*...,.<...N}.$..6{..H.i.m..#...O<.........%.K(m..&..%..]......$u.)V...0c.S\6/...vb...........e..va.....o.e..].....?.c..Q....Z*.......ar)W&.I.R.$...........,!.._O)..!u...;.U..4..>.3....3.....S`IPM.r.y..n....&.u..XMg.....D....j.|P.n......HJ.......~..O|..?(.......]R....ex.|....Av.[.....\.$.=*.Nm.")...1...H0O...P.d:...*.R...z.......Krz...9.&.4.+.Gn...h.($}R=.E......[...[.?...'."$..?....h...vW...~CH..!...^f#))..Da._x.../$..0....4.K5+Ya.hrm*...?.;...F&.iO&....B.0vm..m._3.O..-..AF.d. |.z..x.A.7.-.;..{......%.B#.*;U(UU]Z../.....n^3..;.,.U-<._..[0.9)..E4..w.._x6.o.n.....B.!.lk../.7-.O..g.Z..""F...1FT...a.).<.
                            File type:RFC 822 mail, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                            Entropy (8bit):6.0321289120092105
                            TrID:
                            • Text - UTF-8 encoded (3003/1) 100.00%
                            File name:[EXTERNAL] Oakville shared ''o_akville_853473074_21.11.2024''.eml
                            File size:144'055 bytes
                            MD5:8f50586a80d369b87fe4639ad0de4d3f
                            SHA1:3b71be69b6f88c21506831b572862f5d882024a0
                            SHA256:e4d56a20a847be7f63548d3936a08ebeaf340e948bd8377ceb2d8c35ff9270e8
                            SHA512:7969d10eaa9b14ecae02a9260d9f15e79ce7ab7ca478b2d31727a95a0c1a24c0448a199d549f5e12b09fed4e9f21c8367b2ac2c8ebbca5ffef716ac15b37bf31
                            SSDEEP:3072:qXbbp6ydz49U6TnxL1DQIBKo0Zo8T65+Hg0ni:+bsyRU/nt1DD6ZrHni
                            TLSH:39E31B02D3F24E2A49570AAB580332E47A7CB6F197AD84F7309BBF77B659CD2C249105
                            File Content Preview:...Received: from PH0PR12MB7864.namprd12.prod.outlook.com (2603:10b6:510:26c::15).. by CYXPR12MB9320.namprd12.prod.outlook.com with HTTPS; Thu, 21 Nov 2024.. 12:07:29 +0000..Received: from YT4PR01CA0087.CANPRD01.PROD.OUTLOOK.COM (2603:10b6:b01:ff::7).. by
                            Subject:[EXTERNAL] Oakville shared ''o_akville_853473074_21.11.2024''
                            From:oakville.onlinedocument44916.3675290@sharenow.fileshare25046262.esl-fluency-lab.com
                            To:shawn.boast@oakville.ca
                            Cc:
                            BCC:
                            Date:Thu, 21 Nov 2024 12:07:14 +0000
                            Communications:
                            • You don't often get email from oakville.onlinedocument44916.3675290@sharenow.fileshare25046262.esl-fluency-lab.com. Learn why this is important __________ EWmskPvW bztBBTVHXVkdUtJ, Your email ymXiS@tFQyirP.ymXiS.com must be confirmed before using it to log in to our store. Thank you for your patience. Click here to confirm your email and instantly log in (the link is valid only once): Confirm Account If you have any questions, please feel free to contact us at donotreply@beautifulacacia.com or by phone at +1(424)-888-0219. Thank you, BeautifulAcacia! You don't often get email from oakville.onlinedocument44916.3675290@sharenow.fileshare25046262.esl-fluency-lab.com. Learn why this is important __________ EWmskPvW bztBBTVHXVkdUtJ, Your email ymXiS@tFQyirP.ymXiS.com must be confirmed before using it to log in to our store. Thank you for your patience. Click here to confirm your email and instantly log in (the link is valid only once): Confirm Account If you have any questions, please feel free to contact us at donotreply@beautifulacacia.com or by phone at +1(424)-888-0219. Thank you, BeautifulAcacia! You don't often get email from oakville.onlinedocument44916.3675290@sharenow.fileshare25046262.esl-fluency-lab.com. Learn why this is important You don't often get email from oakville.onlinedocument44916.3675290@sharenow.fileshare25046262.esl-fluency-lab.com. Learn why this is important You don't often get email from oakville.onlinedocument44916.3675290@sharenow.fileshare25046262.esl-fluency-lab.com. Learn why this is important You don't often get email from oakville.onlinedocument44916.3675290@sharenow.fileshare25046262.esl-fluency-lab.com. Learn why this is important You don't often get email from oakville.onlinedocument44916.3675290@sharenow.fileshare25046262.esl-fluency-lab.com. Learn why this is important Learn why this is important https://aka.ms/LearnAboutSenderIdentification __________ EWmskPvW bztBBTVHXVkdUtJ, Your email ymXiS@tFQyirP.ymXiS.com must be confirmed before using it to log in to our store. Thank you for your patience. Click here to confirm your email and instantly log in (the link is valid only once): Confirm Account If you have any questions, please feel free to contact us at donotreply@beautifulacacia.com or by phone at +1(424)-888-0219. Thank you, BeautifulAcacia! https://www.google.co.tz/url?url=https://oviteweltxddfrszluspazr&ipmp=sxvjova&ygojnb=fcl&elerk=hfbmay&ayt=yrhphmb&pddud=ezxxsf&nuqs=zlhwdht&gaxffgl=pszq&duvvs=volgvy&gkxzodc=jel&qxfv=nnvdnwmd&rqqvtcmspp=rxqkebhlxe&q=amp/shxzygr.a%c2%adyqbtb%c2%adbx%c2%adj%c2%adp%c2%adx%c2%adjxlcs%c2%ads.com%e2%80%8b/b8b2rxwmh&ksla=tapqwwz&jnnbhkq=ttdmivnp&cfjt=efvfrgoe&oqiqdbkskf=kyuuqptwrp&tvge=dkzlwfl&xinkvob=ipnmjidq&ijie=uljbrnkt&otqzapkzkg=kmqusroise&pria=nlusrhl&ymcacxc=zcifoamd&qigt=tulcumns&hhzbkqbcaz=wwvxgvrfea&yjoo=dorlplq&setubwl=gxyhfmbx&shjzsftutp=fpvhstinfx&aabm=criocrm&hjizanz=pegjdgeo&fawgntlmwo=jqpmhlrvtn&roup=izmvjyq&gxeotbo=usfofocn&bjditvldqx=ouxvzuvslt&vvra=ilqxudw&urpmgcs=ymqwcpzq&yrvwdmllag=vdvavnqley&nzuk=ccmlbne&nkpwqws=sngrhfzo&gbgxvugiga=ryzhrucpyl&irec=txrssof&zsogcrm=iayomywb&trpv=tsllqaa&ikkahrz=owzvqchv&nvsg=jqklsur&mifuzci=ijrnkgyc&gxpk=lvdrwxp&ijyljat=mglwbmtx&atpa=zczuwuy&wqrobkl=kbbvlqru&smzd=ipgsgqz&tspepjo=zblbkdbs&cuqg=qokwyqc&pngakdv=hnokowhl&kmzi=utnaspz&isnjuod=nzzrblql&gwhl=insrinb&ysonvuu=wjleaqhv&ilqq=ittadax&ktcegkw=uqqodjle&wwle=anzcjil&cvtwsas=ttchqbwr&thbw=fstnzsh&thhglee=kzsgswit&iizz=hpvogha&hmbwuzq=filorduk&cunp=nhwvcbd&gdrvwdv=gqwwbzuq&ilty=eagyudc&itknbva=sbfavtnk&gjlu=nqaglxn&mrmfjee=xwpodlmj&qknk=uggtyao&mdaaclr=jwmwywrx&nxgd=ydqqawk&ibskbyz=eujqstmb&hpkr=mlxxgks&eivxpwq=otpwhioj&hvrx=zuchxtx&hdmpdgk=wnnxxklk&fazk=kyqhssx&geglyya=dlvpwlnm&avcm=dnnwuqs&dlofbgz=ngnlfhga&zqkj=hoqixkx&zrenpfy=ojcmmoyy&kobu=kpbpvty&rxmqemn=gsprqvuf&ahrr=hewpbki&qxmoqna=smtuczoj&covv=etxdord&vpvelhe=dapyasoe&cudt=pdgwaay&kleugke=oxqfwiqw&hljb=epcyxdm&ypctgvo=czuuwire&crax=cnxmiuw&spupbvv=ovqdpzqa&kjje=pjfavpg&kqvhacj=smqypqqz&jnoa=pobryjd&ynchqcn=rjxzoxwk&dkck=vkekqrr&acbvftn=krcgxouz&pjbb=xpkhnqv&ptoijep=rpxpmrhr&cpic=grnbkdg&rncpvec=wnlpnmju EWmskPvW bztBBTVHXVkdUtJ, Your email ymXiS@tFQyirP.ymXiS.com must be confirmed before using it to log in to our store. Thank you for your patience. Click here to confirm your email and instantly log in (the link is valid only once): Confirm Account If you have any questions, please feel free to contact us at donotreply@beautifulacacia.com or by phone at +1(424)-888-0219. Thank you, BeautifulAcacia! <!-- @media screen and (max-width: 600px){ body {width:94%!important; padding:0 3%!important; display:block!important} .container-table {width:100%!important; max-width:600px; min-width:300px} } --> EWmskPvW bztBBTVHXVkdUtJ, Your email ymXiS@tFQyirP.ymXiS.com must be confirmed before using it to log in to our store. Thank you for your patience. Click here to confirm your email and instantly log in (the link is valid only once): Confirm Account If you have any questions, please feel free to contact us at donotreply@beautifulacacia.com or by phone at +1(424)-888-0219. Thank you, BeautifulAcacia! EWmskPvW bztBBTVHXVkdUtJ, Your email ymXiS@tFQyirP.ymXiS.com must be confirmed before using it to log in to our store. Thank you for your patience. Click here to confirm your email and instantly log in (the link is valid only once): Confirm Account If you have any questions, please feel free to contact us at donotreply@beautifulacacia.com or by phone at +1(424)-888-0219. Thank you, BeautifulAcacia! EWmskPvW bztBBTVHXVkdUtJ, Your email ymXiS@tFQyirP.ymXiS.com must be confirmed before using it to log in to our store. Thank you for your patience. Click here to confirm your email and instantly log in (the link is valid only once): Confirm Account If you have any questions, please feel free to contact us at donotreply@beautifulacacia.com or by phone at +1(424)-888-0219. Thank you, BeautifulAcacia! EWmskPvW bztBBTVHXVkdUtJ, Your email ymXiS@tFQyirP.ymXiS.com must be confirmed before using it to log in to our store. Thank you for your patience. Click here to confirm your email and instantly log in (the link is valid only once): Confirm Account If you have any questions, please feel free to contact us at donotreply@beautifulacacia.com or by phone at +1(424)-888-0219. Thank you, BeautifulAcacia! EWmskPvW bztBBTVHXVkdUtJ, Your email ymXiS@tFQyirP.ymXiS.com must be confirmed before using it to log in to our store. Thank you for your patience. Click here to confirm your email and instantly log in (the link is valid only once): Confirm Account If you have any questions, please feel free to contact us at donotreply@beautifulacacia.com or by phone at +1(424)-888-0219. EWmskPvW bztBBTVHXVkdUtJ, Your email ymXiS@tFQyirP.ymXiS.com must be confirmed before using it to log in to our store. Thank you for your patience. Click here to confirm your email and instantly log in (the link is valid only once): Confirm Account If you have any questions, please feel free to contact us at donotreply@beautifulacacia.com or by phone at +1(424)-888-0219. https://beautifulacacia.com/ EWmskPvW bztBBTVHXVkdUtJ, Your email ymXiS@tFQyirP.ymXiS.com must be confirmed before using it to log in to our store. Thank you for your patience. Click here to confirm your email and instantly log in (the link is valid only once): Confirm Account If you have any questions, please feel free to contact us at donotreply@beautifulacacia.com or by phone at +1(424)-888-0219. EWmskPvW bztBBTVHXVkdUtJ, Your email ymXiS@tFQyirP.ymXiS.com must be confirmed before using it to log in to our store. Thank you for your patience. Click here to confirm your email and instantly log in (the link is valid only once): Confirm Account If you have any questions, please feel free to contact us at donotreply@beautifulacacia.com or by phone at +1(424)-888-0219. EWmskPvW bztBBTVHXVkdUtJ, Your email ymXiS@tFQyirP.ymXiS.com must be confirmed before using it to log in to our store. Thank you for your patience. Click here to confirm your email and instantly log in (the link is valid only once): Confirm Account If you have any questions, please feel free to contact us at donotreply@beautifulacacia.com or by phone at +1(424)-888-0219. EWmskPvW bztBBTVHXVkdUtJ, Your email ymXiS@tFQyirP.ymXiS.com must be confirmed before using it to log in to our store. Thank you for your patience. Click here to confirm your email and instantly log in (the link is valid only once): Confirm Account If you have any questions, please feel free to contact us at donotreply@beautifulacacia.com or by phone at +1(424)-888-0219. EWmskPvW bztBBTVHXVkdUtJ, Your email ymXiS@tFQyirP.ymXiS.com must be confirmed before using it to log in to our store. Thank you for your patience. Click here to confirm your email and instantly log in (the link is valid only once): Confirm Account If you have any questions, please feel free to contact us at donotreply@beautifulacacia.com or by phone at +1(424)-888-0219. EWmskPvW bztBBTVHXVkdUtJ, Your email ymXiS@tFQyirP.ymXiS.com must be confirmed before using it to log in to our store. Thank you for your patience. Click here to confirm your email and instantly log in (the link is valid only once): Confirm Account If you have any questions, please feel free to contact us at donotreply@beautifulacacia.com or by phone at +1(424)-888-0219. EWmskPvW bztBBTVHXVkdUtJ, Your email ymXiS@tFQyirP.ymXiS.com must be confirmed before using it to log in to our store. Thank you for your patience. Click here to confirm your email and instantly log in (the link is valid only once): Confirm Account If you have any questions, please feel free to contact us at donotreply@beautifulacacia.com or by phone at +1(424)-888-0219. EWmskPvW bztBBTVHXVkdUtJ, Your email ymXiS@tFQyirP.ymXiS.com must be confirmed before using it to log in to our store. Thank you for your patience. Click here to confirm your email and instantly log in (the link is valid only once): Confirm Account If you have any questions, please feel free to contact us at donotreply@beautifulacacia.com or by phone at +1(424)-888-0219. EWmskPvW bztBBTVHXVkdUtJ, Your email ymXiS@tFQyirP.ymXiS.com must be confirmed before using it to log in to our store. Thank you for your patience. Click here to confirm your email and instantly log in (the link is valid only once): Confirm Account If you have any questions, please feel free to contact us at donotreply@beautifulacacia.com or by phone at +1(424)-888-0219. EWmskPvW bztBBTVHXVkdUtJ, Your email ymXiS@tFQyirP.ymXiS.com must be confirmed before using it to log in to our store. Thank you for your patience. Click here to confirm your email and instantly log in (the link is valid only once): Confirm Account If you have any questions, please feel free to contact us at donotreply@beautifulacacia.com or by phone at +1(424)-888-0219. EWmskPvW bztBBTVHXVkdUtJ, Your email ymXiS@tFQyirP.ymXiS.com must be confirmed before using it to log in to our store. Thank you for your patience. Click here to confirm your email and instantly log in (the link is valid only once): Confirm Account Confirm Account Confirm Account Confirm Account Confirm Account https://beautifulacacia.com/customer/account/confirm/id/24550/key/175c765f0d967624cf0640536f2e9935/ Confirm Account If you have any questions, please feel free to contact us at donotreply@beautifulacacia.com or by phone at +1(424)-888-0219. donotreply@beautifulacacia.com mailto:donotreply@beautifulacacia.com +1(424)-888-0219 tel:+1(424)-888-0219 Thank you, BeautifulAcacia!
                            Attachments:
                            • img-2324868854.jpg
                            • img-15038881.jpg
                            • RmSaaWBisoVsr.jpg
                            • img-440793352.jpg
                            • img-2729299305.jpg
                            • img-1872621806.jpg
                            Key Value
                            Receivedfrom xzfewzdzuf ([103.114.218.218]) by smtp-relay.gmail.com with UTF8SMTPS id d9443c01a7336-21288d3926asm537665ad.128.2024.11.21.04.07.17 for <shawn.boast@oakville.ca> (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Thu, 21 Nov 2024 04:07:20 -0800 (PST)
                            Authentication-Resultsspf=pass (sender IP is 209.85.214.230) smtp.mailfrom=sharenow.fileshare25046262.esl-fluency-lab.com; dkim=pass (signature was verified) header.d=sisc-org-uk.20230601.gappssmtp.com;dmarc=permerror action=none header.from=sharenow.fileshare25046262.esl-fluency-lab.com;compauth=pass reason=111
                            Received-SPFPass (protection.outlook.com: domain of sharenow.fileshare25046262.esl-fluency-lab.com designates 209.85.214.230 as permitted sender) receiver=protection.outlook.com; client-ip=209.85.214.230; helo=mail-pl1-f230.google.com; pr=C
                            DKIM-Signaturev=1; a=rsa-sha256; c=relaxed/relaxed; d=sisc-org-uk.20230601.gappssmtp.com; s=20230601; t=1732190840; x=1732795640; darn=oakville.ca; h=subject:to:date:message-id:reply-to:from:mime-version:from:to:cc :subject:date:message-id:reply-to; bh=PcuRPmsVRFG9t/P6QTWSrQCykA6r6Wj9rEER2/KUkCs=; b=Lc7hioEaYWh1mVO5d0ssk72FPVPJT8gjENWDrZylqkNfDOKWbK8azQcmTcVuvRsbF8 EzVSllxHgortkKlu+MlwT0MErI/oCys2CNqTtPCfDHXdMUVzI72aztwv9wYKK+c/UWYw PjPHGGH9xEhn8Iy3g6dWZoGivtkETHWahNhcpg12r8ZmM7ZuqHwp4FP85SqtEgzO67rq UCmzQmiHkcHzfrNNw+6q1BKUiceG7RYby/7YS4jQV8slJ5Jt+H9JUMwSPpyCSvONcW4M 9xbG+8BtRkXzt2rmBkGM4oIU1pOVpuV43hpId5bB/aEPQ0dW/wBakX5DTvw7VuvOUy40 RUug==
                            X-Google-DKIM-Signaturev=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1732190840; x=1732795640; h=subject:to:date:message-id:reply-to:from:mime-version :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=PcuRPmsVRFG9t/P6QTWSrQCykA6r6Wj9rEER2/KUkCs=; b=ecj6T2t+ha6YIrroBGp7FTzPWcv/Mxz9Ep2MXMlXU2hrDDvGHi3IkLNfnRr3zJBq/m sFPSKx/kG4p0AXDStAjGk3EZCUYRH4iB/oqWLi3gYOYhDBxPQypSuT/+sWMx/zZnN0JF 65zvDBXpSW9lWF9CNbcv8J4pjSnwcZOTvUVXBMbH5O5St3w1A2l4U5HTmlECwnYXEgyB tKZ/zAfftHSp8UecQL2W9v8jWSiR/yAxNdMUHxbdpI3MFrD86gvW/GzIk8WJkwF7j8Ji 8e+gZG0K5CA3NOM/acRNH1ywU7pQPM6YYpsk3HX6mgYLUJpxJVAz2vDYpWShrJX4dj6L yb0Q==
                            X-Gm-Message-StateAOJu0YyQesdyz03hrwURCkFOE3vJwJm0iax4qfuM/cIGttMbCc2tmeuL 4taSgvTi1KTAWxVY3B/d82RGroFD5ArHso1yzRIw63vxeTCIwGPm8yziQPqKU7Foz3uF7qFcGn6 7zT+Or6uWVNXLG7ldz7jaOLHHoagvNV9mxmZQ+cinJ34=
                            X-Google-Smtp-SourceAGHT+IGuWVLAxpdG1JZaJVydyNjdMqOTxc8ffvUlQTR/e+rzgXP839WVi06NFsVzpwj8rSrwT8JArMNqoLK8
                            X-Receivedby 2002:a17:902:e889:b0:20c:8f78:67be with SMTP id d9443c01a7336-2126a47501bmr79224565ad.40.1732190840466; Thu, 21 Nov 2024 04:07:20 -0800 (PST)
                            Return-Path oakville.onlinedocument44916.3675290@sharenow.fileshare25046262.esl-fluency-lab.com
                            X-Relaying-Domainsisc.org.uk
                            Fromoakville.onlinedocument44916.3675290@sharenow.fileshare25046262.esl-fluency-lab.com
                            Reply-Tooakville.onlinedocument44916.3675290@sharenow.fileshare25046262.esl-fluency-lab.com
                            Message-ID<fe6e4d34-4c9a-4295-b4ad-585d0978f5a0@sharenow.fileshare25046262.esl-fluency-lab.com>
                            DateThu, 21 Nov 2024 12:07:14 +0000
                            Toshawn.boast@oakville.ca
                            Subject[EXTERNAL] Oakville shared ''o_akville_853473074_21.11.2024''
                            Content-Typemultipart/related; boundary="29e6ccdcf533d7a0921a884ac4c0b3e81a0e52ff6f0fc37984c5f37de1b3"
                            X-MS-Exchange-Organization-ExpirationStartTime21 Nov 2024 12:07:21.7063 (UTC)
                            X-MS-Exchange-Organization-ExpirationStartTimeReasonOriginalSubmit
                            X-MS-Exchange-Organization-ExpirationInterval1:00:00:00.0000000
                            X-MS-Exchange-Organization-ExpirationIntervalReasonOriginalSubmit
                            X-MS-Exchange-Organization-Network-Message-Id 3b587f9a-63c3-4b9c-6a91-08dd0a250dbd
                            X-EOPAttributedMessage0
                            X-EOPTenantAttributedMessagec868558f-a1c1-46fc-821d-aed53bb48125:0
                            X-MS-Exchange-Organization-MessageDirectionalityIncoming
                            X-MS-PublicTrafficTypeEmail
                            X-MS-TrafficTypeDiagnostic YT2PEPF000001C8:EE_|PH0PR12MB7864:EE_|CYXPR12MB9320:EE_
                            X-MS-Exchange-Organization-AuthSource YT2PEPF000001C8.CANPRD01.PROD.OUTLOOK.COM
                            X-MS-Exchange-Organization-AuthAsAnonymous
                            X-MS-Office365-Filtering-Correlation-Id3b587f9a-63c3-4b9c-6a91-08dd0a250dbd
                            X-MS-Exchange-AtpMessagePropertiesSA|SL
                            X-MS-Exchange-EnableFirstContactSafetyTipEnable
                            X-MS-Exchange-Organization-SCL1
                            X-Microsoft-Antispam BCL:0;ARA:13230040|5073199012|5063199012|4073199012|22003199012|43022699015|8096899003|43540500003;
                            X-Forefront-Antispam-Report CIP:209.85.214.230;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:mail-pl1-f230.google.com;PTR:mail-pl1-f230.google.com;CAT:NONE;SFTY:9.25;SFS:(13230040)(5073199012)(5063199012)(4073199012)(22003199012)(43022699015)(8096899003)(43540500003);DIR:INB;SFTY:9.25;
                            X-MS-Exchange-CrossTenant-OriginalArrivalTime21 Nov 2024 12:07:21.7063 (UTC)
                            X-MS-Exchange-CrossTenant-Network-Message-Id3b587f9a-63c3-4b9c-6a91-08dd0a250dbd
                            X-MS-Exchange-CrossTenant-Idc868558f-a1c1-46fc-821d-aed53bb48125
                            X-MS-Exchange-CrossTenant-AuthSource YT2PEPF000001C8.CANPRD01.PROD.OUTLOOK.COM
                            X-MS-Exchange-CrossTenant-AuthAsAnonymous
                            X-MS-Exchange-CrossTenant-FromEntityHeaderInternet
                            X-MS-Exchange-Transport-CrossTenantHeadersStampedPH0PR12MB7864
                            X-MS-Exchange-Transport-EndToEndLatency00:00:07.8750169
                            X-MS-Exchange-Processed-By-BccFoldering15.20.8158.013
                            X-Microsoft-Antispam-Mailbox-Delivery ucf:0;jmr:0;auth:0;dest:I;ENG:(910001)(944506478)(944626604)(920097)(930097)(140003);
                            X-Microsoft-Antispam-Message-Info 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
                            MIME-Version1.0

                            Icon Hash:46070c0a8e0c67d6